• +00 (123) 456 7890
  • info@domain.com

Full Width

Pak. J. Biotechnol. Vol. 15 (special issue-I) 2018

IMPROVED GENETIC ALGORITHM FOR ENHANCING THE COMFORTNESS OF A PASSENGER CAR

Original Research Article

Dhananjeyan S., Rajalakshmi K., Nandhini J., Ramya R., Sophiya P.,

Abstract

This paper mainly focusing the significance of effective and most powerful optimization technique Real coded Genetic Algorithm (RGA) for vehicle system over Binary coded Genetic Algorithm (BGA). Normal Fuzzy Logic Controller (FLC) can act intelligently to improve the comfort of passengers inside a car. For multi input controllers, the choice of scaling factors of the FLC requires more effort and knowledge where most of the FLC designers struggle. In this paper the FLC scaling factors have been identified with two different but similar optimization techniques – BGA and RGA. For the optimization, the RMS value of car Body Acceleration (BA) is taken as the Performance Index (PI). The simulation work has done in MATLAB/SIMULINK environment by considering the dual bump as the road disturbance input. The effectiveness of the RGA tuned FLC (RGAFLC) is proved in comparison with the BGA tuned FLC (BGAFLC) for the passenger car.

A SURVEY OF EXTANT SURVEILLANCE SYSTEMS USINGBIOMETRIC TRACKING

Original Research Article

Vasanth Subramanian, Sunil Dev Choudhary B. and Lalithamani N.,

Abstract

Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments. Although current systems are remarkable, they are far from impeccable and are limited by several conditions. In short, there is still vast scope for major improvements in our extant systems. In this survey, we strive to provide a comprehensive review of the present literature and to propose a better model that would aim to solve the present limitations.

A REVIEW ON BIOMETRIC CRYPTOSYSTEM USING FUZZY VAULT

Original Research Article

V. Sujitha and D. Chitra

Abstract

Biometric framework helps to gather statistics from individual and it’s used to particularly find out the person with the physical-behavioral mechanism of the biometric qualities. The most challenge of biometric method is to provide the guarantee for storage space of the biometric templates without compromising the security and privacy. Biometric cryptosystem method is very helpful to secure traits from unauthorized access. The fuzzy vault is a famous and better biometric cryptography method to ensure the templates and its secret key in biometric frameworks. This paper reviews the various research work did in biometric cryptosystem using fuzzy vault.

FEATURE DIMINUTION BY HYBRID ALGORITHM FOR IMPROVING THE SUCCESS RATE FOR IVF TREATMENT

Original Research Article

Durairaj M1 and N. Ramasamy2

Abstract

Infertility is the most common problem faced by today’s generation. The factors like environment, genetic or personal characteristics are responsible for these problems. Different infertility treatments like IVF, IUI etc are used to treat those infertile people. But the cost and emotions beyond each and every cycle of IVF treatment is very high and also the success rate differs from person to person. So, there is a need to find a system which would predict the outcome of IVF to motivate the people both in psychologically and financially. Many Data Mining techniques are applied to predict the outcome of the IVF treatment. Reducing the unwanted features which affects the quality of result is one of the significant tasks in Data Mining. This paper proposes a hybrid algorithm which combines the core features of Ant Colony Optimization Algorithm and Relative Reduct Theory for Feature Reduction. In this work, the proposed Algorithm is compared with the existing related algorithms. It is evident from the results that the proposed algorithm achieved its target of reducing the features to minimum numbers without compromising the core knowledge of the system to estimate the success rate.

SURVEY ON NONOBSTRUCTIVE AND CONTINUOUS USER AUTHENTICATION ON MOBILE DEVICES

Original Research Article

N.Lalithamani, Raam Balaji D and SVPKH Satya Dev

Abstract

The use of mobile devices in our day to day life has increased drastically in the last ten years. Much of it can be contributed to the breakthrough in the field of communication. Since they contain most of our personal information, the constant worry of security and privacy has increased. In order to tackle this problem, non-obstructive and continuous user authentication has been proposed. This paper deals with the methods that have been proposed till now and the challenges that are yet to be overcome in this field.

HUMAN RE-IDENTIFICATION USING COLOUR AND TEXTURE FEATURES

Original Research Article

R. Newlin Shebiah, S. Arivazhagan

Abstract

Human Re-Identification turns out to be the most fascinating and perplexing tasks in the domain of smart video surveillance in recent time. Re-Identification is crucial in establishing reliable tagging of person across multiple cameras or even within the same camera to re-establish detached or lost tracks. The challenge in Person Re-Identification lies due to the visual and spatio-temporal uncertainty in the appearance of the person’s across multiple cameras. Here, a viewpoint invariant human re-identification framework with colour and texture features is proposed. The descriptor encodes the visual features of the human from the chromatic content described by colour statistical features, Local Binary histogram and Histogram of Gradients derived from wavelet transformed input image. Similarity measure is found by the Euclidean distance measured between the extracted feature descriptors from the non-overlapping cameras. From the experimental results it is observed that the proposed system significantly out performs state-of-the-art algorithms on the VIPeR Human Re-identification dataset.

TEXT BASED SENTIMENT ANALYSIS OF PRODUCT REVIEWS

Original Research Article

A Razia Sulthana, A Arokiaraj Jovith and L Sairamesh

Abstract

With advent of web 2.0 people started sharing their opinions in social network. The social media helps in communicating with public and provides a clear platform to share the views about the product. This has led to different ways of analyzing the user reviews. Sentiment analysis is one of the wide spread area which helps in identifying the same. We proposed a sentiment classifier which recognizes the opinion word based on linguistic analysis. This analysis is done before the preprocessing stage so as to filter outliers and extract only the necessary words. In against the existing approach, the time consumed in this method is considerably reduced as the reviews are analyzed in the initial stage. This method analyzes the sentiment of the reviews posted by customers in online portals by taking the bigrams into account. The relationship between bigrams is identified to know the wavelength of the user’s intention. The prioritized bigrams are chosen for every review such that it qualifies the root word and the root word itself. To inculcate we have implemented a different theoretical model. The data set we have taken for our experiment is a collection of 25,000 reviews from Cornell. The model was experimented with different training sets where the accuracy and precision measures shows a marginal increase. The results of our approach can be used for predicting the results in future as per the market specifications and future models. The accuracy, precision and recall were the metrics that were used to identify the quality of our methodology. Thus the study on bigrams in reviews yields an added value in sentiment analysis.

BLIND HYBRID WATERMARKING FOR SECURITY OF MEDICAL IMAGES

Original Research Article

K. Swaraja

Abstract

In the proposed work a sightless robust and secure watermarking for image is planned by utilizing discrete wavelet transform (DWT) and Schur transform. In this proposal by exploiting DWT on the part of RONI (region of non interest) of the medical image, dissimilar sub bands of frequency of wavelets are obtained. Schur transform is employed on the LH sub band of the RONI, to attain dissimilar singular matrices. Of these chosen blocks ensemble of features with related values is recognized from the singular value matrix which lie at the left part. These pairs of values are adapted utilizing a threshold to insert the watermark. To attain the quality of image besides the robustness of medical image as well as content of watermark, suitable threshold is selected. Two watermarks, an image type and a text type which have been employed for the identification of original medical 2D data. The text watermark corresponds to the electronic record of the patient (EPR) for identification and the other watermark which is taken as image presents authentication. As a result of the amalgamation of DWT and Schur transform, this proposal offers improved visibility of watermarked image along with recovered content of watermark. With the projected scheme, watermark bits are extorted effectively even after withstanding a variety of attacks. Performance assessment of projected scheme with accessible schemes illustrates that the robustness is improved in the anticipated scheme against dissimilar kinds of attacks.

A SURVEY ON PEAK VALUE FREQUENCY OF VALVES FOR FETAL DEVELOPMENT

Original Research Article

S. Vinod, D. Hemalatha, A. Sushanthi, J. Nandhini,

Abstract

Electrochemical coupling of fetal heart can be evaluated noninvasively using Doppler ultrasound and fetal electrocardiography .FNN which is a sort of neural system technique, was utilized to remove blood clots from which patient preoperative data is obtained and efficient model is proposed using Robotically actuated delivery sheath techniques.(RADS)This information can be used for early diagnosis of fetal diseases and assessment main factor of evaluating fetal circulation which provide information on the fetal wellbeing during pregnancy and fetal distress due to insufficient oxygen supply for fetus these conditions threaten the life of the fetus while early detection reduces prenatal morbidity and mortality.

EFFICIENT LSA FLOODING PROCESS TO OPTIMIZE OSPF ROUTING

Original Research Article

P. Anu and S.Vimala

Abstract

In this paper, the Open Shortest Path First (OSPF) Routing algorithm is improvised in terms of congestion, packet delivery ratio and throughput by having the concept of cluster head to reduce the extra overhead that occurs due to LSA flooding.

Original Research Article

Abstract

DETECTION OF FAULTS IN OVERHEAD LINES USING DISCRETE WAVELET TRANSFORM

Original Research Article

Avagaddi Prasad1 and J. Belwin Edward2

Abstract

Fault detection is a primary concern in isolation of faults. The present protective relaying systems used for fault detection are not precisely functioning which may lead to entire system shut down. The necessity to improve performance of present protective schemes used in power systems is rapidly increasing due to the drastic changes in power system working environment. This work shows a strategy for fault detection in overhead systems using discrete wavelet transform by overcoming the problems faced in conventional methods. This strategy utilizes just fault current estimations toward one side of the overhead line to detect the faults. The sufficiency of proposed technique is analyzed under a different fault conditions using technical computing tool. The results obtained are encouraging and also it is found out that the accuracy in proposed fault detection methodology has increased considerably.

DESIGN MODELING AND FABRICATION OF HUMAN-HUMANOID ROBOT COMMUNICATION

Original Research Article

Manoharan P. A.1, John Maria Vivian2 , Naveen Winson2 , Solomon Azariah2,Gnana Kousalya2

Abstract

Humanoid robotics is an emerging technology, lot of research work is done, its advanced research and development is being continued to incorporate multiple tasks in the robust environment of robotics system. Human Machine Interface (HMI)is a challenging task, which depends upon the critical applications required. Study, design and development of a novel Human face recognition and Speech synthesis essential for the humanoid robot, is carried out in this research project. Voice synthesis and recognition, voice to text conversion is interfaced to the database. Important feature of facial recognition is carried out, using principal component analysis (PCA) algorithm called, Eigen-faces. Prototype model of a humanoid design was simulated, fabricated and tested for the real-time application to interact with the students and faculties. Humanoid Robot (HR) model was validated for its functional capability and enhanced processing speed. HR is capable addressing oral communication of the personnel; HRHMI, through teleconferencing or video conferencing (VC) at remote terminal.

Pak. J. Biotechnol. Vol. 15 (special issue-II) 2018

SPECIAL ISSUE ICRAME 17

DESIGN AND DEVELOPMENT OF AN AUTOMATIC HEAD LAMP LEVELING SYSTEMS FOR AUTOMOBILES

Original Research Article

K. Ranjithkumar1, P. Ganeshan1, P. Raju, B. Prabu2, V. Mohanavel3, S. Dinesha1, S. Hariharan1, S. Jayasuriya1, G. Amarnath1

Abstract

A head lamp is usually attached to the front of a vehicle such as a car, with the purpose of illuminating the road ahead during periods of low visibility, such as night or precipitation. Headlight to be used in informal discussion interchangeably, headlamp is the correct technical term for the day to-day device itself, while headlight properly refers to the beam of light produced and distributed by the device. A headlamp can also be mounted on a bicycle with a battery or small electrical generator, and most other vehicles from trains to airplanes tend to have their own headlamps. A head lamp auto-leveling system can be used inexpensively and for a long term by reducing the unpleasant feeling in the driver. An implementation of the head-lamp leveling system includes head lamps whose axis is tilted horizontally/vertically with respect to a vehicle turning movement

SYNCHRONIZER LIFE ENHANCEMENT USING CARBON FIBRE COMPOSITES

Original Research Article

K. Chandramohan, P. V. Arunraj, A. Haymik Raja,

Abstract

The synchronizer in a domestic tractor is observed to be having a lifetime of 2-3 efficient years with the current material used for synchronizer being Brass. In this work with discuss about how to enhance the existence time of synchronizer by replacing Brass with Carbon – Carbon composite (C-C) material. The pattern of the carbon fiber chosen is Woven Roving Mat (WRM) which is blended with Epoxy resin with two layers of 0.5 mm thickness as a laminate. The WRM cloth is rolled over by the Epoxy resin with the help of a roller and then both are kept inside the bottom portion of the die arrangement. As design has the central guiding, the die can be inserted easily and straight into the bottom portion and the top portion is pressed inside the bottom portion. The composite friction material die is designed with AISI H13 steel and manufactured. A pressure of 400 kg/cm2 is applied to an area of 7.02 cm2; therefore, a force of 2800 kg is required, hence a 5 Ton hydraulic press is used. The result is observed that the carbon – carbon composite shows enhanced strength and endurance properties than the brass. By the results obtained we infer that brass can be replaced by carbon –carbon composite to increase the lifetime of synchronizer.

AIR COMPRESSOR FAULT DIAGNOSIS THROUGH STATISTICAL FEATURE EXTRACTION AND RANDOM COMMITTEE CLASSIFIER

Original Research Article

S. Aravinth1 and V. Sugumaran2

Abstract

Reciprocating air compressor is important equipment in industrial sector of both manufacturing and nonmanufacturing division. Failures of such significant components lead to severe economic losses and machine downtime. Several miscellaneous reasons may affect the operating system of such complex arrangement if regular monitoring is not done. This present article comprises of on-line condition monitoring diagnostics of compressor, where five major faults are taken into compressor system one at a time. Vibration signals for every fault condition is acquired and processed through signal condition circuitry arrangements with DAQ system and suitable software medium. Signals from each condition were given as an input to machine learning approach where statistical features were extracted in initial screening process. Most contributing features were alone selected out of feature selection process. These selected features were processed in Random Committee classifier to measure the accuracy of correctly classified signals from taken set of signals.

INVESTIGATION OF PERFORMANCE AND EMISSION CHARACTERISTICS OF DI DIESEL ENGINE FUELLED WITH MAHUA ETHYL ESTERS

Original Research Article

Radha Krishna Gopidesi *1, Premkartikkumar SR2, Naveen Kumar Chinthala3, Narendra Kumar S4

Abstract

The utilization of diesel engine is continuously increasing due to higher fuel to power ratio and efficient. But, it causes increasing the emissions and the fossil petroleum products are also diminishing rapidly. Thus, it is essential to substitute the diesel fuel with non-edible vegetable oils and animal fat oils. In the present investigation diesel was replaced by Mahua Oil Ethyl Esters (MOEE) with a variety of compositions (M10, M20, M30, and M40) to analyse the performance and the emission characteristics of the diesel engine. In the present experimental work, the engine was made to run on constant speed at varied load conditions. Based on the performance analysis of present investigation M30 gave enhanced results, compared to the pure diesel and the other blends. Therefore, M30 was taken as an optimized blend. For that blend, the air preheating and supercharging was used. The air pre- heating at 60ºC of M30 showed the improvement of mechanical efficiency and brake thermal efficiency when compared with the diesel and all other blends of MOEE. Since, the blends of MOEE have more oxygen content it reduces the emissions of HC, CO, and Smoke compared to pure diesel.

MISFIRE DETECTION IN I.C. ENGINE USING MACHINE LEARNING APPROACH

Original Research Article

Sumedh Mulay1, V. Sugumaran1 and S. Babu Devasenapati2

Abstract

Misfire is one of the major problem associated with the engine as it leads to power loss along with exhaust of air-pollutants like HC, CO, and NOx. Maintenance and condition monitoring of an IC engine is a very crucial activity which requires restriction of emission to the least possible levels. For misfire detection, vibration signals from engine cylinder were obtained using the piezoelectric accelerometer. As engine misfire gives specific vibration signal pattern with respect to the cylinder where misfire took place. Further, 12 statistical features like Standard Error, Sample Variance, Skewness etc. were extracted from obtained signals. Out of these, only useful features were identified using the J48 decision tree algorithm. Classification via Regression, IBk were used as classifiers for classification of these selected features. This paper deals with the comparative study of these classifiers and ensembling these classifiers using Vote classifier and from that, the better algorithm for misfire detection system is suggested.

COMPARATIVE MECHANICAL CHARACTERIZATION OF SPJ (SISAL-PALM-JUTE)KPC(KENAF-PALM-COIR) -JPJ (JUTE-PALM-JUTE) HYBRID FIBER REINFORCED COMPOSITES

Original Research Article

R. Thamilarasan1*, K. Purushothaman2

Abstract

Development of natural composites were in use over a long time. Researchers are working to provide green materials due to emission and scarcity issues. This article deals the mechanical characteristics of Sisal-Palmyara-Jute (SPJ), Kenaf-Palmyra-Coir (KPC) and Jute-Palm fruit -Jute (JPJ) fibers at different orientation is prepared with polymer resin. Natural fibers are collected from local farmers and extracted by stem explosion method and are cleaned, treated as per our requirement. Specimens were prepared with ASTM Standards and are tested to evaluate tensile strength, Flexural strength and Impact strength. Woven mat technique and Hand lay-up technique is followed at room temperature to mould the specimen. The weight fractions of fibers are equal 50:50% for all the fibers used in the experimental analysis. The result shows the energy absorbed by the jute-palm-jute composite is more than the other for equal weight fractions.

MECHANICAL CHARACTERIZATION OF SISAL-PALM-JUTE AND KENAF-PALM-COIR HYBRID FIBER REINFORCED COMPOSITES

Original Research Article

R. Thamilarasan1*, K. Purushothaman2, B. Murugesh3, P. Ramshankar4, P. Ganeshan4, K. Raja6

Abstract

Development of natural composites were in use over a long time. Researchers are working to provide green materials due to emission and scarcity issues. This article deals the mechanical characteristics of Sisal-PalmyaraJute(SPJ) and Kenaf-Palmyara-Coir (KPC). Fibers at different orientation is prepared with polymer resin. Natural fibers are collected from local farmers and extracted by stem explosion method and are cleaned, treated as per our requirement. Specimens were prepared with ASTM Standards and are tested to evaluate tensile strength, Flexural strength and Impact strength. Hand lay-up technique is followed at room temperature to mould the specimen. The weight fractions of fibers are equal 50:50% for all the fibers used in the experimental analysis. The result shows the energy absorbed by the composite SPJ is more than the other for equal weight fractions.

MECHANICAL CHARACTERIZATION OF PALMFRUIT (HYBRID) FIBRE REINFORCED COMPOSITE

Original Research Article

R. Thamilarasan1*, K. Purushothaman2,

Abstract

This paper describes the research work carried out with natural composites of Jute-Palm fruit-jute (J-P-J) and Sisal-Sisal-Sisal (S-S-S) fibers at different orientation are prepared with polymer resin. Natural fibers are collected from local farmers and extracted to our required size also cleaned, treated as per our requirement. Specimens were prepared with ASTM Standards and are tested to evaluate tensile strength, Flexural strength and Impact strength. Woven mat technique and Hand lay-up technique is followed at room temperature to mould the specimen. The weight fractions of fibers are equal 50:50% for all the fibers used in the experimental analysis. Flexural, tensile and Impact properties of hybrid composites were analyzed. The result shows the energy absorbed by the jute-palm-jute composite is more than the other for equal weight fractions.

STUDY ON THE MECHANICAL PROPERTIES OF THE NATURAL FIBRE REINFORCED POLYMER COMPOSITE MATERIALS

Original Research Article

P. Ramshankar1*, K. Raja2, P. Ganeshan3, P. Raju3, V.S. Karthigayan4, M. Lavanya3, K.K. Pavithraa3, H. Rajaraja Sozhan3, M. Mohanambal3

Abstract

The studying of mechanical properties of fibre and its reduced cost of treating and several other property variations can achieve the requirement of alternatives in fibre utilization. These chemically treated natural fibers are possessing improved properties than untreated fibers. They are having better results in impact strength, toughness and fatigue limit. The main objective of this review is defining about the research of natural fibre and developing the natural fibre in its reinforced polymer composites.

A STUDY ON MECHANICAL PROPERTY OF CEMENT WITH PARTIAL REPLACING SECONDARY CEMENTITIOUS MATERIALS

Original Research Article

P. Vasanthi1, A. Sujaatha2, A. Bhaskar3, Lavish Gaur4

Abstract

In recent years, a lot of interest has been developed among the civil engineering community regarding Secondary Cementitious Materials (SCM) in concrete. The ingredients that have to Moreover since ground granulated blast furnace slag (GGBS), Fly ash and Silica fume (Bhanja, et al., 2005) industrial by products and the quality of the end products may depend heavily on the quality of these byproducts. By considering the above threat a study was carried out in M40 grade of concrete with the fractional substitute of cement by GGBS, fly ash and silica fume with different percentages. our work presents a detailed study on its strength parameters like Compressive strength, split tensile strength and flexural strength for period of 7 days, 14 days and 28 days respectively. From this process, it reveals that the increase in fractional substitute of cement by SCMs increased the compressive, split tensile strength and flexural strength with the Partial replacement of OPC by GGBS 20 % + SF 10% gives the better result than the normal type of concrete.

INVESTIGATION ON MICROSTRUCTURE AND MICRO HARDNESS OF FRICTION STIR WELDED DISSIMILAR ALUMINUM ALLOY PLATES

Original Research Article

G. Swaminathan1, S. Sathiyamurthy2, P. Naveenchandran3

Abstract

Assembly of two different grades of aluminum plates is need in many light weight vehicles structures like military, aerospace, ship building and automobile applications. This paper deals with joining of AA7075-T651 with AA6063-T6 aluminum alloys by friction stir welding (FSW) process using cylindrical straight and taper at Tool revolving speed, tool axial force and welding transverse speed of 1000,1100,1200rpm, 4, 5, 6 KN and 30,45,60 mm/min. The effect welding process parameters on weld appearance and hardness were examined experimentally. The microstructures were observed at various regions and analyzed by means of optical microscope. From this investigation were established that the use of taper cylindrical pin profile of tool provides to better flow of materials between both alloys and the formation of flaw free weld zone. The growth in Micro-Hardness is attributed to the development of fine grains and intermetallic in the weld zone, and in addition, the reduced size of weaker regions, such as TMAZ and HAZ regions, results in good metallurgical properties.

OPTIMIZATION OF CYCLE TIME OF PALLETIZATION USING ABB ROBOT THROUGH SIMULATED ANNEALING ALGORITHM AND TRANSLATIONAL APPROACH

Original Research Article

Ameet Singh1, V. Sugumaran2, G. Balamuruga Mohan Raj3

Abstract

The paper is related to pick and place robotic system (IRB - 1600). The main objective is to minimize the optimum cycle time of the robotic system. To achieve the following objective simulated annealing algorithm (SA) is carried out. Industrial constraint regarding the functioning of real industrial robotic system has been taken in concern during the research practice. Numerical results show that the different algorithm perform optimally for the tested instances in a reasonable computational time. Complete installation and cycle time of the system has been reduced and optimized with proper design and simulation using offline programming.

STUDY OF EROSION CORROSION BEHAVIOUR OF MAGNESIUM AND ITS ALLOYS

Original Research Article

S. Jayabharathy1, P. Mathiazhagan2

Abstract

Erosion Corrosion is the degradation of material by means of combined effect of mechanical flow and chemical reactions with the surrounding environment. Light weighting of automobiles has been a critical issue in the transportation industries. Magnesium alloy seems to be the best promising next generation’s material and as a substitute to aluminium alloy and steel that are being used in automotive, aerospace industries. In this study ,Magnesium,AZ31 and AZ91 were used to investigate the erosion corrosion rate and corrosion rate in 3.5% wt NaCl .The experiments involved the measurement of weight loss .Experimental setup was used to carry out the erosion corrosion test. Immersion test was conducted to determine the corrosion rate. Results include erosion corrosion analysis, comparative analysis of erosion corrosion and corrosion rate. Further SEM analysis was done to study the microstructure behaviour of the samples. It was found that the corrosion rate increases as time of exposure increases. It was also inferred that the erosion corrosion rate is higher than corrosion rate due to moving fluid under the same environmental condition.

AN EXPERIMENTAL STUDY ON TERNARY BLEND BASED STEEL FIBRE REINFORCED GEO POLYMER CONCRETE

Original Research Article

M. Jothilingam1, Pratheeba Paul2,

Abstract

Cement is the second most consumed product and as per the year 2010 status the quantity assessed was 3.3 billion tons at global level. Cement industry accounts for 5% to 8% of world’s carbon dioxide emissions. It is also well-known fact that cement production consumes large amount of natural resources such as limestone, chalk, clay, etc. which are extracted from the quarry by blasting. On the other hand, Thermal Power Plants generates huge quantities of Fly ash while utilizing the coal for their process. As assessed by Central Electricity Authority, the total quantity of Fly Ash generated during 2015-2016 in India was 83.64 million MT. As per the Report of Indian Minerals year book 2014 issued by Ministry of Mines, Government of India, around 10 million tons of Blast Furnace slag is generated in India from iron & steel industry. Substantial quantity of this fly ash and GGBFS are used for landfills only. Both fly ash and GGBFS exhibits Cementitious as well as pozzolana characteristics. So, fly ash and GGBFS can be effectively utilized for production of concrete. One of the current research trends in Civil Engineering is to find an alternate material for Cement concrete. Geo Polymer Concrete is one such alternate for Cement Concrete. But, steam/ heat curing is required for producing Geo Polymer Concrete which makes it difficult for using the same for in situ applications. This project aims at finding the viable solutions for producing cast-in-situ geopolymer concrete without compromising on mechanical and durability properties of geopolymer concrete by using locally available industrial wastes such as Fly Ash & GGBS. The compression and flexural strength along with durability properties of Geopolymer concrete were investigated in this work. This study consisted of casting cubes and prisms and curing was done at ambient temperature to suit the cast-in-situ conditions. The specimens were tested for 7 & 28 days strength. Durability studies were carried out after the age of 28 days. It can be concluded that Geopolymer concrete can be produced cast-in-situ without any special curing requirement such as steam/ heat curing, and without compromising on mechanical and durability properties

FABRICATION AND TESTING OF 13 LAYER GLASS FIBER LAMINATES FOR APPLICATION IN ELECTRICAL JUNCTION BOXES AND ENCLOSURES

Original Research Article

D.K. Mohan kumar, A. Mathivanan, G.Manikandan, S.D. Kumar

Abstract

Aim of our work is to investigate the experimental values of tensile, flexural, impact, compression flame rating test and thermal expansion test GFRP Composites Embedded with 13 layers of Glass fiber orientation as laminates. The laminates are prepared with orientation of (900 450 900 450300 450 900 450 300 900 450 900 450) under Rule of mixture. Basically Metal, wood and alloys are used as electrical enclosures, junction boxes and battery Housings, Alloys are used to improve heat dissipation, insulation and weight reduction, however we incorporate the idea of replacing the metal ones with glass fiber sheet laminates. The result shows the significant improvement of flexural strength, tensile strength, less weight and no fire extinguish in the composite manufacturing laminates, from the obtained results it is found that Glass fiber reinforced laminates replace the existing electrical junction boxes.

DESIGN AND FABRICATION OF UP DE-SALINATOR KIT OPTIMIZATION OF PROCESS PARAMETERS FOR GAS METAL ARC WELDING OF DISSIMILAR AA7075 AND AA6063 ALUMINIUM ALLOYS USING ARTIFICIAL NEURAL NETWORKS (ANN)

Original Research Article

G. Swaminathan1, A. Mathivanan2, S.D. Kumar1, C. Uthirapathy1

Abstract

The present investigations deal with the effect and optimization of gas metal arc welding parameters on the mechanical properties in welding of dissimilar AA7075 and AA6063 Aluminum alloys. The process parameters used are current, voltage and gas flow rate and Taguchi experimental design method were followed. Tensile strength and Impact strength have been found for the optimum welding parameters. Further an Artificial Neural Network model was developed for the analysis and simulation of the correlation between process parameters and mechanical properties. The input for the model is current, voltage and gas flow rate and the output for the model is Tensile and Impact strength. The combined influence of current, voltage and gas flow rate on the mechanical properties of the joint was simulated. The model can calculate tensile strength and impact strength as functions of process parameters. Lastly a comparison was made between the measured and calculated value and it was found that the calculated results were in agreement with the measured data.

DESIGN AND FABRICATION OF UP DE-SALINATOR KIT

Original Research Article

P. Ganeshan1*, P. Raju1, A. John Martin2, D.S. Nethran1, S. Raja1, S. Kavin1, N. Naveneeth Raj1, M.R. Manikandan1, K. Raja3

Abstract

Water, is an endless requirement of the living thing all around the universe. But now it is reaching a level of scarcity in all regions which had rich water sources before. This not achieved naturally but we humans in order to find solutions on living with luxury lead a test with environment by destroying the forest, over utilization of ground water sources, improving the level of chemicals in the available ground water with use of chemical fertilizers and with several forms of destructive techniques. Thus we humans who started this should find a solution to end up the arising situation. Which not only have brought solution to the available problems but also acts as a solution for the problems which are going to arise further.

PERFORMANCE ANALYSIS OF 2-METHYLTETRAHYDROFURAN BLENDED ON BIODIESEL ENGINE

Original Research Article

P. Ganeshan1*, V. Ragavan1, P. Raju1, S. Karthigayan2, M. Nimalan1, V. Mathan Raj1, S. Naveen Prakash1, K. Praveen Kumar1, P. Rajkumar1

Abstract

Biodiesel nowadays is emerging as an alternative fuel which is a good replacement to the petroleum diesel. Biodiesel is mainly derived from fats and oils by different methods such as dilution, pyrolysis, micro emulsification and transesterification but these days most commercial method used for bio-diesel production is 2methyltetrahydrofuran transesterification. Biodiesel was prepared using transesterification process by optimizing the production parameters such as alcohol to oil molar ratio, catalyst concentration etc. Engine design also plays an important role as if it is improved it reduces fuel consumption and give better performance parameters. In this thesis the main emphasis has been laid on optimum production of biodiesel from neem oil and then using the biodiesel blends with diesel studying the comparative exhaust emission characteristics and engine performance. A four stroke single cylinder compression ignition engine was used to measure performance and emission parameters. Biodiesel (fire point and calorific value) added to the diesel (fire point and calorific value) at Three different volume concentrations i.e. 10, 20, &30 of Biodiesel and to blend the Biodiesel with 2-Methyltetrahydrofuraneto study the emission levels.

DESIGN AND FABRICATION OF ALTERNATIVE COOLING SYSTEM FOR CONVENTIONAL PURPOSE

Original Research Article

N. Yogaraj1, P. Ganeshan1*, P. Raju1, P.A. Nigal Ashik1, B. Boobalan 1, K. Arumugam 1, D. Dinesh Kumar 1, V. Logeshwaran 1, K. Raja

Abstract

The main purpose of this alternate cooling system is to circulate cooling air to the surrounding that means it will act as an air cooling system. Instead of using water, ice cubes are used here. The exhaust fan plays a main purpose of the exhaust fan is to suck the air from the closed area (polystyrene container) and supply to surrounding. The polystyrene box is nothing but the thermocol container and it is shaped into required dimensions for fitting the exhaust fan at the center of the box. The sufficient ice cubes are kept inside the box. Once the ice bars are filled into the closed container the vapour arises, after completing all the setting process the exhaust fan is switched to ON position, so that it exhausts the vapour to the surrounding. The cooling capacity is measured with the help of digital thermometer and the temperature is to be noted for every 2 hours so that the verification of the cooling capacity is to be done.

COMPUTATIONAL FLUID DYNAMICS ANALYSIS OF FINNED TUBE DEHUMIDIFIER FOR SOLAR HUMIDIFICATION DEHUMIDIFCATION DESALINATION PLANT

Original Research Article

B. Monarch1, V. Tejasvi1, C. Chiranjeevi1*, T. Srinivas2 and R. Shankar2

Abstract

Desalination by air Humidification Dehumidification (HDH) is one of the upcoming technologies of converting brackish water into freshwater. It works by evaporating the brackish water and humidifying air passing over it, leaving the salts behind. The humidified air is then passed through the condensers to recover the water it carries by condensation of water vapour. This condensed water is free from salts and can be directly used or can be further treated for use. The use of a compact finned tube heat exchanger for the purpose of the 2nd dehumidifier in a two stage HDH process is carried out by using computational fluid dynamics (CFD) analysis. The boundary condition for the computational work is obtained from experimental setup in a pilot plant. As CFD models can take up very large computational power for solving fin structures, the model is solved by modelling the fins side of the dehumidifier as a porous medium. The water yield obtained from condensation, thermal characteristics of the fluid model are obtained is compared with experimental results. The yield of water obtained is 3848 ml/hour for the first set of experimental observations.

TYRE PRESSURE MONITORING SYSTEM USING STATISTICAL ANALYSIS AND ROTATION FOREST ALGORITHM

Original Research Article

Anoop P.S. and V. Sugumaran

Abstract

Tyre pressure monitoring systems (TPMS) are dedicated vehicle systems, which is to calculate the vehicle tyre pressure at any condition. Direct tyre pressure monitoring systems use normal pressure sensors to measure the pressure which is fitted within the tyre. These systems are accurate and they need batteries and wireless sensors. An indirect TPMS uses the sensor data from the wheel speed sensor of the anti-lock breaking system and compares them to determine a pressure difference. This paper suggests a new and reliable vehicle tyre pressure supervise hardware using rotation forest algorithm. Vertical wheel hub vibrations are extracted using an accelerometer. The statistical features are acquired from the accelerometer data and the features are classified using rotation forest algorithm. A reasonably good percentage (93.33%) of classification accuracy was attained from the experiment.

ARTIFICIAL LIMB MOVEMENT SYSTEM USING K-STAR ALGORITHM - A DISCRETE WAVELET TRANSFORMATION APPROACH

Original Research Article

V.V. Ramalingam*1, S. Mohan2, V. Sugumaran3, B. Rebecca jeyavadhanam4

Abstract

Machine learning is one of the promising areas which contributes to human rehabilitation and this statement can be substantiated by the number of researches conducted in this field. In this study, we attempt to direct an artificial limb system with the help of Electroencephalogram (EEG) signals. EEG signals are created as a result of brain activities when humans intend to perform any action. Hence, capturing this signal and using them to control the artificial limb will be as close to how a human will control their normal hand. Four separate “classes of EEG signals were recorded from” 27 healthy subjects while they were instructed to perform various hand movements such as Finger open (Fopen), Finger close (Fclose), Wrist counterclockwise (WCCW) and Wrist clockwise (WCW). The recorded EEG signals were further classified with classification algorithm to identify the desired movement. Feature extraction, feature selection and feature classification are the three important phases of machine learning which needs to be focused on. The aim of this study is to mine Discrete Wavelet features from EEG signals, classify them with K-Star algorithm, and propose the best features that can be used to regulate the artificial limb.

LIFETIME MAXIMIZATION OF WIRELESS SENSOR NETWORKS IN A WIND TURBINE

Original Research Article

Indhu R1*, Sankaran R A2, Sugumaran V3

Abstract

Wind turbines are installed in remote places and operated continuously which demands continuous condition monitoring systems for effective utilization. The condition monitoring of wind turbine is using machine learning approach is an established area. While the initial cost of the wind turbines are higher, the additional cost introduced by the condition monitoring system makes the situation worse. The fault diagnosis technique is employed using wireless sensor networks (WSN) wherein one sensor node is attached to every wind turbine in which the fault diagnosis is done. A sink node receives the signals from all the wind turbines and all the operations are carried out in the sink node. A major issue in WSN is that the battery of the sensor nodes will reduce gradually with time, as the location of the sensor nodes are very far from the sink node in many wind turbine plants. The effective operation of the WSN based fault diagnosis system is greatly dependent on number of wind turbines per base station of the wireless sensor network. In the present work, the machine learning technique is used for the extracted vibration signals from the wind turbine bearing. The wind turbine plant is equipped with the wireless sensor network and found that when the base station is in the middle of the wind turbine plant, three wind turbines has to be kept for one base station. The simulation is done using Matlab©.

ANALYSIS AND MODELLING OF SUPPORT VECTOR MECHANISM FOR THE BIOMASS GASIFICATION PROCESS

Original Research Article

T. Sathish*1, M.D.Vijayakumar2, P. Periyasamy3

Abstract

Biomass gasification process is one of the major process of producing combustible gases like Carbon monoxide (CO), Hydrogen (H2) and traces of Methane and non-useful products like tar and dust are used in hot air generators, dryers, boilers, ovens, industries and in many other applications. So in order to improve the accuracy and efficiency of biomass gasification a precise modelling technique based on artificial intelligence is proposed in this paper. Support Vector Mechanism (SVM) is the proposed method used to increase the efficiency of the biomass gasification and to predict the biomass gasification by back propagation algorithm.

EXERGY ANALYSIS OF SOLAR PHOTO VOLTAIC THERMAL HYBRID HEAT PUMP WORKING WITH CIRCULAR AND TRIANGULAR EVAPORATOR TUBE CONFIGURATIONS

Original Research Article

N. Gunasekar1, M. Mohanraj2, G. Sathish Sharma3, R. Prakash3*

Abstract

In order to evaluate the performance of a solar photovoltaic thermal hybrid heat pump working with circular and triangular tube evaporator configurations, exergy analysis is performed in this study. The experiments were carried out under the meteorological conditions of Coimbatore city (latitude of 10.98oN and longitude of 76.96oE) in India. Exergy destruction and exergy efficiency of each components of the system were calculated with reference to four ambient conditions such as solar intensity, ambient temperature, ambient relative humidity and ambient wind velocity. The exergy performance parameters of the heat pump were simulated using artificial neural networks to have accurate exergy performance comparison. The results indicated that maximum exergy destruction for both the configurations occurred in PV-T evaporator. The exergy destruction in circular tube configuration is 2-7% higher than triangular tube configuration. It was also found out that exergy efficiency of the system using triangular tube configuration is 1.2-3.8% higher than circular tube configuration.

EFFECT OF SAMPLING FREQUENCY AND SAMPLE LENGTH ON FAULT DIAGNOSIS OF WIND TURBINE BLADE

Original Research Article

More Vasudha, Panditrao Harshal, A. Joshuva*, V Sugumaran*

Abstract

The purpose of this research is to determine the effect of sampling frequency and sample length on fault diagnosis of the wind turbine blade in order to optimise the cost as high sampling frequency leads to high cost. This study uses machine-learning approach followed by feature extraction and feature selection with J48 decision tree algorithm. In this take a look at, statistical features had been extracted from vibration signals with various sampling frequency and corresponding sample duration. With extracted features, function choice and category turned into achieved. With the help of J48 decision tree algorithm the optimal sampling size is obtained at sampling frequency of 4000Hz, which gives the classifier accuracy as 72.66%. The obtained results can be used with low cost accelerometer i. e. MEMS based accelerometer.

