NCETSETMA 2017- National Conference on Emerging Trends in Science, Engineering ,Technology, Management and Applications
"NCETSETMA 2017 Conference Papers "
Pages
[1]
[2]
[3]
Design of Thermo Compressor for Soot Bowler[Full-Text ]
SOURAJ S R,Sreekanth Sreekumaran,PREMA PAUL
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FLEX SENSOR BASED INDOOR AUTOMATION USING HAND-GLOVE[Full-Text ]
DEIVASIGAMANI.D, KOMATHI.S, NIITHESH.VS, NIVETHA.G, NIRMAL KUMAR.MThis project depicts the design of the hand glove in which the flex sensor is mounted on it. The flex sensor interface which helps to control the slider movements, indoor appliances thereby commanding the PC with the hand gesture signals. By using the hand gesture recognition method, the flex sensor sends the commands to microcontroller and then transmitted by transmitter and then received by the receiver. The received commands then again fed to the PIC microcontroller in which it can control the appliances using relays and also it can control the slider movements by interfacing with the personal computer using the MAX 232.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of Sonication Time and HNT Loading on Tensile strength of Epoxy- HNT Nanocomposite[Full-Text ]
Ramamoorthi R , Jeyakumar R , Sibi Sankar R, Thanigaiarul S , Adithya EEpoxy-clay nanocomposites have recently gained considerable attention due to their interesting physical, thermal and mechanical properties. These properties, however, depend on a number of parameters such as the clay type, clay modifying agent, polymer matrix and the adopted mixing process. In the current work, nanocomposites were prepared from epoxy resin epoxy resin and Halloysite nano tube (HNT) using different sonication (mixing) periods (5 to 60minutes) and different concentrations of clay (2 to 5%wt). The effect of sonication time and nano loading on the tensile strength of the resulting nanocomposites were investigated. The results showed that the ultimate strength of the nanocomposites were below that of the neat epoxy. Increasing the sonication time enhanced the tensile strength..
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SYNTHESIS, CHARACTERISATION AND BIOLOGICAL STUDIES ON Ni(II) QUINOLINE SCHIFF BASE COMPLEXES[Full-Text ]
N.Sudha ,K.G.Kowsalyaa and M.NiveaaSchiff base play an important role in inorganic chemistry as they easily form stable complexes with most transition metal ions. The synthesis and characterization of transition metal complexes containing Schiff bases as ligands due to their application as catalyst in many reactions and related to synthetic organic and natural oxygen carriers. Molecules containing donor-acceptors such as Schiff bases have ability to serve as polymeric ultraviolet stabilizers, laser dyes .The present work is focused on the study of co-ordination behaviour of thiosemicarbazone Schiffbase with hydrated Ni(II) chlorides. Analytical and spectral data confirmed the structure of the complexes.Also absorption at 305nm might be due to the extended conjugation of the ring or may be due to the ring residue. Antibacterial and Antifungal activities were carried out using Disc diffusion method and the compounds were found to be active.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Synthesis of coumarin derivatives and antimicrobial activities against E-Coli[Full-Text ]
V.NarmadhadeviDue to exceptional reactivity of coumarin, the synthesis of new coumarin derivatives type has been carried out. The newly synthesized derivatives contain different functional groups, and as such they could exhibit microbiological activity. Therefore, the microbiological activity of these derivatives on E- Coli is tested. The tested compounds have shown different activity in terms of growth inhibition of microorganisms.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BIONIC EYES[Full-Text ]
D VARNA, K SURUTHIFor those millions of us whose vision isn’t perfect, there are glasses. But for those hundreds of thousands who are blind, devices that merely assist the eyes just aren’t enough. What they need are alternative routes by which the sights of the world can enter the brain and be interpreted. Technology has created many path ways for the mankind. Now technology has improved to that extent wherein the entire human body can be controlled using a single electronic chip. We have seen prosthetics that helped to overcome handicaps. Bio medical engineers play a vital role in shaping the course of these prosthetics. Now it is the turn of artificial vision through bionic eyes. Chips designed specially to imitate the characteristics of the damaged retina and the cones and rods of the organ of sight are implanted with a microsurgery. Linking electronics and biotechnology, the scientists have made the commitment to the development of technology that will provide or restore vision for the visually impaired around the world. Whether it is Bio medical, Computer, Electrical, or Mechanical Engineers all of them have a role to play in the personification of Bionic Eyes. There is hope for the blind in the form of bionic eyes. This technology can add life to their vision less eyes.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ThingSpeak IoT - A Non-invasive Bio-Signal Measurement Approach for Advanced Health Care Monitoring Using Wearable Sensors[Full-Text ]
