• +92 (345) 3557795
  • pakjournalbiotech@gmail.com

    EDITORIAL BOARD


    Pak. J. Biotechnol. Vol. 14 (special issue-II) 2017

    CLUSTERING OF VIDEO INFORMATIONS USING BRICH METHODOLOGY

    By D. Saravanan

    Abstract

    Information extraction one of the emerging field today because of the huge data sets. Creation and uploading information’s are easy to any user, retrieve the relevant content is most challenge task. Due to that number of researchers and research work progress in this area. This extraction process required basic domain knowledge, extraction of image data sets this knowledge are highly essential. Extraction of video data are most challenge task to the user because of the complex nature of the video. In video data mining, video data are grouped into frames. The vast amount of video frames, fast retrieval of needed information is important one. In this paper, a Birch-based clustering method for content based image retrieval is proposed.


    HIDDEN OBJECT DETECTION FOR CLASSIFICATION OF THREAT

    By 1K.S. Gautam, 2 Senthil Kumar Thangavel

    Abstract

    The paper proposes an intelligent K-means segmentation algorithm that clearly segments foreground objects and completely occluded objects. When a person completely occludes an object while entering into the area of video surveillance, it is considered as an anomaly. The paper comes up with a robust technical solution to address this. The proposed algorithm chooses an optimal value for K and segments the object. The scope of the system extends to the area such as prison, airport etc.. where there is a need to monitor completely occluded objects and other objects in the foreground. The system is tested with images from Stereo Thermal Dataset and achieves a precision rate of 88.89% while segmenting objects. From the experimental results, we infer that the proposed algorithm is robust in segmenting the objects without losing its shape and number.

    REAL TIME EXPERIMENT TO SETUP THE BALL AND BEAM SYSTEM

    By Merin Mary Sabu, A. Brindha and A.Vimala Juliet

    Abstract

    The proposed paper carries out experiments to explore suitable control techniques to setup a real time Ball and Beam system with the help of a Quanser Servo motor. Methods/Statistical analysis: To develop an efficient controller, modelling of the system is significant which is accomplished using frequency response method with the Quarc toolbox. A fuzzy logic controller is designed to enhance the ball and beam system's response. A classical PD controller is also employed to understand better the functioning of a non-linear controller such as the designed fuzzy controller. These controllers are implemented using QUARC toolbox in simulink MATLAB. Determining the behavior of a controller involving a non-linear system is a tedious task to test and develop. To stabilize the ball on the beam, the control systems are employed in such a way as to measure the position of the ball which is taken as the feedback signal in order to adjust the beam angle accordingly. The performance results between the two controllers are compared. While the designed PD controller showed good performance, it is obvious that in case of few parameter changes of the system it led to the decline of the controller's performance drastically. Thus, revealing the dire need of an intelligent controller such as the fuzzy controller than the PD controller which stabilizes the system efficiently and that the ball is controlled steadily. Improvements: The proposed controller is designed in such a way that it targets in the improvement of timing performance of the controller as well as better stability of the ball on the beam.

    IMPROVED IMAGE RETRIEVAL USING IMAGE NOISE REMOVAL TECHNIQUE

    By D. Saravanan

    Abstract

    Technology brings image data more interesting and more usage for various applications. Creation of quality image information are challenging tasks today. Today every information’s are produced in terms of images, quality images only produced good information’s and result, so it is necessary to the user community produced quality images. This paper brings a new filtering technique for corrupted and noisy image files. Most of the existing technique removes the error but quality of the images get spoiled. Proposed technique removes the noise in stepwise process, each step particular nose information get removed. This helps to preserve the quality of input image. Experimental results verified that proposed technique produced quality images.

    INFORMATION RETRIEVAL USING TEXT LEVEL CLUSTERING USING PAGE RANKING TECHNIQUE

    By D.Saravanan.

    Abstract

    In the aspects of mining, it is used to extract the data’s in the efficient manner and then fast retrieval of data’s. The current aspect is to clustering the sentence level text by using the proposed algorithm. By means of that, it allows patterns to all clusters .we give a text in a sentence or a sentence that has to be relatively present in documents or a set of documents. Every clustering algorithm finds the association between the data points. Based on the closeness between the data points clustering are take place. Item are very close each other they are all in one group. Items are not similar they are all form in other groups Techniques are finding similarities between the given text. Based on data and the data objects by using the novel fuzzy clustering pattern.

    THE TRENDS AND CHALLENGES IN BRAIN COMPUTER INTERFACE TECHNOLOGY – A COMPREHENSIVE STUDY

    By 1Ganesan P and 2 J. Merlin Mary Jenitha

    Abstract

    A brain-computer interface technology is a direct communication passageway between a human or animal nervous system (brain) and an external world to control electronic devices such as computer using only brain waves without any movement. Based on communication, brain-computer interface can be classified as either one-way BCIs or two-way BCIs. Electronic devices can either transmit signals to brain or receive signals from brain in one-way brain-computer interface. In two-way braincomputer system, there is an exchange of information between the external devices and brain in both directions i.e., acts as transceivers. The scope and latest developments in brain computer interface had discussed in this work.

    A TECHNICAL SURVEY ON IMAGE CONTRAST ENHANCEMENT TECHNIQUES VIA HISTOGRAM EQUALIZATION

    By K. Valarmathi1 and S. Anand2

    Abstract

    Image processing methods process an image so as to make it suitable for applications like medical image analysis, video conferencing, remote sensing, HDTV, industrial x-ray image processing, Underwater image enhancement, microscopic imaging etc. Enhancement improves image quality in such a way that it is suitable for further processing. Contrast enhancement techniques increase the contrast of an image by making lighter colors more lighter and darker colors more-darker. Histogram Equalization is normally used for contrast enhancement. There are many histogram equalization techniques which differ in the input histogram separation style based on mean, median etc. In this paper, we discuss various image contrast enhancement techniques that employ histogram equalization.

    A COMPARATIVE STUDY ON POTHOLE DETECTION TECHNIQUES FOR VEHICLE IN AN INTELLIGENT TRANSPORTATION SYSTEM

    By Parimala Garnepudi and D. Venkatesulu

    Abstract

    In modern days, the economical growth and flying technologies has led to serious affect on the quality of traditional transport system. Intelligent transportation system (ITS), desire to boost the transport system, and it becomes more and more popular. Moreover, improving the safeness of traffic is an important task of ITS. The road cracks can be identified in the form of paved path defects, road bumps and potholes. In these types of road defects major damage to vehicles and lost human lives is because of road bumps and pothole. Thus, in detection of these road defects potholes and road bumps takes the major role. This paper gives the study of various pothole detection techniques. Potholes cause tire blast and damage the wheel. The impact of pothole is more on lower vehicles, such as collision of vehicles and causes serious accidents. Thus, accurate and quick detection of potholes has become one of the important task for ITS and road management system (RMS). More research has been made for determining a technology for automatic detection and recognition of potholes. This paper gives the study of existing path hole detection mechanisms and results. The pothole on the road causes serious harm to drivers’ safety. Therefore, drivers’ safety may be improved with the improvement of real-time pothole detection system for sharing the pothole information Section 1 gives the introduction, Section 2 gives related work, results in Section 3, Conclusion in Section 4 and Section 5 gives references.

    AUGMENTEDPERSPECTIVE MINING METHODOLOGY FOR CONTROLLED SOCIAL MEDIA

    By K. Shantha Kumari, R. Kameswaran, S. Pravin Poul, P. Poovanna Pemmaiah

    Abstract

    Social media is a rich source of information which are open to anyone and can be utilized for a wide variety of application. But every information shared on this platform reflects the user’s perspective. However, the truthfulness of that information on anything (event, accident, personality, product, etc.) must be verified to avoid any unwanted consequences such as rumor propaganda, character assassination, product quality evaluation etc. On specific to Twitter, users masquerading as popular personalities, post certain false information. There is a need to control such behaviour across various social media. Existing research works followed Sentiment Analysis, Opinion Mining, Intelligent technologies etc. to mine the truth from every bit of BIG DATA available at social media. This process has the probability that even false data posted by masqueraded users could be classified as truth. This requires verification from the originator [Source of information about event/personality/product etc.] of the post in an automated manner. In our work, we are proposing an augmented perspective mining algorithm that takes live streamed data from twitter and verifies its trustworthiness in an automated voting process based on Straw-poll technique. This technique uses the information from Twitter’s officially verified users as training set to compare and filter the information from masqueraded users and thus improvising the performance of mining.

    AGGRANDIZEDTECHNIQUEFOR RECOGNISING OFOFFENSIVELANGUAGEIN ONLINE NETWORK

    By K. Shantha Kumari, R. Prem Kumar, Mohammed Thowfeeq,

    Abstract

    Extensive usage of Social media in this modern era provides entirely a new form of social interaction and communication especially among the adolescent and youth population. They tend to converge at social media for sharing their opinions and thoughts on common issues. However, the young people are also vulnerable to cyber-bullying by means of the offensive language which is spilled across the online web. To avoid severe results (mental trauma, stress etc.), it is important to act proactively to detect online bullying activity. This paper discusses an optimized technique to recognize the offensive language in Online Social media, specifically for Twitter. Previous works mostly concentrated on Keyword matching along with intelligent technologies to recognize the whether the published content is cyberbullied or not. In addition, most of the algorithms were tried only on stored dataset. Cyberbullying can be thwarted if the probability of a tweet user to be an abuser could be predicted earlier with a live capturing of data’s from Twitter. This research work proposes an optimized technique for detecting the offensive language in Tweets by Naive Bayesian Text Classification. In addition, FGA logic is used to detect the possibility of abusive Tweet users. This approach is evaluated with data’s from Twitter and the performance of this optimized technique is discussed.

    Analysis of the effect of NBTI on data flip time dependency on an MTCMOS SRAM

    By Patibandla Anitha1 , B.L. Raju2

    Abstract

    The predominant restraining factor of the circuits lifespan are Temperature Instability effects like NBTI and PBTI. A regular configuration to evaluate the influence of NBTI on a circuit’s operation is developed relating significant circuit constraints such as the node switching action, variation in supply voltage, temperature etc. The influence of NBTI on Read strength of SRAM cell is analyzed. Due to the NBTI stress, the working of the SRAM is totally affected. The consignment of deterioration in Static Noise Margin (SNM), is computed by the read steadiness of SRAM cells is appraised. We suggest a novel method to retrieve the SNM of SRAM cells employing a data flip process and portray the results obtained. The performance issues of the data flip time are analyzed by HSPICE simulation with varied supply voltages. The circuit design with NBTI stress is calculated depends upon the simulation setup of HSPICE tool. The supply voltage is varied by 0 V, 0.2 V, 0.4 V, 0.6 V, 0.8 V and 1 V with a length of 45nm and width of 90nm (Taken from PTM technology).