ANALYZING VERTICAL VIBRATIONS OF AUTOMOBILE WHEEL HUB TO MONITOR TYRE PRESSURE USING STATISTICAL FEATURES AND SUPPORT VECTOR MACHINE ALGORITHM

Original Research Article

Anoop P S1, V Sugumaran1 and Hemanth Mithun Praveen1

Abstract

One of the main safety measures used in automobiles are Tyre pressure monitoring systems (TPMS). These are intelligent devices fabricate to supervise the tyre pressure in automobile. The current technology use barometric sensors or vehicle speed sensors to measure the pressure directly. They mainly depend on batteries and different types of remote sensors which would increase the installation cost and complication maintenance. This paper suggests a novel technique adopting machine learning and fault diagnosis to supervise the vehicle tyre pressure indirectly. Vertical vibrations from a wheel hub are acquired using a three axis mems accelerometer sensor. After feature extraction and feature selection the selected features are classified using support vector machine algorithm. A good classification accuracy of 90% was gained.

OPTIMIZATION OF CYCLE TIME OF PALLETIZATION USING ABB ROBOT THROUGH PARTICLE SWARM OPTIMIZATION ALGORITHM AND TRANSLATIONAL APPROACH 4:13 AM 3/29/2018

Original Research Article

Ameet Singh1, V. Sugumaran1,* , G. Balamuruga Mohan Raj2

Abstract

This paper presents an efficient and reliable evolutionary-based approach to solve palletization problem. The proposed approach employs particle swarm optimization (PSO) algorithm for minimization of cycle time of palletizing robot i.e. IRB-1600. The operator of algorithm are reviewed, focusing on how each affects search behaviour in the problem space. This paper first analyzes the impact of the parameters i.e. population size and maximum run on the performance of the particle swarm optimizer. Numerical results show that the different algorithm perform optimally for the tested instances in a reasonable computational time. The proposed approach results have been compared to those that reported in the literature recently. The results are promising and show the effectiveness and robustness of the proposed approach.

ESTIMATION OF REMAINING LIFE OF BEARINGS USING ROTATION FOREST AND RANDOM COMMITTEE CLASSIFICATION MODELS – A STATISTICAL LEARNING APPROACH

Original Research Article

R. SATISHKUMAR1, V. SUGUMARAN2

Abstract

Bearings are considered to be one of the critical elements in all rotating machineries. Bearings are in general used to reduce or minimize the friction in the rotating parts. Strengthening the predictive maintenance of bearings helps to improve the performance of the machines. Hence, bearing prognosis gains its importance in the recent times. This paper emphasis on estimation of remaining life of bearings using classification models through condition monitoring techniques. Vibration signals acquired from the experiments were used to assess the current state of the bearings while in operation. Statistical features were extracted from the signals and the best contributing features were selected for building a classification model with Random forest, Rotation forest and Random committee classifiers. The effectiveness of the classification model built by Random forest, Rotation forest and Random committee classifiers were analysed and compared through a statistical machine learning approach.

Pak. J. Biotechnol. Vol. 14 (special issue-II) 2017

CLUSTERING OF VIDEO INFORMATIONS USING BRICH METHODOLOGY

Original Research Article

D. Saravanan

Abstract

Information extraction one of the emerging field today because of the huge data sets. Creation and uploading information’s are easy to any user, retrieve the relevant content is most challenge task. Due to that number of researchers and research work progress in this area. This extraction process required basic domain knowledge, extraction of image data sets this knowledge are highly essential. Extraction of video data are most challenge task to the user because of the complex nature of the video. In video data mining, video data are grouped into frames. The vast amount of video frames, fast retrieval of needed information is important one. In this paper, a Birch-based clustering method for content based image retrieval is proposed.

HIDDEN OBJECT DETECTION FOR CLASSIFICATION OF THREAT

Original Research Article

1K.S. Gautam, 2 Senthil Kumar Thangavel

Abstract

The paper proposes an intelligent K-means segmentation algorithm that clearly segments foreground objects and completely occluded objects. When a person completely occludes an object while entering into the area of video surveillance, it is considered as an anomaly. The paper comes up with a robust technical solution to address this. The proposed algorithm chooses an optimal value for K and segments the object. The scope of the system extends to the area such as prison, airport etc.. where there is a need to monitor completely occluded objects and other objects in the foreground. The system is tested with images from Stereo Thermal Dataset and achieves a precision rate of 88.89% while segmenting objects. From the experimental results, we infer that the proposed algorithm is robust in segmenting the objects without losing its shape and number.

REAL TIME EXPERIMENT TO SETUP THE BALL AND BEAM SYSTEM

Original Research Article

Merin Mary Sabu, A. Brindha and A.Vimala Juliet

Abstract

The proposed paper carries out experiments to explore suitable control techniques to setup a real time Ball and Beam system with the help of a Quanser Servo motor. Methods/Statistical analysis: To develop an efficient controller, modelling of the system is significant which is accomplished using frequency response method with the Quarc toolbox. A fuzzy logic controller is designed to enhance the ball and beam system's response. A classical PD controller is also employed to understand better the functioning of a non-linear controller such as the designed fuzzy controller. These controllers are implemented using QUARC toolbox in simulink MATLAB. Determining the behavior of a controller involving a non-linear system is a tedious task to test and develop. To stabilize the ball on the beam, the control systems are employed in such a way as to measure the position of the ball which is taken as the feedback signal in order to adjust the beam angle accordingly. The performance results between the two controllers are compared. While the designed PD controller showed good performance, it is obvious that in case of few parameter changes of the system it led to the decline of the controller's performance drastically. Thus, revealing the dire need of an intelligent controller such as the fuzzy controller than the PD controller which stabilizes the system efficiently and that the ball is controlled steadily. Improvements: The proposed controller is designed in such a way that it targets in the improvement of timing performance of the controller as well as better stability of the ball on the beam.

IMPROVED IMAGE RETRIEVAL USING IMAGE NOISE REMOVAL TECHNIQUE

Original Research Article

D. Saravanan

Abstract

Technology brings image data more interesting and more usage for various applications. Creation of quality image information are challenging tasks today. Today every information’s are produced in terms of images, quality images only produced good information’s and result, so it is necessary to the user community produced quality images. This paper brings a new filtering technique for corrupted and noisy image files. Most of the existing technique removes the error but quality of the images get spoiled. Proposed technique removes the noise in stepwise process, each step particular nose information get removed. This helps to preserve the quality of input image. Experimental results verified that proposed technique produced quality images.

INFORMATION RETRIEVAL USING TEXT LEVEL CLUSTERING USING PAGE RANKING TECHNIQUE

Original Research Article

D.Saravanan.

Abstract

In the aspects of mining, it is used to extract the data’s in the efficient manner and then fast retrieval of data’s. The current aspect is to clustering the sentence level text by using the proposed algorithm. By means of that, it allows patterns to all clusters .we give a text in a sentence or a sentence that has to be relatively present in documents or a set of documents. Every clustering algorithm finds the association between the data points. Based on the closeness between the data points clustering are take place. Item are very close each other they are all in one group. Items are not similar they are all form in other groups Techniques are finding similarities between the given text. Based on data and the data objects by using the novel fuzzy clustering pattern.

THE TRENDS AND CHALLENGES IN BRAIN COMPUTER INTERFACE TECHNOLOGY – A COMPREHENSIVE STUDY

Original Research Article

1Ganesan P and 2 J. Merlin Mary Jenitha

Abstract

A brain-computer interface technology is a direct communication passageway between a human or animal nervous system (brain) and an external world to control electronic devices such as computer using only brain waves without any movement. Based on communication, brain-computer interface can be classified as either one-way BCIs or two-way BCIs. Electronic devices can either transmit signals to brain or receive signals from brain in one-way brain-computer interface. In two-way braincomputer system, there is an exchange of information between the external devices and brain in both directions i.e., acts as transceivers. The scope and latest developments in brain computer interface had discussed in this work.

A TECHNICAL SURVEY ON IMAGE CONTRAST ENHANCEMENT TECHNIQUES VIA HISTOGRAM EQUALIZATION

Original Research Article

K. Valarmathi1 and S. Anand2

Abstract

Image processing methods process an image so as to make it suitable for applications like medical image analysis, video conferencing, remote sensing, HDTV, industrial x-ray image processing, Underwater image enhancement, microscopic imaging etc. Enhancement improves image quality in such a way that it is suitable for further processing. Contrast enhancement techniques increase the contrast of an image by making lighter colors more lighter and darker colors more-darker. Histogram Equalization is normally used for contrast enhancement. There are many histogram equalization techniques which differ in the input histogram separation style based on mean, median etc. In this paper, we discuss various image contrast enhancement techniques that employ histogram equalization.

A COMPARATIVE STUDY ON POTHOLE DETECTION TECHNIQUES FOR VEHICLE IN AN INTELLIGENT TRANSPORTATION SYSTEM

Original Research Article

Parimala Garnepudi and D. Venkatesulu

Abstract

In modern days, the economical growth and flying technologies has led to serious affect on the quality of traditional transport system. Intelligent transportation system (ITS), desire to boost the transport system, and it becomes more and more popular. Moreover, improving the safeness of traffic is an important task of ITS. The road cracks can be identified in the form of paved path defects, road bumps and potholes. In these types of road defects major damage to vehicles and lost human lives is because of road bumps and pothole. Thus, in detection of these road defects potholes and road bumps takes the major role. This paper gives the study of various pothole detection techniques. Potholes cause tire blast and damage the wheel. The impact of pothole is more on lower vehicles, such as collision of vehicles and causes serious accidents. Thus, accurate and quick detection of potholes has become one of the important task for ITS and road management system (RMS). More research has been made for determining a technology for automatic detection and recognition of potholes. This paper gives the study of existing path hole detection mechanisms and results. The pothole on the road causes serious harm to drivers’ safety. Therefore, drivers’ safety may be improved with the improvement of real-time pothole detection system for sharing the pothole information Section 1 gives the introduction, Section 2 gives related work, results in Section 3, Conclusion in Section 4 and Section 5 gives references.

AUGMENTEDPERSPECTIVE MINING METHODOLOGY FOR CONTROLLED SOCIAL MEDIA

Original Research Article

K. Shantha Kumari, R. Kameswaran, S. Pravin Poul, P. Poovanna Pemmaiah

Abstract

Social media is a rich source of information which are open to anyone and can be utilized for a wide variety of application. But every information shared on this platform reflects the user’s perspective. However, the truthfulness of that information on anything (event, accident, personality, product, etc.) must be verified to avoid any unwanted consequences such as rumor propaganda, character assassination, product quality evaluation etc. On specific to Twitter, users masquerading as popular personalities, post certain false information. There is a need to control such behaviour across various social media. Existing research works followed Sentiment Analysis, Opinion Mining, Intelligent technologies etc. to mine the truth from every bit of BIG DATA available at social media. This process has the probability that even false data posted by masqueraded users could be classified as truth. This requires verification from the originator [Source of information about event/personality/product etc.] of the post in an automated manner. In our work, we are proposing an augmented perspective mining algorithm that takes live streamed data from twitter and verifies its trustworthiness in an automated voting process based on Straw-poll technique. This technique uses the information from Twitter’s officially verified users as training set to compare and filter the information from masqueraded users and thus improvising the performance of mining.

AGGRANDIZEDTECHNIQUEFOR RECOGNISING OFOFFENSIVELANGUAGEIN ONLINE NETWORK

Original Research Article

K. Shantha Kumari, R. Prem Kumar, Mohammed Thowfeeq,

Abstract

Extensive usage of Social media in this modern era provides entirely a new form of social interaction and communication especially among the adolescent and youth population. They tend to converge at social media for sharing their opinions and thoughts on common issues. However, the young people are also vulnerable to cyber-bullying by means of the offensive language which is spilled across the online web. To avoid severe results (mental trauma, stress etc.), it is important to act proactively to detect online bullying activity. This paper discusses an optimized technique to recognize the offensive language in Online Social media, specifically for Twitter. Previous works mostly concentrated on Keyword matching along with intelligent technologies to recognize the whether the published content is cyberbullied or not. In addition, most of the algorithms were tried only on stored dataset. Cyberbullying can be thwarted if the probability of a tweet user to be an abuser could be predicted earlier with a live capturing of data’s from Twitter. This research work proposes an optimized technique for detecting the offensive language in Tweets by Naive Bayesian Text Classification. In addition, FGA logic is used to detect the possibility of abusive Tweet users. This approach is evaluated with data’s from Twitter and the performance of this optimized technique is discussed.

Analysis of the effect of NBTI on data flip time dependency on an MTCMOS SRAM

Original Research Article

Patibandla Anitha1 , B.L. Raju2

Abstract

The predominant restraining factor of the circuits lifespan are Temperature Instability effects like NBTI and PBTI. A regular configuration to evaluate the influence of NBTI on a circuit’s operation is developed relating significant circuit constraints such as the node switching action, variation in supply voltage, temperature etc. The influence of NBTI on Read strength of SRAM cell is analyzed. Due to the NBTI stress, the working of the SRAM is totally affected. The consignment of deterioration in Static Noise Margin (SNM), is computed by the read steadiness of SRAM cells is appraised. We suggest a novel method to retrieve the SNM of SRAM cells employing a data flip process and portray the results obtained. The performance issues of the data flip time are analyzed by HSPICE simulation with varied supply voltages. The circuit design with NBTI stress is calculated depends upon the simulation setup of HSPICE tool. The supply voltage is varied by 0 V, 0.2 V, 0.4 V, 0.6 V, 0.8 V and 1 V with a length of 45nm and width of 90nm (Taken from PTM technology).

FEATURE DIMINUTION BY HYBRID ALGORITHM FOR IMPROVING THE SUCCESS RATE FOR IVF TREATMENT

Original Research Article

Durairaj M., Nandhakumar Ramasamy

Abstract

Infertility is the most common problem faced by today’s generation. The factors like environment, genetic or personal characteristics are responsible for these problems. Different infertility treatments like IVF, IUI etc are used to treat those infertile people. But the cost and emotions beyond each and every cycle of IVF treatment is very high and also the success rate differs from person to person. So, there is a need to find a system which would predict the outcome of IVF to motivate the people both in psychologically and financially. Many Data Mining techniques are applied to predict the outcome of the IVF treatment. Reducing the unwanted features which affects the quality of result is one of the significant tasks in Data Mining. This paper proposes a hybrid algorithm which combines the core features of Ant Colony Optimization Algorithm and Relative Reduct Theory for Feature Reduction. In this work, the proposed Algorithm is compared with the existing related algorithms. It is evident from the results that the proposed algorithm achieved its target of reducing the features to minimum numbers without compromising the core knowledge of the system to estimate the success rate.

A CLOUD BASED SECURED FRAMEWORK FOR SMART MEDICAL DIAGONSIS: A SURVEY

Original Research Article

Leelavathy. S 1 ., S. Selva Brunda2

Abstract

Enormous amounts of medical data are being collected by several well-developed HIS (Hospital Information Systems) in the form of patient records in hospitals. The hidden patterns and relationships contained in this data are identified using various data mining techniques which has drawn increasing world-wide attention in the recent years. As a result of which, a good number of MDSS (Medical Decision Support Systems) have been developed. These are computer systems designed to assist physicians or other healthcare professionals in making clinical decisions for the given patient’s symptoms and medical history. Inspired by the existing systems, the model proposed in this paper aims at making a knowledge sharing collaborative platform for doctors which serves as a realistic and effective Medical Decision Support System. It is important because it provides vital information from different data sources. It has several challenges like scalability, response time, heterogeneous data formats. This paper does a detailed study of different challenges in understanding about medical information that can be provided to users in a better manner. A framework named Intelligent Healthcare Framework (ISHF) is being proposed in this paper.

SURVEY ON NONOBSTRUCTIVE AND CONTINUOUS USER AUTHENTICATION ON MOBILE DEVICES

Original Research Article

N. Lalithamani, Raam Balaji D., Satya Dev

Abstract

The use of mobile devices in our day to day life has increased drastically in the last ten years. Much of it can be contributed to the breakthrough in the field of communication. Since they contain most of our personal information, the constant worry of security and privacy has increased. In order to tackle this problem, non-obstructive and continuous user authentication has been proposed. This paper deals with the methods that have been proposed till now and the challenges that are yet to be overcome in this field.

A SURVEY OF EXTANT SURVEILLANCE SYSTEMS USINGBIOMETRIC TRACKING

Original Research Article

Vasanth Subramanian, Sunil Dev Choudhary B., Lalithamani N.

Abstract

Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments. Although current systems are remarkable, they are far from impeccable and are limited by several conditions. In short, there is still vast scope for major improvements in our extant systems. In this survey, we strive to provide a comprehensive review of the present literature and to propose a better model that would aim to solve the present limitations.

QUALITY BASED PROXY SIGNATURE IN CLOUD COMPUTING WITH UNFORGETABLE REENCRYPTION KEY

Original Research Article

A. Nazreen banu, Ignatious K. pious, J. Nandhini and D. Hemalatha

Abstract

Cloud storage is an essential research subject in data innovation. In Cloud storage, date security properties, for example, information privacy, honesty and accessibility turn out to be increasingly critical in numerous business applications. In broad daylight cloud computing, the customers store their immense information in the remote open cloud servers. Since the put away information is outside of the control of the customers, it involves the security chances as far as secrecy, trustworthiness and accessibility of information and administration. To overcome the security chance we present another strategy known as KGC (key era focus) by utilizing distinguishing proof. Since character based cryptography turns out to be more effective in light of the fact that it maintains a strategic distance from of the authentication administration, an ever-increasing number of specialists are well-suited to study personality based intermediary cryptography.

COPERATIVE LOAD BALANCE IN CHANNEL ALLOCATON IN INSTRUCTION AND DECETION PROCESS IN MANENT

Original Research Article

S. Vinod1 , J. Nandhini1 , R.G. Gowrimanju1 and J. Siva2

Abstract

The MOBILE ADHOC NETWORK(MANETS) is used to communicate data in bottlenecks where Intrusion Detection Systems (IDSs) can be sent da in manent process. This, thus, expands the significance of data transmission effectiveness while keeping up tight prerequisites on vitality utilization, deferral and jitter .cooperative channel access system is used to allocate channel in load distribution system .The existing system is channel allocation is non uniform distribution .Un coordinate protocol is center to reach all channel do not allocate channel in proper manner .The Network allocation in channel can send data in static manner in allocation .The proposed system is used to allocate channel in dynamic channel process and data send and receive to avoid noise in system to provide dynamic channel allocation and cooperative load balancing we use the MH-TRACE (Multi-Hop Tim e Reservation Using Adaptive Control for Energy Efficiency) protocol.MH-TRACE protocol contains four types of slots data ,node ,channel ,coordinate in channel process. Address these issues in two conceivable application settings, in particular, Cluster-Dependent Leader Election (CDLE).

ARCHITECTURE OF MOBILE CLOUD COMPUTING

Original Research Article

C. Arun and K. Prabu

Abstract

Nowadays the requirement of anytime anything from anywhere, the accessibility of data is increased, with the help of the “cloud computing”. Cloud computing allowed to the mobile users to access the remote resources through internet on pay-asusability basis. The importance of cloud computing is that “the user only paying for what they really use and only utilize what they required”. Cloud computing is used to serve services to a local-client via the internet on on-demand basis. The mobile devices have only less amount of storage volume and less processing power so requirement of cloud computing in mobile devices is increased. The Mobile Cloud Computing (MCC) is the mixture of cloud computing and mobile computing. The movable devices need not to have high configuration because all computations process are performed inside of the cloud. In this paper we are talk about the Architecture of Mobile Cloud Computing (MCC), which includes introduction to MCC, architecture of MCC, advantages of MCC and applications of MCC. And it also covers what are the problems in MCC.

ROUND ROBIN ARBITRATION DESIGN FOR DIFFERENT APPLICATIONS

Original Research Article

PRIYA AMULRAJ, VENI N

Abstract

This paper presents a Time efficient and an area efficient, two different ways of designing Round Robin Arbitration for different applications. An arbiter is a logical element which is helpful in selecting the order of access to a shared multi-master bus system. For each bus cycle, which multi-master bus system could be granted to control the bus is obtained using this logic. It uses priority logic and masking logic to decide which requester of many to be granted in a highly fair manner. This works in circular manner and thus starvation is avoided to maximum extent. The first method is suitable for applications where until the previously granted request has been de-asserted or reached its limit, it stays granted. Conversely, whenever the previously grant requests stays de-asserted, on priority basis requests are granted using masking concept. In real time it is used for applications like mobile phones where applications are chosen based on priority such that fairness is highly maintained. The second way of designing is suitable for applications where depending on the priority logic, one request by another is granted when multimaster bus system gives requests and only then moves on to deal with another input. Upon fetching another input it only grants request based on the previously masked output. In real time, it is used in computers where applications are chosen automatically. The Verilog code for both the ways are simulated using Quartus II software and are dumped in FPGA Cyclone IV for validation.

PRESERVATION OF SPEAKER IDENTITY IN HMM BASED SPEECH SYNTHESIZERS Speech Signal Processing

Original Research Article

M. Niranjana Priyadarshini, S. Sathya Devi, M. Divya, D. Gayathri

Abstract

The purpose of speech synthesizer is to convert the input text to speech. Most common synthesizers are USS and HTS synthesizer. The speech synthesized by the HMM based system is found to be more intelligible than that synthesized by the USS system due to the elimination of sonic glitches and also the memory requirement of HMM based system is less around 5MB as against 500MB for an USS system. Hence HMM based synthesizer is efficient and economical. But in HMM synthesizer, buzziness is detected which prevents the preservation of speaker’s identity and decreases the intelligibility and pleasantness. The speaker’s identity preservation depends on two parameters namely speech rate and number of states used for modelling. When the input speech rate is slow, the generated speech seems to be noisy as the number of formants per window is not sufficient. Hence, the importance of choosing an appropriate speech rate in text to speech synthesis systems is analyzed. Two 3-hour speech corpora – one with a slow speech rate of 8 phonemes/sec and the other with a fast speech rate of 11 phonemes/sec are developed for the South Indian language, Tamil. The effect of speech rate on the synthetic speech produced by four systems, namely, phoneme-based and consonant-vowel (CV) unit - based, unit selection synthesis (USS) and hidden Markov model (HMM) – based synthesis systems, are analyzed. Based on a subjective evaluation using the mean opinion score (MOS), it is observed that three systems perform better when trained with the fast speech corpus, with MOS ranging between 2.78 and 3.18, except in the case of CV based USS. Further, it is observed that the phoneme-based systems perform better than the CV-based systems, with three hours of data.

PUPIL LOCALIZATION AND SEGMENTATION USING MORPHOLOGICAL MARKERCONTROLLED WATERSHED TRANSFORM AND MULTIPLE THRESHOLDING TECHNIQUE

Original Research Article

Madhumitha S. and M. Manikandan

Abstract

In this paper, the marker-controlled watershed transform along with morphological operation is proposed to detect the pupil region. Firstly, the contrast enhancement is one to remove the noise caused due to illumination and then morphological reconstruction operations are applied. Standard Open-Close and Standard Close-Open operations are proposed initially, later switched to Close-Open by reconstruction and Open-Close by reconstruction. The experiment is done for 150 images chosen from the CASIA v4 database. Experiment results shows that the Open-Close by reconstruction performed along with watershed transform could detect the complete pupil contour. It also addressed the over-segmentation issue. To segment the pupil region for further analysis Thresholding method is chosen. For various threshold range, the quantitative analysis is performed by evaluating certain features associated with the pupil. The results shows that the Multiple thresholding over the range of 21 pixels yielded better results in terms of accuracy.

AN IOT FRAMEWORK FOR EFFICIENT COOLING SYSTEM IN GREEN BUILDING

Original Research Article

P. Golda Jeyasheeli and J.V. Johnson Selva

Abstract

Today Green Building is an important research area in IOT. The energy efficiency in green buildings is vital for global sustainability. However, many factors affect energy consumption by the green building and most of the green buildings are not really green due to static power policy and complete grid based power supply on devices. Here we propose a design based on environmental factors for green buildings cooling system to dissipate heat dynamically for every small seasoning changes to attain effective power efficiency.

VANET: METROPOLITAN SCENARIO TRAFFIC HANDLING AND CONGESTION AVOIDANCE

Original Research Article

B.V.N.S. Lasya Priya, Parimala Garnepudi, D. Venkatesulu

Abstract

VANET is an exclusive category of wireless ad-hoc networks, which emerged as an exciting research and application area. In the recent decades, VANET gained a tremendous response in the field of research for building communications consistently between vehicles for simple navigation and better control over traffic by equipping the vehicles with embedded sensors, with processing and wireless communication capabilities. An increasing number of vehicles on the roads increase the traffic in the city which leads to jams (congestion), pollution and various other problems making traffic management a Herculean task. In this paper, we present the theory called “Even-Odd” program in VANET for the control of traffic, better communication between vehicles and their smooth transportation. Introduction of the VANET is presented in Section1, related work in section2, and proposed a system in section 3, and finally results in Section 4

IMAGE RECOGNITION USING RESTORATION TECHNIQUE

Original Research Article

D. Saravanan

Abstract

The proposed system works based on image recognition system using thermal image concept. Thermal images are improving the image quality in the dark surrounding it find the image infrared redaction and create image information based on the radiation. These images are created with help of infrared cameras, this information is recorded with various temperature. During the process image surroundings are recorded helps to improve the matching process. Image registration process done with help of image registration tool. Input images are segmented and create image signature. Finally, image model was generated it help for matching process. For any matching process image model is required for that this model created and stored. The proposed with done with help of image restoration algorithm, experiments verify that proposed work brings efficient result.

ADVANCEDSYMMETRICKEYCRYPTOGRAPHYALGORITHM FORINFORMATION SECURITY

Original Research Article

Sameera Shaik1 , Sharma S2 , Vishnu S 3 , Srilakshmi U 4

Abstract

Information is one such thing, which has become crucial weapon in the race towards the pinnacle of development and evolution. To protect this information from unauthorized access and/or damage or misuse, the concept of information security has been emerged. When the information is transferred from sender to receiver over a network, a hacker can break and expose the actual message that is confidential. To achieve all these things, several cryptographic techniques are generated. A cryptographic technique converts the confidential information into a form, which can’t be understood by a hacker or unintended individuals, which is known as encryption technique and it makes use of a particular algorithm to encrypt the message. The encrypted message is decrypted in the receiver side by using respective decryption algorithm. In this paper, a new algorithm has been proposed and compared with existing ones in terms of encryption algorithm, throughput of key generation and decryption algorithm

A SURVEY ON CACHE ROUTE SCHEMES TO IMPROVE QOS IN AD-HOC NETWORKS

Original Research Article

A.Vijay Vasanth1 , K.Venkatachalapathy2 , T.P.Latchoumi3 , Latha Parthiban4 , T.P.Ezhilarasi5

Abstract

MANET (Mobile Ad-hoc Network) is a wireless Ad-hoc network which serves all necessities in a real-time world since it possesses dynamic infrastructure qualities. Although MANET works as a best for all fields it also experiences drawbacks based on routing and overall data access process. To trounce with this problem, cache optimization mechanisms along with dynamic routing procedures have been practiced wide to make an improvement in quality factors. Among the cache optimization mechanisms, cache route optimization schemes serve the best in showing signs of development in overall QoS factors. This paper summarizes the possible cache route optimization mechanisms to advance the QoS metrics are Routing Overhead that reducing overhead in route discovery, Packet Delivery Ratio, Packet Drop, minimizes the difference between number of packets send and received over the total time require to touch the destination and reduce the energy consumption by each node

DESIGN OF 4-BIT MULTIPLEXER USING SUB-THRESHOLD ADIABATIC LOGIC (STAL)

Original Research Article

Yuvaraj P.1, Rajendran T.1, Kamalraj Subramaniam2

Abstract

Objective: This paper presents the low power consumption for Very Large Scale Integration (VLSI) design. The dynamic power consumption of CMOS circuits is continuously becoming a major concern in VLSI technique. Tool: All the simulations in this work are done using Tanner EDA Tools V14.11. Contribution & Results: In this paper the 4-Bit STAL multiplexer design have been analyzed and low power multiplexer is designed using the positive feedback logic. The STAL multiplexer is a Positive Feedback-STAL consumes less power than the CMOS multiplexer is identified from this study. Applications: In mere future the system can be enhanced to perform higher order bits.

DESIGN OF CMOS 8-BIT PARALLEL ADDER ENERGY EFFICIENT STRUCTURE USING SRCPL LOGIC STYLE

Original Research Article

Felix Muthu, Aravinth.T.S, Rajendran.T

Abstract

Objectives: We present high speed and low power 8-Bit parallel adder cells designed with modified SR-CPL logic styles that had a reduced power delay product (PDP) as compared to the previous logics DPL and pass transistor logic. Tool Used: All the parallel adders were designed with a 0.18µm CMOS technology virtuoso cadence environment. Results: Simulations of the circuit show that the proposed parallel adders have reduced the power from 0.33mW to 0.24mW. Applications: In mere future the system can be implemented in high speed processors for achieving low power

A SMART TRAFFIC SIGNAL TRAPPING SYSTEM

Original Research Article

Sandhiya M1, Mathivijay M2

Abstract

A Smart traffic control system is presented to pass emergency vehicles smoothly. Each individual vehicle is connected with a special radio frequency identification (RFID) tag (placed in a strategic location), which makes nobody can remove or destroy the unit placed. Here RFID reader, NSK EDK-125–TTL, and PIC16F877A system-on-chip to read the RFID tags which is attached to the movable unit. The RFID is used to count the number of vehicles that passes on a particular path during a specified duration. It determines the network congestion and hence the green light duration for that path is enabled or disabled. If the RFID-tag-read belongs to the stolen vehicle, then intimation is sent using GSM SIM300 to the police control room. In addition to that an ambulance arriving towards to the junction, it will communicate with the traffic controller in the junction to turn ON the blue light. This module uses ZigBee modules on CC2500 and PIC16F877A system-on-chip for wireless communications between the ambulance and traffic controller.

FFICIENT POWER MANAGEMENT USING WSN

Original Research Article

1Jerome Christhudass . A., 2T. Karthik,

Abstract

The WSNs are increasingly being used in the home for energy controlling services. Regular household appliances are monitored and controlled by WSNs installed in the home. Modern technologies include cutting-edge advancements in Information technology, sensors, metering, transmission, distribution, and electricity storage technology, as well as providing new information and flexibility to both consumers and providers of electricity. The prototype has been extensively developed and tested in real time scenarios also the results are appreciable.

APPLICATION OF CLASSICAL STEP RESPONSE METHOD TO DETERMINE THE PID CONTROLLER PARAMETERS FOR A 500 MW STEAM GENERATOR IN A THERMAL POWER PLANT

Original Research Article

P. Subha Hency Jims1, J. Jayakumar2 and S. Dharmalingam3

Abstract

PID controller is the most widely used controller in industries. There are many important functions for PID controller. Feedback is provided; offsets are eliminated by integrator; future anticipated through derivative action. PID control loops are employed in more than 95% of the control loops. Generally, the PID controller parameters are calculated based on trial and error method. In different disciplines of engineering, attempts have been made to propose many new methods for controlling process parameters. Whenever PID control is chosen, iterative heuristic optimization algorithms (soft computing techniques) have been proposed to optimally determine the PID parameters. In this work, the authors have successfully applied the classical tuning methods such as Ziegler Nichols and CHR tuning methods to calculate the PID parameters. The step response method is employed to calculate the ‘a’ and ‘L’ which is used to determine the PID parameters. This is applied to calculate the PID controller parameters for a 500 MW steam generator in a thermal power plant.

DEVELOPMENT OF FEED FORWARD BACK PROPAGATION NEURAL NETWORK WITH BEST FITTING MODELS TO PREDICT SEASONAL RICE PRODUCTION IN TAMILNADU

Original Research Article

S. Arun Balaji and P. Manimegalai

Abstract

The study reported the development of FFBPNN architecture and its corresponding software to predict the rice production data for three seasons in 31 districts of Tamilnadu. It was found that the training and testing data were exactly matching with the predicted data. It was also found that the Absolute Relative Error (ARE) was found to be zero at the 9th iteration itself. The FFBPNN system was improved by integrating it with the best fitting models using the curve expert software. The improved FFBPNN with best fitting model was used to predict the area of rice and its production. The predicted data was compared with the observed data. The paired t-test was conducted between the observed and predicted data. It was found that there is 67% of fittings are showing insignificant difference between the observed area of rice and predicted area of rice cultivation. Similar test was also conducted for the rice production data; it was found that there is 73.3% of fittings showing insignificant difference between the observed and predicted data.

NETWORK SECURITY IN CLOUD COMPUTING

Original Research Article

V. Shrividhya, P. Manimegalai

Abstract

Cloud Computing Security architecture using Rijndael as the standard symmetric key encryption algorithm. Data security has become the vital issue of cloud computing security. From the consumers’ perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. So in this we focused on client side security In our proposed system, only the authorized user can access the data. Even if some intruder (Unauthorized user) gets access of the data accidentally or intentionally, he will not be able to decrypt it. Also it is proposed that encryption must be done by the user to provide better security. Henceforth, security is provided using Rijndael.

DISTRIBUTED MODEL PREDICTIVE CONTROL OF A WIND FARM WITH CLUSTERING

Original Research Article

*Mallika. S., M. Dharani Kumar, P. Manimegalai

Abstract

This work gives a concise overview of the role that distributed model predictive control has el the development of the advanced wind turbine control algorithms. The benefits of the model predictive control compared to conventional controllers convoluted in wind turbine control are defined. Wind turbine model predictive active power controller based on identified piecewise affine discrete-time state space wind turbine model is designed. The designed D-MPC controller showed better performance. A wind farm with ten wind turbines was used as the test system. Research were attend and evaluated, which include the operation of the wind farm with the D-MPC under low and high wind conditions, and the dynamic achieved with a wind turbine out of service. With the fast gradient method, the convergence rate of the D-MPC has been significantly improved, which decrease the iteration numbers. Appropriately, the communication burden is reduced.

ANALYSIS OF AREA DELAY OPTIMIZATION OF IMPROVED SPARSE CHANNEL ADDER

Original Research Article

Prajoona Valsalan1,2 and P. Manimegalai2

Abstract

With the revolution in integrated circuits, great emphasis was given on performance and miniaturization. Speed, area and power became the main criterion upon which a VLSI system is measured in terms of its efficiency. In any VLSI system, a full adder is widely component, which decides the performance of the system. The design and analysis of a modified Carry Select Adder (CSLA) is proposed in a cadence 45nm CMOS. It reduces the gate count, thereby area is reduced. Based on modification in CSLA, the process is performed in an efficient way in terms of its gate count and thereby on power and speed.

DESIGN OF LOW INTRICATE 10-BIT CURRENT STEERING DIGITAL TO ANALOG CONVERTER CIRCUITRY USING FULL SWING GDI

Original Research Article

Keerthivasan S., Mahendra Babu G.R., Rajendran T.

Abstract

Aim / Objective: A low-vigor, low-voltage, small- area DAC for prime pace applications is introduced on this paper, for top velocity purposes, the present steering DAC is also used because the entire currents taken from the supply is utilized for the output signal. Scope: This paper it deals with the design and evaluation of a 10-bit FS-GDI DAC which was once applied making use of full Swing (FS) GDI logic in CMOS system. Results: The lively subject of this proposed DAC was decreased to four times in a normal 0.18 µm with a varying voltage variety from 2.5 – 3.3V CMOS approach, each the INL and DNL have been decreased for the proposed scheme of 10-bit FS-GDI DAC, although it’s a procedure of excessive order utilizing FS-GDI DAC. Applications: Utilized for high speed processing circuitries.

EFFICIENT IMPLEMENTATION OF DECODER USING MODIFIED SOFT DECODING ALGORITHM IN GOLAY (24,12) CODE

Original Research Article

Vijayakumar.P1* Rajendran.T1# Mahendra Babu.G.R2

Abstract

Aim / Objective: The (24, 12) binary Golay code was a well-established rate-1/2 short block-length linear error detecting and correcting code with High performance. Algorithm / Simulation: This paper investigates the design of an efficient low-complexity soft-decision decoding architecture for this Golay code. A new algorithm is introduced that takes a huge advantage of the code’s properties to reduce and simplify the decoding process. Findings & Results: The Simulation result shows that the proposed algorithm of Modified soft decision decoding achieves high performance rates with low processing cost. Here the decoder architecture is mentioned, and VLSI synthesis results are presented. Applications: can be used in high speed cryptography systems

INVESTIGATION ON WSN ROUTING PROTOCOL IN IEEE802.15.4 BASED WSN UNDER WORMHOLE ATTACK

Original Research Article

T. Karthikeya, P. Manimegalai

Abstract

Wireless sensor networks (WSNs) is one of the most challenging technologies with many application ranging from health care to military applications. In many important military and commercial applications, it is critical to protect a sensor network from malicious attacks. One of these attacks which is hard to detect and mitigate is wormhole attack which presents a demand for strengthen the security mechanisms in the network. In this paper, the performance of zigbee based wireless sensor networks using routing protocols with wormhole attacks has been investigated. This Paper illustrates how wormhole attacks can affects the performance of Ad hoc On-Demand Distance Vector (AODV) routing protocol, Optimized Link State Routing (OLSR) and Zone Routing Protocol (ZRP) in zigbee based WSN by using Qualnet Simulator 5.0. The metrics used to analyse the performance of routing protocol of WSNs are throughput, Average end-to-end delay and total energy consumption of sensor network.

ANALYSIS OF HYBRID FULL ADDER TOPOLOGIES BASED ON IMPROVED DRPTL

Original Research Article

Shibi O. and P. Manimegalai

Abstract

Recently adder circuit is becoming a major part in many applications and the arithmetic circuit is included in it as a fundamental operation. Basically the adder circuit is designed to achieve low power and less delay and by logic gate of the circuit improves the performances. In this paper, for significant process of power saving and efficient performances Hybrid Full Adder Topologies is proposed dynamically based on dual rails pass transistor logic (DRPTL) with the clock signal. For speed process high logic circuit is implemented and also to have less propagation. In hybrid CMOS design style various adder cells and transistor is used, but in proposed circuit DRPTL is implemented with the load condition and the clock signal to manage the power flow in the circuit. Also enhance the device performances and reduce the chip level power consumption. The proposed circuit is simulated for the analysis of performances by the implementation in Cadence Virtuoso Schematics on 45nm CMOS process models and illustrated the results performances delay, power, and transistor count reduction.