Dr. A. Suresh, Shalika RThe emerging trend in healthcare sector is to change the usual healthcare services and routine medical check-ups from hospital centric to home centric. By this way ,the total expenses spent on the healthcare can be reduced dramatically. It has become an important aspect in future for the healthcare sectors to advance and improve the practical health technologies and services using information and communication technology so that they can be applied in home environment. An intelligent home-based platform, the iHome Health-IoT, is proposed and implemented using ThingSpeak. The proposed platform uses IoT devices such as wearable sensors for improved accuracy and user experiences.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Deployment of QR Code for Security Concerns in Banking System[Full-Text ]
Dr. A. Suresh, Shaheen H, Soumya S Archana Nair MRevelation of password is a major security problem which affected millions of users and companies .User's passwords has to be protected from being stolen by adversaries. With the cyber security threats currently on the rise, websites are getting easily compromised which prompts administrators to find ways to secure them from the black hat community. A virtual password and QR code concept involving a small amount of human computing is adopted to secure user’s passwords in on-line environments. User determined randomized linear generation functions is adopted to secure user’s passwords based on the fact that a server has more information than any adversary does. The proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. QR code mechanism is the first one which is able to defend against all three attacks together. In this paper, we discussed how to prevent user’s passwords from being stolen by adversaries. Disclosure of password files is a severe security problem that has affected millions of user’s. Since leaked passwords make the user target of many possible cyber attacks. Once a password file is stolen by using the password cracking technique is easy to capture most of the plain text passwords. Honey Word (decoy password) are proposed to detect attacks against hashed password databases. For each user account, the valid password of existing user is used as honey words. In this survey paper, study, we study QR code methodology and different attacking scenarios as well as different related approach to secure banking system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cluster Detection in Text Pattern Over Emerging Social Networking Sites[Full-Text ]
Dr. A. Suresh, Reyana A, Vaishnav Namboothiri T A, Dheeraj RWe propose an algorithm for anomalous detection of high dimensional discrete data usingan approach of clustering anomalies from the discrete data sets. Rather than the normal AD algorithm that detects the set of points which collectively exhibit abnormal patterns, providing a systematic way of detecting an anomaly with in an unanimity concern. The proposed algorithm emphasis efficient and powerful detection of anomalies. Unlike the existing techniques of finding each word separately the algorithm here uses a clustering method to detect each word that possess a maximum deviance from the normal pattern collectively in the batch of a given text document. Thereby resulting in more advantageous and effectual way of anomalous discovery over social networking sites preventing abnormal patterns.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey on Various V's with comparison of Apache Hadoop and Apache Spark[Full-Text ]
M. BalaAnand, C.B.Sivaparthipan, S.Sangeetha, S.MuruganBig Data is the buzz word which refers the huge amount of data and are of structured, unstructured, semi-structured or combination of all that cannot be capture, store, analyze, share and visualize by a traditional database tool or computational software. As well as, when the data exceeds the limits of the processing capacity of a particular system then it can also be termed as Big Data. Some of the source for Big Data includes streaming data, motion data, weblog data, transaction data, GPS signals, social media data, radar generated data and etc., The huge volume of data which generates with very high velocity and doesn’t fit into the structure of our traditional database architecture are to be compute within a minimal span of time is a tedious task. At present these various types of data and tedious task can be process with the help of Batch oriented Processing with Map and Reduce often termed as “Hadoopâ€, and In-memory processing like Spark. This paper presents the detail view of Big Data and its various processing framework with visualization.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Encryption and Decryption of Data Hiding in Audio Signal using LSB algorithm[Full-Text ]