    FEATURE DIMINUTION BY HYBRID ALGORITHM FOR IMPROVING THE SUCCESS RATE FOR IVF TREATMENT

    By Durairaj M., Nandhakumar Ramasamy

    Abstract

    Infertility is the most common problem faced by today’s generation. The factors like environment, genetic or personal characteristics are responsible for these problems. Different infertility treatments like IVF, IUI etc are used to treat those infertile people. But the cost and emotions beyond each and every cycle of IVF treatment is very high and also the success rate differs from person to person. So, there is a need to find a system which would predict the outcome of IVF to motivate the people both in psychologically and financially. Many Data Mining techniques are applied to predict the outcome of the IVF treatment. Reducing the unwanted features which affects the quality of result is one of the significant tasks in Data Mining. This paper proposes a hybrid algorithm which combines the core features of Ant Colony Optimization Algorithm and Relative Reduct Theory for Feature Reduction. In this work, the proposed Algorithm is compared with the existing related algorithms. It is evident from the results that the proposed algorithm achieved its target of reducing the features to minimum numbers without compromising the core knowledge of the system to estimate the success rate.

    A CLOUD BASED SECURED FRAMEWORK FOR SMART MEDICAL DIAGONSIS: A SURVEY

    By Leelavathy. S 1 ., S. Selva Brunda2

    Abstract

    Enormous amounts of medical data are being collected by several well-developed HIS (Hospital Information Systems) in the form of patient records in hospitals. The hidden patterns and relationships contained in this data are identified using various data mining techniques which has drawn increasing world-wide attention in the recent years. As a result of which, a good number of MDSS (Medical Decision Support Systems) have been developed. These are computer systems designed to assist physicians or other healthcare professionals in making clinical decisions for the given patient’s symptoms and medical history. Inspired by the existing systems, the model proposed in this paper aims at making a knowledge sharing collaborative platform for doctors which serves as a realistic and effective Medical Decision Support System. It is important because it provides vital information from different data sources. It has several challenges like scalability, response time, heterogeneous data formats. This paper does a detailed study of different challenges in understanding about medical information that can be provided to users in a better manner. A framework named Intelligent Healthcare Framework (ISHF) is being proposed in this paper.

    SURVEY ON NONOBSTRUCTIVE AND CONTINUOUS USER AUTHENTICATION ON MOBILE DEVICES

    By N. Lalithamani, Raam Balaji D., Satya Dev

    Abstract

    The use of mobile devices in our day to day life has increased drastically in the last ten years. Much of it can be contributed to the breakthrough in the field of communication. Since they contain most of our personal information, the constant worry of security and privacy has increased. In order to tackle this problem, non-obstructive and continuous user authentication has been proposed. This paper deals with the methods that have been proposed till now and the challenges that are yet to be overcome in this field.

    A SURVEY OF EXTANT SURVEILLANCE SYSTEMS USINGBIOMETRIC TRACKING

    By Vasanth Subramanian, Sunil Dev Choudhary B., Lalithamani N.

    Abstract

    Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments. Although current systems are remarkable, they are far from impeccable and are limited by several conditions. In short, there is still vast scope for major improvements in our extant systems. In this survey, we strive to provide a comprehensive review of the present literature and to propose a better model that would aim to solve the present limitations.

    QUALITY BASED PROXY SIGNATURE IN CLOUD COMPUTING WITH UNFORGETABLE REENCRYPTION KEY

    By A. Nazreen banu, Ignatious K. pious, J. Nandhini and D. Hemalatha

    Abstract

    Cloud storage is an essential research subject in data innovation. In Cloud storage, date security properties, for example, information privacy, honesty and accessibility turn out to be increasingly critical in numerous business applications. In broad daylight cloud computing, the customers store their immense information in the remote open cloud servers. Since the put away information is outside of the control of the customers, it involves the security chances as far as secrecy, trustworthiness and accessibility of information and administration. To overcome the security chance we present another strategy known as KGC (key era focus) by utilizing distinguishing proof. Since character based cryptography turns out to be more effective in light of the fact that it maintains a strategic distance from of the authentication administration, an ever-increasing number of specialists are well-suited to study personality based intermediary cryptography.

    COPERATIVE LOAD BALANCE IN CHANNEL ALLOCATON IN INSTRUCTION AND DECETION PROCESS IN MANENT

    By S. Vinod1 , J. Nandhini1 , R.G. Gowrimanju1 and J. Siva2

    Abstract

    The MOBILE ADHOC NETWORK(MANETS) is used to communicate data in bottlenecks where Intrusion Detection Systems (IDSs) can be sent da in manent process. This, thus, expands the significance of data transmission effectiveness while keeping up tight prerequisites on vitality utilization, deferral and jitter .cooperative channel access system is used to allocate channel in load distribution system .The existing system is channel allocation is non uniform distribution .Un coordinate protocol is center to reach all channel do not allocate channel in proper manner .The Network allocation in channel can send data in static manner in allocation .The proposed system is used to allocate channel in dynamic channel process and data send and receive to avoid noise in system to provide dynamic channel allocation and cooperative load balancing we use the MH-TRACE (Multi-Hop Tim e Reservation Using Adaptive Control for Energy Efficiency) protocol.MH-TRACE protocol contains four types of slots data ,node ,channel ,coordinate in channel process. Address these issues in two conceivable application settings, in particular, Cluster-Dependent Leader Election (CDLE).

    ARCHITECTURE OF MOBILE CLOUD COMPUTING

    By C. Arun and K. Prabu

    Abstract

    Nowadays the requirement of anytime anything from anywhere, the accessibility of data is increased, with the help of the “cloud computing”. Cloud computing allowed to the mobile users to access the remote resources through internet on pay-asusability basis. The importance of cloud computing is that “the user only paying for what they really use and only utilize what they required”. Cloud computing is used to serve services to a local-client via the internet on on-demand basis. The mobile devices have only less amount of storage volume and less processing power so requirement of cloud computing in mobile devices is increased. The Mobile Cloud Computing (MCC) is the mixture of cloud computing and mobile computing. The movable devices need not to have high configuration because all computations process are performed inside of the cloud. In this paper we are talk about the Architecture of Mobile Cloud Computing (MCC), which includes introduction to MCC, architecture of MCC, advantages of MCC and applications of MCC. And it also covers what are the problems in MCC.

    ROUND ROBIN ARBITRATION DESIGN FOR DIFFERENT APPLICATIONS

    By PRIYA AMULRAJ, VENI N

    Abstract

    This paper presents a Time efficient and an area efficient, two different ways of designing Round Robin Arbitration for different applications. An arbiter is a logical element which is helpful in selecting the order of access to a shared multi-master bus system. For each bus cycle, which multi-master bus system could be granted to control the bus is obtained using this logic. It uses priority logic and masking logic to decide which requester of many to be granted in a highly fair manner. This works in circular manner and thus starvation is avoided to maximum extent. The first method is suitable for applications where until the previously granted request has been de-asserted or reached its limit, it stays granted. Conversely, whenever the previously grant requests stays de-asserted, on priority basis requests are granted using masking concept. In real time it is used for applications like mobile phones where applications are chosen based on priority such that fairness is highly maintained. The second way of designing is suitable for applications where depending on the priority logic, one request by another is granted when multimaster bus system gives requests and only then moves on to deal with another input. Upon fetching another input it only grants request based on the previously masked output. In real time, it is used in computers where applications are chosen automatically. The Verilog code for both the ways are simulated using Quartus II software and are dumped in FPGA Cyclone IV for validation.

    PRESERVATION OF SPEAKER IDENTITY IN HMM BASED SPEECH SYNTHESIZERS Speech Signal Processing

    By M. Niranjana Priyadarshini, S. Sathya Devi, M. Divya, D. Gayathri

    Abstract

    The purpose of speech synthesizer is to convert the input text to speech. Most common synthesizers are USS and HTS synthesizer. The speech synthesized by the HMM based system is found to be more intelligible than that synthesized by the USS system due to the elimination of sonic glitches and also the memory requirement of HMM based system is less around 5MB as against 500MB for an USS system. Hence HMM based synthesizer is efficient and economical. But in HMM synthesizer, buzziness is detected which prevents the preservation of speaker’s identity and decreases the intelligibility and pleasantness. The speaker’s identity preservation depends on two parameters namely speech rate and number of states used for modelling. When the input speech rate is slow, the generated speech seems to be noisy as the number of formants per window is not sufficient. Hence, the importance of choosing an appropriate speech rate in text to speech synthesis systems is analyzed. Two 3-hour speech corpora – one with a slow speech rate of 8 phonemes/sec and the other with a fast speech rate of 11 phonemes/sec are developed for the South Indian language, Tamil. The effect of speech rate on the synthetic speech produced by four systems, namely, phoneme-based and consonant-vowel (CV) unit - based, unit selection synthesis (USS) and hidden Markov model (HMM) – based synthesis systems, are analyzed. Based on a subjective evaluation using the mean opinion score (MOS), it is observed that three systems perform better when trained with the fast speech corpus, with MOS ranging between 2.78 and 3.18, except in the case of CV based USS. Further, it is observed that the phoneme-based systems perform better than the CV-based systems, with three hours of data.

    PUPIL LOCALIZATION AND SEGMENTATION USING MORPHOLOGICAL MARKERCONTROLLED WATERSHED TRANSFORM AND MULTIPLE THRESHOLDING TECHNIQUE

    By Madhumitha S. and M. Manikandan

    Abstract

    In this paper, the marker-controlled watershed transform along with morphological operation is proposed to detect the pupil region. Firstly, the contrast enhancement is one to remove the noise caused due to illumination and then morphological reconstruction operations are applied. Standard Open-Close and Standard Close-Open operations are proposed initially, later switched to Close-Open by reconstruction and Open-Close by reconstruction. The experiment is done for 150 images chosen from the CASIA v4 database. Experiment results shows that the Open-Close by reconstruction performed along with watershed transform could detect the complete pupil contour. It also addressed the over-segmentation issue. To segment the pupil region for further analysis Thresholding method is chosen. For various threshold range, the quantitative analysis is performed by evaluating certain features associated with the pupil. The results shows that the Multiple thresholding over the range of 21 pixels yielded better results in terms of accuracy.