AN INTELLIGENT SYSTEM TO DETECT POTHOLES, HUMPS AND AVOIDS COLLISION OF VEHICLES ON ROADS

Original Research Article

S. Saranya, M. Arun

Abstract

One of the major issues faced by developing countries is the maintenance of roads. Well maintained roads contribute a major portion to the country development. Identification of potholes and humps on roads not only helps the drivers to avoid accidents or vehicle damages, but also helps the respective authorities to look after the quality of roads. This paper deliberate foregoing pothole detection techniques that are being used and proposes an economic solution to identify the potholes and humps and its corresponding height and depth measures. The proposed system uses Global Positioning System (GPS) which captures the geographical coordinates of the potholes and hump. The sensed data includes pothole depth, height of the hump and geographic location, which is sent through Global System for Mobile Communication (GSM) transmitter. The values are received by GSM receiver and it is stored in a computer which acts as a database. This serves as a valuable source of information to the vehicle drivers and government authorities so that precautionary measures can be taken to evade accidents. Signal warning of danger is given in the form of flash messages with an audio beep to the vehicle drivers to avoid the accidents or vehicular damages.

AUTOMATIC DETECTION OF RETINAL HEMORRHAGE BASED ON GABOR WAVELET AND HYBRID KNNSVM ALGORITHM FOR FUNDUS IMAGES

Original Research Article

Karunya Karo ShanthiY.1 and Jerome Christhu Dass A.2

Abstract

Retinal haemorrhage is the abnormal bleeding of the blood vessels in the retina, the membrane in the back of the eye. In retinal image, automated detection of haemorrhage is a major challenging factor. For automated detection of haemorrhage, a generalized framework is needed to train classifiers with optimal features learned from available dataset. Because of the variability in appearance of these lesions (i.e., haemorrhages), different techniques had been designed to detect each type of these lesions (i.e., haemorrhages) separately in detection system. We need a generalized framework to detect these types of lesions in fundus (i.e., retinal) image. A robust and computationally efficient approach for haemorrhage detection in a fundus retinal image is presented in this paper. Splat feature classification method is proposed with application to retinal haemorrhage detection in fundus images. Automated screening system is very much important to detect a retinal haemorrhages. Based on the supervised approach, fundus images are partitioned into non-overlapping segments covering the entire image. Each splat contains a similar colour and spatial location. A set of features is extracted from each splat using the GLCM & Gabor Wavelet. These features describe a characteristic relative to each pixel in a splat. Supervised classification predicts the likelihood of splats being haemorrhages with the optimal features subset selected in a two-step feature selection process. Preliminary feature selection is done by filter approach followed by a wrapper approach. Hybrid KNNSVM classifier is trained with expert annotation. From the resulting haemorrhages map, a haemorrhage index is assigned. A classifier could evaluate on the publically available dataset. This work will provide a greater AUC in splat level and image level. Our approaches can potential to be applied to other detection tasks.

A SURVEY OF NETWORK PARTITION-BASED ON QOS IMPROVEMENT IN MANETS

Original Research Article

K. Somu and S. Bhavani

Abstract

The present study aims to examine the use of QoS improvements in mobile ad hoc networks. Mobile ad hoc networks do not require any previous infrastructure and rely on dynamic multi-hop topologies for traffic forwarding. The deficiency of a centralized management makes these networks smart for several distributed requests, such as sensing, internet access to destitute groups, and disaster recovering. A crucial and frequently unaddressed topic of ad hoc networks is the frequent networks partitions. As additional wireless networks, ad hoc nodes also need a unique network to enable multi-hop routing and filled connectivity. Address project in ad hoc networks, however, is even more stimulating due to the self-organized nature of these environments. The centralized mechanism, such as the Dynamic Host Configuration Protocol (DHCP) or the Networks Address Translation (NAT), Conflict through the disseminated nature of ad hoc networks and do not address network partitioning and merging. A crucial then usually unaddressed question of ad hoc networks is the frequent networks dividers. Network partitions, caused by node mobility, fading channels, and nodes joining and leaving the network, can disrupt the distributed network control. Network initialization is another challenging issue because of the lack of servers in the network. A lightweight protocol is proposed that constructs mobile ad hoc nodes founded on a dispersed address record stored in filters that decreases the regulator load and makes the proposal robust to packet losses and networks partitions. It can be evaluated that the performance of our protocol, considering joining nodes, partition merging events, and initialization.

DESIGN AND TESTABILITY OF Z-TERNARY CONTENT ADDRESSABLE MEMORY LOGIC

Original Research Article

Keerthiga Devi S.1, Bhavani, S.2

Abstract

The emerging technology using Field Programmable Gate Arrays (FPGA’s) is the leading architectures with look-up tables (LUT’s) based design plays the major role in the chip design. The memory unit and controller are the basic units and it performs the operation based on the lookup table methods. The logic circuit is designed based on requirements. The Ternary content addressable memories (TCAMs) are hardware-based parallel lookup table design with masking capability in bit level. So it is attractive for applications such as network routing and packet forwarding. The high power consumption is one of the major limitations faced by TCAM designers. This proposed design is based on the circuit techniques aiming to reduce Ternary Content Addressable Memory power consume. The Traditional TCAM table and its hybrid partitions are implemented based on the testing and verification of memory unit. The method is implemented using the normal architecture analysis. The ternary logics are implemented in shift registers, Input output

ESTIMATION OF MAXIMUM POWER EFFICIENCY USING REACTIVE ROUTING IN WIRELESS AD HOC NETWORKS

Original Research Article

V. Brindha 1 and P. Manimegalai2

Abstract

Background/Objectives: In recent years, several energy-efficient routing protocols are projected. However, little efforts are taken in finding out the energy consumption of individual node, overhead and route maintaining problems. Whereas not considering the look of energy economical routing protocol, it is going to perform terribly worst than the conventional routing protocol. Methodology: Here, we have projected On Demand primarily based Energy economical Routing Protocol (ODBEERP). The most aim of projected protocol is to find the minimum powerlimitation route. The facility limitation of a route is set by the node that has the minimum energy therein route. Therefore, compared with the minimum node energy in the other route, the minimum node energy within the minimum power-limitation route has a lot of energy. we have conjointly projected a a lot of correct analysis to trace the energy consumptions as a result of varied factors, and improve the performance throughout path discovery and in quality situations. Result: The projected protocol is evaluated with object bound distinct event machine setting. Simulation results shows that the ODBEERP achieves smart outturn, less delay, high packet delivery magnitude relation and smart energy potency than the present protocol Peer.

A HIGH-PERFORMANCE FIR FILTER ARCHITECTURE FOR FIXED AND RECONFIGURABLE APPLICATIONS

Original Research Article

E. Mary Priyadarshini, P. Manimegalai, S. Chellaganeshavalli

Abstract

The efficient distributed arithmetic (DA)-based approaches for high-throughput reconfigurable implementation of finite impulse response (FIR) filters whose filter coefficients change during runtime. Conventionally, for reconfigurable DA-based implementation of FIR filter, the lookup tables (LUTs) are required to be implemented in RAM; and the RAM-based LUT is found to be costly for ASIC implementation. Therefore, a shared-LUT design is proposed to realize the DA computation. Instead of using separate registers to store the possible results of partial inner products for DA processing of different bit positions, registers are shared by the DA units for bit slices of different weightage.The Proposed presents high speed digital Finite Impulse Response (FIR) filter relying on Booth multiplier and Carry Select Adder (CSLA) Using Parallel Pipelining Architecture. Adder has three architectures such as basic CSLA using RCA (Ripple Carry Adder), CSLA using BEC (Binary to Excess-1 Converter) and CSLA using D-latch. In this paper we propose 4-tap FIR Filter architecture using 16-bit CSLA using D-latch and 8-bit Booth tree multiplier. These multipliers and adders are used for high speed operation of digital FIR filter.

A REVIEW ON OBJECT IDENTIFICATION

Original Research Article

Giby Jose*, P. Manimegalai

Abstract

Object identification is an active research area with numerous commercial applications. Image of object is represented as single or multiple arrays of pixel values. Features that uniquely characterize the object are determined. The arrays are compared with a stored pattern feature set obtained during training procedure. Number of matches of the object in the image must be obtained. As the image consists of a large amount of data, it has to be compressed using a compression technique so that data reduction is achieved. This reduced data is used for comparison process. This image identification technique can be used to recognize objects in specific areas. In this specific work compressive sensing using Sparse Representation can be used for object identification. The planned object identification system consists of three main stages, Sparse dictionary design, Feature Extraction using down sampling and Object detection utilizing sparse representation. Initially a sparse dictionary will likely be designed along with trained with large variety of different training images. It images incorporate assorted items including target image. Intended for feature extraction, if sparsity inside the recognition issue is correctly harnessed, the choice of features is not a critical issue. However, the leading problem can be whether the volume of features can be sufficiently substantial and whether the sparse representation is the right way computed. Here down sampling process inside the images will likely be done. In assessment process, the sparse dictionary typically determines the object among the other items. Extensive experiments will likely be conducted to help verify the efficacy in the proposed criteria, and corroborate the above-mentioned claims.

SECURE AND EFFICIENT WATCHDOG OPTIMIZATION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS

Original Research Article

Kalaiselvi M., V. Parthasarathy,

Abstract

Watchdogs are an effective mechanism to detect selfish and malicious attacks from computer networks. In networks, such as MANETs, attack analysis and detection is a more importantfor the whole network. Watchdog systems detect the misbehavior and that neighbor node by using data collection and analysis, so accuracy, less delay and effectiveness are achieving much more security and performance in wireless sensor networks.In previous process watchdog has inefficient trust system for security in the network.In this paper, we propose a watchdog technique for improving the trust system in networks by using effective optimization methods. To expose this method,:we can achieve better efficiency compare to existing and minimum energy cost for using watchdog technique and also keeping sufficient level security. In our contributions of the proposed method, it consists of theoretical analyses and practical algorithms. Using this watchdog approach the detection of misbehaved nodes is reduced, sufficient security, less energy consumption and the overall accuracy increased.

ANALYSIS OF THE EFFECT OF NBTI ON DATA FLIP TIME DEPENDENCY ON AN MTCMOS SRAM

Original Research Article

Patibandla Anitha1, B.L. Raju2

Abstract

The predominant restraining factor of the circuits lifespan are Temperature Instability effects like NBTI and PBTI. A regular configuration to evaluate the influence of NBTI on a circuit’s operation is developed relating significant circuit constraints such as the node switching action, variation in supply voltage, temperature etc. The influence of NBTI on Read strength of SRAM cell is analyzed. Due to the NBTI stress, the working of the SRAM is totally affected. The consignment of deterioration in Static Noise Margin (SNM), is computed by the read steadiness of SRAM cells is appraised. We suggest a novel method to retrieve the SNM of SRAM cells employing a data flip process and portray the results obtained. The performance issues of the data flip time are analyzed by HSPICE simulation with varied supply voltages. The circuit design with NBTI stress is calculated depends upon the simulation setup of HSPICE tool. The supply voltage is varied by 0 V, 0.2 V, 0.4 V, 0.6 V, 0.8 V and 1 V with a length of 45nm and width of 90nm (Taken from PTM technology).

ADAPTIVE CLUSTERING FOR ENHANCEMENT OF THROUGHPUT IN A DISTRIBUTED WIRELESS SENSOR NETWORK

Original Research Article

K. Lakshmi Joshitha*, S.Jayashri#

Abstract

Clustered networks are of great demand today which may serve for communication in a cooperative fashion for nowadays evolving internet of things. In cases like habitat monitoring the animal may be fixed up with the sensor which becomes mobile. Especially when moving in herds or flocks the scenario is viewed as an event moving in clusters. This work aims at serving for such cases and providing an adaptive clustering with the size of the cluster being varied. As the group head dies in one cluster the cluster members are being allocated to the nearby heads based on the threshold of energy in the Cluster heading nodes. It is shown that the throughput of the network increases as the uninterrupted data collection is sustained through this residual energy scheme of member allocation to the different cluster head.

INTELLIGENCE IN ROAD SAFETY USING WEATHER FORECASTING SYSTEM

Original Research Article

S. Vigneshwaran, P. Varoon, S. Kalpana

Abstract

Climate is an essential variable that influences movement stream and street wellbeing. Antagonistic climate circumstances influence the driving conditions straightforwardly, consequently, drivers must be instructed about the atmosphere conditions downstream to conform their driving. In the structure of wise transport frameworks, a few frameworks have been created to know the climate circumstances and advise drivers. Be that as it may, these frameworks do not conjecture climate ahead of time, and they require the support of street administrators to educate drivers. This paper shows another independent framework to figure climate conditions in a brief span and to give clients the data got. The framework utilizes an arrangement of calculations and tenets to decide the climate and to conjecture unsafe circumstances out and about system. It has been actualized utilizing a multivalent approach and tried with genuine information. Results are exceptionally encouraging. The framework is capable to conjecture unfriendly circumstances with an abnormal state of significant worth. This quality makes it possible to trust in the structure and to maintain a strategic distance from the supervision of administrators.

PERFORMANCE IMPROVEMENT OF CLUSTERED NETWORK THROUGH DATA REPLICATION AND SECONDARY CLUSTER HEAD SELECTION

Original Research Article

K. Lakshmi Joshitha, A. Gangasri

Abstract

The objective of the proposed system is to augment the efficiency of the clustered wireless sensor network using Game theoretic approach. In WSN the Cluster Head (CH) has the responsibility of gathering data from the members of its group and transmitting it to the sink. In this approach CH is selected by taking into consideration the residual energy. A periodical change of the head happens when the CH energy drops below the energy of other nodes present in the same cluster. Data replication is done if either CH fails to work or the link between CH or sink gets disconnected.

SHESECURE SAFETY APP – THE HEXA UMBILICAL CORD

Original Research Article

Nirmalrani V., Saravanan P., Kalpana S

Abstract

The violence against women is increasing tremendously. With a specific thought, many kinds of violence against women such as sexual assault, rape, and domestic violence. It is often unreported due to social norms, sensitive issues, etc. Nowadays lack of security issues are there, one of the main issues is women security. In this modern world violence against women becomes even more difficult to capture. Also, more issues have been identified in late response. The crime against women is happening beyond the thinking of the common people. So, this paper proposes the development of an Android application called “She Secure Safey App – The Hexa Umbilical Cord” that ensures the various security features to prevent from various victims, the main motto of this app is to prevent women in strange situations. It does not require internet connections except for any features. The contacts are registered through network providers. In case of emergency this application is used to trace the location of the user and the contacts of the nearby police stations using GPRS, video and audio can be recorded for 10 seconds and then forwarded to registered contacts.

FAIRNESS INDEX OF EFFICIENT ENERGY ALLOCATION SCHEMES IN A TREE BASED SMART GRID

Original Research Article

Boddu Rama Devi, Manjubala Bisi, Rashmi Ranjan Rout

Abstract

Smart power distribution is a challenging task in a power grid as demand from the end users connected to the grid varies dynamically. Energy allocation should be done optimally among the commercial and domestic users which have varied energy consumption and pricing rates. Important aspects such as user demand and fairness among users can be considered for efficient energy allocation in smart grid. In this work, we have proposed and analyzed energy allocation strategies for satisfying maximum number of users, maximizing the profit, minimizing average slots per user, maximizing average slots per user and maximizing the number of users while maximizing the profit in a smart grid tree network. Parameters, such as, total energy cost, number of active users and fairness index are incorporated in our proposed schemes and our schemes are compared with existing schemes, such as, Round Robin and Priority based schemes. Extensive simulation studies have been carried out to show the efficacy of the proposed approaches.

INTERACTION BETWEEN GROUP OF VITAMINS AND NANO DRUGS TO BRAINSTEM GLIOMA PROTEIN AND REDESIGNING THE CHEMICAL STRUCTURE

Original Research Article

BIPIN NAIR B.J., SHAMCY O., SHIBIN K.

Abstract

Brainstem Gliomas are amongst the most subtle and deadliest disease in the field of cancer. It provides treatments include surgery, clinical approach, radiotherapy, and chemotherapy. Blood Brain Barrier (BBB) is very important part allows to circulate blood from brain to body parts. Provides difficulty in delivering nano-molecules efficiently into the brain and offers the medical side effects depends upon characteristics of drugs even that can be used to indicate the effectiveness of drugs in similar tumors. This challenge is to identify how efficiently applied drugs works in central nervous system. Bioinformatics approach in nanomedicine helps to find out the presence of drug molecules present in the body, where they are needed and where they will do the best. I.e. The delivery of drug in BBB focuses on increasing the bioavailability and curate cancer with updated redesigned Drug and protein interaction. So, it is all about to make efficient redesigned drug and view it in 3D. Our novel approach focuses on redesign and apply efficient ligand through BBB to the Mutated Brainstem Glioma sequence using CADD tools, comparing the efficiency with existing drugs and view it in systematic proposed 3D visualization tool.

FULL CUSTOM LAYOUT OPTIMIZATION TECHNIQUES

Original Research Article

Anto Shiny Jenifer M., Umadevi S

Abstract

Design of an integrated circuit layout is said to be the characterization of the components and elements of the integrated circuit in 3-dimension in geometrical models which represents the silicon layers, oxide layers, metal and polysilicon. Optimizing the layout helps in producing less parasitic effects, interconnect delays, power dissipation and signal integrity in an IC. The proposed work reduces total layout area of the application by incorporating following methods together: 1) depletion sharing, 2) minimum distance rule and 3) different metal layers. The proposed technique is practiced on 40 transistor D-flip flop[1] layout using Cadence® virtuoso® 64 tool. On using the minimum distance rule method along with depletion sharing the total layout area is reduced by 71.60% and on combining all the three methods area reduces by 73.44% with reference to schematic driven layout of example circuitry. In proposed layout, in order to subdue the reliability issue, single vias are replaced with double vias wherever possible. Simulation after post layout is done and the corresponding power calculation has been identified for the layout of the example circuitry and results clearly say that total layout area reduction is reducing the power consumption directly in total.

COOPERATIVE PROTOCOL FOR QOS ROUTING IN WIRELESS SENSOR NETWORKS

Original Research Article

M. Karpagam, D.Devi

Abstract

In cooperative networks, optimum path should be selected based on QoS parameters and then the node will recruit the neighboring nodes to form a cluster and assist in communication. QoS based routing for wireless sensor networks helps to select optimum path for routing and it improves the overall performance of the network. In this paper, we have modeled a QoS based cooperative protocol for wireless sensor networks. We have analyzed the energy consumption of nodes and throughput. We have compared the energy consumption and throughput of our proposed QoS based cooperative protocol with existing cooperative transmission protocol. Network Simulator 2 (NS 2) is used to model the method and the comparison results show that the QoS based cooperative protocol outperforms the existing cooperative protocol in terms of energy of nodes and throughput.

EMERGENCY ALERT FOR CAGED ANIMALS

Original Research Article

Nalini M., Mathangi A., Jayashri K.R., Nivedha J.K.

Abstract

This endeavor is an attempt to explore the means and tools exclusively invented to protect and preserve caged animals in case of any exigency. With receding wildlife population becoming a huge problem and global crisis, round the clock vigilance and preservation of endangered species especially those that are caged, are of utmost necessity. Besides being dumb, the ‘caging- in’ is another trauma. Human being, being the society’s most developed and privileged animal has the major responsibility of taking care of those that need our helping hands. Carelessness and negligence are the negative traits of humans. So it is obviously not possible to provide 24/7 acute attention. This is the part where instrumentation engineers come in hand. This work utilises various sensors and image sensing cameras to continuously monitor these underprivileged beings of the society. The sensors constantly track and maintain various parameters related with the health, safety and wellness of the caged being. In case of any abnormality, the GPS-enabled alert device immediately notifies the important personal, (say the forest rangers, the veterinarian, the guard, etc.), in-charge of the safety and the well-being of the caged animals.

IMPLEMENTATION OF INFERENCE ENGINE IN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM TO PREDICT AND CONTROL THE SUGAR LEVEL IN DIABETIC PATIENT

Original Research Article

M. Mayilvaganan, R. Deepa, S. Malathi

Abstract

The Adaptive network based fuzzy inference system (ANFIS) is a hybrid system comprising of the neural network and the fuzzy logic. It is a data driven procedure which can be used to provide the solution of function approximation problems in a neural network platform. Here at first a fuzzy inference system comprising of an initial fuzzy model is formed, based on the fuzzy rules extracted from the input output data set. Selection of the proper rule base depending upon the situation can be achieved by the use of an ANFIS controller, which becomes an integrated method of approach for the control purposes and yields excellent results, which is the highlight of this paper.

ANALYSIS OF RECENT SHAPE, TEXTURE AND COLOUR BASED IMAGE SEGMENTATION TECHNIQUES

Original Research Article

Michael Angelo Kandavalli, S. Abraham Lincon

Abstract

Image segmentation has an important role in image processing. It is a fundamental step which can be defined as isolating homogeneous regions within an image or finding the boundaries between such regions. Image segmentation has been approached from a wide variety of perspectives but still it is a challenging problem. Therefore, the subject of segmenting objects of interest in images has gained even more attention. From the primary benefit of producing simple, informative input, object segmentation is a foundational tool in various advanced systems such as object recognition, image retrieval, and image editing and scene reconstruction. Due to its significant role, this crucial step has been of perennial interest to many researchers of image processing and computer vision. This makes segmentation process less accurate and highly time-consuming when the foreground and background are much nearby or when the foreground textures are occluded. To overcome these drawbacks, we analyze some of the trending issues in shape, texture and color based image segmentation techniques.

REDUCTION OF PAPR USING HELICAL INTERLEAVER IN PTS TECHNIQUE FOR SCFDMA SYSTEM

Original Research Article

R. Jayashri

Abstract

OFDM is a high data rate modulation technique used in the downlink of 4G system. Due to the difficulty of PAPR, usage of OFDM system affects the battery period of mobile terminal. So that new accessing technique called SCFDMA system which is employed in the uplink system. But still the PAPR problem persists in SCFDMA system which has to be overcome. A statistical method, Partial Transmit Sequence can be used with SCFDMA to reduce the PAPR even more. In this paper, the PAPR in SCFDMA system is reduced further by PTS technique using helical interleaver. The proposed system yields 3% reduction in PAPR compared to conventional method.

KINSHIP VERIFICATION SYSTEM BASED ON MID LEVEL FEATURES

Original Research Article

T. Theresa 1, S. Veluchamy2

Abstract

Recognizing of human face from image set has recently seen its prosperity because of its effectiveness in dealing with variations in illumination, expressions, or poses. Unlike most previous kinship veri?cation methods which apply low-level hand-crafted descriptors such as local binary pattern and Gabor features for face representation. This paper investigates about kinship verification system based on mid-level features. Here Scale invariant feature transform (SIFT) descriptors have been extracted. For better performance two features such as blob and corners are detected via Surf and Harris algorithms. Further processed features are undergone for feature learning algorithm continued with classification. Finally, accuracy rate is to be evaluated for verification of kinfaces.

PERFORMANCE IMPROVEMENT OF CLUSTERED NETWORK THROUGH DATA REPLICATION AND SECONDARY CLUSTER HEAD SELECTION

Original Research Article

K. Lakshmi Joshitha, A. Gangasri

Abstract

The objective of the proposed system is to augment the efficiency of the clustered wireless sensor network using Game theoretic approach. In WSN the Cluster Head (CH) has the responsibility of gathering data from the members of its group and transmitting it to the sink. In this approach CH is selected by taking into consideration the residual energy. A periodical change of the head happens when the CH energy drops below the energy of other nodes present in the same cluster. Data replication is done if either CH fails to work or the link between CH or sink gets disconnected.

SHESECURE SAFETY APP – THE HEXA UMBILICAL CORD

Original Research Article

Nirmalrani V., Saravanan P., Kalpana S

Abstract

The violence against women is increasing tremendously. With a specific thought, many kinds of violence against women such as sexual assault, rape, and domestic violence. It is often unreported due to social norms, sensitive issues, etc. Nowadays lack of security issues are there, one of the main issues is women security. In this modern world violence against women becomes even more difficult to capture. Also, more issues have been identified in late response. The crime against women is happening beyond the thinking of the common people. So, this paper proposes the development of an Android application called “She Secure Safey App – The Hexa Umbilical Cord” that ensures the various security features to prevent from various victims, the main motto of this app is to prevent women in strange situations. It does not require internet connections except for any features. The contacts are registered through network providers. In case of emergency this application is used to trace the location of the user and the contacts of the nearby police stations using GPRS, video and audio can be recorded for 10 seconds and then forwarded to registered contacts.

FAIRNESS INDEX OF EFFICIENT ENERGY ALLOCATION SCHEMES IN A TREE BASED SMART GRID

Original Research Article

Boddu Rama Devi, Manjubala Bisi, Rashmi Ranjan Rout

Abstract

Smart power distribution is a challenging task in a power grid as demand from the end users connected to the grid varies dynamically. Energy allocation should be done optimally among the commercial and domestic users which have varied energy consumption and pricing rates. Important aspects such as user demand and fairness among users can be considered for efficient energy allocation in smart grid. In this work, we have proposed and analyzed energy allocation strategies for satisfying maximum number of users, maximizing the profit, minimizing average slots per user, maximizing average slots per user and maximizing the number of users while maximizing the profit in a smart grid tree network. Parameters, such as, total energy cost, number of active users and fairness index are incorporated in our proposed schemes and our schemes are compared with existing schemes, such as, Round Robin and Priority based schemes. Extensive simulation studies have been carried out to show the efficacy of the proposed approaches.

INTERACTION BETWEEN GROUP OF VITAMINS AND NANO DRUGS TO BRAINSTEM GLIOMA PROTEIN AND REDESIGNING THE CHEMICAL STRUCTURE

Original Research Article

BIPIN NAIR B.J., SHAMCY O., SHIBIN K.

Abstract

Brainstem Gliomas are amongst the most subtle and deadliest disease in the field of cancer. It provides treatments include surgery, clinical approach, radiotherapy, and chemotherapy. Blood Brain Barrier (BBB) is very important part allows to circulate blood from brain to body parts. Provides difficulty in delivering nano-molecules efficiently into the brain and offers the medical side effects depends upon characteristics of drugs even that can be used to indicate the effectiveness of drugs in similar tumors. This challenge is to identify how efficiently applied drugs works in central nervous system. Bioinformatics approach in nanomedicine helps to find out the presence of drug molecules present in the body, where they are needed and where they will do the best. I.e. The delivery of drug in BBB focuses on increasing the bioavailability and curate cancer with updated redesigned Drug and protein interaction. So, it is all about to make efficient redesigned drug and view it in 3D. Our novel approach focuses on redesign and apply efficient ligand through BBB to the Mutated Brainstem Glioma sequence using CADD tools, comparing the efficiency with existing drugs and view it in systematic proposed 3D visualization tool.

FULL CUSTOM LAYOUT OPTIMIZATION TECHNIQUES

Original Research Article

Anto Shiny Jenifer M., Umadevi S

Abstract

Design of an integrated circuit layout is said to be the characterization of the components and elements of the integrated circuit in 3-dimension in geometrical models which represents the silicon layers, oxide layers, metal and polysilicon. Optimizing the layout helps in producing less parasitic effects, interconnect delays, power dissipation and signal integrity in an IC. The proposed work reduces total layout area of the application by incorporating following methods together: 1) depletion sharing, 2) minimum distance rule and 3) different metal layers. The proposed technique is practiced on 40 transistor D-flip flop[1] layout using Cadence® virtuoso® 64 tool. On using the minimum distance rule method along with depletion sharing the total layout area is reduced by 71.60% and on combining all the three methods area reduces by 73.44% with reference to schematic driven layout of example circuitry. In proposed layout, in order to subdue the reliability issue, single vias are replaced with double vias wherever possible. Simulation after post layout is done and the corresponding power calculation has been identified for the layout of the example circuitry and results clearly say that total layout area reduction is reducing the power consumption directly in total.

AN INTERLEAVED HIGH FREQUENCY FLYBACK MICRO-INVERTER USING SLIDING MODE CONTROL ALGORITHM

Original Research Article

S. Subha, A. Gurumurthy J. Nishanth, M. Shriraam, T Thirukkumaran

Abstract

The presence of nonlinear voltage current characteristic with a unique Maximum Power Point (MPP) is usually found in PV panels. When their operating conditions are subjected to changes, the MPP will also change. This project aims at the design and implementation of a stand-alone micro inverter for Photovoltaic (PV) applications based on interleaved fly back converter using Sliding Mode Control (SMC) algorithm. Here, a fly back converter is designed at high power rating and its practicality with good performance is demonstrated. A sliding mode controller is used to estimate the MPP which forces the PV system to operate at MPP and to stay on the surface at all times. This method is simple and robust to irradiance and temperature variations. A simulation model is developed and the design is then verified and optimized for best performance based on the simulation results. Finally, a prototype at rated power is built and evaluated under realistic conditions.

A NOVEL APPROACH FOR EXPLORING ANCESTRAL RELATIONSHIP BETWEEN VARIOUS ORGANISMS THROUGH CUSTOMIZED FAMILY PROFILE ANALYSIS

Original Research Article

BIPIN NAIR B.J.

Abstract

The purpose of the paper “A Novel approach for exploring ancestral relationship between various organism through customized family profile analysis” aims at exploring the evolutionary relationship between organisms which share the common set of proteins. Family profile analysis is used to obtain the profile of the given proteins and apriori algorithm is customized to suite the purpose the generating the frequent proteins through sequencing and provide the evolutionary relationship of various organisms. Which implies there is a common ancestral relationship between these organisms

AN APPROACH FOR EXAMINING LUNG CANCER BY OBSERVING THE MICRORNA IN AN ASSEMBLY OF DRUG INTERACTIONS

Original Research Article

BIPIN NAIR B J., ANJU K J, JEEVAKUMAR A

Abstract

MicroRNA is the non-coding RNA in the gene sequences, is the major factor of invoking the oncogenes. Late identification of lung cancer leads to deaths. Multiple studies on miRNAs have made a break through discoveries including their direct and indirect involvements in causing lung cancer. Several miRNAs like miR-21a, miR-196 and miR-69 are identified as bio marking elements of non-small cellular lung cancer few like miR138 and let-7 are considered as anti-cancer agents. This work studies the changes happening to miR-138 in interaction with NSCLC drugs. miRNA use to interact with multiple natural factors, utilizing this property of miRNA we examined the possibility of studying different drug effects on miR-138. Target Scan, Mol View, and free energy calculation algorithm were used for creating an interactive environment for the simulation. From the results, we conclude that miRNAs are reactive to cancer drugs. This could be used for further development of cancer prevention drugs which targets miRNAs rather than oncogenes

ENHANCING THE SECURITY OF CLOUD STORAGE FOR MEDICAL DATA RETRIEVAL USING DOUBLE ENCRYPTION WITH DATA ANONYMIZATION

Original Research Article

P. Harish, S.Vigneshwari, K.B.S. Ravi Teja

Abstract

Now-a-days the major issue that was seen in hospital management is providing security to the patient’s related data. Such data’s are so sensitive, exploiting that type of data may result in leakage of patient’s information. They are some previous systems which provide security to the patient’s data, but the algorithms that have been issued are timing enabled proxy re-encryption algorithms, which issues keys and to use them within in the time limit, so these causes in some difficulty to user in order to access his data whenever he wants. In order to overcome this type of encryption processes we propose a double encryption with anonymization technique and implementation of multiple health records in a cloud server. Whenever the user wants to retrieve the information from the cloud server, user gets a one-time password to his registered email id.

NON-CONVENTIONAL ENERGY HARVESTING USING FOOT PRESSURE

Original Research Article

M. Nalini, A. Krithika, B. Shruti, C.V. Rakshana

Abstract

There is driving force more powerful than steam, electricity and nuclear power- the footstep. In today’s world energy is the major resource in which we humans relay on. This project brings an idea to produce electricity by a non-conventional source. A Non-conventional energy using footsteps involves a process in which mechanical energy is converted into electrical energy. This system becomes pollution free, eco-friendly and socially relevant by generating energy from non-conventional sources. It is designed to be applied in public areas where there is sufficient crowd such as complexes transportation hubs and schools. This system has to be placed at points where people travel through entrance or exit and they have to step on this device to get through. Then a voltage is generated on every footstep and when mounted in series they will produce a sizeable amount of electricity.

REAL TIME SIMULATOR FOR FIELD SURVEY MOBILE ROBOT

Original Research Article

K. Nandhakumar, T. Viswanathan,

Abstract

A systematizing elucidation to the hazards present in the current human health due to spraying of conceivable toxic chemicals in the detained space of an agricultural field or hot and steamy glasshouse is accomplished by the design and disposition of a sovereign mobile robot for use in disease prevention and pest control applications in monetary greenhouses. An Embedded system based stereotyped robot is designed for this purpose. The platforms ability to fortunately head out for itself down the platform of a greenhouse shows the forcefulness of this platform, while the pesticide sprinkling system is used to efficiently spray the plants evenly with set dosages. A vision based robotic control regulation strategy is developed for a non-calibrated camera system which is mounted on a wheeled single mobile robot contingent on non-holonomic motion restraint, which can drive the mobile robot to the target position with exponential convergence. Subsequently, by using the retrieved camera intrinsic parameters, a straight-line motion controller is developed to drive the robot to the desired position, with the coordination of the robot always facing the target position. By the proposed method, the robot can be confined in map-free and GPS-free environments, and the results of localization can be theoretically proved confluent to their real values and thriving to the measurement noises. The performance of the proposed method is further validated by both simulation and experimental results.

SAFETY IN PUBLIC AREAS USING FACE RECOGNITION

Original Research Article

Carmel Rani V., Deepa Naga Manjari G., Nirmalrani V

Abstract

Face recognition systems are generally used for security purposes. Face recognition is a biometric method that compares a person’s face that is live capture image or a video source with the stored images. Protecting the people from the criminals in public areas and at the same time accounting for law enforcement is a great challenge. Facial recognition is used for the very purpose. For any facial recognition system, there is a primary step that is ought to be done. Face detection is the preliminary step for face recognition. There are many algorithms and classifiers for face detection. Some of them are Segmentation algorithm, PCA, SVM, AdaBoost etc. Face detection itself is not sufficient. The detected face need to be accurate in various aspects like when the faces are rotated, under lighting conditions, complex backgrounds, variety of skin tones etc. These became challenging factors in face detection process. Many systems were proposed earlier for face detection. These existing systems ensure face detection in color images or background complexities or lighting conditions. Some common issues in these systems is that they have to go through many stages repeatedly leading to more time consumption, noisy output, less accuracy and efficiency levels. Hence this paper proposes a system for detection and recognition using Haar – cascade. Haar-cascade classifies the input into frames which for feature extraction. The proposed system detects faces in a group of people, variability in skin tones, variability in scale, in the presence of outliers. The recognition system recognises a suspect by comparing the face of the suspect with the faces that were stored in the database. The suspects face is automatically forwarded to nearby police station to catch the suspect. The proposed system provides a fast detection rate accounting for better accuracy and efficiency levels. This paper provides safety to the public in crowdy areas like railway stations, bus stands, market areas, shopping malls, parks and so-on.

NINE SWITCH CONVERTER BASED SOLAR HYBRID ELECTRIC VEHICLE

Original Research Article

M. Nirmala, S. Rameshselvakumar

Abstract

Hybrid electric vehicle system with nine switch converters using permanent magnet synchronous machine as a motor and as a generator has been discussed in many papers. A series hybrid electric vehicle system with three phase induction motor connected as load to the Nine switch converter powered by a spark ignited internal combustion engine, along with solar panel to charge the battery based on its state of charge has been analyzed in this paper. Nine switch converter technique reduce voltage stress, power loss, number of switches required and the cost of the system.

MODIFIED SVPWM FED NINE SWITCH INVERTER FOR MOTOR LOAD

Original Research Article

M. Nirmala, K. Baskaran, S. Sowmiya

Abstract

The nine-switch inverter has been suggested in order to reduce the switching components and the cost of regular six switch inverter. In this paper, the conventional Space Vector Modulation (SVM) and Level-Shift Space Vector Pulse Width Modulation (SVPWM) design of nine-switch inverter is contemplated, controlling the two independent parallel ac induction motors without the shoot-through in the inverter leg. The SVPWM is proposed for minimizing total harmonic distortion (THD). The dual output voltages and phase currents can prevent the distorted attribute, which is originated by the crossover of the modulating signals. This will suitable for high power inverter application where cost and efficiency are vital decision factors. The mathematical models are suggested by the level shift SVPWM scheme and based on the zero-sequence injection principle. The offset control decrement are arranged by the interconnection of the modulation indices in level shift of the SVPWM modulating signals. The suggested modulation performance has been confirmed by the simulated implementation that is effectively carried out on the applicability of the proposed algorithm, the high modulation index is needed.

IMPLEMENTATION OF A WIRELESS MOBILE ROBOT FOR INTELLIGENT FARMING

Original Research Article

K. Lokesh Krishna, Y.N.Vijaya Kumar, S.Theivachandran

Abstract

Over the past few years, there has been significant awareness in designing intelligent robotic devices for use in external outdoor environments, which can independently sense, analyze and react to their own surroundings. The agricultural sector is already experiencing enormous challenges such as limited availability of arable lands, increasing requirement of water resources, and variation in climatic conditions. Also due to the recent advances in computer and related technologies, still the farmers are not adapted to those technologies as they are neither poorly managed nor designed for their particular needs. One method to address these various issues is to develop sensing technology to make agricultural farms more intelligent. In this paper a novel wireless mobile robot using ARM7 microcontroller is designed and implemented for carrying out various operations on the field. This proposed wireless mobile robot is equipped with various sensors for measuring different environmental parameters. The main features of this novel intelligent mobile wireless robot is that it can execute tasks such as moisture sensing, scaring birds and animals, spraying pesticides, moving forward or backward and switching ON/OFF electric motor. The robot is fitted with a wireless camera to monitor the activities in real time. The proposed wireless mobile robot has been tested in the fields, readings have been monitored and acceptable results have been observed, which indicate that this system is very much useful for intelligent farming.

ECONOMIC AND EMISSION ANALYSIS OF PV SYSTEM,SOLAR THERMAL SYSTEM, HYBRID SYSTEMS FOR RURAL ROW HOUSES

Original Research Article

1G. Priyanka, 2R. Mahalakshmi. 3V. SharmilaDeve, 4V. Ezhilarasi

Abstract

The Emission and Economic analysis is undertaken to prove that Hybrid PV/Solar-Thermal (PVT) systems is optimized for distributing electricity and hot-water for rural row houses. For this study, Kallipatti village in Coimbatore District is chosen. The Rural Row Houses load capacity is 3KW and 700 liters of hot water is required daily. The emission and economic analysis was carried out for Conventional system, Photovoltaic (PV) system, Solar Thermal System and Hybrid PV and Solar-Thermal(PVT) system individually. From the Emission analysis, the PVT system has less carbon dioxide emission when compared to other systems. The Economic analysis shows that Photovoltaic(PV) System is less cost. But for generating both electricity and hot water, hybrid PV/solar-thermal (PVT) system is optimal when compared with installing Photovoltaic (PV) system for electricity and Solar-Thermal (PVT) system for hot water. The simulation is carried out by using MATLAB

DESIGN AND IMPLEMENTATION OF EFFICIENT ADVANCED ENCRYPTION STANDARD COMPOSITE S-BOX WITH CM-MODE

Original Research Article

S. Gnana Soundari, B. Senthil Kumar

Abstract

The Advanced Encryption Standard (AES) is one of the famous algorithms for the cryptographic security algorithm and it is specifically used for the data protection and the transmission. The AES novel Mix-Column operation implementation is proposed in this research paper. The Mix-Column is model is improved for the AES decryption through the Very Large Scale Integration (VLSI) System design in this research paper. In AES Mix-Column, large number of logic gates used to perform the multiplication of input stage bytes (output of shift row) and fixed defined state bytes. In order to decrease this problem, the redundant function of Mix-Column is eliminated and re-designed in this paper. Proposed model of Mix-Column minimizes 25% of logic gates compared with previous work. Further, the proposed Mix-Column of AES decryption achieves by improving the performance of area, delay and power consumption. The transformations optimized and the speed is increased.

