NCETSETMA 2017- National Conference on Emerging Trends in Science, Engineering ,Technology, Management and Applications
"NCETSETMA 2017 Conference Papers "
Pages
[1]
[2]
[3]
Multi- scale License Plate Detection and Location for Traffic Surveillance[Full-Text ]
Dr. A. Suresh, Reyana A, Rajeswari K, Reshma Elsa VargheseThe outline of a new genetic algorithm (GA) is introduced to detect the location of license plate (LP) symbols. An adaptive threshold method is applied to overcome the dynamic changes of illumination conditions when it converts the image to binary. Connected Component Analysis Technique (CCAT) is used to detect candidate objects inside the unknown image. Two new crossover operators, which based on sorting, are introduced, which greatly upgrade the convergence speed of the system. Color (RGB) to Grayscale (GS) change is executed using the Filtering technique by eliminating the hue and saturation data while maintaining the luminance. Most of the CCAT problems, such as touching or broken bodies, edge-based techniques were also implemented to perceive the plate based on the high density of vertical edges inside it detecting license text and at the same time distinguishing it from similar patterns based on the geometrical connection between the symbols constituting the license numbers is the specific approach. These plates usually contain different colors written in different languages, and use different fonts.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ardent Exactitude Based Agriculture Using Sensors[Full-Text ]
Dr. A. Suresh, H Shaheen, Neha John, Saranya DivakaranA new website to the farmers will be a very helpful thing in the todays scenario as agriculture is getting vanished in our todays world. This site will guide formers across the country just with some basic knowledge about how to use the sensor and website for the better remote monitoring of the soil moisture in the fields automatically. Mainly, provides information about soil, cultivation methods, seasons etc in online. The website may give structure of techniques used for each different crops to the formers and let them understand the cultivation method to be adopted for that.. The trends of the crops act so that these will be pretty important to the users who access these via the Internet. This project provides automatic remote monitoring of soil moisture day/night mode and also to check the water level of soil whether they are normal/abnormal using sensor technology. This helps for the precision agriculture and improves efficiency by using microcontroller named aurdino uno embedded circuits.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ONLINE DESTRUCTION OF PEJORATIVE MOVIES[Full-Text ]
Dr. A. Suresh, Subiqsha.PIn the current scenario, there are many technologies which are being developed for Security purposes. Here is a system which is used for a main sector Entertainment sector. The Indication of methodology is completely based on QR (Quick Response) code which can be modified and created by our own. The main findings in this system is security is provided using location of manipulation. The QR code will be set to any of the frame or in the screen of a theatre. The code will be very much confidential and it will be known only to the authorized person. So, that no one gets alerted and sometimes they may skip the shots in the movie. Thus, the system brings security who does theft of a movie.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pedestrian Detection Using Modified Independent Component Analysis[Full-Text ]
Angel shalini.M,Dr.S.VijayaLakshmi,Moorthi.V,Ramalingam.DWide range of applications and numerous other complexities involved in pedestrian detection makes it a continuous and open area of research. Recently pedestrian detection is getting much more interest and researchers are contributing a lot in this field. Selection of a feature extraction method is very important factor for high recognition performance in human detection systems. In this paper, we propose an efficient self-similarity based human identification using modified Independent Component Analysis (MICA). Initially the background modeling is done from a video sequence. Subsequently, the moving foreground objects in the individual image frames are segmented using the background subtraction algorithm. Then, the morphological skeleton operator is used to track the silhouettes. The MICA based on eigen space transformation is then trained using the sequence of silhouette images. Finally, the proposed system recognizes the human features based on multikernel SVM classification. The proposed system is evaluated using gait databases and the experimentation on outdoor video sequences demonstrates that the proposed algorithm achieves a pleasing recognition performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Bioluminescence[Full-Text ]
Y.Joseph JenistanBioluminescence is the production and emission of light by a living organism. It is a form of chemiluminescence. Bioluminescence occurs widely in marine vertebrates and invertebrates, as well as in some fungi, microorganisms including some bioluminescent bacteria and terrestrial invertebrates such as fireflies. In some animals, the light is produced by symbiotic organisms such as Vibrio bacteria. The principal chemical reaction in bioluminescence involves the light-emitting pigment luciferin and the enzyme luciferase, assisted by other proteins such as aequorin in some species. The enzyme catalyzes the oxidation of luciferin.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CFD And Structural Analysis Of An Optically Accessible Combustor Sector Rig[Full-Text ]
