Electronics & Communication Engineering - Holy Kings College of
KINGS ENGINEERING COLLEGE
Transcript of KINGS ENGINEERING COLLEGE
PROCEEDINGS
INTERNATIONAL CONFERENCE ONINNOVATION AND CHALLENGES
IN ENGINEERING & TECHNOLOGY
2015
SAE SE ICTACT *
ovate.Eoaborate.. Cdtate.
KINGS ENGINEERING COLLEGE
Opposite to Hyundai Motor
ST Chennai- Banglore Hichwa Irungatnkotai vilase Sriperumbudur Tauk
Tamil Nadu-602 117
INTERNATIONAL CONFERENCE ON
INNOVATIONS AND CHALLENGES IN
ENGINEERING AND TECHNOLOGY-
ICICET ‘ 15
PROCEEDINGS
Organized by
Kings Engineering College
Irungattukottai, Chennai
In association with
CSL, ISTE,IETE,ISME,ISTE,ICT Academy
PREFACE
The International Conference “International Conference on Innovations and
Challenges in Engineering and Technology(ICICET 2015)” provides an efficient knowledge
sharing platform to exchange ideas and views among experts, scientists, practitioners,
researchers and academicians. A viable solution to the problems faced by engineers may be
raised during the productive interaction among them. This volume of proceedings from the
conference provides an opportunity for readers to engage with a selection of referred papers that
were presented on 9th
April 2015 in ICICET conference. The conference proceeding is divided
into 3 sections named as Computer Science and Information Technology, Electronics and
Communication and mechanical Engineering.
One of the unique and valuable dimensions to the ICICET conference is, it brings
innovations in technology together from the entire world and discuss the challenges to serve
learners better. The reader of this proceeding will discover that both common challenges and
creative solutions emerge from very diverse settings. In the past few decades significant changes
in the technology, communication and manufacturing environment have been noticed that
expecting projects with higher quality at lower costs , highly customized and with short life
cycle. In these substances, the challenge is to develop effective systems with intelligence
capabilities, fast adaptation to the environment changes and more robustness against the
occurrence of disturbances.
For this international conference we have received a total of 250 full length manuscripts,
out of 185 manuscripts are short-listed by our highly qualified review committee members and
152 papers presented in the conference. The selected manuscripts are of high quality which
addresses the current challenges and research needs in engineering and technology. High
quality technical paper that proposes new ideas, procedures and techniques in all discipline of
engineering and technology are presented in this conference
ADVISORY COMMITTEE
Dr. Singaravadivel, Avanade Inc, U.S.A.
Dr. U. Johnson Alengaram, University of Malaya, Malaysia.
Dr. Natarajan Meghanathan, Jackson State University, U.S.A.
Dr. Selvakumar nagalingam, Quest university, Malaysia.
Mr. S. Nagarajan, Houston, USA.
Mr. Dinesh Pannerselvam, TCS,UK.
Dr. S. Rajesh, M. S. university ,TN ,India.
Dr .S. Janakiraman, Pondicherry University, Pondicherry.
Dr. J. Raja Paul perinbam, KCG, Chennai, TN, India.
Dr. K. Muneeswaran, Mepco Eng. college , Sivakasi, TN, India.
Dr. J. Sheeba Rani, IISST, Kerala ,India.
Dr. Sivasankar, Noorul Islam University, Thuckalai , TN ,India .
Dr. P. Shalini punithavathy, GCE, Tirunelveli, TN ,India.
Dr. J. Shanthi, Avinashilingam University, Coimbatore, TN, India.
Dr. N. Venkateshwaran, REC, Chenai, TN, India.
Dr. D. C. Joy Winnie Wise, FX Engg. College, Tirunelveli, TN, India.
Dr.R.Kesavan, MIT, Anna University, Chennai, TN, India.
Dr. E.N. Ganesh, Saveetha Engineering College, TN, India.
Dr. V.Arumugam , MIT, Anna University, Chennai ,TN, India.
Dr. K. Elangovan, MIT, Anna University, Chennai , TN, India.
Dr. S. Poonkuzhali, REC, Chennai, TN, India.
Dr. R. Vijayarajan, St. Joseph’ s College of Engg ., Chennai, TN, India.
Dr. V. Sapthagirivasan, ITSC , Pune, India.
Dr. P. Chinnaiyah, St. Joseph College of Engg., Chennai, TN, India.
KINGS ENGINEERING COLLEGE
ICICET’15
INDEX S.No PAPER
ID
TITLE AND AUTHOR PAGE
NO
1.
CS001
Grapheme Based Text-Independent Writer
Identification
ALLEN JEREM VINCENT, S. ANANTHA
PONRAJ
Mrs. S. Divya
3
2.
CS003
Knowledge Based Access Control In E-Learning Through Learner Activity
Analysis ASHA ALBERT, ANGEL KARUNYA.M,
Mrs.R.Lavanya
4
3.
CS004
Selfie Prevention And Accident Avoidance Android
System
A. ANANTH, K. BALAJI,
B. Mr.D.R.DenslinBrabin(A)
5
4.
CS005
Secret Questions: Phone Theft Detection And Prevention Of Important Apps
Access ASHA.M, J. BEULAH,
Mr.C.B.Chiranjeevi
6
5.
CS007
Brain Controlled Car For Disabled Using Artificial
Intelligence
K.ANANDHI, C. BAVITHRA KARTHI,
Mr K.G. Saravanan
7
6.
CS008
Integrated Verification Of Relay Generated Node Key & User Based Mutual
With Erasure Concepts R.D. BHAGYASHREE, S. DEEPIKA, N.L.ASWANI,
Mr.A.Gnanasekaran
8
7.
CS009
Identify Effective Self-Routing System In Wireless
Environment
ASIK.P, D. DELIN WINCIYA,
Mrs. D.Sterlin Rani
9
8.
CS011
Global Path Planning Using GA-PSO Algorithms
B. BENNETT RICHARD, GEORGE STEPHEN.A,
Mr K.G. Saravanan
10
9.
CS013
Effective E- Learning Framework
J GRACY, I.JEBAMALAR,
Mrs.J.Jainee Sharmila
11
10.
CS015
A Case Study On Effective SCADA Systems For
Industrial Organizations
C.A. HUMSARUBINI, P. JERIN,
Mr.P.Gopi
12
11.
CS016
A Fastpicture Retrieval Method Designed For
Network Bigdata
A. INDUZA, JANANI.M,
Mrs. D.Sterlin Rani
13
12.
CS017
Attribute-Based Storage Supporting Secure Replication Of Encrypted Data In Cloud
D. GAUTHAM, S. GILBERT AUGUSTIN RAJ, Mrs. M.Vidhya
14
13.
CS018
Efficient Travel Route Recommender System Based On Tourist Personal
Interest P. JERIN, G.JENIFER SWEETY, Ms.D.Deepavathi
15
14.
CS019 Effective Review Mining And Rating
ASHA RAJA SELVI.A, G DEVI, DIVYA.D,
Ms.V.Sangeetha
16
15.
CS020
Improving The Efficiency Of Recommendation System Using Big Data Analytics Framework
K. GRACELINE JEBILA, Y.V. JENEETH LARA Mr.S.Vinoth
17
16.
CS021
Detection Of Moisture Content Using Sensors For
Smart Irrigation
M. KARTHIK, S MARIA PRAVEEN,
Mrs.V.BlessySelvapriya
18
17.
CS022
Inter-Provider ISP-To-ISP In MPLSVPN Network
Using MP-EBGP Method
S. JEYANTHKUMAR, JOSEPH MATHEW,
Mr.S.Vinoth
19
18.
CS024
License Plate Recognition For The Off-Angled Images Using Neural
Networks A KAVIPRIYAN, S.KEERTHANA, Mrs.M.Sujatha
20
19. CS025 Agricultural Monitoring Using Wireless Sensor
Network (Wsn) Based On Iot
21
JOTHI PRIYA.K, M. KARTHIKA, Ms.C.Sumithra
20.
CS028 Energy Efficient Clone Detection In Wsn
PONNARASI,ILLAYAVANAN
M,Mrs. C.Annapoorani
22
21.
CS030
Achieving Deduplication across Different Domain of Big data in Cloud
Ensuring Efficiency & Privacy P. MUTHUMANIAN, MYTHILI, Mrs.V.Indhumathi
23
22.
CS031
An Effective Password Authentication System using Image with Smart Way
of Password Recovery in Support for Wise Banking Services
JUDSON ABRAHAM, MANI MANTHIRAM.S, Mrs.L.Jenitha Mary
24
23.
CS035
An Secure Cloud Based Web Application to Prevent Clone Attack Using
Discrete Wavelet Transform and Java Static Watermarking
M.NANDA GOPAL, P.NIRANCHANA, Dr.D.C.JullieJosephine(P)
25
24.
CS036
Biometric authentication for cloud service provider with multiple cloud storage system P MUGILAN, PHEBE ROSHAN,
Mr.ChristopherSamualRaj
26
25.
CS037
Building Robust Authentication Systems on Questions for Fallback
Authentication P. MUTHUMANIAN , NAVITHA VELVET,
Dr.D.C.JullieJosephine(P)
27
26.
CS039
Cloud Computing Adaptive Framework
M PADMAPRIYADARSINI, S. NITHILA,
ARAVAZHI CHEZHIAN,
Mrs.C.Annapoorani
28
27.
CS040
Cryptographic Implementation of Aggregate Key Encryption for Data Sharing
In Cloud Storage R.PONJANAKI, A.PREETHI DIVYA, Mrs.L.Jenitha
Mary
29
28.
CS042
CryptoImage: Efficient Cryptosystem for Data Hiding in High Dynamic
Range Images A PONVANNAN, J.PRADEEP, Mrs.V.Indhumathi
30
29.
CS043
Ddos Detection And Mitigation On Websites Using
Http Flood
K. POONGUZHALI, POWNRAJ.A,
Ms.D.Deepavathi
31
30.
CS045
Deadline based resource provisioning and scheduling algorithm for scientific workflows on clouds
S. PREETHI, Y.PRIYA, Ms.V.Sangeetha
32
31.
CS047 Employee Performance Workflow Mining In Clouds
S.R. SAI SHRAVEN, B. SAIRAM,
Mr.ChristopherSamualRaj
33
32.
CS048
End-to-End Schedulability Tests for Multiprocessor to Design Patterns:
Building Effective Algorithms M.PRATHEEP KUMAR, S.RAJ KUMAR,
Mr K.G. Saravanan
34
33.
CS049
FlickFortune: Extensive Data Analysis and Probabilistic prediction using Data
mining Approach S RANISHREE, SANDEEP.S,
Mrs. S. Divya
35
34.
CS050
Food Ordering Application using Sentimental
Analysis
K. PRIYA, Y.PRIYA,V.RAHANA,
Mrs.V.BlessySelvapriya
36
35.
CS052
Identifying Fake Applications and Ranking in Google Play Store and
Optimization of Genuine Applications V. RAHANA, S.PREETHI,
Mrs.R.Lavanya
37
36.
CS054
Preserveloc: Preserving the Location and Seamless Data Distribution in Mobile Environment
C.RINNA, SAGAYA CHITHIRAI RANJITH, Mr.A.Gnanasekaran
38
37.
CS055
Prognosticating the Stress Values While Driving using
IoT
S.RAJKUMAR,S.RANISHREE
Ms.S.Deepika
39
38.
CS057
Provides Security in Cloud using Multi-Cloud and
Slicing Algorithm
E. SANGEETHA,K.POONGUZHALI,
Mr.P.Muthazhagan
40
39.
CS059
Providing Restrictions Against Attack and Congestion Control in Public
Infrastructure Cloud POWNRAJ A,J.PRADEEP,
Mrs. M.Vidhya
41
40.
CS061
Real Time Junk Observation and Characteristic
Analysis in Twitter
M.PRADEEP KUMAR,A.PREETHI DIVYA,
Ms.V.Sangeetha
42
41.
CS063
Recommender System for Research Studies Using Graph Based Article Ranking
S.RAJKUMAR,S.RANISHREE,
Ms.S.Deepika
43
42.
CS065
The future technology of smart shopping cart using rfid
and zigbee
M.arumugakani,s.arunmozhi,mrs.v.sangeetha
44
43.
CS066
Evaluating Disease from Several Medical Data by using
HL7
M.CHITHRA DEVI,S.CHRISH
STEWART,Mrs.V.BlessySelvapriya
45
44.
CS068
Creating Secure Clouds By Continuous Auditing And
Providing Certificates
R.DAVID SAM PAUL,V.DEVI,Ms.C.Sumithra
46
45.
CS069
Pioneering Multiple Genomic and proteomic data
Using Mirna and Transcription factor for Gene Disease
Spotting
G.DHANA SUNDAR,S.EBENEZER,Mrs.M.Sujatha
47
46.
CS071
A SECURE CLOUD – BASED WEB APPLICATION
AGAINST POLLUTION ATTACK AND
CONVINCING FILE TECHNIQUES
48
47.
CS073
AN ANALYSIS OF SECURITY ISSUES AND
NATURE-INSPIRED ALGORITHMS ON
WIRELESS SENSOR NETWORKS INTEGRATED
WITH IOT E+++++++++++++++++NVIRONMENT
M. S. Vinmathi, Dr. M. S. Josephine, Dr. V.
49
Jeyabalaraja
48.
CS074
A Bluetooth-based Architecture for Android
Communication with an Articulated Robot
[1]Dr.M.Deva Brinda, [2]Karthik.S,[3]Iyappan.S
50
49.
CS075
DISASTER MANAGEMENT SYSTEM USING
INTELLIGENT UNDERWATER ROBOT
Sasikala D, Rajalakshmi V, Jayabhaduri R
51
50.
CS077
DEVELOPMENT OF AUTOMATED RUBBER
TAPPING MACHINE TO IMPROVE THE SOCIO-
ECONOMIC STATUS OF RUBBER GROWERS IN
RURAL AREAS
1Aran Glenn .J, 2Adeline Sneha.J, 3Neenu .C
52
51.
CS079
HOME AUTOMATION SYSTEMS USING SPEECH
RECOGNITION
V. Lokesh, R. K. Padmashini
53
52.
IT001
Secure Data Dissemination and Management in
Mobile Cloud Computing
R.AISHWARYA,S.AJAY,
Mr.N.Venkateshwara Rao
56
53.
IT003 Security Based System using Mobile Application
P.AKILA SOWMIYA,M.ALLEN MANASSEH,
Mrs.Indumathi K
57
54.
IT004
Semantic Localization & Mapping for Unsupervised
Indoor Localization
S.ANGAYARKANI,S.S.ANGELIN GOLDA
MARY,Ms.J.Jinu sophia
58
55.
IT005
Service cloud communication using encryption
standards
A.ANISHA,S.ARUL,
Mrs.S.Gracia Nissi
59
56.
IT007
Trusted Cloud Authority Controlled by Federated
Clouds
ASHA DARLY,G.ASHISH SAM
Mr.S.Vinoth
60
57.
IT008
VANET Security Using New Greedy Behavior
Approach
D.BAGHYA,L.BALAJI
Mrs.M.Parameswari
61
58.
IT009
Software Fault Prediction Models by Optimizing the
Rank Based Approach
Mr.P.Muthazhagan
V.ESTHER SOPHIA,N.EZHILARASI
62
59.
IT011
IOT SMART MIRROR WITH NEWS AND
TEMPERATURE
SOWBHAGIYA S,SREE DURGAREEMA
A,Mrs.E.Sujatha
63
60. IT013
ATM MACHINE WITH BIOMETRIC SECURITY
SRIDEVI M,SRIVIGNESH B,Mrs.T.C.Vidhya
64
61.
IT015
WELD POOL VISUAL TRACKING IN
AUTOMATIC ARC WELDING USING GRAPH CUT
SEGMENTATION
STEFFI M,SUBBAYA AYYANESH
SUDALAIMANI,Ms.T.Anitha Dorathy
65
62.
IT016
SMART GARBAGE SYSTEM USING IOT
SUBHASINI D,P.SURESH KRISHNAN,Ms.L.Leena
Jenifer
66
63.
IT017
ENERGY EFFICIENT MOBILE TOWER CONTROL
SYSTEM
– GREEN RADIO TECHNOLOGY
SURYA K,SUSITHRA NIRAIMATHI K,Mrs.Sheela
Lavanya
67
64.
IT018
THE NS2-BASED SIMULATION AND RESEARCH
ON WIRELESS SENSOR NETWORK ROUTE
PROTOCOL
THARIGA V,THASLIM S,Ms.S.Thangam
68
65. IT019
FINGERPRINT RECOGNITION TECHNIQUE
THEBORAL S,THULASI M S,Ms.Beulah Elizabeth E
69
66. IT020 VISIBILITY RESTORATION OF HAZY IMAGES 70
USING COLOUR ANALYSIS AND DEPTH
ESTIMATION WITH ENHANCED REFINED
TRANSMISSION
TWINKLIN GRACIA V,UDAYAMMAL@ USHA
L,Ms.Enuice Freeda
67. IT021
SMART GARBAGE SYSTEM USING IOT
VICKEY,K.YOGESH,Ms.P.Nancy
71
68.
IT022
POWER EXALTING VERSATILE BOT
PAUL CHANDARAN.S,K.RAMKI,Mrs. G.
Priyadharshini Lovelin
72
69.
IT024
MACHINE LEIUTANANT FOR VISUALLY
IMPAIRED PEOPLE
ANUPRIYA M,AVINASH K, Mrs.V.Sharmila
73
70.
IT025
PERFORMANCE ANALYSIS OF COMPRESSED
SENSING BASED IMAGE SENSOR FOR SMART
SURVEILLANCE APPLICATIONS
Karthickmanoj.R; Balamurugan
74
71.
IT028
ENERGY AWARE LINK LIFETIME ROUTING IN
WSN
Dr.T.Sasilatha
75
72.
IT030
FULLY AUTOMATED SMART RESTAURANT
Naveenkumar.N.S, Mohamed Nizar.T,
,sheefa.I,vinitha.T
76
73.
IT031
A COMPREHENSIVE REVIEW ON COLOR
CONSTANCY TECHNIQUES
Samreen Kaur¹, Dr. V.K. Banga², Er. Gurjit Singh
77
74.
IT035
NOISE REDUCTION IN GRAYSCALE IMAGES
USING SEGMENTATION TECHNIQUES
Amudha K1, Beni Steena T2
78
75.
EC001
Digital Audio Watermarking – Using LSB Method
ABU HANIFA L,ALAN BENJAMIN P,
Dr.A.V.Mayakannan
81
76. EC003 Invisible Image Watermarking using Modified LSB
ALAN JOSEPH MOSSES.D,ANGEL A,
82
Mr.S.Rajkumar
77.
EC004
Maximizing Throughput Of Cognitive Radio Networks Through SecondaryUser Power
Consumption In 5g Heterogeneous Networks ANGELINE A,ARAVINTHASAMY S,
Mrs.A.R.Venmathi
83
78.
EC005
Stateless Auto Configuration And Secured Data Transmission In Ipv6 Networks Through Ipsec
Tunneling ARUNA DEVI R,AVINASH K
Mrs.B.Anitha Vijayalakshmi
84
79.
EC007
Automatic Quality Assessment Of Potatoes Using
Labview
BARATH K,M.BARATH
Mrs.V.Kavitha
85
80.
EC008 Metal Segregation Using Labview
BLESSY P J,BLESSYTA JULIYA SARAH R,
Mr.A.N.Duraivel
86
81.
EC009 Smart Surveillance Robot Using Labview
BLESY REGULAS B,R.CHANDRASEKAR
Mrs.A.Sumathi
87
82.
EC011 Water Management System Using Labview
DANIEL MICHAEL,DENIYA N J
Mrs.A.Sarala
88
83.
EC013
Multifactor Authentication For Secure Electronic
Balloting Credentials
DINESH R,M.J.ELGIN SAM DURAI
Mrs.M.Vinu
89
84.
EC015
Neuro-Ocr Based Assistive System For Text
Recognition With Voiceoutput
ESTHER CHELIN S J,GOLD MERCY S,
Mrs.K.K.Uthira Ramya Bala
90
85.
EC016 Based On Tumor Classification By Using Pnn Method
GOMATHI C,HANNAH MERCY GEORGE
Mrs.A.Aruna
91
86.
EC017
REAL TIME MPC FOR NON LINEAR PROCESS
PARAMETERS
HARISH N,HEMALATHA
I,Mr.P.MuthuKumaraswamy
92
87. EC018 Detection Of Parkinson’s Disease In Early Stages
HEMALATHA R,INDRA PRIYADARSHINI
93
Mrs.V.G.S.Archana
88.
EC019 Secret Knock Detecting Door Lock
IYANGKANI R,JANCY RANI A
Ms.M.Gomathi
94
89.
EC020 Classification Of Skin Lesion Using Neural Network
JANIVISHVA V,JEYA RANI E
Mr.S.Muthupandian
95
90.
EC021 Optical Character Recognition And Speechsynthesis
JEBEZSON G,E.JEEVA
Mrs.B.Gowripredeba
96
91.
EC022 Design Of Photonic Based Millimeter Wave Switch
JOYCE KAMALI D,KAMATCHI A
Mrs.S.Sharon Sweeti
97
92.
EC024
Water Quality Monitoring System
KASANKATHAPERUMAL
K.MAHENDRAKUMA G
Mrs.R.Rosemin Thanga Joy
98
93.
EC025
Seed Purity Testing With The Help Of Digital Image
Processing
MEENA T,MERLIN SWEETHA VINOLA
Ms.C.V.Umamaheshwari
99
94.
EC028
Joint Turbo Decoding For Overloaded Mimo-Ofdm
System
MONISHA R,NADAR MUTHUSELVAN
Mr.S.Suthagar
100
95.
EC030
Multiband Circularly Polarized Antenna For Wireless
Application
NADAR SREEJITH PRABU,NALINI K
Mrs.M.Parameswari
101
96.
EC031 Fault Tolerence Technique Using Cmos Vlsi Circuits
NARAYANA KUMERESAN Y,NARESH M
Mr.R.Nagaraj
102
97.
EC035
Transparent And Flexible Antennas For Wearable
Glasses And Applications
NARMATHA B,PAVITHRA S
Mrs.E.Vergin Sheeba
103
98.
EC036
Iot(Internet Of Things) Based Online Energy
Monitoring System And Control
PRAKASH J,PRAVEENRAJ J
Mr.S. Rajkumar
104
99. EC037 Green Radio Approach Towards Energy Efficient Radio Access networksFormobile Communication
105
POONGUZHALI D,PRABAKARAN A
Mrs.L.Ajitha
100.
EC039
Compact Frequency Reconfigurable 4x4 Slot Antenna For Wireless Application
ARAVINDH K,ANUSHA T
Mr.P.Muthukumaraswamy
106
101.
EC040 Gsm Based Voice Data Through Bone Conduction
ARJUN S,PRIYA R
Mr.S.Rajkumar
107
102.
EC042
Detecting Driver Drowsiness Based On Single Eeg
Channel
SUNDAR R,SURYA S
Mr.A.N.Duraivel
108
103.
EC043 Novel Broadband Antenna Design For Rfid Tags
RAJA S,RAM K
Mrs.A.Sumathi
109
104.
EC045
Cost Efficient Iot Based Home Automation With
Security
ANITHA M,DANIYA T
Mrs.A.R.Venmathi
110
105.
EC047
Integration Of Automatic Street Light And Water Levelmonitoring For Smart City
RACHEL A,REVATHI M
Mrs.A.Aruna
111
106.
EC048
Motion Controlled Robot Using Multi Sensors
Powered By Ai Engine
RITHIKA J,RAVI KUMAR K
Ms.M.Gomathi
112
107.
EC049
Design Of A Quad Band-Notched Uwb
Reconfigurable Patch Antenna
DARANI M,KALAIMATHI P
Mrs.E.Vergin Sheeba
113
108.
EC050
Anti Theft Protection Of Vehicle By Gsm &Gps With Fingerprint verification Using Embedded System
AJITHA A,JUSTINA E
Mrs.A.Rublin Beulah
114
109.
EC052
Sensorless Control of interior Permanent Magnet
Synchronous Motor Drives With Cyclic Fluctuating
Load Based on MRAS Scheme
M.BARATH,R.THIRUMARAN,Mr.S.Muthupandian
115
110. EC054 Virtual Instruments Based Water Quality Measurement 116
System Using Fuzzy Logic
V.NARAYANA VADIVU,K.JEEVA
RANI,Mr.R.Nagaraj
111.
EC055
Artificial neural network based intelligent flow
transmitter
MATHANA THAMARAI
P,A.RISHWANA,Mr.S.Suthagar
117
112.
EC057
CROSS CHANNEL HEARING AID USING BONE
CONDUCTION
J.BALA KARTHICK,S.SIVA,Mr.S.Rajkumar
118
113.
EC059
DETECTION AND DELETING THE MISUSE OF
MORPHED IMAGES IN SOCIAL NETWORKS
USING FSIB ALGORITHM
S.ANAND,M.SIVA SANGEETHA,Mrs.A.R.Venmathi
119
114.
EC061
SMART HELMET USING GPS AND GSM FOR
ACCIDENT DETECTION
P.SUGANTHI,M.ANITHA,Mrs.V.Kavitha
120
115. EC063
HIGH SECURITY LOCKER
AMRITHA K,ARJITH C,Mr.A.N.Duraivel
121
116.
EC065
Environmental monitoring using wireless sensor
networks (wsn) based on iot.
Dilmaya t,maya s,mrs.a.sarala
122
117.
EC066
IOT THEFT DETECTION USING RASPBERRY PI
WITH FACE RECOGNISATION CAMERA
JEYA MANI R,JOTHI S,Mr.S.Muthupandian
123
118.
EC068
SECURE IDENTITY BASED DIGITAL
SIGNATURE SCHEME FOR WIRELESS SENSOR
NETWORKS
ELANGO T,ANBU R,Mrs.E.Vergin Sheeba
124
119. EC069 PRECODER DESIGN FOR MIMO RELAY
125
COMMUNICATION USING DF PROTOCOL
T.ARUN,CHIRSTY.S,Ms.C.V.Umamaheshwari
120.
EC071
CT AND PET MEDICAL IMAGE FUSION USING
WAVELET TRANSFORM RESTORED BY
ITERATIVE WIENER FILTER
THULASI T,RAMYA K,Mrs.S.Sharon Sweeti
126
121.
EC073
AN IOT APPLICATION FOR STOCK
MANAGEMENT AND GOODS ANALYSIS
JULIA K,SHERIN S,Mrs.R.Rosemin Thanga Joy
127
122.
EC074
IMPLEMENTATION OF IMAGE FEEDING AND
FACE RECOGNITION USING OPENCV IN
ROBOTICS
JESICA S,EDWART P,Mrs.L.Ajitha
128
123.
EC075
UNDERWATER IMAGE ENHANCEMENT USING
EMD
J GRACY,C.A. HUMSARUBINI,Mr.R.Devara
129
124.
EC077
REAL TIME OPERATING SYSTEM FOR THE
PREVENTION OF HUMAN HEALTH HAZARDS
DUE TO TOXIC GASES
A. INDUZA,JANANI.M,Mrs.R.Usha
130
125.
EC079
SENSOR BASED AUTOMATED IRRIGATION
SYSTEM
G.JENIFER SWEETY,P. JERIN,Mrs.T.Meena
131
126.
EC080
PERFORMANCE ANALYSIS OF SEPIC AND M-
SEPIC ON BLDC MOTOR
S. JEYANTHKUMAR,JOSEPH
MATHEW,Mr.R.Senthilnadhan
132
127.
EC083
SMART CURRENT THEFT DETECTION AND
POWER DISCONTINUITY MONITORING USING
LabVIEW
133
JOTHI PRIYA.K,JUDSON
ABRAHAM,Mrs.S.Lekhasri
128.
EC085
A MODERN USER DESIRED DRONE
CONTROLLING SYSTEM
USING MOTION DETECTION SENSOR
M. Karthik,m. Karthika,mr.s.rajkumar
134
129.