Kalaiarasi.G ,Dr.S.Maheswari,Snekha.,Nirmala.,Suguna. A, Manimegalai. PIn this recent scenario everyone use multimedia for the conveyance of data. The data we transmit in those social Media should be confidential and highly secure. As the number of users increases the number of intruders also increases. The cryptography and steganography is used to ensure the security of data. Especially they are used in military and defense application to ensure the security. The data is hidden in the image in the existing system, but the data is not unconfined. In the proposed system the data is encrypted using key based algorithm using Linear Feedback Shift Register(LFSR)and the encrypted data is covered in the audio signal using Least Significant Bit (LSB) algorithm in prudent manner and the stego file is formed. The stego file consist of cover audio and encrypted data is transmitted the key produced during encryption is only known to the receive.Decryption is the inverse process of encryption from which the audio signal is extracted and the data is decrypted .Thus the encryption and Decryption has been made using Verilog Hardware Description Language and simulated using ModelSim.The synthesis designs were implemented in Quartus-II software.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DIGITAL IMAGE PROCESSING[Full-Text ]
R.SARAVANAN, MR.A.RAJESHSignal processing is a discipline in electrical engineering and in mathematics that deals with analysis and processing of analog and digital signals , and deals with storing , filtering , and other operations on signals. These signals include transmission signals , sound or voice signals , image signals , and other signals.Out of all these signals , the field that deals with the type of signals for which the input is an image and the output is also an image is done in image processing. As it name suggests, it deals with the processing on images.It can be further divided into analog image processing and digital image processing.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A New Way Of Diagnosing Pathologic Staging Of Lung Cancer[Full-Text ]
M.SARANYAData mining is the practice of examining large pre-existing databases in order to generate new information and to discover patterns from large data sets. Among the existing various data mining algorithms, the apriori algorithm is the one of the efficient to find the frequent patterns in the diagnosis of cancer data. The objective of the paper is to reduce the cost of generating and analysing pathological data in the cancer diagnosis.Being aware of the lung cancer pathologic staging is important because it can be used to estimate a patient’s prognosis and also can help physicians plan a suitable treatment. Therefore, this paper focuses a new approach for diagnosing the cancer data by taking the clinical information only which can be obtained without surgery to replace the pathology report. The data mining techniques are used to find the correlation between the clinical information and the pathology report in order to support lung cancer pathologic staging diagnosis.The attributes of clinical data are classified through decision tree method. The rules are generated based on the correlation between clinical and pathology dataset. The proposed method is experimented with real time large data sets and more number of rules be generated in order to improve the accuracy further. Finally, result shows that the apriori algorithm works well in terms of accuracy and reduced the computational effort. The algorithm is developed using MATLab.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Enhanced Outlier Detection Using Neighborhood Rank Difference[Full-Text ]
R.KALAISELVI Data mining is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. The problem of outlier detection is of great interest to the pattern recognition community. The major objective of outlier detection is to find the rare or exceptional objects with respect to the remaining data. In existing system, Outlier detection algorithms first create a normal pattern in a data, and then assign an outlier score to a given data point to on the basis of its deviation with respect to the normal pattern and it is assumed that the density around a normal data object is similar to its neighbour’s density which is not efficient to detect the outlier. Therefore, this paper proposes an enhanced outlier detection method using neighborhood rank difference. The appropriate preprocessing i.e. z-score normalization preprocessing technique is adopted in proposed method to remove the noisy data from the different datasets. Gaussian kernel method is used for smoothing the k values. Outlier score can be determined by the modified RDOS (Rank Difference Outlier Score). By using these outlier scores, we can obtain the outliers. Finally, the proposed system works well in terms of accuracy and obtain the better result than the existing system. The method is developed using MATLab.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BIG-DATA[Full-Text ]
kani mozhi.S kowshalya.M Big Data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, data duration, search, sharing, storage, transfer, Visualization, and information privacy.Accuracy in big data may lead to more confident decision making and better decisions can mean greater operational efficiency, cost reductions and reduced risk.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Joint Image-Text based topic detection and retrieval using And-Or graph[Full-Text ]