    AN IOT FRAMEWORK FOR EFFICIENT COOLING SYSTEM IN GREEN BUILDING

    By P. Golda Jeyasheeli and J.V. Johnson Selva

    Abstract

    Today Green Building is an important research area in IOT. The energy efficiency in green buildings is vital for global sustainability. However, many factors affect energy consumption by the green building and most of the green buildings are not really green due to static power policy and complete grid based power supply on devices. Here we propose a design based on environmental factors for green buildings cooling system to dissipate heat dynamically for every small seasoning changes to attain effective power efficiency.

    VANET: METROPOLITAN SCENARIO TRAFFIC HANDLING AND CONGESTION AVOIDANCE

    By B.V.N.S. Lasya Priya, Parimala Garnepudi, D. Venkatesulu

    Abstract

    VANET is an exclusive category of wireless ad-hoc networks, which emerged as an exciting research and application area. In the recent decades, VANET gained a tremendous response in the field of research for building communications consistently between vehicles for simple navigation and better control over traffic by equipping the vehicles with embedded sensors, with processing and wireless communication capabilities. An increasing number of vehicles on the roads increase the traffic in the city which leads to jams (congestion), pollution and various other problems making traffic management a Herculean task. In this paper, we present the theory called “Even-Odd” program in VANET for the control of traffic, better communication between vehicles and their smooth transportation. Introduction of the VANET is presented in Section1, related work in section2, and proposed a system in section 3, and finally results in Section 4

    IMAGE RECOGNITION USING RESTORATION TECHNIQUE

    By D. Saravanan

    Abstract

    The proposed system works based on image recognition system using thermal image concept. Thermal images are improving the image quality in the dark surrounding it find the image infrared redaction and create image information based on the radiation. These images are created with help of infrared cameras, this information is recorded with various temperature. During the process image surroundings are recorded helps to improve the matching process. Image registration process done with help of image registration tool. Input images are segmented and create image signature. Finally, image model was generated it help for matching process. For any matching process image model is required for that this model created and stored. The proposed with done with help of image restoration algorithm, experiments verify that proposed work brings efficient result.

    ADVANCEDSYMMETRICKEYCRYPTOGRAPHYALGORITHM FORINFORMATION SECURITY

    By Sameera Shaik1 , Sharma S2 , Vishnu S 3 , Srilakshmi U 4

    Abstract

    Information is one such thing, which has become crucial weapon in the race towards the pinnacle of development and evolution. To protect this information from unauthorized access and/or damage or misuse, the concept of information security has been emerged. When the information is transferred from sender to receiver over a network, a hacker can break and expose the actual message that is confidential. To achieve all these things, several cryptographic techniques are generated. A cryptographic technique converts the confidential information into a form, which can’t be understood by a hacker or unintended individuals, which is known as encryption technique and it makes use of a particular algorithm to encrypt the message. The encrypted message is decrypted in the receiver side by using respective decryption algorithm. In this paper, a new algorithm has been proposed and compared with existing ones in terms of encryption algorithm, throughput of key generation and decryption algorithm

    A SURVEY ON CACHE ROUTE SCHEMES TO IMPROVE QOS IN AD-HOC NETWORKS

    By A.Vijay Vasanth1 , K.Venkatachalapathy2 , T.P.Latchoumi3 , Latha Parthiban4 , T.P.Ezhilarasi5

    Abstract

    MANET (Mobile Ad-hoc Network) is a wireless Ad-hoc network which serves all necessities in a real-time world since it possesses dynamic infrastructure qualities. Although MANET works as a best for all fields it also experiences drawbacks based on routing and overall data access process. To trounce with this problem, cache optimization mechanisms along with dynamic routing procedures have been practiced wide to make an improvement in quality factors. Among the cache optimization mechanisms, cache route optimization schemes serve the best in showing signs of development in overall QoS factors. This paper summarizes the possible cache route optimization mechanisms to advance the QoS metrics are Routing Overhead that reducing overhead in route discovery, Packet Delivery Ratio, Packet Drop, minimizes the difference between number of packets send and received over the total time require to touch the destination and reduce the energy consumption by each node

    DESIGN OF 4-BIT MULTIPLEXER USING SUB-THRESHOLD ADIABATIC LOGIC (STAL)

    By Yuvaraj P.1, Rajendran T.1, Kamalraj Subramaniam2

    Abstract

    Objective: This paper presents the low power consumption for Very Large Scale Integration (VLSI) design. The dynamic power consumption of CMOS circuits is continuously becoming a major concern in VLSI technique. Tool: All the simulations in this work are done using Tanner EDA Tools V14.11. Contribution & Results: In this paper the 4-Bit STAL multiplexer design have been analyzed and low power multiplexer is designed using the positive feedback logic. The STAL multiplexer is a Positive Feedback-STAL consumes less power than the CMOS multiplexer is identified from this study. Applications: In mere future the system can be enhanced to perform higher order bits.


    DESIGN OF CMOS 8-BIT PARALLEL ADDER ENERGY EFFICIENT STRUCTURE USING SRCPL LOGIC STYLE

    By Felix Muthu, Aravinth.T.S, Rajendran.T

    Abstract

    Objectives: We present high speed and low power 8-Bit parallel adder cells designed with modified SR-CPL logic styles that had a reduced power delay product (PDP) as compared to the previous logics DPL and pass transistor logic. Tool Used: All the parallel adders were designed with a 0.18µm CMOS technology virtuoso cadence environment. Results: Simulations of the circuit show that the proposed parallel adders have reduced the power from 0.33mW to 0.24mW. Applications: In mere future the system can be implemented in high speed processors for achieving low power

    A SMART TRAFFIC SIGNAL TRAPPING SYSTEM

    By Sandhiya M1, Mathivijay M2

    Abstract

    A Smart traffic control system is presented to pass emergency vehicles smoothly. Each individual vehicle is connected with a special radio frequency identification (RFID) tag (placed in a strategic location), which makes nobody can remove or destroy the unit placed. Here RFID reader, NSK EDK-125–TTL, and PIC16F877A system-on-chip to read the RFID tags which is attached to the movable unit. The RFID is used to count the number of vehicles that passes on a particular path during a specified duration. It determines the network congestion and hence the green light duration for that path is enabled or disabled. If the RFID-tag-read belongs to the stolen vehicle, then intimation is sent using GSM SIM300 to the police control room. In addition to that an ambulance arriving towards to the junction, it will communicate with the traffic controller in the junction to turn ON the blue light. This module uses ZigBee modules on CC2500 and PIC16F877A system-on-chip for wireless communications between the ambulance and traffic controller.

    FFICIENT POWER MANAGEMENT USING WSN

    By 1Jerome Christhudass . A., 2T. Karthik,

    Abstract

    The WSNs are increasingly being used in the home for energy controlling services. Regular household appliances are monitored and controlled by WSNs installed in the home. Modern technologies include cutting-edge advancements in Information technology, sensors, metering, transmission, distribution, and electricity storage technology, as well as providing new information and flexibility to both consumers and providers of electricity. The prototype has been extensively developed and tested in real time scenarios also the results are appreciable.

    APPLICATION OF CLASSICAL STEP RESPONSE METHOD TO DETERMINE THE PID CONTROLLER PARAMETERS FOR A 500 MW STEAM GENERATOR IN A THERMAL POWER PLANT

    By P. Subha Hency Jims1, J. Jayakumar2 and S. Dharmalingam3

    Abstract

    PID controller is the most widely used controller in industries. There are many important functions for PID controller. Feedback is provided; offsets are eliminated by integrator; future anticipated through derivative action. PID control loops are employed in more than 95% of the control loops. Generally, the PID controller parameters are calculated based on trial and error method. In different disciplines of engineering, attempts have been made to propose many new methods for controlling process parameters. Whenever PID control is chosen, iterative heuristic optimization algorithms (soft computing techniques) have been proposed to optimally determine the PID parameters. In this work, the authors have successfully applied the classical tuning methods such as Ziegler Nichols and CHR tuning methods to calculate the PID parameters. The step response method is employed to calculate the ‘a’ and ‘L’ which is used to determine the PID parameters. This is applied to calculate the PID controller parameters for a 500 MW steam generator in a thermal power plant.

    DEVELOPMENT OF FEED FORWARD BACK PROPAGATION NEURAL NETWORK WITH BEST FITTING MODELS TO PREDICT SEASONAL RICE PRODUCTION IN TAMILNADU

    By S. Arun Balaji and P. Manimegalai

    Abstract

    The study reported the development of FFBPNN architecture and its corresponding software to predict the rice production data for three seasons in 31 districts of Tamilnadu. It was found that the training and testing data were exactly matching with the predicted data. It was also found that the Absolute Relative Error (ARE) was found to be zero at the 9th iteration itself. The FFBPNN system was improved by integrating it with the best fitting models using the curve expert software. The improved FFBPNN with best fitting model was used to predict the area of rice and its production. The predicted data was compared with the observed data. The paired t-test was conducted between the observed and predicted data. It was found that there is 67% of fittings are showing insignificant difference between the observed area of rice and predicted area of rice cultivation. Similar test was also conducted for the rice production data; it was found that there is 73.3% of fittings showing insignificant difference between the observed and predicted data.

    NETWORK SECURITY IN CLOUD COMPUTING

    By V. Shrividhya, P. Manimegalai

    Abstract

    Cloud Computing Security architecture using Rijndael as the standard symmetric key encryption algorithm. Data security has become the vital issue of cloud computing security. From the consumers’ perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. So in this we focused on client side security In our proposed system, only the authorized user can access the data. Even if some intruder (Unauthorized user) gets access of the data accidentally or intentionally, he will not be able to decrypt it. Also it is proposed that encryption must be done by the user to provide better security. Henceforth, security is provided using Rijndael.

    DISTRIBUTED MODEL PREDICTIVE CONTROL OF A WIND FARM WITH CLUSTERING

    By *Mallika. S., M. Dharani Kumar, P. Manimegalai

    Abstract

    This work gives a concise overview of the role that distributed model predictive control has el the development of the advanced wind turbine control algorithms. The benefits of the model predictive control compared to conventional controllers convoluted in wind turbine control are defined. Wind turbine model predictive active power controller based on identified piecewise affine discrete-time state space wind turbine model is designed. The designed D-MPC controller showed better performance. A wind farm with ten wind turbines was used as the test system. Research were attend and evaluated, which include the operation of the wind farm with the D-MPC under low and high wind conditions, and the dynamic achieved with a wind turbine out of service. With the fast gradient method, the convergence rate of the D-MPC has been significantly improved, which decrease the iteration numbers. Appropriately, the communication burden is reduced.