KASTHURI.PImprovements in aero-engine combustor design is call for improved understanding of the flow process in near scale environments close to the operational condition .This necessitates the design of a optically accessible combustor section for carrying out optical investigations. The high pressure and harsh environments encountered in the system along with provision of optical access necessitates detailed and thorough analysis of the combustor rig. This project is aimed at to understand the behavior of the combustor flow field, throughout their operating range helping to find the optimum design to satisfy the conflicting demands imposed on the key elements of lean combustion in aero –engines by carrying out detailed analysis of the combustor rig using structural and CFD analysis. A three-dimensional solid model of the combustor is prepared using CATIA V5.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimal Performance and Security in Division and Replication of Data in Cloud- OPoR[Full-Text ]
B.Preethi,A.Jeya priya,S.Priya,A.Bhanumathi,R.VidthyaCloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Here to study the problem of ensuring the integrity of data storage in Cloud Computing .To reduce the computational cost at user side during the integrity verification of their data, and to tackle the challenges. OPoR is introducing a new cloud storage scheme involve a cloud storage server and a cloud audit server. For improving the strengthen Proof of Retrievabiliy (PoR) model to support dynamic data operations. Here processing data as fragmentation of files and replicated data. Files are assigned in a no of creating nodes and to be stored on the cloud server. When the user downloading the file from the server then it retrieve from those nodes and automatically merge those files and download at destination.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Women Safety Location Tracker[Full-Text ]
Dr.M.Vijayakumar, D.Devi Kala Rathinam, M.Swetha Vadera, N.Karpagam, S.LeelavathiIt is a simple android application used mainly for women safety purpose, but also for child safety too.It focuses on one of the important problem of society that is eve teasing. It makes the society to be aware of the misbehavior which is happening and to come forward for help.It enables women to be self dependent and can handle any kind of unpredictable situation. It mainly share the location based on GPS(Global Positioning System).Thrice pressing the power off button it sends the emergency message with time and location to the nearby contacts in emergency situation and default to the parents.When the application triggers on the time of travelling it sends the location to the parents when the base station get changed.While long pressing the volume button the Police siren rings which gives immediate help.Using this application we can store the emergency numbers like blood bank, women well fare etc. It sends the location of the user automatically to the intended people either based on the remote base station or by manual setting of time interval for location based messages. It broadcasts the emergency messages to the contacts based on the current location of the user. Police siren helps the user to get immediate help. Including emergency numbers facilitates the user not to memorize all those numbers. Self defense techniques make them self dependable as well as make the society to come forward for help.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhanced Secure Anti-Collusion Data Sharing Scheme For CP-ABE Security System[Full-Text ]
Mr.S. Thirvenkatasamy , Arradhana.G , Kowshika.A, Keerthana.C Taraka Sravya.RThe data outsourcing scenario challenges the approaches of traditional access control architectures such as reference monitor, where a trusted server is in charge of defining and enforcing access control policies. The main scope of the project is used to deliver the user data in the third party area for on demand access. The user access the details as privilege level based on access control. The dual encryption is processed in the cloud environment which is varied form one group to another for secure process. The paper propose a novel algorithm namely ciphertext-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. The algorithm executed in the basis of setup process to create the master key and public key, key encrypting key generation process, attribute key generation process based on access control, encrypt the data using public key, re-encrypt process using group key and Decryption of data. Dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. The ciphertext-policy EABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy. This effectively eliminates the need to rely on the storage server for preventing unauthorized data access.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Digital Signature Manager[Full-Text ]