MELATONIN AND FLUOXETINE INTERACTION WITH SHANK3 PROTEIN GENE FOR AUTISM SPECTRUM DISORDER

Original Research Article

BIPIN NAIR B.J., ARUNJIT K., VIJESH BHASKARAN

Abstract

Autism spectrum disorder impairs the nervous system and affects the overall poignant, societal and substantial health of the affected human being. We here try to redesign the drug 2D structure through various predicting techniques and visualize drugprotein interaction through molecular dynamics and molecular docking techniques. We here collect the drug id of Fluoxetine, Melatonin and the protein SHANK3 form drug bank, then these two drugs are interacted with the protein SHANK3 through molecular docking technique and the 2D structure of their interaction is predicted.

EFFICIENT INTERLEAVED BUCK BOOST CONVERTER FOR SOLAR APPLICATIONS

Original Research Article

M.SUMITHRA, R. KAVITHA

Abstract

Solar Energy is the prominent source of renewable energy. But, the practical DC –DC converter can extract only partial amount of energy from the Solar cells by our conventional methods. An interleaved buck boost dc/dc converter is developed that it requires only a smaller input/output filters, it provides the fast dynamic response and low stress on the devices than conventional designs, for solar powered applications. Input and output ripples of voltage and current of the converter is very low. The simulations were carried out using MATLAB/SIMULINK software package and hardware implemented

OPTIMIZATION OF OPTICAL AMPLIFIER SATURATION POWER IN NGPON2 USING 2048 WAY SPLITTER

Original Research Article

S. Rajalakshmi1, T. Shankar2

Abstract

This article represents design of Next Generation stage-2 Passive Optical Network (NG-PON) for a reach of 100km and over 2048 split using a hybrid time and wavelength division multiplexing (TWDM) for the data rate of 40Gbps. The down stream signal uses L band and upstream signal uses C band with the wavelength plan of ITU-T G.989. The network provides cost effective solution by directly connecting the increasing numbers of customers to the core network by use of 2048 way split. The splitter loss and the ASE noise is optimized by EDFA amplifiers to extend the long reach. An in-depth analysis is performed using an analytical model of NGPON with non- dispersion shifter fiber.

MONITORING ROUTINE IN WEB EXPLORATION ENVIRONMENTS

Original Research Article

D. Saravanan

Abstract

Technology brings every-thing in our finger tips, the problems of bringing this information most existing algorithm applied to every user retrieval in the same technique. Users information’s are handled with special way it means quires priorities based on the searching. In such a case, simply leveraging pages visited by this user in the history may achieve better performance. Based on the users search information extraction in web pages are reacted differently. Even if search histories are enough to infer general user interests, users often search for short-term information needs that may be inconsistent with general user interest. In such cases, long-term user profiles are useless or even harmful, whereas a short-term query context is more useful. This proposed done on how personalization strategies perform under real-world search engine conditions faced by users. In this paper, we address these problems and make some contributions.

ANALYSIS OF ECONOMIC FEASIBILITY OF PV/SOLAR THERMAL/HYBRID PVT SYSTEM IN HOSTEL APPLIANCES

Original Research Article

1V. Ezhilarasi, 2V. SharmilaDeve, 3R. Mahalakshmi,4G. Priyanka

Abstract

The purpose of this project is to determine the performance of hybrid systems which consists of solar thermal collectors. The study is taken out by analyzing the behavior of the designed systems and implemented in KCT hostel building. The calculations of primary energy consumption, Emissions and the inclusion of a Life Cycle Cost analysis are the major contribution. Photovoltaic panels will produce part of the electricity. Solar thermal collectors will reduce the energy required for DHW (domestic hot water) production. This project is implemented for hostel room and cooking purpose. Then analyze the hybrid system which consists of solar PV, PV thermal, solar PV thermal system. Choose the best hybrid system which suitable to hostel mess. With this system, MPPT (maximum power point tracking) is used to extract maximum power.

POWER QUALITY IMPROVEMENT IN GRID CONNECTED WIND ENERGY SYSTEM USING FUZZY CONTROLLED UPQC

Original Research Article

R. Prema Priya1, M. Mohanraj2

Abstract

Wind power generation is grasping more attention nowadays because it offers the benefits of reduced cost, increased efficiency, less pollution and so on. But the known disadvantage is that the integration of wind farm with grid leads to many power quality problems such as voltage sag, swell, unbalance, harmonics, flickers etc. This paper concentrates mainly on diminution of source voltage sag and load current harmonics which are caused mainly due to the use of nonlinear loads such as personal computers, variable frequency drives, SMPS, monitors, printers etc in both industrial and commercial sectors. For the betterment of power quality issues, custom power devices are used. Among many of the custom power devices, Unified Power Quality Conditioner (UPQC) have been used nowadays which diminishes both voltage sag and current harmonics. The performance of UPQC can be improved by using a new strategy of control which is implemented using Fuzzy Logic Controller and from the simulation results, the performance of fuzzy controlled UPQC is better which can be validated by comparing its performance with the conventional control of PI controller.

CONTROLLING OF BLOOD GLUCOSE INCLUDING THE EFFECT OF FFA DYNAMICS

Original Research Article

Nalini M1,2*, Balaji V3

Abstract

Diabetes is a chronic disorder because of the secretion of insulin was not sufficient. Due lack of insulin, the amount of blood glucose will be increased and cause diabetes, this paper provides the closed loop control using the Bergman’s extended minimal model with fuzzy logic controller. The controller takes the corrective action even for the maximum disturbance and it brings back the glucose level into around 70mmHg which is a basal value. By using this proposed model the level of glucose is continuously monitors and the corrective action will be takes place according to the defined rules.

CONVERSION OF IMAGE INTO TEXT TO REGIONAL TEXT AND SPEECH

Original Research Article

BalaKrishnan K ., Shivapraksh Ranga, Nageswara Gupth

Abstract

In the current scenario digital images are the raw inputs for all the digital image processing applications. These raw images are captured by the electronic devices which contains the unwanted noise or background scene. Preprocessing technique is used to completely eliminate the unwanted noise from an image. In the existing research work, conversion of image to text and speech are analyzed and results are obtained which is useful to the various image processing applications and visually challenged people. In the proposed practice, text to particular regional language text conversion is done which is useful to the Tours and travels and visually challenged people. Using this methodology, they can convert the images into their regional language like bus boards, shop boards and product etc., These regional language text are converted into speech signals using TTS.

AUTOMATED INTEGRATED CLUSTERING ALGORITHM FOR MAMMOGRAPHIC MASS SEGMENTATION

Original Research Article

K. Akila1, L.S. Jayashree, A. Vasuki

Abstract

Segmentation plays an important role in mammographic image processing by facilitating the delineation of regions of interest. An automated Histon based integrated clustering algorithm is presented in this paper for the detection masses in mammographic images by integrating K-means clustering algorithm with Fuzzy C-means algorithm. Initially Histon of the input image was calculated and given as initial centroid for K-means clustering algorithm and Fuzzy C-means algorithm was applied to segment the mass. The performance of proposed algorithm was evaluated using area overlap measure. The morphological features are extracted from the segmented mass and 85% classification accuracy was obtained using SVM classifier.

A REVIEW OF STABILITY AWARE CLUSTERING ALGORITHM IN VEHICULAR AD HOC NETWORK

Original Research Article

Kumar T. and Jaison B

Abstract

A Vehicular Ad hoc Network (VANET) is a special kind of Mobile ad hoc network, in which vehicle acts as a node (communication device) to create Ad hoc network. VANET is identified as the future transportation system in which vehicles communicate with each other and it ensures road safety by avoiding accidents on the road. Due to sparse distribution of vehicles in the network, communication between the vehicles is a challenging task. Clustering avoids this problem by grouping the geographically adjacent vehicles into a cluster. Clustering of vehicles can significantly improves the scalability of the network, but high mobile nature of vehicles in the cluster affects the network stability by dynamically changing the network topology. To create more stable network, clustering algorithm should consider mobility of the vehicles as one of the key factor for cluster formation and cluster head selection. Such a mobility aware clustering produces stable and secure connection between the vehicles in the network. Since most of the recent research papers were focused on stability aware clustering scheme in VANET. This survey paper focus only on stability based clustering algorithms instead of considering various clustering schemes available in VANET.

Pak. J. Biotechnol. Vol. 14 (special issue-I) 2017

Published Paper of

International Conference on Futuristic Innovations in Mechanical Engineering and Manufacturing Management

MECHANICAL BEHAVIOUR OF HYBRID METAL MATRIX COMPOSITE WITH AL6063/ B4C/RIVER SAND

Original Research Article

R. Vijayakumar, R. Kirubaharan

Abstract

Metal system composite (MMC) focuses in a general sense on upgraded specific quality, high temperature and wear resistance application. From the assembled composing it is found that, metal grid composites are under honest to goodness thought as potential cheerful materials and it is generally used to supplant standard materials in flying and auto applications . The MMC are particularly used as a piece of auto and space applications. The aluminum system can be sustained by fortifying with hard dirt particles like SiC, Al2O3, B4Cetc. In this wander, aluminum 6063-T6 composite is picked as one of constituent parts, which has extraordinary mechanical properties and presentations awesome weldability. The mechanical properties like unbending nature and Hardness can be extended by fortifying 6063 Al structure with Boron Carbide (B4C),River Sand particles. In this wander, the making of aluminum 6063 with boron carbide,and stream sand is done by mix tossing process, which is a liquid state material produce and viable procedure. By then, the examples are striven for mechanical properties like versatile, hardness, influence. Finally, the Scanning Electron Microscope (SEM) examination is done, which thinks the geography of composites and it produces photos of a case by checking it with a drew in light emanation.

THERMAL PROTECTION SYSTEM ON SPACE SHUTTLE

Original Research Article

Vijayakumar P., Velavan R., Sathyamoorthy G.

Abstract

Plan and investigation of Thermal Protection System (TPS) is directly completed utilizing CATIA V5, Computational Techniques (CFD), and ANSYS. In this venture, we are managing the approach includes the vehicle optimal design and the innovation of warmth shield. i.e, warm insurance system. This demonstrates has been created in CATIA V5 and dissected the temperature conveyance and weight circulation by utilizing CFD. At last we delivered that CFD result into Ansys input and investigate the capacity of our warm security system. The composite materials used to ensure the surface are Re-in forced carbon carbon(RCC) withstand over 1300oc , High temperature reusable surface insulation(HRSI) withstand underneath 1300oc, and Low temperature reusable surface insulation(LRSI) withstand beneath 700oc.Reinforced carbon is utilized as a part of the nose and wing driving edge, high temperature reusable surface protection utilized as a part of the alongside the nose top and base surface of the model and low temperature reusable surface protection utilized as a part of the place of mid fuselage and trailing edge.

DESIGN AND ANALYSIS OF BRAKES USED IN AUTOMOBILES

Original Research Article

G. Sathyamoorthy*, P. Vijayakumar, R. Manivel, K. Christal

Abstract

Brakes are employed to stop or slow down the speed of the vehicle depending upon the driving needs. When brake applied, each wheel of the vehicle builds-up a certain braking force. For this reason, greater the number of wheels braked, greater will be the braking effect, and sooner the vehicle comes to halt. The existing air brake system of a 6-wheeler is studied and analysed. Brake shoe assembly is completely modelled using Pro/E and the analysis of the brake shoe assembly is carried out in Ansys. The results are analysed. Then redesigned brake shoe assembly is modelled in Pro/E and analysed with certain changes as required.

THE MIXTURE OF ALKALINE EARTH METAL AND ZIRCONIUM OXIDE AS A CATALYST IN CATALYTIC CONVERTER

Original Research Article

M. Karthe *, S.C. Prasanna

Abstract

Increasing of automobiles in the world, proliferates the harmful pollutants in the atmosphere. The catalytic converter is introduced to reduce antagonistic exhaust emissions from the automobiles. The emissions of concern are unburned or partially burned hydrocarbons (HC), carbon monoxide (CO), oxides of nitrogen such as nitric oxide and nitrogen dioxide (NOX). Catalytic converter incorporates a precise combination of precious metals platinum, palladium and rhodium. It decline the emissions through oxidation and reduction reactions. For diesel engines, catalytic converter is used to control HC and CO, but reduction of NOX emissions is poor because the engine runs lean, in order to avoid excess smoke. Although, various emission control techniques are in progress, the emission level are always in higher rate. While more efforts persist to find cheaper alternatives, we done a project by using barium chloride (BaCl2), an alkaline earth metal and zirconium oxide (ZrO2) are mixed together in the definite ratio and feed into the catalytic converter setup by spray pyrolysis methodology. As a result, the reduction of emission level as well as cost is acquired. This experiment will enhance the pollution free environment.

PROPERTY EVALUATION OF SUPER HARD ALLOYS

Original Research Article

M. Karthe*, S.C. Prasanna

Abstract

The Super hard alloys are having excellent impact resistance and wear resistance. The present work directed towards the development of superhard alloy which containing a complex carbide mixture of chromium, molybdenum, niobium, vanadium, manganese, and tungsten. These elements combine to offer excellent hardness retention up to 16000 F, and the ultimate in abrasion resistance. These alloys have less weight and more strength and very high melting point. Due to these admirable properties these alloys are more used in Aerospace, chemical industries and also in manufacture of turbine blades. For use on all iron based metals subject to severe fine particle erosion, these deposits exhibit wear properties superior to standard tungsten carbide deposits. The aim of the work is to characterize the properties like strength, hardness and micro-structural analysis of metallic powder samples of varying the compositions.

INVESTIGATIONS ON THE EMISSION CHARACTERISTICS OF DIESEL ENGINE BLENDE WITH ISOPROPYL ALCOHOL

Original Research Article

M.Karthe *, S.C.Prasanna

Abstract

Now a days population intensity of vehicle rapidly increase so cost of the fuel like petrol diesel, etc. are increase highly and emission of the vehicle create many problems like affecting human health, cause the depletion in ozone layer, affecting the photosynthesis of plants, etc. so reducing the pollution diesel is blended with the isopropyl alcohol at various different proportion. First isopropyl alcohol is converted into fuel by using transesterification by adding acid catalyst. Now isopropyl alcohol is blended with diesel fuel at various proposition 5%, 10% and 15% by total volume of fuel. The emission characteristics of 5%, 10% and 15% of blending of isopropyl alcohol with ordinary diesel to record and evaluate the emission characteristics of blending fuel and ordinary fuels. The emission test at 80% load revealed that, the CO, HC and smoke density are increased by 22.222%, 28.571% and 14.757% respectively for 10% addition of isopropyl aclhohol with diesel. The NOx emission while using 10% isopropyl alcohol blend with diesel is decreased by 19.131% at 80% load. Isopropyl alcohol increase the atomization of the fuel so complete combustion can take place and low calorific value of isopropyl alcohol so heat release during combustion of engine rapidly decrease so NOx emission significantly reduce.

TRACKING OF OPTIMAL THERMAL AND ELECTRICAL POWER IN SOLAR PVT SYSTEMS

Original Research Article

S.C. Prasanna*, C. Ramesh, R. Manivel, M. Karthe

Abstract

Solar PVT systems combine the characteristics of the photovoltaic and thermal solar systems in a single module. Due to the abundant presence of the natural resource from the sun–solar energy, in the past decade several algorithms and related electronic approaches were developed in order to monitor the photovoltaic and thermal panels maximum power generation. Solar PVT Systems possess several control parameters designed to produce better results and in this paper, the task is to track the optimal thermal and electrical power. As such, no appropriate control mechanism has been developed for tracking the maximum power generated from Solar PVT systems. In this paper, a PVT control algorithm based on the proposed neural network architectures are designed to compute the Optimal Power Operational Point (OPOP) by taking into account the model behavior of the Solar PVT system. Ambient temperature and irradiation are considered by the optimal power operational point to compute the optimal mass flow rate of Solar PVT module. Numerical simulation results prove the effectiveness of the proposed neural network models compared with that of the calculated outputs and the solutions derived from the earlier literature studies.

CRONBACH ALPHA VALIDATION AND CORRELATION ANALYSIS OF WORK PRACTICES MEDIATION MODEL

Original Research Article

M. Selwin, S.G. Arul Selvan, B. Sivaraman

Abstract

Relational Coordination (RC) is the important factor to improve the performance of an organization. This project objective is to improve quality of Care provided by the hospitals in India by analyzing the parameters of RC. In order to provide better quality of care RC parameters are analyzed in selected hospitals. The relational coordination parameter is considered by Survey methodology. Relational coordination is meant for the purpose of integration of various tasks. It is the mixed combination of Communication and Relationship ties of relationship.Parameters of RC selected from the detailed literature review includes relational ties such as shared goals, shared knowledge, mutual respect and communication ties such as frequent communication, timely communication, accurate communication and problem solving communication . 2 Questionnaire has been framed one based on work practices mediation model and other based on Quality and Efficiency outcome. Both are tested for validation with the sample size of 30 to 50. Survey is conducted and the impact factor is found for better outcome. Correlation Analysis is done between various RC parameters for betterment of Quality

EXPERIMENT IN EDM PROCESS BY USING BRASS ELECTRODE WITH INCONEL MATERIAL IN NANO POWDER MIXED DIELECTRIC MEDIUM

Original Research Article

R.Velavan*, S. Nandhakumar, P. Vijayakumar

Abstract

Electric discharge machining (EDM) is widely adopted unconventional machining practice, which relies on thermal energy produced from the spark in-between the electrode and the clamped workpiece. In this EDM, the removal of the material is accomplished by continuous discrete discharges between anode and the cathode. The efficiency of the EDM purely relies on the material from which electrode and machining workpiece is made and combined with the dielectric media used. A good selection of electrode can decrease the machining cost. This paper deals with die-sinker EDM with brass as electrode to improve performance factors and cost reduction in machining with EDM. From the experimental results, it is found that a brass electrode give comparatively a better results for certain characteristics but the cost became a worrying factor for machining when the brass electrode material is utilized. So with the intention of balancing the cost and input parameters, brass electrode is experimented with nano powder mixed dielectric medium. It is concluded that the addition of nano powder in the dielectric medium reduces the surface roughness considerably while improving the machining performance.

EFFECT OF POST COMBUSTION TREATMENT ON DIESEL ENGINE EXHAUST GAS EMISSIONS

Original Research Article

P.C. Mukesh Kumar, M. Vijayakumar

Abstract

The more usage of diesel vehicles leads to very big challenges in the aspect of pollution and running out of diesel fuel recourses. Much research works are carried out on reduction of emissions with the advanced technology for cleaner diesel fuels, quick responding electronic control units, advanced engine design and effective post treatment of exhaust. In this investigation, the effect of solid chemical reactants, Urea and Sodium chloride, on engine exhaust gas emissions is studied with post treatment method. This is experimentally done with diesel engine fuel as reference at different engine loads like 20%, 40%, 60%, 80% and 100%. The reaction chamber of this study is located in the exhaust gas pipe line after the cooling treatment. The tests are carried out with diesel, urea and Nacl as the reactants in the reaction chamber. Test results are compared by using diesel fuel as a reference without chemical component in reaction chamber and with chemical reaction. The test results show that the urea produces minimum exhaust gas emissions at 80% load and the reactant urea gives 43ppm lower NOx formation at the peak load. It is also studied the effect of back pressure on it is negligible. The same is proved with by using CFD analysis.

EFFECT OF CONSTRUCTIONAL CHANGE IN I.C ENGINE PISTON BY PARTIALLY CERAMIC COATING

Original Research Article

C.Vignesh , S.C.Prasanna

Abstract

To modify the construction of the piston in S.I. engine is the main goal of this project. Modifying the construction improves the engine operating parameters. As a consequence, the durability of the piston gets reduced. In order to increase the durability of the piston, “Partially ceramic coating” is given on the piston. Thermal analysis are to be examined on a standard (uncoated) SI engine piston, made of Al Si alloy and steel. Then, thermal analysis are to be made on piston, coated with MgO-ZrO2 material by using a analysis software, named ANSYS. Lastly, the analyzed results of different pistons will be compared. The effect of coatings and the thermal behavior of the piston are to be inspected and improved.

EXPERIMENTAL TESTING ON GALVANIZING KETTLE BY USING STAINLESS & MILD STEEL WITH ZrO2 COATING

Original Research Article

R.Velavan1, C.Vignesh2 , P.Vijayakumar,

Abstract

This work is aiming to study the galvanizing kettle material properties. Now a days, kettle produce using mild steel. The problem is dross formation on the kettle, low life period of kettle and less thermal withstand-ability. Our project is to reduce dross formation, increase the life period and thermal withstand-ability by using zirconium coating on stainless steel. Also compare the mild steel and stainless, which is best one to use the kettle in galvanizing process. Above the material the zirconium (ZrO2) coating is done for the reason is increase the fatigue strength and life time of the material as the material is working under the high temperature. While the spray pyrolysis is used to the Zirconium coating is increasing the efficiency of kettle.

STRESS ANALYSIS OF ARTIFICIAL HIP PROSTHESES USING FINITE ELEMENT METHOD

Original Research Article

*S. Sathishkumar1, N. R. Karthik2, R. Shanmuga prakash1, R. Manivel

Abstract

Mostly the finite element approach is used in engineering applications for the structural analysis especially in biomechanics. This approach is used for designing the prostheses used for the total hip replacement. Already the various geometrical shapes are introduced to eliminate the cement loosening from the stem, but in this work the curved geometry is introduced in the design of prostheses to eliminate the cement loosening. Also the double curved geometry and vertical slot is introduced, collar is applied at below the proximal area to minimize the stress level in the curved geometry area. This new design will assist the prostheses to withstand for the maximum human working environmental loading conditions. Sharp edges in the prostheses are also eliminated in this proposed prostheses design. The static analyses have been conducted for the four different geometrical shapes of the prostheses and the results are compared. Ti-6Al-4V alloy is utilized for the finite element analyses in order to achieve the least effective stress value of prostheses for obtaining the highly durable geometry.

OPTIMIZATION OF MACHINING PARAMETERS IN CNC DRILLING OF ALUMINIUM 6351 ALLOY

Original Research Article

S.Sakthivelu1*, M.Meignanamoorthy2, M.Ravichandran3

Abstract

In this research, an experimental investigation of the machining parameters of Aluminium Alloy 6351 in CNC lathe machine for drilling operation using HSS drill bit had been carried out. In machining operation, the minimum surface roughness was considered as important factor for the better quality of the product. Subsequently, the decision of upgraded cutting parameters is imperative for controlling the required quality. The motivation behind this exploration is centered on the investigation of ideal cutting conditions for least surface harshness in CNC drilling of Aluminum Alloy 6351 by Taguchi strategy. The experiment has been carried out based on L16 standard orthogonal array design with three process parameters namely Spindle Speed, Feed rate, Depth of Cut. The experiment results were used to characterize the main factors affecting surface finishing by Signal to Noise ratio and Analysis of Variance method. The investigations infer that the surface roughness was influenced by the feed rate. It was identified that the Surface roughness decreases with increase in feed rate.

PREDICTION OF OPTIMIZED MACHINING PARAMETERS IN CNC END MILLING

Original Research Article

S. Sakthivelu1*, T. Anandaraj2, M. Meignanamoorthy3, M. Ravichandran4

Abstract

An experimental investigation of the machining parameters of Aluminium Alloy 6082 in CNC End milling machine for milling operation using HSS end mill cutter had been carried out. For better quality of product, surface roughness was considered as the most important factor. So surface roughness was taken as response parameter in this work. The experiment has been carried out based on L16 orthogonal array design with machining parameters namely Spindle Speed, Feed rate, Depth of Cut. The experiment results were used to characterize the most influencing factor surface finishing by Signal to Noise ratio and Analysis of Variance method. The investigations infers that the surface roughness was influenced by the cutting speed. It was identified that the Surface roughness was inversely proportional to the spindle speed.

OPTIMIZATION PARAMETERS OF DRILLING PROCESS IN ELECTRIC DISCHARGE MACHINING USED IN SS317 MATERIAL

Original Research Article

Parthipan, N.* Prasanna, S.C., Balamurugan, R., Manikandan, A.

Abstract

This research paper, an analysis of increasing surface quality, characterization of SS317L material using electric discharge machining process (EDM). This material is higher hardness value and high corrosion resistance which is conducted various machining optimization techniques. In this paper mainly focused on drilling optimization techniques has been conducted various speed, feed and pulse current ON/OFF time in Electric discharge machine in copper drill tool, finally the Scanning electron microscope image is visualized in micro-crack of surface in AISISS317 material and prediction of tool surface and internal drill hole surface, better optimization value. The result shows that the machined work piece has compared in motionless tool and rotary tool EDM process.

EXPERIMENTAL STUDY ON HEAT TRANSFER AUGMENTATION IN HELICALLY COILED TUBE SOLAR COLLECTOR WITH MWCNT / WATER NANOFLUID

Original Research Article

K.Palanisamy 1*, P.C. Mukesh Kumar 2

Abstract

In this study the heat transfer of the direct cylindrical glass solar collector are investigated experimentally. The MWCNT /water nanofluids at 0.3% particle volume concentration and 0.25% weight percentage added in to SDBS as surfactant was prepared by two step methods. It was found that the cylindrical solar collector efficiency of 10 -29 % higher than the water. This may be due to random motion of the flow particles and higher thermal conductivity of nanofluid. It is concluded that MWCNT /water based nanofluid can be applied as heat absorption in tube helical coiled solar collector at 0.3% particle volume concentration without significant of pressure drop.

FATIGUE ANALYSIS ON FSW AND GTAW WELDED JOINTS OF AA7175-T6

Original Research Article

Nishanth, S.*, Anandaraj, T.

Abstract

This project investigates the comparison of fatigue characteristics friction stir welding (FSW) and Gas tungsten arc welding (GTAW) on aluminium alloy AA7175-T6 in solid state. The material of 4mm thickness is treated for T6 condition and then it is subjected to weld. With the constant tool pin profile and axial force, FSW is done by varying the tool rotational speed and the welding speed. Also GTAW is done by varying the current with the filler material ER4346. The welded specimen is tested under varying cyclic load in the multiaxial fatigue testing machine for repeated number of cycles. Both FSW and GTAW welded specimen are subjected to low cycle fatigue testing. The S-N curve is plotted to know the ultimate stress and the endurance limit of the material. The study on fatigue testing of different welded joints gives better fatigue performance on FS Welded joints.

LOOP LAYOUT IN FMS USING DIFFERENT HYBRID ALGORITHM AND BACKTRACKING DISTANCE OF THE AUTOMATED GUIDED VEHICLE

Original Research Article

Kirubagharan, R., Balamurugan, R.

Abstract

In this work loop layout in FMS is being analyzed with different algorithms and the identified hybrid algorithm (ISSA) which have a better result. The newly proposed algorithm gave enhanced sequence for the loop layout of an FMS which helped to minimize the distance travelled and backtracking distance of the AGV. The result also shows that the number of iteration required for completing the job was drastically reduced by the ISSA. This paper helps for the researcher to understand about the hybridization of algorithm and in future by considering the cost of manufacturing, due dates involved, multiple AGV in the FMS layouts for achieving better-quality results. Innovative and new meta-heuristics like artificial system, fuzzy system etc… may be integrated with Scatter Search or other meta-heuristics for getting optimum result.

SCHEDULING USING PETRINET TO INCREASE UTILISATION OF RESOURSE IN FLEXIBLE MANUFACTRUING SYSTEM

Original Research Article

KirubagharanR1 VijayakumarR2

Abstract

Flexible Manufacturing System (FMS) is a mechanized assembling framework which has work shop adaptability and stream shop productivity. One of the real worries in FMS is booking of occupations to the machines with the target of expanding machine use. A Petri net is a graphical scientific displaying instrument appropriate to numerous frameworks and this is a promising device for portraying and contemplating data handling frameworks that are described as being simultaneous, non concurrent disseminated, parallel, nondeterministic and stochastic. The Petrinet idea is proposed to take care of booking issues. Disperse Search calculation is populace based met heuristic that used to join its answers and develop new arrangements. This technique creates a populace of arrangements. The dispatching rules calculation has assumed a noteworthy part in the entry of occupation to the machine as per the need of given determined parameter. Dispatching Rules resemble Shortest Processing Time (SPT), Longest Processing Time (LPT), Least Operation Remaining (LOR), Most Work Remaining (MWR), Most Operation Remaining (MOR) and Least Work Remaining (LWR). This paper manages demonstrating and booking of Flexible Manufacturing System (FMS) utilizing diverse Meta Heuristics calculations like Petrinet, Dispatching Rules and Scatter Search. The outcomes are thought about for three distinctive contextual investigations and it is watched that the Petrinet gives better outcome when contrasted and different calculations, for example, Dispatching Rules and Scatter Search calculation as for machine usage.

MACHINING FIXTURE LAYOUT OPTIMIZATION USING HYBRID KRILL HERD ALGORITHM

Original Research Article

S.Nishanth1, P.Praveen2, L.Ragunath1

Abstract

Machining fixtures are most importantly used for holding the workpiece while doing machining operation. Apparatus design means the situating of fixing of the components, for example, locators and clamps. To make sure that the workpiece is made by indicated measurements and resistances, it must be suitably found and clamped. Minimizing workpiece distortion because of clipping and cutting strengths is fundamental to keep up the machining precision. A perfect apparatus configuration displays minimum deformation while machining. This research work has been done to find the desired fixture to minimize the distortion of elasticity of the workpiece created by the fixing and machining strengths following up on the workpiece while machining. This will be accomplished by choosing the perfect number of fixture components with correct positions. To find the optimum location of fixture elements locator and clamp positions are varied with the basic 3-2-1 layout. Then the corresponding moment values are found out by Hybrid Differential Evaluation Krill Herd (HDEKH) In HDEKH objective function for minimization of moment is formulated. The position of fixture elements which gives minimum moment is the optimum fixture layout. Then the deformation of work piece for the optimum fixture design has got from MATLAB.

MECHANICAL BEHAVIOUR OF VINYL ESTER BASED HYBRID COMPOSITE REINFORCEMENT WITH SISAL/PROSOPIS JULIFLORA/E-GLASS FIBERS

Original Research Article

T. Keerthi Vasan*. S. Padmavathy, G. Sharmila Devi, S. Nandhakumar

Abstract

Natural fibre reinforced polymer composites became more attractive due to their high specific strength, light weight, and environmental concern. The incorporation of natural fibres with the combination of E-glass has gained many industrial applications. Naturally fibres are of little use unless they are bonded together to take the form of structural element that can carry load. Hence the combination of fibres and the matrix can have high strength and stiffness yet they have low density. The fibres used here are Sisal, prosopis juliflora and E-glass with Vinyl Ester as the matrix. The composite material has different mechanical properties. The arrangement of fibres is anisotropic which means that the body has different mechanical properties in different directions. The material is cut in the American Society for Testing and Materials (ASTM) standard and the mechanical properties such as Tensile, flexural and impact strength are determined. The main objective of the paper is to make a composite material which is to be incorporated in replacing the conventional steel leaf spring and in utilizing the fibre which pose threat to the environment.

EXPERIMENTAL INVESTIGATION ON DOUBLE PIPE HEAT EXCHANGER BY USING NATURAL FLUID WITH TWISTED WIRE COIL

Original Research Article

M.Kalidass*, K.S.Deepak , R.Karthickraj, M. Saravanan, R. Dhanasekaran

Abstract

Thermal Performance of heat transfer devices can be improved by heat transfer enhancement techniques.In this project we do that augmentation works to increase the heat transfer coefficient by making the turbulent flow of the cold fluid and also using the different fluid to decrease the cost.The twisted cable wire coil inserts are fabricated by 20 mm diameter by winding of cable wire diameter is 0.2 mm. Different mass flow rate will produce the different pressure drop also making alterations in flow of fluid that will make changes in the friction factor, Reynolds number and so on.The convective heat transfer coefficient of double pipe heat exchanger under various operating conditions was determined.

STUDY OF TRIBOLOGICAL PROPERTIES OF RAPESEED OIL AND CANOLA OIL

Original Research Article

Emmanual L., Ragunath L.,Vignesh D.

Abstract

A lubricant is a kind of matter to minimize friction and wear between sliding and contacting surfaces. The key role of lubricant is dissipating heat, prevention from corrosion, improving power transfer and improving liquid seal between contact surfaces. Metal working fluid is one of the lubricant which are mostly used in machining operations. The application of coolants for machining was first proclaimed by Taylor in 1907, which achieved up to 40% increase in cutting speed when machining steel with HSS, using water as a coolant. Due to industrial development lubricating oils are associated with machining like mineral oil, natural oil. But mineral oil is cheaper and available in a wide range of viscosities. Mineral oil is working fluid have their advantages but by using this oil major health hazards involved like skin diseases caused by contact with nitrosamines, bactericides present in metal cutting fluids, respiratory problems, exposure to oil fags and fumes. The disposal of metal cutting fluid may pollute soil and water recourses due to inappropriately discharged.

QUALITY COST ANALYSIS IN AN INDUSTRY

Original Research Article

L. Emmanual*, V.K. Kannan, L. Ragunath

Abstract

Quality Cost means that the cost spends on the bad products and service. The quality cost is more means that the rejection of the company will be more and no control over the rejection in an organisation. The value of quality cost should be as minimum as possible to a specified value say 0.5 %, 1 % and 1.5 % of turn over (quality Cost Index) of the organisation or even less specified value. Quality cost will be varying depends on the nature of business of the organisation. Quality cost is not only bad product or service and also includes prevention cost, appraisal cost, internal failures cost and external failure cost. In this paper, we have details explanation made on the quality cost calculation and quality cost index on rejection of the organisation and it will be useful for quality engineer and who is monitoring the waste cost controller (lean Engineer).

OPTIMIZATION OF ROTARY EDM PROCESS PARAMETERS FOR INCONEL 718 USING ARTIFICIAL NEURAL NETWORK

Original Research Article

Dhanabalan S1, Karthi.RR2, Sivakumar K3, and Sathiya Narayanan C4

Abstract

This works, an experimental analysis of drilling on Inconel 718 using EDM process with 6 mm diameter rotary electrode. Peak current, pulse on-time (Ton), pulse off time (Toff), flushing pressure and electrode speed were chosen as input parameters. Taghuchi L18 orthogonal array are utilized to take readings. Workpiece removal rate (WRR) and tool wear rate (TWR) were consider as output responses.Artificial Neural Network is used to modeling.

MULTI-OBJETIVE OPTIMIZATION OF EDM PARAMETERS FOR Ti ALLOY

Original Research Article

Dhanabalan, S.1 and Karthi, R.R.

Abstract

This works, an experimental analysis of drilling on Titanium using EDM process with 6 mm diameter electrode. Peak current, pulse off time (Toff) and pulse on-time (Ton) are selected as input parameters. Taghuchi L27 orthogonal array are utilized to take readings. Workpiece removal rate (WRR) and tool wear rate (TWR) were consider as output responses. Taguchi method is used to optimization purpose.

EXPERIMENT IN EDM PROCESS BY USING BRASS ELECTRODE WITH INCONEL MATERIAL IN NANO POWDER MIXED DIELECTRIC MEDIUM

Original Research Article

R. Velavan*, S. Nandhakumar, P. Vijayakumar

Abstract

Electric discharge machining (EDM) is widely adopted unconventional machining practice, which relies on thermal energy produced from the spark in-between the electrode and the clamped workpiece. In this EDM, the removal of the material is accomplished by continuous discrete discharges between anode and the cathode. The efficiency of the EDM purely relies on the material from which electrode and machining workpiece is made and combined with the dielectric media used. A good selection of electrode can decrease the machining cost. This paper deals with die-sinker EDM with brass as electrode to improve performance factors and cost reduction in machining with EDM. From the experimental results, it is found that a brass electrode give comparatively a better results for certain characteristics but the cost became a worrying factor for machining when the brass electrode material is utilized. So with the intention of balancing the cost and input parameters, brass electrode is experimented with nano powder mixed dielectric medium. It is concluded that the addition of nano powder in the dielectric medium reduces the surface roughness considerably while improving the machining performance.

ANALYSIS OF HEAVY VEHICLE CHASSIS USING E-GLASS COMPOSITE MATERIAL

Original Research Article

G. SHARMILA DEVI1, S. PADAMVATHY, K. CHRISTAL, T. KEERTHIVASAN

Abstract

The strength of an automobile relies on the automotive frame which supports the overall vehicle parts. It is the essential part that plays a major role in giving potential characteristics to the vehicle under various circumstances. The strength and stiffness are the major characteristics that need to be considered for the frame. This present work is the static structural and modal analysis of a Tata 407 truck couch case. This modeling can be done by CATIA and the analysis to be performed by ANSYS. The analysis is based on the Finite element approach. The behaviour such as stress, frequency, deflection, strain of the truck case under different loading conditions are examined for the two different materials such as Steel and E-Glass composite. The main failure will be due to the fatigue. The life of the truck chassis depends on the structural and modal analysis. Keywords: Model analysis, Structural analysis, E-Glass, Steel

EFFECT OF WEAR AND MICROSTRUCTURAL PROPERTIES OF AL6061 BASED COMPOSITES USING STIR CASTING METHOD FOR PISTON ALLOY

Original Research Article

A. Manikandan1, C. Gokulkumar2

Abstract

The projected paper is to examine the frictional wear and SEM view of Al6061 reinforced with the aluminium oxide, zirconium oxide and silicon carbide to improve the strength and wear of piston material. There will be several failures occurring in the piston due to continuous working like corrosion, wear etc., To wipe out the failure occurring in the material the composition of aluminium alloy material is made through the stir casting technique in various composition and tested. The scrutiny is attempted with the fraction of AA6061+SiC+Al2O3+ZrO2 different fractions using casting process and the Frictional wear and SEM analysis is carried out as per the standard norms. It shows the reduction of wear in the third sample and the microstructure of the composition exhibits the uniform distribution of the reinforcement material.