    ANALYSIS OF AREA DELAY OPTIMIZATION OF IMPROVED SPARSE CHANNEL ADDER

    By Prajoona Valsalan1,2 and P. Manimegalai2

    Abstract

    With the revolution in integrated circuits, great emphasis was given on performance and miniaturization. Speed, area and power became the main criterion upon which a VLSI system is measured in terms of its efficiency. In any VLSI system, a full adder is widely component, which decides the performance of the system. The design and analysis of a modified Carry Select Adder (CSLA) is proposed in a cadence 45nm CMOS. It reduces the gate count, thereby area is reduced. Based on modification in CSLA, the process is performed in an efficient way in terms of its gate count and thereby on power and speed.

    DESIGN OF LOW INTRICATE 10-BIT CURRENT STEERING DIGITAL TO ANALOG CONVERTER CIRCUITRY USING FULL SWING GDI

    By Keerthivasan S., Mahendra Babu G.R., Rajendran T.

    Abstract

    Aim / Objective: A low-vigor, low-voltage, small- area DAC for prime pace applications is introduced on this paper, for top velocity purposes, the present steering DAC is also used because the entire currents taken from the supply is utilized for the output signal. Scope: This paper it deals with the design and evaluation of a 10-bit FS-GDI DAC which was once applied making use of full Swing (FS) GDI logic in CMOS system. Results: The lively subject of this proposed DAC was decreased to four times in a normal 0.18 µm with a varying voltage variety from 2.5 – 3.3V CMOS approach, each the INL and DNL have been decreased for the proposed scheme of 10-bit FS-GDI DAC, although it’s a procedure of excessive order utilizing FS-GDI DAC. Applications: Utilized for high speed processing circuitries.

    EFFICIENT IMPLEMENTATION OF DECODER USING MODIFIED SOFT DECODING ALGORITHM IN GOLAY (24,12) CODE

    By Vijayakumar.P1* Rajendran.T1# Mahendra Babu.G.R2

    Abstract

    Aim / Objective: The (24, 12) binary Golay code was a well-established rate-1/2 short block-length linear error detecting and correcting code with High performance. Algorithm / Simulation: This paper investigates the design of an efficient low-complexity soft-decision decoding architecture for this Golay code. A new algorithm is introduced that takes a huge advantage of the code’s properties to reduce and simplify the decoding process. Findings & Results: The Simulation result shows that the proposed algorithm of Modified soft decision decoding achieves high performance rates with low processing cost. Here the decoder architecture is mentioned, and VLSI synthesis results are presented. Applications: can be used in high speed cryptography systems

    INVESTIGATION ON WSN ROUTING PROTOCOL IN IEEE802.15.4 BASED WSN UNDER WORMHOLE ATTACK

    By T. Karthikeya, P. Manimegalai

    Abstract

    Wireless sensor networks (WSNs) is one of the most challenging technologies with many application ranging from health care to military applications. In many important military and commercial applications, it is critical to protect a sensor network from malicious attacks. One of these attacks which is hard to detect and mitigate is wormhole attack which presents a demand for strengthen the security mechanisms in the network. In this paper, the performance of zigbee based wireless sensor networks using routing protocols with wormhole attacks has been investigated. This Paper illustrates how wormhole attacks can affects the performance of Ad hoc On-Demand Distance Vector (AODV) routing protocol, Optimized Link State Routing (OLSR) and Zone Routing Protocol (ZRP) in zigbee based WSN by using Qualnet Simulator 5.0. The metrics used to analyse the performance of routing protocol of WSNs are throughput, Average end-to-end delay and total energy consumption of sensor network.

    ANALYSIS OF HYBRID FULL ADDER TOPOLOGIES BASED ON IMPROVED DRPTL

    By Shibi O. and P. Manimegalai

    Abstract

    Recently adder circuit is becoming a major part in many applications and the arithmetic circuit is included in it as a fundamental operation. Basically the adder circuit is designed to achieve low power and less delay and by logic gate of the circuit improves the performances. In this paper, for significant process of power saving and efficient performances Hybrid Full Adder Topologies is proposed dynamically based on dual rails pass transistor logic (DRPTL) with the clock signal. For speed process high logic circuit is implemented and also to have less propagation. In hybrid CMOS design style various adder cells and transistor is used, but in proposed circuit DRPTL is implemented with the load condition and the clock signal to manage the power flow in the circuit. Also enhance the device performances and reduce the chip level power consumption. The proposed circuit is simulated for the analysis of performances by the implementation in Cadence Virtuoso Schematics on 45nm CMOS process models and illustrated the results performances delay, power, and transistor count reduction.

    AN INTELLIGENT SYSTEM TO DETECT POTHOLES, HUMPS AND AVOIDS COLLISION OF VEHICLES ON ROADS

    By S. Saranya, M. Arun

    Abstract

    One of the major issues faced by developing countries is the maintenance of roads. Well maintained roads contribute a major portion to the country development. Identification of potholes and humps on roads not only helps the drivers to avoid accidents or vehicle damages, but also helps the respective authorities to look after the quality of roads. This paper deliberate foregoing pothole detection techniques that are being used and proposes an economic solution to identify the potholes and humps and its corresponding height and depth measures. The proposed system uses Global Positioning System (GPS) which captures the geographical coordinates of the potholes and hump. The sensed data includes pothole depth, height of the hump and geographic location, which is sent through Global System for Mobile Communication (GSM) transmitter. The values are received by GSM receiver and it is stored in a computer which acts as a database. This serves as a valuable source of information to the vehicle drivers and government authorities so that precautionary measures can be taken to evade accidents. Signal warning of danger is given in the form of flash messages with an audio beep to the vehicle drivers to avoid the accidents or vehicular damages.

    AUTOMATIC DETECTION OF RETINAL HEMORRHAGE BASED ON GABOR WAVELET AND HYBRID KNNSVM ALGORITHM FOR FUNDUS IMAGES

    By Karunya Karo ShanthiY.1 and Jerome Christhu Dass A.2

    Abstract

    Retinal haemorrhage is the abnormal bleeding of the blood vessels in the retina, the membrane in the back of the eye. In retinal image, automated detection of haemorrhage is a major challenging factor. For automated detection of haemorrhage, a generalized framework is needed to train classifiers with optimal features learned from available dataset. Because of the variability in appearance of these lesions (i.e., haemorrhages), different techniques had been designed to detect each type of these lesions (i.e., haemorrhages) separately in detection system. We need a generalized framework to detect these types of lesions in fundus (i.e., retinal) image. A robust and computationally efficient approach for haemorrhage detection in a fundus retinal image is presented in this paper. Splat feature classification method is proposed with application to retinal haemorrhage detection in fundus images. Automated screening system is very much important to detect a retinal haemorrhages. Based on the supervised approach, fundus images are partitioned into non-overlapping segments covering the entire image. Each splat contains a similar colour and spatial location. A set of features is extracted from each splat using the GLCM & Gabor Wavelet. These features describe a characteristic relative to each pixel in a splat. Supervised classification predicts the likelihood of splats being haemorrhages with the optimal features subset selected in a two-step feature selection process. Preliminary feature selection is done by filter approach followed by a wrapper approach. Hybrid KNNSVM classifier is trained with expert annotation. From the resulting haemorrhages map, a haemorrhage index is assigned. A classifier could evaluate on the publically available dataset. This work will provide a greater AUC in splat level and image level. Our approaches can potential to be applied to other detection tasks.

    A SURVEY OF NETWORK PARTITION-BASED ON QOS IMPROVEMENT IN MANETS

    By K. Somu and S. Bhavani

    Abstract

    The present study aims to examine the use of QoS improvements in mobile ad hoc networks. Mobile ad hoc networks do not require any previous infrastructure and rely on dynamic multi-hop topologies for traffic forwarding. The deficiency of a centralized management makes these networks smart for several distributed requests, such as sensing, internet access to destitute groups, and disaster recovering. A crucial and frequently unaddressed topic of ad hoc networks is the frequent networks partitions. As additional wireless networks, ad hoc nodes also need a unique network to enable multi-hop routing and filled connectivity. Address project in ad hoc networks, however, is even more stimulating due to the self-organized nature of these environments. The centralized mechanism, such as the Dynamic Host Configuration Protocol (DHCP) or the Networks Address Translation (NAT), Conflict through the disseminated nature of ad hoc networks and do not address network partitioning and merging. A crucial then usually unaddressed question of ad hoc networks is the frequent networks dividers. Network partitions, caused by node mobility, fading channels, and nodes joining and leaving the network, can disrupt the distributed network control. Network initialization is another challenging issue because of the lack of servers in the network. A lightweight protocol is proposed that constructs mobile ad hoc nodes founded on a dispersed address record stored in filters that decreases the regulator load and makes the proposal robust to packet losses and networks partitions. It can be evaluated that the performance of our protocol, considering joining nodes, partition merging events, and initialization.

    DESIGN AND TESTABILITY OF Z-TERNARY CONTENT ADDRESSABLE MEMORY LOGIC

    By Keerthiga Devi S.1, Bhavani, S.2

    Abstract

    The emerging technology using Field Programmable Gate Arrays (FPGA’s) is the leading architectures with look-up tables (LUT’s) based design plays the major role in the chip design. The memory unit and controller are the basic units and it performs the operation based on the lookup table methods. The logic circuit is designed based on requirements. The Ternary content addressable memories (TCAMs) are hardware-based parallel lookup table design with masking capability in bit level. So it is attractive for applications such as network routing and packet forwarding. The high power consumption is one of the major limitations faced by TCAM designers. This proposed design is based on the circuit techniques aiming to reduce Ternary Content Addressable Memory power consume. The Traditional TCAM table and its hybrid partitions are implemented based on the testing and verification of memory unit. The method is implemented using the normal architecture analysis. The ternary logics are implemented in shift registers, Input output

    ESTIMATION OF MAXIMUM POWER EFFICIENCY USING REACTIVE ROUTING IN WIRELESS AD HOC NETWORKS

    By V. Brindha 1 and P. Manimegalai2

    Abstract

    Background/Objectives: In recent years, several energy-efficient routing protocols are projected. However, little efforts are taken in finding out the energy consumption of individual node, overhead and route maintaining problems. Whereas not considering the look of energy economical routing protocol, it is going to perform terribly worst than the conventional routing protocol. Methodology: Here, we have projected On Demand primarily based Energy economical Routing Protocol (ODBEERP). The most aim of projected protocol is to find the minimum powerlimitation route. The facility limitation of a route is set by the node that has the minimum energy therein route. Therefore, compared with the minimum node energy in the other route, the minimum node energy within the minimum power-limitation route has a lot of energy. we have conjointly projected a a lot of correct analysis to trace the energy consumptions as a result of varied factors, and improve the performance throughout path discovery and in quality situations. Result: The projected protocol is evaluated with object bound distinct event machine setting. Simulation results shows that the ODBEERP achieves smart outturn, less delay, high packet delivery magnitude relation and smart energy potency than the present protocol Peer.