G.Rajeswari,S.Samyuktha,S.Sripathy,M.VinothiniIn present days, we are interested in knowing the authorized news where these news details are present in different websites or journals of different languages. The videos may either be in mp3, avi or any other format. By using Maximally Stable Extremal Region (MSER) algorithm we can detect blob detection and generate a method for automatic detection and tracking of topics from videos. The clustering sample processes are detected by news topics. And the Optical Character Recognition (OCR) algorithm is used for clustering to get a perfect optimal clustering solution. The textual and visual representation of video will prove the outcome of the proposed project and by using AND-OR Graph Representation the appropriate topics are produced. In clustering process, this method achieves the maximum efficiency and higher performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhanced Network Lifetime Using Hybrid K-Means Clustering In Wireless Sensor Networks[Full-Text ]
Senthamarai.KWireless sensor network is a network of energy constrained nodes with the capability of sensing and communication covering a large area. Although WSNs have significant advancements in many areas; maximizing the lifetime of the whole network remains a major obstruction.In thisstudy, an energy efficient clustering protocol based on hybrid K-means algorithm has been proposedfor WSN where midpoint algorithm is used to improve initial centroid selection procedure.Midpoint method has been applied forinitial CHs selection, instead of choosing initial CHs randomly. Itobtains balanced cluster where CHs are uniformly distributed andeach cluster contains an almost equal number of sensor nodes. Asa result, the load of the CHs becomes balanced, which ultimatelyprolong the network lifetime.Simulation result alsodemonstrates that the proposed approach can reduce the energy consumption at most 60% compared to LEACH-Bprotocol.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Nehru Alumni Portal[Full-Text ]
Ms. S. Jothimani, Sruthi. R, Saravanapriya. MNehru Alumni portal is a non-profit website created to communicate with the alumni of Nehru Institute of Engineering and Technology (NIET). Nehru Alumni portal serves as a powerful tool to communicate with those who studied in NIET. It is an online social platform which that connects old students, faculty members and other employees who leave the college after they finished their graduation . Nehru Alumni portal allows the students to register using their register number and access the access the data of different kinds. This gives the students more exposure to the various people who are the alumni of NIET and leads the students to gain any help in terms of their studies, career, projects etc.,.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design Of Microstrip Patch Antenna With Superstrate For Airborne Applications Using IE3D[Full-Text ]
R.Selvaraj,RJamuna Devi,V.JayasathyaThis paper investigate the characteristics of square shaped, probe fed, Circularly polarized patch antenna when covered with dome shaped superstrate at 1.575GHz .In order to obtain hemispherical radiation pattern for airborne applications,the conventional patch antenna is coverd by a superstrate with dielectric constant of 2.18 and thickness of 30mil. The antenna is simulated using IE3D software. The results are analyzed and discussed in terms of return loss, radiation pattern, axial ratio and beamwidth.The superstrate thickness and dielectric constant are critical parameters which governs the beamwidth of the proposed antenna.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Magnocraft[Full-Text ]
J.GERMAN MOZHI JENILA,K.GNANA PRAKASHIt is enough to venture at a street of any city to realise that our present propulsion systems are NOT going to take us far. After all, they sink out our natural environment, persecute us with their noise, consume the remains of natural resources that our mother Earth offered to us, and it is increasingly difficult to park them, to store them, and to dispose them. So there must be a better way to solve our transportation problems. This better way is called the Magnocraft. Soon such Magnocrafts are going to replace NOT only our present cars, but also all our space vehicles. This paper explains how exactly we learned that Magnocrafts for sure are to arrive soon, what evidence confirms that Magnocrafts are technically feasible, what attributes these Magnocrafts are to display, and what other vehicles that are even more advanced are to come after these Magnocrafts.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Applications of Mobile Agents: A Survey[Full-Text ]