K.Gopalakrishnan,S.Venkatesh,V.Naveen, S.TamilKumaran, R.LakshmananThe contains options for managing the documents such as Bonafide certificate, gate pass, on-duty form and leave form for students with signatures of higher authorities (Head of the Department and Principal). From the student login, the requests are being filled by the students and send to top officials for authorization .From the Administrator login, the corresponding request forms are being examined and approved. The approved requests and corresponding forms are sending back to the students E-mail and it doesn’t need any physical authorization because it is digitally signed and generated by the computer. The forms for various requests (Bonafide, Gate Pass, On Duty and Leave) and signature details of the HOD and Principal are converted from images to binary data and kept in databases so that the request forms are processed through the application itself. After that the student’s requests are analyzed and examined by the administrator (HOD, Principal) then authorization that is signature is merged with the request form. Thus the application results in secure students requests processing with corresponding privileges for both top official and students. Various reports are generated dynamically by the administrative users for their further reference. Through this application, the concerns can process the information with better security.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Emotion Recognition By Dance Movement - A Survey[Full-Text ]
S. Pallavi ,Dr. R. PonnusamyEmotion plays an important role in our daily lives. Recognize emotions such as happy, sad, fear, surprise etc from facial expressions is an easy task for human. But it is a complex task for computers. Many researches have done to recognize emotions from user’s facial expression by computers. In that, a challenging thing today is recognize emotions from body pose. in this paper, we review the methods of emotion recognition by body pose. body pose means, it may be dance movement or person – person communication. In this paper, first we review some methods of emotion recognition from dance movements. Secondly, we propose our future method of recognize emotions from the Indian classical dance bharathanatyam navarasas i.e. nine emotions. We will use the techniques of orientation filtering, max pooling and template filtering for recognizing navarasas of bharathanatyam dance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Connection Sighting of uploaded Stuffs and image in societal circles by means of Gaussian Topic Model (GTM)[Full-Text ]
Sharumathi V.S,Nithya KOnline social networks are ultimate for exchanging ideas, views, and garnering public outlook; even though, these are restricted to the users of the social network. Popular social networking sites, like Orkut, MySpace and Facebook are changing the Internet scene. When user social graphs are only accessible to exclusive parties, these user-shared images are proved to be an easier and effective alternative to discover user connections. This is the first attempt in this field to prove and formulate such a phenomenon for mass user-shared image along with more practical prediction methods. With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. This project scrutinizes the role of social context, image content, and metadata as possible indicators of users’ privacy preferences. In existing system there are two major components in existing system: (i) Image classification and (ii) Adaptive policy prediction. While OSNs allow users to restrict access to shared data (policy mining), they formerly do not provide any mechanism to enforce privacy concerns over data associated with manifold users. For each user, his/her images are first classified based on content and metadata. Then, privacy policies of each category of images/contents are analyzed for the policy prediction.Then during searching, these data act as meta-data for classifying images.Given an image, a user usually first decides who can access the image/content, then thinks about what specific access rights (e.g., view only or download) should be given, and finally refine the way in situation such as setting the expiration date. Correspondingly, the hierarchical mining first look.The proposed system takes care of parental control based privacy preserving in various settings level also. So privacy preserving collaborative tagging if applied to content with multiple languages, then it becomes more effective to fruitful to end users. In addition, the proposed system develops a web application in which tell the above mentioned processes are carried out and so end users make use of it.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Automation Process In Campus Recruitment System[Full-Text ]
M.Amaleeshwari, D.Mahalakshmi, D.Deena, S. Ezhilin FreedaThis project deals with the application of Efficient Automation Process in Campus Recruitment System of the college. This system is used to gain the information of all the companies to facilitate students and prepare for the placement. The use of Smartphones, Internet and World Wide revolutionized the provision of information and the amenity for the user to take the information and get the company organization activities.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
VEHICLE PARKING SYSTEM USING IoT[Full-Text ]