    A HIGH-PERFORMANCE FIR FILTER ARCHITECTURE FOR FIXED AND RECONFIGURABLE APPLICATIONS

    By E. Mary Priyadarshini, P. Manimegalai, S. Chellaganeshavalli

    Abstract

    The efficient distributed arithmetic (DA)-based approaches for high-throughput reconfigurable implementation of finite impulse response (FIR) filters whose filter coefficients change during runtime. Conventionally, for reconfigurable DA-based implementation of FIR filter, the lookup tables (LUTs) are required to be implemented in RAM; and the RAM-based LUT is found to be costly for ASIC implementation. Therefore, a shared-LUT design is proposed to realize the DA computation. Instead of using separate registers to store the possible results of partial inner products for DA processing of different bit positions, registers are shared by the DA units for bit slices of different weightage.The Proposed presents high speed digital Finite Impulse Response (FIR) filter relying on Booth multiplier and Carry Select Adder (CSLA) Using Parallel Pipelining Architecture. Adder has three architectures such as basic CSLA using RCA (Ripple Carry Adder), CSLA using BEC (Binary to Excess-1 Converter) and CSLA using D-latch. In this paper we propose 4-tap FIR Filter architecture using 16-bit CSLA using D-latch and 8-bit Booth tree multiplier. These multipliers and adders are used for high speed operation of digital FIR filter.

    A REVIEW ON OBJECT IDENTIFICATION

    By Giby Jose*, P. Manimegalai

    Abstract

    Object identification is an active research area with numerous commercial applications. Image of object is represented as single or multiple arrays of pixel values. Features that uniquely characterize the object are determined. The arrays are compared with a stored pattern feature set obtained during training procedure. Number of matches of the object in the image must be obtained. As the image consists of a large amount of data, it has to be compressed using a compression technique so that data reduction is achieved. This reduced data is used for comparison process. This image identification technique can be used to recognize objects in specific areas. In this specific work compressive sensing using Sparse Representation can be used for object identification. The planned object identification system consists of three main stages, Sparse dictionary design, Feature Extraction using down sampling and Object detection utilizing sparse representation. Initially a sparse dictionary will likely be designed along with trained with large variety of different training images. It images incorporate assorted items including target image. Intended for feature extraction, if sparsity inside the recognition issue is correctly harnessed, the choice of features is not a critical issue. However, the leading problem can be whether the volume of features can be sufficiently substantial and whether the sparse representation is the right way computed. Here down sampling process inside the images will likely be done. In assessment process, the sparse dictionary typically determines the object among the other items. Extensive experiments will likely be conducted to help verify the efficacy in the proposed criteria, and corroborate the above-mentioned claims.

    SECURE AND EFFICIENT WATCHDOG OPTIMIZATION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS

    By Kalaiselvi M., V. Parthasarathy,

    Abstract

    Watchdogs are an effective mechanism to detect selfish and malicious attacks from computer networks. In networks, such as MANETs, attack analysis and detection is a more importantfor the whole network. Watchdog systems detect the misbehavior and that neighbor node by using data collection and analysis, so accuracy, less delay and effectiveness are achieving much more security and performance in wireless sensor networks.In previous process watchdog has inefficient trust system for security in the network.In this paper, we propose a watchdog technique for improving the trust system in networks by using effective optimization methods. To expose this method,:we can achieve better efficiency compare to existing and minimum energy cost for using watchdog technique and also keeping sufficient level security. In our contributions of the proposed method, it consists of theoretical analyses and practical algorithms. Using this watchdog approach the detection of misbehaved nodes is reduced, sufficient security, less energy consumption and the overall accuracy increased.

    ANALYSIS OF THE EFFECT OF NBTI ON DATA FLIP TIME DEPENDENCY ON AN MTCMOS SRAM

    By Patibandla Anitha1, B.L. Raju2

    Abstract

    The predominant restraining factor of the circuits lifespan are Temperature Instability effects like NBTI and PBTI. A regular configuration to evaluate the influence of NBTI on a circuit’s operation is developed relating significant circuit constraints such as the node switching action, variation in supply voltage, temperature etc. The influence of NBTI on Read strength of SRAM cell is analyzed. Due to the NBTI stress, the working of the SRAM is totally affected. The consignment of deterioration in Static Noise Margin (SNM), is computed by the read steadiness of SRAM cells is appraised. We suggest a novel method to retrieve the SNM of SRAM cells employing a data flip process and portray the results obtained. The performance issues of the data flip time are analyzed by HSPICE simulation with varied supply voltages. The circuit design with NBTI stress is calculated depends upon the simulation setup of HSPICE tool. The supply voltage is varied by 0 V, 0.2 V, 0.4 V, 0.6 V, 0.8 V and 1 V with a length of 45nm and width of 90nm (Taken from PTM technology).

    ADAPTIVE CLUSTERING FOR ENHANCEMENT OF THROUGHPUT IN A DISTRIBUTED WIRELESS SENSOR NETWORK

    By K. Lakshmi Joshitha*, S.Jayashri#

    Abstract

    Clustered networks are of great demand today which may serve for communication in a cooperative fashion for nowadays evolving internet of things. In cases like habitat monitoring the animal may be fixed up with the sensor which becomes mobile. Especially when moving in herds or flocks the scenario is viewed as an event moving in clusters. This work aims at serving for such cases and providing an adaptive clustering with the size of the cluster being varied. As the group head dies in one cluster the cluster members are being allocated to the nearby heads based on the threshold of energy in the Cluster heading nodes. It is shown that the throughput of the network increases as the uninterrupted data collection is sustained through this residual energy scheme of member allocation to the different cluster head.

    INTELLIGENCE IN ROAD SAFETY USING WEATHER FORECASTING SYSTEM

    By S. Vigneshwaran, P. Varoon, S. Kalpana

    Abstract

    Climate is an essential variable that influences movement stream and street wellbeing. Antagonistic climate circumstances influence the driving conditions straightforwardly, consequently, drivers must be instructed about the atmosphere conditions downstream to conform their driving. In the structure of wise transport frameworks, a few frameworks have been created to know the climate circumstances and advise drivers. Be that as it may, these frameworks do not conjecture climate ahead of time, and they require the support of street administrators to educate drivers. This paper shows another independent framework to figure climate conditions in a brief span and to give clients the data got. The framework utilizes an arrangement of calculations and tenets to decide the climate and to conjecture unsafe circumstances out and about system. It has been actualized utilizing a multivalent approach and tried with genuine information. Results are exceptionally encouraging. The framework is capable to conjecture unfriendly circumstances with an abnormal state of significant worth. This quality makes it possible to trust in the structure and to maintain a strategic distance from the supervision of administrators.

    PERFORMANCE IMPROVEMENT OF CLUSTERED NETWORK THROUGH DATA REPLICATION AND SECONDARY CLUSTER HEAD SELECTION

    By K. Lakshmi Joshitha, A. Gangasri

    Abstract

    The objective of the proposed system is to augment the efficiency of the clustered wireless sensor network using Game theoretic approach. In WSN the Cluster Head (CH) has the responsibility of gathering data from the members of its group and transmitting it to the sink. In this approach CH is selected by taking into consideration the residual energy. A periodical change of the head happens when the CH energy drops below the energy of other nodes present in the same cluster. Data replication is done if either CH fails to work or the link between CH or sink gets disconnected.

    SHESECURE SAFETY APP – THE HEXA UMBILICAL CORD

    By Nirmalrani V., Saravanan P., Kalpana S

    Abstract

    The violence against women is increasing tremendously. With a specific thought, many kinds of violence against women such as sexual assault, rape, and domestic violence. It is often unreported due to social norms, sensitive issues, etc. Nowadays lack of security issues are there, one of the main issues is women security. In this modern world violence against women becomes even more difficult to capture. Also, more issues have been identified in late response. The crime against women is happening beyond the thinking of the common people. So, this paper proposes the development of an Android application called “She Secure Safey App – The Hexa Umbilical Cord” that ensures the various security features to prevent from various victims, the main motto of this app is to prevent women in strange situations. It does not require internet connections except for any features. The contacts are registered through network providers. In case of emergency this application is used to trace the location of the user and the contacts of the nearby police stations using GPRS, video and audio can be recorded for 10 seconds and then forwarded to registered contacts.

    FAIRNESS INDEX OF EFFICIENT ENERGY ALLOCATION SCHEMES IN A TREE BASED SMART GRID

    By Boddu Rama Devi, Manjubala Bisi, Rashmi Ranjan Rout

    Abstract

    Smart power distribution is a challenging task in a power grid as demand from the end users connected to the grid varies dynamically. Energy allocation should be done optimally among the commercial and domestic users which have varied energy consumption and pricing rates. Important aspects such as user demand and fairness among users can be considered for efficient energy allocation in smart grid. In this work, we have proposed and analyzed energy allocation strategies for satisfying maximum number of users, maximizing the profit, minimizing average slots per user, maximizing average slots per user and maximizing the number of users while maximizing the profit in a smart grid tree network. Parameters, such as, total energy cost, number of active users and fairness index are incorporated in our proposed schemes and our schemes are compared with existing schemes, such as, Round Robin and Priority based schemes. Extensive simulation studies have been carried out to show the efficacy of the proposed approaches.

    INTERACTION BETWEEN GROUP OF VITAMINS AND NANO DRUGS TO BRAINSTEM GLIOMA PROTEIN AND REDESIGNING THE CHEMICAL STRUCTURE

    By BIPIN NAIR B.J., SHAMCY O., SHIBIN K.

    Abstract

    Brainstem Gliomas are amongst the most subtle and deadliest disease in the field of cancer. It provides treatments include surgery, clinical approach, radiotherapy, and chemotherapy. Blood Brain Barrier (BBB) is very important part allows to circulate blood from brain to body parts. Provides difficulty in delivering nano-molecules efficiently into the brain and offers the medical side effects depends upon characteristics of drugs even that can be used to indicate the effectiveness of drugs in similar tumors. This challenge is to identify how efficiently applied drugs works in central nervous system. Bioinformatics approach in nanomedicine helps to find out the presence of drug molecules present in the body, where they are needed and where they will do the best. I.e. The delivery of drug in BBB focuses on increasing the bioavailability and curate cancer with updated redesigned Drug and protein interaction. So, it is all about to make efficient redesigned drug and view it in 3D. Our novel approach focuses on redesign and apply efficient ligand through BBB to the Mutated Brainstem Glioma sequence using CADD tools, comparing the efficiency with existing drugs and view it in systematic proposed 3D visualization tool.