EXPERIMENTAL INVESTIGATION OF WEAR BEHAVIOR OF GRAPHENE REINFORCED VINYL ESTER POLYMER COMPOSITE

Original Research Article

C.Manickam1, R.Balamurugan1, K.Christal1

Abstract

The wear mechanism is a complex process in polymer composite because of their interaction of two or more materials are involved in the fracture process. Adhesive bonding, abrasive wear, surface fatigue and corrosive properties are the influencing factors in the mechanism of wear behavior. The present work shows the wear rate of the graphene filled vinyl ester polymer composite with varying filler material content. It has been shown that the reduction of wear as the grapheme content increases and gives the lowest wear at10wt% of graphene.

INFLUENCE OF PARTICLE SIZE ON THE THERMAL CONDUCTIVITY OF GRAPHENE COMPOSITES

Original Research Article

1Manickam.C, Christal.K, Prasanna S.C

Abstract

The behavior of thermal conductivity of GNP/polyester composite for two size of GNP particle with different percentage of volume fraction of filler has been investigated. GNP particles of size 50nm and 100nm are used for the fabrication of GNP/polyester composites. Same percentage of volume fraction of filler material is added in the polymer for both the types. We have determined the thermal conductivity value experimentally and compared with the theoretical values of thermal conductivity. The theoretical values show in good agreement with the experimental investigations.

AN INVESTIGATION ON MICRO ROBOT FOR MEDICAL APPLICATIONS

Original Research Article

*Karthi, R.R., Dhanabalan, S., 1Jeeva, R., Manikandan, A.

Abstract

This study deals about the development of micro robotics has the potential to make these tiny intelligent micro robots to navigate throughout the body in nearby future. It will revolutionize the medical field by making the therapeutic and diagnostic procedures less invasive. It calls for the micro robot to be bio compatible, remotely controllable and able to perform the designated functions. In this work, design of micro robot for use in circulatory system is focused. First, the introduction about the MEMS and the various methods of actuation, locomotion and powering of micro robot are discussed. Second, the conceptual designs for the micro robot are proposed based on the information collected from field study and the best design is being selected based on the selection criteria. Third, the method of actuation, mathematical model are proposed for the selected design. Finally, the report concludes with the suggestions for improvement in the design of micro robot.

COMPARITIVE ANALYSIS OF PLAIN AND HERRINGBONE GROOVED JOURNAL BEARING UNDER THE HYDRODYNAMIC LUBRICATION CONDITIONS

Original Research Article

Karthi. R.R., Dhanabalan. S.

Abstract

Journal bearings are important machine elements which are used for supporting the shafts. They are used in various applications like gas, oil engines, aircraft, automobile engines, machine tools, and turbines, etc. One such application is two- wheeler oil pump to which the paper is concerned with. The plain journal bearings are used in the oil pump to support the radial loads. Though the load carrying capacity of the PJB is higher, it has some common problems like low radial stiffness, instability in concentric operations, hydrodynamic pressure losses, etc. To overcome these problems, a beveled-step herringbone grooved journal bearing can be used. This is because it has higher radial stiffness, stability in concentric operations, hydrodynamic pressure recovery in divergent zone, increased pumping capacity, etc. Thus, by replacing the PJB by HGJB, the problems in the oil pump can be rectified and the oil pump works more effectively than before. ‘C’ and ANSYS are the tools used for proving the effectiveness of HGJB over PJB. ‘C’ program is used to determine the maximum hydrodynamic pressure where ANSYS is used to determine the maximum stress developed in the journal bearing due to the hydrodynamic pressure. By observing the results of PJB and HGJB, their working eccentricity ratios are determined. This itself would provide information about compensation of radial stiffness, load carrying capacity, pressure recovery, etc.

LASER AND FRICTION STIR WELDING BEHAVIOUR OF POLYMERS AND POLYMER COMPOSITES- A REVIEW

Original Research Article

S.G. ARUL SELVAN *1, M. SELWIN1 and M. KALIDASS1

Abstract

This literature work provides a deeper study on the welding processes like laser and friction stir welding and clear reports on their effect on the polymer materials and their composites when welded. The reason behind considering thermoplastic breed of polymers whether pure or blended with fillers is due to the fact that it attracts attention from both industrial and research applications in most cases as a replacement for metals. Polymers are known for bulk replacement but which is not favoured in the engineering field and hence in the recent past they are put into situations where they have to be joined. Among the available joining technologies for the polymers welding holds good in high performance applications. Hence welding techniques on polymers are analysed based on various valuable works of various authors of various authors and reasonable suggestions common from all the works taken are provided for clarity of thoughts.

OPTIMIZATION OF WED MACHINING PARAMETERS DURING MACHINING OF ALSIC Using RSM

Original Research Article

Nandhakumar, S1., B. Sivaraman and K. Christal

Abstract

The Optimal evaluation of wire-cut electrical discharge machining (WEDM) parameters by considers the impact of info parameters. Time On (Ton), Time Off (Toff), Wire Speed and Wire Feed. Tests have been led with these parameters in three divergent levels information identified with strategy reactions. The rate of metal removal (MRR) and surface roughness(Ra) was measured for every trial run. Aluminum Matrix Composites are increasing expanding consideration for application in aviation, safeguard. The utilization of un-conventional machining strategies in molding aluminum metal matrix composites has created extensive enthusiasm as the manufacturing of confused shapes. Wire Electrical release machining (EDM) has all the earmarks of being a fit strategy for machining metal matrix composites. The target of this work is to examine the impact of parameters like Current (I), Pulse on time (T), Voltage (V) and Flushing pressure (P) on tool wear rate (TWR), metal removal rate (MRR) and additionally surface roughness(SR) on the machining of half and half Al6061 metal framework composites strengthened with 10% SiC and 4%graphite particles. Composite manufacture utilizing blend throwing process. A focal composite rotatable plan was chosen for leading examinations. Scientific models were produced utilizing the MINITAB programming. The strategy for slightest squares system was use to register the relapse coefficients and Analysis of Variance (ANOVA) method was utilized to check the essentialness of the models created. Scanning Electron Microscope (SEM) examination was done to concentrate the surface attributes of the machined substrate and connected with the models created.

QUADRATIC-CONJUGATE-GLOBAL CRITERION FOR OPTIMIZATION OF MECHANICAL BEHAVIORS OF BIO PARTICULATED COIR-POLYESTER COMPOSITES

Original Research Article

Christal.K1, Padmavathy.S1, Sharmila Devi.G1, Jayabal.S2

Abstract

This contemporary analysis on the optimization of mechanical performance of hybrid bio particle infused natural coir polyester composites using Quadratic-Conjugate Global criterion method. The rice husk particles and groundnut shell particles are the bio particles which are used with natural coir fibers as particle reinforcements in polyester matrix. The mechanical performance such as tensile and impact of coir polyester composites bio particulated with rice husk and groundnut shell particles were evaluated for the introduction of a new range of polymer composites with natural fibers and particles. The interlaminar bond between the reinforcements and matrix of the composite materials were evaluated using SEM images. The quick collapse of natural fibers due to cracking of matrix in the polymer composites was solved in this research by including bio particles which strengthens the matrix. The most favorable fabrication considerations for enhanced mechanical properties were predicted using QuadraticConjugate Search procedure. The efficiency of this Quadratic-Conjugate search was endorsed on the achieved fabrication parameters by using confirmation trials.

EMISSION STUDY ON SI ENGINE FUELLED WITH PETROL AND ISO-BUTANOL BLENDS

Original Research Article

P.Baskaran,

Abstract

An Emission study was carried out on a 4Stroke Single Cylinder with Electrical load Spark Ignition Engine at constant speed of 3000rpm for all loads, Fuelled with petrol and Iso-Butanol blends at different proportions i.e IBu0%, IBu20%, IBu30%. All blends are by volume based Proportions. The Engine Emission parameters like CO, HC, CO2 emission readings were analyzed and discussed at Full load and partial load for the above-mentioned fuel blends compared with base line readings of petrol. The Experimental results showed that the Reduction of CO, HC, CO2 Emission levels for blended fuels when compared with pure petrol at both Full load and partial loads. From the analysis Iso-Butanol is found to be a better alternative fuel (or) fuel blend to petrol for Reduction of polluting Emissions.

Pak. J. Biotechnol. Vol. 13 (special issue-II) 2016

Published Paper of

special issue on Innovations in information Embedded and Communication Systems

SIMULATION OF MULTIMODAL BIOMETRICS WITH CRYPTOSYSTEM IN HOSPITAL SUITES

Original Research Article

Lalithamani N. , B. Sruthi

Abstract

ABSTRACT Objectives: To apply Multimodal Biometrics in the authentication process in hospital suites, fusing two Biometric traits namely face and fingerprint at the feature level to improve the security. Methods/Statistical analysis: This paper deals with using face and fingerprints, which are fused at the feature level and processed further. Majorly, techniques for pre-processing include Histogram Equalization for face, and Skeletonizing and thinning for fingerprints. In the next stage, Feature Extraction techniques like PCA (Principal Component Analysis) for face and Ridge Endings and Bifurcation extractions for fingerprint are used. Then once fused at feature level, shuffling is done and the fusion vectors are encrypted. These are used for authentication in hospital suites. Findings: In general, Multimodal Biometrics offers higher security than Unimodal when implemented efficiently. This concept can be used in hospital suites, where security is prime importance and a breach of the same can endanger the lives of patients. Application/Improvements: As mentioned, this concept can be highly useful in hospital suites, where close monitoring of access to VIP suites is necessary. Since a breach of security can be very sensitive in such places, it is important to employ maximum protection for the authentic-cation process. Areas where it could be improved further can be in increasing the number of traits for tighter security, and exploring apt fusion methods for the same to improve efficiency. Also, in future different encryption algorithms can be tested and tried.

SECURED IMAGE TRANSFORMATION USING DISORGANIZED CHART PATTERN TECHNIQUE

Original Research Article

D.Saravanan

Abstract

ABSTRACT An Enhanced disorganized chart pattern based algorithm for image encryption to improve the security of the algorithm.. The basic idea behind the proposed algorithm is to alter the coupling direction used to update the map variables. The altered coupling direction results into a totally different set of initial conditions and map variables of three disorganized chart pattern Based on experiments will show that the enhanced algorithm with chosen coupling direction can encrypts the color digital images. The image which given as input is retrieved as same as the original image while decrypting. Here many distortions take place when the image is converted pixel by pixel, this helps in high secrecy of the encrypted image.

DATABASE SECURITY INCURSION RECOGNITION TECHNIQUE USING NEURAL NETWORK

Original Research Article

D.Saravanan

Abstract

ABSTRACT Database Intrusion Detection System (IDS) is an expert system looking for evidence of attacks on known vulnerabilities of the system. It holds a statistical model of the behaviour of a user on a system under surveillance. There are several techniques, protocols, and algorithms to increase the security level of database. In such works, there is a lack of time complexity analysis of the techniques. This time complexity has occurred due to the comparison process carried out at each time the user query is given i.e., comparing the profiles of online transactions and the stored authorized transactions each time when the query is received. This system time complexity also affects the system performance in terms of their precise security. It learns the habits a user working with the computer and to raise warnings when the current behaviour is not consistent with the previous learnt patterns, thus detecting whether the user is authentic or not. The system can be implemented using MATLAB. MATLAB is a numerical computing environment. It allows matrix manipulations, plotting of functions and data implementation of data. The learning process by neural network avoids the unauthorized transactions in the DBMS and reduces the time complexity the project improves the performance of the database system. The neural network implementation will show the effectiveness of the proposed IDS technique in securing the database from the intruders. The performance of the proposed technique is evaluated by utilizing different statistical performance measures.

AN EFFICIENT RESOURCE ALLOCATION STRATEGY BASED ON IMPROVED PARTICLE SWARM OPTIMIZATION (IPSO)

Original Research Article

Naresh, T1 Department Sandip

Abstract

ABSTRACT Resource allocation is a method that is deploy to allocate the accessible resource in a best way. It is the arrangement of activities and the resource needed by those activities while returns into consideration both the resource availability and the time. The proposed method discusses optimal resource discovery and dynamic resource allocation. The proposed method consists of two phases namely resource discovery and resource allocation. For resource discovery, the proposed method uses the Hierarchical Agglomerative Clustering Algorithm (HAC). Based on the HAC algorithm the proposed tree construction is generated. After that the resources are allocated by hybrid optimization algorithm. The proposed method use the Improved Particle Swarm Optimization and Cuckoo Search algorithm (IPSOCS).

NEED OF AUTOMATION IN COMMON EFFLUENT TREATMENT PLANT

Original Research Article

Sravanthi Animireddy, T. Chandra Shekhar Rao

Abstract

ABSTRACT Common effluent treatment plant (CETP) is used to treat effluents from a cluster of Small & medium scale industrial units. CETP not only helps the industries to control the pollution, but also provides cleaner environment and services to the society. Automation of CETP has many benefits in terms of savings of chemical, energy, O&M cost in addition to generate better quality of treated water. Most of the CETPs in India are operated manually due to cost involved in automation without realizing savings of these long term hidden costs. Advance innovations in technology offers compact and economic tools to automate CETPs. Automation can be implemented at least in the areas where there is a major contribution of the total annual costs. Usage of online measurement devices can also reduce the labour cost since there is no necessity of sampling and testing in laboratory for several quality parameters and to adjust the controls according to that. Treated water quality will also be improved due to the accuracy in measurements of quality parameters and timely control of operation of different equipment’s. Extent of automation which gives the economic benefits can be chosen by doing life cycle cost analysis before selecting any automation scheme. This paper illustrates the need of automation and its advantages in automation of CETPs.

A COMPARISON OF SECRET IMAGE HIDE METHODS OF STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY

Original Research Article

Saad Al-mutairi

Abstract

ABSTRACT During the clandestine data transmission, to protect a secret data from the hackers or intruders is one of the difficult task. In this era, when technology grows, simultaneously the challenges of the technologies also increasing rapidly. In connection with that, while selecting any technology for the particular process, we are in position to check strengthen of the technology towards to the attackers or hackers. In this paper, we have been presenting a comparison statements of different secret image hide methods. To prepare this comparison, we have chosen two popular image hide methods of steganography and visual cryptography. The steganography is a secret image encode method, which will encode a secret image into non-secret cover image. On other hand, visual cryptography is an image hide method. In this method, the original secret image is split into different shares. A single share will not be described the original information. However, the original information can be retained when combining all shares together. In this proposed work, both methods are differentiated based on the different parameters of reconstruction quality, execution time, method strength and complexity.

TRAWLER OCEAN CARE SYSTEM

Original Research Article

J. Vivek1, M. Lakshmi, D. Manuel

Abstract

ABSTRACT Based on the recent survey border crossing of Indian fisherman are unsusceptible increased, to such an amenable problem a safe system must be designed. To overcome this situation a trawler ocean care system is proposed to aid the people who are crossing the border. This work is an association of hardware peripherals GPS, Microcontroller and buzzers. This device will be responsible for monitoring, alerting, controlling and stop engine, to provide a safe journey to the fisherman.

CONJUNCTIVE KEYWORD SEARCH ON E-HEALTH RECORDS BASED 0N K-ANONYMIZATION TECHNIQUE

Original Research Article

S. Sneha , P.Asha

Abstract

ABStract An electronic health care system greatly enhances the patient healthcare records which are stored in the cloud server. Searchable encryption scheme is used which enhances the search mechanism. Conjunctive keyword search helps the authorized users to access the records by giving multiple keywords, so that it becomes difficult for the attackers to guess the keyword and retrieve the records. Re-encryption scheme provides more security to the records by reencrypting the encrypted index before uploading them into cloud server. Since the patient’s healthcare records consist of sensitive information, it may be inconvenient for the patient when his records are accessed by everyone. To overcome the problem in our proposed work we introduce the concept called K-Anonymity which is used so that it gives only a partial access to the authorized users by using two methodologies suppression and generalization. This has

A STUDY ON HYPERSPECTRAL DATA IMAGING BASED ON SPATIO SPECTRAL SCANNING

Original Research Article

K. Rajakumar, S. Srinivasan

Abstract

ABSTRACT Hyperspectral data is one of the important breakthroughs in remote sensing. It has a capability of separating the different and describing the objects of same size in detail. It processes the image in the large- number, narrow and it can produce data with sufficient resolution. Hyperspectral images used to identify the spectral information and differentiate unique materials. It also provides the information by the means of very accurate and extraction of various information that relates to remote based information. Hyperspectral remote sensing purpose is to measure the various components of the Earth system that is acquired as images for scientific applications and research purpose. Hyperspectral remote sensing can be categorized the information into two ways: Feature space and Spectral space. The feature space method is not efficient because the data dimension is determined to describe the patterns. The spectral based is used for extracting anomalous pixel vector at endmember extraction. This will validate the both synthetic and real Hyperspectral data images. The scatter matrix that is preserved in the means of pixel by spatial domain and the projection of optimal discriminative is obtained with the help of scattering of spectro-spatial thus maximizing a modified scatter of information.

MULTIPLE TUMOR & INFECTION DETECTION IN MRI BRAIN IMAGE USING SVM CLASSIFIER

Original Research Article

Shrikant Burje1, Sourabh Rungta, Anupam Shukla

Abstract

ABSTRACT A support vector machine (SVM) classifier is being proposed for classification of brain tissues in magnetic resonance photos (MRI). A wavelet based totally texture features set is derived. The most useful texture capabilities are extracted from regular as well as tumor regions through the usage of spatial gray level dependence technique. The proposed technique resolves the massive trouble of category strategies. These most efficient functions are then used to categories the brain tissues into benign and malignant tumor. The overall performance of the set of rules is evaluated totally based on a sequence of brain tumor images.

ADAPTIVE CENSUS AND INTERPOLATION BASED DISPARITY ESTIMATION USING WEIGHTED AUTOREGRESSIVE MODELS

Original Research Article

Iswariya, E1 , Rajesh Kannan, R2

Abstract

ABSTRACT This paper deals with an adaptive general scale interpolation algorithm that is capable of arbitrary scaling factors considering the non-stationarity of natural images. The proposed AR terms are modeled by pixels with their adjacent unknown HR neighbors. A novel stereo matching algorithm is proposed that utilizes color segmentation on the reference image and a self-adapting matching score that maximizes the number of reliable correspondences. Modified Census Transform is a form of non-parametric local transform used in image processing within a square window to a bit string, thereby capturing the image structure. The centre pixel’s intensity value is replaced by the bit string composed of set of boolean comparisons such that in a square window, moving left to right. A new technique is used and found a solution for correspondence problem that makes use of non-parametric local transforms as the basis for correlation. Non-parametric transforms rely on the relative ordering of local intensity values, and not on the intensity values themselves. Correlation using such transforms can tolerate a significant number of images. This can result in improved performance near object boundaries when compared with conventional methods such as normalized correlation.

A REVIEW OF LUMINANCE AND COLOR INVARIANTS BASED PARTIAL MEDICAL IMAGE RETRIEVAL SYSTEMS

Original Research Article

Lakshmi R Nair , Kamalraj Subramaniam

Abstract

ABSTRACT The color of the surface is a very significant feature in classification and recognition process of the object. Additionally, the color of the object differs due to variation in illumination and condition of the surface. Research on analyzing appropriate methods for medical information retrieval is highly significant in this scenario. With the rapid growth of medical dataset in specific to the digital library is becoming a difficult issue towards search based data/image retrieval. For obtaining the best method for image retrieval, an extensive study of the previous literature is required. This paper describes an overview of estimation procedures related to RGB images’ color invariants that are prevalent currently and also provides a user interactive approach for efficient image retrieval system. Additionally,contributed towards enhancing the performance of partial image retrieval system at various illumination stages.

PHYSIOLOGICAL ANALYSIS OF HYPERTENSION PATIENTS BY MONITORING THE BRAIN WAVES

Original Research Article

R. Mohan Raheja, L. Kishore, I. Joe Louis Paul

Abstract

ABSTRACT The inability and the negligence in the detection of diseases is a major reason in the delay of treatment which may prove fatal. It is not possible for regular checkups in this time deprived world. Moreover, regular checkups are not feasible to everyone. The brain is the most interesting part of the human body. It controls the vital functions of the body and therefore any abnormality in the brain will reflect in the entire body and vice versa. The control of the brain is by the transmission of electric signals from and to the various parts of the body. The study and observation of these electrical signals will help us to find a lot of abnormalities which occur in the brain. Hence, this proposed work aims at overcoming the deficiency in time and money needed for the regular checkups. This is achieved by monitoring the brainwaves of the patient. The brainwave pattern of the patient is compared with the normal brainwave pattern. If an anomaly is observed in the patient’s brainwave pattern further comparisons with disease brainwave patterns are made. The disease pattern which matches with the patient’s pattern is identified as the disease. The patient is recommended for further tests on the disease. In this work, only hypertension patients are considered for the study of physiological analysis using Weka tool.

EXPERIMENTAL EVALUATION OF APRIORI AND EQUIVALENCE CLASS CLUSTERING AND BOTTOM UP LATTICE TRAVERSAL (ECLAT) ALGORITHMS

Original Research Article

M. Sinthuja1, P. Aruna, N. Puviarasan

Abstract

ABSTRACT Frequent pattern mining is the beginning of association rule mining. Association rule mining is the strongly scrutinized techniques in data mining. The basic algorithms of Apriori and ECLAT are the most identified algorithms for mining frequent patterns in association rule mining. This paper describes the application of these two algorithms that use many to achieve maximum efficiency with regards to turnaround time and memory capacity. Both algorithms are executed using discrete data sets and are further analyzed based on their performances. The performance analysis is based on different parameters such as support, speedup etc., with different quantities of datasets.

FREQUENCY CONTROL OF AN ISOLATED HYBRID POWER SYSTEM USING PARTICLE SWARM OPTIMIZATION OPTIMIZED PID CONTROLLER

Original Research Article

Israfil Hussain, Sudhanshu Ranjan, D.C Das , N. Sinha

Abstract

ABSTRACT The mitigation of frequency fluctuation using Particle Swarm Optimization (PSO) based controllers for an isolated hybrid power system is explored in this paper. The proposed system consists of solar photovoltaic (PV), electric water heater (EWH) and diesel engine generator (DEG) and battery energy storage system (BESS). The intermittent output power of PV and load variations cause frequency fluctuations with several adverse effects on the power system. This paper presents a methodology for maintaining system frequency within acceptable employing electric water heater as a controllable load. The generating units and EWH system are equipped with PSO based proportional–integral (PI)/ proportional–integral–derivative (PID) controllers. The solutions obtained through the optimization are capable of handling higher variations in the controllers’ gains without a significant decrease in the system performance. Also, a comparison is made between the PI and PID controllers to show the effectiveness of the proposed scheme. MATLAB/Simulink was used for simulation to verify the performance of the proposed system.

A REPUTATION BASED TRUST MODEL FOR MANET USING ENHANCED AODV WITH TBR ALGORITHM

Original Research Article

J.Gautam, B.Sudarsana Gayatri, V. Krithika , S. Shanmuga Priya

Abstract

ABStract Mobile ad hoc network (MANET) is a local which necessitate more security. The term “ad hoc” refers to self-configuring nodes that do not have a central entity to govern them. Network security plays a decisive role in MANET and the traditional way of providing impedance to the networks through firewalls and encryption software is no longer effective and sufficient. In this paper, a quantitative method based on trust evaluation for detecting malicious nodes in the Mobile ad-hoc network and endowing an optimal path for packet transmission is proposed using Trust based Routing algorithm. The intended system is a behavior anomaly based system which crafts it dynamic, robust, scalable and configurable. The proposed method is verified by running simulations with mobile nodes using the Ad-hoc on-demand distance vector (AODV) routing called as Enhanced Ad-hoc ondemand distance vector (EAODV).

ISOLATION OF BLACKHOLE ATTACK IN MANET USING MAODV PROTOCOL WITH CA ALGORITHM

Original Research Article

J. Gautam, S. Sindhuja , D. Nagavalli

Abstract

ABSTRACT Mobile Ad-hoc Network (MANET) is a self-organized system encompassed of mobile nodes without any infrastructure. Security is a decisive requisite in Mobile Ad-hoc Network (MANETs) when accessed to wired networks. Blackhole attack is a arduous issue to be addressed in MANET. Blackhole node falsely claims that it has the shortest path to the destination and dumps the packet that is supposed to be forwarded. In order to reduce the effects of Blackhole attack, we are modifying the AODV protocol and proposing counter attack algorithm that provides a efficient way to mitigate such attacks.

ENERGY RESOURCE OPTIMIZATION IN WIRELESS AD-HOC NETWORK USING DYNAMIC STATES

Original Research Article

J. Gautam, B. Lukshana Fathima, K.S. Sangeetha , P.M. Mohamed Muzammil

Abstract

ABSTRACT Wireless Ad-hoc network is the decentralized type of network and it does not rely on pre-existing infrastructure. The Energy efficiency continues to be a key factor in limiting the deploy ability of ad-hoc networks. Deploying an energy efficient system exploiting the maximum life time of the network has remained a great challenge since years. The major concern in Wireless network in recent days is Energy consumption. There are numerous algorithms proposed to overcome this issue. In this paper, we proposed a algorithm called Energy Efficiency Dynamic State (EEDS) algorithm. This algorithm is designed to increase the network lifetime by continuously monitoring the individual nodes in the network, thereby it increases the quality of service of the network.

HIGH PERFORMANCE WIRELESS COMMUNICATION CHANNEL USING LEACH PROTOCOLS

Original Research Article

Ch.Usha Kumari , M. Ramya Krishna

Abstract

ABSTRACT Wireless sensor networks take wide range of practical and useful applications. But there are many critical problems for efficient operations of sensor networks in real time applications. Sensor networks contain of number of nodes but with limited battery power and also wireless communications are deployed to collect useful information from the sensor node. It is very difficult for the sensor network to operate for a long period in an energy efficient manner for gathering sensed information. Energy saving is one critical issue for sensor networks since most sensors are equipped with non-rechargeable batteries that have limited lifetime. The power resource of each sensor node is limited. In this paper, we propose minimizing energy dissipation and maximizing network lifetime which is very important issue in the design of routing protocols for sensor networks. This paper we propose a new improved cluster algorithm of LEACH (Low Energy Adaptive Clustering Hierarchy) protocol which is intended to balance the energy consumption of the entire network and extend the lifetime of the network.

A CASE STUDY ON SELECTION OF APPROPRIATE PROCUREMENT SYSTEM FOR SMALL SCALE CONSTRUCTION INDUSTRY

Original Research Article

N.Ganapathy Ramasamy , Dhanya R

Abstract

ABSTRACT The development and practice of appropriate procurement systems helps to avoid problems related to time &cost and to attain the project specified goals. One of the characteristics of the construction industries over the last three decades or so has been the usage of various procurement methods which have investigated the criteria for their selection and performance in terms of time, cost and quality. Selecting the appropriate procurement system for construction projects is a complicated and challenging task. To assist the decision-making process, procurement selection tools and techniques have been developed. The main aim of this study is to develop a framework using Statistical Package for Social Sciences (SPSS) Software by performing Descriptive Analysis using Weighted Average Mean (WAM), Standard Deviation, Variance, Correlation and T- Test are used to compare the large scale construction industries and small scale construction industries for Construction Procurement Systems. A series of literature reviews and Questionnaire surveys were conducted to analyze the current situation of procurement system in construction industry. Traditional Procurement method is the most widely used method in the small scale and middle scale industries. Non Traditional Procurement like Design build and Engineering Procurement Construction (EPC) is being adopted by large scale industries. The framework developed in this paper gives opportunities to the small and middle scale industries to go for the Non – Traditional Procurement methods as it optimizes time and cost for the construction project by selecting the most appropriate procurement system.

SECURED MOBILE AD-HOC NETWORK WITH MODIFIED DSR AND SNUPM ALGORITHM

Original Research Article

J. Gautam, K. Vishali , P. Malathi

Abstract

ABSTRACT Security is a decisive requisite in Mobile Ad-Hoc Network (MANETs) when assessed to wired networks. MANETs are more suspicious to security attacks due to the need of a reliable centralized cloud and scanty resources. In MANET, we have malicious nodes that overcome the network protocols thereby diminishing the network’s performance. The development of mobile networks has implicated the need of new IDS models to deal with new security issues in these communication environments. In this paper, we proposed a Secured Network using Promiscuous Mode (SNuMP) which is a part of Intrusion Detection System where it can repair the malicious nodes and convert back them into a normal node for effective network performance.

MITIGATION OF DENIAL OF SERVICE ATTACK USING ICMP BASED IP TRACKBACK

Original Research Article

J. Gautam, M. Kasi Nivetha, S. Anitha Sri P. Madasamy

Abstract

ABSTRACT: Denial of Service (DoS) is a major threat in Network Communication which floods a remote host network with large amount of traffic thereby denying services to the legitimate computer requesting resources. In this paper an ICMP traceback message scheme is proposed to solve the problem of finding the true origin of packets causing DoS. The main objective is to propose a method to trace back the attacker without the involvement of reflector in order to reduce the traffic. The proposed method is a hybrid of bloom filters and iTrace. This method reduces the traffic and the number of ICMP messages. In bloom filters, edge router produces the ICMP messages and in iTrace each router generates ICMP messages.

FRUIT FRESHNESS MONITORING SYSTEM DURING TRANSPORTATION -An RFID and WSN based Monitoring System

Original Research Article

Joe Louis Paul, S. Sasirekha, S. Jesu Iswarya, R. Praveen Chandru

Abstract

ABSTRACT In India, 104 million tons of perishable products such as fruits and vegetables are transported annually between Indian cities, out of which 100 million tons of products are transported in non-refrigerated mode. If the quality change of these products during transportation is not monitored, may incur economic loss or damage to fruits. There are many systems currently available in the literature for monitoring the perishable fruits using Radio Frequency Identification (RFID) and sensor technologies. However, these systems lack in providing a comprehensive approach taking under consideration of energy consumption and compliance with the temperatures needed to preserve foods. To overcome this issue, there is an emerging need to use and integrate the efficient technologies such as RFID and Wireless Sensor Networks (WSNs) to monitor the ripening status of fruits for preventing the damage as well as to identify and track the exact presence of damage during transportation. In this work, the ripening status of the fruits can be determined by the amount of ethylene content (fruit ripening hormone) it produces using sensors and RFID. The uniqueness of the proposed system lies in identifying the condition of fruits in each box using RFID tag with unique identifier. This helps in tracking the fruit box depending upon its ripening status without even opening it. For achieving an efficient real-time monitoring, control and management of fruit freshness during transportation, an integration of WSN and RFID based system interfaced with Service Oriented Architecture (SOA) has been proposed in this work. This work aims to automate the fruit monitoring system by minimizing the system complexity and maintenance costs can be useful to suppliers with chain of warehouses, grocery retailers etc.

A SIMPLE BIT LOADING ALGORITHM FOR LONG TERM EVOLUTION-ADVANCED VEHICULAR CHANNEL

Original Research Article

Aniji John, Anitha P Mathew , Vinoth Babu K

Abstract

ABStract Increasing demand for energy efficient cellular networks has prompted considerable research on the topic green communication. Bit loading is a technique used in multicarrier communication systems like orthogonal frequency division multiplexing (OFDM) to assign bits efficiently based on the subchannel quality. In adaptive bit loading (ABL), the number of bits that can be transmitted in each subcarrier is determined by the signal to noise ratio (SNR) of the subcarrier. Margin adaptive (MA) algorithm is utilized to minimize the total transmitted energy. In this work, a simple bit loading algorithm (SBL) is proposed for a long-term evolution- advanced (LTE-A) vehicular channel to minimize the total energy required to transmit the target bits. Compared to other algorithms, SBL algorithm is less complex and convergent to the optimal solution in one iteration. The simulation results also prove that the algorithm minimizes computational complexity.

A SIMPLE BIT LOADING ALGORITHM FOR LONG TERM EVOLUTION-ADVANCED VEHICULAR CHANNEL

Original Research Article

Aniji John, Anitha P Mathew , Vinoth Babu K

Abstract

ABStract Increasing demand for energy efficient cellular networks has prompted considerable research on the topic green communication. Bit loading is a technique used in multicarrier communication systems like orthogonal frequency division multiplexing (OFDM) to assign bits efficiently based on the subchannel quality. In adaptive bit loading (ABL), the number of bits that can be transmitted in each subcarrier is determined by the signal to noise ratio (SNR) of the subcarrier. Margin adaptive (MA) algorithm is utilized to minimize the total transmitted energy. In this work, a simple bit loading algorithm (SBL) is proposed for a long-term evolution- advanced (LTE-A) vehicular channel to minimize the total energy required to transmit the target bits. Compared to other algorithms, SBL algorithm is less complex and convergent to the optimal solution in one iteration. The simulation results also prove that the algorithm minimizes computational complexity.

IMPACT OF ADVANCED PLANNING TECHNIQUE IN INDIAN CONSTRUCTION INDUSTRY

Original Research Article

N. Ganapathy Ramasamy1 , R. Devakandhan2 , Aravind3 , S. Ramasubramani4

Abstract

The aim of this research work is to study & analysis the Impact of advanced planning technique in Indian Construction industry, Construction Planning is under constant pressure to increase the quality and speed of its construction delivery processes. Construction planning plays vital role in the development of construction industry. There is still a huge discrepancy between execution and plan. Therefore, an efficient and effective planning method is intensively needed to enhance the project performance and to minimize the risk of cost overrun and delays. In Engineering and Construction, building construction schedule is prepared by visualizing 2D design documents of a building project. This process is difficult to associate mechanism in the 2D documents with their related construction activities, and then visualize the construction sequence. In advanced Planning technologies, visually representing the construction schedule along with the 3D BIM model components has the potential to aid this process by providing a common visual language for Planners. The research presented an assessment based survey to identify knowledge, features, benefits & barriers in implementation of 4D planning in construction project. Better visualization of works, reducing the conflicts between the design/execution were the key benefits in 4D planning as observed from an assessment.

AN INTELLIGENT HYBRID APPROACH FOR BRAIN PATHOLOGY DETECTION IN MRI IMAGES

Original Research Article

B.Deepa , M.G.Sumithra

Abstract

ABSTRACT Medical Image Processing is a complex and challenging field nowadays. Processing of MRI Images is one of the parts of this field for efficient brain pathology detection like tumor, asymptomatic unruptured aneurysms, Alzheimer's disease, vascular dementia, cerebral microbleeds in brain and multiple sclerosis (MS) in magnetic resonance (MR) images. The methodology used in this paper for brain pathology detection consists of the following steps: The first step includes pre-processing by a Wavelet Transform (WT) for removal of noises like Salt and Pepper noise, Gaussian, Speckle and Brownian noise, without affecting the image quality. The second step is to extract the features from the pre-processed image. The process of feature extraction is carried out by a Walsh- Hadamard Transform (WHT) methodology. The final step involves the detection of abnormality by segmenting the abnormal tissues using a combined methodology called Modified Fuzzy C-Means Clustering (MFCM) followed by Level Set (LS). The performance measure of proposed system is evaluated both by objective and subjective method. Feature extraction and segmentation is evaluated objectively by using confusion matrix and by measuring Accuracy, Sensitivity, Specificity, Positive Predictive Value (PPV), Negative Predictive Value (NPV), False Positive Rate (FPR) or Over Segmentation(OvS), False Negative Rate (FNR) or Under Segmentation(UnS), and Total False Rate or Incorrect Segmentation(InS). Subjective evaluation is done by taking the opinion of 35 expert radiologists that is average mean opinion score to corroborate the results of proposed method. From the obtained results it is understand that the proposed new amalgam technique is giving 95% accurate results for detecting abnormality in MRI brain images when compared to other hybrid methodology.

POWER AWARE ENTROPIC HIDDEN MARKOV CHAIN ALGORITHM FOR CODE BASED TEST DATA COMPRESSION

Original Research Article

S. Rooban , R. Manimegalai

Abstract

ABSTRACT Even though the scan architectures generally utilize advanced designs for testing reason, most of them remain an expensive design in test data volume and power consumption. A novel software based test data compression technique for testing System on Chip (SoC) is proposed in this paper. The proposed technique concurrently addresses the problem of reducing large test data volume and reduction of power consumption for scan testing on embedded Intellectual Property (IP) cores. In comparison to the aim of reducing only test data volume by recognizing the appearance of vector patterns and thereby eliminating don't-care bits using entropic Hidden Markov Chain (HMC) algorithm, here we address the task of decreasing power consumption. The proposed power proficient test data compression method is tested using the Verilog model of ISCAS'89 and ITC'99 benchmarks. Index Terms: Automated Test Equipment, Circuit under Test, System on Chip, Built-in self-test, low power test, Test data compression

Pak. J. Biotechnol. Vol. 13 (special issue) 2016

Published Paper of

3rd International Conference on Innovations in information Embedded and Communication Systems (ICIIECS’16) held on March 17-18, 2016, Coimbatore, Tamil Nadu, India

Articles reviewed and Plagiarism checked under the supervision of

Guest Editor, Pak. J. Biotechnol.

and

Organizing Secretary of conference

Dr. B. Nagaraj

M.E,Ph.D,MIEEE

COORDINATED CONTROL OF DFIG SYSTEM DURING UNBALANCED GRID VOLTAGE CONDITIONS USING REDUCED ORDER GENERALIZED INTEGRATORS

Original Research Article

Sudhanandhi, K.1 and Bharath S2

Abstract

This paper presents combined control of rotor-side converter (RSC) and grid-side converter (GSC) of a DFIG system during unbalanced grid voltage conditions. Here RSC is controlled to minimize the torque ripples and GSC is controlled to ensure total balanced currents and constant active and reactive power into grid by reducing ripples which are caused due to unbalance. A ROGI is used to reduce the above problems.

SIMULATION AND ANALYSIS OF SEPIC BASED MICRO-WIND ENERGY CONVERSION SYSTEM

Original Research Article

J. Brintha Jane Justin1, K.Pavithra2 and S.Rama Reddy3

Abstract

This paper deals with the Simulation and Analysis of micro-wind energy conversion system based on the permanent magnet synchronous generator (PMSG) connected to a voltage source inverter through an uncontrolled rectifier and a SEPIC (Single Ended Primary Inductor Converter). Various control strategies like PI and PID has been used for closed loop control for SEPIC based Micro-Wind Energy conversion System. To evaluate the performance of SEPIC ,the parameters such as rise time, settling time and peak overshoot voltage are considered. The generated micro-wind power can be extracted under varying wind speed and constant output is supplied to the load using controllers i.e.; PI and PID controllers . The system reduces the burden on the conventional source and utilizes micro Wind Energy Conversion System (µWECS). The system is simulated in MATLAB/SIMULINK and results are presented.

A FAST AND EFFICIENT LIFTING BASED DCT IMAGE COMPRESSION

Original Research Article

Karthikeyan N., Venkatesh V. and 1Sivakumar N

Abstract

Image compression resolves the problem of reducing the amount of data needed to represent an image without degrading the quality of the image and reduces the required time to be sent over the internet. In this research paper, a fast and Efficient Lifting based DCT image compression is described. It refers lifting filter, zigzag scanner and Huffman coder. Hence, this scheme consumes reduced memory when compared with other entropy coders such as JPEG Huffman and Arithmetic coder. Lifting based DCT compression achieves good compression ratio with low computation time than the other encoders. The experimental part deals with the results of this research work. The performance of this scheme is measured in terms of Mean square Error and Standard Peak Signal to Noise Ratio.