Dr.G.M.Rajathi, Mydilee.K.V. ,T.RevathiThis paper proposes a smart parking system detecting, finding the parked location of a consumer’s vehicle and also detecting any presence of obstacle in the parking lane. Using Ardiuno, infrared and ultrasonic sensor, the proposed system detects vehicles in indoor parking fields, accurately and also it detects any obstacle if present in the parking lane. WiFi module with local WiFi connectivity is used to update whether the lane is booked or empty through the obtained IP address.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Data Mining Model To Predict The Risk Of Heart Disease Using Multinomial Logistic Regression (Mlr)[Full-Text ]
Ms.M.K.Dharani, C.PoovithaIn this modern life style people are very much affected by various health issues. According to the survey of Indian medical council most of the people in India are affected by the heart disease. This is mainly due to their work nature and nature of food habits which leads to different level of pulse rate, cholesterol level, and stress rate. Even though it can’t be completely eradicated, it can be predicted and treated using the clinical data. It can be effectively analyzed and predicted using the data mining algorithms and techniques. In our proposed work the clinical data set of 14 features and 303 instances are taken. The classification of the dataset is done by correlation based feature subset (CFS) selection with particle swam optimization (PSO) to segregate the attributes that are the necessary for the heart disease. Then the data are clustered using the data mining algorithm and multinomial logistic regression is being applied to clinical data .This technical approach provides the higher accuracy of heart disease prediction as compared with other techniques.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analyzing Human Voice For Identifying And Preventing The Usage Of Unintentional Words Using Vus Algorithm[Full-Text ]
A. Suresh Kumar, N. Umamaheshwaran, H. Vasantha KumarHuman Voice recognition is an essential fact for modern voice recognition applications and its related products. The Main reason for these kind of problem is the variation in user’s communication at different places and at different mental condition. The problems faced by many people today is their lack of improper expression in communication. In order to overcome this problem a better way is to improvise their vocabulary capabilities and control the usage of particular word in a particular place. This paper presents an android based application for effectively improvising user speech and thereby increasing the chances for better recognition of human voice by the voice recognition applications. Mobile device record audio input and process them by using Variation of Uniquely Spoken words algorithm.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Recognition and Recall based Graphical Password Authentication[Full-Text ]
I.Sarfraz Ahmed, S.VivekNow a days, Internet has become the essential requirement for most of the people. Online payment and transaction has been made in our day-to-day activities. Human Interaction with computers and smartphones through several applications become unavoidable for which authentication is mandatory to secure the user’s information against Cybercrime. User authentication is the most fundamental component in all computer security systems. Thus the primary goal of this paper is to provide secure authentication that guards against hacking. It also explores the information about strengths and weaknesses of passwords. The secondary goal is to bring awareness in mass about the possible threats they can suffer from and provide solutions by keeping a strong password and to introduce a new idea of presenting graphical authentication.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Green Computing[Full-Text ]
A.DIVYA,S. GirijaGreen computing is a recent trend towards designing , building and operating computer system to be energy efficient . While programs such as ENERGY STAR have been around since the early 1990’s recent concerns regarding global climate change and the energy crisis have led to renewed interest in GREEN COMPUTING. Data centres are a significant consumers of energy-both to power the computers as well to provide the necessary cooling . This paper proposes a new approach to reduces energy utilization in data centres. In particular , our approach relies on consolidating services onto a subset of the available servers and temporarily shutting down Servers in order to conserve energy. We present initial work on a probabilistic service dispatch algorithm that aims of minimizing the number of running servers such that they suffice for meeting the quality of service required by service-level agreements . Given the estimated energy consumption and projected growth in data centres , the proposed effort has the potential to positively impact energy consumption.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Eulerian Video Magnification[Full-Text ]
Dilsha.P, Nivya.S.Kumar, Kiruthika.M, Shanmugapriya.KOur world is constantly changing, and it is important for us to understand how our environment changes and evolves over time. A common method for capturing and communicating such changes is imagery -- whether captured by consumer cameras, microscopes or satellites, images and videos provide an invaluable source of information about the time-varying nature of our world. Due to the great progress in digital photography, such images and videos are now widespread and easy to capture, yet computational models and tools for understanding and analyzing time-varying processes and trends in visual data are scarce and undeveloped.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Android Application For Vehicle Parking System[Full-Text ]