    FULL CUSTOM LAYOUT OPTIMIZATION TECHNIQUES

    By Anto Shiny Jenifer M., Umadevi S

    Abstract

    Design of an integrated circuit layout is said to be the characterization of the components and elements of the integrated circuit in 3-dimension in geometrical models which represents the silicon layers, oxide layers, metal and polysilicon. Optimizing the layout helps in producing less parasitic effects, interconnect delays, power dissipation and signal integrity in an IC. The proposed work reduces total layout area of the application by incorporating following methods together: 1) depletion sharing, 2) minimum distance rule and 3) different metal layers. The proposed technique is practiced on 40 transistor D-flip flop[1] layout using Cadence® virtuoso® 64 tool. On using the minimum distance rule method along with depletion sharing the total layout area is reduced by 71.60% and on combining all the three methods area reduces by 73.44% with reference to schematic driven layout of example circuitry. In proposed layout, in order to subdue the reliability issue, single vias are replaced with double vias wherever possible. Simulation after post layout is done and the corresponding power calculation has been identified for the layout of the example circuitry and results clearly say that total layout area reduction is reducing the power consumption directly in total.

    COOPERATIVE PROTOCOL FOR QOS ROUTING IN WIRELESS SENSOR NETWORKS

    By M. Karpagam, D.Devi

    Abstract

    In cooperative networks, optimum path should be selected based on QoS parameters and then the node will recruit the neighboring nodes to form a cluster and assist in communication. QoS based routing for wireless sensor networks helps to select optimum path for routing and it improves the overall performance of the network. In this paper, we have modeled a QoS based cooperative protocol for wireless sensor networks. We have analyzed the energy consumption of nodes and throughput. We have compared the energy consumption and throughput of our proposed QoS based cooperative protocol with existing cooperative transmission protocol. Network Simulator 2 (NS 2) is used to model the method and the comparison results show that the QoS based cooperative protocol outperforms the existing cooperative protocol in terms of energy of nodes and throughput.

    EMERGENCY ALERT FOR CAGED ANIMALS

    By Nalini M., Mathangi A., Jayashri K.R., Nivedha J.K.

    Abstract

    This endeavor is an attempt to explore the means and tools exclusively invented to protect and preserve caged animals in case of any exigency. With receding wildlife population becoming a huge problem and global crisis, round the clock vigilance and preservation of endangered species especially those that are caged, are of utmost necessity. Besides being dumb, the ‘caging- in’ is another trauma. Human being, being the society’s most developed and privileged animal has the major responsibility of taking care of those that need our helping hands. Carelessness and negligence are the negative traits of humans. So it is obviously not possible to provide 24/7 acute attention. This is the part where instrumentation engineers come in hand. This work utilises various sensors and image sensing cameras to continuously monitor these underprivileged beings of the society. The sensors constantly track and maintain various parameters related with the health, safety and wellness of the caged being. In case of any abnormality, the GPS-enabled alert device immediately notifies the important personal, (say the forest rangers, the veterinarian, the guard, etc.), in-charge of the safety and the well-being of the caged animals.

    IMPLEMENTATION OF INFERENCE ENGINE IN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM TO PREDICT AND CONTROL THE SUGAR LEVEL IN DIABETIC PATIENT

    By M. Mayilvaganan, R. Deepa, S. Malathi

    Abstract

    The Adaptive network based fuzzy inference system (ANFIS) is a hybrid system comprising of the neural network and the fuzzy logic. It is a data driven procedure which can be used to provide the solution of function approximation problems in a neural network platform. Here at first a fuzzy inference system comprising of an initial fuzzy model is formed, based on the fuzzy rules extracted from the input output data set. Selection of the proper rule base depending upon the situation can be achieved by the use of an ANFIS controller, which becomes an integrated method of approach for the control purposes and yields excellent results, which is the highlight of this paper.

    ANALYSIS OF RECENT SHAPE, TEXTURE AND COLOUR BASED IMAGE SEGMENTATION TECHNIQUES

    By Michael Angelo Kandavalli, S. Abraham Lincon

    Abstract

    Image segmentation has an important role in image processing. It is a fundamental step which can be defined as isolating homogeneous regions within an image or finding the boundaries between such regions. Image segmentation has been approached from a wide variety of perspectives but still it is a challenging problem. Therefore, the subject of segmenting objects of interest in images has gained even more attention. From the primary benefit of producing simple, informative input, object segmentation is a foundational tool in various advanced systems such as object recognition, image retrieval, and image editing and scene reconstruction. Due to its significant role, this crucial step has been of perennial interest to many researchers of image processing and computer vision. This makes segmentation process less accurate and highly time-consuming when the foreground and background are much nearby or when the foreground textures are occluded. To overcome these drawbacks, we analyze some of the trending issues in shape, texture and color based image segmentation techniques.

    REDUCTION OF PAPR USING HELICAL INTERLEAVER IN PTS TECHNIQUE FOR SCFDMA SYSTEM

    By R. Jayashri

    Abstract

    OFDM is a high data rate modulation technique used in the downlink of 4G system. Due to the difficulty of PAPR, usage of OFDM system affects the battery period of mobile terminal. So that new accessing technique called SCFDMA system which is employed in the uplink system. But still the PAPR problem persists in SCFDMA system which has to be overcome. A statistical method, Partial Transmit Sequence can be used with SCFDMA to reduce the PAPR even more. In this paper, the PAPR in SCFDMA system is reduced further by PTS technique using helical interleaver. The proposed system yields 3% reduction in PAPR compared to conventional method.

    KINSHIP VERIFICATION SYSTEM BASED ON MID LEVEL FEATURES

    By T. Theresa 1, S. Veluchamy2

    Abstract

    Recognizing of human face from image set has recently seen its prosperity because of its effectiveness in dealing with variations in illumination, expressions, or poses. Unlike most previous kinship veri?cation methods which apply low-level hand-crafted descriptors such as local binary pattern and Gabor features for face representation. This paper investigates about kinship verification system based on mid-level features. Here Scale invariant feature transform (SIFT) descriptors have been extracted. For better performance two features such as blob and corners are detected via Surf and Harris algorithms. Further processed features are undergone for feature learning algorithm continued with classification. Finally, accuracy rate is to be evaluated for verification of kinfaces.

    PERFORMANCE IMPROVEMENT OF CLUSTERED NETWORK THROUGH DATA REPLICATION AND SECONDARY CLUSTER HEAD SELECTION

    By K. Lakshmi Joshitha, A. Gangasri

    Abstract

    The objective of the proposed system is to augment the efficiency of the clustered wireless sensor network using Game theoretic approach. In WSN the Cluster Head (CH) has the responsibility of gathering data from the members of its group and transmitting it to the sink. In this approach CH is selected by taking into consideration the residual energy. A periodical change of the head happens when the CH energy drops below the energy of other nodes present in the same cluster. Data replication is done if either CH fails to work or the link between CH or sink gets disconnected.

    SHESECURE SAFETY APP – THE HEXA UMBILICAL CORD

    By Nirmalrani V., Saravanan P., Kalpana S

    Abstract

    The violence against women is increasing tremendously. With a specific thought, many kinds of violence against women such as sexual assault, rape, and domestic violence. It is often unreported due to social norms, sensitive issues, etc. Nowadays lack of security issues are there, one of the main issues is women security. In this modern world violence against women becomes even more difficult to capture. Also, more issues have been identified in late response. The crime against women is happening beyond the thinking of the common people. So, this paper proposes the development of an Android application called “She Secure Safey App – The Hexa Umbilical Cord” that ensures the various security features to prevent from various victims, the main motto of this app is to prevent women in strange situations. It does not require internet connections except for any features. The contacts are registered through network providers. In case of emergency this application is used to trace the location of the user and the contacts of the nearby police stations using GPRS, video and audio can be recorded for 10 seconds and then forwarded to registered contacts.

    FAIRNESS INDEX OF EFFICIENT ENERGY ALLOCATION SCHEMES IN A TREE BASED SMART GRID

    By Boddu Rama Devi, Manjubala Bisi, Rashmi Ranjan Rout

    Abstract

    Smart power distribution is a challenging task in a power grid as demand from the end users connected to the grid varies dynamically. Energy allocation should be done optimally among the commercial and domestic users which have varied energy consumption and pricing rates. Important aspects such as user demand and fairness among users can be considered for efficient energy allocation in smart grid. In this work, we have proposed and analyzed energy allocation strategies for satisfying maximum number of users, maximizing the profit, minimizing average slots per user, maximizing average slots per user and maximizing the number of users while maximizing the profit in a smart grid tree network. Parameters, such as, total energy cost, number of active users and fairness index are incorporated in our proposed schemes and our schemes are compared with existing schemes, such as, Round Robin and Priority based schemes. Extensive simulation studies have been carried out to show the efficacy of the proposed approaches.

    INTERACTION BETWEEN GROUP OF VITAMINS AND NANO DRUGS TO BRAINSTEM GLIOMA PROTEIN AND REDESIGNING THE CHEMICAL STRUCTURE

    By BIPIN NAIR B.J., SHAMCY O., SHIBIN K.

    Abstract

    Brainstem Gliomas are amongst the most subtle and deadliest disease in the field of cancer. It provides treatments include surgery, clinical approach, radiotherapy, and chemotherapy. Blood Brain Barrier (BBB) is very important part allows to circulate blood from brain to body parts. Provides difficulty in delivering nano-molecules efficiently into the brain and offers the medical side effects depends upon characteristics of drugs even that can be used to indicate the effectiveness of drugs in similar tumors. This challenge is to identify how efficiently applied drugs works in central nervous system. Bioinformatics approach in nanomedicine helps to find out the presence of drug molecules present in the body, where they are needed and where they will do the best. I.e. The delivery of drug in BBB focuses on increasing the bioavailability and curate cancer with updated redesigned Drug and protein interaction. So, it is all about to make efficient redesigned drug and view it in 3D. Our novel approach focuses on redesign and apply efficient ligand through BBB to the Mutated Brainstem Glioma sequence using CADD tools, comparing the efficiency with existing drugs and view it in systematic proposed 3D visualization tool.

    FULL CUSTOM LAYOUT OPTIMIZATION TECHNIQUES

    By Anto Shiny Jenifer M., Umadevi S

    Abstract

    Design of an integrated circuit layout is said to be the characterization of the components and elements of the integrated circuit in 3-dimension in geometrical models which represents the silicon layers, oxide layers, metal and polysilicon. Optimizing the layout helps in producing less parasitic effects, interconnect delays, power dissipation and signal integrity in an IC. The proposed work reduces total layout area of the application by incorporating following methods together: 1) depletion sharing, 2) minimum distance rule and 3) different metal layers. The proposed technique is practiced on 40 transistor D-flip flop[1] layout using Cadence® virtuoso® 64 tool. On using the minimum distance rule method along with depletion sharing the total layout area is reduced by 71.60% and on combining all the three methods area reduces by 73.44% with reference to schematic driven layout of example circuitry. In proposed layout, in order to subdue the reliability issue, single vias are replaced with double vias wherever possible. Simulation after post layout is done and the corresponding power calculation has been identified for the layout of the example circuitry and results clearly say that total layout area reduction is reducing the power consumption directly in total.