EC086
EMERGENCY CAR DOOR LOCKING SYSTEM
USINGRASPBERRY PI
A.UDHUMAN SHARIFF,V. VARSHA,Mrs.S.Sharon
Sweeti
135
130.
EC087
Design and Fabrication of Multifuel Engine
THIRUNAVUKARASU.K,L TANYA,Mr.S.Suthagar
136
131.
EC089
INVESTIGATION ON WEAR AND MECHANICAL
ANALYSIS OF WOVEN SISAL, JUTE, FLAX /
REINFORCED WITH CALCIUM CARBONATE AS
FILLER EPOXY COMPOSITE
Suganya.N,Mstephen Raphel.Jrs.A.Rublin Beulah
137
132.
EC090
EVOLUTION OF MECHANICAL PROPERTY OF
WOVEN HEMP / FLAX REINFORCED WITH
BARIUM SULPHATE AS AN FILLER EPOXY
COMPOSITE
S. P. SRIRAM,SOWMYA DHARINI,Mr.R.Nagaraj
138
133.
EC092
DESIGN AND FABRICATION OF MANUALLY
OPERATED PESTICIDES SPRAYER.
P.s. Smruthi,k.sivasankari,mrs.l.ajitha
139
134.
EC094 Bi Directional Centrifugal Braking System
A.Anisha Priya,S.Anudev,Mr.A.L.Duraivel
140
135. EC095 ACCURATE CERVICAL CELL SEPERATION
141
FROM OVERLAPPING CLUSTER IN PAP SMEAR
IMAGES
VEDHA PRIYA H,G.
VETRIVEL,Mr.Dr.A.V.Mayakannan
136.
EC096
RECENT DEVELOPMENTS IN COMPUTER
VISION-BASED GAIT BIOMETRICS SYSTEM
G Merlin Linda1, G Themozhi2
142
137.
EC098
A ROBOTIC MOTION CONTROL USING FINGER
GESTURE INTERACTION
Dr.M.Deva Brinda, Karthik.S, Mohankumar.S
143
138.
EC099
DESIGN AND IMPLEMENTATION OF SMART
BONE CONDUCTION HEARING AID USING ASP
Dr.M.Deva Brinda, Karthik.s
144
139.
EC110
ANALYSIS OF LEATHER TEXTURE AND
DETECTION OF SEVERITY OF DEFECTS USING
IMAGE PROCESSING AND DECISION TREE
BASED MACHINE LEARNING TECHNIQUES
Abdul Jaleel,Joy Mathew,Mohamed Feroz, Sabura
Banu
145
140. EC113
VERSATILE INSOLE MONITORING SYSTEM
Dr. Gnana Kousalya
146
141.
EC114
OFDM BASED COMB SOURCE FOR FUTURE
OPTICAL NETWORKS
M.SAMAYARAJ MURALI KISHANLAL,
DR.A.JAWAHAR
147
142.
ME001
SAFETY AND SECURITY DRIVING USING GSM
MODEM
BAVANI R,ESSAKI L,Mr.T.Kanagaraju
150
143.
ME003
EFFICIENT ALAMOUTI STBC ALGORITHM FOR
MIMO- MULTI CARRIER MODULATION
TECHNIQUES
CAMILA JOHN,SWETHA T,Mrs.K.Chinadurai 151
144. ME004
LANDMINE DETECTION ROBOT
RAMAYAVATHANA V,RANJITHA 152
D,Mr.E.Artaralarasan
145.
ME005
IOT BASED FARMHAND BOT
SIVA
SUBRAMANIAN,K.VINOTHKUMAR,Mr.R.Jeremiah 153
146.
ME007
SECURE ROUTING AGAINST ACTIVE ATTACKS
IN WIRELESS SENSOR NETWORKS
NAVITHA
VELVET,P.NIRANCHANA,Mr.K.chinadurai 154
147.
ME008
PULSE WIDTH MODULATION BASED
ELECTROMAGNETIC INTERFERENCE
MITIGATION OF BIDIRECTIONAL GRID
CONNECTED FOR ELECTRICAL VEHICLES
A Kavipriyan,S.Keerthana,Mr.V.Ganesh 155
148.
ME009
SOLAR FED QUASI SWITCHED BUCK BOOST
SIWAKOTI-H INVERTER
K VIGNESH,K. VINEETHA,Mr.T.Kangaraju 156
149.
ME011
ARTIFICIAL NEURAL NETWORK FOR CONTROL
AND GRID INTEGRATION OF RESIDENTIAL
SOLAR PHOTOVOLTAIC SYSTEMS
Asha Imannuvel J,Raveena K,Mr.T.Ranjith Kumar 157
150.
ME013
SOLAR PV POWERED BLDC MOTOR DRIVE FOR
WATER PUMPING USING CUK CONVERTER
Camila John,Swetha T,Mrs.E.Artralarasan 158
151.
ME015
AUTOMATIC LOAD FREQUENCY CONTROL OF
MULTI- AREA POWER SYSTEM USING SOFT
COMPUTING TECHNIQUES.
I.Elizabeth,M.Janet Lisa,Mr.R.Jeremiah
159
152. ME016
POWER QUALITY IMPROVEMENT IN MICRO
GRID USING UPFC 160
SAVITHA S,SANKKARI R,Mr.P.Manigandan
153.
ME017
A HYBRID RESONANT CONVERTER FOR
BETTER VOLTAGE REGULATION FOR
PHOTOVOLTAIC APPLICATIONS
SABEENA J,SHALINI R,Mr.V,Ganesh 161
154.
ME018
DESIGN AND ANALYSIS OF A HIGH VOLTAGE-
GAINSTEP- UP RESONANT DC-DC CONVERTER
FOR TRANSPORTATION APPLICATIONS
KAVITHA V S,KARAN J,Mr.J.Dinakaran
162
155.
ME019
MPPT IN DYNAMIC CONDITION OF PARTIALLY
SHADED PV SYSTEM BY USING WODE
TECHNIQUE
SELENA T,ANISH N,Mr.Santhoshkumar 163
156.
ME020
CONTROL OF GENERATION, STORAGE AND
ENERGY DEMAND MANAGEMENT IN
ISLANDED MICRO-GRIDS
P.UMA,K.ABINAYA,Mr.J.D.Srinivasan 164
157.
ME021
Power Line Fault Detection And Localization Using
High Frequency
M.Rinosha,S.Arulmani,Mr.S.HanishAnand 165
158.
ME022 AUTONOMOUS INTELLIGENT BOT-MOWER
Daniel Michael,Priya V,Mr.T.Ranjith Kumar 166
159.
ME024
ACCELEROMETER BASED WIRELESS HAND
GESTURE CONTROLLING ROBOT
Priyanga S,D.Rajkumar,Mr.Dr.Muniaraj 167
160.
ME025
SNIFFER FOR MOBILE PHONES
MANI MANTHIRAM.S,S MARIA
Praveen,Mr.J.Dhinakaran 168
161. ME028
WIRELESS THREE TANK SYSTEM
P mugilan,p. Muthumanian ,Mr.P.Manikandan 169
162.
ME030
INTERNET OF THINGS BASED REAL TIME
TRANSFORMER PERFORMANCE MONITORING
SYSTEM
Mythili,M.Nanda Gopal,Mr.E.Artalarasan 170
163.
ME031
DESIGN AND ANALYSIS OF 400/110 KV
ELECTRICAL SUBSTATION BASED ON LOAD
FLOW ANALYSIS USING ETAP
S. Nithila,M Padmapriyadarsini,Mr.R.Jeremiahlleg
171
164.
ME035
A UNIFIED CONTROL AND POWER
MANAGEMENT SCHEME FOR PV-BATTERY-
BASED HYBRID MICROGRIDS FOR BOTH GRID-
CONNECTED AND ISLANDED MODES
P. Vinitha ramalakshmi,t. Vinothini,Mr.Hanish
172
165.
ME036
DESIGN AND EXPERIMENT OF ADVANCED
MULTI MODE PROPELLED VEHICLE TO
ENHANCE MAXIMUM EFFICIENCY
M.Anuratha,K.Srivashan,Dr.Muniaraj (P)
173
166.
ME037
EXPERIMENTAL ANALYSIS AND
INVESTIGATION ON POLYMER COMPOSITE
LEAF SPRING
M.Kavitha Roselin,Y.Lavanya,Ms.R.Bavani Sekar
174
167.
ME039
TRIBOLOGICAL AND MORPHOLOGICAL
STUDIES OF ALUMINIUM BASED NANO
COMPOSITES
W.Kanmani,P.Karthikeyan,Mr.P.Ravisasthiri
175
168.
ME040 DESIGN AND FABRICATION OF MILLING
ATTACHMENT IN LATHE
176
R.Susan,K.Suhasini,Mr.J.Kokila
169.
ME042
DESIGN AND FABRICATION OF AUTOMATED
GUIDED VEHICLE SYSTEM
L.Susithra,N.Janes,Mr.A.Austin Segal
177`
170.
ME043
MECHANICAL PROPERTIES OF CONCRETE
WITH REPLACED C&D FINE AGGREGATE
USING SILICA FUME AS AN ADMIXTURE
M.Malaiappan Sindhu, B.Magesh
178
171.
ME045
DESIGN AND ANALYSIS OF TECH PARK (G+10)
BUILDING
Atulkumar Singh, Ankit Pandey, P.M.Rameshwaran
179
172.
ME047
USAGE OF MANUFACTURED SAND (M SAND)
AS FINE AGGREGATE FOR CONCRETE IN LIEU
OF RIVER SAND.
A.Shanmugam, P.M.Rameshwaran
180
173.
ME048
SIMPLE MODEL OF GRAPHITE AND ITS
APPLICATIONS IN SUPERLATTICE
K.Anand, P.M.Rameshwaran
181
174.
ME049
INTEGRATING BEM, BIM, VR FOR VISUALIZING
LIGHT IN A BUILDING AND ENERGY EFFICIENT
MODELLING
L.Divya
182
175.
ME050
REVIEW ON PARTIAL REPLACEMENT OF FINE
AGGREGATE BY COPPER SLAG, E-WASTE AND
M-SAND
183
S.Yamini Roja, A.Anusuya, SP.Keerthana,
S.Lakshmanan & C.Prakash
176.
ME052
ONSITE VISUALISATION INTEGRATED WITH
BUILDING INFORMATION MODELLING IN
MIXED REALITY
S.Reji
184
177.
ME054
Dynamic analysis of a composite tall structure using
Etabs software
S.Ahmed Hussain and G.Nithyambigai
185
178.
ME055
Study on Design And Analysis Of Raft Foundation By
RCC And Pt Methods And The Optimizations
Achieved
A.Aswini
186
179.
ME057
ANALYSIS AND DESIGN OF MASS LIQUID
STORAGE TANK SUPPORTING STRUCTURE
G.Arumugam
187
180.
ME059
EFFECT OF EARLY CARBONATION ON
DURABILITY PERFORMANCE OF CONCRETE.
D Ravichandran
188
181.
ME061
ANALYSIS AND DESIGN OF QUENCHING
TOWER
N. Gopinath
189
182.
ME063
MICRO STRUCTURAL STUDY AND STRENGTH
CHARACTERISTIC OF ACCELERATED
CARBONATION CURING OF CEMENT MORTAR
M Kamalakannan
190
183.
ME065
Analysis and Design of INTZE Type over Head
Circular Water Tank
S.Magesh
191
184.
ME066
DYNAMIC ANALYSIS AND DESIGN OF RCC
CUMS STEEL STRUCTURE IN INDUSTRIAL
BUILDING USING SRSS METHOD
S. Moses Vimal Raj
192
185.
ME068 Pushover analysis and design of RCC structures
R.Saravanan
193
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 1
DEPARTMENT
OF
COMPUTER SCIENCE AND ENGINEERING
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 2
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 3
Grapheme Based Text-Independent Writer Identification
Allen Jerem Vincent, S. Anantha Ponraj, Mrs. S. Divya
KINGS ENGINEERING COLLEGE
Abstract—Writer identification as a biometric tool, which has become a successful
state of art in research. It is challengeable due to different writing styles and variances
of written content. The literature survey phase of this study has covered various
databases and dataset types used for writer identification approaches along with many
feature extraction and classification methodologies. Finally, it guides through a
proposed experimental approach for offline grapheme-based text independent
writeridentification.
Keywords— writer identification; probability distribution; feature extraction;
classification; graphemes; offline document.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 4
Knowledge Based Access Control in E-learning Through Learner Activity
Analysis
Asha Albert, Angel Karunya.M,Mrs.R.Lavanya
KINGS ENGINEERING COLLEGE
Abstract: Reshaping education with knowledge and skills is the major objective of
many of the developing organization to build competitive knowledge economy.
Electronic learning, also popularly known as e- learning is one of the most effective
applications of Information and Communication Technology (ICT), which refurbishes
the dimension in higher education. Existing E-learning system provides static content
to all learners irrespective of their learning needs. In this paper we propose to create
Dynamic Role based access control model based on information from learners needs,
audit logs and observations to support adaptive E-learning systems.
Keywords: E-Learning, Dynamic Role Based Access Control.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 5
Selfie Prevention and Accident Avoidance Android System
A. Ananth, K. Balaji,Mr.D.R.Denslinbrabin(A)
KINGS ENGINEERING COLLEGE
Abstract: In the recent years selfie culture has developed as a universal instrument for
self-portrayal. People to describe themselves differently and gorgeous to others,
individuals may risk their life as dangerous. However, over the past years clicking and
posting selfie in social media like Facebook and Twitter etc. has become more popular
tendency. Here we analysed that major accidents are occurring because of taking selfie
in dangerous places such as hill areas, during bike riding and railway stations. Here we
proposed the android applications that stop the initiation of front camera in dangerous
places. Still there is no application developed to stop the camera in dangerous places.
People approached some road bumps and were not able to handle them with just one
hand so riders crashed to ground. For trace out people location we proposed GPS
sensor.So,usageofmobilephonesduringriddingwillcausedangerous.DuringwalkingifVehi
cleHorniscaptured immediately Camera is initiated and background Vehicle photo is
captured & shown to the user to get alerted along with Headphone Alert. Here we using
microphone to capture the horn sound and converted into electrical signal. By
developing this application major accidents are avoided and provide the security to the
peoples.
Keywords: GPS, Android, Facebook and Twitter.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 6
Secret Questions: Phone Theft Detection and Prevention of Important Apps
Access
Asha.M, J. Beulah, Mr.C.B.Chiranjeevi
KINGS ENGINEERING COLLEGE
Abstract – The various methods are provided to secure or lock the mobile using user
authentication. User can add multiple apps into application for the secured access.
During registration period, application will frame a set of standard questions along with
the user runtime verifications. In general the phone is stolen, there is two options,
either to change the SIM card or to retain the same SIM card and try to access the apps.
If SIM Card is changed then automatically GPS, Voice recorder & Camera are
initiated, so that Location and Audio uplink are sent as SMS to the alternative number
of the user, and Photo is mailed. If he tries to access the secret apps then system will
query the user with 4 random questions (2 – from normal questions and 2 from user
runtime pattern. If not authorized then camera, GPS & Voice recorder is initiated and
sent to the original user fortracking.
Keywords: Authentication, SIM, GPS, GPRS, Location Tracking, Audio uplink, SMS,
Runtime pattern, Track.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 7
Brain Controlled Car for Disabled using Artificial Intelligence
K.Anandhi, C. Bavithra Karthi, Mr K.G. Saravanan
KINGS ENGINEERING COLLEGE
Abstract - This paper considers the advancement of a cerebrum driven cars, be of
incredible help to the physically handicapped individuals. Since these cars will depend
just on what the individual is supposing they will consequently not require any physical
development with respect to the person. The cars incorporates progress of innovation
which will make the crippled, abled. In the 50s, various specialists investigated the
association between neurology, data hypothesis, and computer science. Some of them
electronic systems to show simple knowledge, for example, W. Grey Walter's turtles
and the Johns Hopkins Beast. Most specialists trust that their work will in the end be
fused into a machine with general knowledge (known as solid AI), joining every one of
the aptitudes above and surpassing human capacities at most or every one of them. A
couple of them trust that human highlights like simulated cognizance or a counterfeit
cerebrum might be required for such a task. By this we should witness a progressive
change in the general public where the boundary between the abler and the impaired
vanishes. Along these lines the reconciliation of bioelectronics with car frameworks is
basic to create productive and cutting edge vehicles, which should be seen soon helping
the handicapped in each way in the field of transportation.
Keywords: knowledge, Bioelectronics, cerebrum.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 8
Integrated Verification of Relay Generated Node Key &User Based Mutual with
ErasureConcepts
R.D. Bhagyashree, S. Deepika, N.L.Aswani, Mr.A.Gnanasekaran
KINGS ENGINEERING COLLEGE
Abstract- The present protocols for creating pairwise secrets between nodes in a
wireless network, so that these secrets are secure from an eavesdropper, Eve, with
unbounded computational and memory capabilities, but with limited network presence.
The first present a basic secret-agreement protocol for single-hop networks, where
secrets are constructed using traffic exchanged between the nodes, and we show that
under standard theoretical assumptions, our protocol is information-theoretically
secure. Second, propose a secret- agreement protocol for arbitrary, multi-hop networks
that build on the basic protocol but also comprises design features for leveraging
additional sources, that multi-hop offers, for secrecy. Finally, evaluate our protocols,
and provide experimental evidence that it is feasible to create thousands of secret bits
per second, in realistic wireless setups, the security of which is independent of Eve‘s
computationalcapabilities.
Keywords- Secret key generation, packet erasures, multi-hop key agreement, wireless
networks.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 9
Identify Effective Self-Routing System in Wireless Environment
Asik.P, D. Delin Winciya, Mrs. D.Sterlin Rani
KINGS ENGINEERING COLLEGE
Abstract: The data can be transfer from source to destination to analyze best route in
any network. Source sends dummy packets to analyze the best available route that
connect the destination. It analyses Capacity, Cost, throughput, Battery level to transfer
the packets to the destination. We are implementing this project in Wireless Sensor
network, so the routes would dynamically in mobility pattern. So the system has to
analyze every node‘s Capacity, Cost, Throughput, and Battery level to transfer the
packets source to destination. Server will dynamically route the path so that the packets
are transferred to the destination dynamically. It is based on the nodes dynamic
behaviour Self Routing system is implemented. The data will be send from source to
destination by secured way in real timeprocess.
Keywords- Wireless Sensor network, mobility pattern.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 10
Global Path Planning using GA-PSO Algorithms
B. Bennett Richard, George Stephen.A, Mr K.G. Saravanan
KINGS ENGINEERING COLLEGE
Abstract: Robotic Process automation is the interesting and evolving research area.
The major challenge is finding an optimal path in the presence of real time obstacles.
This paper presents a GA (genetic algorithm)- PSO (particle swarm optimization)
algorithm for autonomous robot navigation to find an optimal path between a starting
and ending point in a grid environment. The routing nodes are represented as grid. GA
has been combined with PSO in evolving new solutions by applying crossover and
mutation operators on solutions constructed by particles. This hybrid algorithm avoids
the premature convergence and time complexity in conventional GA and PSO
algorithms. The initial feasible path generated from the hybrid GA- PSO planner is
then smoothed using the cubic B-spline technique, in order to construct a near-optimal
collision-free continuous path. Simulation results are conducted to show the merit of
the proposed hybrid GA-PSO path planner and smoother for global path planning of
autonomous robotnavigation.
Keywords-PSO,GA,B-spline.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 11
Effective E- Learning Framework
J GRACY, I.JEBAMALAR, Mrs.J.Jaineesharmila
KINGS ENGINEERING COLLEGE
Abstract- E-learning is breaking the barriers of traditional teaching methods by
providing educational content within fingers reach. With its numerous benefits like
flexibility and reduced costs, it is becoming popular as days pass by. But just like any
other classroom, it consists of limited slots and the success of e- learning depends upon
an individual‘s motivation to study effectively. In here many learners enroll in a course
but might not execute it successfully thereby leading to unnecessary registrations. By
understanding a learner’s pattern and using proper classification, we can suggest
suitable courses to a learner thereby suppressing drop rate and incrementing success
rate, all this with just a click. We apply a K- Means algorithm to analyze the different
types oflearners.
Keywords- E-learning, K-Means clustering, analyzing learner behavior, enhanced
learning.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 12
A Case Study on Effective SCADA Systems For Industrial Organizations
C.A. Humsarubini, P. Jerin, Mr.P.Gopi
KINGS ENGINEERING COLLEGE
Abstract – Abbreviation of Supervisory Control And Data Acquisition is SCADA.
From its name only we can say that it is not a complete control system but its focus on
the level of supervisory. The package of SCADA is a software package and is placed
on top of a hardware module and software package gets interfaced with hardware
module. If we explain this in general then it gets to interface with through PLCs i.e.
Programmable Logic Controllers or else it gets interface through any other modules of
hardware. Systems of SCADA are not only availed in the processes of industries like
chemistry, steel making, conventional power generation and distribution, nuclear
power generation and distribution but also used in experiments of nuclear fusion. A
size of these plants varies from few thousand input and output channels to several ten
thousand input and output channels. At present, an evolution of SCADA systems is at a
very high rate and it is also entering the market of plants with a huge number of input
and output channels. SCADA made high progress in expressions like openness,
performance, scalability, functionality. Systems of SCADA are availed to run on
UNIX, VMS, and DOS.
Keywords: Supervisory Control, Data Acquisition, Packages, Programmable Logic
Controllers, Industrial organization.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 13
A FastPicture Retrieval Method Designed for Network BigData
A. Induza, Janani.M, Mrs. D.Sterlin Rani
KINGS ENGINEERING COLLEGE
Abstract—In the field of bigdata applications, Picture in- formation is widely used.
The value density of information utilization in big data is very low, and how to extract
useful information quickly is very important. So we should transform the unstructured
Picture data source into a form that can be analyzed. In this paper, we proposed a fast
Picture retrieval method which designed for big data. First of all, the feature extraction
method is necessary and the feature vectors can be obtained for every Picture. Then, it
is the most important step for us to encode the Picture feature vectors and make them
into database, which can optimize the feature structure. Finally, the corresponding
similarity matching is used to determine the retrieval results. There are three main
contributions for Picture retrieval in this paper. New feature extraction method,
reasonable elements ranking and appropriate distance metric can improve the algorithm
performance. Experiments show that our method has a great improvement in the
effective performance of feature extraction and can also get better search
matchingresults.
Index Terms—Bigdata, Picture retrieval, feature ranking, distance learning.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 14
Attribute-Based Storage Supporting Secure Replication of Encrypted Data in
Cloud
D. Gautham, S. Gilbert Augustin Raj, Mrs. M.Vidhya
KINGS ENGINEERING COLLEGE
Abstract—Attribute-based encryption (ABE) has been broadly utilized as a part of
distributed computing where an information supplier outsources his/her encoded
information to a cloud specialist co-op, and can impart the information to clients
having particular qualifications (or properties). Nonetheless, the standard ABE
framework does not bolster secure Replication, which is pivotal for killing Duplicate
duplicates of indistinguishable information with a specific end goal to spare storage
room and system data transfer capacity. In this paper, we show a quality based
stockpiling framework with secure Replication in a mixture cloud setting, where a
private cloud is in charge of copy recognition and an open cloud deals with the
capacity. Contrasted and the earlier information Replication frameworks, our
framework has two focal points. Right off the bat, it can be utilized to secretly impart
information to clients by indicating access strategies as opposed to sharing
unscrambling keys. Also, it accomplishes the standard idea of semantic security for
information privacy while existing frameworks just accomplish it by characterizing a
weaker security thought. What's more, we set forth an approach to change a ciphertext
more than one access strategy into ciphertexts of the same plaintext however under
different access arrangements without uncovering the fundamentalplaintext.
Keywords: ciphertext, ABE, Cloud.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 15
Efficient Travel Route Recommender System Based on Tourist Personal Interest
P. Jerin, G.Jenifer Sweety, Ms.D.Deepavathi
KINGS ENGINEERING COLLEGE
Abstract—Popular Social Networking websites offer LOCATION-BASED Social
Network (LBSN) services which allows users to perform check-in and share their
check-in data with their friends. When a user is traveling, the check-in data are in fact a
travel route with some photos and tag information. As a result, a massive number of
routes are generated, which play an essential role in many well-established research
areas, such as mobility prediction, urban planning and traffic management. In this
paper, we focus on trip planning and intend to discover travel experiences one would
have. As such, we extend the input of trip planning by exploring possible keywords
issued by users. However, the query results of existing travel route recommendation
services usually rank the routes simply by the popularity or the number of uploads of
routes. For such ranking, the existing work, derive a scoring function, where each route
will have one score according to its features (e.g., the number of Places of Interest, the
popularity of places). Usually, the query results will have similar routes. We aim to
retrieve a greater diversity of routes based on the travel factors considered. As high
scoring routes are often too similar to each other, this work considers the diversity of
results by exploiting Skyline query. In this paper, we develop a Keyword-aware
Representative Travel Route (KRTR) framework to retrieve several recommended
routes where keyword means the personalized requirements that users have for the trip.
The route dataset could be built from the collection of low-sampling check-inrecords.
Keywords: LBSN, KRTR.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 16
Effective Review Mining and Rating
Asha Raja Selvi.A, G Devi, Divya.D, Ms.V.Sangeetha
KINGS ENGINEERING COLLEGE
Abstract- This paper proposes the problem of competitiveness paradigm which is
based on the following observation: the competitiveness between two items is based on
whether they compete for the attention and business of the same groups of customers
(i.e. the same market segments). For example, two restaurants that exist in different
countries are obviously not competitive, since there is no overlap between their target
groups. In order to overcome this, we describe a method for computing all the
segments in a given market based on mining large review datasets. This method allows
us to operationalize our definition of competitiveness and address the problem of
finding the top-k competitors of an item in any given market. As we show in our work,
this problem presents significant computational challenges, especially in the presence
of large datasets with hundreds or thousands of items, such as those that are often
found in mainstream domains. We address these challenges via a highly scalable
framework for top-k computation, including an efficient evaluation algorithm and an
appropriateindex.
Keywords – competitiveness, comparing top – k competitors, machine learning,
evaluation process, review ratings.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 17
Improving the Efficiency of Recommendation System Using Big Data Analytics
Framework
K. Graceline Jebila, Y.V. Jeneeth Laramr.S.Vinoth
KINGS ENGINEERING COLLEGE
Abstract: In the computerization era, the predominant part of Recommender Systems
(RS) focus on single domain, i.e. for films, books and shopping and so on. E-commerce
is the most excellent solution for them to save their time and making their job comfort
and ease. Many recommendation systems rely on data mining; that is, attempting to
discover useful patterns in large data sets. Since there are large number of users and
items, recommendation system undergoes scalability problem. To handle this Big Data
Analytics is used. Big data refers to datasets that are not only big with high volume, but
also high in variety and velocity, known as (3V) of big data, which makes them
difficult to handle using conventional tools and approaches. Hadoop is used to handle
this issue. The main objective is to provide better efficiency of the recommendation
system in a website that is used for shopping any kind of needs by the user. In this
paper, we examine the importance of providing recommendation in the domains where
no satisfactory data exist for measuring similarity between products or users. For the
efficiency of searching large databases in Big Data, the proposed system uses the
characterization and polarity checking. Once both are analyzed, they are then brought
together to give out the outstanding product from the list of suggestedproducts.