K.Devendran, Su.NivethaaAmong the challenges that we face in our day to day life one of most unavoidable challenge is parking the car wherever we go. As our need increases our travelling increases but due to drastic increase in usage of vehicles and increase in population we face the tough task of parking our car particularly during busiest hours of the day. During peak hours most of the reserved parking area gets full and this leaves the user to search for their parking among other parking area which creates more traffic and leaves them with no indication on availability of parking space. To overcome this problem there is definitely a need for designed parking in commercial environment. To design such parking slot we need to take into the account of reservation of parking slot with optimal parking space which depends on cost and time. Additionally, four hours prior to his expected arrival, the user can pre-book a slot in the area he desires if it is available. This will help reduce the load on the administrator as his physical work reduces drastically and user can search the parking slot through Android Application. Payment services are made available using Google Wallet, so the user is required to own a credit card or debit card. Application relieves the user from the hassle of manually searching and waiting for empty slots to park the vehicle.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Density Based Improved K- Medoids Clustering Algorithm[Full-Text ]
GOWRI.M, KALYANA SUNDARI.R, KALEESHWARI.R, VASAVIANANDHA LAKSHME.S.SClustering is the process of classifying objects into different groups by partitioning sets of data into a series of subsets called clusters. Clustering has taken its roots from algorithms like k-medoids and k-medoids. However conventional k-medoids clustering algorithm suffers from many limitations. Firstly, it needs to have prior knowledge about the number of cluster parameter k. Secondly, it also initially needs to make random selection of k representative objects and if these initial k medoids are not selected properly then natural cluster may not be obtained. Thirdly, it is also sensitive to the order of input dataset. Mining knowledge from large amounts of spatial data is known as spatial data mining. It becomes a highly demanding field because huge amounts of spatial data have been collected in various applications ranging from geo-spatial data to bio-medical knowledge. The database can be clustered in many ways depending on the clustering algorithm employed, parameter settings used, and other factors. Multiple clustering can be combined so that the final partitioning of data provides better clustering. In this paper, an efficient density based k-medoids clustering algorithm has been proposed to overcome the drawbacks of DBSCAN and k-medoids clustering algorithms. The result will be an improved version of k-medoids clustering algorithm. Thisalgorithm will perform better than DBSCAN while handling clusters of circularly distributed data points and slightly overlapped clusters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Big Data Classification using Infrequent Principle Component Analysis on Map Reduce Paradigm[Full-Text ]
G.Yuvarani, K.SaranyaBig Data is usually defined by three characteristics called 3Vs (Volume, Velocity and Variety). It refers to data that are too large, dynamic and complex. In this context, data are difficult to capture, store, manage and analyze using traditional data management tools. Thus, the new conditions imposed by Big Data present serious challenges at different level, including data clustering. This work makes a concise synthesis related to clustering to categorize efficiently using PCA based classification model on the map reduce framework. The Map Reduce framework is modelled using a novel technique named as Infrequent Principle component Analysis (IPCA) based Classification algorithm. The proposed technique is capable of classifying and indexing the large volume and high dimensional data. It works using data reduction methods like Singular value decomposition technique to eliminate the unwanted or less relevant attributes or fields in the data Matrix taken distance computation. The Infrequent PCA is capable of partitioning and extracting the feature for data labelling of classes. Usually class contains the set of relevant features. Load balancing is also managed by efficient configuring of the proposed algorithm with map reduce function. Experimental studies on various big datasets have been conducted. The performance of IPCA is judged in comparison with the KNN methods implemented on the map reduce framework. The comparative results are reported in terms of time and space complexity, run time and measure of clustering quality, showing that proposed method is able to run in less time without compromising the clustering quality.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Joint Image-Text based topic detection and retrieval using And-Or graph[Full-Text ]