    AN INTERLEAVED HIGH FREQUENCY FLYBACK MICRO-INVERTER USING SLIDING MODE CONTROL ALGORITHM

    By S. Subha, A. Gurumurthy J. Nishanth, M. Shriraam, T Thirukkumaran

    Abstract

    The presence of nonlinear voltage current characteristic with a unique Maximum Power Point (MPP) is usually found in PV panels. When their operating conditions are subjected to changes, the MPP will also change. This project aims at the design and implementation of a stand-alone micro inverter for Photovoltaic (PV) applications based on interleaved fly back converter using Sliding Mode Control (SMC) algorithm. Here, a fly back converter is designed at high power rating and its practicality with good performance is demonstrated. A sliding mode controller is used to estimate the MPP which forces the PV system to operate at MPP and to stay on the surface at all times. This method is simple and robust to irradiance and temperature variations. A simulation model is developed and the design is then verified and optimized for best performance based on the simulation results. Finally, a prototype at rated power is built and evaluated under realistic conditions.

    A NOVEL APPROACH FOR EXPLORING ANCESTRAL RELATIONSHIP BETWEEN VARIOUS ORGANISMS THROUGH CUSTOMIZED FAMILY PROFILE ANALYSIS

    By BIPIN NAIR B.J.

    Abstract

    The purpose of the paper “A Novel approach for exploring ancestral relationship between various organism through customized family profile analysis” aims at exploring the evolutionary relationship between organisms which share the common set of proteins. Family profile analysis is used to obtain the profile of the given proteins and apriori algorithm is customized to suite the purpose the generating the frequent proteins through sequencing and provide the evolutionary relationship of various organisms. Which implies there is a common ancestral relationship between these organisms

    AN APPROACH FOR EXAMINING LUNG CANCER BY OBSERVING THE MICRORNA IN AN ASSEMBLY OF DRUG INTERACTIONS

    By BIPIN NAIR B J., ANJU K J, JEEVAKUMAR A

    Abstract

    MicroRNA is the non-coding RNA in the gene sequences, is the major factor of invoking the oncogenes. Late identification of lung cancer leads to deaths. Multiple studies on miRNAs have made a break through discoveries including their direct and indirect involvements in causing lung cancer. Several miRNAs like miR-21a, miR-196 and miR-69 are identified as bio marking elements of non-small cellular lung cancer few like miR138 and let-7 are considered as anti-cancer agents. This work studies the changes happening to miR-138 in interaction with NSCLC drugs. miRNA use to interact with multiple natural factors, utilizing this property of miRNA we examined the possibility of studying different drug effects on miR-138. Target Scan, Mol View, and free energy calculation algorithm were used for creating an interactive environment for the simulation. From the results, we conclude that miRNAs are reactive to cancer drugs. This could be used for further development of cancer prevention drugs which targets miRNAs rather than oncogenes

    ENHANCING THE SECURITY OF CLOUD STORAGE FOR MEDICAL DATA RETRIEVAL USING DOUBLE ENCRYPTION WITH DATA ANONYMIZATION

    By P. Harish, S.Vigneshwari, K.B.S. Ravi Teja

    Abstract

    Now-a-days the major issue that was seen in hospital management is providing security to the patient’s related data. Such data’s are so sensitive, exploiting that type of data may result in leakage of patient’s information. They are some previous systems which provide security to the patient’s data, but the algorithms that have been issued are timing enabled proxy re-encryption algorithms, which issues keys and to use them within in the time limit, so these causes in some difficulty to user in order to access his data whenever he wants. In order to overcome this type of encryption processes we propose a double encryption with anonymization technique and implementation of multiple health records in a cloud server. Whenever the user wants to retrieve the information from the cloud server, user gets a one-time password to his registered email id.

    NON-CONVENTIONAL ENERGY HARVESTING USING FOOT PRESSURE

    By M. Nalini, A. Krithika, B. Shruti, C.V. Rakshana

    Abstract

    There is driving force more powerful than steam, electricity and nuclear power- the footstep. In today’s world energy is the major resource in which we humans relay on. This project brings an idea to produce electricity by a non-conventional source. A Non-conventional energy using footsteps involves a process in which mechanical energy is converted into electrical energy. This system becomes pollution free, eco-friendly and socially relevant by generating energy from non-conventional sources. It is designed to be applied in public areas where there is sufficient crowd such as complexes transportation hubs and schools. This system has to be placed at points where people travel through entrance or exit and they have to step on this device to get through. Then a voltage is generated on every footstep and when mounted in series they will produce a sizeable amount of electricity.

    REAL TIME SIMULATOR FOR FIELD SURVEY MOBILE ROBOT

    By K. Nandhakumar, T. Viswanathan,

    Abstract

    A systematizing elucidation to the hazards present in the current human health due to spraying of conceivable toxic chemicals in the detained space of an agricultural field or hot and steamy glasshouse is accomplished by the design and disposition of a sovereign mobile robot for use in disease prevention and pest control applications in monetary greenhouses. An Embedded system based stereotyped robot is designed for this purpose. The platforms ability to fortunately head out for itself down the platform of a greenhouse shows the forcefulness of this platform, while the pesticide sprinkling system is used to efficiently spray the plants evenly with set dosages. A vision based robotic control regulation strategy is developed for a non-calibrated camera system which is mounted on a wheeled single mobile robot contingent on non-holonomic motion restraint, which can drive the mobile robot to the target position with exponential convergence. Subsequently, by using the retrieved camera intrinsic parameters, a straight-line motion controller is developed to drive the robot to the desired position, with the coordination of the robot always facing the target position. By the proposed method, the robot can be confined in map-free and GPS-free environments, and the results of localization can be theoretically proved confluent to their real values and thriving to the measurement noises. The performance of the proposed method is further validated by both simulation and experimental results.

    SAFETY IN PUBLIC AREAS USING FACE RECOGNITION

    By Carmel Rani V., Deepa Naga Manjari G., Nirmalrani V

    Abstract

    Face recognition systems are generally used for security purposes. Face recognition is a biometric method that compares a person’s face that is live capture image or a video source with the stored images. Protecting the people from the criminals in public areas and at the same time accounting for law enforcement is a great challenge. Facial recognition is used for the very purpose. For any facial recognition system, there is a primary step that is ought to be done. Face detection is the preliminary step for face recognition. There are many algorithms and classifiers for face detection. Some of them are Segmentation algorithm, PCA, SVM, AdaBoost etc. Face detection itself is not sufficient. The detected face need to be accurate in various aspects like when the faces are rotated, under lighting conditions, complex backgrounds, variety of skin tones etc. These became challenging factors in face detection process. Many systems were proposed earlier for face detection. These existing systems ensure face detection in color images or background complexities or lighting conditions. Some common issues in these systems is that they have to go through many stages repeatedly leading to more time consumption, noisy output, less accuracy and efficiency levels. Hence this paper proposes a system for detection and recognition using Haar – cascade. Haar-cascade classifies the input into frames which for feature extraction. The proposed system detects faces in a group of people, variability in skin tones, variability in scale, in the presence of outliers. The recognition system recognises a suspect by comparing the face of the suspect with the faces that were stored in the database. The suspects face is automatically forwarded to nearby police station to catch the suspect. The proposed system provides a fast detection rate accounting for better accuracy and efficiency levels. This paper provides safety to the public in crowdy areas like railway stations, bus stands, market areas, shopping malls, parks and so-on.

    NINE SWITCH CONVERTER BASED SOLAR HYBRID ELECTRIC VEHICLE

    By M. Nirmala, S. Rameshselvakumar

    Abstract

    Hybrid electric vehicle system with nine switch converters using permanent magnet synchronous machine as a motor and as a generator has been discussed in many papers. A series hybrid electric vehicle system with three phase induction motor connected as load to the Nine switch converter powered by a spark ignited internal combustion engine, along with solar panel to charge the battery based on its state of charge has been analyzed in this paper. Nine switch converter technique reduce voltage stress, power loss, number of switches required and the cost of the system.

    MODIFIED SVPWM FED NINE SWITCH INVERTER FOR MOTOR LOAD

    By M. Nirmala, K. Baskaran, S. Sowmiya

    Abstract

    The nine-switch inverter has been suggested in order to reduce the switching components and the cost of regular six switch inverter. In this paper, the conventional Space Vector Modulation (SVM) and Level-Shift Space Vector Pulse Width Modulation (SVPWM) design of nine-switch inverter is contemplated, controlling the two independent parallel ac induction motors without the shoot-through in the inverter leg. The SVPWM is proposed for minimizing total harmonic distortion (THD). The dual output voltages and phase currents can prevent the distorted attribute, which is originated by the crossover of the modulating signals. This will suitable for high power inverter application where cost and efficiency are vital decision factors. The mathematical models are suggested by the level shift SVPWM scheme and based on the zero-sequence injection principle. The offset control decrement are arranged by the interconnection of the modulation indices in level shift of the SVPWM modulating signals. The suggested modulation performance has been confirmed by the simulated implementation that is effectively carried out on the applicability of the proposed algorithm, the high modulation index is needed.

    IMPLEMENTATION OF A WIRELESS MOBILE ROBOT FOR INTELLIGENT FARMING

    By K. Lokesh Krishna, Y.N.Vijaya Kumar, S.Theivachandran

    Abstract

    Over the past few years, there has been significant awareness in designing intelligent robotic devices for use in external outdoor environments, which can independently sense, analyze and react to their own surroundings. The agricultural sector is already experiencing enormous challenges such as limited availability of arable lands, increasing requirement of water resources, and variation in climatic conditions. Also due to the recent advances in computer and related technologies, still the farmers are not adapted to those technologies as they are neither poorly managed nor designed for their particular needs. One method to address these various issues is to develop sensing technology to make agricultural farms more intelligent. In this paper a novel wireless mobile robot using ARM7 microcontroller is designed and implemented for carrying out various operations on the field. This proposed wireless mobile robot is equipped with various sensors for measuring different environmental parameters. The main features of this novel intelligent mobile wireless robot is that it can execute tasks such as moisture sensing, scaring birds and animals, spraying pesticides, moving forward or backward and switching ON/OFF electric motor. The robot is fitted with a wireless camera to monitor the activities in real time. The proposed wireless mobile robot has been tested in the fields, readings have been monitored and acceptable results have been observed, which indicate that this system is very much useful for intelligent farming.