Keywords: Recommendation System, Hadoop, Polarity checking.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 18
DETECTION OF MOISTURE CONTENT USING SENSORS FOR SMART
IRRIGATION
M. Karthik, S Maria Praveen, Mrs.V.Blessyselvapriya
KINGS ENGINEERING COLLEGE
Abstract: Smart irrigation is a system which can automate the irrigation process
leading to higher production with lesser human intervention by analyzing the moisture
content of the soil and automating the irrigation process. Automation of irrigation
process can revolutionize agricultural domain from being in- efficient and labor
intensive process to intelligent, smart and dynamic process leading to higher
production with lesser human intervention. First major problem faced by plantation
industry is to maintain the soil with required natural nutrients. Second, excessive water
logging could damage plantation, similarly in sufficient water could lead to less
produce. To address this one has to undergo lot of complications like repeatedly
monitor the water level and climate changes on regular basis. In this paper, a method is
proposed to gather the live soil moisture content and compare it with user
preconfigured settings and take appropriate action. This makes optimal usage of scarce
water resource that leads to higheroutput.
Key Words: Smart irrigation, Sensors
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 19
Inter-Provider ISP-to-ISP in MPLSVPN Network Using MP- EBGP Method
S. Jeyanthkumar, Joseph Mathew, Mr.S.Vinoth
KINGS ENGINEERING COLLEGE
Abstract:Being widely adopted by worldwide service providers, the MPLS technology
to connect geographically separated customer sites becomes important in reliability. It
is used to implement VPNs to connect the customer networks i.e., Inter-provider VPN
network. In this project we first briefly describe VPN switch are behind the scope of
secure private MPLS connections such as several VPN deployments emerged from the
sudden growth of requirements. We then discuss about the requirements of inter
connections from customer end to service provider in one's perspective. We then
propose and discuss the methods used for deployment options from service providers‘
point of view. In this project, we present an one method of communication among
branches or partner branches of an organization each of the distinct geographical area
with absence of the same ISP in every area. We came up with an idea of designing an
Inter-provider network i.e., connecting multiple ISP switch the private network
mechanism which provides global reach ability. Ideal switch the security issues
confidently and provides there placement of Internet in private / publicorganizations.
Index Terms — MPLS Technology, VPN, Inter-provider network, VPN deployments,
distinct geographical areas, absence of the same ISP, replacement of Internet, private /
public organizations.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 20
LICENSE PLATE RECOGNITION FOR THE OFF-ANGLED IMAGES USING
NEURAL NETWORKS
A Kavipriyan, S.Keerthana, Mrs.M.Sujatha
KINGS ENGINEERING COLLEGE
Abstract – License plate is one unique identification of each vehicle. Detection of
license plate plays an important role in identification of each vehicle in various
circumstances. The existing system of License plate detection used various methods
namely, Principal Component Analysis, Optical Character Recognition, Edge
Detection Algorithm. In addition to the above techniques, the proposed system in this
paper describes about recognition of different font styles of characters in the license
plate using Neural Networks. The observed plate images are usually in low resolution
and suffer severe loss of edge information, which cast great challenge to existing blind
deblurring methods. The images are checked for skew correction.
Keywords – Video Acquisition, Frame Conversion, Pre-processing, Segmentation,
Neural Networks, License Plate Recognition (LPR).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 21
AGRICULTURAL MONITORING USING WIRELESS SENSOR NETWORK
(WSN) BASED ON IOT
A Kavipriyan, S.Keerthana, Mrs.M.Sujatha
KINGS ENGINEERING COLLEGE
Abstract: In recent years, we have seen a new era of short range wireless sensors and
remote control technologies like whether sensor, software installing, car parking
sensor, etc in front of us. The project aim to monitoring the water level and to maintain
the water range. Water sensor is the real time humidity monitor. In our project it used
to capture and monitor the water level in a particular agricultural land. GSM module is
used to send the alert message to the user when the water level high or low. We use the
door setup when the water level is high by using remote control to reduce the water
level. By using the same remote control process for pouring the water when the water
level is low. The pouring motor is controlled by the remotecontrol.
Keywords: (sensor, pouring, remote control, humidity)
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 22
ENERGY EFFICIENT CLONE DETECTION IN WSN
Ponnarasi, Illayavanan M, Mrs.C.Annapoorani
KINGS ENGINEERING COLLEGE
Abstract:—In this paper, we propose an energy-efficient location-aware clone
detection protocol in densely deployed WSNs, which can guarantee successful clone
attack detection and maintain satisfactory network lifetime. Specifically, we exploit the
location information of sensors and randomly select witnesses located in a ring area to
verify the legitimacy of sensors and to report detected clone attacks. The ring structure
facilitates energy-efficient data forwarding along the path towards the witnesses and
the sink. We theoretically prove that the proposed protocol can achieve 100% clone
detection probability with trustful witnesses. We further extend the work by studying
the clone detection performance with untrustful witnesses and show that the clone
detection probability still approaches 98% when 10% of witnesses are compromised.
Moreover, in most existing clone detection protocols with random witness selection
scheme, the required buffer storage of sensors is usually dependent on the node
density, i.e., O( √ n), while in our proposed protocol, the required buffer storage of
sensors is independent of n but a function of the hop length of the network radius h,
i.e., O(h). Extensive simulations demonstrate that our proposed protocol can achieve
long network lifetime by effectively distributing the traffic load across the network.
Keywords: wireless sensor networks, clone detection protocol, energy efficiency,
network lifetime
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 23
Achieving Deduplication across Different Domain of Big data in Cloud Ensuring
Efficiency & Privacy
P. Muthumanian, Mythili, Mrs.V.Indhumathi
KINGS ENGINEERING COLLEGE
Abstract: Secure deduplication to reduce storage overheads in cloud storage is the
major concept achieved in our system. CSP provides storage for users to store their
data. Same data can be shared within the users and can store the same data in same
cloud in different names which can cause unnecessarily utilization of cloud storage for
same file existing in different names. Further the data is encrypted and stored in the
cloud along with the key and retrieved via decryption. In the existing system they are
only capable of managing either brute force attacks or ensure efficiency and
availability of data and not both. Also duplication is checked only within same domains
i.e., intra-duplication is checked by local manager. That too contents of the file are not
checked. Duplicates are checked only by checking for same file names. But in
proposed system we go in for deduplication by checking for duplicate copies of data
across different domains i.e., inter- duplication and also we resist both brute force
attacks and ensures efficiency &availability done by EPCDD concept.
Keywords: secure data deduplication, big data and data availability.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 24
An Effective Password Authentication System using Image with Smart Way of
Password Recovery in Support for Wise Banking Services
JUDSON ABRAHAM, MANI MANTHIRAM.S, Mrs.L.Jenithamary
KINGS ENGINEERING COLLEGE
Abstract: Nowadays, the usage of Banking applications on mobiles phones are well-
known but the application and the data are secured in a proper manner. For that we
provide the application with password in order to secure the information. But these
password are easily hacked by the attackers either by shoulder surfers in public area or
other ways of hacking. To overcome, these kind of attacks, we used pictorial password
mechanism, for authenticating into banking services. To match with the original
password, we used a short-term indicator for login purpose. And we provided virtual
money concepts in banking services for money transfer. This idea protects the user
from attackers and gives a easy way for login and money transfer options. This
proposed system provides the user friendly and the interactive environment for the
user.
Keywords: Hacking, Short-Termindicator, Authenticating.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 25
An Secure Cloud Based Web Application to Prevent Clone Attack Using Discrete
Wavelet Transform and Java StaticWatermarking
M.Nanda Gopal, P.Niranchana, Dr.D.C.Julliejosephine(P)
KINGS ENGINEERING COLLEGE
Abstract- Social media provide a common platform for millions of users across the
Internet. The common problem addressed here is the misuse of data files by unknown
users. In this project we have used data hiding techniques to prevent clone attack. In
this proposed system, the unauthorized client has the privilege to access pictures shared
in the media. We have used Java static watermarking algorithms to prevent cloning of
picture files shared in the social network. Whenever a user uploads profile picture or
photos it would be watermarked and updated. This is done using java static
watermarking system. Any unauthorized users updating the same picture can be
detected and their respective IP would be blocked. Also we have used discrete wavelet
and cosine transforms for implementing stenographic techniques to share secure
images in the socialmedia.
Index Terms – Java Static watermarking, Discrete Wavelet algorithm, Discrete
Cosinealgorithm
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 26
Biometric Authentication for Cloud Service Provider with Multiple Cloud Storage
System
P Mugilan, Phebe Roshan, Mr.Christophersamualraj
KINGS ENGINEERING COLLEGE
Abstract- Cloud storage services provides users to store large amount of files.
Distributed clients can also access the file storage. To provide integrity, controllable
outsourcing and auditing on outsourced file, we used a scheme called identity-based
data outsourcing (IBDO)which provide more advantageous when compared to existing
systems. In IBDO scheme, the users allows the designated entities to upload data on
behalf of the user. The entities are authorized and identified using their identities. The
IBDO also promotes comprehensive auditing which allows the user to check the
information based on type and consistence of outsourced files and also the MAC
address and IP address are checked. To provide more security we added biometric
authentication called fingerprint analysis and to overcome security threats, we proposes
multiple cloud storage system using split and merge technique, e.g., a file is divided
into multiple fragments and stored in multipleclouds.
Index Terms- Cloud storage, Data integrity, Data outsourcing, Identity-based
cryptography, Security.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 27
Building Robust Authentication Systems on Questions for Fallback
Authentication
P. Muthumanian , Navitha Velvet, Dr.D.C.Julliejosephine(P)
KINGS ENGINEERING COLLEGE
Abstract-ASecret-QuestionbasedAuthenticationsystem,called―Secret-
QA‖thatcreatesasetofsecret questions. We develop a prototype on windows. We
observe the questions‘ reliability by asking participants to answer their own questions.
The Secret-QA system consists of two major components, namely the user-event
extraction scheme and the challenge response protocol, the authentication is successful
if the user‘s response conforms to the correct answers; otherwise, a potential attack is
detected. We create a set of questions based on the data related to sensors and apps,
which reflect the users‘ short-term activities. We measure the reliability of these
questions by asking participants to answer these question, as well as launching the
acquaintance/stranger guessing attacks with and without help of online tools, and we
are considering establishing a probabilistic model based on a large scale of user data to
characterize the security of the secret questions. The recent prevalence of windows has
provided a rich source of the user‘s personal data related to the knowledge of his short-
term history, Is it feasible to use the knowledge of one‘s short-term personal history for
creating his secret question. Moreover, a user may forget her/his answers long after
creating the secret questions. We evaluate the usability of the system, and find that the
Secret-QA system is easier to use than those existing authentication system with secret
questions based on users‘ long-term historic data. In proposedsystem,wepresentaSecret-
QuestionbasedAuthenticationsystem,called―Secret-QA‖thatcreates a set of secret
questions. Enhancing Fallback Authentication by building a personal secret question
method. Personalized secret questions are used in secondary authentication instead of
predefined questions.
Index Terms—Secret questions, Authentication, Security Implementation.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 28
Cloud Computing Adaptive Framework
M Padmapriyadarsini, S. Nithila, Aravazhi Chezhian, Mrs.C.Annapoorani
KINGS ENGINEERING COLLEGE
Abstract:-We majorly offering real-time data security in cloud computing. Providing
security to petabytes of data is very important. A recent survey on cloud security States
that the security of users‘ data has the highest priority as well as concern. Therefore, to
provide secure cloud framework I have proposed a system named secure cloud
computing framework. SCCF multi-layered security can protect data in real-time and it
has three layers of security: Identity management, Intrusion detection and prevention,
Convergent encryption, Cloud Storage. To enhance security we proposed to add
automatic intrusion detection and prevention technique for Brute force and SQL
injection attacks. Finally the data owner files are encrypted using RC5 encryption
algorithm and stored in public cloud storage named cloudMe. PSO(Particle Swarm
Optimization) Algorithm is also used in our project for reducing the cost and also
transferring and executing the file with minimumcost.
Keywords:-Datastorage, encryption, decryption, Cloud Computing, Adaptive
Framework.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 29
Cryptographic Implementation of Aggregate Key Encryption for Data Sharing In
Cloud Storage
R.Ponjanaki, A.Preethi Divya, Mrs.L.Jenitha Mary
KINGS ENGINEERING COLLEGE
Abstract:-Here we propose Bastion, a novel and efficient procedure that assures data
confidentiality, even if the encryption key is leaked and the adversary has to access the
cipher text blocks. Though, if data is encrypted with existing schemes, an adversary is
provided with the encryption key, can compromise a single server and decrypt the
cipher text blocks stored there. In this paper, we study data confidentiality against an
adversary who knows the encryption key and has access to a large fraction of the
cipher text blocks. Once the encryption key is exposed, the only way to preserve data
confidentiality is to limit the number of attacker‘s accessing the cipher text. For
example, by distributing cipher text blocks across servers in multiple administrative
domains—thus assuming that the adversary cannot compromise all of them. Recent
updates brings out a powerful attacker which breaks data confidentiality by obtaining
cryptographic keys, by means of unauthorized users in cryptographic software. Our
judgement suggests that Bastion is well-suited for integration in existing systems since
it incurs less than 5% overhead compared to existing semantically secure encryption
modes. We examine the security of Bastion, and we evaluate its performance by means
of a prototype implementation. We also discuss practical insights with respect to the
integration of Bastion in commercial dispersed storagesystems.
Keywords:- Data Confidentiality ,cryptographic keys, cipher text blocks ,File level
deduplication
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 30
CryptoImage: Efficient Cryptosystem for Data Hiding in High Dynamic Range
Images
A Ponvannan, J.Pradeep, Mrs.V.Indhumathi
KINGS ENGINEERING COLLEGE
Abstract- Data preserving is one of the key challenges in these days. There are many
network attacks, cyber attacks from which the sensitive data suffer from.
Steganography techniques support data hiding inside an image to certain extent. It also
falls short in maintaining the integrity when transmitted through the
internet.―CryptoImage‖solvesthisproblembyembeddingencrypteddataontoanHDR(High
Dynamic Range) image which is absolutely non-prone to attacks. We implement cipher
techniques to modify the RGB value of each pixel and store the sensitive data onto it,
thereby concealing the confidentiality of the message. Graphics Drawable Library (GD
library) of PHP module present in PHP engine performs the conversion of HDR images
into Base64 format in which the encrypted text is embedded and then stored onto the
server. AES(Advanced Encrypted Standard) encryption is used to encrypt the original
secret message into cipher text which is appended to the converted image file and then
stored onto the server thereby concealing the security and confidentiality of the
originalmessage.
Keywords: Cryptosystem, Advanced Encryption Standard, Steganography, HDR
images, Data hiding.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 31
Ddos Detection And Mitigation On Websites Using Http Flood
K. Poonguzhali, Pownraj.A, Ms.D.Deepavathi
KINGS ENGINEERING COLLEGE
Abstract:- A Distributed Denial-Of-Service (DDoS) attack is an attack in which
multiple compromised computer systems attack a target, such as a server, website or
other network resource, and cause a denial of service for users of the targeted resource.
We implement a technique to reduce the traffic in affected servers with the help of PHP
and Javascript by Session Handling and Timeout and to deter attackers and mitigate
vulnerabilities at various points, multiple security controls are implemented and co-
ordinated as part of a layered defense in depth strategy. There are four critical phases
where we test the vulnerability of a website from DDoS attack: EtherApe, ServiceTor,
ProxyChains, GoldenEye.
Keywords: PHP, DDoS, Javascript, EtherApe, ServiceTor, ProxyChains, GoldenEye.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 32
Deadline based resource provisioning and scheduling algorithm for scientific
workflows on clouds
S. Preethi, Y.Priya, Ms.V.Sangeetha
KINGS ENGINEERING COLLEGE
Abstract—As it has turned into the standard for cloud suppliers to have numerous
datacenters around the world, huge requests exist for between datacenter moves data in
substantial volumes, e.g., relocation of large data. A test emerges on the best way to
plan the mass information exchanges at various earnestness levels, keeping in mind the
end goal to completely use the accessible between datacenter transfer speeds. The
Software Defined Networking (SDN) worldview has risen as of late which decouples
the control plane from the multiple ways empowering potential worldwide streamlining
of information directing in a network. An ideal lump steering streamlining
demonstrates is detailed to settle for the best lump exchange plans over time. Deadline
based bulk data transfer using cloud data centers as gateway, an SDN architecture for
network reliability. Chunk routing for chunk the bulk data. The aim is to deliver data
within deadline. An optimal chunk routing optimization model is formulated to solve
for the best chunk transfer schedules over time. To derive the optimal schedules in an
online fashion, three algorithms are discussed, namely a bandwidth- reserving
algorithm, a dynamically-adjusting algorithm, and a future-demand-friendly algorithm,
targeting at different levels of optimality and scalability. We build an SDN system
based on the Beacon platform and Open Flow APIs, and carefully engineer our bulk
data transfer algorithms in the system. Extensive real- world experiments are carried
out to compare the three algorithms as well as those from the existing literature, in
terms of routing optimality, computational delay andoverhead.
IndexTerms—Bulk data transfer, Cloud Data Centers, Software Defined Network,
Dynamically Optimized Algorithm.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 33
Employee Performance Workflow Mining In Clouds
S.R. Sai Shraven, B. Sairam, Mr.Christophersamualraj
KINGS ENGINEERING COLLEGE
Abstract -We first present the experimental evaluation of our approach to both intra-
cloud and inter-cloud scientific work- flow mining. For inter-cloud scientific workflow
mining, we assume that different PMs belong to the same cloud federation such that
they could discover the corresponding sub-workflows in parallel. Scientific workflow
scheduling which needs to change work- flow models. In this paper, we address this
issue in both intra-cloud and inter-cloud environments. Scientific workflows in cloud
environments can be deployed and executed on a central cloud or multi-clouds and thus
activities in all sub-workflows can be recorded in a trace according to their timestamps.
Scientific workflow is used to discover actual workflows from the execution history in
order to reproduce experimental results and to establish provenance of particular work.
This Project We develop one concept for monitoring the system activities and display
the work flow result of employees. The day to day activities is used to analyze the
performance of employees.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 34
End-to-End Schedulability Tests for Multiprocessor to Design Patterns: Building
Effective Algorithms
M.Pratheep Kumar, S.Raj Kumar, Mr K.G. Saravanan
KINGS ENGINEERING COLLEGE
Abstract: Real time stream processing involves continual input and output processing
of large set of data in the existing system perform real time stream processing for larger
set of data like big data. Consider if users are searching for a very important event of a
day, in the existing system such data requested by the user are fetched from main
memory whenever requested, so this leads to bad performance and may lead to more
time consumption. Therefore this state more time for the user to get response, this is
the problem will be existing system. Thus in the proposed system we concentrate on
reducing the response time for the request placed by the user by using Trending topic
detection algorithm based on searchcount.
Keywords: Trending topic detection algorithm, stream processing, big data and search
count.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 35
FlickFortune: Extensive Data Analysis andProbabilistic prediction using Data
mining Approach
S Ranishree, Sandeep.S, Mrs. S. Divya
KINGS ENGINEERING COLLEGE
Abstract- Data Mining is one of the rapid growing areas in the development of
Industrial automation. Many researches are carried out in order to determine the future
result of any business such as stock market. The appropriate data mining technique
helps the decision makers to arrive upon a valid decision. Our proposed system is the
implementation of probabilistic prediction of data from the extensive analysis. We
coherently apply the proposed system onto the movie prediction such as Gross
collection, Rating, feedback and success ratio. We use web scrapper code with
TMDBAPI to fetch attributes of the movies such as actor name, director, musician,
producer and budget. We employ association rule mining to extract the probabilistic
prediction from the user query. We further use AJAX for efficient and optimistic data
traffic between the client and the server.
Index Terms – Association rule mining (ARM), data access, DataMining, TMDBAPI,
AJAX, Probability vector.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 36
Food Ordering Application using Sentimental Analysis
K. Priya, Y.Priya,V.Rahana,Mrs.V.Blessyselvapriya
KINGS ENGINEERING COLLEGE
Abstract:-The demand for the offers from the customers and the demand for the high
sales rate from the food selling vendors are growing massive these days. Sentiment
Analysis Algorithm (SAA) can be used for analyzing people‘s opinions about a
particular product to improve the quality of the product. Fidu is the business intelligent
application which uses SAA to collect the customer‘s reviews to sort the quality of
both the product and service. Food ordering application is an android app which
enables person to order food while person is watching sports in stadium. This utility is
very simple and consumer pleasant in order that even kids can also recognize and use
it. As a result of these reviews, a report will be generated and sent to the respective
restaurants so that each restaurant may improve their food quality to increase customer
satisfaction. If the customer is satisfied, the rating of the food which they purchased
will increase based on that review, the food will top the menu in this application. Fidu
also includes an interactive chat-bot which helps the customer in ordering their favorite
food. The main aim of the application is to increase the business of the restaurants and
provide more offers that they can cope up with the top rating, eventually satisfying
customers.
Keywords: Sentiment Analysis, Android, Business intelligence, Firebase,
Authentication.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 37
Identifying Fake Applications and Ranking in Google Play Store and
Optimization of Genuine Applications
V. Rahana, S.Preethi,Mrs.R.Lavanya
KINGS ENGINEERING COLLEGE
Abstract- Present state of generation, due to rapid development in the mobile
technology and devices, the mobile applications are very interesting and famous. As
there is large number of mobile Applications, ranking fraud is a very challenging factor
in the mobile Applications market. Ranking fraud is the term used for referring the
fraudulent or suspicious activities having the intention of boosting up the Apps in the
popularity list. In fact, Application developers are using tricky means frequently for
increasing their Apps sales. The main aim is to develop such system that find ranking,
rating and review behaviors for investigating three forms of evidences they are review
based evidences, rating based evidences and ranking based evidences and then
aggregation based on optimization to combine all the evidences for detection of the
fake apps and also optimization of the genuineapplications.
Keywords-Android market, Search rank fraud, Malware detection.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 38
Preserveloc: Preserving the Location and Seamless Data Distribution in Mobile
Environment
C.Rinna, Sagaya Chithirai Ranjith, Mr.A.Gnanasekaran
KINGS ENGINEERING COLLEGE
Abstract--Android smartphones have seen a steep growth in recent years. The
importance of android devices is gaining much importance in day to day life. There are
many pitfalls that the system of android goes through inspite of its vast capabilities.
Preserving the location of the device is a challenging task in
android.Theotherapplicationsinthedeviceshouldnotgetthelocationinformation.Todesigna
nefficientsystem that preserves the location of the mobile application user and shared
data to the intended user without losing data integrity and location privacy. The system
should be developed in Android for the mobile users. Our proposed system focus on
seamless data delivery with less latency in all network conditions and preserving the
location of the device.
Keywords: Preserve, Android,Privacy, location.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 39
Prognosticating the Stress Values While Driving using IoT
R.Ponjanaki,A.Ponvannan, Mr.D.R.Denslinbrabin(A)
KINGS ENGINEERING COLLEGE
Abstract- The stress levels of drivers have greater impact on driving. Driver‘s
performance is based on their stress level. It leads to many accidents. Hence, heart beat
sensor is used to prognosticate the driver stress values and behaviour while driving. In
this project, to overcome the challenge we have proposed real data collection, IoT
based sharing and data analytics. The driver data is collected from the sensor and
transmitted to the microcontroller and using RS232 cable the real and dynamic driver
data are transmitted to the system. The real time data from the COM port are obtained
using Net beans and saved in SQL database. . In R programming, clustering and
classification are performed for predicting the normal or abnormal conditions of the
driver. For clustering, we use k-means algorithm and for classification we use Naive
Bayes algorithm. The driver data are encrypted using AES encryption algorithm and
each driver data are stored in public cloud server namely CloudMe. The real time data
can be monitored by vehicle service centers, bus owners and nearby vehicle
boardingpoint.
Keywords: Advanced Encryption Standard (AES), Communication port (COM port),
Internet of Things (IoT), Structured Query Language (SQL)database.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 40
Provides Security in Cloud using Multi-Cloud and Slicing Algorithm
E. Sangeetha,K.Poonguzhali, Mrs.S.Divya
KINGS ENGINEERING COLLEGE
Abstract: Generally the cloud server act as a container which contains data or
information. Multi-cloud is the combination of public, private or managed clouds
including managed services or service providers. Multi- Cloud data systems have the
capacity to enhance data sharing and this aspect will be significantly of great help to
data users. Most business organizations share most of their data with either their clients
or suppliers and consider data sharing as a priority. In generally we are sent the file to
cloud in this project the proposed system we send the file with authentication by
encrypt and it can retrieve the data from multiple cloud before retrieve the file its
enhancing whole file then decrypt method were use to retrieve the file to view and ID-
DPDP protocol can realize private verification, delegated verification and public
verification. We propose a survey on the achievable security merits by making use of
multiple distinct clouds simultaneously. Various distinct architectures are introduced
and discussed according to their security and privacy capabilities and prospects. Also
we propose the splitting and merging concepts during storage in cloud environment.
Keywords: Multi-cloud, privacy preserving, data storage, encryption, decryption,
protocol.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 41
Providing Restrictions Against Attack and Congestion Control in Public
Infrastructure Cloud
Pownraj A,J.Pradeep,Mrs. M.Vidhya
KINGS ENGINEERING COLLEGE
Abstract: Cloud computing is current trend in market. It reduce the cost and
complexity of service providers by the means of capital and operational cost .It allows
users to access application remotely. This construct directs cloud service provider to
handle cost of servers, software updates, etc. If the session tokens are not properly
protected, an attacker can hijack an active session and assume the identity of a user. To
focusing on session hijacking and broken authentication OTP is generated it will send
user mail. Once the user is authenticated they will be split into virtual machine it is
initiate to the upload process into the cloud . The cloud user files are uploaded and
stored in domain based .Also in our proposed system encryption keys are maintained
outside of the IaaS domain .For encryption, we proposed RSA algorithm .For data
owner file encryption, we use camellia algorithm. Finally the files are stored in the
public cloud named CloudMe.
Keywords: Cloud computing, IaaS, CloudMe.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 42
Real Time Junk Observation and Characteristic Analysis in Twitter
M.Pradeep Kumar,A.Preethidivya,Ms.V.Sangeetha
KINGS ENGINEERING COLLEGE
Abstract-Spam on social media is a major problem in recent days. In this paper we
take in charge, to reduce a spam on twitter. So, we firstly carryout a deep analysis on
the statistical features between spam posts and non-spam posts. So that we maintain a
training datasets in mysql to differentiate spam and non-spam tweets which can be
monitored by admin. For classification, we use RF (Random forest) Algorithm and to
moderate a spam tweets into a non-spam tweets NLTK (Natural Language Tool kit) is
used. A spam tweet tried by a user for two times, the intimation message is sent to a
particular user as notification. For more than two times he/she tries to doing the same
job of posting spam tweets, the followers will be automatically removed from that
user‘s list. It creates a different mindset to a user where to realize his/hermistake.
Index Terms – Social network security, Twitter spam detection, RF (Random forest),
NLTK (NaturalLanguage Toolkit).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 43
Recommender System for Research Studies Using Graph Based Article Ranking
S.Rajkumar,S.Ranishree,Ms.S.Deepika
KINGS ENGINEERING COLLEGE
Abstract- Nowadays, the recommendation techniques are becoming more popular as a
result of expeditious growth in the information technology and the growing amount of
scholarly data. The ultimate
objectiveoftheproposedworkisrecommendingtheitemsofpotentialinterestautomaticallyto
theusers.Inmodern years, recommender systems are being employed in digital libraries
to help researchers in finding relevant articles. This search tool gives the list of relevant
articles based on the keywords in the query. It is difficult for a researcher to describe
his needs by a limited set of keywords. On the contrary, the results will be similar to all
researchers if the keywords are same. The existing recommender systems use the same
algorithm to generate recommendations for users without considering their situation.
To improve the recommendation, the proposed system incorporates common author
relation between articles. The system suggests the articles for users who are having
author based search pattern and also recommends conference venue for all researchers
to help them to gain more knowledge in their interested area. The principle notion of
the project is to determine the users having author based search pattern. To serve this
purpose, the system uses pairwise articles with common author relations and most
frequently appearedauthor.