G.Rajeswari, S.Samyuktha, S.Sripathy, M.VinothiniIn present days, we are interested in knowing the authorized news where these news details are present in different websites or journals of different languages. The videos may either be in mp3, avi or any other format. By using Maximally Stable Extremal Region (MSER) algorithm we can detect blob detection and generate a method for automatic detection and tracking of topics from videos. The clustering sample processes are detected by news topics. And the Optical Character Recognition (OCR) algorithm is used for clustering to get a perfect optimal clustering solution. The textual and visual representation of video will prove the outcome of the proposed project and by using AND-OR Graph Representation the appropriate topics are produced. In clustering process, this method achieves the maximum efficiency and higher performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Discernment of Malware in Cloud Computing Environment[Full-Text ]
R.S.Ramya, Mahalakshmi TM, Mohanapriya B, Ponmurugan P, SanthoshKumar SCloud computing is a growing technology in today's world. The number of users are increasing day by day. Since it offers many benefits like transparency and elasticity, it is subjected to large number of vulnerabilities. Hence security has become a major challenge. In our project, we have proposed a method for the detection of malware in the files that are being uploaded in the cloud by using the Support vector machine algorithm. Once the user uploads the file, the admin checks for any anomalies in the uploaded file .By the applicability of novelty detection approach, the infected files can be easily removed, so that no other cloud users gets affected by downloading the infected file. We demonstrate that our solution can achieve good results in the detection of malware. Besides, we evaluate the advantages of not only considering system-level data, but also network-level data based on attack types. Hence, this flexible detection system is capable of detecting new malware strains without prior knowledge of its functions or basic instructions.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ISRA In Wireless Network Using Virtualization[Full-Text ]
A.Josephine Jeena, P.Loganathan, P.G.Vajravel, N.Mohammed AnisWireless Sensor Networks additionally include a concept called Virtualization. Virtualization is an emerging concept in all technologies including storage, networks and examples like Virtual Reality, Virtual Storage, Virtual Machines and Virtual Networks. Here, in our project we took Virtualization concept in general Wireless Networks and implementing that concept in Wireless Sensor Networks. Unlike in Virtual Sensor Networks, Virtualization can be applicable to the fixed sensor nodes in target application areas. But it has some issues like Node isolation, control signaling, resource discovery and allocation, mobility management, network management and operation and security. We took two issues Node Isolation and Resource Allocation, tried to solve that by implementing our ideas by referring some algorithms and techniques. This project reduces the complexity in isolating the nodes for better communication between nodes and gateway and also it will optimize the resource allocation. By managing the above mentioned issues in a given way can increase the efficiency of the network isolation and resource allocation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Payroll Integrated Information System For Modern Enterprises[Full-Text ]
Mala.J, Ann Mary Raju, Kavitha.S, Naveena.MThe purpose of developing this software project is to fully automate salary system for an organization. The idea of taking control of employees pay calculations are quite tedious if done manually and require more effort and time for big organizations. Hence if this process is automated, it would be of great benefit as it would require less time to calculate the salary of the employees. Each user like employee or admin can login into the software by using their respective username and password which are allocated to them from the organization. This software is capable of calculating monthly salaries and tax of employees of that organization. It will generate reports as an output such as pay slip, bank report, cumulative report, Form 16, ESI report and PF report. It is capable of keeping a record of employee data including their pay, allowances, deductions and taxes on monthly basis. The proposed payroll system is advantageous as it provides a user friendly environment and also minimizes human calculation errors.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Event Management System Using Reduced Overlay Interface Design[Full-Text ]
A.Suresh, Dr.G.Ravikumar,K.Midhun, S.Nivetha, A.Noorjahan, G.PavithraThe objective of the work is to provide Event management services to the group of users in online mode, which helps to maintain the Event schedule, Event notifications and relevant details. In general when the events are conducted, the approval process for attending the events, alerting the events, and providing on-duty services are done through various communications. In order to solve the above problem, an event management system using reduced overlay interface design is developed. The earlier interface is more complex to perform the task. The proposed design has been reduced by novel overlay computer interfaces, thereby optimizing a design for a desired property such as learnability, efficiency of use, The design includes name of events, registration, insert properties, update properties, participant details, and winners’ lists. If the user is willing to participate in the programme outside the campus, the user can get the approval online. The automation also includes year wise events organized list, details of participants, and semester wise filtering.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic water supply to Fields Based on variation in humidity range using wireless sensors[Full-Text ]