MODELING OF TEMPERATURE PROCESS SYSTEM AND ITS PERFORMANCE ANALYSIS USING VARIOUS CONTROL STRATEGIES

Original Research Article

P. Poongodi1 and R.Madhu Sudhanan2

Abstract

A Continuous Stirred Tank Reactor (CSTR) is a highly non linear process particularly when chemical reaction takes place. The heat energy will be either liberate or absorbed by the reactor due to the reaction. The control of temperature for this process is a real challenge due to non linear temperature changes during reaction. This paper compares the performances of the Proportional Integral Derivative Controller (PID) controller, Neural Network Predictive Controller (NNPC) and Non Liner Auto Regressive Moving Average (NARMA) controller. A novel NARMA based PID controller is proposed. The mathematical model of CSTR is obtained and the state space model is derived. The various controllers have been designed and performances were compared for the CSTR process. The proposed NARMA based PID controller shows better control of temperature than the other controllers like PID, NARMA and NNPC.

REAL TIME IMPLEMENTATION OF PID CONTROLLER FOR SWITCHED RELUCTANCE MOTOR

Original Research Article

Sridharan, S.1 and Sudha,S.2

Abstract

Many control methodologies have been introduced by so many researchers and eminent industrial engineers ranging from simple controller to P, PI, PID and much more. An effective control methodology is proposed to have seamless Speed Control of this motor using PID controllers. A reliable proposal has found effective using PID. Lucid study has made using EMC interface with appropriate switching circuits with inbuilt isolation. A simulation modeling using MATLAB has been evaluated on realtime application motors. The results on various parameter are plotted for analysis.

DESIGN OF STREET LIGHT MONITORING AND CONTROL SYSTEM BASED ON IoT

Original Research Article

D.Maheswari1,J.Raja Sekar2 and S.Santhi3

Abstract

The main objective of this paper is to form an intelligent street lighting system. In early days, the street lights are controlled manually. Avoid the manpower we have to introduce this easy technique. The newly proposed system offer higher efficiency and considerable savings in power by using LED lights. So there was much more power consumptions. Now a day, street light monitoring system is an essential factor. So we need to design and implement solar based street lighting system for low power usage. In each lamp are connected together and controlled by nearby base station. The street lamp contains several modules like LDR Sensor, PIR Sensor and Relay, which are work together and transfer information to the base station via NRF modules. Here the LDR sensor used to capture the day/Night lighting value. And the PIR sensor used to sense the human/vehicle presence on particular range. Based on those techniques the system controls the street lights. Through the communication networks the base station takes a corresponding action.

FUZZY CONTROLLER FOR V/F CONTROL OF INDUCTION MACHINE

Original Research Article

S Manoj Krishna, Avinash R K & Rahul Vijayakumar and 2Sampath Kumar S

Abstract

This paper deals with the variable frequency drive in order to control the speed of an induction machine. When compared to the various methods of speed control for induction machine, voltage by frequency control has proven to be the most adaptable. Due to its rugged nature, wide range of speed control and low maintenance, induction machines are mostly desired in industries. Recent research and development in power electronics has led to fast developments in the speed control of an induction machines area. Here the fuzzy logic technique is proposed for controlling the speed of the induction machine. A closed-loop V/f control scheme with a fuzzy logic controller gives better speed control of an induction machine. This technique is suitable for its adaptive changes in the variable load conditions. The result of the proposed fuzzy logic method is compared with conventional Ziegler-Nichols control method. The control strategy comprises of induction motor, fuzzy logic controller, inverter, filter, pulse width modulated (PWM) generator and load. The above scheme has been simulated in Matlab/Simulink ® for verifying the results.

IDENTIFICATION OF PRECISE OBJECT AMONG VARIOUS OBJECTS USING SPARSE CODING - A REVIEW

Original Research Article

Giby Jose* and P. Manimegalai

Abstract

In this specific work, Sparse Representation-Based Classification (SRC) can be extended intended for object identification. Proposed system consists of three main stages, sparse dictionary design, feature extraction and object detection. Initially a sparse dictionary will likely be designed along with large variety of different training images. It images incorporate various items including target image. Intended for feature extraction, if sparsity inside the recognition issue is correctly harnessed, the choice of features is not a critical issue. However the leading problem can be whether the volume of features can be sufficiently substantial and whether the sparse representation is the right way computed. Unconventional features such as down sampled images along with random projections perform equally well as typical features such as Eigen faces and Laplacian faces, as long because dimension in the feature place surpasses certain threshold, predicted from the theory of sparse representation in face recognition. Here down sampling process inside the images will likely be done. In assessment process the sparse dictionary typically determines the object among the other items. Extensive experiments will likely be conducted to help verify the efficacy in the proposed criteria, and corroborate the above mentioned claims.

DESIGN AND VERIFICATION OF A 4-BIT ERROR CORRECTING DECODER USING BCH CODING TECHNIQUE

Original Research Article

R.Vasanth* and V.Balamurugan

Abstract

The scope of this paper deals with the design of a high-speed BCH decoder that corrects single-bit errors in parallel manner and double, double adjacent, triple and four bit errors in in serial manner. The proposed decoder is capable of detecting, locating and correcting single bit to four bit errors that occur in the high speed memory operations and data transmission. If we consider the case of the Nano-scale memory system the probability of occurrence of the multi bit errors is high, in such case the proposed decoder is capable enough to correct the error at the faster rate. In the existing system only the single and double errors are detected and corrected ,whereas in the proposed scheme single to four bit errors are detected ,located and corrected using BCH coding technique. In the evolution of the high speed digital communication there is high chance for occurrence of the data message to get corrupted during transmission and reception via noisy channels, hence for the error free communication error correcting codes are required, one such efficient coding is the BCH code which has well defined mathematical properties .The encoder and decoder is designed to detect and correct single to four bit errors using VHDL and simulation is performed using Xilinx ISE 14.3.

A NEW MODIFIED ARTIFICIAL NEURAL NETWORK BASED MPPT CONTROLLER FOR THE IMPROVED PERFORMANCE OF AN ASYNCHRONOUS MOTOR DRIVE

Original Research Article

1B. Pakkiraiah and 2G. Durga Sukumar

Abstract

Solar energy is an important alternative out of the various renewable energy sources. On an average the sunshine hour in India is about 6hrs per day also the sun shines in India is about 9 months in a year. To generate electricity from the sun, the solar photovoltaic (SPV) modules are used. The SPV comes in various power outputs to meet the load requirements. Maximization of power from a solar photo voltaic module is a special case to increase the efficiency of the PV system. The artificial neural network (ANN) based maximum power point tracking (MPPT) controller is used to track the maximum power. DC-DC boost converter and space vector modulation based inverter are used to provide the required supply to the load. The proposed ANN based MPPT improves the system efficiency even at abnormal weather conditions. Here a lot of improvement in torque and current ripple contents is obtained with the help of ANN based MPPT for an asynchronous motor drive. Also the better performance of an asynchronous motor drive is analyzed with the comparison of conventional and proposed MPPT controller using Matlab-simulation results. Practical validations are also carried out and tabulated.

A REVIEW ON CLOUD COMPUTING TECHNOLOGIES AND SECURITY ISSUES

Original Research Article

Padmaja, K. and R. Seshadri

Abstract

Over the past two decades, the world economy has chopped-chop from manufacturing to a more service-oriented. Cloud computing profits the service industry well-nigh and elevates business computing with a new paradigm. Cloud computing is a distributed architecture that centralizes resources on a climbable platform so as to provide on demand computing capabilities and resources such as networks, servers, storage and applications with less management effort or provider’s interaction. In spite of the fact that there are many advantages to adopt cloud computing, there exists some critical barriers to adoption. The most important obstruction to adoption is security, trailed by privacy issues and legal matters. This paper gives an overview and study of cloud computing, technologies, deployment models and security issues that are present in the cloud computing industry.

MULTIPLET SLOT MICROSTRIP PATCH ANTENNA WITH SHORTING PIN CONFIGURATION FOR WIMAX APPLICATIONS

Original Research Article

1Kannagi, V., 2A. Jawahar and 3K.Dhivya, Assistant

Abstract

In this paper, a low profile, less weight and low cost microstrip patch antenna with frequency agility is used to achieve broad bandwidth with high radiation efficiency which is the basic requirement of today’s wireless application. This is achieved by cutting six symmetrical slots of unequal sizes in the rectangular patch to increase the current intensity which in turn increases the bandwidth and efficiency. The trade off between antenna size and bandwidth is compensated by introducing a shorting pin at the center line of the patch. The result is simulated using HFSS software in the middle band of WiMAX and the antenna is found to be resonating at 3.7GHz. The observed bandwidth is 51.98 percent with a return loss of -16.94dB.

ANALYSIS OF WIND SPEED DISTRIBUTIONS FOR WIND ENERGY POTENTIAL

Original Research Article

T.Archana1, P.Sathishkumar2, V. Rajendran3 and S.Jerritta4

Abstract

Wind Energy, i.e., the renewable source of electrical energy produced uses the wind resource connected to an electrical system. It is necessary to accurately estimate the wind potential to harvest the wind power. The objective of this study is to describe the probability density function of various distributions that provides better model for the wind speed characteristics. The distributions used are Weibull, Gamma, Extreme Value, Lognormal, Rayleigh, Generalized Extreme Value distribution. At the end conclusion are drawn considering the best-fit and the statistical error prediction of the Wind Assessment data.

DEPARTMENT – STUDENT LIBRARY USING TWIG PATTERN QUERY PROCESSING OVER ADMIN-USER LOGIN PRIVILEGE

Original Research Article

1ALBERT MAYAN J., 2SURYA, B., 3PRANOY PRABHAKAR, 4PRINCE KUMAR

Abstract

An xml twig pattern query processing library, an energy and latency efficient XML dissemination scheme for the system. Wireless broadcasting is an effective information dissemination approach in the wireless environment because of the following benefits. The server can support a massive number of clients without additional costs. The broadcast channel is shared by many clients and the clients can receive data without sending request messages that consumes energy. In Wireless XML broadcasting, the broadcast server retrieves XML data to be disseminated from the repository. An XML stream is organized to enable a selective access scheme for simple XPath queries, by borrowing the path summary technique, which was originally devised for indexing semi-structured data. Using Lineage Encoding, to support evaluation of predicates and twig pattern queries over the stream.

SPLIT RECTANGULAR STRUCTURED DIFFERENTIAL BAND PASS FILTER WITH GOOD COMMON MODE SUPPRESSION

Original Research Article

J.Megala1, H.Umma Habiba2, C.Aarthi3, P.Archana3 and S.Asmath Jabin3

Abstract

A Differential Band Pass Filter (DBPF) with improved common mode suppression is focused in this paper. A Cross shaped resonator (CSR) with loaded coupled structure and capacitive termination is designed along with the split rectangular structure (SRS). This loaded lump capacitor offers an improved bandwidth. The SRR offers better Common Mode (CM) suppression. The length and Width of the Micro strip lines are adjusted to produce a widened Stop band under the CM operation. This DBPF centered at 3.5GHz and the suppression is better than -20 dB. The CSR is attributed by differential mode (DM) transmission poles (TP) and DM transmission zeroes (TZ).The loaded structure has DM and CM TZs, with these CM TZs the suppression is better. The main purpose of this design is to improve the bandwidth. The Fractional Bandwidth (FBW) of about 3 dB is achieved for the range of about 2 to 5 GHz. The proposed design results are similar to theoretical and simulated results.

DEFENSIVE WRIST BAND USING RASPERRY PI

Original Research Article

Santhosh Krishna.B.V. 1 , Akshyalakshmi, A.M. 2 , Megaraj Begam, N. 3 , Janani, N.

Abstract

In day to day life women and children abusement are increasing and in most of the cases offender will get escape due to lack of evidences, In order to overcome this situation our project is proposed which is initiated by human action. In this the victim can send panic and alert message and also collect evidences in the form of images. Itisalsogivenwithanoptionofswitch button,falldetector and pulse detector toactivate thesystem.Thearmband would haveacontrollerwith GSM/GPSkit wireless camerainterfaced.Thiswirelesscamera is usedforcollecting images.Ahumanactionwouldinitiate thesystem.Oninitiation, thevideocollectedis livevideostreamedto theControlroom.An alertmessagealong withthelocation issenttoapredefined MobileStationuntilthesystem isreset.Sincechangein LongitudeandLatitudeissentcontinuously, thepersoncanbe tracked.Thesystemisdesignedalsotobe usedasanalert system duringmedicalemergency.

A MODEL SYSTEM FOR EFFECTIVE CLASSIFICATION OF SOFTWARE REUSABLE COMPONENTS

Original Research Article

Ramu Vankudothu1 and P.Shireesha2

Abstract

Much of the research and development in Component retrieval is aimed at improving the effectiveness and efficiency of retrieval. Effective software component retrieval from a repository is the aim of the ongoing research. In software component repository thousand of components are stored using various classification techniques. Software components have certain attributes associated with them, and each attribute has relative importance for that component, which is called as weights. Retrieving the components considering these features becomes more difficult and time consuming. The focus is to select the best component from a repository that can be reused. In the proposed system a component repository is developed and best components are retrieved in a two step process. The first step gives all the relevant components, and the second step gives the best component to the user. The first technique used is simple keyword based retrieval and second technique is genetic algorithm. Genetic algorithms give satisfactory results for those components which have attributes and weights. The genetic algorithms based technique is very effective when the repository size is very large. This paper presents classification and retrieval of software reusable components by using a classification and also the selection of best component. The selection of best component or optimal section from retrieved components is much more difficult than simple retrieval. Finally experiments demonstrate results for displaying most relevant software reusable components.

MODELLING AND CONTROL DESIGN OF THREE PHASE-FOUR WIRE UPQC FOR POWER QUALITY IMPROVEMENT

Original Research Article

Iswarya R1 and Jayashree S2

Abstract

Unified power quality conditioner is the combination of series active power filter and shunt active power filter. The purpose of series Active power filter is to compensate source side distortions. Purpose of using shunt active power filter is to compensate load side distortions. The neutral current flow is considered to be major distortion in distribution system.Inorder to harmony the load current and neutral current flow, three phase four wire distribution is used. Fourth leg is used in the shunt part of the inverter for neutral flow current. Unbalance is considered to be serious issue in transmission and distribution system. By using UPQC above problem can be overcome. Hysteresis controller is mainly used to control the gating pulses of the inverter. The simulation results based on MATLAB/Simulink are presented to show the effectiveness of the balanced load current in three phase four wire distribution.

A NOVAL APPROACH IN SMART STREET LIGHTING CONTROL SYSTEM

Original Research Article

N.Gayathri and C.Akila

Abstract

The innovation in smart lighting technology acts as new intelligence to the current network system. Through this automation, the system is not only going to get integrated but also turns into communicable all over the country. The whole system will be monitored by the hub and the usage, malfunction intimation is given to the servers through SMS and mail. Hence it’s time for the consumers and also the suppliers to behave smart or else they will become eventually receiving, highly billed statements. This paper extends an idea of having a power hub which has regulated over all lighting system individually. The hub detects the intensity, position control and decrease the load usage by turning off unwanted loads with a priority that is set by the controller. The power hub can also monitor the energy usage and creates an order of significance among the loads, thus providing intelligence to the current grid system. This paper also enable utilities to integrate, interface with smart governing system and intelligently control the lighting and also detect the malware functioning which enable communication between street lights and servers to provide professional services in affordable way-machine to machine communication

A META HEURISTICALGORITHM FOR OPTIMAL DATA STORAGE POSITION IN WIRELESS SENSOR NETWORKS

Original Research Article

R. Mohanasundaram1 and P. S. Periasamy2

Abstract

Micro-Electro-Mechanical System (MEMS) is a wireless networking technique in which the background data is monitored and collected using wireless sensor networks. An additional requirement in this technique is to store the data for future retrieval and analysis purpose. This makes data storage become a more fascinating issue in wireless sensor networks. In data storage approach using storage node in the network is to choose suitable positions for storage a node becomes an essential problem. In this paper the above mentioned problem is addressed in wireless sensor network without any of the topology assumptions. Firstly, modeled the problem about data storage positions in theoretical manner and the non efficient heuristic algorithm called Particle Swarm Optimization is proposed to find the suitable positions for k storage nodes while the total energy cost of data transmission is minimized. The algorithm is implemented in a wireless sensor network simulator. The results of the experiments show the feasibility and efficiency of the proposed heuristic algorithm.

DESIGN AND SIMULATION OF HYBRID SYSTEM FED MULTIPLE INPUT SINGLE OUTPUT CUK DC-DC CONVERTER

Original Research Article

Anto jude rajeshkumar M. and Sripriya,R.

Abstract

This thesis entails the design of a multiple-input CUK dc-dc converter. The converter will be used to interface multiple power sources such as those obtained from renewable energy sources.This paperpresents a new system configuration which allows thetwo sources to supply the load separately or simultaneously depending on the availability of theenergy sources. The inherent nature of this Cukconverter is that the additional input filters are not necessary tofilter out high frequency harmonics. Harmonic contentis detrimental for the generator lifespan, heating issues,and efficiency. Results from the theoretical calculation and simulation are presented in the report which demonstrates the functionality and performance of the proposed converter

NOVEL FIR ADAPTIVE FILTER STRUCTURES FOR RADAR APPLICATIONS

Original Research Article

Lavanya, M. and Kalaiselvi, A.

Abstract

This paper presents the implementation of CORDIC( Coordinate Rotation Digital Computer) incorporated KA 3- way structures for adaptive filters. FIR Adaptive filter is used in RADAR to get the desired signal from the cluttered signal. FIR Adaptive filter requires more area and power consumption. Several optimization methods are proposed to reduce area and increase the speed. CORDIC algorithm are widely used in RADAR application for it’s simple architecture. CORDIC structure occupies less area than MAC unit. The speed on the system is improved by combining CORDIC and KA 3- way algorithm. KA algorithm can done in K way.In this proposed design CORDIC and KA-3 way are combined to get area reduction and high speed .The CORDIC incorporated KA 3-way is compare with CORDIC incorporated KA- 2 way structure. KA 3-way gives better performance than the previous design.

AUTOMATIC TRACKING OF VEHICLE TAILLIGHTS USING MORPHOLOGICAL IMAGING TECHNIQUE

Original Research Article

T. Selvi1, T. Vijaya Kumar and N. Ramya Devi

Abstract

In image processing concept the field of mathematical morphology contributes to a wide range of operators; all the concepts are made with respect to set theory. The operators used in the analysis are made for the analysis of binary images and common usages such as noise removal, edge detection, image enhancement and image segmentation. The algorithm used to detect and track the vehicle headlights or tail lights and alert the signals using embedded camera which is mounted in the vehicle and it also count the cars which is passing on both sides of the movable vehicle. The designed system is very low-power and process can be noticed and controlled interms of an embedded smart camera. In contrast to the existing system the addresses are made either daytime or nighttime detection, the presented system provides the ability to track and detect alert signals regardless of lighting conditions. The mobile vision system has been tested in MATLAB tool which detects the actual traffic scenes and the results obtained may be compared with respect to demonstrate the performance of the algorithm.

HIGH SPEED CLOCK DISTRIBUTION NETWORK USING CURRENT MODE DOUBLE EDGE TRIGGERED FLIP FLOP WITH ENABLE

Original Research Article

1Remil Anita.D, and 2Jayasanthi.M,

Abstract

In this paper, a low power current mode double edge triggered flip flop with enable design is presented. A simple current mode conditional gate transmitter design is used to reduce the circuit complexity. The current mode conditional gate transmitter is combined with the current mode double edge triggered flip flop with enable(CMDETFF) to provide one-to-many signalling which is very useful for clock distribution network. In this paper we show that when current-mode (CM) clock distribution network is used, average power can be reduced when compared with voltage-mode (VM) clocks.

DIRECT TORQUE CONTROL SCHEME FOR INDUCTION MOTOR FED BY FAULT TOLERANT VSI USING SPACE VECTOR MODULATION

Original Research Article

Jayashree D. and S. Nagarajan

Abstract

In most industrial and manufacturing process, the induction motor drive systems are exposed to overloading and hard environmental conditions, which may lead to fault in inverter and affect the load. So in order to overcome the effect, a fault tolerant scheme for SVM based inverter fed induction motor drive was designed. To check the performance of the fault tolerant inverter, open circuit and short circuit fault was introduced in the inverter circuit. The output voltage and current are observed. It is observed that the performance of fault tolerant is similar to the healthy VSI. This is verified by experimental results also. An efficient method of induction motor control is the direct torque control (DTC). Simulation results from the classical and improved DTC are presented and compared. Result shows that the torque, flux linkage and stator current ripple are decreased with the improved DTC.

COMPENSATION OF VOLTAGE SAG USING LEVEL SHIFTED CARRIER PULSE WIDTH MODULATED ASYMMETRIC CASCADED MLI BASED DVR SYSTEM

Original Research Article

G.Boobalan1 and N.Booma2

Abstract

The Dynamic Voltage Restorer ,a custom power electronic device that is used to inject voltage in series and in synchronism with the distribution feeder voltages in order to compensate for voltage sag/swell.In this paper, a MLI based DVR using Multi carrier pulse width modulation technique is being proposed for compensation of sag/swell in distribution system.Using level shifted carrier pulse width modulated asymmetric cascaded MLI based DVR instead of H-bridge based DVR, the quality of the injected voltage gets improved and the filter size gets reduced.Proposed model is simulated in MATLAB-Simulink and simulation results prove that the proposed model is the most effective solution for the problem of voltage sag/swell.

REVIEW EXTRACTOR AND PERFORMANCE ANALYZER BY OPINION MINING TECHNIQUES

Original Research Article

Nivetha.N B.E.1 and R. Anitha2

Abstract

Many enterprises devote a significant portion of their budget to New Product Development (NPD) and marketing to make their products distinctive from those of competitors, and better fit the needs and wants of consumers. Hence, knowledge and feedback on customer demand and consumption experience has become an important information and asset for enterprises. Knowledge of the customers about the product reflect the needs of the market. Product design and planning for production lines be integrated with the knowledge of customers and market channels. The knowledge of customers and market channels be transformed into knowledge assets of the enterprises during the stage of NPD. Utilizing the feedback of the customers to categorize the performance of the product, the Apriori algorithm is a methodology of association rule for data mining, which is implemented for mining demand chain knowledge from channels and customers. Knowledge extraction is illustrated as knowledge patterns and rules in order to propose suggestions and solutions to the case firm for NPD and marketing. Ordering of product to the manufacturing company can be done. Sales report analyzes process is carried out by the manufacturing company.

ANALYSIS AND SIMULATION OF QUASI Z-SOURCE INVERTER SYSTEM FED PMBLDC MOTOR

Original Research Article

V.Madhan kumar1, T.Siva2 and S.Rama Reddy3

Abstract

The major players in renewable energy generation are photovoltaics (PV), wind farms, fuel cell, and biomass. These distributed power generation sources are widely accepted for microgrid applications. PMBLDC motor is connected at the output side which acts as a load and efficiently utilizes the power obtained from renewable energy generation. This obtained power is used to run the PMBLDC motor through quasi Z source inverter. qZSI provides high boost voltage capability and highly efficient single stage boost conversion. The main feature of qZSI is power factor correction. The qZSI employs a unique impedance network that couples the inverter main circuit to the dc source and load. quasi-Z-source inverter has high efficiency and the input current is continuous, suppress inrush current and avoid shoot through fault in inverter when compared to Z-source inverter. The proposed topology of PMBLDC motor is to reduce input current ripple and delivering improved THD. The operating principal of the proposed quasi-Z-source inverter based PMBLDC motor is described and Matlab/Simulink simulation is presented to verify the proposed concept and theoretical analysis

SURVEILLANCE ROBOT WITH OBSTACLE AVOIDANCE CAPABILITIES AND PIR SENSOR

Original Research Article

Mythili N.1, Swathi V.2 , Oviya S. K. and Karthikeyan S

Abstract

Self-propelled patrolling vehicle can patrol periodically in the designed area as a surveillance robot to ensure the safety like men do. The proposed robot based on the self-propelled vehicle not only can save manpower but also ensure the operation of surveillance being well performed in restricted forests. Due to the limitation of manpower and the fixed camera positions, using surveillance is different from the traditional patrolling system. The paper proposes a self-propelled patrolling vehicle which can move automatically to a wider range and record the monitored video of human activity to improve the performance of the traditional patrolling system. The robot can move in and around the restricted areas, sense the presence of human beings and alerts the security booth through an alarm. The record the activities of the human is sent to the security station. Keywords: surveillance , PIR sensor , video transmission , robot

HYBRID CONTROL STRATEGY TO ENHANCE THE PERFORMANCE OF PHOTO VOLTAIC SYSTEM

Original Research Article

G. Rohini1, V. Jamuna2 , J. Cynthia nancy , A.Jenifer

Abstract

This paper presents a isolated high boost ratio DC-DC converter for aerospace application. The proposed converter utilizes a hybrid transformer to incorporate the resonant operation mode into a traditional high boost ratio active-clamp coupled-inductor (ACCI) pulse-width-modulation (PWM) DC-DC converter, achieving zero-voltage-switching (ZVS) turn-on of active switches and zero-current-switching (ZCS) turn-off of diodes. As a result of the inductive and capacitive energy being transferred simultaneously within the whole switching period, a high boost ratio is achieved. Moreover, since both main and auxiliary switches can be turned on with zero-voltage-switching, switching loss can be reduced, and conversion efficiency can be improved significantly. The voltage stresses on the active switches and diodes are also maintained at a low level. Various control strategies have been developed and applied on the converter circuit. As the line and load fluctuates in nature, efforts are taken to regulate the output voltage at the required design value .Simulation of the converter is carried out in MATLAB/Simulink software.

DECENTRALIZED WEIGHTED K-MEANS FOR CLUSTERING LARGE DATASETS OVER PEER-TO-PEER NETWORK

Original Research Article

BINJU THANKACHAN1 and S. V. SUDHA2

Abstract

For several Enterprise Applications, increase of data volumes turned to be infeasible to be kept in a single machine. Distributed storage has become the most efficient way for maintaining huge amounts of data. Consequently, Distributed Data Mining(DDM) become an active research area. Distributed Data Mining applies techniques to mine distributed data sources by avoiding the necessity to first collect the information into a central site. This has a significant appeal when issues of communication cost and privacy place a restriction on traditional centralized methods. The paper describe a general fully decentralized clustering method to cluster distributed data across peer-to-peer environments. The proposed methodology can be instantiated to partitioned-based clustering algorithm. Nodes gradually build a summarized view on the global data set which is the basis for executing weighted versions of the clustering algorithm to build clustering model. Through experimental results the effectiveness of method to achieve a high-quality global clustering solution is demonstrated, which approximates centralized clustering.

PIXEL BASED ADAPTIVE SEGMENTER FOR ROBOT’S NAVIGATION IN INDUSTRIAL APPLICATIONS

Original Research Article

R. Sherin Grace and L. Amuthaswaminathan

Abstract

The robot in the working environment should be provided with good vision for detection and avoidance of the obstacle present in the path. The proposed method called Pixel Based Adaptive Segmenter (PBAS) is an image segmentation technique that follows a nonparametric background modeling paradigm which segment and extract the details about the obstacles from the static background. In the PBAS, the background update is based on a learning parameter and the foreground decision depends on a decision threshold. The Fire Bird V robot is used here to implement the proposed approach i.e. the PBAS segmentation algorithm. The camera pod mounted on the robot senses the obstacles present in the vicinity. The video sequence is transmitted to the PC through the transceiver in the camera. In PC, the TV Home Media is used to display the video and the segmentation process is carried out in the MATLAB R2104a. The segmentation algorithm is applied on the image frames of the video sequence for segmenting the dynamic foreground from the static background. The decision making is performed over time to choose an alternative path for avoiding the obstacle and the direction is indicated to the Fire Bird V robot via the wireless ZigBee module. Thus the proposed method can effectively segment the image frames for detecting the obstacles in the vicinity of robot and the decision making can be carried and finally it makes the direction better for avoiding the obstacles by providing the details about the unknown surface.

EXTRACTION OF FETAL HEART RATE AND RESPIRATORY RATE FROM ABDOMINAL ELECTROCARDIOGRAM

Original Research Article

J.Shamira* and R.Tamilselvi**

Abstract

The major problem in modern obstetrics with respect to fetal monitoring is the difficulties to extract information from the fetus to know its actual health condition .The Fetal Electrocardiogram (FECG) is used for the calculation of the fetal cardiac frequency and in the observation of the fetal acidosis. Multidimensional Independent Component Analysis (MICA) is one of the improved advanced signal processing technique which is to be used for separating the FECG from the Mother ECG(MECG) and the interferences. MICA is an extension of Independent Component Analysis(ICA).After the extraction of FECG Pan- Tompkins method is used to extract Fetal Heart Rate(FHR) in order to determine fetal condition. Also in addition the Fetal Respiratory Rate (FRR) is also extracted to know the fetus condition. FHR and FRR plays a major role in determining the fetal health condition exactly.

DESIGN OF INTERLEAVED BOOST CONVERTER BASED PV SYSTEM WITH MAXIMUM POWER POINT TRACKING

Original Research Article

S.Joseph Sam Immanuel1 and N.Booma2

Abstract

In this work, the use of a DC-DC converter for control of photovoltaic power using Maximum Power Point Tracking (MPPT) control mechanism is studied. First the photovoltaic module is analyzed using SIMULINK software. The main aim of the work is to make a comparative study between the boost converter and interleaved boost converter which is used along with a Maximum Power Point Tracking control mechanism. The MPPT is responsible for extracting the maximum possible power from the photovoltaic and feed it to the load via the boost converter or interleaved boost converter which steps up the voltage to required magnitude. The main aim will be to track the maximum power point of the photovoltaic module so that the maximum possible power can be extracted from the photovoltaic system. The algorithm utilized for MPPT is P&O algorithm. Simulation results proves that MPPT used along with interleaved boost converter is better than the normal boost converter. The simulation has been accomplished in software of MATLAB Math works(2012b)

PARALLEL CONNECTED BUCK FED SEPIC CONVERTERS SYSTEM FOR WELDING APPLICATION

Original Research Article

S.Vinod1 and S.B.Thalapathi2

Abstract

This paper deals with the control of parallel converter system using PI controller.The Parallel converter is widely used for various industrial applications. The dc-dc converter is the most used topology for parallel converters.This project deals with the design, modelling and simulation of dc-dc converters for the parallel converter system. The parallel converter system with dc-dc converter uses two stage conversion processes. The aim of this project is to design a closed loop control using conventional and intelligent controller for parallel converter applications.The above two controllers are implemented for buck fed SEPIC(Single Ended Primary Inductor Converter) converter then it is connected in parallel. The closed loop controller response is verified for step change in load to maintain load voltage regulation.The performances of the conventional controllers are tabulated

ANNOTATION OF SEARCH RESULT RECORDS FROM WEB DATABASES USING AN EFFICIENT FREQUENT PATTERN CLUSTERING (EFPC)

Original Research Article

V.Sabitha1,2 and S.K.Srivatsa3

Abstract

An astonishing system used for storing data which can be accessed through a website is referred to as a ‘web database’. A flexible range of activities are carried out through web database. Therefore, it is important to design a proper database which involves choose the accurate data type for each field in order to reduce memory use and to add to the speed of access. Since, tiny databases do not cause any important problems, enormous web databases can grow to millions of entries and hence need to be well designed to work effectively. Thus the motive of our research is to decrease the memory and add to the speed of access in a web database. In this paper, we have introduced a machine learning technique based annotation to increase the speed of search result records in web database and give meaningful labels. The proposed technique is capable to efficiently reduce the recollection and add to the speed of access in a website.

LOW POWER SECRECY RATE OPTIMIZATIONS FOR MIMO SECRECY CHANNEL WITH A COOPERATIVE JAMMER

Original Research Article

P.Rajkumar* and I.Rexline Sheeba

Abstract

In this paper, a novel communication scheme is to improve the power and secrecy rate of the wireless communication. Compared to the existing system the proposed system will be more efficient of hardware cost, area and speed, because we are using FPGA to implement this architecture, in the existing system they are implemented in hardware circuit level, not in FPGA. In the feature of FPGA offer a number of paradigms to speed up calculations in a hardware software co-design environment. They are relatively cost-effective as compare to ASICs and due to flexible in nature, hardware resources are utilized in an effective way. The area, power, and cost are to be reduced in the hardware. The proposed implementation will be designed into Xilinx S6 FPGA, and finally we provide the power consumption report, synthesis and area report at different frequency range.

RFID BASED AUTOMATED CONTROL AND DETECTION SYSTEM FOR TRAFFIC VIOLATION

Original Research Article

K. Priya1, M. Yamini1, S. Pavithra, S.Shalini devi. and Shaik Thasleem Banu 2

Abstract

Safety and comfort of road users is becoming mandatory. Hence a reliable and safe system for traffic control and management is required. The objective of this project is to introduce a system which detects stop line violation during red light running and thereby we can trace each individual vehicle. It also captures the invalid license, road tax, FC, insurance and chassis of a vehicle. The proposed system includes two modules namely vehicle unit,traffic unit. Vehicle unit consists of [2,3]PIC(Peripheral Interface Control),GSM(global system for mobile communication),RFID tag whereas in traffic unit it consists of MAX232, RFID reader.

INERTIAL MEASUREMENT SENSOR FOR ACCURATE DETECTION AND NOTIFICATION USING INTERNET OF THINGS

Original Research Article

A.Suresh Kumar1, D.Surendran2 , S.Keerthana3 and Kiruthika4

Abstract

If vehicle accident information could be intimated to an emergency service or a rescue center automatically by tracking the accurate location valuable human lives could have been saved. This paper focuses on determining the exact location of the targeted accident vehicle. The accident is detected by the data fusion of drift, deceleration, vibration, speed strength of a vehicle with the Timing Inertial Measurement Unit device which senses all the possible ways for an accident to occur and gives input to arduino for intimating the nearest emergency center.

DESIGN OF A SINGLE SWITCH DC-DC CONVERTER FOR PV PUMPING SYSTEM

Original Research Article

Keerthana.K1(keerthithamizh21@gmail.com) , Suganthi.K2(suganthi@svce.ac.in)

Abstract

The purpose of this project is to have an uninterrupted operation of a PV Pumping system. To achieve this a single switch non isolated dc/dc converter for a standalone system is proposed. The converter is formed by combining a buck converter with a buck-boost converter. This integration also resulted in reduced repeated power processing, hence improving the conversion efficiency. With only a single switch, the converter is able to perform three tasks simultaneously, namely, maximum-power-point tracking (MPPT), battery charging, and driving the pump at constant flow rate. To achieve these control objectives, the two inductors operate in different modes and duty cycle control can be used to manage MPPT and output voltage regulation, respectively. The prototype converter was implemented using MATLAB software with maximum efficiency.

ENHANCED SECURITY IN ATM TRANSACTIONS USING GSM

Original Research Article

S.Sudharani, K.Suriya, R.Swapna, M.Varshini1 and Shaik Thasleem Banu2

Abstract

Now-a-days the usage of ATM Cards has been increased globally for providing various Banking Services. As its usage increases, fraudulent activities using ATM cards also have been increased. This paper mainly concentrates on improving the security of the ATM Transactions by generating an OTP-One Time Password using GSM.Once the ATM card is inserted a message containing the required Pin number to access the account is sent to the customer’s mobile. The Proposed system consists of a Transmitter & aReceiver Module, where the Transmitter module includes the ATM Machine which is represented here by an ARM Microcontroller along with a GSM module for sending the generated OTP to the customers. The Receiver was the mobile phone of the customer. The main outcome of the paper is to provide aneasy access & to detect the fraudulent transactions and avoids the fraud before it happens.

EVALUATION OF VIDEO IMAGE CONTENT EXTRACTION AND INFORMATION RETERIVAL USING ONTOLOGY

Original Research Article

A.katherine Sylvia* and E.V Manju

Abstract

Video data consist of raw data and heavy low-level feature content. Only through deep understanding of the video content the retrieval rate will be high In this paper, the ontology based video content analysis and extraction methodology where discussed. Initially the work carried out with respect to multimedia data was discussed. With respect to video event, capturing the elegant content is the cumbersome task. The evaluation of different event extraction process using object extraction, spatial and temporal relationship with respect to event is summarized. With this evaluation this paper opens a way for effective domain specific ontology creation of video content extraction. This paper mainly focuses on real-time sport domain based video content extraction.

AUDITORY EVOKED POTENTIALS BASED DETECTION OF HEARING THRESHOLD USING PSO NEURAL NETWORK

Original Research Article

1Kamalraj Subramaniam, 1Sridhar K P, 2Paulraj M P

Abstract

Hearing loss has been the most prevalent sensory disability throughout the world. In Malaysia, National and Hearing Disorder Survey has reported that the prevalence of hearing disorder is about 17.14% with an estimated population of 28.8 million and 1.5% newborns have the onset of hearing impairment. A conventional hearing screening test’s applicability is limited as it requires a feedback response from the subject under test. In this paper, a simple method based on auditory evoked potential (AEP) is proposed to classify the hearing level of a subject. AEP signals are unilaterally recorded with monaural acoustical stimulus from the normal hearing and abnormal hearing subjects and the correlation between the brain dynamics and the hearing threshold response has been observed. From the recorded AEP signals, independent power spectral features (delta, theta, alpha, beta, and gamma) are extracted. A particle swarm optimization (PSO) learning algorithm is applied to a dynamic feedback neural network and a neural network model was developed to associate features with the normal and abnormal hearing levels. The PSO neural network employed with the independent spectral gamma band features has a maximum classification accuracy of 83.45% and 85.77% for the left and right ears across 20 subjects. This study indicates that the gamma band has a higher power value for hearing loss participants while compared with the normal hearing participants. The gamma power establishes a specific sensory code and exhibits a high sensitivity level to discriminate the normal and abnormal hearing level.

DESIGN AND SIMULATION OF HYBRID RENEWABLE ENERGY SYSTEM WITH SINGLE DC-DC CONVERTER FOR GRID CONNECTED DISTRIBUTED GENERATING SYSTEM

Original Research Article

R. Karthigaivel and A.S.F.Subhamathi

Abstract

This paper presents a newly modified hybrid PV-PMSG based distributed generation system proposed to reduce the system complexity with a single DC/DC boost converter driven at its peak power point. The proposed work consists of a PV MPPT controlled wind generator and PV which is the two input sources fed to the inverter which tracks the peak power point. The energy from PV is directly connected to the inverter which was given through the DC bus. The proposed work has lesser conversion stages due to less number of converters. These two sources use the current control technique to draw its peak power by modifying inverter current. To obtain peak power from these two sources, two new controllers were introduced. Finally, a DC/DC boost converter was designed the combined operation of both the controllers has been displayed and the simulation results are obtained using MATLAB.