Index terms-Common Author Relation, Frequently Appeared Author, Article
Recommendation, Recommends Conference Venue.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 44
The Future Technology of Smart Shopping Cart using RFID and ZIGBEE
M.Arumugakani,S.Arunmozhi,Mrs.V.Sangeetha
KINGS ENGINEERING COLLEGE
Abstract:-The Internet of Things (IOT) is changing human lives by interfacing regular
questions together. For instance, in a supermarket all things can be associated with
each other, shaping a savvy shopping framework. In such an IOT framework, a modest
RFID tag can be appended to every item which, at the point when set into a smart
shopping basket, can be naturally read by a cart outfitted with a RFID per user. Thus,
charging can be led from the shopping basket itself, averting clients from holding up in
a long line at checkout. Also, brilliant racking can be included into this smart billing
framework, an Zig-bee transmitter is used to transmit data from cart to focal server,
furnished with RFID per users, and can monitor stock, maybe additionally refreshing a
focal server. Another advantage of this sort of framework is that stock administration
turns out to be considerably less demanding, as all things can be consequently perused
by a RFID per user rather than physically examined by a worker. To approve the
possibility of such a framework, in this work we distinguish the plan prerequisites of a
savvy shopping framework, construct a model framework to test usefulness, and
outline a protected correspondence convention to make the framework reasonable. To
the best of our insight, this is the first run through a smart shopping framework is
proposed with security under thought.
Keywords:-Zig-bee, RFID Reader, RFID Tags, Smart Cart
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 45
Evaluating Disease from Several Medical Data by using HL7
M.Chithra Devi,S.Chrishstewart,Mrs.V.Blessyselvapriya
KINGS ENGINEERING COLLEGE
Abstract- To provide a detailed analysis on the healthcare data in HL7(Health Level 7)
by utilizing Big data analytics and to create disease prediction system as the healthcare
sector is considered as one of the important industries in information technology. In the
past few years, healthcare data has become more complex with huge amount of data
related to ever growing and changing technologies, mobile applications and discovery
of new diseases. The belief of healthcare sectors is that healthcare data analytics tools
are important to manage a large amount of complex data, to improve healthcare
industries, efficiency and accuracy in medical practice. Information technology is a
boon for the healthcare sectors to upgrade their efficiency in healthcare performance
availing the provided data and information. The concept of big data though not new is
constantly changing with attempts of defining big data and inventing newer hardware
and software mechanisms to store, analyze and visualize the data in keeping with the
requirements of collection of data elements as per the requisite size, speed and type.
Velocity, variety and volume are the three innate aspects of the data produced.
Furthermore, each of these data repositories is isolated and inherently incapable of
providing a platform for global datatransparency.
Keywords: Health Level 7 (HL7), Healthcare, Hadoop Distributed File System
(HDFS), Deep Analysis
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 46
Creating Secure Clouds By Continuous Auditing And Providing Certificates
R.David Sam Paul,V.Devi,Ms.C.Sumithra
KINGS ENGINEERING COLLEGE
Abstract:- Cloud service certifications (CSC) attempt to assure a high level of
security and compliance, considering that cloud services are part of an ever-
changing environment, multi-year validity periods may put in doubt reliability of
such certifications. We argue that continuous auditing (CA) of selected certification
criteria is required to assure continuously reliable and secure cloud services, and
increase trustworthiness of certifications. We conducted a thorough literature review,
interviews, and workshops with practitioners to conceptualize an architecture for
continuous cloud service auditing. Our study shows that various criteria should be
continuously audited. Cloud service customers do not longer possess their data
locally, assuring that their data is Being correctly stored and integrity is
maintained in cloud environments is of critical importance. Data integrity may be
threatened. major modules are server configuration ,data upload and block split, data
integrity checking, file recovery and certificate generation We propose a audit service
for verifying the integrity of an un- trusted and outsourced storage. File System has
proper Indexing and Metadata‘s for the different Chunks of the Cloud Storage.
Here the auditor agrees to inspect logs, which are routinely created during
monitoring operations by services providers to assess certification adherence. Cloud
provides random blocks to Verifier for Integrity Checking which is to protect user
privacy from Verifier (Third Party). File recovery is done by the Verifier
automatically if the datagets corrupted during checking. User can complaint cloud
for file recovery. Continuously auditing such cloud services can assure a high
level of security and reliability to (potential) cloud serviceadopters
Keywords: certification, cloud computing, continuous auditing, security.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 47
Pioneering Multiple Genomic and proteomic data Using Mirna and Transcription
factor for Gene Disease Spotting
G.Dhana Sundar,S.Ebenezer,Mrs.M.Sujatha
KINGS ENGINEERING COLLEGE
Abstract— Multiple genomic and proteomic semantic interpretation scattered in many
distributed and heterogeneous data sources; such heterogeneity and dispersion hamper
queriesandperformingglobalevaluations.Tooverwhemthisproblem,wedevelopedasoftwa
create and maintain a Genomic and Proteomic Knowledge Base (GPKB), which
integrates several of the most relevant sources .Gene Ontology (GO) is a structured
repository of concepts that are associated to one .Therearedifferentmethodofanalysisto
get bio information. One of the method is the use of Association Rules (AR) which
discovers biologically applicable associations between terms of GO. In existing work
we used GO-WAR (Gene Ontology-based Weighted Association Rules) for extracting
Weighted Association Rules from ontology-based annotated datasets.Based on cellular
component, molecular function and biological process values intrinsic and extrinsic
values would be calculated. For each proteomic analysis for every gene disease, we
analyze OMIM id, disease caused by, associated genes, medicine if available, and
images of that particular gene disorder. Thus a common man also would be able to
understand the membranes and enzymes associated for his / her gene disorder and able
to identify intrinsic and extrinsic factors. In this Paper, We done the Co-Regulatory
modules between miRNA (microRNA),, TF- gene interactions and gene-miRNA
interaction with the help of integration technique. These interaction could be taken the
genetic disease like breast cancer, etc..Iterative Multiplicative Updating Algorithm is
used in our paper to solve the optimization module function for the above interactions.
After that interactions, we compare the regulatory modules and protein value for gene
and generate Bayesian rose tree for efficiency of ourresult.
Index Terms— GO-WAR- Gene Ontology-based Weighted Association Rules,
MIRNA –Micro RNA, Transcriptionfactor
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 48
A SECURE CLOUD – BASED WEB APPLICATION AGAINST POLLUTION
ATTACK AND CONVINCING FILE TECHNIQUES
J.Ebenezer,R.Esakiammbal,Mrs.V.Indhumathi
KINGS ENGINEERING COLLEGE
Abstract: Cloud is the collection of virtualized and interconnected networks that
consists of parallel and distributed system. Security and privacy of information is the
biggest challenge to cloud computing. This issues can be overcome by employing
encryption and security techniques. Pollution attacks are the abrasive threat to cloud
data in which the intruders inject malicious packets into the network. This paper
provides solution for the pollution attack which able to spot the presence of an attack
while fetching the data from cloud storage. Before uploading data to cloud it is
encrypted using RC5 algorithm. Hashing techniques are employed to detect polluted
contents. The content distribution network (CDN) servers transmits date along with
calculated hash value. The network peers applies the same hash algorithm to compute
hash code for the received data. These two hash values are compared to identify any
pollution during transmission. Though the cloud storage providers are safe in practice
some authorities may force them to reveal user secrets or confidential data on the
cloud. The proposed system also provides solution to preserve user data confidentiality
and integrity after outsourcing. In practice, some entities may intercept communication
between user and cloud storage providers and then storage providers to release user
secrets by using government power or by other means which results in data leakage. In
order to avoid data leakage and to increase trust level between the Cloud Service
Provider (CSP) and the user, we propose a solution of creating proxy file which will be
delivered to other entities.
Keywords: Cloud computing, Network security, Data integrity, Pollution attack
detection, Authentication, Proxy file creation.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 49
AN ANALYSIS OF SECURITY ISSUES AND NATURE-INSPIRED
ALGORITHMS ON WIRELESS SENSOR NETWORKS INTEGRATED WITH
IOT ENVIRONMENT
M. S. Vinmathi, Dr. M. S. Josephine, Dr. V. Jeyabalaraja,
Dr. M.G.R. Educational and Research Institute
Abstract: WSN has the ability of detecting impelling the natural information the real
time and positive data can be gathered utilizing sensor frameworks. These WSNs can
be joined with internet of things to enable affiliation and broad access to sensor
information. Wireless sensor networks are very inclined to security issues. The
significant utilizations of sensor systems affect some of the areas such as in military,
business, social insurance, retail, and transportations. These frameworks utilize wired
or adhoc systems. Wireless sensor systems, actuator systems, and vehicular systems
have been considered incredibly in the industry level. Perhaps, the Internet of Things
(IoT) has extensive research consideration recent years. The cutting-edge innovation
and the expanding figuring intensity of processors, the utilization of remote sensor
systems have turned out to be to a great extent dispersed over wide regions. As of late
the remote sensor systems is utilized in Agriculture, keen structures, ecological
wellbeing and numerous different applications. In this paper, an audit about joining of
WSN with IOT, challenges looked by WSNs when coordinating with IOT have been
discussed in a review manner and also showcased how they can be clarified from the
parts of security and protection. In addition to the challenges, characteristics of nature-
inspired algorithms are also analyzed for clustering the nodes in wireless sensor
networks.
Keywords: Challenges, Internet of Things, Nature-Inspired Algorithms, Wireless
Sensor Networks, Security issues.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 50
A Bluetooth-based Architecture for Android Communication with an Articulated
Robot
[1]Dr.M.DevaBrinda, [2]Karthik.S,[3]Iyappan.S
Department of EEE, Ametuniversity
E-mail: [email protected], [email protected]
Abstract: In industrial robotic environments, there are many different robots
performing a variety of tasks. Each robot is controlled by its own teach pendant or via a
networked socket application. However, to monitor the status or make minor changes
to the programming of the robot, the user must obtain access to the teach pendant or
terminal. In an effort to eliminate this need, this paper introduces an android platform
that communicates with robots over a Bluetooth connection. Allows a malicious
service provider, who has successfully communicated with a legal user twice, to
recover the user’s credential and then to impersonate the user to access resources and
services offered by other service providers. Insecure against both impersonation attacks
and identity disclosure attacks Scheme suffers from Deniable of Service (DoS) attacks
and presented a new scheme.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 51
DISASTER MANAGEMENT SYSTEM USING INTELLIGENT
UNDERWATER ROBOT
Sasikala D, Rajalakshmi V, Jayabhaduri R
Sri Venkateswara College of Engineering Chennai, India
Abstract— Transportation of goods in marine vessels needs safe landing of goods to
their respective region. This transportation may be within national or international
region. Collision of vessels carrying goods becomes dangerous to the man-kind as well
as environment especially vessels carrying oil, hazardous chemicals etc. This paper
focuses on disaster management system for oil spillage during collision of oil-carrying
vessels. An underwater robot with GPU based system sends the images of the oil
spillage area and depth to the aerial system where it is processed using deep
convolution neural network. This information helps the respond team to take action
quickly.
Keywords—oil spill, deep convolution neural network.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 52
DEVELOPMENT OF AUTOMATED RUBBER TAPPING MACHINE TO
IMPROVE THE SOCIO-ECONOMIC STATUS OF RUBBER GROWERS IN
RURAL AREAS
1Aran Glenn .J, 2Adeline Sneha.J, 3Neenu .C
Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu,India.
E-mail id: [email protected]
ABSTRACT- Rubber tapping is the process of extraction of latex from rubber trees.
Rubber tree tapping is considered to be a skill oriented job. During the tapping process,
the taper has to make a downward half spiral incision on the tree bark to extract the
white milky liquid called latex. On a typical day, a rubber tapper has to tap about 500
to 800 rubber trees manually with a tapping tool within a specified time of the day.
Availability of skilled laborers who could accomplish this mammoth task is getting
scarce as days pass by. Even though cheap unskilled labor is available, without
appropriate time and training they would end up damaging the tree. The automated
rubber tapering machine designed here would replace the manual labor required for the
tapping process. Also with a clock feature to control the timing of the tapping process,
higher yield of rubber latex could be obtained.
Keywords— Rubber Tapping, Automatic Rubber machine, Rural development.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 53
HOME AUTOMATION SYSTEMS USING SPEECH RECOGNITION
V. Lokesh, R. K. Padmashini
Department of CSE
SreeSastha College of Engineering, Chennai-600 123
Abstract: The proposed project is an idea of controlling all electrical equipment in a
room using a single mobile application. The application will be installed in the user’s
smartphone which accepts voice as input and converts it to text and action. Action
produces a signal which is accepted by all the electrical devices in the room and
responds to it [off and on]. The control operation can be performed at anytime and
anywhere within the room and from outside. Speech recognition is included to control
appliances by giving commands via voice and controlling every device present in the
house. The overall aim of the implementing the system is to reduce every possible
complexity and making it a simple to use.
Keywords: Smartphone, Speech Recognition, Control, Action, Complexity.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 54
DEPARTMENT
OF
INFORMATION TECHNOLOGY
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 55
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 56
Secure Data Dissemination and Management in Mobile Cloud Computing
R.Aishwarya,S.Ajay,Mr.N.Venkateshvara Rao
KINGS ENGINEERING COLLEGE
Abstract:-Mobile computing is one of the wide spread research area in the domain of
computer science as it attracts the researchers for its property of computing on-the-go.
On the other hand, cloud computing deepens its application areas in almost all the
sectors. Mobile cloud computing (MCC) gains its importance by facilitating the cloud
services and computing facilities on the go. There have been a lot of survey and
experimental frameworks for the implementation of MCC. In this paper, we provide a
novel framework for developing an android application that provides data transmission
between the mobile phones. Firebase cloud is integrated with the application for data
storage. The aid of AJAX and JSON are yielded in order to provide efficient data
transmission and consumption between the mobilenodes.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 57
Security Based System using Mobile Application
P.Akila Sowmiya,M.Allenmanasseh,Mrs.Indumathi K
KINGS ENGINEERING COLLEGE
Abstract: We are going to deal with security problems due to camera. Have access to
sensitive data and resources on the user device. Misuse of camera by malicious
applications may result in privacy breaches and sensitive data leakage. An example
would be a malicious application surreptitiously recording a confidential business
conversation. This change in device privileges is automatically applied as soon as the
user device matches a pre-defined context of a user-defined policy. The problem arises
from the fact that Android users do not have control over the application capabilities
once the applications have been granted the requested privileges upon installation. In
this paper we propose such an access control mechanism.
Keywords: - Android, Security, Location, Context.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 58
Semantic Localization & Mapping for Unsupervised Indoor Localization
S.Angayarkani,S.S.Angelin Golda Mary,Ms.J.Jinusophia
KINGS ENGINEERING COLLEGE
Abstract:-Indoor localization using mobile sensors has gained momentum lately. Most
of the current systems rely on an extensive calibration step to achieve high accuracy.
We propose SemanticSLAM, a novel unsupervised indoor localization scheme that
bypasses the need for war-driving. SemanticSLAM leverages the idea that certain
locations in an indoor environment have a unique signature on one or more phone
sensors. Climbing stairs, for example, has a distinct pattern on the phone's
accelerometer; a specific spot may experience an unusual magnetic interference while
another may have a unique set of Wi-Fi access points covering it. SemanticSLAM uses
these unique points in the environment as landmarks and combines them with dead-
reckoning in a new Simultaneous Localization and Mapping (SLAM) framework to
reduce both the localization error and convergence time. In particular, the phone
inertial sensors are used to keep track of the user's path, while the observed landmarks
are used to compensate for the accumulation of error in a unified probabilistic
framework. Evaluation in two testbeds on Android phones shows that the system can
achieve 0.53 meters human median localization errors. In addition, the system can
detect the location of landmarks with 0.83 meters median error. This is 62 percent
better than a system that does not use SLAM. Moreover, SemanticSLAM has a 33
percent lower convergence time compared to the same systems. This highlights the
promise of SemanticSLAM as an unconventional approach for indoorlocalization.
Keywords:-Android, Indoor Tracking, Simultaneous Localization.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 59
Service cloud communication using encryption standards
A.ANISHA,S.ARUL,Mrs.S.Gracianissi
KINGS ENGINEERING COLLEGE
Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable
computing at the Internet of Things devices, residing in the edge of the network, for the
purpose of delivering services and applications more efficiently and effectively. Since
fog computing originates from and is a non-trivial extension of cloud computing, it
inherits many security and privacy challenges of cloud computing, causing the
extensive concerns in the research community. To enable authentic and confidential
communications among a group of fog nodes, in this paper, we propose an efficient key
exchange protocol based on cipher text-policy attribute-based encryption (CP-ABE) to
establish secure communications among the participants. To achieve confidentiality,
authentication, verifiability, and access control, we combine CP-ABE and digital
signature techniques. We analyse the efficiency of our protocol in terms of security and
performance. We also implement our protocol and compare it with the certificate-based
scheme to illustrate itsfeasibility.
Keywords:-Internet of Things, CP-ABE and digital signature.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 60
Trusted Cloud Authority Controlled by Federated Clouds
Asha Darly,G.Ashishsam,Mr.S.Vinoth
KINGS ENGINEERING COLLEGE
Abstract-Cloud computing provides the path to view the computing for the users and it
provides the previous methodologies for betterment of IT providers. To offer high QOS
to customers according SLA, cloud services broker or cloud service provider uses
individual cloud providers that work collaboratively to form a federation of clouds. It is
required in applications like Real-time online interactive applications, weather research
and forecasting etc., in which the data and applications are complex and distributed. In
these applications secret data should be shared, so secure data sharing mechanism is
required in Federated clouds to reduce the risk of data intrusion, the loss of service
availability and to ensure data integrity. In the proposed system, zero knowledge data
sharing scheme is used and federated clouds is controlled by Trusted Cloud Authority
(TCA) where the secret to be exchanged for computation is encrypted and retrieved by
individual cloud at the end. Our scheme is based on the difficulty of solving the
Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order
which is NP-Hard. So our proposed scheme provides data integrity in transit, data
availability when one of host providers is not available during thecomputation.
Index Terms- Mobile cloud computing, Data encryption, Access control.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 61
VANET Security Using New Greedy Behavior Approach
D.Baghya,L.Balaji, Mrs.M.Parameswari
KINGS ENGINEERING COLLEGE
Abstract- Vehicular Ad-hoc networks was mainly introduced for Road safety. For
instance a network is formed within the vehicles in a road and information is relayed
along the vehicles. The vehicles are considered as nodes. Whenever a node in the
network witnesses a problem or services (Gas stations, Hotels) along the path, it
notifies the other nodes in the network. But Selfish nodes in the network can cause
problems to the other nodes in the network. Which is not detected in existing system?
Thus to detect this we use GDVAN concept, where we detect Greedy nodes. For this,
we in proposed system go in for two phases
theyaresuspicionphase&decisionphase.Wherethefirstphaseisbasedonlinearregressionma
thematicalconcept & the other is based on fuzzy logic. Further in proposed system we
also check the correctness of the RTS/CTS frames of data using context –aware
inspection scheme to detect scrambling of data.
Keywords-Vehicular Ad-hoc Networks, Greedy Behavior, DoS attacks, Linear
regression, Fuzzy logic, IEEE 802.11p.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 62
Software Fault Prediction Models by Optimizing the Rank Based Approach
Mr.P.Muthazhagan V.Esther Sophia,N.Ezhilarasi,
KINGS ENGINEERING COLLEGE
Abstract: Software fault prediction plays a vital role in the software development
process for assuring high quality and reliability of the software product.Current
approaches for software fault prediction might not predict the exact number of
defectsin a software module due to noisy data which results in the less software
reliability. We build on our previous work, and further study whether the idea of
directly optimizing the model performance measure can benefit software defect
prediction model construction. For improving the software reliability, the rank-based
approaches are proposed for predicting the exact number of the software modules
against the software defects. This paper introduces a learning-to-rank approach to
construct software fault prediction models by directly optimizing the ranking
performance. In this paper comparison of the learning-to-rank method against other
algorithms that have been used for predicting the order of software modules according
to the predicted number ofdefects.
Keywords: Software fault prediction, Rank Based Approach, Optimizing, defects,
Modules
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 63
IOT SMART MIRROR WITH NEWS AND TEMPERATURE
Sowbhagiya S,Sree Durgareema A,Mrs.E.Sujatha
KINGS ENGINEERING COLLEGE
Abstract: The Internet of Things (IoT) is the logical next step in thevolution of the
Internet. The roots of theIoT go back to severalexisting technologies including
machine-to-machine communication(M2M), RFID and sensors. IoT is known for its
advantage that canhelp simplify people's everyday routine.The proposed system is
aboutthe design and development of a smart mirror that used for glancinginformation
for the people in a home environment. Face-recognitionis used to detect the user. It
provides a webpage based interface toaccess data feeds and other services. The data
feeds use web servicebased communication to extract data packets available
throughvarious APIs offered by websites. The Internet transformed our livesby
connecting us more easily to information and other people in thevirtual world. Mobile
phones then became smartphones and sincethen this concept has erupted and morphed
into the Internet of Things,things which connect us to everyday objects. Our research
isexploring a new way to use technologies to be more informed.
Thestateofinnovationcurrentlyistoprovidemoreinformation,butlessinteractiontogetit.The
devicethat
hasbeenresearchedanddesignediscalled―SmartMirror‖.Thesystemusesaraspberrypi3,web
camforface detection and a LCD panel for display.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 64
ATM MACHINE WITH BIOMETRIC SECURITY
Sridevi M,Srivigneshb,Mrs.T.C.Vidhya
KINGS ENGINEERING COLLEGE
ABSTRACT: In the current scenario, the way banking and transaction system is
changing in the world, the validation, authentication and confirmation of a person is
very important and should be of more concern. There is a lot of risk to losing money
and identity if the ATM PIN is misused. If it is hacked by someone then entire money
may be lost. Biometrics plays a major role in Automated Teller Machine (ATM)
system, E- Commerce, Online banking, Passports to prevent from these frauds .The
growth in electronic transactions has been increased tremendously; there is a greater
demand for fast and accurate user identification and authentication. Fingerprint
matching has been successfully used by law enforcement for more than a century. The
technology is now finding many other applications such as identity management and
access control.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 65
WELD POOL VISUAL TRACKING IN AUTOMATIC ARC WELDING USING
GRAPH CUT SEGMENTATION
STEFFI M,SUBBAYA AYYANESH SUDALAIMANI,Ms.T.Anithadorathy
KINGS ENGINEERING COLLEGE
Abstract: Challenging task in the welding process is detecting the shape of the non-
rigid metalduring the welding process due to the strong interference of the high
intensity arc light. Using Adaboost algorithm we can detect the boundary of the metal
by selecting an set of features that captures the relevant information . The set of
features selected by the Adaboost is most suitablefor the Bayesian classifier to
differentiate the wanted boundary and unwanted boundary fromthe captured image of
the metal welding.
Keywords: Automatic welding, Adaboost, weld pool tracking, Bayesian classifier,
graph cutsegmentation .
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 66
MART GARBAGE SYSTEM USING IOT
Subhasini D,P.Sureshkrishnan,Ms.L.Leena Jenifer
KINGS ENGINEERING COLLEGE
Abstract: The Internet of Things (IOT) shall be able to incorporate transparently and
seamlessly a largenumber of different and heterogeneous end systems, while providing
open access to selected of data for thedevelopment of a plethora of digital services.
Building a general architecture for the IOT is hence a very complextask, mainly
because of the extremely large variety of devices, link layer technologies and services
that may beinvolved in such a system. One of the main concerns with our environment
has been solid waste managementwhich in addition to disturbing the balance of the
environment also has adverse effects on the health of thesociety. The detection,
monitoring and management of wastes is one of the primary problems of the present
era.The traditional way of manually monitoring the wastes in waste bins is a complex,
cumbersome process andutilizes more human effort, time and cost which is not
compatible with the present day technologies in any way.This is an advanced method
in which waste management is automated. This project IOT Garbage
Monitoringsystem is a very innovative system which will help to keep the cities clean.
This system monitors the garbage binsand informs about the level of garbage collected
in the garbage bins via a webpage. This webpage also send allinformation to garbage
collectionvehicles.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 67
ENERGY EFFICIENT MOBILE TOWER CONTROL SYSTEM
– GREEN RADIO TECHNOLOGY
Surya K,Susithra Niraimathi K,Mrs.Sheelalavanya
KINGS ENGINEERING COLLEGE
Abstract: As part of the international efforts for energy conservation and CO2
reduction, migration to an energy-efficient mobile infrastructure is of high importance
to the mobile communications industry. The objective of the design is to, simulate and
assemble a microcontroller based energy saving unit so as to reduce the power
consumption in the existing mobile base stations. In the proposed system power
consumption rate is lowered by keeping only one mobile tower in working state to take
up all communications while the remaining towers stay in idle mode. When the
number of users of the current tower reaches a predetermined value the responder
frequency is sent to the nearby efficient tower to take up the remaining load by means
of wireless sensors networks. 1Thus by keeping all the towers in idle state and
bykeepingonlyoneinworkingstatethepowerconsumptionrateisconsiderablydecreased.1M
oreoverwith The help of ambient analyzer maximum power saving is achieved. Fuel
level monitoring unit is made available devoid of manpower. Thereby 1 KW power
saved=2 KW powergenerated.1
KEYWORD: Wireless sensor network, Ambient analyzer.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 68
THE NS2-BASED SIMULATION AND RESEARCH ON WIRELESS SENSOR
NETWORK ROUTE PROTOCOL
Thariga V,Thaslims,Ms.S.Thangam
KINGS ENGINEERING COLLEGE
Abstract: Precision agriculture is the frontier of international contemporary agriculture
in the twentieth century. The development of precision agriculture is a significant
strategic choice of agriculture and agricultural science development in the new stage in
China. As a novel technology of information acquisition and processing, WSN
possesses a great strategic meaning in overall improving the modernize level of
precision agriculture. Routing protocol is an indispensable part which ensures the
normal operation of wireless sensor network and the high efficient transmission of
information. The existing routing protocols for wireless sensor network are classified in
this paper, while comparison and analysis research are also given on route structure,
energy consumption, robustness, expansibility, node mobility, data fusion technology,
whether QoS is supported and maximizing the network lifecycle of all kinds of routing
protocols. At the end of this paper, a simulation research is made with NS2 network
simulation software on the dynamic clustering process of LEACH protocols, which is a
typical WSN routing protocol. The simulation results show that the random cluster-
head selecting method in LEACH protocol cannot ensure the number of cluster heads
completely equal to the anticipant optimal one during the dynamic clustering process,
and it also exists that the distances between cluster heads are too close or sensors of
some regions are too far from their cluster heads. All above these situations cause the
decreasing of LEACH protocol performance.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 69
FINGERPRINT RECOGNITION TECHNIQUE
Theboral S,Thulasi M S,Ms.Beulah Elizabeth E
KINGS ENGINEERING COLLEGE
Abstract - The study and implementation of a fingerprint recognition system based on
minute a based matching quite frequently used in various fingerprint algorithms and
techniques. human fingerprint verification. The goal of this project is to develop a
complete system for fingerprint verification through extracting and matching minutiae.
To achieve good minutiae extraction in fingerprint with varying quality. Pre-processing
in form of image enhancement, image binarization and image segmentation is first
applied on fingerprints before they are evaluated. Histogram equalization and
fouriertransform have been used for image enhancement. Then the fingerprint
imageisbinarized using the local adaptive threshold method. Minutiae Extraction
isdone by thinning and minutiae marking technique. A simple algorithmtechnique is
used for minutiae matching. By using match score method wedifferentiate the two
fingerprints are same or not.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 70
VISIBILITY RESTORATION OF HAZY IMAGES USING COLOUR
ANALYSIS AND DEPTH ESTIMATION WITH ENHANCED REFINED
TRANSMISSION
Twinklin Gracia V,Udayammal@ Usha L,Ms.Enuicefreeda
KINGS ENGINEERING COLLEGE
Abstract—During sandstorm conditions (haze, fog and smoke) the quality of the
captured images always has visually degradable and undesirable color cast effects. This
is due to the atmospheric particles which are absorbed and scatter light between the
digital camera and the captured object. Under this condition, traditional visibility
restoration approaches failed to get the restore images due to poor estimation of haze
thickness and the persistence of color cast problems. In general, haze removal approach
is classified into three types such as additional information approaches, multiple image
approaches and single- image approaches. The first two methods are expensive and
have high computational complexity. Recently single image approach is used for this
de-hazing process, because of its flexibility and low cost. The enhanced restoration
model is proposed with utilization of median filter and adaptive gamma correction
technique and dark channel prior method. These approaches can overcome the
problems such as color distortion, artifacts and insufficient depth information. The dark
channel prior technique is used to estimate the atmospheric light for haze free image.