Gaja lakshme K.R, Mrs. S. Kavi PriyaAgriculture uses 85% of available freshwater resources worldwide, and this percentage will continue to be dominant in water consumption because of population growth and increased food demand. There is an urgent need to create strategies based on science and technology for sustainable use of water, including technical, agronomic, managerial, and institutional improvements. An automated irrigation system was developed to optimize water use for agricultural crops. The system has a distributed wireless network of soil-moisture and temperature sensors placed in the root zone of the plants. Field conditions were site-specifically monitored by six in-field sensor stations distributed across the field based on a soil property map, and periodically sampled and wirelessly transmitted to a base station. An irrigation machine was converted to be electronically controlled by a programming logic controller that updates georeferenced location of sprinklers from a differential Global Positioning System (GPS) and wirelessly communicates with a computer at the base station. Communication signals from the sensor network and irrigation controller to the base station were successfully interfaced using low-cost Bluetooth wireless radio communication. In addition, a gateway unit handles sensor information, triggers actuators, and transmits data to a web application. An algorithm was developed with threshold values of temperature and soil moisture that was programmed into a microcontroller-based gateway to control water quantity. The system was powered by photovoltaic panels and had a duplex communication link based on a cellular-Internet interface that allowed for data inspection. The automated system was tested in a sage crop field for 136 days and water savings of up to 90% compared with traditional irrigation practices of the agricultural zone were achieved. Because of its energy autonomy and low cost, the system has the potential to be useful in water limited geographically isolated areas.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An approach for security and prevent Duplication in Datacenter[Full-Text ]
Vasanthkumar s, sivakumaran sData deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in datacenters to reduce the amount of storage space and save bandwidth. In most organizations, the storage systems contain duplicate copies of many pieces of data. For example, the same file may be saved in several different places by different users, or two or more files that aren't identical may still include much of the same data. Deduplication eliminates these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead back to the original copy. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. The Hashing technique has been proposed to find the duplication and preventing the duplication. For protecting the confidentiality of the data the Data encryption standard Algorithm has been used to encrypt the data We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Advanced Computer Vision Based Virtual Dressing Room[Full-Text ]
M. Santhana lakshmi, P. Dilshad banu,T. Ramesh,Reshma ann Mathews,Gokulakrishnan.kThe cloth pattern simulation is a new approach to clothing simulation using low dimensional linear subspaces with temporally adaptive bases . Our method exploits full-space simulation training data in order to construct a pool of low-dimensional bases distributed across pose space. For this purpose we interpret the simulation data as offsets from a kinematic deformation model that captures the global shape of clothing due to body pose. As an essential part of cloths animation, the dressing process also as important impact to the overall system performance and applicability. Especially in the virtual network dressing room of clothes e-commerce system, it is still a problem how to dress various clothes more simply and efficiently. We also show how our simulation data can be post-processed with the collision- aware sub-division scheme to produce smooth and interference free data for rendering.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Non-Invasive Blood Glucose Measurement And Control[Full-Text ]
S. Pavithra, R. Santhana Bharathi, Reshma Ann Mathews, R. GokulakrishnanDiabetes is metabolic disorder in which blood glucose fluctuates from its normal range. Insulin is a hormone produced in body to regulate blood glucose level naturally. Under some pathological failure, body is not able to produce insulin or body cells become unable to use insulin.Regular monitoring of blood glucose is important to avoid complication of diabetes. Commonly used glucose measurement methods are invasive which generally involves finger puncturing. These methods are painful and frequent pricking cause calluses on the skin and have risk of spreading infectious diseases. Therefore there is need to develop a non-invasive monitoring system which can measure blood glucose continuously without much problem. In this method we use NIR SENSOR for observing the oxygen molecules in blood Where sensor rays are reflected by oxygen. When Glucose level is High the Insulin Injector will be automatically injected via Servo Motor and the result will be sent simultaneously to the Doctor’s unit via SMAC