    ECONOMIC AND EMISSION ANALYSIS OF PV SYSTEM,SOLAR THERMAL SYSTEM, HYBRID SYSTEMS FOR RURAL ROW HOUSES

    By 1G. Priyanka, 2R. Mahalakshmi. 3V. SharmilaDeve, 4V. Ezhilarasi

    Abstract

    The Emission and Economic analysis is undertaken to prove that Hybrid PV/Solar-Thermal (PVT) systems is optimized for distributing electricity and hot-water for rural row houses. For this study, Kallipatti village in Coimbatore District is chosen. The Rural Row Houses load capacity is 3KW and 700 liters of hot water is required daily. The emission and economic analysis was carried out for Conventional system, Photovoltaic (PV) system, Solar Thermal System and Hybrid PV and Solar-Thermal(PVT) system individually. From the Emission analysis, the PVT system has less carbon dioxide emission when compared to other systems. The Economic analysis shows that Photovoltaic(PV) System is less cost. But for generating both electricity and hot water, hybrid PV/solar-thermal (PVT) system is optimal when compared with installing Photovoltaic (PV) system for electricity and Solar-Thermal (PVT) system for hot water. The simulation is carried out by using MATLAB

    DESIGN AND IMPLEMENTATION OF EFFICIENT ADVANCED ENCRYPTION STANDARD COMPOSITE S-BOX WITH CM-MODE

    By S. Gnana Soundari, B. Senthil Kumar

    Abstract

    The Advanced Encryption Standard (AES) is one of the famous algorithms for the cryptographic security algorithm and it is specifically used for the data protection and the transmission. The AES novel Mix-Column operation implementation is proposed in this research paper. The Mix-Column is model is improved for the AES decryption through the Very Large Scale Integration (VLSI) System design in this research paper. In AES Mix-Column, large number of logic gates used to perform the multiplication of input stage bytes (output of shift row) and fixed defined state bytes. In order to decrease this problem, the redundant function of Mix-Column is eliminated and re-designed in this paper. Proposed model of Mix-Column minimizes 25% of logic gates compared with previous work. Further, the proposed Mix-Column of AES decryption achieves by improving the performance of area, delay and power consumption. The transformations optimized and the speed is increased.

    MELATONIN AND FLUOXETINE INTERACTION WITH SHANK3 PROTEIN GENE FOR AUTISM SPECTRUM DISORDER

    By BIPIN NAIR B.J., ARUNJIT K., VIJESH BHASKARAN

    Abstract

    Autism spectrum disorder impairs the nervous system and affects the overall poignant, societal and substantial health of the affected human being. We here try to redesign the drug 2D structure through various predicting techniques and visualize drugprotein interaction through molecular dynamics and molecular docking techniques. We here collect the drug id of Fluoxetine, Melatonin and the protein SHANK3 form drug bank, then these two drugs are interacted with the protein SHANK3 through molecular docking technique and the 2D structure of their interaction is predicted.

    EFFICIENT INTERLEAVED BUCK BOOST CONVERTER FOR SOLAR APPLICATIONS

    By M.SUMITHRA, R. KAVITHA

    Abstract

    Solar Energy is the prominent source of renewable energy. But, the practical DC –DC converter can extract only partial amount of energy from the Solar cells by our conventional methods. An interleaved buck boost dc/dc converter is developed that it requires only a smaller input/output filters, it provides the fast dynamic response and low stress on the devices than conventional designs, for solar powered applications. Input and output ripples of voltage and current of the converter is very low. The simulations were carried out using MATLAB/SIMULINK software package and hardware implemented

    OPTIMIZATION OF OPTICAL AMPLIFIER SATURATION POWER IN NGPON2 USING 2048 WAY SPLITTER

    By S. Rajalakshmi1, T. Shankar2

    Abstract

    This article represents design of Next Generation stage-2 Passive Optical Network (NG-PON) for a reach of 100km and over 2048 split using a hybrid time and wavelength division multiplexing (TWDM) for the data rate of 40Gbps. The down stream signal uses L band and upstream signal uses C band with the wavelength plan of ITU-T G.989. The network provides cost effective solution by directly connecting the increasing numbers of customers to the core network by use of 2048 way split. The splitter loss and the ASE noise is optimized by EDFA amplifiers to extend the long reach. An in-depth analysis is performed using an analytical model of NGPON with non- dispersion shifter fiber.

    MONITORING ROUTINE IN WEB EXPLORATION ENVIRONMENTS

    By D. Saravanan

    Abstract

    Technology brings every-thing in our finger tips, the problems of bringing this information most existing algorithm applied to every user retrieval in the same technique. Users information’s are handled with special way it means quires priorities based on the searching. In such a case, simply leveraging pages visited by this user in the history may achieve better performance. Based on the users search information extraction in web pages are reacted differently. Even if search histories are enough to infer general user interests, users often search for short-term information needs that may be inconsistent with general user interest. In such cases, long-term user profiles are useless or even harmful, whereas a short-term query context is more useful. This proposed done on how personalization strategies perform under real-world search engine conditions faced by users. In this paper, we address these problems and make some contributions.

    ANALYSIS OF ECONOMIC FEASIBILITY OF PV/SOLAR THERMAL/HYBRID PVT SYSTEM IN HOSTEL APPLIANCES

    By 1V. Ezhilarasi, 2V. SharmilaDeve, 3R. Mahalakshmi,4G. Priyanka

    Abstract

    The purpose of this project is to determine the performance of hybrid systems which consists of solar thermal collectors. The study is taken out by analyzing the behavior of the designed systems and implemented in KCT hostel building. The calculations of primary energy consumption, Emissions and the inclusion of a Life Cycle Cost analysis are the major contribution. Photovoltaic panels will produce part of the electricity. Solar thermal collectors will reduce the energy required for DHW (domestic hot water) production. This project is implemented for hostel room and cooking purpose. Then analyze the hybrid system which consists of solar PV, PV thermal, solar PV thermal system. Choose the best hybrid system which suitable to hostel mess. With this system, MPPT (maximum power point tracking) is used to extract maximum power.

    POWER QUALITY IMPROVEMENT IN GRID CONNECTED WIND ENERGY SYSTEM USING FUZZY CONTROLLED UPQC

    By R. Prema Priya1, M. Mohanraj2

    Abstract

    Wind power generation is grasping more attention nowadays because it offers the benefits of reduced cost, increased efficiency, less pollution and so on. But the known disadvantage is that the integration of wind farm with grid leads to many power quality problems such as voltage sag, swell, unbalance, harmonics, flickers etc. This paper concentrates mainly on diminution of source voltage sag and load current harmonics which are caused mainly due to the use of nonlinear loads such as personal computers, variable frequency drives, SMPS, monitors, printers etc in both industrial and commercial sectors. For the betterment of power quality issues, custom power devices are used. Among many of the custom power devices, Unified Power Quality Conditioner (UPQC) have been used nowadays which diminishes both voltage sag and current harmonics. The performance of UPQC can be improved by using a new strategy of control which is implemented using Fuzzy Logic Controller and from the simulation results, the performance of fuzzy controlled UPQC is better which can be validated by comparing its performance with the conventional control of PI controller.

    CONTROLLING OF BLOOD GLUCOSE INCLUDING THE EFFECT OF FFA DYNAMICS

    By Nalini M1,2*, Balaji V3

    Abstract

    Diabetes is a chronic disorder because of the secretion of insulin was not sufficient. Due lack of insulin, the amount of blood glucose will be increased and cause diabetes, this paper provides the closed loop control using the Bergman’s extended minimal model with fuzzy logic controller. The controller takes the corrective action even for the maximum disturbance and it brings back the glucose level into around 70mmHg which is a basal value. By using this proposed model the level of glucose is continuously monitors and the corrective action will be takes place according to the defined rules.

    CONVERSION OF IMAGE INTO TEXT TO REGIONAL TEXT AND SPEECH

    By BalaKrishnan K ., Shivapraksh Ranga, Nageswara Gupth

    Abstract

    In the current scenario digital images are the raw inputs for all the digital image processing applications. These raw images are captured by the electronic devices which contains the unwanted noise or background scene. Preprocessing technique is used to completely eliminate the unwanted noise from an image. In the existing research work, conversion of image to text and speech are analyzed and results are obtained which is useful to the various image processing applications and visually challenged people. In the proposed practice, text to particular regional language text conversion is done which is useful to the Tours and travels and visually challenged people. Using this methodology, they can convert the images into their regional language like bus boards, shop boards and product etc., These regional language text are converted into speech signals using TTS.


    AUTOMATED INTEGRATED CLUSTERING ALGORITHM FOR MAMMOGRAPHIC MASS SEGMENTATION

    By K. Akila1, L.S. Jayashree, A. Vasuki

    Abstract

    Segmentation plays an important role in mammographic image processing by facilitating the delineation of regions of interest. An automated Histon based integrated clustering algorithm is presented in this paper for the detection masses in mammographic images by integrating K-means clustering algorithm with Fuzzy C-means algorithm. Initially Histon of the input image was calculated and given as initial centroid for K-means clustering algorithm and Fuzzy C-means algorithm was applied to segment the mass. The performance of proposed algorithm was evaluated using area overlap measure. The morphological features are extracted from the segmented mass and 85% classification accuracy was obtained using SVM classifier.

    A REVIEW OF STABILITY AWARE CLUSTERING ALGORITHM IN VEHICULAR AD HOC NETWORK

    By Kumar T. and Jaison B

    Abstract

    A Vehicular Ad hoc Network (VANET) is a special kind of Mobile ad hoc network, in which vehicle acts as a node (communication device) to create Ad hoc network. VANET is identified as the future transportation system in which vehicles communicate with each other and it ensures road safety by avoiding accidents on the road. Due to sparse distribution of vehicles in the network, communication between the vehicles is a challenging task. Clustering avoids this problem by grouping the geographically adjacent vehicles into a cluster. Clustering of vehicles can significantly improves the scalability of the network, but high mobile nature of vehicles in the cluster affects the network stability by dynamically changing the network topology. To create more stable network, clustering algorithm should consider mobility of the vehicles as one of the key factor for cluster formation and cluster head selection. Such a mobility aware clustering produces stable and secure connection between the vehicles in the network. Since most of the recent research papers were focused on stability aware clustering scheme in VANET. This survey paper focus only on stability based clustering algorithms instead of considering various clustering schemes available in VANET.