That is, transmission map will be helpful to estimate the atmospheric light. Based on
this, at least, one color channel has low intensity pixels at non sky patches. The median
filter and adaptive gamma correction are used for enhancing transmission to avoid halo
effect problem. In addition to that, fast image visibility restoration module also applied
in which it utilizes average color difference values and enhanced transmission to
restore an image with better quality
Keywords— Haze Thickness Estimation (HTE) module, patchRetinex Technique,
Laplacian-based gamma Correction technique.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 71
SMART GARBAGE SYSTEM USING IOT
Vickey,K.Yogesh,Ms.P.Nancy
KINGS ENGINEERING COLLEGE
Abstract—one of the main concerns with our environmenthas been solid waste
management which as also adverseeffects on the health of the society. In most of the
cities theoverflowed garbage bins create an unhygienic environment.The detection
monitoring and management of wastes is one ofthe primary problems of the present
era. Nowadays certainactions are taken to improve the level of cleanliness in
ourcountry. People are getting more active in doing all the thingspossible to clean their
surroundings. Various movements arealso started by the government to increase
cleanliness. Thesystem makes use of advanced virtual reduced (AVR)instruction set
microcontroller, LCD screen , global system formobile communication (GSM) modem
for sending data and abuzzer . The system is powered by a solar cell and a battery.The
LCD screen is used to display the status of the level of thegarbage collected in the bins,
whereas a web page is built toshow the status to the user monitoring it .The web page
gives agraphical view of the garbage bins. The display shows thecondition of the trash
stage and the other information. Thesystem puts on the buzzer when the level of the
garbagecomposed crosses the set limit or if there is occurrence of toxicgases. Thus this
scheme helps to maintain the city sparkling byinforming about the trash levels of the
bins by providinggraphical representation of the bins viawebpage.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 72
POWER EXALTING VERSATILE BOT
Paul Chandaran.S,K.Ramki,Mrs. G. Priyadharshinilovelin
KINGS ENGINEERING COLLEGE
Abstract—We propose a new concept of an active phased array antenna (APAA)
system that realizes multi-frequency and multi-modulation beam forming
simultaneously in an array.The proposed APAA system consists of RF modules
including an RF singal generator .The RF module measures the output RFsignal of
itself to compensate errors of output timing, amplitude and phase of the RF signals
betweenmultiple RF modules configuring the antenna array. These features realize a
flexible and accurate APAA operation.The proposed RF module is fabricated with
various functions and high performance ICs in SiGetechnology.The proposed RF
module is evaluated by measurements. It is achieved that the measurement accuracy of
output timing error, amplitude error and phase error of RF signal are 56ps-rms,0.6Db-
rms and 0.6deg-rms respectively.
KEYWORDS:RF module ,Ultrasonicsensors,Transceivers,Arduino UNO, L29 3D
DRIVER CIRCUIT.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 73
MACHINE LEIUTANANT FOR VISUALLY IMPAIRED PEOPLE
Anupriya M,Avinash K, Mrs.V.Sharmila
KINGS ENGINEERING COLLEGE
Abstract - In today‘s world, emerging technology plays a vital role where gadgets and
software leads to sophisticated and comfortable lifestyle for human beings with
astonishing features and real time updates but only normal people can rejoice it, people
who are differentially able such as visually impaired lack the benefits of technology. In
our society more than 20% of the people are visually challenged but not all of them
gets proper guidance. In our day today, life they cannot rely on someone for help.
Leading an independent life is a right of every citizen, so our project is a small step
towards achieving this goal. MACHINE LIEUTENANT FOR VISUALLY
IMPARIED PEOPLE uses the pi camera, this pi camera acts as an eye to these people.
i.e. the camera detects the objects that approaches the person while they are moving.
As known the pi camera is supported by raspberry pi and the software used here is the
Caffe which detects the objects and speaks out through the softwarepyttsx.
Keywords -raspberry pi, pi camera, caffee, pyttsx.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 74
PERFORMANCE ANALYSIS OF COMPRESSED SENSING BASED IMAGE
SENSOR FOR SMART SURVEILLANCE APPLICATIONS
Karthickmanoj.R; Balamurugan
Research Scholar, AMET Deemed to be University, Chennai
Abstract: Internet of Things (IoT) is the interconnection of physical objects through
internet for improving quality of life and involves potential applications such as
healthcare, smart cities, manufacturing and automation etc. Compressive sensing is an
emerging technique to be incorporated in the design of IoT platforms as it reduces the
raw data transmission and achieve traffic load balancing throughout networks. Video
surveillance is one such significant applications of IoT and it deals with huge amount
of data. Compressed Sensing concept can be used to reduce the amount of data being
transmitted in the wireless link. The main contribution of the paper is to design and
implement an efficient IoT enabled compressed sensing-based imaging system video
surveillance applications. The performance of the proposed work will be evaluated in
terms of reduction in samples, reconstruction quality and energy.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 75
ENERGY AWARE LINK LIFETIME ROUTING IN WSN
Dr.T.Sasilatha
Dean, EEE (Marine), AMET University
Abstract: Routing algorithm for data distribution sensor network nodes play a crucial
role in deciding the QoS parameter of the overall network. Various routing protocols
have been introduced for finding the shortest paths. Among which the Djikstra’s
algorithm, commonly used is Open shortest path first (OSPF). In this paper work we
propose a modified approach of Link State Routing (LSR) algorithm, through which
the intermediate nodes are designated by the energy level of the nodes. The main
problem faced while transmitting data is latency and energy consumption among
nodes. By this modified approach, the problems can be dealt easily. This adjusted
vitality mindful, load adjusting directing calculation is explicitly plan for WSN
situations. The proposed vitality mindful connection life steering calculation uses
fractional OSPF if there should be an occurrence of equivalent vitality level for two
substitute ways. Proposed calculation builds the hub lifetime without influencing
throughput. The inactivity in bundle conveyance is shifted for various experiments. (a)
Completely depleted Node (b) Partially depleted hub. The idleness of the current
steering strategy is better in halfway depleted hub and most noticeably terrible in
totally depleted Node cases. The reenactment executions are actualized in Ns2 stage
with C++ and Tcl scripting are structure dialects.
Index Terms— Life time, Latency, Load balancing, Energy Aware.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 76
FULLY AUTOMATED SMART RESTAURANT
Naveenkumar.N.S, Mohamed Nizar.T, ,sheefa.I,vinitha.T,
Student , Department of Electrical and Electronics Engineering
B.S.Abdur Rahman Crescent Institute of Sciecne and Technolgy,
Vandalur,Chennai – 48.
ABSTRACT -The main aim of our project is to improve the scenario in the restaurants
and hotels in a technological manner and thereby providing a fresh and attracted
customer experience. This idea is very much useful for all kind of food place whether it
is a small restaurant or a big hotel. This system provides managed food delivery right
to the table without any confusion and in an automated manner. It also provides smart
food ordering and payment options for saving time. The automation is done by using
Arduino for color sensing, PLC for conveyor control and an android application for
ordering the food. Since everything in the restaurant is made automated, it attracts the
customer and also provides a decent way to food ordering and delivery system.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 77
A COMPREHENSIVE REVIEW ON COLOR CONSTANCY
TECHNIQUES
Samreen Kaur¹, Dr. V.K. Banga², Er. Gurjit Singh³
Electronics and Communication Engineering Department, Amritsar College of Engineering and
Technology, Amritsar. Punjab 143001 India. [email protected], Mob no. 9592731071
Abstract: Color constancy techniques deal with restoring the actual colors of an image.
It restores the colors of every image if it is affected from any other color light sources.
Many color constancy restoration techniques are designed and implemented so far to
achieve color constancy. In this paper, a comprehensive review is presented to study
the advancements in color constancy techniques. Thereafter, a comparative analyses
are drawn to evaluate the best techniques from the existing literature. Finally, the
research gaps are formulated so that readers can focus on overcoming these issues.
Keywords: Color Constancy, Gray World, Max-RGB, Retinex Method, Gamut
Mapping.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 78
NOISE REDUCTION IN GRAYSCALE IMAGES USING
SEGMENTATION TECHNIQUES
Amudha K1, BeniSteena T2
1Associate Professor, Kongunadu College of Engineering and Technology, Thottiam
Abstract: Clustering algorithm is widely used Segmentation method in image
processing. The goal of clustering is to determine the intrinsic grouping in a set of
unlabeled data. The occurrence of noise during image acquisition, this might affect the
processing result. Denoise based clustering algorithm has three variations namely,
denoise based K-means, denoise based Fuzzy C-means, and denoise based Moving K-
means. denoise based clustering algorithm to minimize the salt and pepper noise and
improve the image quality. The proposed DB-clustering algorithms are able to
minimize the effects of the Salt-and-Pepper noise during the segmentation process
without degrading the fine details of the images. The result obtained PSNR and SNR
have favored the proposed denoise clustering algorithms, which consistently
outperform the conventional clustering algorithms in segmenting the noisy images.
Keywords: Image segmentation, clustering, salt and pepper noise, Image processing.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 79
DEPARTMENT
OF
ELECTRONICS AND COMMUNICATION
ENGINEERING
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 80
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 81
Digital Audio Watermarking – Using LSB Method
Abu Hanifa L,Alan Benjamin P,Dr.A.V.Mayakannan
KINGS ENGINEERING COLLEGE
Abstract - Recent years we can see rapid growth of digital multimedia and their
expansion. Digital media traveling in various forms, through email, Facebook,
WhatsApp across the Internet all over the world. However, Protection of these digital
media is difficult in these days. articularly digital audio protecting from copyright and
ownership issues is almost impossible. There many approaches possible to protect the
digital audio from these issues, Digital audio watermarking is one of the best method
among those approaches which is the way of secretly embedding information in an
audio. Nowadays, there are number of LSB algorithms and methods are available to
construct the text watermark to the cover audio file and to reconstruct the watermark
from watermarked audio. However, there are some drawbacks in those existing
algorithms. They are reducing the Imperceptibility, Robustness and Fidelity. The
proposed technique and algorithm overcomes the problem. It remains the quality of
cover audio file against the watermark audio file. through this system large volume of
text file can be inserted to the particular audiofile.
Keywords – LSB, WAV file, Watermarking, SNR, MSE, Imperceptibility,
Robustness, Fidelity, Steganography
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 82
Invisible Image Watermarking using Modified LSB
Alan Joseph Mosses.D,Angela,Mr.S.Rajkumar
KINGS ENGINEERING COLLEGE
Abstract: This paper presents a high secured and robust watermarking technique for
images. It consists invisibly embedding a secret data into the cover image without
degrading its quality. This watermarking algorithm uses third and fourth least
significant bits (LSB) technique. The result of this technique is much greater than
traditional first least significant bit technique in embedding data into the cover image.
Using the proposed algorithm, we will embed two bits in the third and fourth LSB. And
also there is an algorithm proposed for selecting a suitable watermark that best matches
the cover image and proof that it is invisible to the human naked eye. Experimental
results show that the quality of the watermarked image is higher. This method shows a
high fidelity of the reconstruction of images.
Keywords: Digital watermarking, fidelity, secret data, Least Significant Bit, Peak
Signal to Noise Ratio.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 83
MAXIMIZING THROUGHPUT OF COGNITIVE RADIO NETWORKS
THROUGH SECONDARY USER POWER CONSUMPTION IN 5G
HETEROGENEOUS NETWORKS
Angeline A,Aravinthasamys,Mrs.A.R.Venmathi
KINGS ENGINEERING COLLEGE
Abstract: A cognitive radio system requires the QoS of the primary user maintained
while the spectrum allocated to the primary user is used by the Secondary user. The
primary user in such cognitive radio systemmay use a queue to store packet during
transmission. In such a system the stability of the queue has to be ensured. This sharing
of available spectrum may happen through any of the modes of operation such as joint
interweaveunderlay mode or only-interweave mode. In joint interweave-underlay
mode, secondary user transmits when primary user is absent and transmits adaptively
when the primary user is present. In the Joint Interweaveunderlay mode, the role of the
interference constraint on the secondary user transmit power is of vital importance.
This technique of adaptive packet spreading in time to increase achievable packet
throughput along with interference constraints on secondary user transmitpower.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 84
Stateless Auto Configuration And Secured Data Transmission In Ipv6 Networks
Through Ipsec Tunneling
Aruna Devi R,Avinashk,Mrs.B.Anithavijayalakshmi
KINGS ENGINEERING COLLEGE
Abstract- IPV6 is the ultimate solution for the running out of ipv4 address and is the
one, having various advance features to meet varying demands of present and future
requirements. Concepts of stateless auto configuration and IPSec VPN make the
addressing easier and also help to overcome the security issues. Stateless auto
configuration helps in implementing plug and play services of automatic address
assignments in large area networks and the features of IPSec VPN tunnels provide,
remotely secure connection for transfer of information between peers. Stateless auto
configuration and IPSec VPN networks are implemented with security protocols for
key management and exchange to feature encryption, authenticity and integrity. These
all networks are designed using GNS3 network simulator. The testing and verification
of data packets is done using both VPCS tool and Wire Shark to ensure the encryption
of data exchanged between 2peers.
Keywords: Addressing, IPv6, Tunnelling, IPSec, VPN.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 85
AUTOMATIC QUALITY ASSESSMENT OF POTATOES USING LabVIEW
Barath K,M.Barath,Mrs.V.Kavitha
KINGS ENGINEERING COLLEGE
Absract- Ensuring the quality of the food products before they reach the consumers is
important task in the food industries. Potatoes are one of the major staple foods of the
world. Some potatoes contain green skin which indicates the presence of large amounts
of alkaloid content. This can cause various harmful health issues such as, headaches,
diarrhea cramps. Therefore the main objective of the project is to sort out such potatoes
from the normal ones using automatic and mechanized techniques with the help of Lab
VIEW and image processing. This would be a major breakthrough in leading food
industries that use potatoes as their major source. The technique can help the industries
in replacing the large amount of labour and the time caused by them. This also
eradicates the manual error caused by the labourers. The proposed method works on
the process of acquiring the image of the potatoes that are passed on the conveyor
using the concept of image processing. The potatoes with the green colour when
capture dare detected using Lab VIEW vision assistant technique and are pushed out of
the conveyor using an electric drive pusher that is driven by the hardware my RIO.
Thus the system is efficient in sorting out the defected potatoes from the goodones.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 86
METAL SEGREGATION USING LabVIEW
Blessy P J,Blessyta Juliya Sarah R,Mr.A.N.Duraivel
KINGS ENGINEERING COLLEGE
Abstract-Sorting systems remain essential in numerous areas with diverse applications
such as in manufacturing industry, factories, warehouses, etc. Segregation of products
in an industry is a tedious industrial process, which is generally carried out manually.
Continuous manual sorting creates quality consistency issues. Segregation based on
different characteristics like weight, colour, type required different equipment for
weighing and then separating. We have proposed an efficient method which uses
shapes for sorting the metals LabVIEW. By usingthis parameters and using image
processing & LabVIEW, the speed of the sorting process will be increased.
Growing technological awareness and skills of the machine users as well as increasing
the technical support by sorter manufacturers are the optimistic factors in growing the
acceptance of sorting machine. Conveyor system and the sorting hardware are also
controlled and monitored at the remote location using the LabVIEW Software. The
cameras ability to separate the noisy colours is a prime factor in this analysis.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 87
SMART SURVEILLANCE ROBOT USING LABVIEW
Blesy Regulas B,R.Chandrasekar,Mrs.A.Sumathi
KINGS ENGINEERING COLLEGE
Abstract- To build a cost effective and efficient robotic system, programmedto provide
a platform for surveillance purpose, thus acting as a substitutefor human in hazardous
activities like mining, exploration, patrollingsensitive areas and for various applications
that are at a safer distance.To impart intelligent control techniques for the robotic
platform, so thatit‘s dynamic performance, in varied applications of path and
dimensionstracking, can be further developed. To monitor the movement of therobot
through wireless mode ofcommunication.To establish completetransparency of data
over WIFI.The four wheeled robot mechanism , employs differential motorspeed
control. The concept of obstacle avoidance and autonomousmovement is
achievedbydesigningwiththreeIRproximitysensorstodetectobstaclesandmoveaccordingl
ybasedonthe―lefthandonwall‖technique.Wirelesstransmissiontechniquewouldbeincorpo
dfordatatransferand control from the main station. The monitoring dutieswould be
taken care by the camera mounted in the front and this wouldbe assisted by a head light
to provide proper lightning effects.The surveillance rover can be controlled in both
manual andautomatic control. The manual control can be done using both Laptopand
mobile using control buttons such as forward, reverse, left and right.Also acquiring the
video from the external environment by asurveillance process through Webcam.
Automatic control can be doneby two ways. One way is to automatically controlling a
rover based onObstacle detecting principle. While detecting obstacle it can turn
eitherleft or right direction using IR sensor and acquiring video automaticallyfrom the
external source. Another way of auto control of rover based oncolor detection
technique. Each color is assigned for each direction tothe rover and it follows particular
color and moves to the correspondingdirection.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 88
WATER MANAGEMENT SYSTEM USING LABVIEW
Daniel Michael,Deniya N J,Mrs.A.Sarala
KINGS ENGINEERING COLLEGE
Abstract -The local water supply is necessary in day-to- day life, but thewater is not
evenly distributed to all the people, also the children and old agepeople are affected by
drinking the impure water because of the water tank notbeing cleaned properly and in
correct time. In order to overcome these problems inlocal water supply, this project
(WATER MANAGEMNET SYSTEM usingLabVIEW) is designed. This project
includes even distribution of water in localarea along with tank level monitoring and
controlling and tank turbidity cleaningnotification and controlling. The hardware
includes flow sensor, solenoid valve,turbidity sensor, MyRIO, level sensor. The
software includes LabVIEW. Usingthis project, distribution of pure waterevenly to all
the people in local areas can beachieved. Uneven distribution of water to all the people
and in correct time, manychildren and old aged people get affected due to the existing
project.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 89
MULTIFACTOR AUTHENTICATION FOR SECURE ELECTRONIC
BALLOTING CREDENTIALS
Dinesh R,M.J.Elgin Sam Durai,Mrs.M.Vinu
KINGS ENGINEERING COLLEGE
Abstract- In recent times there has been a decline in the confidence of common
peopleover the Electronic Voting Machines (EVMs). Today‘s automated vote casting
methods havefaced immense controversy related to being vulnerable to hacking and
questions have beenraised about their transparency and security. In this project, it is
proposed to design anddevelop a novel tamper resistant electronic voting system that
aims to mitigate the recurringissues and flaws of existing voting machines of today.
Here, multiple layered verificationprocess is carried out on a potential voter by means
of fingerprint recognition in order toauthenticate his or her identity. Subsequently, the
person would cast the vote by pressing abutton corresponding to a particular candidate
which would be recorded in the systemproviding the vote caster a visual confirmation.
Then steganography technique is used to hidesecret messages into ordinary digital
media without drawing suspicion. This system not onlyprevents multiple vote casts, but
also eliminates the discrepancies that commonly arise with aperson claiming not to
have voted, whereas his or her name is present in the list of vote casters. The
experimental results show that the proposed method outperforms previous EVMs by
electronically transmitting their results back to the Election Commission from the
control unit, through a simple and unconditionally secure protocol
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 90
NEURO-OCR BASED ASSISTIVE SYSTEM FOR TEXT RECOGNITION
WITH VOICEOUTPUT
Esther Chelin S J,Gold Mercy S,Mrs.K.K.Uthiraramyabala
KINGS ENGINEERING COLLEGE
Absract-Our proposed project automatically focus the text regions from the object, we
offer a novel text localization algorithm by learning gradient features of stroke
orientations and distributions of edge pixels using artificial neural network. Text
characters in the localized text regions are then binarized and recognized by off-the-
shelf optical character identification software. The renowned text codes are converted
into audio output to the blind users. Object distance measure using ultrasonic sensor.
Automatically focus the text regions from the object. Text extraction using neural
network based OCR. Text to voice conversion using phonematic concatenation for
visually impaired people.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 91
BASED ON TUMOR CLASSIFICATION BY USING PNN METHOD
Gomathi C,Hannah Mercy George,Mrs.A.Aruna
KINGS ENGINEERING COLLEGE
Abstract- Automatic defects detection in MR images is very important in many
diagnostic and therapeutic applications. Because of high quantity data in MR images
and blurred boundaries, tumour segmentation and classification is very hard. This work
has introduced one automatic brain tumour detection method to increase the accuracy
and yield and decrease the diagnosis time. The goal is classifying the tissues to three
classes of normal, begin and malignant. . In MR images, the amount of data is too
much for manual interpretation and analysis. During past few years, brain tumor
segmentation in magnetic resonance imaging (MRI) has become an emergent research
area in the field of medical imaging system. Accurate detection of size and location of
brain tumor plays a vital role in the diagnosis of tumor. The diagnosis method consists
of four stages, pre-processing of MR images, feature extraction, and classification.
After histogram equalization of image, the features are extracted based on Dual-Tree
Complex wavelet transformation (DTCWT). In the last stage, Back Propagation Neural
Network (BPN) are employed to classify the Normal and abnormal brain. An efficient
algorithm is proposed for tumor detection based on the Spatial Fuzzy C-Means
Clustering. Probabilistic Neural Network (PNN) also termed to be a learning machine
is preliminarily used with an extension of various image classifications based on
Training networks and Testing networks. The Probabilistic Neural Network (PNN) will
be employed to classify the various stages of Tumor cut levels such as Benign,
Malignant or Normal. Probabilistic Neural Network with Radial Basis Function will be
applied to implement tumor cells segmentation and classification. Decision should be
made to classify the input image as normal or abnormal cells. This can be performed
in two stages: Gray-Level Co-occurrence Matrix and the classification using Neural
Network based function. Probabilistic Neural Network with Discrete Cosine Transform
has been imparted for Brain Tumor Classification.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 92
REAL TIME MPC FOR NON LINEAR PROCESS PARAMETERS
Harish N,Hemalathai,Mr.P.Muthukumaraswamy
KINGS ENGINEERING COLLEGE
Abstract - The major part of process industry is to govern the process parameters in a
chemical industryat a desired rate by implementing a suitable control strategy. We
came across many controlstrategies, yet the conventional PID controller is the most
preferred .Many researchers havebeen proposed different methods for tuning the
controller parameters to control and fulfil theneeds of a process. Model Predictive
Control is one of the controller which can enhances theperformance of PID controller
in case if MIMO systems .This paper aims to control nonlinear process parameters such
as pressure, flow, level and temperature from a single-tanksetup using Non Linear
MIMO MPC controller. The mathematical modelling used here is astates space model.
The predictive control used here re-linearizes the output whenever the setpoint
changes. Here, we use LAB VIEW software to develop the mathematical modelling
forthe above stated process setup. We examine the set-point parameters by maintaining
integraltime, proportional gain, derivative time using PID controller along with MIMO
linear MPCto differentiate the performance of MPC over PIDcontroller.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 93
DETECTION OF PARKINSON’S DISEASE IN EARLY STAGES
Hemalatha R,Indrapriyadarshini,Mrs.V.G.S.Archana
KINGS ENGINEERING COLLEGE
Abstract- Parkinson‘s disease (PD) is a neurological disorder which is diagnosed
through clinical examinations and observations rated on Unified Parkinson‘s disease
Rating Scale (UPDRS). Parkinson‘s involves the malfunction and death of vital nerve
cells in the brain, called neurons. However, in the earliest stages of the disease, this
approach might be inconclusive and result in misdiagnosis. Therefore, expert systems
are needed to increase the detection accuracy of PD. In this paper, different methods of
diagnosis of Parkinson‘s disease through voice in early stages are examined. Different
voice parameters like pitch frequency, zero crossing detector, short time energy,
formant which shows significant variations between normal person and Parkinson‘s
patient are determined and analyzed using Support Vector Machine (SVM). These
voice parameters will be computed using MATLAB based coding.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 94
SECRET KNOCK DETECTING DOOR LOCK
Iyangkani R,Jancy Rani A,Ms.M.Gomathi
KINGS ENGINEERING COLLEGE
Abstract- Security is a major concern in our day to day life, and digital locks have
become an important part of these security systems. There are many types of security
systems available to secure our
place.SomeexamplesarePIRbasedSecuritySystem,RFIDbasedSecuritySystem,DigitalLo
ckSystem,bio-matrix systems, Electronics Code lock. In this, a Secret Knock Detecting
Door Lock using Arduino is build which can detect the pattern of your knocks at the
door and will only open the lock if the knocking pattern matches with the correct
pattern. But then this is just used as an additional security along with the main lock. In
order to make this more powerful a push button is added to the system. This push
button activates a field and the knock has to perform within that field. The paper
highlights the security system based on Morse codetechnology using a micro-controller
which uses a saved data and compares it with the new data entered. If both the data are
same, only then the door will get unlocked, otherwise an alarm will be raised by the
system.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 95
CLASSIFICATION OF SKIN LESION USING NEURAL NETWORK
Janivishva V,Jeya Rani E,Mr.S.Muthupandian
KINGS ENGINEERING COLLEGE
Abstract - Skin cancer is one of the dangerous diseases which affect the human being.
Generally when a tumour occurs in the skin, the people became panic whether it is
cancer or not. To recognize skin tumour at an early stage the dermatoscopic image is
break down through different methods named as segmentation and feature
extraction.The Feature extraction in digital image processing method includes
symmetry detection, Border Detection, colour, diameter detection, and elevation .We
utilized DRLBP and GLCM to extract the texture based features. The ABCDE rule is
to govern the dermoscopy innovation for harmful melanoma skin malignancy location.
Here we proposed the Back Propagation Neural Network to classify the normal and
benign or malignant stage.
Keywords: DRLBP, GLCM, ABCDE Rule, BPNN algorithm
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 96
OPTICAL CHARACTER RECOGNITION AND SPEECHSYNTHESIS
Jebezson G,E.Jeeva,Mrs.B.Gowripredeba
KINGS ENGINEERING COLLEGE
Abstract- Knowledge extraction by just listening to sounds is a distinctive property.
Although text can be a medium of ommunication but speech signal is more effective
means of communication than text. This project is to serve the visually impaired
persons and facilitate them by recognizing characters in the form of sound. This
process contains two part optical character recognition and text to speech conversion.