Saravanan.R,Dr. V. GovindasamyA mobile agent is a computer program or software that has the capacity to reason, it can use network infrastructure to make use of an remote site as its hosts so as to run over it, it can search and get information, it can cooperate with each other and also with other sites after which it can return to its home site after it completes its assigned task. Mobile Agent based applications are rapidly increasing as they are in recent research activities and the fact of its wide application areas. The domains where mobile agent play an vital and important role are as follows: e-commerce, network management, energy efficiency and metering, Wireless Multimedia Sensors, Grid Computing and services, human tracking, security, e-learning, reference and semantic web services, affective computing, climate environment and weather. In this paper, a survey of mobile agent based applications is presented. The functions of the mobile agent are best suited for the domains that are mentioned above.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Choosing Handover Focuses in view of Setting Mindful Stack Adjusting in a WiFi - WiMAX HETNET Condition[Full-Text ]
A. Femina JG, S. Nithya and M.K. Vishnu Priya , Ms.SudhaHeterogeneous system (HetNet) is a vital idea for cutting edge remote Web engineering and Internet of Things (IoT), where a few remote advancements can exist together, and the clients ought to have the adaptability to choose the network in view of the natural condition and application requests. IEEE 802.11 (or WiFi) and IEEE 802.16 (or WiMAX) are the two essential building piece innovations for HetNets on account of their manageability, cost-viability, very much conveyed models and capacity to bolster high information rate remote interchanges. The current writing has all around concentrated the interoperability between these two advances, and consistent handover plans are intended to bolster WiFiWiMAX coordination in a HetNet situation. Be that as it may, viable usage of these two innovations from the end clients' pointof-view is another critical research territory. The question is: the point at which a client ought to relocate between these two advances in a HetNet domain? This paper proposes a handover choice component in a WiFi-WiMAX coordinated HetNet condition, that backings the 'Quality of Service'
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Disseminated Vehicular Traffic Re-directing Framework for Clog Shirking[Full-Text ]
M. Subha Devi, R. Sarmila, Ms.G.RajeswariBrought together answers for vehicular movement re-directing to ease clog experience the ill effects of two inherent issues: adaptability, as the focal server needs to perform concentrated calculation and correspondence with the vehicles progressively; and protection, as the drivers need to share their area and additionally the sources and goals of their excursions with the server. This article proposes Redirect, a dispersed vehicular re-directing framework for blockage shirking. Occupy offloads an expansive piece of the rerouting calculation at the vehicles, and hence, the re-directing procedure gets to be distinctly down to earth progressively. To take community rerouting choices, the vehicles trade messages over vehicular specially appointed systems. Occupy is a half and half framework since despite everything it utilizes a server and Web correspondence to decide an exact worldwide perspective of the movement. Furthermore, Redirect parities the client security with the re-steering viability. The recreation comes about show that, contrasted and a brought together framework, the proposed half and half framework expands the client protection by 92% all things considered. As far as normal travel time, Occupy's execution is somewhat not as much as that of the incorporated framework, however despite everything it accomplishes considerable increases contrasted with the no re-steering case. What's more, Redirect diminishes the CPU and system stack on the server by 99.99% and 95%, separately.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dynamic Authentication using Random Art Images[Full-Text ]
Sabarigireesan K N, Subbaraman C S, and Sumesh SAuthentication is the first step in information security. It requires the users to memorize their password and remember at login time. Textual passwords are the most traditional schemes that are used for providing security, but textual passwords are vulnerable to dictionary attacks, shoulder surfing, and spyware. Graphical password schemes overcome the shortcomings of textual passwords, but they are vulnerable to shoulder surfing attacks. To address this problem, text can be used in combination with the colors and images to generate a session password, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every session, a new password is engendered. Session passwords provide better security against dictionary and brute force attacks as password changes for every session. The proposed system uses random arts and texts for generating session passwords.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multilevel Thresholding For Color Image Segmentation Using Optimization Algorithm[Full-Text ]