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
GSM Based Auto Rationing System[Full-Text ]
Dr. G. Mary Jansi Rani ,S.Hariharan, R.Raajesh, RM.Subbiah, S.TanvirGSM based automatic ration shop is novel approach in public distribution system (PDS) useful for more efficient, accurate, and automated technique of ration distribution. Public distribution system also called rationing distribution system is one of the widely controversial issues that involve malpractices. The present ration distribution system has drawbacks like inaccurate quantity of goods, low processing speed, large waiting time, material theft in ration shop. The proposed system replaces the manual work in ration shop. The main objective of the designed system is the automation of ration shop to provide transparency. The proposed automatic ration shop for public distribution system is based on Radio Frequency Identification (RFID) technology that replaces conventional ration cards. The RFID tags are provided instead of conventional ration cards.Customer’s database is stored in atmega which is provided by Government Authority. Customer needs to scan tag to RFID reader, and then microcontroller checks customer's details with stored to distribute material in ration shop. After successful verification, customer needs to enter type of material as well as quantity of material using keypad. After delivering proper material to consumer, the microcontroller sends the information to customer as well as PDS authorities using Global System for Mobile (GSM) technology.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
LWT Based Data Hiding By Using Steganography[Full-Text ]
GAYATHRI.A, DHARSHINI.G, DEEPIKA.SSecurity of information is very important in terms of communication and/or the secrecy of how to decode it. The enhancement of security system for secret data communication through encrypted data embedding in Color images is proposed. Initially the cover image is converted to any one plane process and encrypted by using Chaos encryption. Adaptive LSB replacement algorithm is used for hiding the secret message bits into the encrypted image. In the secret data extraction module, the secret data will be extracted by utilizing significant key for choosing the image pixels to extract the data. This technique is particularly helpful in applications such as medical and military imaging. The proposed methodology provides better performance in terms of MSE, Hiding capacity and peak signal to noise ratio. It is implemented in FPGA (Field Programmable Gate Array) and MSE, PSNR are computed. The design architecture when implemented on FPGA Spartan III offers high processing speed, which might give an impulse for the researchers to a very fast, programmable & cost effective hardware solution in the area of Secure Communication.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Smart Shopping Trolley For Supermarkets Using Rechargeable Smart Card[Full-Text ]
K.R.Prabha ,S.Sabari Manoj, C.Sandeep, M.R.Maniganda DineshNowadays, shopping has become major role in our economic activity. Basically, Innovation in technology is aimed towards making day to day life of people easier and faster. In this paper, we discuss a product "Smart shopping trolley for supermarkets using rechargeable smart card" being developed to help customer in terms of reduced time spent while shopping. The main objective of proposed system is to provide a technology oriented, easily handled, and efficient system for helping the customers in shopping. The main facility that the proposed model provides is the customer only needs to carry a smart card, which is needed to be swiped in the trolley to initiate shopping when a customer places a product in the smart trolley, the RFID Reader will read the Product ID and the information related to it will be stored in Arduino UNO. When shopping is over the customer have to press the end button which will automatically deduce the bill amount from the balance available in the smart card. The payment is made right there and thus avoiding the need of waiting in queue at counter and saving large amount of time. The smart card is rechargeable.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DETECTION OF BREAST CANCER USING SEGMENTATION TECHNIQUE IN MAMMOGRAM IMAGE[Full-Text ]
Stephen sagayaraj. A,Mohanapriya. G, Nivetha. R, Subhashini. C, Suganya. VMammography is the best method for premature detection of breast cancer. Breast cancer is the second most common cancer in the world. Breast cancer is a cancer that develops breast from breast tissue. To identify the breast cancer, four step has to be done, first step is preprocessing, in this median filter used to distinguish out –of- range isolated noise from legitmateimage features such as edges and lines , Laplacian filter is used to compute the second derivatives of an image and Gaussian filter is rotationally symmentric and used to perform same in all directions ,PSNR[peak signal to noise ratio] and MSE[mean square error] has been calculated for each filter. Second step is segmentation , in this paper texture method such as texture filter is used to segment the cancer part.. Better improvement in accuracy for the expose of breast masses is texture method such as texture filter.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages
[1]
[2]
[3]