The OCR software is developed with IMAQ Vision for LabVIEW software-
developing tool. It is a PC- based character recognition tool for use with IMAQ Vision
for LabVIEW. It is designed for high-speed, reliable reading performance and
effectively generates output, even with poor image quality resulting from varying
lighting conditions and print quality.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 97
DESIGN OF PHOTONIC BASED MILLIMETER WAVE SWITCH
Joyce Kamali D,Kamatchia,Mrs.S.Sharonsweeti
KINGS ENGINEERING COLLEGE
Abstract - The main concept of our paper is to generate the millimeter wave switched
signal. Four wave mixing(FWM) is done by launching the signal into SOA. The three
pump beams are launched into Semiconductor Optical Amplifier(SOA).SOA is used to
increase the power of particular selected signal, which is done by selecting the
particular signal in WDM DEMUX after multiplexing all the three signals in WDM
MUX. The wavelength of pump beams are 1551 nm,1552 nm,1553 nm. The power of
the each pump beams are 6 db respectively. The three pump beams which induces non
linear effects are combined linearly. The interaction between these pump beams results
in generation of new sidebands. Main power beams are suppressed and power is
switched to the right side band. The switched signal is generated by the concept of
FWM in SOA. Switched signal has the highest power. The important parameters taken
into account include wavelength spacing between probe and pump signals and injection
current. The minimum wavelength spacing between the signals should be 0.8 nm. The
minimum injection current should be 0.2A.The switched right side band has gain of
around 14db.This millimeter waves can be used for 5Gapplications.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 98
WATER QUALITY MONITORING SYSTEM
Kasankathaperumal K,Mahendrakumarg,Mrs.R.Roseminthanga Joy
KINGS ENGINEERING COLLEGE
Abstract - Water is the driving force of the nature. Still in many areas of our world,
people don‘t haveaccess to clean and safe domestic water. Monitoring the quality of
water will help us controlthe pollution level as well. Physical conditions such as
temperature, turbidity, pH value ofwater play important role in determining the quality
of water. The paper makes use of amicrocontroller with the help of various sensors to
start a quality check on the water. Each ofthese sensors has a separate parameter to
check. The temperature, pH, turbidity and waterlevel sensors are placed inside the
water tank with the help of probes to measure therespective parameters. Water level
sensor will be useful to avoid overflow and wastage ofwater. The LED screen will be
fixed with the model and whenever the water exceeds thepredefined level, the LED
screen will display the message as well as a buzzer will go off atthe same time. The
messages are sent to the authorized person by using a GSM module.Thisidea is very
useful specially for the remote areas which are cut off from getting clean waterand
don‘t have access to expensive water level monitors.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 99
SEED PURITY TESTING WITH THE HELP OF DIGITAL IMAGE
PROCESSING
Meena T,Merlin Sweetha Vinola,Ms.C.V.Umamaheshwari
KINGS ENGINEERING COLLEGE
Abstract- In this paper we used digital image processing techniques for purity test of
various seeds. Physical purity analysis tells us the proportion of pure seed component
in the seed lot. The computer software which can predict seed image for seed lot by
using digital image processing techniques is developed. Due to the advance of camera
technology, people can take digital pictures easily in any places and any time by a
camera or by a mobile phone device. Moreover, it is easy to transform and process by
using a computer system. Thus, this project employs a digital camera to capture the
image. This paper studies various digital image processing techniques which reduces
the labor input required to evaluate seedling growth rate and increases the accuracy of
thesemeasurements.
Keywords— Edge,Corner,Purity test, Digital Image, Processing, MATLAB
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 100
JOINT TURBO DECODING FOR OVERLOADED MIMO-OFDM SYSTEM
Monisha R,Nadarmuthuselvan,Mr.S.Suthagar
KINGS ENGINEERING COLLEGE
Abstract- This abstract proposes to increase the data efficiency and avoid the
interference by using discrete wavelet transform (DWT). This system is working based
on wireless communication. While using joint turbo decoding scheme for the overload
MIMO-OFDM system, it will reduce the amount of performance degradation. In the
overloaded MIMO system, the number of receiver antenna element is less than that of
transmit antenna elements. The performance of joint turbo decoding over additive
white Gaussian noise channel is evaluated through simulation. This simulation shows
more SNR, less BER for the system due to the reduction of the noiseeffect.
Keywords- i) MIMO (Multiple Input Multiple Output) ii) OFDM
(OrthogonalFrequency Division Multiplexing) iii) BER, iv) SNR (Signal to Noise
Ratio) v)DWT ( Discrete wavelet transform).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 101
MULTIBAND CIRCULARLY POLARIZED ANTENNA FOR
WIRELESSAPPLICATION
Nadar Sreejith Prabu,Nalinik,Mrs.A.Rublin Beulah
KINGS ENGINEERING COLLEGE
Abstract- This chapter focuses on the design of multiband circularly polarized
antennafor existing wireless services and the procedure for designing a
microstrippatchantenna for multiband Antenna is explained. The objectives of this
chapter areas follow i) To design a multiband antenna for wireless communication
bandssuch as 2.4 GHz 5.3 GHz 5.8 GHz 3.5GHz etc. ii)To achieve VSWR less than2,
to obtain optimum return loss and radiation pattern .This can done by using 3shapes
namely L-shape I-shape andU-shape.
Keywords- Circularly Polarized Antenna , VSWR ,Microstrip patch
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 102
FAULT TOLERENCE TECHNIQUE USING CMOS VLSI CIRCUITS
Narayana Kumeresan Y,Nareshm,Mr.R.Nagaraj
KINGS ENGINEERING COLLEGE
Abstract- In this we propose a new design of counter using 6:3 counter as a stacker as
basic modulealgorithm in the multiplier to replace the ripple carry adder to add the
partial products inefficiently designed stacker units used for modifiying the
conventional multiplicationapproach are presented in counter producing 6:3 circiuts
with no xor gates on the critical pathand induces a stuck at 0 fault and recovering the
stuck at 0 fault by fault tolerencetechnique.The avoidance of xor gates resuts in faster
designs with efficient power and areautilization.Here we are using fault tolerence
technique for stuck at 0 and stuck at 1. In VLSIexisting parallel counters and also
consume less power when compared to other higher ordercounters. Additionally, we
are using our proposed counters in the existing counter-basedmultiplier architectures
which reduces latency and power consumption for 8 bit multipliers.
Key words-Cmos, VLSI design, stacker, power consumption ,gates, stuck at 0, stuck at
1, fault tolerant, counters,stuck at faults.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 103
TRANSPARENT AND FLEXIBLE ANTENNAS FOR WEARABLE GLASSES
AND APPLICATIONS
Narmatha B,Pavithras,Mrs.E.Verginsheeba
KINGS ENGINEERING COLLEGE
Abstract - In recent times, both the transmitters and receivers involved
requireantennas, even if some are hidden like inside laptop computers equipped with
Wi-Fi,or inside radio. According to the IEEE standards definition of terms for
antennas,antenna is basically defined as the means of transmitting and receiving radio
waves. Itcan also be defined as the transitional structure between the free space and the
guidingspace. This study aims to design, fabricate, and analyze transparent and
flexiblemono-pole antennas for an application in wearable glasses. Transparent
conductingoxide (TCO) electrodes, is selected as conductors of antennas and ground
planes ofthe wearable glasses. The average transparency of the proposed antennas is
measuredto be 81.1% in the visible wavelength. The proposed antennas are fabricated
withphysical vapor deposition (PVD) process in high vacuum. To reduce
theelectromagnetic field absorption of the human head, we introduced and
analyzedmono-pole antennas having different directions of radiation patterns. The
averagetransparency of the proposed antennas in the visible wavelength and the
electricalconductivity will be greater than the existing system. The fabricated antennas
willshow average efficiency of approximately 40% and 4 dBi peak gain at 2.4–2.5
GHz.Furthermore, they have a specific absorption rate (SAR) lower complies with
theFederal Communications Commission (FCC) standard, when the input power
is15dBm.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 104
IoT(Internet Of Things) BASED ONLINE ENERGY MONITORING SYSTEM
AND CONTROL
Prakash J,Praveenraj J,Mr.S.Rajkumar
KINGS ENGINEERING COLLEGE
Abstract - The user can monitor the energy parameters of load using an
androidSmartphone which will also work as a data logger to store current , voltage and
powervalues.The goal of this project is to visualize and monitor the power
consumption onlineon a smart phone using mobile application by integrating smart
plugs, sensors, Internet ofThings (IoT) devices and GATEWAY which enables the
communication between thevarious smart plugs and the web server hosting the
monitoring system application,thereby facilitating the user to act accordingly to save
power or to provide the reliablepower supply by making maximum use of Renewable
EnergySources.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 105
GREEN RADIO APPROACH TOWARDS ENERGY EFFICIENT RADIO
ACCESSNETWORKS FORMOBILE COMMUNICATION
Poonguzhali D,Prabakarana,Mrs.L.Ajitha
KINGS ENGINEERING COLLEGE
ABSTRACT- Green radio technology prefers environment friendly approach towards
the mobilecommunication. This paper discusses about modification in mobile
infrastructure for energyconservation and CO2 reduction(carbon credit).The mobile
towers are increasing in anextraordinary manner. The source for towers are based on
the power requirement. Powerrequirement in developing countries are always greater
than the generated.A critical mobilenetwork consume ~40-50MW and a diesel
generator consume ~1MG of diesel per day.Ourobjective is to reduce the energy
consumption in base stations.
Key words-CO2 emission reduction,Green Radio Technology,Power saving in base
stations.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 106
COMPACT FREQUENCY RECONFIGURABLE 4X4 SLOT ANTENNA FOR
WIRELESS APPLICATION
Aravindh K,Anushat,Mr.P.Muthukumaraswamy
KINGS ENGINEERING COLLEGE
ABSTRACT- A reconfigurable antenna system is used to improve data
throughputlimitations in multiple input multiple output wireless
communicationsystems. By inserting varactor inside the
slot,easyreconfigurabilityofdifferent frequency .The radiation pattern is reconfigured
by using micro-controller .The 4x4 MIMO antenna is designed to operate
variousfrequency for WLAN,LTE,satellite and other technology.
Keywords- reconfigurable slot antenna , coaxial feed , stripline,port
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 107
GSM BASED VOICE DATA THROUGH BONE CONDUCTION
Arjun S,Priyar,Mr.S.Rajkumar
KINGS ENGINEERING COLLEGE
Abstract - The GSM based SoundBite hearing system allows people with to hear the
sounds via boneconduction to wear an intraoral device and a small microphone in the
deaf ear to regain losthearing. This device consists of GSM modem PIC16F877A
controller and audio amplifierunit. GSM modem will receive incoming calls and
automatically answer the call via ATCommands. Then incoming voice signal is
converted into low frequency vibration signal thatfed through the teeth to cochlea.
Unlike implantable bone conduction hearing aids, SoundBiterequires no surgery.
Rather, it is the world‘s first removable and non- surgical hearingsolution to use the
well-established principle of bone conduction to imperceptibly transmitsound via the
teeth. Custom made for each person, SoundBite is simple, removable, andtotallynon-
invasive.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 108
DETECTING DRIVER DROWSINESS BASED ON SINGLE EEG CHANNEL
Sundar R,Suryas,Mr.A.N.Duraivel
KINGS ENGINEERING COLLEGE
Abstract -In the recent years, driver drowsiness has been considered one of the major
causes of road accidents, which can lead to severe physical injuries, deaths. As
aconsequence, a reliable driver drowsiness- detection- system is necessary to alert
thedriver before an accident happens. For this reason, an Electroencephalogram(EEG)
has recently drawn attention in the field of brain-computer interface andcognitive
neuroscience to control and predict the human drowsiness state. Tomeasure the drowsy
state we are going to fetch the data of the neurowaves by usingpatchelectrodes.The data
from the electrodes are amplified by using EEGamplifier. The data is sent to the
computer with the help of UART and softwarecalledLabVIEW is used for signal
filtration process. LabVIEW we can performvarious operations to process the data in
the form required by us. After the data hasreached the LabVIEW, we do a process
called feature extraction. This processcomprises of various filters that work upon
mathematically to get values of thevariables needed by us. These variable values are
useful in determining thecharacteristics of the wave shown above and hence we predict
the state of the mindby just knowing these characteristics. Operations such IIR Filters,
windowing,amplitude detection are carried out here with the help of the myDAQ . This
featurewill indicate the stage. This result could be displayed using an external
hardwareindicator. When the driver goes to drowsy state we have applied an alert
systemlike buzzer to wake up thedriver.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 109
NOVEL BROADBAND ANTENNA DESIGN FOR RFID TAGS
Raja S,Ramk,Mrs.A.Sumathi
KINGS ENGINEERING COLLEGE
Abstract— The UHF RFID system eliminates the need for manual processes, by
increasing inventory visibility and automating workflows but these RFID tags cannot
perform well in the presence of metallic objects. In this paper , a novel UHF RFID tag
antenna which can be suitable for metallic objects is proposed. The proposed
microstrip antenna consists of two substrates separated by an air layer the upper
substrates is implemented with a folded dipole and two slots inserted at the end of the
dipole. Second substrate is a double face with parallel bars on the top face and a metal
palne on the bottom. The printed parallel bars on the topface of the second substrate is
to increase the bandwidth of the antenna by creating multi resonant bands. The main
aim of the proposed antenna is to improve the gain of the antenna and to bring the
return loss better than -10dB.
Keywords—Antenna, UHF, RFID, Substrate, Metallic objects, gain
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 110
COST EFFICIENT IOT BASED HOME AUTOMATION WITH SECURITY
Anitha M,Daniyat,Mrs.A.R.Venmathi
KINGS ENGINEERING COLLEGE
Abstract - Having witnessed a surge in the number of users of internet over the past
decade, technologyhas made Internet a part and parcel of life, and IoT is the latest and
emerging internettechnology. Internet of things is a growing network of everyday
object from industrial machine to consumer goods that can share information and
complete tasks while you are busywith other activities. Wireless Home Automation
system(WHAS) using IoT is a system thatmakes optimal use of computers or mobile
devices to control basic home functions andfeatures automatically through the internet
from anywhere around the world, an automatedhome is sometimes called a smart
home. It is meant to save the electric power and humanenergy. The home automation
system differs from other system by allowing the user tooperate the system from
anywhere around the world through internet connection. In thispaper, we present a
Home Automation system(HAS) using NodeMCU that employs theintegration of cloud
networking, wireless communication, to provide the user with remotecontrol of various
lights, fans, and appliances within their home and storing the data in thecloud. The
system will automatically change on the basis of data input by the user from themobile
application. This system is designed to be low cost, reduced space, power-efficientand
expandable allowing a variety of devices to be controlled. This wireless
Automationsystem is robust and the performance can be improved by in the days
tofollow.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 111
INTEGRATION OF AUTOMATIC STREET LIGHT AND WATER
LEVELMONITORING FOR SMART CITY
Rachel A,Revathim,Mrs.A.Aruna
KINGS ENGINEERING COLLEGE
Abstract - Street light have become a vitalaspect including road safety. A lot
ofelectricity is consumed by street lights andwater level. So it is imperative to save
thepower as much as we can. The cost ofelectricity continues to increase as wastageof
energy increases. It has become verycrucial for saving power. Street lightmonitoring
control is an automated systemdesigned to improve the efficiency byautomatically
controlling the switching ofstreet light. This system also monitors the waterlevel in a
tank and also controls watersupply to Panchayath, etc. If the water levelis higher than
threshold level, motor runs.Otherwise, water level is below thethreshold level, motor
does not run to avoidpower consumption. Using a USB camera,the water level is
monitored whether thewater is manually increasing or not. These are controlled
throughInternet of Things. The street lights andwater level are controlled by the base
serverby just sending a notification by using IoT. Itconsistsofaclient-
serverapplication.WecancontrolfromServersideaswellasfromClientside.Thissystem can
control frommonitor at Server side and at Client sidefromapplication.This system can
control from longdistance. The primary motive behindimplementing this project is to
save theenergy and to reduce man power. Thisproject describes a new solution for
street light and water level controlsystem.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 112
MOTION CONTROLLED ROBOT USING MULTI SENSORS POWERED BY
AI ENGINE
Rithika J,Ravi Kumar K,Ms.M.Gomathi
KINGS ENGINEERING COLLEGE
Abstract - Introducing speech recognition is a natural goal in robotics as it is one of
the most commonforms of communication for humans. In human language, this is
referred to as naturallanguage. This is very advanced as it depends on the context, the
person, the moment, etc.Although a great deal of progress has been made in robotics in
recent years, it has not yetmastered this. Leaving aside highly advanced robots in
laboratories such as ICub, or the veryimpressive progress made in the military sector,
the problems encountered in personal roboticsare more mundane. Speech recognition
with a mobile robot depends not only on the quality ofthe components but also on the
environment (as always with robotics), which can be noisy orcause an echo, or modify
the perception of the sound due to its shape (the robot could perceive a sound
differently if it is going along a wall for example). As you will see later, controlling
arobot using your voice is more complicated than sitting in front of your desk dictating
to yourcomputer using a microphone. Automatic speech recognition together with
speech synthesis ispart of what is known as speech processing. The aim of speech
recognition is to analyse a wordor phrase picked up by a microphone and transcribe it
in text form onto a computer (orequivalent) so that it can be used. The main uses of
speech recognition are automatic dictation or vocal applications over thetelephone.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 113
DESIGN OF AQUAD BAND-NOTCHED UWB RECONFIGURABLE PATCH
ANTENNA
Darani M,Kalaimathip,Mrs.E.Verginsheeba
KINGS ENGINEERING COLLEGE
Abstract- The Ultra wide band(UWB) application is compactreconfigurable patch
antenna with quadband notched characteristics. The antennais constructed of a
conventionalrectangular micro-strip patch antennawith partial ground plane and T-
shapedstrip employed in the ground plane aswell as an inverted Ω and L- shaped
slotsincorporated within the radiated element. The notched functions are created by
theinverted Ω and L-shaped slots, which arerealized for Wi-MAX (2.382GHZ)
andWLAN (6.549GHZ). The T shapedparasitic strip generates the third notchfor the
band uplink satellitecommunication (9.589GHZ). The measured operating -30 dB
bandwidth ofthe proposed antenna ex-tends from 2.39to more than 18 GHz except at
thenotched band The prototype antenna hasa total area of 20×20×2 mm3 Theefficiency
acquired is 62% , gain is67db.
KEYWORDS- (i) Gain (ii) Directivity (iii) Bandwidth(iv) Efficiency (v) Polarization
(vi)VSWR (vii)Radiation pattern
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 114
ANTI THEFT PROTECTION OF VEHICLE BY GSM &GPS WITH
FINGERPRINTVERIFICATION USING EMBEDDED SYSTEM
Ajitha A,Justinae,Mrs.A.Rublin Beulah
KINGS ENGINEERING COLLEGE
Abstract -In this current world where technology is growing up day by day
andscientific researchers are presenting new era of discoveries, the need forsecurity is
also increasing in all areas. At present, the vehicle usage isbasic necessity for everyone.
Simultaneously, protecting the vehicleagainst theft is also very important. Traditional
vehicle security systemdepends on many sensors and cost is also high.When the
vehicle is stolen, no more response or alternative could beavailable to help the owner
of the vehicle to find it back. The main goalof this paper is to protect the vehicle from
any unauthorized access, usingfast, easy-to- use, clear, reliable and economical
fingerprint recognitiontechnique. This vehicle security system intimates the status of
the vehicleto the authoritative person (owner) using Global System for Mobile (GSM)
communication technology. If the person is certified, vehicle access is allowed. Else
SMS will be sentto the owner and the engine will be immobilized. The prototype
modelfor the security system is built on the embedded platform using PIC
microcontroller which controls all the processes and cost is also very stumpy.On higher
end theft attempts like cutting battery power supply, protectionto the vehicle is
provided by Engine Control Unit (ECU) embedded onmicrocontroller.By using GPS
technology, vehicle can be identified very easily. Thus, thesystem provides security at
both levels, i.e. when battery supply isprovided or not. The main aim of this project is
to prevent the vehiclefrom probable theft. To achieve this we are incorporating security
byincluding bio metrics, i.e. a fingerprint.In the beginning the owner of the vehicle
must store his/her ownfingerprint in the finger print module. The GSM modem is used
to sendand receive messages to and from the owner. The owner‘s mobile numberhas to
be set fixed during the coding.To start the ignition of the four- wheeler one should
enter the authorizedfingerprint. If anyone enters an unregistered fingerprint, the owner
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 115
Sensorless Control of interior Permanent Magnet Synchronous Motor Drives
With Cyclic Fluctuating Load Based on MRAS Scheme
M.Barath,R.Thirumaran,Mr.S.Muthupandian
KINGS ENGINEERING COLLEGE
Abstract: Model reference adaptive system (MRAS) is typically employed for rotor
position/ speed estimation in sensorless interior permanent magnet motor (IPMSM)
drives. In this paper , a new MRAS scheme based on fuzzy logic is proposed in order
to avoid the difficulties involved with manual tuning of the control parameters and also
fuzzy controller replaces the conventional PI regulator. This control scheme consists of
two models, namely current model of the IPMSM as the adjustable model, and the
motor itself as the reference model. The difference between the outputs of the two
models gives the estimated value of the rotor speed through a adaptive mechanism and
position can be obtained by integrating the speed. In order to lower the motor speed
ripple caused by the cyclic fluctuating load, a feed- forward compensation strategy
with the load-matching motor output torque pattern is developed. The proposed system
has to be implemented in MATLABsimulink.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 116
Virtual Instruments Based Water Quality Measurement System Using Fuzzy
Logic
V.Narayana Vadivu,K.Jeevarani,Mr.R.Nagaraj
KINGS ENGINEERING COLLEGE
Abstract— Water is vitally important to every aspect of our lives. Monitoring the
quality of the drinking water is essential as polluted water can cause deadly diseases. In
this paper different physical and chemical water quality parameter like pH, turbidity,
conductivity, total dissolved solids(TDS) and dissolved oxygen etc. are measured using
different sensors. The data obtained from these sensors will be sent to the PC
(LabVIEW) where this data is analysed, and the water quality indicators are compared
with the reference data provided by Indian Standards Institute (ISI) and Bureau of
Indian Standards(BIS) and results are displayed as per the requirement. This paper
proposes the technique to combine and infer the multi-sensor data to get the water
quality result, by which accurate results can be obtained. As the water quality is
subjective by nature and highly indeterminate, which causes uncertainties in the data.
To overcome data uncertainties problem, this paper proposes fuzzy logic model for
acquiring the accurate waterquality.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 117
Artificial neural network based intelligent flow transmitter
Mathana Thamarai P,A.Rishwana,Mr.S.Suthagar
KINGS ENGINEERING COLLEGE
Abstract— A variable area type flow meter called rotameter, a measuring instrument
in which position of the float in a transparent tube is taken as flow rate indicator which
is used for local indication . It is used as a primary sensor. For remote indication float
moment of rotameter is converted into electrical signal which helps in the process
industries. For non contact flow measurement a hall probe sensor should be placed
outside the rotameter which acts as secondary sensor. A circular permanent magnet is
placed on the float of the rotameter , as water flow through the rotameter the float
increases and the magnet varies its position and the hall sensor sense the change in
magnetic field created by the magnet. The hall voltage varies with different parameters
like temperature, liquid density, viscosity……etc affect the hall voltage measurement.
Temperature is non linear with respect to the hall voltage. The hall sensor output is
amplified by instrumentation amplifier and that is given as input to the ANN.
Implemenation of ANN is done in three steps which are sampling, training and testing
process. Training is the learning process. The difference between the network output
and desired output is the error signal to ANN. If the network output is not equal to the
desired output then by weight adjustment ANN tries to give the output which is close
to the the desired output. This output is converted again to flow throughprogramming.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 118
CROSS CHANNEL HEARING AID USING BONE CONDUCTION
J.Bala Karthick,S.Siva,Mr.S.Rajkumar
KINGS ENGINEERING COLLEGE
Abstract: Hearing aid was the only cure for people who have audibilityissues. But in
the case of people with ear drum damage, the hearingaid cannot be a possible solution.
So as to overcome this difficulty wehave to surpass the ear drum and send the signals
in the form ofvibration to the inner ear technically known as Cochela. This thuspasses
the sound signal to the brain receptors. We have come up withan idea where we use a
bone conductor to do the above process in therespective sequence to surpass the ear
drum and enhance the hearingcapability of people with less or no hearing capability.
This can be aviable technology that aids people who are deaf and dumb by birthdue to
genetic disorder to listen to their own voice and learn to speak.This could be a major
breakthrough in the hearing enhancement andcan change the way of life for various
people.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 119
DETECTION AND DELETING THE MISUSE OF MORPHED IMAGES IN
SOCIAL NETWORKS USING FSIB ALGORITHM
S.Anand,M.Sivasangeetha,Mrs.A.R.Venmathi
KINGS ENGINEERING COLLEGE
ABSTRACT :In recent times , the society has facing an impact of morphing their
snaps from social medias and internet. This paper presents a new technology to stop
misusing of unauthenticated images in social networks and internet , we propose an
application to secure all kinds of human images from being misused. Most of the
people use social networks and Internet sites for uploading misused human images.
Here, we propose an algorithm called FSIB algorithm (i.e.) Face Skin Image
Background analytical model. With the help of this algorithm we can easily predict
whether, the image is being misused or not. And our proposed system, detect and
delete such kinds of misused images permanently from the source.
keywords-Face Recognition, Skin Segmentation, Face Skin Image Background
analytical model (FSIB algorithm)
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 120
SMART HELMET USING GPS AND GSM FOR ACCIDENT DETECTION
P.Suganthi,M.Anitha,Mrs.V.Kavitha
KINGS ENGINEERING COLLEGE
Abstract - In today‘s world the number of road traffic accidents due to motorcyclists
has drastically increased. In order to reduce death caused by road accidents, we have
been implementing an accident detection system inside the helmet, which is the first
and foremost precaution device used to avoid death and to protect head.
Keywords- Smart technology, Artificial Intelligence, User friendly, GSM, GPS
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 121
HIGH SECURITY LOCKER
Amritha K,Arjithc,Mr.A.N.Duraivel
KINGS ENGINEERING COLLEGE
Abstract: Nowadays, SECURITY is a very big problem. Be it our House, phone or
other things. This project is to secure a locker using a stringent combination of iris
scanner and finger print scanner to avoid theft. Two different people can be the securer
of it. Hence to open the locker the permission of both is required. The above mentioned
security methods can be brought under an app to control it via IOT thusalerting the
owner of any intrusion. Finger print verification is a reliable personal identification
method. However, manual fingerprint verification is so tedious, time-consuming that it
is not suitable for the fast moving world. An automatic fingerprint identification system
(AFIS) is widely needed to bridge this gap. AN iris coding method for effective
recognition of an individual is also used in this project. Bringing them both together
enables us to be more secure and any intrusion is alerted through the app which can be
installed in the owner's phone. Thus, this becomes the ultimate security for us.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 122
ENVIRONMENTAL MONITORING USING WIRELESS SENSOR
NETWORKS (WSN) BASED ON IOT.
Dilmaya T,Mayas,Mrs.A.Sarala
KINGS ENGINEERING COLLEGE
Abstract - In recent years, we have seen a new era of shortrange wireless technologies
like Wi-Fi, Bluetooth [7], ZigBee[6], emerging in front of us. The project aims at
building asystem which can be used on universally at any scale tomonitor the
parameters in each environment. Raspberry-piand sensors collects all the real-time data
from environmentand this real-time data is fetched by the web server anddisplay it.
User can access this data from anywhere throughInternet. Raspberry Pi works as a base
station which connectsthe number of distributed sensor nodes via
zigbeeprotocol.Wireless Sensor Networks (WSN) has been employed to collectdata
about physical phenomenon in various applications suchas habitat monitoring. The
Internet of Things (IoTs) can bedescribed as connecting everyday objects like smart-
phones,Internet TVs, sensors and actuators to the Internet where thedevices are
intelligently linked together enabling new forms ofcommunication between things and
people, and betweenthings themselves. In wireless sensor network system, thesensor
node sense the data from the sensor and that datacollects the end tags, end tags send its
data to the router androuter to coordinator and supply multi-clients servicesincluding
data display, the whole data will be stored in basestation and the stored data will send
to the cloud (Ethernet)and the client can visit the base station remotely via
(website)Ethernet. Such a sensor are temperature, vibration, pressure,moisture, light,
andpollution.