Sherlin Suresh, Dr. Anitha JSatellite color image segmentation could be a difficult surroundings is a due to the presence of weakly correlated and ambiguous developed to get optimum threshold values for segmenting satellite images with efficiency in their quality and blurred regions of image. Their complete search nature makes them computationally expensive when extended from bilevel thresholding to multilevel thresholding. In this work, a computationally efficient image segmentation algorithm is used to select the threshold values that resulted in improved segmentation quality with an expense of computational time. The performance of the efficient harmony search algorithm is compared with two different objective functions for threshold optimization. Experimental results are validated by evaluating PSNR, STD, MEAN, MSE, best fitness and elapsed time for all the set of benchmark images. The algorithm evolved to be most promising and computationally efficient for segmenting satellite color images achieve stable global optimum thresholds. The experiments results encourages related researches in computer vision, remote sensing and image processing applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multiclass Co-Clustering Recommendations To User Item Subgroups[Full-Text ]
S.Kalaiyarasi, A.GokilavaniPrediction of the user similarity for similar preference with implicit aspects and explicit aspects on item and item information subset is considered to be the challenging issue in the collaborative filtering based recommendation models. Recommender models are can be derived based on building intelligence network by identifying user preferences or based on the content in the web. The representation will be done in a tabular form which will be transformed into the vector space model for further analysis and rating. Vector Space model usually consumes the large space which increases the computational cost. The User – Item similarity estimation based subset is employed using multiclass Co-Clustering model on the subgroups of the matrix. It computes the combinable User to User Similarity, Item to Item Similarity and finally User to Item Similarity based on the subset relevancy matrix instead of focusing on entire properties of user preference and item details. Experimental results are carried on the movie rating dataset that proposed system achieves better results in terms of precision, recall, f- measure and execution timings. This model is expected to produce the effective prediction by combining these features. Also, as the user preferences vary time to time, the co-clusters help to cover all the possible combinations and provide the best results based on the subset relevancy matrix instead of focusing on entire properties of user preference and item details.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fpga Implementation Of Image Compression Using Spiht Algorithm[Full-Text ]
Mrs.C THIRUMARAI SELVI , JAYA PRIIYA S, JULIE RAMYA N, KAAVIYA NThe demand for multimedia products have been growing fast,but consume large amount of storage space.Therefore the theory of compression becomes more significant in information theory for reducing transmission bandwidth and memory.Compression is the process of encoding data using fewer bits.Image compression reduces the amount of data required to represent an image.The objective of image compression is to reduce the redundancy of image and to store or transmit the image in an efficient form.The combination of DWT and SPIHT algorithm is used for image compression technique in FPGA.Set Partitioning in Hierarchial Trees(SPIHT) is a wavelet based image compression that offers good image quality,fast coding and high PSNR.It is used for lossless image compression. It can compress and reconstruct the image without changing the originality and the quality of the image.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Advanced Biometric Authentication System For Loco Pilot In Train[Full-Text ]
Aarya.R, Anju Radhakrishnan, Priyanka.A, K.GokulakrishnanIn today's world, unauthorized access to the valuable and the confidential sources is very common. An example can be recent hijacking of a train, which caused great loss to the railways. Based on this reason we thought it would be an apt project to make a secured protection for locomotives. To have a secured protection, a unique identification is necessary and we decided to use the fingerprint of the person as the identification. The objective of the project is to develop an embedded unit which only can be used while the driver start the engine by deploying his finger print as the authorization source. The focus of this paper is intelligent human-machine interfacing of behavior biometrics, which seems to play an important role in future generations of A-machines.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Authentication of Multiple Transaction Using Finger Vein[Full-Text ]