PERSIVE INITIATED PEER DISTTRIBUTION MULTIPLEXING

Original Research Article

IFHE University, IBS Hyderabad, Telangana 501 203

Abstract

There is an emerging market for IPTV. Numerous commercial systems now offer services over the Internet that is similar to traditional over-the-air, cable, or satellite TV. Live television, time-shifted programming, and content-on-demand are all presently available over the Internet. Increased broadband speed, growth of broadband subscription base, and improved video compression technologies have contributed to the emergence of these IPTV services. This we proposed receiver based peer division multiplexing method. The experiments prove that the proposed method effective one.

PERFORMANCE ANALYSIS OF MPPT ALGORITHMS FOR PV ARRAY FED SEPIC CONVERTER

Original Research Article

1S.K.Nandhakumar and 2P.Alageswari

Abstract

This work deals with the application of Maximum Power Point Tracking (MPPT) Algorithm like Perturb and Observe and the Incremental Conductance algorithms for photovoltaic (PV) applications using MATLAB/SIMULINK. These algorithms are applied to a Single Ended Primary Inductor Converter (SEPIC) using a mathematical model. The proposed methodology algorithm can be expanded to a various class of converters which is capable for photovoltaic applications. The SEPIC converter provides the close loop characteristics. The mentioned algorithms i.e. Perturb and Observe and Incremental Conductance algorithms are compared in terms of their fastness and error for the proposed Single Ended Primary Inductor Converter.

A QUASI Z-SOURCE INVERTER WITH BATTERY FOR PV POWER GENERATION SYSTEM

Original Research Article

1F.X.EDWINDEEPAK and 2D.SIVAPRIYA

Abstract

The Demand of renewable energy sources for power production is rising from the period of time. Solar power plants are play vital role in supplying increased power challenge.PV array with battery based quasi z source inverter makes more reliable under PV fluctuations. The energy storage device is integrated to ZSI topology with no requirement for an extra charging circuit. This modified system obtains the operating characteristics from the conventional ZSI, with ability of operating under low renewable (PV) power conditions. In order to work below this circumstance, an energy storage device capable of managing the load demand for a period of time is required. A way to add the energy storage device is to install a charger circuit that integrates it to the DC voltage rail of inverter. However, this proposed system presents another way to integrate the energy storage device without an extra charger circuit.

DESIGN AND CONTROL OF BIDIRECTIONAL DUAL ACTIVE BRIDGE RESONANT DCDC CONVERTER

Original Research Article

K PALANIVEL RAJAN and K KARTHIKA

Abstract

The DC-DC converter which is capable of transferring the power in both the directions is proposed. The existing system has the DC-DC converter based on immittance network is proposed which is acting as filter and to achieve unity power factor. This immittance network is helpful to attain the resonant condition. It is making the system complex and the efficiency of the system is decreased. To overcome this the proposed system has the resonant and dual active bridge converter. It produces the resonant condition by the system configuration. It works in normal as well as over current operation. In the normal operation, the converter carries out the resonant condition by the soft switching techniques such as ZVS and ZCS, attained by frequency control. In the over current operation, the diode conducts the electric current in only one direction and prevents exceeding the reference value and across the capacitor. This is used to protect the circuit from over current. It is functioning partly as resonant converter and partly as dual active bridge converter with the constant switching frequency. Thus over current protection is afforded by the diode clamping and the power flow analysis is done by the boost and buck modes using the simulation software PLEXIM.

PRIVACY POLICY INFERENCE TO AVOID CONTENT A SED IMAGE SEARCHING IN CONTENT SHARING SITES

Original Research Article

Yamini Kumar, LydiaJeba. J

Abstract

Content sharing sites allows users to create connections and share data in the internet with other users of identical interest and ideas. Thousands of people work online these days and share their personal pictures with many web services. Retaining the privacy policy on such social networking site s has developed into one of the major problems. To address this need we put forward a technique called adaptive privacy policy prediction on images and data uploaded by the user. The personalized privacy is build based on the information and the settings given by the user. We study the part of social connection, image substance, and meta data as could sensibly be expected markers of client's security. We put forward a two-level system which standing to the client's available history on the site manages the best reachable security approach for the client's image being transferred. Our determination repository on a picture collecting structure for picture classes which may be associated with comparative arrangements and on a strategy estimate calculation to consequently mark an approach for each recently transferred picture, additionally as directed by clients' social components. The generated arrangements will take after the development of clients' security mentality. The image is displayed only to the desired group of individuals according to the predicted privacy policy. If anyone from the group downloads or saves user uploaded picture, the user is notified with the message.

DATA INDISTINGUISHABLE USING VISUAL ASPECT STEGANOGRAPHY TECHNIQUE

Original Research Article

D. Saravanan

Abstract

An Enhanced chaotic map lattice based algorithm for image encryption to improve the security of the algorithm suggested by Pisarchik. The basic idea behind the proposed algorithm is to alter the coupling direction used to update the map variables. The altered coupling direction results into a totally different set of initial conditions and map variables of three CML’s. Based on experiments will show that the enhanced algorithm with chosen coupling direction can encrypt the color digital images. The image which given as input is retrieved as same as the original image while decrypting. Here many distortions take place when the image is converted pixel by pixel, this helps in high secrecy of the encrypted image

HARMONICS REDUCTION IN THREE PHASE UNINTERRUPTIBLEPOWER SUPPLY USING PASSIVE FILTER

Original Research Article

Anamika.P and Radhika.A

Abstract

The presence of harmonics in the UPS system increasesthe losses, output voltage distortion can disturb the operation of loads, it may damage the equipment and the value of Total Harmonic Distortion (THD) is high. The conventional LC filter is very large and costlier. To rectify this problem passive filter is proposed in this paper. The most common practice for harmonic reduction is the installation of passive harmonic filters. Passive filters exhibit the best relationship among all other improvement techniques when dealing with low and medium voltage rectifier system. Compared to LC filter, the passive filter reduces the THD value. The simulation result of a 3-KW UPS with the passive filter has been developed and verified.

INSTANT BUY PORTAL FOR IPTV SYSTEM

Original Research Article

Lalith Krishnan H

Abstract

Internet Protocol Television (IPTV) is the delivery of Multicast - quality television and/or video signals to subscribers over a broadband connection using the Internet Protocol (IP). In IPTV, offered Live Channels and on-demand content (VOD) are delivered to the consumer. For this, we are using two methods .First conventional method involves a Middleware to the IPTV system (Mediaroom) which has several methods and API’s (Application Programming Interface). The front end part from the Satellite to the server is done by Media room. By using this, we are deploying IPTV services like channels and VOD’s (Video on demand) in the Backend of Mediaroom and features like account management, device management, content management, billing management, roles & claims management etc. are managed at the Middleware. We are providing IPTV service to the Customer i.e. to the TV screen using PF Application at the STB level. The analogous second method involves KODI as middleware software to the IPTV system ported onto raspberry pi .By using this, we are deploying IPTV services like channels and VOD’s (Video on demand) onto the KODI software as Addon's and features like account management, device management, content management, billing management, roles & claims management etc. are managed at the software level.

THE POWER QUALITY ENHANCEMENT IN POWER GRID BY PV-UPQC AND DISTRIBUTED GENERATOR

Original Research Article

Ramya.L1 and J. Pratheebha2

Abstract

This paper represents the utilization of PV- UPQC and distributed Generator for increasing the quality of power supply to the load. The voltage sag, swell are caused due to variation in the load demand. The voltage interruption and voltage imbalance are caused due to the system faults. The Distributed Generator is used to provide uninterrupted power supply even though the system is under fault condition. Fault detection module (FDM) is implemented to protect the power system equipments from heavy fault currents.

ANDROID APPLICATION FOR LIBRARY SYSTEM

Original Research Article

1Nasaka Durga Pradeep, 2Mayank kumar, 3A Mary Posonia

Abstract

Android programming is based on Java programming language, with UI part in XML and have extension as apk .The main idea of this project is to intimate each and every person of our university(including staff and student) should maintain a separate account so that they can have clear idea of what books they have took and what all books those are available in library through search option and they also can know duration of the book and when they have to return the book with clear intimation. Development has resulted through booking procedure (virtually) but not manually.so that Free Digital Library can be obtained. This project work application offers user to make a search for a book that user want from the library. If a particular book is available in the library then it will be shown to user and in turn if book is not available in library then user can make request through this app for that particular book which is already issued to other student. This application deals with the development and implementation of smart phone application which is more effective and simple than current existing web based application.

A NEW SEMI AND FULL CARRY SAVE VLSI ARCHITECTURE FOR MODULAR MULTIPLICATION

Original Research Article

1K.Raja Krishnamoorthy, 2S.Saravanan, 1P.Malini and 1K.S.Jananipriya

Abstract

In many public-key cryptosystems, modular multiplication (MM) with large integers is the most critical and time-consuming operation. Therefore, numerous algorithms and hardware implementation have been done in past to carry out the MM more quickly, and Montgomery’s algorithm is one of the most well-known MM algorithms. The paper presents the modified Montgomery’s algorithm implementation using VLSI circuits to speed up the encryption/decryption process. The design have a low-cost and high-performance Montgomery modular multiplier which receives and outputs the data with binary representation and uses only one-level carry-save adder (CSA) to avoid the carry propagation at each addition operation. The proposed project reduces the hardware cost and short critical path delay at the expense of extra clock cycles for completing one modular multiplication. Experimental results show that the proposed Montgomery modular multiplier can achieve higher performance and significant area–time product improvement when compared with previous designs. The implementation is carried out using Quartus 9.1 cyclone II device family.

SURVEY OF CHANNELISING ACQUISITION SYSTEM WITH BIOSIGNAL IN EMG (2016)

Original Research Article

P. Shivashakthi and F.V. Jaysudha

Abstract

Earlier acquisition of biosignals was a difficult task. When one go for medical instruments for acquiring biosignals which merely depends upon preamplifier to estimate the finest of these acquired biosignals. Biosignals are those signals acquired from visually obtained signal which are recorded and desired patterns are recognized and they are with normal and specific application levels of diagnosis. These signals must be measured, analyzed and correlated with the instrumentation development in biomedical field. Pattern recognition is the vital role which decides the feature of the desired waveforms to be taken under consideration. Biosignals can be generated from different physiological movements of human like Electrocardiogram (ECG), Electromyogram (EMG), Electroretinography (ERG), Electroneurography (ENG), etc,. Latency is the time that has been elapsed difference between stimulated impulse and the contracting action of the muscle. Acquiring biosignal by implementing in MATLAB for ordinary muscle function varies with muscle strained for hours.

A REVIEW ON ENHANCED IMAGE RESTORATION FOR INDUSTRIAL APPLICATIONS BASED ON WAVELET AND MATHEMATICAL MORPHOLOGY

Original Research Article

Anoopa Jose Chittilappilly* and Kamalraj Subramaniam

Abstract

In the locomotive world automotive industries are the highest and emerging topographies to develop and apply technology for continually improving quality, cost, etc. Probably, image processing is introduced for industrial solicitations in automatic visual inspection system because visual inspection system is not able to identify the small flaws in the industrial products which are used in agricultural sector or others. Although numerous technologies have developed to enhance the ratings in automotive, to overcome the existing system drawbacks, this paper presented a mathematical morphology based on Wavelet neural network (WNN) for Image restoration. According to wavelet neural network and mathematical morphology, a new image restoration algorithm proposed with an image amoeba element for restoring and it perceives any defects in the portions. Further, image restoration is another form of filter that automatically adjust shapes and sizes of structure elements according to the content of the image and the image data trained with the WNN model to regain the original image.

IMPROVING NETWORK LIFE TIME USING EFFICIENT ROUTING PROTOCOL

Original Research Article

K.Roophavani1 and 2M.Udhayamoorthi

Abstract

Cooperative communication, which utilizes nearby terminals to relay the overhearing information to achieve the diversity gains, has a great potential to improve the transmitting efficiency in wireless networks. In this paper we use An Energy Efficient ANT Based Routing algorithm (EEABR). This routing protocol is based on ANT colony based routing algorithm for MANETs. By introducing energy efficiency parameter to this algorithm, it can be adopted in WSN. It is used for multi-hop ad-hoc networks and on the ANT colony based meta-heuristic. These approaches try to map the solution capability of swarms to mathematical and engineering problems. This routing protocol is highly Enhancements of EEABR considerably reduce the size of routing tables and in consequence, the memory needed by the nodes. By considering the quality of the path between the nodes, not only in terms of distance, but also in terms of energy level of that path, network lifetime can be maximized. EEABR algorithm is adaptive, efficient and scalable.

A REVIEW PAPER ON INTELLIGENT LANE DEPARTURE WARNING SYSTEM FOR DRIVER ASSISTANCE

Original Research Article

1Manoj Demde, 2Prashant Sharma and 3R.V.Kshirsgar

Abstract

Most traffic accidents were primarily occurred around the world, because of the lane Departure and cause many casualties and injuries. Lane Departure Warning system(LDWS) is that the part of Advanced driver assistance systems that monitor driver intent warn drivers of lane departures. The lanes have different appearances in different weather, light and road conditions and because of that reason when driving the vehicle it's not properly discover the lane and vehicle cross the Lane and accidents ocuurs. therefore the Lane detection and Lane tracking may be a difficult task because of the varying road conditions that one will come across while driving. Lane Departure Warning systems(LDWS) is one of the main approaches for Lane Detection and Lane tracking and accident prevention. In this paper, Lane detection and Lane tracking systems are helpful in avoiding these accidents as safety is that the main purpose of these systems. Such systems have the goal to detect and track the lane marks and to warn the driver in case the vehicle includes a tendency to depart from the lane. A lane detection and Lane tracking system is a vital component of the many intelligent transport systems. however detection of Lane isn't only used to solve the problem of avoiding accidents .To avoid the accidents Lane tracking is vital technique . within the past few years, various approaches for lane detection were proposed and successfully demonstrated. In this paper, a comprehensive review of the literature in lane detection techniques and Lane tracking techniques is given. the most objective of this paper is to find the constraints of the existing lane detection methods and Lane tracking methods and to overcome all the issues that are enclosed in existing lane detection methods and Lane tracking methods and to develop a proposed computer vision based (Real Time Video based) Intelligent Lane Departure warning system for various weather, lightweight and road conditions. Index Terms----Lane Departure Warning system, Lane detection, Lane tracking

CENTRALIZATION OF PUBLIC DISTRIBUTION SYSTEM USING SMART CARD

Original Research Article

1Raj kumar, R., 2Vishnuvarthan, J. and 3K. Palraj

Abstract

Now-a-days rationing material distribution is performed manually by writing about consumption of ration items by customer in the entrybook.People may buy various materials (sugar, rice, oil, kerosene, etc.) by using ration card.Sometimes card holder doesn’t consume ration items,the stock will remain in the shop.But the person working in the ration shop,put inventories & this type of malpracticing entry that consumer are bought ration items,dealers diverts food grains to open market to make profits for their own.There is no monitoring of such unused material. There is another problem of irregularity in opening shops and false announcement of deficit in food grains.People don’t know materials providing date and so they will affected by this false announcement. Sometimes this will affect on routine work of consumer. In the manual distribution system it is difficult to maintain the records. To avoid such a malpractice & regularize public distribution system to people this proposed system is to be implemented. When the consumer proceeds to flash the card the database will retrieve the whole details of the consumer. The user can purchase whatever they want by just flashing the smart card at the shop. The alert message will be given to the consumers when will items available in shop, and consumer purchase details. The consumer will receive purchase details on authorized Email Id year wise report. Keywords: Public Distribution System, RFID, Finger Print

SECURE TRUST WORTHY SERVICE DISCOVERY (STSD) MODEL BASED ON USER PREFERENCES

Original Research Article

N.Anithadevi1 and M.Sundarambal2

Abstract

The need for filtering authentic web services from the rest has become quite hectic seeing as the malicious ones seem to more and more legitimate by the day. The loss of proprietary information to such web services is becoming increasingly common and as such the paper suggests an idea in which a third party authenticating web service evaluate web service providers and facilitates the user with credible list of providers based on its "Trust filter". The filter takes into account many factors including the various customer preferences and prepares its itinerary trusted candidates in order to satisfy the customized needs of the individual. The idea is to mine user’s preferences from the requirements specification provided by the user and the preferences are used to determine the weights of each Quality of Service QoS attribute. The local trust on a service for the user is derived by combining the trust on QoS attributes and the trust on user’s ratings. In order to classify the web services based on the user's opinion the user must first be legitimate. The global trustworthiness of a service for the users group, the dishonest user are removed based on the results of Local honesty evaluation process. The simulation results indicate that the model works well on personalized evaluation of trust, and it can effectively dilute the influence of malicious ratings.

WIRELESS WATER LEVEL MEASUREMENT USING ARDUINO

Original Research Article

Lina Rose 1 and Anitha Mary X 2

Abstract

Water is a primary resource which has its significant role in human existence. The rate at which the essential resource being used is exponentially increasing day by day. All living organisms need water for its survival. There are many water storage phenomenons where the major among them is ground water. As water is consumed, naturally subsequent amount of water will be added to the aquifier to reinforce human needs. This recharge capacity if measured will give anew eye opening to those areas which is facing severe drought conditions. This work is carried out on an embedded based sensor technology to determine the water level at various instances there by monitoring the recharging capacity of the water body under study. Index Terms—Digital pressure sensor, ground water recharge, micro controller.

DEVELOPMENT OF REAL-TIME, EMBEDDED DATA MONITORING WIRELESS NETWORKING SYSTEM TO CHARACTERIZED SOLAR PANEL

Original Research Article

V.V.Monica Sindhu and X. Anitha Mary1

Abstract

To develop a scalable Measuring and monitoring infrastructure for condition based maintenance of photovoltaic generation system based on wireless sensor networking. An experimental setup for performance investigation under tropical weather conditions of the solar panel are created and a dedicated wireless sensor network is considered and implemented using LabVIEW2014 virtual instrumentation software. Apart from real-time data monitoring and displaying features, it also has the GUI system and diagnostic capabilities that are helpful in acquiring the solar panel performance under test. The environmental parameters such as current, voltage, temperature, and relative humidity of a solar panel is also incorporated. The typical 21W solar panel is used for evaluating data from different sensors connected to it. This experimental setup is mainly aimed to access the performance of the solar panel which is helpful for the homeowners to know the quality of their solar panels from the place where they are. Keywords—solar panel, ZigBee, Arduino Nano board, sensors network, Lab VIEW.

MATHEMATICAL MODELLING OF SOLAR PV PANEL IN MATLAB/SIMULINK FOR THE APPLICATION OF HYBRID POWER SYSTEM

Original Research Article

1Little Judy, A and 2 J. Karthika

Abstract

The physical modeling of the solar system is not that much efficient so the analysis is done through the mathematical modeling approach. The effect of irradiation and temperature is also considered. The PV module is the interface which converts solar light directly into electricity. Modeling this device, mostly requires taking weather data (irradiance and temperature) as input variables. The output parameters can be current, voltage, power or other variables. However, map out the characteristics I(V) or P(V) needs of these three parameters. Any change in the inputs immediately implies changes in outputs. This paper presents a detailed modeling of the effect of irradiance and temperature on the parameters of the solar PV module. Thus, it is important to use an accurate model for the PV module. The analysis is done in MATLAB/ SIMULINK background. This mathematical analysis approach is a so flexible to change the parameters of the system. Index Terms: PV Panel, MPPT Controller, Solar Array

DETECTION APPROACHES TO ANALYSISEYE PATHOLOGIES: A SURVEY

Original Research Article

D.M.D.Preethi1* and VE.Jayanthi2

Abstract

Authentication and identification purpose for we need security in all over the world today. Biometric provides a promising solutions meeting all demands. Biometrics identification exploits physiological and behavioral physiognomies to authenticate a person’s identity includes iris pattern, facial, palm print etc. Iris is suited for personal identification because of its unique biological properties. In some circumstances iris change with mature and mutilation due to injury or diseases. Impediments in iris recognition affect the structural and textural features. In this paper, we have provided a comprehensive study of various ocular diseases in particular such as exudate, cataract, glaucoma, which affect the retinal structures. Exiting methodology used to diagnosis the ocular diseases are clearly explained and it will be helpful for the iris recognition system. Keywords—authentication ,security, diseases, iris

PLANNING AND COORDINATION OF RELAY IN DISTRIBUTION SYSTEM USING ETAP

Original Research Article

Jayaprakash J 1* , AngelinPonrani M2 , Jothi Lakshmi R2 , Juanola Pearl J 2

Abstract

This novel speaks about protection of power system network which carries protective relays that isolates the faulted portion of the network to prevent equipment damage, injury to operators and to ensure minimum system disruption enabling continuity of service for healthier portion of the network. The protective relays must also be able to discriminate between criticized and standard operating conditions.When many relay are involved, coordination of all relay operation in a particular zone is complex and requires optimization. This problem is studied and the protection coordination problem is formulated and simulated in ETAP.Load flow analysis test and short circuit analysis test was carried out and analyzed. Key Words -Power System Network, relay, Load Flow analysis, Short circuit analysis,ETAP.

OPTIMIZATION OF ROUTING AND WAVELENGTH ASSIGNMENT IN PASSIVE OPTICAL NETWORKS

Original Research Article

1Roshni.V.V, 2R.Hemalatha and 3R.Mahalakshmi

Abstract

This paper presents the implementation of a metaheuristic algorithm on optical network to fix Routing and Wavelength Assignment (RWA) problem.RWA is one of the important optimization problems in optical networks. RWA problem are of two types, static and dynamic. In static RWA the set of connections is known in advance where as in dynamic RWA connection request arrive sequentially. Here we examine the dynamic routing and wavelength assignment problem. The goal is to minimize the number of wavelengths and blocking probability. Evolutionary programming algorithms are used to optimize the routing and wavelength assignment. The RWA problem can be fixed by number of algorithms like GA, ACO etc. In this paper, Shuffled Frog Leaping Algorithm (SFLA) has been implemented in optical networks to fix the RWA problem.. Cost, number of wavelengths, hop count and blocking probability are the optimization parameters. In WDM network, for the given set of connection requests, routing and wavelength assignment problem involves the task of establishing lightpaths (routing) and assigning a wavelength to each connection request. The problem is analyzed for different wavelength assignment methods such as first fit, random, round robin and wavelength ordering. Fitness function is calculated in terms of cost, number of wavelengths, hop count and setup time. SFLA algorithm produce less blocking probability, less cost and less computational complexity than existing methods. Index Terms: Routing and Wavelength assignment, Genetic Algorithm, Shuffled Frog Leaping Algorithm, Fitness function

RECONFIGURABLE MULTIPROCESSOR ARCHITECTURE FOR TURBO DECODING

Original Research Article

1R.Ilakkiya and 2A.Kalaiselvi

Abstract

This paper presents the implementation of turbo decoder on butterfly topology and star topology for parallel processing. Now a days turbo decoder plays major role in wireless communication like WIFI, WIMAX etc. Turbo codes are replacing the LPDC code due to it’s higher error correcting ratio. Turbo codes are generated by the turbo encoders in the transmitter side. During transmission turbo codes are corrupted with noise. The corrupted signal is reconstructed using turbo decoder. The butterfly topology are implemented in turbo decoder for asynchronous load. It provides less network latency and less path diversity. The star topology is implemented in turbo decoder for simple architecture. Turbo decoder implemented in butterfly topology and star topology produce high throughput compared to normal turbo decoding. Index Terms— Turbo Decoder, Butterfly Topology, Performance analysis

INTERPRETATION OF INDIAN SIGN LANGUAGE USING STORED VOICE SAMPLED VALUES

Original Research Article

Gargi Arya 1 , Monika Mandal1 1 and Rachana Nagal 2

Abstract

According to the census of India 2011 data on disability, around 7.4% of population is speech impaired. They use sign language as a medium to communicate but it restricts them to communicate with people who do not understand sign language. Speech impediment not only restricts them in communication but also in learning. This work make its contribution towards bringing down the barrier of communication and thus developing a compact and affordable wearable device which converts Indian sign language to voice and text. It is equipped with a accelerometer weared in index finger. For each gesture, accelerometer yields XYZ coordinates which are sensed by ATmega 2560. According to the sensed coordinates micro-controller extracts the corresponding speech file (decimal sampled sound file) from SD Card, process it and feed to audio amplifier and at the same time to LCD display. The .wav files are processed via Matlab to fetch the decimal sampling of sound files which are stored in the SD card for memory management and hence extends the potential for vast storage of words and sentences. IndexTerms: Atmega 2560, Indian Sign language, Arduino mega 2560, accelerometer, LM 386, Text to Speech, SD card

A RASPBERRY-PI BASED IOT SYSTEM FOR MEASURING THE ENVIRONMENTAL PARAMETERS TO MONITOR THE POLLUTION LEVEL USING IBM BLUEMIX

Original Research Article

Sonali Dwivedi1 and Venkatasubramanian K2

Abstract

Environmental parameter monitoring using Internet of Things (IOT) provides a low cost and an effective system to monitor the weather condition and to take relevant steps to overcome it. The Internet of Things (IOT) refers to virtually representing a physical network. This work presents a functional design and implementation of a complete sensor system which can be used for monitoring the environmental parameters. The system fulfills all the requirements like high number of sensors, fast deployment, low maintenance, and high quality of service. The system is based on acquiring data like carbon dioxide, temperature, humidity and carbon monoxide from various sensors and monitoring the sensor value. The measured parameters are thus uploaded to the cloud so that the users can track the present environmental condition and could identify the contribution of various elements towards it. A message is sent to the user notifying about the air index. The whole process is carried out on Raspberry-Pi. So, in short this is an integrated system which combines Internet of Things and Raspberry-Pi. Index Terms: Raspberry Pi , Pollution , Sensor , IOT

MODELING FUZZY BASED REPLICATION STRATEGY TO IMPROVE DATA AVAILABILITY IN CLOUD DATA CENTER

Original Research Article

Vijayakumar D 1 , Nivetha N K 2, Sreenivasagam K G 3 and Sabarimuthukumar R4

Abstract

Data management is an important strategy to be considered in large scale cloud environments. This can be easily handled by using file replication. This project is to improve data availability in cloud data center by taking replicas and place them into different data centers. Replica creation may depends on the maximum usability / accessibility of the data in cloud data center. The data which accessed most frequently are consider for replication process. Replica selection is to select most suitable replica, in order to place them into more than one data centers. Index terms-- Cloud computing, Data center, replication.

IMPLEMENTATION OF MPPT ALGORITHM FOR SOLAR PHOTOVOLTAIC CELL USING INCREMENTAL CONDUCTANCE METHOD

Original Research Article

1Dhineshkumar.M., 2P.Elangovan, 3S.Hariharasudhan, 4M.Muthukumaran, 5S.Vijayalakshmi

Abstract

In this paper conventional energy is replaced with renewable energy due to its advantages over the nonconventional one. Making maximum use of the PV panel energy using Maximum Power Point tracking (MPPT) for extracting a maximum power from the PV panel due to variation in ambient temperature and irradiations. BOOST converter is used here for increasing the voltage to the desired value depends on the load. The use of MPPT techniques improves the efficiency of solar panel. Hence the usage of MPPT techniques are increasing day by day. This paper explains about the performance of popular MPPT techniques, Incremental conductance algorithms using BOOST converter .The advantage of the techniques are explained .Simulation studies of proposed system are done using PSIM software. Keywords: Photo Voltaic (PV) energy, Maximum Power Point Tracking (MPPT) techniques, Incremental Conductance, BOOST converter.

FRACTAL ANTENNA FOR MULTIBAND APPLICATIONS

Original Research Article

Dhivyabharathi, R. and K. Ramprakash

Abstract

This paper presents the simulation and design of a wideband H-shaped microstrip patch antenna. The shape will give the broad bandwidth which is needed in the different kinds of application for example satellite communication, mobile radio, biomedical application, remote sensing and so on. In this system (IEEE 802.11a standard) the high speed wireless local area network is used to generating the H-shaped microstrip patch antenna. The antenna is an upgrading from previous research by using H-fractal and this has been used for multiband antenna. The proposed system shows that the proposed antenna can excite much significance with sensible antenna directivity. The S parameter and Voltage Standing Wave Ratio (VSWR) show that the proposed system is better candidate for a different kind of antenna application. Keywords— H-shaped microstrip, antenna, S parameter and Voltage Standing Wave Ratio (VSWR), bandwidth

A LOW POWER RECODING METHODOLOGY FOR THE DESIGN OF A MAC UNIT USING FUSED ARCHITECTURE

Original Research Article

Raja Krishnamoorthy 1 , B.Sujetha2 , S.Saravanan3 and P.Haridevi4

Abstract

The paper presents a new fused methodology proposed for the MAC unit in 65nm which consumes less power, area and reduces the critical path delay. This paper focuses on the efficient design of Fused adder-multiply operators, targeting the optimization of the recoding scheme for direct shaping of the Modified Booth form of the sum of two numbers. More specifically, we propose new technology advancement compared to the recoding technique available in 90nm technology. The proposed technology decreases the critical path delay and reduces the power consumption. The proposed technology not only reduces the power but area also been reduced. The work is done for different fused approach using conventional and signed-bit Adders as building blocks. The implementation is done using Spice models, results are observed and power analysis is made. Index Terms— Low power, Recoding schemes, MAC unit, Fused Architecture, Modified Booth Algorithm.

SIMULATION OF SOLAR BASED POWER CONTROL FOR HEART PUMPING APPLICATION

Original Research Article

Haripriya K,

Abstract

Solar PV system plays a vital role in renewable energy sources, which is applied for all fields of science and engineering. In this paper, the usage of solar energy for heart pumping application is discussed. Transcutaneous energy transfer (TET) is used for providing supply to implantable device with split capacitor push pull parallel resonant converter in boost mode operation. In existing system heart pumping is done via percutaneous cable. It has the drawbacks of infections and it’s associated withrisk. Transcutaneous energy transfer method eliminates these problems and it reaches the end to end efficiency level. The proposed system is configured using MATLAB/Simulink tools. Index Terms- solar power, biomedical electronics, implantable devices, resonant converter, transcutaneous energy transfer coil (TET).

HARMONIC REDUCTION IN BLDC MOTOR USING SEVENLEVEL CASCADED MULTILEVEL INVERTER

Original Research Article

G.Nandini1 and A.Senthilnathan2

Abstract

Brush Less DC (BLDC) motor is widely used in many industrial and household applications due to its high reliability, simple frame, speed precision, fast dynamic response etc. In this paper, a cascaded multilevel inverter using Sinusoidal Pulse Width Modulation (SPWM) is proposed for BLDC drive. As it is an electronically commutated motor, the commutation can be done by conventional PWM inverters. The torque ripple and harmonics are generated due to high voltage stress in BLDC motor. This problem can be avoided by using a cascaded multilevel inverter with SPWM switching. The proposed seven-level cascaded multilevel inverter using SPWM for BLDC drive is implemented using MATLAB/Simulink and the simulation results are presented. The reduced Total Harmonic Distortion is analyzed using FFT analysis. Keywords: Brush Less DC Motor (BLDC), Multilevel Inverter (MLI), Total Harmonic Distortion (THD), Sinusoidal Pulse Width Modulation (SPWM).

MODBUS TO M-BUS PROTOCOL CONVERSION GATEWAY WITH LOW CONVERSION LATENCY FOR BUILDING MANAGEMENT SYSTEMS

Original Research Article

Vasanth Dhinakaran 1 and GugaPriya G2

Abstract

Modbus is a common industrial field control bus protocol which is not only used in a wide variety of industrial applications like SCADA systems but also commonly used in building management systems(BMS) across the globe.Buildings generally use BTU,Water,Energy meters that operate on M-bus standard.M-bus devices cannot communicate directly with a Modbus based Building Management System(BMS).The network level incompatibility of a M-bus device to communicate with a Modbus master can be overcome by using a protocol conversion device having low conversion delay time and suitable voltage adjustment circuits.My project will focus on building a protocol conversion gateway for the M-bus slaves to communicate with a Modbus based master with minimum time delay using RS232 based serial medium for communication. Index Terms: M-bus protocol, Modbus protocol, protocol nversion,BMS,BAS,Building Automation System,Building Management System.

DEVELOPMENT OF 3D MODEL WITH ISO SURFACE RECONSTRUCTION ALGORITHM IN COSMETIC SURGICAL APLICATIONS

Original Research Article

Ziaur Rahiman Shaik 1 , D. Madhavi, N.Jyothi2 and Ch.Sumanth Kumar3

Abstract

The objective of this paper is to develop semi-automatic guided software for performing cosmetic surgery and fabrication of head phantom by the process of simulating three dimensional (3D) visualization techniques for improving therapeutic treatment with computer vision and innovative technologies. The 3D operation planning is one of the main applications in reconstructive and crania-facial surgeries. The current trend in surgical planning is with respect to tissue changes based on frontal analysis of 2D information sources such as photographs, X-rays, and CT/MRI etc. The proposed slicing technique will be suitable for the display of complex structures of the facial skeleton and can also be used to develop skull by 3D printing technology. The proposed method helps in developing of 3D reconstruction method with an aid of computer software for developing a 3D model from 2D CT/MRI scan with cross sections of a patient. A basic 3D model of outer face is created using algorithm of icon-surface reconstruction which defines proper icon-value or intensity value. This method can be used to construct different regions based on user defined value. Each region is reconstructed in 3D using different colours for identification. The development of 3D model based iso-surface extraction and reconstruction will provide better surgical results with fewer procedures, and also improve the functionalities to a greater extent. Index Terms— Rapid prototyping, surface reconstruction, 3D volume, skull

COMPARATIVE STUDY OF DIFFERENT TYPES OF CONVERTERS FOR SWITCHED RELUCTANCE MOTOR DRIVE

Original Research Article

1Maheswari ,C. and 2Priyanga S

Abstract

Switched Reluctance Motor (SRM) is a competition for many applications of electric drive system due to its simple construction and robustness. This paper presents a comparison between different types of conventional converters with a new Bridgeless SEPIC converter. The conventional converter topologies employed for SRM drive are R-dump, C- dump, H-bridge, series and parallel type converters. The SRM with 6/4 pole is analyzed with a Bridgeless SEPIC converter by using Matlab/Simulink packages and operating principles of various converters also described. This paper provides the results of Bridgeless SEPIC converter yields reduced current, torque ripples with a constant speed used in medical application particularly for Sleep Apnea Treatment. Index Terms - Switched Reluctance Motor (SRM), Single Ended Primary Inductor Converter (SEPIC), R-dump, C- dump, Hbridge, series and parallel converter.

A NOVEL CIRCUIT METHODOLOGY TO IMPROVE THE TRANSITION DELAY AND PROVIDE SIGNAL FEED THROUGH FOR INPUT DATA IN PULSE TRIGGERED FLIP FLOP

Original Research Article

Raja Krishnamoorthy1 , P. Indhubala2 and S.Saravanan3

Abstract

In this paper, a new method to improve the transition delay, Conditional Pulse enhancement and reduction in transistor count for Flip Flop is proposed which consumes less power and area. The design featuring an explicit type pulse-triggered structure improves the problem arises due to transition delay. The clocked Pseudo NMOS style structure enhances the efficiency and reduces the load capacitance. The design which successfully solves the long discharging path problem also reduces the transistor count in the discharge path. The Proposed circuit is implemented using Predictive technology Model in CMOS 90-nm technology. The proposed design outperforms the existing method by reducing the power by 15% and 40% with two existing methods. Index Terms— Flip-flop (FF), low power, pulse-triggered, Transition Delay, Conditional Pulse enhancement

A FRAMEWORK FOR MINING UNIFYING TRAJECTORY PATTERNS USING SPATIOTEMPORAL DATASETS BASED ON VARYING TEMPORAL TIGHTNESS

Original Research Article

Rahila R.1 and R, Siva2

Abstract

Trajectory patterns discovery is useful in learning interactions among moving objects. Different types of trajectory patterns such as flock patterns, convoy patterns and swarm patterns have been proposed earlier, but methods were developed for mining only a particular type of trajectory patterns. The pattern discovery becomes difficult and inefficient as users typically may not know which types of trajectory patterns are present hidden in their data sets. One main observation is that trajectory patterns can be arranged based on the strength of temporal tightness. In this paper, a framework of mining unifying trajectory patterns also known as UT-patterns based on varying temporal tightness is proposed. The framework consists of three phases: initial pattern identification, granularity adjustment, classification and visualization. The preprocessing is done by using trajectory clustering algorithm and a set of initial UT-patterns identification are done in the first phase by using the spatiotemporal datasets. The granularity adjustments i.e., levels of detail are adjusted by drill down and roll up to detect other types of UT-patterns in the second phase. Classifications of the UT-patterns are done using the Trajectory classification algorithm in the third phase. Visualization of the classified UT-patterns is done in the final phase according to the patterns obtained as the result of classification. Keywords— Trajectory patterns, temporal tightness, UT-patterns.

BUNDLE BLOCK DETECTION USING DIFFERENTIAL EVOLUTION AND LEVENBERG MARQUARDT NEURAL NETWORK

Original Research Article

Padmavathi Kora

Abstract

Globally heart diseases are the most prevalent cause for human mortality. Every year, 9.4 million deaths are attributed to heart diseases (cardiac arrhythmia) including 51% of deaths due to strokes and 45% deaths due to coronary heart diseases. Hence identification of these heart diseases in the early stages becomes important for the prevention of cardiac re- lated deaths. Although the existing conventional ECG analysis methods like, RR interval, Wavelet transform (WT) with classification techniques, such as, Support Vector machine (SVM), K-Nearest Neighbor (KNN) and Levenberg Marquardt Neural Network (LMNN) are used for detection of cardiac arrhythmia, the fea- ture extraction using these methods generally yield a large number of features, of which many might be insignificant. In this paper Differential Evolution (DE) can be efficiently used to detect the changes in theECG using optimized features from the ECG beats. For the detection of normal and BBB beats, these DE feature values are given as the input for the LMNN classifier. The data was collected from MIT-BIH arrhythmia database. Index Terms—Bundle Block, Differential Evolution, LMNN classifier, MIT-BIH Arrhythmia database.

DESIGN OF NOVEL RICE GRINDING MACHINE

Original Research Article

S. Jayapoorani1 and V.Manju2

Abstract

Wet grinder is one of the most commonly used electrical household appliances. In existing wet grinder single phase induction motor is used and thus it provides benefits in improving the energy efficiency and the motor drive. Since the cleaning mechanism and timer is not yet enhanced in an industrial/domestic wet chopper, a mechanism to completely fully automate is initiated. The system of inlet, outlet valve, timer and a design process it can be obtained. Consequently, effort and also time consumption is minimized. Through the timer the consequence of grinding is aligned and the grinding progression is revealed in real time. Index terms— wet grinder, timer, comparator sensor, cleaning mechanism, and microcontroller.