Key Words: (Raspberry pi; Zigbee; Sensor node;Sensors)
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 123
IOT THEFT DETECTION USING RASPBERRY PI WITH FACE
RECOGNISATION CAMERA
Jeya Mani R,Jothis,Mr.S.Muthupandian
KINGS ENGINEERING COLLEGE
Abstract: Here we propose IOT based theft detection project using Raspberry Pi where
we use image processing on live video to detect theft using motion and also highlight
the area where motion occurred. Along with this we are using face recognition camera
here to identify the thief face if he/she uses a mask. This system secures offices/homes
from theft by instantly detecting theft as well as allowing user to view the theft details
thereby highlighting the theft details and saving the video in a USB drive. In this
system we use acamera along with raspberry pi along with LCD display IR for night
vision and USB drive for storage. The system is powered by a12V power supply. As
soon as camera motion is detected in camera footage the system uses image processing
to detect exact area of motion occurrence and highlights it accordingly. The system
now transmits the images of the occurrences over IOT to be viewed by user offline. We
here use IOT Gecko to develop the online system. Also it stores footage in a USB drive
for further reference. The user can now decode the data sent online using IOT
GeckoIOT system to view the images of the motion occurrence live remotely over
internet. Thus the system provides an innovative approach to theft detection usingIOT.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 124
SECURE IDENTITY BASED DIGITAL SIGNATURE SCHEME FOR
WIRELESS SENSOR NETWORKS
ELANGO T,ANBUR,Mrs.E.Verginsheeba
KINGS ENGINEERING COLLEGE
Abstract: Wireless spoofing attacks are easy to launch, it plays a significant role in the
performance of wireless sensor networks. Although the identity of a node can be
verified through cryptographic authentication, conventional security approaches are not
always desirable because of their overhead requirements. The challenging tasks in
Wireless Sensor Network are identification of spoofing attackers, determination of
number of attackers, localization of multiple adversaries and eliminating them. The
clustering approach is used to detect the spoofing attackers and localize them. This
approach fails to predict the attackers accurately. To overcome this problem, this
project proposes Intrusion Detection System (IDS) to detect the spoofing attackers. The
cluster head act, as IDS to monitor the behavior of nodes in their cluster such as packet
transmission which helps to identify the misbehaving nodes in wireless sensor network.
The simulation result clearly shows that the proposed scheme detects the spoofing
attackers in Wireless Sensor Network efficiently and robustly.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 125
PRECODER DESIGN FOR MIMO RELAY COMMUNICATION USING DF
PROTOCOL
T.Arun,Chirsty.S,Ms.C.V.Umamaheshwari
KINGS ENGINEERING COLLEGE
Abstract: In the present world, due to rapid growth in communication there is a need
to improve transmission of the data over wireless media so as to achieve the demand of
fast and feasible communication. To meet the above, it is required to have better and
improved throughput, data rates, BER and quality of signals received at the receiving
end of the system in advanced wireless communication. These parameters mainly
depend on the antennas used in transmitting and receiving end of transmitter and also
on external disturbances introduced in the form of noise in the system. The antenna that
attains all the parameter value at optimum level is MIMO antenna. Multiple Input and
Multiple Output (MIMO) is a smart antenna technology which employs multiple -
antennas at both ends of the transmitter and receiver side in order to improve
communication performance Relays which receive signals from the base station and
forward to destination, thus destination is able to obtain another copy of the original
signal with directly transmitted signal from source which leads to Joint diversity
effects. With the use of MIMO communication techniques, multipath need not be a
hindrance and can be exploited to increase potential data rates and simultaneously
improve robustness of the wireless links. This paper provides a detailed explanation of
this MIMO technology using DF protocol and improves BER performance by precoder
design in transmitter side and to reduce the complexity in receiver by having an
efficient equalizer design.The major objective is to analyse the performance such as
sum rate capacity and bit error rate based on robust linear precodingtechniques.This
technique provides enhanced capacity even under conditions of interference, signal
fading, and multipath.
KEYWORDS: MIMO,relay,decode and forward,fading.ISI, precoding, diversity.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 126
CT AND PET MEDICAL IMAGE FUSION USING WAVELET TRANSFORM
RESTORED BY ITERATIVE WIENER FILTER
Thulasi T,Ramyak,Mrs.S.Sharonsweeti
KINGS ENGINEERING COLLEGE
Abstract-Image fusion provides easy access for physician to detect abnormalities and
provide early treatment. CT image gives information about anatomical structure of
organs whereas PET scanning gives us information about fluid flow and glucose
metabolism of tissues. Hence, fusing CT and PET images can get information
regarding both anatomical structure and fluid flow. Still, enhancement is required for
fused image. Additive kind of noises is added in the fused image. These degraded
images can affect the performance quality of systems such as Medical object
recognition system. It leads to misunderstanding or misguiding by doctors to the affects
person. The main objective of this project is to restore the detailed information about
abnormalities in PET and CT images Image fusion provides easy access for physician
to detect abnormalities and by applying 3-Level DWT, and enhance the quality of
fused image by using adaptive Weiner filter which removes the additive noises present
in the fusedimage
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 127
AN IOT APPLICATION FOR STOCK MANAGEMENT AND GOODS
ANALYSIS
Julia K,Sherins,Mrs.R.Roseminthanga Joy
KINGS ENGINEERING COLLEGE
Abstract: People nowadays are busy running their routine life and they don‘t even
have time to check what‘s available in the kitchen. An IoT application for stock
management and goods analysis is an iotapplication.ThisIoT application is used for
automatically maintaining the kitchen stuffs and also update the availability of
remaining grocery items and food items at home. This application updates can be used
when a user goes for shopping in any marts. This makes the user to feel a kitchen
friendly environment.
Keywords: Kitchen friendly, IoT, automatic maintenance,Stock.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 128
IMPLEMENTATION OF IMAGE FEEDING AND FACE RECOGNITION
USING OPENCV IN ROBOTICS
Jesica S,Edwartp,Mrs.L.Ajitha
KINGS ENGINEERING COLLEGE
Abstract: This paper aims at picking Face Recognition to a spot where the system
replaces the use of identity cards or any other RF cards for security purpose. Face
Recognition is the most reliable and efficient technology that is being used currently. A
system of a kind can recognise the face which is an extreme invasion of privacy. The
technology used here allows to interact more easily with the environment. This
technology can be combined with an artificial intelligence for realistic interactions with
humans. The systemuses HASH function Algorithm for the recognition for the face.
This project uses a developer board as an implementation platform. With the use of this
technology we aim at the making the system cost effective, eco- friendly and easy to
maintain with future proof.
Keywords: Hash, Face Recognition.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 129
UNDERWATER IMAGE ENHANCEMENT USING EMD
J Gracy,C.A. Humsarubini,Mr.R.Devaraj
KINGS ENGINEERING COLLEGE
Abstract: Underwater images play a vital role in the research of historical monument.
Undersea has a large area for submerging these monuments. Natural disaster such as
tsunami, flood unearthed some of the treasures long hidden. Recent study of these
treasures, by March 6, 2018, an US aircraft has been discovered by the expedition view
of research places have submerged. An ancient continent called kumarikandam,
sandwiched between India and Madagascar now lies scattered on the bottom of Indian
Ocean. After decades, the monuments, pillars, steps and many scattered stone blocks
were discovered. Also, another incident occurred during 2004 have explored the
monument, temple structure of Mahabalipuram. The Tsunami which pulled the sea
back about 500m and rushed back the water to the land contained the objects include
large stone lion, half completed rock relief of an elephant. Several studies and
excavation have been made and are being made by the Archeological society of India
(ASI) with the help of the Navy. Archaeologists have been working at the site to
discover the submerged treasures and monuments. To discover and capture the
submerged objects many devices have been used called Underwater Remotely
Operated Vehicle. But the image capture by this device results in low resolution. So to
enhance the quality of underwater or acoustic image many techniques have been
employed, but the result obtained from the technique does not provide the clarity
enhanced image. In this paper, to improve the low-quality image, an enhancement
algorithm has developed Empirical Mode Decomposition ( EMD ) used to decompose
the signal. Initially, the image is separated into R, G, B channel. Then, Intrinsic Mode
Function(IMF) is obtained by finding the mean of upper envelope and lower envelope..
Keywords: Underwater, Enhancement, EMD.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 130
REAL TIME OPERATING SYSTEM FOR THE PREVENTION OF HUMAN
HEALTH HAZARDS DUE TO TOXIC GASES
A. Induza,Janani.M,Mrs.R.Usha
KINGS ENGINEERING COLLEGE
Abstract- Almost every process or activity leaves behind some kind of waste in the
environment. In our project we would like to emphasize upon the toxic gases cast out
as waste into our surrounding. While the recent technology has led to the production of
many gas detectors which can be used in order to prevent dangerous events in
industries, our work is mainly focused on bringing into limelight the use of
semiconductor sensors for the same. This gas detector is capable of detecting multiple
gases and after which consequently produces an alarm. This alarm not only alerts the
workers in charge but also produces immediate response to activate the gas purification
process carried out by the gas purifier. Thus the hazardous gas is eliminated without
causing any harm to the nearby life and property.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 131
SENSOR BASED AUTOMATED IRRIGATION SYSTEM
G.Jenifer Sweety,P. Jerin,Mrs.T.Meena
KINGS ENGINEERING COLLEGE
Abstract-India is an Agricultural country, wherein about 70% of the people depend on
agriculture. An irrigation system was developed to optimize water use for agricultural
crops. The main objective of the proposed system is to provide an automated irrigation
system thereby saving time, money and power of the farmer. During summers, most
people are too lazy to water the potted plants on their rooftop lands. A system that will
help a farmer to know his field status in his home. Currently the automation role is one
of the important roles in the human life. This proposed system uses Arduino board,
which consists of ATmega328 Microcontroller. Here the humidity is monitored by
moisture sensor that can be converted in to corresponding signals to the
microcontroller. The main features of this proposed system are to sense the moisture
content of the soil and automatically switch the pump when the power is on. A proper
usage of irrigation system very important because the main reason is the shortage of
land reserved water due to lack of rain, unplanned use of water as a result large amount
of water goes waste. For this reason, we use this
automaticirrigationsystem,andthissystemisveryusefulinallclimaticconditions.
Keywords-ATmega328 Microcontroller, Moisture sensor, GSM, LCD, Wind shield
washer pump.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 132
PERFORMANCE ANALYSIS OF SEPIC AND M-SEPIC ON BLDC MOTOR
S. Jeyanthkumar,Josephmathew,Mr.R.Senthilnadhan
KINGS ENGINEERING COLLEGE
Abstract-In the recent years, Brushless DC motors are being extensively used and
becoming a serious competitors to induction motors for servo applications. Hence, it is
suggested that they are implemented in the fly-by-wire system of a flight where now
servomotors and induction motors are being used. The BLDCmotors are durable and
high speed motors. They have precise speed control techniques and less noise emission
which makes them very applicable for driving systems. To get an optimized output
from the motor, a compatible converteris a need. So an extensive comparative study of
the conventional boost converter, cuk converter, SEPIC and MSEPIC is done for the
BLDC motor. Each converter was designed and simulated in MATLAB and the SEPIC
and M-SEPIC were chosen for detailed study as they are a combination of buck and
boost but with a non-inverted output. The converter is connected to the three phase
A.C. BLDC motor through an inverter. Sinusoidal output waves were generated by
using both PWM and SPWM pulses. A three phase six step inverter is used in the
simulation. It is seen from the simulation results that the MSEPIC hasahigh static gain
and hence produce high output voltage levels for small input values. This system of
driving the BLDC motor using the modified SEPIC topology can be implemented in
driving systems where high efficiency is demanded.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 133
SMART CURRENT THEFT DETECTION AND POWER DISCONTINUITY
MONITORING USING LabVIEW
Jothi Priya.K,Judsonabraham,Mrs.S.Lekhasri
KINGS ENGINEERING COLLEGE
Abstract-With emerging developments in all sectors and growing demands, electricity
has become priority for every individual and every organization. The basic procedure
for power supply includes power generation, power transmission and power
distribution to the destinations. When power reaches every house often there arises
issues like abrupt changes in voltage which can damage the home appliances. Similarly
another issue faced nowadays is the theft of current and discontinuity due to
atmospheric causes. Our project focuses on providing a detecting technique for these
cases and intimating the concerned person about the event. Labview tool is used to
design a program for detecting and intimating about the low voltage problem, power
discontinuity and current theft occurrence. A communication application, specially
designed for
LabVIEW,called―Dashboard‖isconnectedthroughwifiandusedforreceivingmessages.Aha
rdwarecircuit is designed for acquiring input and through myRIO kit the analog signal
is given into the labVIEW. The processing takes place in labview and the output
isgenerated.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 134
A MODERN USER DESIRED DRONECONTROLLING SYSTEM
USING MOTION DETECTION SENSOR
M. Karthik,M. Karthika,Mr.S.Rajkumar
KINGS ENGINEERING COLLEGE
Abstract-The technologies are increasing at a faster pace. It is known that the
utilization of technologies in various sectors are very low. So we propose a system
where we enable virtual load operating technique with the help of MOTION
DETECTION sensor. The MOTION DETECTION sensor technique is used to detect
the orientation of user‘s hand motion. Based on the hand motions the respective droneis
operated. The operation is executed using hand gestures.Abstract—Augmented and/or
virtual reality (AR/VR) are (5G) networks. To meet the requirements of lower latency
and massive data transmission in AR/VR applications, a solution with software-defined
networking (SDN) architecture is proposed for 5G small cell networks. On this basis, a
multi-path cooperative route (MCR) scheme is proposed to facilitate the AR/VR
wireless transmissions in 5G small cell networks, in which the delay of MCR scheme is
analytically studied. Furthermore, a Service Effective Energy optimization (SEEM)
algorithm is developed for AR/VR wireless transmission in 5G small cell networks.
Simulation results indicate that both the delay and service effective energy (SEE) of the
proposed MCR scheme outperform the delay and SEE of the conventional single path
route scheme in 5G small .
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 135
EMERGENCY CAR DOOR LOCKING SYSTEM USINGRASPBERRY PI
A.Udhuman Shariff,V. Varsha,Mrs.S.Sharonsweeti
KINGS ENGINEERING COLLEGE
ABSTRACT-The safety locking system is designed to prevent accidents happening
while opening the car door and to provide safety to passengers and pedestrians. To
prevent accident due to passenger‘s carelessness, in this planned to control the car door
locking automatically using distance measuring system, child lock and Camera. Due to
this passenger can‘t open their car door from inside while object is moving towards the
car. The entire system is controlled with the help of Raspberry PI. In this proposed
system it will be fitted with a distance measuring Camera in car. This camera sends and
receives the signal near the outer surface of the car door. Due to this if any object
approaches the car, the signal gets reflect and received by the receiver by using camera.
Due to quick return of the signal, the Raspberry sends signal to the door lock and it get
activates according to the program performed on the Raspberry. Due to this the
passengers can‘t open the car from inside, so sudden opening can be prevented. But we
can open the car from outside. If the object/person moved then the signal passes long
distance and the receiving time get increased, so the controller sends the signal to the
lock and it comes back to its original position.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 136
Design and Fabrication of Multifuel Engine
Thirunavukarasu.K,Ltanya,Mr.S.Suthagar
KINGS ENGINEERING COLLEGE
Abstract: In this we have done the engine to run with the following fuel and gases:-
petrol, Lpg, Kerosene, HHO. We have studied the basic properties of fuel and gases.
From this gas generated throughout electrolysis of water and then this gas is used in
vehicle as a fuel with gasoline by mixing it with air. This results the increased mileage
of vehicle 30% to 60% and reduces the polluting contents from the exhaust gases.
Taking a prominent place in these strategic plans in hydrogen as a future energy
carrier. Hydrogen gas combined with the standard air/fuel mixture increases the
mileage. This forms of alternative fuel is provided by a hydrogen generator mounted in
the vehicle. Here in addition hydrogen generating unit is made to produce hydrogen. It
is actually an electrolysis unit having high grade stainless steel, graphite,
semiconductors as electrodes in a closed container and mixture of distilled water and
suitable ionic solution (KOH or NAOH) as electrolyte. Power for electrolysis is taken
from battery provided(12V). This battery can be reached from a dynamo/alternator
provided on the vehicle.
Keywords – KOH, NAOH,SI-Engine, Electrolysis of water, Hydrogen Cell.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 137
INVESTIGATION ON WEAR AND MECHANICAL ANALYSIS OF WOVEN
SISAL, JUTE, FLAX / REINFORCED WITH CALCIUM CARBONATE AS
FILLER EPOXY COMPOSITE
Suganya.N,Mstephenraphel.Jrs.A.Rublinbeulah
KINGS ENGINEERING COLLEGE
Abstract: Today, polymers are commonly used in various application from day to day
consumable to highly sophisticated equipment. This wide ranging application of
polymers makes it difficult to avoid its usage, even though it cause environmental
problem. Polymers have replaced by many conventional material. Natural plays an
important role in developing high performing fully biodegradable green composites,
which will be a key material to solve environmental problem in future. easily
decomposable and recycle polymeric material and their composite along with nature
fibres ignited from this investigation we found the good tensile flexural property of the
composite the natural fibre slowly replace the synthetic fibre from its environment
impact machining flexural property of the composite the natural fibre slowly replace
the synthetic fibre from its environment impact machining towards a revolution in
engineering material in this project work tensile, flexural, impact and hardness test is
made for the sisal, jute and flax reinforced with filler of barium sulphate and without
fillermaterial.
Key Words :Composite materials, Hybrid composites, Sisal fiber, Jute fiber, Flax
fiber, Epoxy
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 138
EVOLUTION OF MECHANICAL PROPERTY OF WOVEN HEMP / FLAX
REINFORCED WITH BARIUM SULPHATE AS AN FILLER EPOXY
COMPOSITE
S. P. Sriram,Sowmyadharini,Mr.R.Nagaraj
KINGS ENGINEERING COLLEGE
ABSTRACT: Today, polymers are commonly used in various application from day to
day consumable to highly sophisticated equipment. This wide ranging application of
polymers makes it difficult to avoid its usage, even though it cause environmental
problem. Polymers have replaced by many conventional material. Natural plays an
important role in developing high performing fully biodegradable green composites,
which will be a key material to solve environmental problem in future. In this work, the
experiment of tensile, flexural, impact, and hardness test were carried out for woven
sisal, jute and flax fiber reinforced with barium sulphate as an filler material. The hand
layup method of fabrication was employed in preparing one composites. The surface
morphology of the composites was examined through scanning electron microscope.
Due the low density and high -specific properties of fiber composites, it offer cost
saving when compare with synthetic fiber, hence it has very good implication in the
automotive and transportation industry. The go green concept result in multipoint focus
towards material made from nature from its environment impact machining towards a
revolution in engineering material in this project work tensile, flexural, impact and
hardness test is made for the hemp and flax reinforced with filler of barium sulphate
and without filler material.
Key Words :Composite materials, Hybrid composites, Epoxy, Barium Sulphate as a
filler material.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 139
DESIGN AND FABRICATION OF MANUALLY OPERATED PESTICIDES
SPRAYER.
P.S. Smruthi,K.Sivasankari,Mrs.L.Ajitha
KINGS ENGINEERING COLLEGE
ABSTRACT: Indian is said to be an agricultural base country directly or indirectly
75% of the people are dependent on Farming. This wheel operated pesticide sprayer
equipment consumes less time and achieves uniform nozzle pressure crank mechanism
with piston pump which is driven by the wheel is also used. The main aim of the
project is to develop low cost mechanically operated sprayer for Indian middle scale
farmers.
Key words: Farming, Pesticides, sprayer equipment.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 140
Bi Directional Centrifugal Braking System
A.Anisha Priya,S.Anudev,Mr.A.L.Duraivel
KINGS ENGINEERING COLLEGE
Abstract: The Objective of this project is to stop a hoisted material from ground. The
brake acts as a failsafe device in case of emergency. When the winch unit fails to hold
the object and fails, the braking system will respond for the speed and stop the hoisted
material. This project is designed with centrifugal mechanism and fully works with
mechanical components. The electrical part is not added to the braking unit as
electricity is not always reliable. But limit switches and sensors can be added to the
brake unit in future based on the requirement so that the performance of the brake can
bemeasured.
Key word : Failsafe, centrifugal mechanisim.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 141
ACCURATE CERVICAL CELL SEPERATION FROM OVERLAPPING
CLUSTER IN PAP SMEAR IMAGES
Vedha Priya H,G. Vetrivel,Mr.Dr.A.V.Mayakannan
KINGS ENGINEERING COLLEGE
ABSTRACT: Seperation of cervical cells in Pap smear images is an important step in
pre-cancer identification Overlapping of cytoplasm is more challenging . Segment
individual cell in Pap smear images will be helpful for early detection of cervical
cancer. To tackle the overlapping issue, in this project a learning-based method is
proposed. The labeling results are then fed into physical deformation model for further
boundary refinement. convolutional networks are adopted to learn the cell appearance
features. An evalution is carried out using One data set The proposed method was
evaluated by 8 images of conventional papsmear. Comparisons with other
segmentation methods indicate that our method produces more accurate separation of
overlapped cluster.
Keywords: Cervical cancer, overlapping cells splitting, convolutional networks,
physical deformation model, Pap smear images
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 142
RECENT DEVELOPMENTS IN COMPUTER VISION-BASED GAIT
BIOMETRICS SYSTEM
G Merlin Linda1, G Themozhi2
Research Scholar, Faculty of Information and Communication Engineering, Anna
University, Chennai 600127, India
[email protected], [email protected]
Abstract: Gait biometrics has emerged as a lot of attention in computer vision
community due to its advantage of unobtrusiveness recognition at a relatively far
distance. Gait signifies verifying or identifying the individuals by their walking style.
The use of human walking movement plays an important role in identifying subjects
criminal activities, forensics and in surveillances applications. A vision-based gait
system for surveillance applications utilizes computer vision techniques to provide
intelligent support to police and government for common needs to sophisticated
technical assistance. Modeling the accessibility of vision-based gait recognition has
been considered as the huge challenging task for uncontrolled scenarios. This paper
provides a comprehensive survey of technical advancement in vision-based gait
biometric system. The survey emphasizes on six major issues involved in a general gait
biometric system, namely representation and history of gait, gait capturing methods,
approaches in gait, challenging factors that will affect gait recognition, framework of
gait biometric system, and gait applications
Keywords: Biometrics, Gait, Computer Vision, Human, Walking, Surveillances.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 143
A ROBOTIC MOTION CONTROL USING FINGER GESTURE
INTERACTION
Dr.M.DevaBrinda, Karthik.S,Mohankumar.S
Associate professor,Department of EEE, Amet university
E-mail: [email protected], [email protected]
Abstract:The use of hand gestures provides an attractive alternative to cumbersome
interface devices for human-computer interaction (HCI). However, the number of hand
gestures has not been fully explored for HCI application. It is necessary to achieve
more gestures as the command of interface like embedded system via wireless. This
paper proposed a method to recognize four different hand gestures. Using camera to get
images of hand actions without gloves and then current image transfer to the
microcontroller, control the interface of electrical appliances.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 144
DESIGN AND IMPLEMENTATION OF SMART BONE CONDUCTION
HEARING AID USING ASP
Dr.M.DevaBrinda, Karthik.s
Associate professor,Department of EEE, Amet university
E-mail: [email protected], [email protected]
Abstract: People with hearing loss problem, often use low quality analog hearing aids,
which are nothing but a simple ana- log audio amplifier or a passive audio
reinforcement system. They are generally less flexible and are simply designed
together sound energy and direct it into the ear canal at higher volumes. For persons
who are not compatible with Air Conduction system Bone conduction is used. At
present BAHA (Bone Anchored Hearing Aid) is used which needs surgery implant for
patients. The project aim is to design a smart earplug system integrated with non-
invasive bone conduction technique which is capable of doing some advanced audio
processing to provide voice enhancing, noise filtered audio for the hearing-impaired
people. The system is also designed to work as an embedded music player, a life
activity tracker and a Smartphone companion. It can even read the SMS that is just
received on your Smart phone into your ear
Index Terms—BAHA, Amplifier, MPEG, Audio Amplifier
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 145
ANALYSIS OF LEATHER TEXTURE AND DETECTION OF SEVERITY OF
DEFECTS USING IMAGE PROCESSING AND DECISION TREE BASED
MACHINE LEARNING TECHNIQUES
Abdul Jaleel@,JoyMathew@,MohamedFeroz@, SaburaBanu#
UG Student@, Professor#
Department of Electronics and Instrumentation Engineering
B.S. Abdur Rahman Crescent Institute of Science and Technology
Vandalur, Chennai
[email protected], [email protected]
Abstract- This paper deals with identification of different types of defects encountered
in leather hides using image processing techniques. The various types of defects
occurring in leather hides are pin holes, scars, looseness in leather, scratches, etc. The
main aim is to identify the type of defect occurred in leather. Manual inspection for
surface defects has a number of drawbacks, including subjectivity, varying standards
and high costs. Automatic inspection systems using image processing can overcome
many of these disadvantages and offer manufacturers an opportunity to significantly
improve quality and reduce costs. The identification of defect area in leather hides is
achieved by applying pre-processing techniques (filtering and thresholding) to the
leather images. The classification of defects encountered in leather hides is done with
the help of statistical data (kurtosis and skewness) obtained from the histogram of the
leather images using decision tree based machine learning techniques.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 146
VERSATILE INSOLE MONITORING SYSTEM
Dr. GnanaKousalya
Department Electronics and Communication Engineering
St. Joseph’s Institute of Technology Chennai, India
Abstract — The electronics, sensing technologies, data transmission, and data
processing methodologies of wearable systems are all principally dependent on the
target application. Current foot care relies on measuring the patient’s applied pressure,
and these measurements play a crucial role during patient rehabilitation. The insole
monitor consists of sensor-laden shoe insoles that can provide a more nuanced picture
of activity than by using wrist-worn monitor. We develop a fully integrated and
wireless sensor insole which can be used in any shoe to measure the distribution and
motion parameters for patients and athletes. The project mainly aims to use electronics,
sensing technologies, data transmission, and data processing methodologies to perform
gait , physical activity monitoring and provide biofeedback especially for diabetics and
peripheral arterial disease. We use wireless data transmission method like bluetooth
low energy(BLE) to send the sensor readings to the application developed for
monitoring. We use pressure, temperature and heart rate sensor to measure the
biological parameters. Inappropriate plantar stress after injuries or orthopedic surgery
can be recorded with the sensor insole and the entire recovery process can be
significantly improved. The insole can be used for everyday patient monitoring,
rehabilitation measures, and for training analysis in sports.
Keywords—Bluetooth Low Energy (BLE), sensor laden network, biofeedback.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 147
OFDM BASED COMB SOURCE FOR FUTURE OPTICAL NETWORKS
M.SAMAYARAJ MURALI KISHANLALa,*, DR.A.JAWAHARb
Associate Professor, Department. of Electronics and Communication Engineering, St.
Joseph’s Institute of Technology, Anna University, Chennai-119, India
bProfessor, SSN College of Engineering, Chennai, India
ABSTRACT - In this study it is focused to design an architecture for the future optical
networks based on PON ( Passive Optical Network) called as FGON (Future
Generation Optical Network). The FGON improves the efficiency and reliability of
optical networks in providing a seamless data transmission network by integrating the
three core concepts namely WDM, PON and OFDM. The proposed network also
supports ROF (radio over fiber) for extended coverage of optical signals through
wireless in unfavorable domains. In the FGON the input signals are given using a
unique technique of creating a dense signals using WDM by creating a uniform comb
like structure by using a dual arm Mach Zender Modulator based circuit whose output
has nine flat comb structures and then the modulation technique of OFDM is used for
enabling the WDM-OFDM-PON We study the performance of the signals generated by
the comb structure in a ROF based OFDM-PON simulation network where out of the
nine generated signals seven are used for wired network and one for wireless network
and one for common uplink channel the various parameters such as the received signal
strength FGON network, BER (Bit Error Rate) are noted and analyzed, and the
received signals propagation characteristics of the FGON is noted which will be
suitable for next generation optical access.