Dr. S. Mary Joans,Dhivya Bharathi. K , Akshaya.V, Shamini. R, Noorjahan. JAt present banks are looking beyond the transactions to the full opportunity on how to manage their customers. Accordingly, they are moving beyond managing clients as simple contacts to a whole new level of client relationship management, crafting a superior commercial client experience that gives the bank a competitive advantage and a more loyal, profitable and committed customers. But most of these systems do not focus on how best to manage and keep their customer's data more secured. Here we are developing an application for a Banking sector particularly for a Debit / ATM card section. The use of ATM/Debit cards for each and every account and memorizing the passwords seems to be difficult. In this paper we propose a system in which the user can integrate all his accounts even in different banks. Here user finger vein authentication is recognized for the initial verification part. He can also include his family members' or person-of-his interest accounts details. He can make transactions from their accounts also after successful authentication of the OTP generated. This concept essentially covers the following: Understanding customer needs, secure authentication, good service, and effectively managing system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Bldc Motor Fed By Solar Pv Array For Water Pumping System Based On Luo Converter[Full-Text ]
Akhil Raj.B, Prakash.RThis paper deals with the solar photovoltaic (SPV) array fed water- pumping system using a Luo converter as an intermediate DC-DC converter and a permanent magnet brushless DC (BLDC) motor to drive a centrifugal water pump. Among the different types of DC-DC converters, an elementary Luo converter is selected in order to extract the maximum power available from the SPV array and for safe starting of BLDC motor. The elementary Luo converter with reduced components and single semiconductor switch has inherent features of reducing the ripples in its output current and possessing a boundless region for maximum power point tracking (MPPT). The electronically commutated BLDC motor is used with a voltage source inverter (VSI) operated at fundamental frequency switching thus avoiding the high frequency switching losses resulting in a high efficiency of the system. The SPV array is designed such that the power at rated DC voltage is supplied to the BLDC motor-pump under standard test condition and maximum switch utilization of Luo converter is achieved which results in efficiency improvement of the converter. Performances at various operating conditions such as starting, dynamic and steady state behavior are analyzed and suitability of the proposed system is demonstrated using MATLAB/Simulink based simulation results.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic Hand Gesture Based Television Control System[Full-Text ]
PRAVEEN KUMAR DUBEYHand gesture based television (TV) control is attracting more and more researchers. Most of existing works focus on the hand gesture recognition algorithm and the corresponding user interface, while the power consumption or computational cost is not considered carefully. In practice, keeping the camera device and the gesture recognition module running all the time often costs much energy. Till now, few methods have been reported to solve this problem. This paper proposes an automatic user state recognition scheme to recognize the TV user's state and activate the camera-based gesture recognition module only when the user is trying to control the TV. Specifically, the user's behavior active or not is detected by low-cost sensors, the user's gaze watching TV or not is tracked by the face-based view detection, and the user's state is then decided according to a finite-state machine composed of four states: Absent, Other Actions, Controlling, and Watching. The prototypes based on an ultrasonic distance sensor array, a red-green-blue (RGB) camera, and a depth camera are implemented and tested. The results show that the proposed scheme can effectively reduce the power consumption or computational cost of the original hand gesture based control schemes
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic Tyre Inflation System[Full-Text ]
ANEESH RS, BABU M, BHUVANESH, BHARAT S,MR RAJKUMARDriven by studies, if there is a drop in tire pressure by a few PSI can result in the reduction of gas mileage, tire life, safety, and vehicle performance. We have developed an automatic tire inflation system that ensures the tires are properly inflated constantly. Our design proposes and successfully implements the use of a compressor which is centralized and will supply air to all four tires through hoses and a rotary joint which is fixed between the wheel spindle and wheel hub at each wheel. The rotary joints effectively allow air to the tires without the tangling the hoses. With the recent oil price hikes and growing concern of environmental issues, this system addresses a potential improvement in gas mileage; tire wear reduction; and an increase in handling and tire performance in diverse conditions
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design And Fabrication Of Anti Sliding System In Vehicles[Full-Text ]
Aneesh RS, Arulprakash S,Greep Raja J,Marimuthu VIn this work the mechanism has been developed to stop the vehicle from rolling backwards when the vehicle is moving in the hill roads. Ratchet and Pawl mechanism has been identified to arrest the motion to the front axle. Anti-Roll Back mechanism has been fabricated and tested on the front axle assembly. The mechanism works well.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages
[1]
[2]
[3]