A SOFT SWITCHED CASCADED BOOST CONVERTER FOR PHOTOVOLTAIC APPLICATIONS

Original Research Article

Narmadha, R.1 , M. Marimuthu2 and B. Paranthagan3

Abstract

In this paper, a soft-switched cascaded boost converter connected with a single active switch and simple auxiliary resonant circuit is adopted for photovoltaic applications with high transformation ratio and low voltage stress across the switch. Switching losses and electromagnetic interference (EMI) noises are condensed by restricting di/dt of the diode reverse recovery current and dv/dt of Metal-Oxide semiconductor Field Effect Transistor (MOSFET) drain-source voltage. In this converter an auxiliary circuit consists of one auxiliary switch, a resonant inductor and a clamp capacitor is operated under zero current transition technique. The main switch turns-on by means of zero current switching (ZCS) and turns-off by means of zero voltage switching (ZVS), while the auxiliary switch turns-on and turns-off by means of zero voltage switching (ZVS). This switching configuration can improve the system efficiency and reduce the switching losses likewise it is very easy to control. The detailed theoretical analysis and the design equations are described. To verify the performances of the proposed converter, it is demonstrated by PSIM simulation. Keywords: Soft switching, DC-DC cascaded boost converter, Zero Voltage Switching (ZVS), Zero Current Switching (ZCS), switching loss, hard switching, Zero Current Transition (ZVT), Electromagnetic interference (EMI).

A NOVEL TECHNIQUE FOR ENHANCING OVERALL NETWORK EFFICIENCY USING COGNITIVE RADIO

Original Research Article

J.Sivasankari1 and B.Sridevi2

Abstract

Cognitive radio has been considered as a key technology for future wireless communications and mobile computing. Power heterogeneity is also common in CR networks. The benefits of high-power nodes are the expansion of network coverage and also have advantages in power and data transmission rate. So, researchers have made efforts to examine these advantages, like backbone construction i.e., virtual backbone is constructed in a distributed and localized fashion while considering many incompatible objectives like fast convergence, and low computation cost. Topology control helps in conserving the energy by either reducing transmission power per node or preserving energy-efficient routes for the entire network. But, the large transmission range of high power nodes leads to large interference, which reduces the spatial utilization of network channel resources. Because of different transmission power, unidirectional links will occur in the network. Due to these issues, the primary user (PU) of the cognitive radio network will go into shutdown condition. To address this issue and to explore the advantages of high-power nodes, we develop an virtual clustering algorithm to construct a hierarchical network and to eliminate unidirectional links. To reduce the interference raised by high-power nodes, we develop routing algorithms to avoid packet forwarding via high-power nodes. The throughput of power heterogeneous cognitive can be severely impacted by high-power nodes. Index Terms—Cognitive Radio, Virtual Clustering, Primary User, Hierarchical Nodes, Throughput.

DEVELOPMENT OF FACE RECOGNITION USING THE FEATURES OF LIP

Original Research Article

S.Nirai Selvi1, M.Carmel Sobia2 and K. Shankar3

Abstract

At present Lip is used as an identifier from person to person. The unique parameters are experimented to differentiate individuals and their uniqueness is also verified. The main advantages in the bio-metric system based on lip recognition are data acquisition and handlings remain simple. Herethe first stage of work face detection is donebyViola and Jone’s algorithm. Face detection used for capturing the features of the lips four various mouth corners are detected through the proposed system. These detected four points are used for further recognition purpose. In the proposed system, is done by FBF (fast box filtering) used to generate a noise-free source with high processing efficiency. In this work Cohn–Kanade database and Indian face data base of neutral expression have been used for lip identification. Keywords:Bio-metric, Face Detection, Lipcornerdetection, Lip recognition.

ANALYSIS OF DISPERSION COMPENSATION TECHNIQUES IN DWDM OPTICAL NETWORKS

Original Research Article

V Sathya*, R Hemalatha and R Mahalakshmi

Abstract

Dense Wavelength Division Multiplexing (DWDM) is an extension of optical networking. DWDM devices combine the output of more than eight optical transmitters for transmission across a single optical fiber. Problems like dispersion, cross talk and other non-linear effects occur in optical networks. Dispersion is the spreading out of a signal as it travels down the fiber. Chromatic dispersion (CD) and polarization mode dispersion affects the DWDM. Chromatic Dispersion is a major factor in the transmission of data over a long haul application. To overcome the loss caused by CD, we can use different techniques.The proposed method focuses on the dispersion and its compensation techniques on DWDM networks. In order to compensate for the dispersion, various compensation techniques like Fiber Bragg Grating, Dispersion Compensation Fiber and Electronic Dispersion Compensation are employed. The DWDM architecture is implemented using OptSim. These dispersion compensation techniques are to be analyzed for DWDM networks. The simulation results show the performance of the DWDM system in terms of Bit Error Rate and Eye diagram. Keywords: Dense Wavelength Division Multiplexing, Chromatic Dispersion, Fiber Bragg Grating, Dispersion Compensation Fiber, Electronic Dispersion Compensation.

FRACTAL IMAGE COMPRESSION USING QUANTUM ALGORITHM

Original Research Article

T Janani* and M Bharathi*

Abstract

Fractal image compression (FIC) is an image coding technology based on the local similarity of image structure. FIC offers high compression ratio without degrading quality of retrieved images, which makes FIC, a widely approved technology. However, despite of the linearity of the decoding phase, the coding process is much more time consuming, because of search involved in finding local self-similarities in an image. Algorithms like Quad tree Partitioning Huffman Coding (QPHC) and DCT based FIC (DCT-FIC) have been developed to reduce the computational complexity in the coding phase. The proposed method, FIC through quantum representation exploit enhanced computational power and huge storage capacity, which makes it significantly faster than any classical algorithm solving the same problem. For this reason, an attempt is made to apply QA to reduce the computational complexity of FIC. Keywords: Fractal Image Compression, Local self-similarities, Quantum Algorithm, Iterated Function System.

DESIGN AND ANALYSIS OF CYCLIC REDUNDANCY CHECK USING QUANTUM-DOT CELLULAR AUTOMATA (QCA)

Original Research Article

M.Vinothini1 and J.Harirajkumar2

Abstract

Forcommunication systems, error detectors are required to make sure that error free signal is passed while transmitting/receiving. This error detection is resolvedby a basic parity generator and parity checker in QCA.But these parity checkers cannot detect all forms of error. It checks whether it is an odd or even parity. To overcome the limits of parity checker, cyclic redundancy check (CRC) will be analysed and can be designed using QCA. Currently, QCA standsa assuring replacement for CMOStechnology. In QCA,the operation isdirected bythe electron’s position. The consumption of power in QCA is less and the operation of clock frequency is high over traditionalCMOS. Also with technology reaching Nano-scale, CMOS does not function perfect. CRC’s are especially useful in digital circuits such as phase detectors, code converters and error detection & correction circuits. In this paper, QCA Designer tool ver. 2.0.3 has been used for the simulation of the design. Index Terms: Communication, Error Detection, XOR/ XNOR, Information, Parity Generator, Parity Checker, QCA, Transmission.

OBSTACLE DETECTING ROBOT FOR UBIQUITOUS ENVIRONMENT - DEVOID OF SENSOR

Original Research Article

Jefit Ravina G. and C. Nagarajan

Abstract

Autonomous path tracking robot without any knowledge about the environment must muddle through the obstacle. The onboard sensing technique uses sensor to detect obstacle. The vision based technology progress with camera to become aware of obstacle. On comparing the above two approach, the latest one provides detailed information about the environment which is not obtained by using sensor. There are some drawbacks in onboard sensing technology like selection of sensor based on color and lightning condition which can be overcome by the proposed method. The proposed method depends on vision based technology which is capable of providing detailed description about the environment to avoid obstacles. The piecewise linear contrast stretching is used for image segmentation. The map less navigation where the robot is not trained to any environment behaves like a human when the robot detects an obstacle from the captured image. Once the obstacle is detected the robot takes another possible path for the further safe navigation. Key words: Obstacle, Onboard Sensing, Piecewise Linear

SMART CITY LIGHT SCANNER USING RAMBLER

Original Research Article

A.Andrine Dinola1 and V.Somasundaram2

Abstract

In metropolitan cities streetlights with poor lighting cause vehicle accidents and may provoke theft or murder during nights. Predicting faulty post lamp can maintain proper lighting in street roads. At present, faulty post lamps are checked regularly by electrician but takes long time to repair. Existing researches concentrate on incorporating sensors with wireless networks into each street lamp. There is a problem in interfacing the wireless networks with the existing lighting circuit and also it is more expensive than required for installing lamps. Hence a smart lighting system must be considered. A sophisticated system named as Rambler which is laid on the top of fixed route vehicles, collects illumination readings and location of streetlights along the route the vehicle traverse. The collected reading will be transmitted to PC and by using MATLAB’s Graphical User Interface Design Environment (GUIDE), Luminance Map (LMap) will be created. By finding the difference between different LMaps found at different times, location of faulty streetlights can be identified. To avoid erroneous LMap, Inspection Point (IP) is to be installed at 2m above the ground of one or two street lamps which provide ground-truth value of illumination reading. The proposed method does not require modification of vehicle and street lamp. The proposed system can be used in metropolitan cities possibly in highways. This system can be used as an alternative system for detecting faulty street lamps in an efficient manner. Keywords? Fault, Rambler, Luminance Map, Inspection Map

SYSTEM ANALYSIS OF EMG SIGNAL FOR VARICOSE VEIN

Original Research Article

P.Shivashakthi @ Preethi and F.V.Jaysudha

Abstract

Earlier acquisition of biosignals was a difficult task. Whereas implementation in medical instruments used for acquiring biosignals from visually obtained signal which are recorded and desired patterns are recognized and they are compared with normal and specified application levels of diagnosis detecting varicose vein. These signals must be measured, analyzed and correlated such that pattern recognition plays a vital role which decides the desired waveforms from extracted from EMG signal. Peak signals at 128Hz and 256Hz are detected and extracted at various sensor points that are placed. Biosignals can be generated from different physiological movements of human like Electrocardiogram (ECG), Electromyogram (EMG), Electroretinography (ERG), Electroneurography (ENG), etc,. Acquired EMG signal by implementing in MATLAB for ordinary muscle function varies with muscle strained for hours while standing. Keywords—Biosignal,MATLAB,EMG.

LOW POWER, SMALL FOOT PRINT EMBEDDED VOICE BIOMETRICS SYSTEM

Original Research Article

1Puja Ramesh Chaudhari and 2 John Sahaya Rani Alex

Abstract

Biometrics is indeed becoming an important solution for any highly secured system. Voice is one of the biometric parameters that can use for a person identification and verification. In this paper, a small foot-print, low power embedded system is proposed and implemented using Beagle Bone Black (BBB). Hidden Markov Model (HMM) based speaker recognition system is implemented. Mel-Frequency Cepstrum Coefficients (MFCC) is used as features to identify the speaker. Each speaker is modelled as one HMM. The verification of the speaker voice is done using Viterbi decoder. The embedded system for Voice Biometric system is successfully implemented for a limited number of speakers and the accuracy is verified to be as almost 100%. Keywords—Speaker Recognition, MFCC, Biometrics, Voice, HMM.

DATA HIDING IN ENCRYPTED H.265/AVC VIDEO STREAMS BY CODE WORD SUBSTITUTION

Original Research Article

G.Pramitha* and G.Sundari

Abstract

Steganography is main part of hiding the fact that communication is taking place, by hiding information in other information. Because of their frequency on the internet digital videos are the most popularly used for this purpose. Data hiding in the process of encoded domain without decoded secure the secret of the content. Likewise, video file size is strictly secured even after encryption and data embedding. Video compression a technique is also involves in this system it can be high complexity, bandwidth and delay. This is because of its high-resolution. In this paper, we propose a system analyzing using H.265/AVC (Advanced Video Code) video streams by code word substitution method. By using stenographic analysis tool the encryption part can be accessed. Index Terms—Steganography, AVC, Encrypted, Decrypted, Data embedding, Compression, Frequency.

AN EFFICIENT EMBEDDED COMPRESSION TECHNIQUE FOR REDUCING DELAY IN HD VIDEO COMPRESSION

Original Research Article

V.Ragavendran*,and G.Sundari1

Abstract

At present, the HD (High Definition) video compression techniques involves high complexity and delay. This is because of its high-resolution. The motive is to reduce the delay taken for compression of video. Here a low-complexity lossless/near lossless video codec design is presented. It aims at serving as an embedded compression technique to reduce the delay for high definition video compression over wireless networks. The design feature is best trade off in complexity and efficiency. For video test set consisting of previously encoded full HD and non-full HD sequences, the compression efficiency of Context based Adaptive Lossless Image Coding (CALIC) and Wavelet transform methods needs to be improved. The main objective is to propose another algorithm which reduces the delay and also to increase the compression efficiency by retaining the quality of original video. Index Terms: Video compression, Delay, Embedded compression, DTCWT, Wavelet Transform, Fractal Image Compression.

A NOVELIMPLEMENTATION OF HIGH SPEED MULTIPLIER USING BRENT KUNG CARRYSELECT ADDER

Original Research Article

K. Golda Hepzibha1 and Subha2

Abstract

Multiplication is one of the most significant operations in every computational system and a multiplier forms the core of systems such as digital signal processing, image processing and microprocessor. Multiplier is an important element which contributes to the major power consumption in any system. Hence a fast energy efficient multiplier is always needed in electronics industry for fast computation of results. Recent applications of multipliers with various data lengths are always required in VLSI from processors to application specific integrated circuits (ASICs). In this work the designs of two different array multipliers is presented, one by using Ripple Carry Adder(RCA) based Carry Select Adder (CSLA) and Binary to Excess-1 Converter (BEC) based RCA CSLA for addition of partial product terms and the results are compared with the proposed multiplier using Brent Kung (BK) CSLA in partial product lines. The designs are synthesized using Quartus II Software. This design will meet the challenging task in modern VLSI design with respect to area and delay. Index Terms— Ripple Carry Adder, Carry Select Adder, Binary to Excess-1 Converter, Brent Kung Adder

CRITICAL EQUIPMENT SAFEGUARD IN POWER STATIONS USING PLC

Original Research Article

Jayaprakash. J.

Abstract

This novel will speak about the methods to demonstrate all the protections and interlocks available in the critical equipments of Thermal power station (TPS) and Steam Power Plant (SPP) such as Boiler, Turbine, the Alternator.These critical equipments are to be protected from abnormal conditions and parameters. The failure of any one of these equipments will lead to loss of power generation and also cost of these equipments is huge. Thesafeguard techniques are classified as class a, class b and class c protections. Distributed digital controls and numerical safety relays play a vital role in providing protections to these critical equipments. Conversely, an exertion has been made to demonstrate the operational protections with the aid of a programmable logic controller. Key Words -Boiler, Turbine, Alternator, Interlocks, Distributed digital control, Programmable logic controller, Thermal Power Plant

DESIGN AND SIMULATION OF PVFED GRIDCONNECTED SYSTEMWITH ZCD

Original Research Article

1R.Asha, 2N. Saritha and 3V. Jamuna

Abstract

This project deals with the simulation of PV fed grid connected inverter for single phase grid connected system. This project mainly focuses about the design and simulation of grid connected system and to synchronize the inverter voltage and frequency with the grid voltage and frequency. If the proper synchronizing is not done then power cannot be fed to the grid. The synchronization is done by using Zero crossing detector (ZCD) technique. In order to satisfy the grid interfacing requirements, LCL filters are designed and used. Keywords— Boost Converter, Grid, Inverter,Solar Photo-voltaicSystem (PV), zero crossing detector(ZCD)

A POWER CONSTRAINED OPTIMIZATION ALGORITHM FOR ENERGY REDUCTION IN CLOUD COMPUTING

Original Research Article

MANIVEL PANDIAN P.1 AND A. SATHYA SOFIA2

Abstract

Cloud computing is a new exemplar for data sharing and storing in cloud centers and it achieves the phenomenal growth for remote accessing resources via networks. But, succeeding the power consumption controls, concurrently achieving the performance oriented tasks are the most crucial issues for cloud services. For that, the system is implemented with three important energy saving schemes for monitoring cloud services and also to reduce the server idle energy consumptions. In existing, the optimization of energy is done in cloud servers only when the arrival rate is low. By using this EGCM the problems of server wake up, and cloud system congestion is overcomed, but it cannot able to eliminate the unnecessary idle energy saving when arrival rate increases and also it cannot allocate resources or switch the resources between idle and sleep status during the execution of process.. Here, the main objective of the proposed work is to reduce idle energy consumption without sacrificing performance and without violating (SLA) for that, the system introduces new examining methodology called Artificial Association Bee [AAB]. The new method is used to solve the constrained optimized problem and support the cloud service providers or server for energy saving and optimization. The new method reduces unwanted idle energy consumption by switching idle to sleep modes in an iterative manner, when more tasks are performed in the cloud service execution process. Such as the new AAB methodology provides an effective server performance for loading or sharing or providing the services to the cloud clients, and also it achieves energy consumption, with a help of iterative modes. The Simulation results show that efficient energy reduction is verified by applying energy saving schemes. Index Terms— Energy consumption scheme, reply time, AAB,EGCM

GLOBAL MAXIMUM POWER POINT TRACKING UNDER PARTIAL SHADING CONDITION USING MODIFIED SEPIC CONVERTER

Original Research Article

G.Kalavathy1 , B.Paranthagan2 and M.Marimuthu3

Abstract

Tracking of maximum power point (MPP) is an inevitable part of a system of energy conversion using photovoltaic (PV) array. Under uniform solar irradiance the popular conventional maximum power point tracking algorithms are effective. However, under solar irradiance mismatching conditions (partially shaded conditions (PSCs)) defects the current-voltage and power-voltage characteristics of photovoltaic system significantly. Especially partial shaded phenomenon affects the power-voltage characteristics because it contains multiple peaks and steps. So, the conventional tracking algorithms fails to guarantee successful tracking of the real MPP (Global Peak (GP)), and it tend to stay in local peak power point which considerably reduce the energy and efficiency of the PV system. In this paper, a new algorithm called improved hill climbing algorithm is used to track the global peak power from PV array under partially shaded condition and modified SEPIC converter is used as a DC-DC interface. The performance of proposed maximum power point tracking (MPPT) is analyzed and verified by simulations with the help of MATLAB/SIMULINK. Key words: Maximum power point tracking (MPPT), Hill climbing algorithm, Photovoltaic I-V characteristics, Global Maximum Power Point (GMPP)

DESIGN AND DEVELOPMENT OF T-SHAPED ANTENNA FOR VARIOUS APPLICATIONS

Original Research Article

S.Kannadhasan1 and A.C.Shagar 2

Abstract

This paper introduces a T Shaped antenna which is designed for tri-band operations for use in various wireless applications. With the development of many different wireless communication standards to design the antenna is an important role of communications. A suitable antenna design technique is as an important role in recent world for the wireless applications such as Global Positioning System (GPS), Worldwide Interoperability for Microwave Access (WIMAX) and Wireless Area Network Standards (WLAN). The antenna should have low profile, light weight and easy to fabricate for broadband characteristics. Also, it should have very good performances in impedance bandwidth, radiation efficiency, gain, return loss and electromagnetic interference. Various design parameters of the proposed tri-band antenna have also been analyzed for proper tri-band operations using slots. CST microwave studio simulation tool is used to obtain the radiation parameters of the proposed antenna. The antenna resonates at a frequency of 10 GHz with a bandwidth of 4500 MHz. A good return loss is obtained with rectangular shaped configuration. The proposed T shaped antenna is also found to operate at 2.65 GHz, 3.65 GHz and 4.65 GHz. Keywords: T-Shaped, Radiation Pattern, S Parameters

FUEL COST MINIMIZATION FOR A THERMAL POWER PLANT USING PSO ALGORITHM

Original Research Article

P.Induja1M.S.Kamalesh2 and N.Senthilnathan3

Abstract

This paper experiments the Particle Swarm Optimization (PSO) algorithm for solving the fuel cost of a thermal power plant. The PSO technique is easy to implement and it does not require more computation time. The objective is to minimize the fuel cost and it is obtained from the total power generated with respect to the proper load dispatch. So that the overall cost of the thermal power system operation can be reduced. Thermal power plant need to operate at the minimum cost for better profit, at the same time it should suit the load demand. The minimization includes various factors like total cost of the system, incremental cost of delivered power, etc. Power losses are evaluated for the simple test system. A MATLAB program was developed to solve the Economic load dispatch for a thermal plant with six-units by using PSO algorithm.

PERFORMANCE ANALYSIS OF AREA SPECTRAL EFFICIENCY OF MASSIVE MIMO CELLULAR SYSTEM

Original Research Article

J.Roscia Jeya Shiney1 and K.Nivetha2

Abstract

In the wireless world, 5G is one of the emerging technologies. Massive Multiple Input Multiple Output (MIMO) technology used in 5G wireless communication where high frequency signals are used. Massive MIMO is an antenna array system using massive amount of antennas. Extra antennas help by focusing the transmission and reception of signal energy into ever-smaller regions of space. Though many techniques are used for 5G, massive MIMO gives good performance measures. Spectral Efficiency has been an important performance measure for mobile cellular systems. This work concentrates on area spectral efficiency (ASE) for uplink multi-cell multi-user massive MIMO systems by using a uniformly distributed user location model. This work presents the analysis of area spectral efficiency and some system parameters such as the number of base station antennas, the number of users and pilot-to-data power ratio of the massive MIMO cellular system. The area spectral efficiency is achieved for different path loss models and by considering different SNR values. Key Words: Area Spectral Efficiency, Massive MIMO, Cellular System, 5G wireless communications, Multi-cell multi-user

ANALYSIS OF SIGNAL ACIVITY DETECTION IN ACOUSTIC EMISSION

Original Research Article

Anand, S. and K.Bharathi

Abstract

In recent years, the dynamic behavior of solid structure defects is extremely important as a small defect that is growing may well be more significant than a larger stable defect. Acoustic Emission (AE) is the method used to investigate the behavior of defects under stress. The importance of the AE is to determine the source location when it occurs. It is a real time monitoring technique. Identifying the actual sources of elastic waves during rapid local stress relaxation in solids under load is the major point in acoustic emission non-destructive testing, seismology and soon. This relies heavily on the accuracy of the arrival time detection process. Conventionally block thresholding technique is used to detect the Acoustic Emission, but accuracy is less in this method. The main focus of this work is to increase the accuracy of the real time signal detection and to verify actual phase picking transient waveforms of minimum amplitude, using novel wavelet transform based algorithm. This algorithm relies on the fact that noise commonly manifests itself as fine-grained structure in the signal, and Wavelet Transform (WT) provides a scale-based decomposition. This algorithm was evaluated in different types of acoustic emission tests, demonstrating the excellent temporal localization of the phases picked, even for the signals with minimum signal to noise ratio (SNR) and time of arrival (TOA) of the signal is detected exactly. This method is applied for different signals having different frequency sampling (Fs). In this work signal activity and time of arrival is determined using wavelet transform and block thresholding method. The results are obtained for signal activity and time of arrival for both techniques. From these results the accuracy is high for wavelet transform method when compared to block thresholding algorithm. Comparing to block threshold algorithm the wavelet based approach is applied to the signals with low amplitude and low SNR. These results will be helpful to find whether the signal will intrusive or not. Keywords: Acoustic Emission (AE), Wavelet Transform, Time of Arrival (TOA), Signal to Noise Ratio (SNR).

INTELLECTUAL LOCKER PROTECTION SYSTEM BASED ON OPENCV AND USER AUTHENTICATION USING ANDROID

Original Research Article

Murugeswari, D., B. Malavika* , P. Maneesha and R. Sumitha

Abstract

In our day to day life, Security and Authentication of individuals is necessary, especially in Bank lockers. But the security provided by bank systems has some backfalls. It has been enhanced by using techniques like pattern recognition comparing their existing traits and there is still a need for considerable computer vision. In this system a new approach is proposed for banking system. At first pattern flow are collected as data sets and maintained in bank agent server. The machine is attached with a camera to capture the pattern flow of user and sent for processing features of the user is recognized by comparison. Along with the authentication of user there is another system to identify the user before that RFID tag checking . Password entry through mobile phone is needed for next level of security. This can be done by using Bluetooth and also authentication is checked by verification through IMEI number. Finally when all levels of security is finished , the locker is opened for the user and the information is passed to the bank manager. Temperature and vibration sensors are used to find thief entry inside the bank. This project shows that all the bank accounts can be accessed using cards through this pattern recognition effectively and safely. KEYWORDS: Security,Authentication,OpenCV,WirelessCommunication,RFIDtags.

RELIABILITY AND SECURITY CONSTRAINED UNIT COMMITMENT PROBLEM FOR HYBRID POWER SYSTEM USING BI-LEVEL OPTIMIZATION TECHNIQUE

Original Research Article

1Banumalar. K., 1Manikandan B. V. and 2Chandrasekaran.K.

Abstract

In this paper, hybrid nodal ant colony optimization (NACO) and real coded clustered gravitational search algorithm (CGSA) has been proposed for solving wind integrated thermal unit commitment problem. The reliability of the system will affected by high wind penetration. Hence, NACO-CGSA hybrid approach has been proposed for solving the reliability based security-constrained unit commitment (RSCUC) problem. NACO solves reliability constrained unit commitment (RCUC) problem and real coded CGSA solves security constrained economic dispatch (SCED) problem. The proposed method is implemented and tested using MATLAB programming. The feasibility and effectiveness of the proposed method is verified by IEEE Six bus system and the results are compared with those of other methods reported in literatures. Index Terms: Bi-level optimization techniques, Nodal ant colony optimization, Reliability and security constrained unit commitment, clustered gravitational search algorithm, Security constrained economic dispatch, Transmission constraints.

AUTOMATIC USER MISBEHAVIOR DETECTION IN CREDIT CARD TRANSACTION

Original Research Article

A. Pavan Kumar1 , Y. Akhil Kumar Reddy2 and B. Ankayarkanni3

Abstract

In recent years the data mining technique is implemented but the Big Data concept is emerging. Data Mining can process only structured data only. So there is no proper function to extract useful information from instructed data and it is very less effective. The fundamental challenge for Big Data applications is to explore large amounts of data and extract useful information for future action. By this there is no security for the credit card usage. In this paper, we will discuss about the misbehavior of credit card using the big data. So now the user credit card details (mobile number etc.) and all the credit card transactions will be stored in the server and it will also analyze time to time. Now the credit card user sets a range of transaction like amount and frequency in particular amount and time. So when the user crosses the range of transaction then an OTP will be generated to the user mobile. By there will be more safety for users in case of misuse of credit card in case it is lost or stolen by someone and this process is also more effective. Keywords—range of transaction, OTP, big data.

DATA LOGGER FOR A MINIATURE MODEL CAR USING CAN BUS

Original Research Article

1S.Sreevatsan, 2Adithya Shankaranarayanan, 3T. Vishwanthan, 4L E Aravindraj, 5E Santhosh Kumar and 6K P Peeyush

Abstract

In this paper we propose an application of data logger. We take data from sensors attached in a model car and store it in an SD card. We are using CAN bus to communicate between microcontroller. We stored the data of accelerometer, brake and crash. The data is stored in the form of .txt file so that it can be used in the future easily. The data is updated for every 1 second.

TUMOR DETECTION IN MEDICAL IMAGES USING SELF ORGANIZING MAP

Original Research Article

" B.Jyothi1 , Y.MadhaveeLatha2 and P.G.Krishna Mohan3 "

Abstract

Boundary is very commonly defined as line that distinguishes two different regions. Boundary provides clarity to human eye in understanding any view. It plays a major role in Medical field, as finding the correct boundary in noisy images is still a difficult task. This paper introduces the new technique of detection using the information of intensity and texture of an image. Our proposed technique detects the boundaries of objects in noisy images using the information from the intensity gradient via the vector image model and the texture gradient via the edge map. we discuss the proposed technique on various medical images using Self organizing map (SOM) clustering provides correct boundaries even in an ill-defined images and multi grey level images. This method is robust and applicable on various kinds of noisy images without prior knowledge of noise properties

MAGNETIC RESONANCE IMAGING: A SYSTEMATIC REVIEW

Original Research Article

1Roshini T V. and 2K. Subramaniam

Abstract

MRI (Magnetic Resonance Imaging) scanners has major role in diagnosing complex diseases. Super conducting magnet was one of the essential parts in MRI scanner, which dissipates heat while in running condition. So an external cooling system has been used to cool the superconducting magnet. In existing case liquid helium was used as the cooling agent for cooling the super conducting magnet. However the cost of liquid helium was high and it is very difficult to handle because it is effortlessly exposable. In this paper we propose a cooling system for MRI scanner based on LASER Technology. Laser Cooling System (LCS) is a resonant technology used for cooling an object to an absolutely quite low temperature by around 40kelvin. The proposed cooling system for MRI scanner using laser provide optimal cooling and reduce cost and handling complexity. Keywords: Magnetic Resonance Imaging (MRI), Super conducting magnet, MRI cooling system, Laser Cooling System (LCS), LASER, Doppler Effect

THERMO ELECTRIC POWER GENERATION USING HEAT FROM EXHAUST GAS – A RECENT REVIEW

Original Research Article

P. Sai Chaitanya1, T.V.S. Siva2, and B. Suneela Rani3

Abstract

Today world is under pressure to produce energy that would affect environment to a minimum level. As it is aware that world is under energy crisis, so there is a need for development of a novel technology to generate energy that would affect environment to a minimum level. One such novel technology would be thermo electric power generation. This paper aims to review the possibilities of generating power using Thermo Electric Generator (TEG). Through this review it can be concluded that thermo electric generators can be used in automobiles to generate power effectively for different systems. The best part of thermo electric generator is that exhaust gas heat can be utilized to generate power. Keywords – Automobiles, Energy Crisis, Exhaust gas heat, Novel technology, Thermo Electric Generator

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY

Original Research Article

Jobin Varghese1 and K. Nisha Menon2

Abstract

Wireless Sensor Networks (WSNs) are the networks of sensor nodes that are connected by a wireless channel. Sensors are usually deployed in an ad hoc fashion, resulting in self organized topology. Performances of WSNs are highly related to the Medium Access Layer (MAC) mechanism. These sensor MAC schemes are different from traditional wireless MAC such as IEEE 802.11. In literature there are many protocols available for WSNs but SMAC is one of the most popularly and commonly used protocol for WSNs. This paper provides comprehensive performance analysis of the existing S-MAC protocol and Time-Based protocol (TDMA) used in WSNs. The paper presents a comparison of the performance of SMAC and TDMA on flat grid topology with a single sensor node as the sink. Here multi-hop transmission is considered and reveals fundamental tradeoffs on throughput, energy and latency. Simulation is done using NS2. Simulation result shows that TDMA has more energy savings, less latency and high throughput when compared with SMAC.

ENHANCEMENT OFMAMMOGRAM IMAGES EFFECTIVELY USING DOUBLE FILTERING TECHNIQUE

Original Research Article

G.R.Jothilakshmi1 and E.Gopinathan2

Abstract

Breast cancer is the most common death causing cancer among women. Mammograms are used as a best screening tool to detect early breast cancer and processing of these images requires high computational capabilities.Due to ill-performance of X-ray hardware systems, mammographic images are generally noisy with poor radiographic resolution. This leads to improper visualization of lesion detail. Mammogram enhancementis an important preprocessing technique for identifying mass and micro-calcification. Non-linear filters are generally preferred for image enhancement applications as they provide better filtering results not only by suppressing background noise but also preserving the edges. In this paper, a mammogram image which is affected by salt and pepper noise is considered.The proposed method presents a combination of Adaptive Volterra filter withany one of existing filters like mean,median, min-max may be used for contrast enhancement of mammograms. For comparison, mammogram which is corrupted by Gaussian, Poisson and white noise is considered.These noises are eliminated using four combination of filters and the performance of filters is evaluated by calculating peak signal to noise ratio (PSNR) and Mean square error(MSE). Key words: Adaptive Volterra filter, Peak signal to noise ratio (PSNR) and Mean square error(MSE), Digital mammogram.

SOFTWARE BASED TESTING OF MICROCONTROLLER USING REAL TIME OPERATING SYSTEM

Original Research Article

V.Prabhu* and K.T.Ilayaraja

Abstract

Microcontrollers have made their way into embedded applications such as automobile electronics, industrial automation and peripherals for computer systems. For the microcontroller to perform efficiently it is necessary for a test engineer to check the proper operation of a product. Manufacturing test is one of the most difficult tasks in the semiconductor industry. This paper presents a novel approach for testing a microcontroller with software based tests using RTOS (Real Time Operating System). The methodology exploits existing manufacturing test programs designed for software based self test and enhances them by using a new approach with RTOS. Experimental results are reported in this paper showing the reliability and effectiveness of the method in detecting faults in a microcontroller.

CONTROL OF VAMPIRE BASED DISEASES IN SLUM AREA SURROUNDED BY COOVAM RIVER AT CHENNAI

Original Research Article

R. Kings Krishna NagarajaSingh 1 and S.RajeshKumar

Abstract

In the recent survey report of Chennai Corporation encountering twin problem of mosquito menace and mosquito borne disease like malaria and dengue. Between these public health issues, the problem of mosquito menace is realized more by the people of Chennai then the disease. The chief source for mosquito menace in Chennai is water ways an d storm water drains (Koovam). Nowadays the Mosquitoes are a big menace to humankind and these are present in every corner of the world. The mosquitoes are pestilent and it can spread diseases also. The best way to destroy mosquito is electronic killing using Swatter. It used to keep away from the use of toxic chemicals. The mosquito coils and liquids do not kill mosquito but they repel them only. When the chemical disappears from the atmosphere the mosquitoes will return back. The swatter we designed is meant for destroy the mosquito and not for repelling. Since each mosquito lays thousands of eggs, destroying a mosquito equals to destroying thousands of mosquitoes. Mosquitoes are Crepuscular (Twilight active- Evening and early morning) and they show mass migration in places where human beings are located. Based on survey reports most of the mosquito has feeble flying ability, so that they capable of flying only 10-20 meters distance and also up to a height of 20-25 meters. Mosquitoes usually fly above the ground level around 2-3 feet. That is why we get more mosquito bites in the legs.In our project initially we have a plan to build the swatter in each window and around stagnant water of our house. The swatter gets supply from battery which in turn charged with the help of solar panel or it gets supply from Main. The microcontroller will decide when to switch on / off the swatter and also it monitors the charge and discharge level of battery and also it close the window automatically during rainy time. Also we have the plan to implement the same in Koovam River {Chennai} just by building fence at the side of river at a height of about 4 meter.

EXPERIMENTAL AND THEORETICAL STUDY ON EFFICIENCY OF PORTABLE MINI SOLAR POND USING DISSIMILAR SALTS

Original Research Article

Sathish, D.1 , T.R.Sathish Kumar2 and S. Jegadheeswaran3

Abstract

Solar energy was used from the ancient period itself. Solar energy can be entrapped by a number of ways but most prominent way by using solar pond. Solar pond has four types this paper deals with non convective salinity gradient solar pond. Solar thermal energy generated by a salinity gradient solar pond (SGSP) is one of the significant promising techniques for providing heat for desalination and other applications. Most commonly used salt is sodium chloride, but in this research, table salt which is having the similar properties like sodium chloride is used. A pond was located at 11°N walls were inclined at 45° to the horizontal. The pond was built of mild steel (1.6 mm thick) with a trapezoid surface area and with total depth of 1.7 m2 and 500 mm. The pond was insulated by 20 mm, 2mm thick of thermo styrene and High Density Polyethylene sheet.

MEDICAL IMAGE FUSION USING STATIONARY WAVELET TRANSFORM WITH DIFFERENT WAVELET FAMILIES

Original Research Article

R.Asokan1 , T.C.Kalaiselvi2 and M.Tamilarasi3 ,

Abstract

The Medical image fusion restrain the complementary and significant information from multiple source images that used for identify the diseases and better treatment. Image fusion has become vital part of medical diagnosis. This paper presents a comparative study of wavelet families along with its performance analysis. Magnetic Resonance Imaging (MRI) is used to fuse which form a contemporary image so as to improve the complementary and redundant information for diagnosis function. The proposed method of Stationary Wavelet Transform (SWT) with Fusion using Principle Component Analysis (PCA)are employed along with its analysis both Qualitative and Quantitative Analysis methods. Quantitative Analysis of experimental results are evaluated by way of performance metrics like peak signal to noise ratio (PSNR), Entropy (E), Standard deviation(SD)and Image Quality Assessment(Q).Assessment of different wavelet family techniques concludes the better approach for its upcoming research.

"IDENTIFYING RATING AND REVIEW BASED RANKING FRAUD IN MOBILE APP MARKET "

Original Research Article

"Uthra, K1 and R. Dhanalakshmi2"

Abstract

"Nowadays ranking fraud in mobile App market became more popular in the market in order to display their apps in the popularity list and to boost their sales.As the applications increase the fraud is also increasing. Therefore, there will be an increase in ranking fraud in the upcoming time, as the number of Apps developers and applications will likely grow very significantly. Many traditional methods of fraud analysis have been used to detect fraud. But these methods are complex and time-consuming. However, there is more need to adopt some better techniques which can ensure the ranking fraud detection efficiently by data mining analysis. This paper explores the data mining methods to identify the fraud by using Rank Aggregation algorithm. Further three types of proofs are studied they are ranking, rating and user comment proofs. And an aggregation method is used to aggregate all the proofs and will produce an optimized report for fraud detection."

INSTITUTION SYSTEM ANALYSIS BY USING SIMILARITY BASED CLUSTERING ON SOCIAL NETWORK ACCESS

Original Research Article

Vinothan Damodaran and Saravanan, M

Abstract

The SNA (social network analysis), branch of difficult systems can be utilized in the construction of multi-agent systems. This paper proposes a Institutional system using SNA network analysis which can assist in modeling multi-agent systems, when addressing similarities and differences among the two theories. We fabricated a model of multi-agent systems for determination of errands through the development of groups of agents that are shaped on the social's premise system built up between agents. Agents make utilization of execution pointers to survey when ought to change their social network to expand the support in groups. There are two issues on that we tend to focus during this paper. the primary one is to seek out the intrinsic institution network structure and other is to check funding policies within the previous years and search for the optimum policy. So, to overcome on this issue, we proposed the similarity based clustering for categorize the institution dataset, and this procedure utilizes a multi-agent system, it is constructed on agent interactions. As well as searching for feasibleassociation between student performance and funding policies. After cluster the datasets, then it’s stored into Databases based on highest similarity. Also in this system mainly focuses to user (i.e. student, teacher, others) etc. retrieves the top most order institution from the DB. At last, Institution will know the quality of their colleges, when compared to other Institution of highest similarity of Institution.