Keywords: OFCS: Optical Flat comb source, PON: Passive Optical Network FGON:
Future Generation Optical Network, ROF: Radio Over Fiber WDM: Wavelength
Division Multiplexing, OFDM: Orthogonal Frequency Division Multiplexing.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 148
DEPARTMENT
OF
MECHANICAL ENGINEERING
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 149
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 150
SAFETY AND SECURITY DRIVING USING GSM MODEM
Bavani R,Essakil,Mr.T.Kanagaraju
KINGS ENGINEERING COLLEGE
Abstract: A micro controller based alcohol detection system is designed with
additional Features like,eyeblink sensor, Alcohol sensor, fire sensor. Initially when the
alcohol sensor senses the presence of -OH group,the engine turns off and a message
will be sent to the vehicle owner indicating thatthe driver is drunken .Further , it has the
eye blink sensor to ensure whether the driver isdrunken/sleepy and wakes him
upwithabuzzer.Firesensorisincludedforthepurposeofmeasuringhazardousgasesandalsoto
detect smoke and fire . This methodology can also usedfor automatic window
unlocking technology which can be implemented in future .
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 151
EFFICIENT ALAMOUTI STBC ALGORITHM FOR MIMO- MULTI
CARRIER MODULATION TECHNIQUES
Camila John,Swethat,Mrs.K.Chinadurai
KINGS ENGINEERING COLLEGE
Abstract-In the present world, due to rapid growth in communication there is a need to
improve the transmission of the data over wireless media so as to achieve the demand
of fast and feasible communication. To meet the above it is required to have better and
improved throughput, data rates, BER, and quality of signals received at the receiving
end of the system in the end of the system in the wireless communication these
parameter mainly depends on the antennas used in transmitting and receiving end of
transmitter and also on the external disturbances introduced in the form of noise in the
system . The antenna that can attain all the parameter values at optimum level is MIMO
antenna .Apart from MIMO, we also have SISO,SIMO,MISO antennas available for
communication over radio channels. Among all the four methods of antennas,MIMO
gives the best diversity gain and it has got the ability to handle the external noise effect
in the most appropriate manner than the other so as to reconstruct the same signal at the
receiving end. In this paper,will analyze all the four methods of antenna by using Space
Time Block coding(STBC)algorithm. This gives the clear view regarding how the
signals are processed in all the four methods the four method of using the antennas and
what are the advantage and limitations of using each of them and what are limitations
in SISO,SIMO and MIMO which makes the MIMO technique the most suitable among
ofantennas.
KEYWORDS- SISO,SIMO,MISO,MIMO,OFDM,BER,SNR,Alamouti STBC,BPSK.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 152
LANDMINE DETECTION ROBOT
Ramayavathana V,Ranjithad,Mr.E.Artaralarasan
KINGS ENGINEERING COLLEGE
Abstract: The role of Robotic Applications in our day to day Life is just like food and
water. In reality it ranges from medical to military domain, many applications are
developed to ameliorate human life .Our Landmine detecting robot is a revolutionary
military advancement and a lifesaving invention that can benefit humanity as all. The
robot is guided by an android application that allows it to scan the infected area, while
a beat frequency oscillator is used as mine detection sensor placed on servo motor in
front of the vehicle. This paper proposes a design of a Landmine detecting sensor
vehicle and Implementing it into a Robot. The embedded proposed system is based on
ESP8266 technologies and guided by an Android Application.
Keywords: Robotics, Sensors, embedded system, Android Applications, ESP8266 wifi
module Technologies
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 153
IOT BASED FARMHAND BOT
Siva Subramanian,K.Vinothkumar,Mr.R.Jeremiah
KINGS ENGINEERING COLLEGE
Abstract-Agriculture provides employment opportunities for many people on large
scale in many countries. But nowadays people hesitate to take farming as their
profession. To overcome this, we have proposed the model that does the work
including ploughing, seeding and irrigation. The control of all the operation can be
done through mobile from any part of the world. It also gives alert on temperature,
climate, soil and fertility of the given land. This bot is capable of working 24 hours a
day all year round in all weather conditions. Bot mainly aims at making smart
agriculture using two techniques namely smart cultivation and smart control.
Controlling of these operations will be through any remote smart device or computer
connected to Internet and the operations will be performed by interfacing sensor, Wi-
Fi, actuators with micro controller and arduino.
Key words - IOT, automation, Wi-Fi, PIC controller.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 154
SECURE ROUTING AGAINST ACTIVE ATTACKS IN WIRELESS SENSOR
NETWORKS
Navitha Velvet,P.Niranchana,Mr.K.Chinadurai
KINGS ENGINEERING COLLEGE
Abstract-Wireless sensor networks are comprised of sensor nodes. Responsibility of
the sensor nodes is to sense the cluster members id parameters and forward this data to
cluster head. As the nodes are densely deployed, there is a possibility that the data is
redundant. So, in order to remove the redundancy, cluster head performs aggregation of
the data and forward this data to base station. Sensor networks have a limitation that
they are limited in energy. As Information and Communication Technology grows,
further digital communication becomes an unavoidable part in a collaborative
computing environment and such technologies have become a part of any organization.
In this project, we propose how the collaborative computing for a project environment
is carried out and Increasing lifetime in wireless sensor networks is a major challenge
because the nodes are equipped with low power battery. For increasing the lifetime of
the sensor nodes energy efficient routing is one solution which minimizes maintenance
cost and maximizes the overall performance of the nodes. Here, fuzzy protocol in
wireless sensor networks is also discussed which are
developedtoincreasethelifetimeofthenodes.Inaddition,bymakinguseoftrust,clusterscanbe
formed. One way of achieving energy efficiency and finding malicious is to use
clustering technique. In clustering, clusters of sensor nodes are formed and every
cluster has one cluster head.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 155
PULSE WIDTH MODULATION BASED ELECTROMAGNETIC
INTERFERENCE MITIGATION OF BIDIRECTIONAL GRID CONNECTED
FOR ELECTRICAL VEHICLES
A Kavipriyan,S.Keerthana,Mr.V.Ganesh
KINGS ENGINEERING COLLEGE
Abstract- Grid-Connected power converter offers the electric vehicle (EV) the ability
of exchanging the energy with the power grid, which can alleviate the peak load in the
power system. However, the switch-mode electronic device inevitably brings about the
electromagnetic interference (EMI) issue, thereby significantly deteriorating not only
the electromagnetic environment of the EV but also the stability of the smart grid. In
this project proposes a new pulse width modulation (PWM) technique for
electromagnetic interference mitigation of bi-directional grid connected converter, it is
aiming to improve the power quality of power grids and the working environment of
electric vehicles (EV). Because of the frequent energy exchange in vehicle to grid, the
Electric Vehicle electromagnetic environment becomes more complex, it damages the
normal operation of various auxiliary electronic devices so reduce the stability of
Electric Vehicles.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 156 ISBN 978-93-5268-343-8
SOLAR FED QUASI SWITCHED BUCK BOOST SIWAKOTI-H INVERTER
K Vignesh,K. Vineetha,Mr.T.Kangaraju
KINGS ENGINEERING COLLEGE
Abstract-This project proposes a new single-phase H-Bridge transformer less inverter
with common ground for grid connected photovoltaic systems (here after it is called
‗Siwakoti-H‘ inverter). The inverter works on the principle of flying capacitor and
consist of only four power switches (two reverse blocking IGBT‘s (RB-IGBT) and two
MOSFET‘s), a capacitor and a small filter at the output stage. The proposed topology
shares a common ground with the grid and the PV source. A Unipolar Sinusoidal Pulse
Width Modulation (SPWM) technique is used to modulate the inverter to minimize
switching loss, output current ripple and filter requirements. The main advantages of
the new inverter topology are the elimination of the leakage current and ability to
provide reactive power to the grid. Further, the peak of output ac voltage is equal to
input dc voltage (unlike NPC and ANPC type which requires two times of the peak ac-
voltage magnitude). Simulations as well as experimental results from a 1 kW proto
type are presented at the end of the paper to prove the concept and also the theoretical
analysispresented.
Keywords- photovoltaic systems (PV), ‗Siwakoti-H‘ inverter, Sinusoidal Pulse Width
Modulation (SPWM).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 157 ISBN 978-93-5268-343-8
ARTIFICIAL NEURAL NETWORK FOR CONTROL AND GRID
INTEGRATION OF RESIDENTIAL SOLAR PHOTOVOLTAIC SYSTEMS
Asha Imannuvel J,Raveenak,Mr.T.Ranjith Kumar
KINGS ENGINEERING COLLEGE
Abstract-Residential solar photovoltaic (PV) energy is becoming an increasingly
important part of the world's renewable energy. A residential solar PV array is usually
connected to the distribution grid through a single-phase inverter. Control of the single-
phase PV system should maximize the power output from the PV array while ensuring
overall system performance, safety, reliability, and controllability for interface with the
electricity grid. This paper has two main objectives. The first objective is to develop an
Artificial Neural Network (ANN) vector control strategy for a LCL-filter based single-
phase solar inverter. The ANN controller is trained to implement optimal control, based
on approximate dynamic programming. The second objective is to evaluate the
performance of the ANN-based solar PV system by (a) Simulating the PV system
behaviour for grid integration and maximum power extraction from solar PV array in a
realistic residential PV application (b) Building an experimental solar PV system for
hardware validation. The results demonstrate that a residential PV system using the
ANN control outperforms the PV system using the conventional standard vector
control method and proportional resonant control method in both simulation and
hardware implementation. This is also true in the presence of noise, disturbance,
distortion, and non- idealconditions.
Keywords- Artificial Neural Network (ANN), photovoltaic (PV), LCL-filter, Grid
Integration (GI), Maximum Power Extraction.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 158 ISBN 978-93-5268-343-8
SOLAR PV POWERED BLDC MOTOR DRIVE FOR WATER PUMPING
USING CUK CONVERTER
Camila John,Swethat,Mrs.E.Artralarasan
KINGS ENGINEERING COLLEGE
Abstract-A solar photovoltaic (SPV) powered brushless DC (BLDC) motor drive for
water pumping is presented in this paper. The current sensors of BLDC motor and the
voltage sensor at the DC bus of voltage source inverter (VSI) are eliminated
completely. Instead, the speed is controlled by adjusting the DC bus voltage of VSI.
The fundamental frequency switching pulses are generated to operate the VSI in order
to minimize the switching losses and to enhance the efficiency of proposed system. A
DCDC Cuk converter is utilized to operate the SPV array at its maximum power. The
starting current of BLDC motor is bounded by an optimal initialization and selection of
the control parameters, perturbation size and frequency while tracking the peak power
of SPV array. The performance of proposed BLDC motor drive is thoroughly evaluated
and its potential is demonstrated under realistic operating conditions. The simulated
results and an experimental validation along with a comprehensive comparison with
the existing techniques demonstrate prominence of the proposed drive for SPV based
water pumping.
Keywords-solar photovoltaic (SPV), Brushless DC Motor (BLDC), voltage source
inverter (VSI), DCDC Cuk converter.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 159 ISBN 978-93-5268-343-8
AUTOMATIC LOAD FREQUENCY CONTROL OF MULTI- AREA POWER
SYSTEM USING SOFT COMPUTING TECHNIQUES.
I.Elizabeth,M.Janetlisa,Mr.R.Jeremiah
KINGS ENGINEERING COLLEGE
Abstract- Proportional integral (PI) is crucial for the operation and design of modern
electric power systems. Proportional integral (PI) and proportional integral derivative
(PID) controllers are used to control the various parameters of multi area power
system. Due to high peak overshoot and settling time, conventional PI and PID
controllers are not preferred for large power system. The main motivation of this
project is to control the output frequency response with minimum peak overshoot and
settling time. This project presents an ANFIS based intelligent load frequency control
approach for three area power system with three control areas. The merit of the
proposed controlling technique is that it is faster than the automatic conventional
control techniques and is able to handle the non linearities simultaneously. Also the
maximum overshoot and the settling time of ANFIS based controller are lesser when
compared to the conventional controllers, thereby reducing the oscillations locally and
of inter-area. This effectiveness of the proposed controller in improving the dynamic
response is shown and validated in three area inter-connected system. Comparison in
performances of PI, PID control technique and ANFIS control approach is carried out
in MATLAB/SIMULINK software. The results validates that the ANFIS based
intelligent controller is faster than the conventional controller and have improved
dynamicresponse.
Keywords-Proportional integral (PI), Proportional integral (PI), proportional integral
derivative (PID), ANFIScontroller.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 160 ISBN 978-93-5268-343-8
POWER QUALITY IMPROVEMENT IN MICRO GRID USING UPFC
Savitha S,Sankkarir,Mr.P.Manigandan
KINGS ENGINEERING COLLEGE
Abstract-This project investigates the enhancement in voltage stability margin as well
as the improvement in the power transfer capability in a micro-grid power system with
the incorporation of UPFC. Flexible AC transmission system (FACTS) devices uses
power electronics components to maintain controllability and capability of electrical
power system FACTS controller includes unified power flow controller (UPFC), Static
synchronous compensators (STATCOMs), Thyristor controlled series compensators
(TCCs), Static series synchronous compensators (SSSCs) and Static VAR
compensators (SVCs), are able to modify voltage, phase angle and impedance at
particular bus in a power system. The (UPFC) is the most versatile and complex power
electronic equipment that has emerged for the control and optimization of power flow
in electrical power transmission system. A simple transmission line system is modelled
in Matlab/Simulink environment. The load flow results are first obtained for an
uncompensated system, and the voltage and power (real and reactive power) profiles
are studied. The results so obtained are compared with the result obtained after
compensating the system using UPFC to show the voltage stability margin
enhancement. All the simulating for the above work has been carried out using
Matlab/Simulink software.
Keywords- Flexible AC Transmission System (FACTS), unified power flow controller
(UPFC), Static synchronous compensators (STATCOMs), Static series synchronous
compensators (SSSCs), voltage stability margin.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 161 ISBN 978-93-5268-343-8
A HYBRID RESONANT CONVERTER FOR BETTER VOLTAGE
REGULATION FOR PHOTOVOLTAIC APPLICATIONS
Sabeena J,Shalinir,Mr.V,Ganesh
KINGS ENGINEERING COLLEGE
Abstract-A micro-converter serves as a front-end dc–dc stage of a micro-inverter to
convert the power from a photovoltaic module to a dc bus. These front-end micro-
converters require isolation, high-boost ratio, wide- input voltage regulation, and high
efficiency. This paper introduces an isolated resonant converter with hybrid modes of
operation to achieve wide-input regulation while still maintaining high efficiency. The
proposed converter is designed as a series resonant converter with nominal-input
voltage and operates under two additional modes: a boost converter with low-input
voltage and a buck converter with high-input voltage. Unlike conventional resonant
converters, this converter operates at discontinues conduction mode with a fixed
frequency, simplifying the design and control. In addition, this converter can achieve
zero-voltage switching (ZVS) and/or zero-current switching (ZCS) of the primary-side
MOSFETs, ZVS and/or ZCS of the secondary-side MOSFETs, and ZCS of output
diodes under all operating conditions. Experimental results using a 300-W prototype
achieve a peak efficiency of 98.1% and a California Energy Commission efficiency of
97.6% including all auxiliary and control power at nominal input voltage.
Keywords-zero-voltage switching (ZVS), zero-current switching (ZCS), photovoltaic
module, micro- inverter.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 162 ISBN 978-93-5268-343-8
DESIGN AND ANALYSIS OF A HIGH VOLTAGE-GAINSTEP- UP
RESONANT DC-DC CONVERTER FOR TRANSPORTATION
APPLICATIONS
Kavitha V S,Karanj,Mr.J.Dinakaran
KINGS ENGINEERING COLLEGE
Abstract- Tthe internal combustion engine (ICE) shaft to drive vehicle accessories.
PTO system is widely used in the specialty vehicles, such as utility truck, tractors,
construction vehicles, etc. In these vehicles, there are many electric loads to be driven
by the PTO system so that the shaft of the ICE is usually connected to a generator, as
shown in Fig. 1a. Some of the key challenges of this PTO system include low
efficiency, high consumption of the fossil fuel in the ICE running at idle, mechanical
system maintenance and lifetime. Electrification in this PTO system is a good solution
to address these challenges. With the development of energy storage system and power
electronics technology, now it is possible to realize the electric power take- off (ePTO)
system in such vehicles and its application can be expanded to other types of vehicles
such as ambulance, long haul trucks, transit bus, etc. which have several electric
accessory loads. The purpose of ePTO system is using electric power source such as
battery and fuel cell to drive the vehicle electric accessories while the ICE only
provides propulsion to the wheel. It can greatly reduce the fuel consumption at the
work site. The ePTO system shown in Fig. 1b requires power converter that can
transfer the lower voltage power from battery or fuel cell to drive the high voltage
electric loads. High voltage gain step-up DC- DC converters have become an essential
part of such application. Typical requirements for such converters are high voltage
gain, high efficiency, low cost, high power density, etc. Special requirements such
aslow current ripple would be necessary for fuel cell application because the current
ripple may greatly affect the fuel cell lifetime
Keywords- Power take-off (PTO), internal combustion engine, (ICE) electric power
take-off (ePTO), step- up DC-DC converters.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 163 ISBN 978-93-5268-343-8
MPPT IN DYNAMIC CONDITION OF PARTIALLY SHADED PV SYSTEM
BY USING WODE TECHNIQUE
Selena T,Anishn,Mr.Santhoshkumar
KINGS ENGINEERING COLLEGE
Abstract-This paper introduces a humpback whale hunting behaviour inspired whale
optimization with differential evolution(WODE) technique based tracking algorithm
for the maximum power point tracking in the dynamic as well as the steady-state
conditions of a partially shaded solar photovoltaic (PV) system. This
‗WODE‘ technique is used for quick and oscillation-free tracking of the global best
peak position in a few steps. The unique advantage of this algorithm for maximum
power point tracking (MPPT) in partially shaded condition is as, it is free from
common and generalized problems of other evolutionary techniques, like longer
convergence duration, a large number of search particles, steady state oscillation, heavy
computational burden etc, which creates power loss and oscillations in output .This
hybrid algorithm is tested in MATLAB simulation and verified on a developed
hardware of the solar PV system, which consists of multiple peaks in voltage-power
curve. Moreover, the tracking ability is compared with the state of the art methods. The
satisfactory steady-state and dynamic performances of the new hybrid technique under
variable irradiance and temperature levels show the superiority over the state of the art
controlmethods.
Keywords-Whale Optimization with Differential Evolution (WODE), Maximum
Power Point Tracking, photovoltaic (PV).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 164 ISBN 978-93-5268-343-8
CONTROL OF GENERATION, STORAGE AND ENERGY DEMAND
MANAGEMENT IN ISLANDED MICRO-GRIDS
P.Uma,K.Abinaya,Mr.J.D.Srinivasan
KINGS ENGINEERING COLLEGE
Abstract-Microgrid is a localized group of electrical sources and sinks that normally A
micro-grid can connect and disconnect from the main grid to enable it to operate in
both ‗on‘ grid and ‗off‘ grid (Island mode) modes. These micro-grids are smaller
energy systems that include generation, storage and demand management. The existing
micro-grid can control the amount of energy generated, stored and distributed. They
can also use these data for communication between the central system and the loads.
This paper enumerates method of energy generation based on demand, storage of
energy, managing the energy demand and communication among various components
(micro-sources, control systems, smart meters, and loads) in the Islanded micro-grid.
The proposed micro-grid will be able to obtain real time data of energy demand of the
connected loads, based on which the amount of energy to be generated by the micro-
sources is determined. This helps in eliminating surplus energy generation. The
generated power is not directly connected to the loads but via storage devices. By this
method, the generated power quality is maintained even when the load fluctuates. The
load fluctuations are observed and those data are communicated with centralized
source. The use of these micro-grids can improve the power reliability and produce
secure, flexible and efficient energy systems. Also, this paper provides space for
enthusiasts to develop in the areas of controlled smart grids and contribute to the
development of the perfect powersystems.
Keywords- Island mode, Micro-grid, smart grids, generation and storage, demand
management, power reliability.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 165 ISBN 978-93-5268-343-8
Power Line Fault Detection And Localization Using High Frequency
M.Rinosha,S.Arulmani,Mr.S.Hanishanand
KINGS ENGINEERING COLLEGE
Abstract-The reliability and quantity of electrical power networks are affected by the
occurrence of electrical fault. In this paper we propose a novel method to identify the
occurrence of fault in distribution network, based on impedance measurement
performed at the central distribution of the office .the measurement can be performed
using PLC modems that belong to the energy metering infrastructure. The fault is
detected by means of continuous impedance monitoring and afterwards its distance
from the central office is estimated using the same measurement traces, without
requiring additional information. Different type of fault is tested, and the effect of
measurement bandwidth and the electrical noise on the measurement is alsoassessed.
Keywords-Fault Identification, Distribution Network (DN), PLC modems, Continuous
Impedance Monitoring (CIM).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 166 ISBN 978-93-5268-343-8
AUTONOMOUS INTELLIGENT BOT-MOWER
Daniel Michael,Priyav,Mr.T.Ranjith Kumar
KINGS ENGINEERING COLLEGE
Abstract: In the last two decades, various robotic lawn mowers are developed to cut
grasses, but all those mowers are handled manually to trim the grasses with help of
trimming model attached in the system. It has been controlled through remote which
has to be held in hand for long time. It is observed that manual handling takes more
time to complete the work. So, the control unit of the system has automated in which
improves the system performance much more efficient. In this paper, the mowing
operation is automated by giving control input from mobile application. Thereby,
enhancing mowing operation and also improved the overall performance of the
trimming system. In near future this will be an effective application inmowers.
Keywords- mowing, trimming, trimmer, automated
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 167 ISBN 978-93-5268-343-8
ACCELEROMETER BASED WIRELESS HAND GESTURE CONTROLLING
ROBOT
Priyanga S,D.Rajkumar,Mr.Dr.Muniaraj
KINGS ENGINEERING COLLEGE
Abstract: Human life is precious Thus, we can use these robots to perform those tasks
that may be harmful for humans. This paper describes about the gesture control robot
with an arm which can be controlled by your normal hand gesture. It consists of mainly
two parts, one is transmitter part and another is receiver part. The transmitter will
transmit the signal according to the position of accelerometer and your hand gesture
and the receiver will receive the signal and make the robot move in respective
direction. Here, the program is designed by using Arduino IDE.
Keywords: Hand Gesture
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 168 ISBN 978-93-5268-343-8
SNIFFER FOR MOBILE PHONES
Mani Manthiram.S,S Maria Praveen,Mr.J.Dhinakaran
KINGS ENGINEERING COLLEGE
Abstract-The sniffer is a small base station, it includes transceiver section. It should
operate at a frequency that is much different from the frequency of the current cell in
which the operation of detection is being carried out. Some of the main important
things are the frequency that has to be generated by the transceiver section is around
900MHz range which is a VHF range and it is necessarily to design the oscillator
circuit for that frequency range. Another important is the cooling that has to be
provided to the circuit while designing the circuit that is to be operated at 900MHz
range of frequency. Hence proper design of base station is an important thing in the
design of the sniffer. Mobile phones as well as the base station has low power
transmitter is also transmitting at low power. The transmitter of the sniffer has to be a
low power transmitter. This helps in the process of reducing the interference of the
device with the devices that are in the othercells.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 169 ISBN 978-93-5268-343-8
WIRELESS THREE TANK SYSTEM
P MUGILAN,P. MUTHUMANIAN ,Mr.P.Manikandan
KINGS ENGINEERING COLLEGE
Abstract-The important part of a process industry is the analysis of chemical process
and controlling process variables by applying various control strategies. In level
process control, three tanks are connected in different fashions like they are purely non-
interacting, purely interacting and some are combinations of interacting and non-
interacting system. Our project is purely non-interacting three tank system. Laboratory
Virtual Instrumentation Engineering Workbench (LABVIEW) is used for simulation of
above processes.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 170 ISBN 978-93-5268-343-8
INTERNET OF THINGS BASED REAL TIME TRANSFORMER
PERFORMANCE MONITORING SYSTEM
Mythili,M.Nandagopal,Mr.E.Artalarasan
KINGS ENGINEERING COLLEGE
Abstract-An emerging field in Machine to Machine communication is Internet of
Things (IOT), which allows the possibility for autonomous devices to use the Internet
for exchanging data. This work presents design and execution of real time monitoring
and fault detection in transformers by recording key operation indicators of a
distribution transformer like load current, voltage, transformer oil temperature and gas
composition, which is sent to an online server with the help of an IOT module.
Through this project, we aim to minimize working efforts and improve the transformer
fault detection capability across the distribution
system.
Keywords-Internet of Things (IOT), Real Time Monitoring, Transformer Oil
Temperature, Gas Composition.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 171 ISBN 978-93-5268-343-8
DESIGN AND ANALYSIS OF 400/110 KV ELECTRICAL SUBSTATION
BASED ON LOAD FLOW ANALYSIS USING ETAP
S. Nithila,Mpadmapriyadarsini,Mr.R.Jeremiahlleg
KINGS ENGINEERING COLLEGE
Abstract-Power is essentially required for the development of any country. To
maintain the generation of electric power at adequate level the power has to be
transmitted in proper form and quality to the consumer. This research paper deals with
the simulation of 400/110 kV substation in Electrical Transient Analyzer Program
(ETAP) with detailed load flow analysis, short circuit analysis, harmonic analysis and
also to overcome the problem of an under voltage by using SVC. The results are based
on actual data received from 400/110 kV substation.
Keywords- Electrical Transient Analyzer Program (ETAP), Load Flow Analysis
(LFA), Static VAR Compensator (SVC), Short Circuit Analysis (SCA).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 172 ISBN 978-93-5268-343-8
A UNIFIED CONTROL AND POWER MANAGEMENT SCHEME FOR PV-
BATTERY-BASED HYBRID MICROGRIDS FOR BOTH GRID-CONNECTED
AND ISLANDED MODES
P. Vinitha Ramalakshmi,T. Vinothini,Mr.Hanish
KINGS ENGINEERING COLLEGE
Abstract-Battery storage is usually employed in Photovoltaic (PV) system to mitigate
the power fluctuations due to the characteristics of PV panels and solar irradiance.
Control schemes for PV-battery systems must be able to stabilize the bus voltages as
well as to control the power flows flexibly. This paper proposes a comprehensive
control and power management system (CAPMS) for PV-battery-based hybrid micro
grids with both AC and DC buses, for both grid-connected and islanded modes. The
proposed CAPMS is successful in regulating the DC and AC bus voltages and
frequency stably, controlling the voltage and power of each unit flexibly, and balancing
the power flows in the systems automatically under different operating circumstances,
regardless of disturbances from switching operating modes, fluctuations of irradiance
and temperature, and change ofloads.
Keywords- Photovoltaic (PV), comprehensive control and power management system
(CAPMS), Island Mode (IM), Micro Grids (MG).
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 173 ISBN 978-93-5268-343-8
DESIGN AND EXPERIMENT OF ADVANCED MULTI MODE PROPELLED
VEHICLE TO ENHANCE MAXIMUM EFFICIENCY
M.Anuratha,K.Srivashan,Dr.Muniaraj (P)
KINGS ENGINEERING COLLEGE
Abstract: An electric vehicle usually uses a battery which has been charged by
external electrical power supply. All recent electric vehicles present a drive on AC
power supplied motor. An inverter set is required to be connected with the battery
through which AC power is converted to DC power. During this conversion many
losses take place and also the maintenance cost of the AC System is very high. The
proposed topology has the most feasible solar/electric power generation system
mounted on the vehicle to charge the battery
duringalldurations.Withaviewofprovidingignitedustodevelopthis―Solar/ElectricPowered
Hybrid Vehicle‖ [SEPHV].This multi charging vehicle can charge itself from both solar
and electric power. When there is no presence of sun, electric power supply act as an
auxiliary energysource.
Keyword:electricvehicle,ACpowersuppliedmotor,―Solar/ElectricPoweredHybridVehicl
e‖[SEPHV].
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 174 ISBN 978-93-5268-343-8
EXPERIMENTAL ANALYSIS AND INVESTIGATIONON POLYMER
COMPOSITE LEAFSPRING
M.Kavitha Roselin,Y.Lavanya,Ms.R.Bavanisekar
SAVEETHA ENGINEERING COLLEGE
Abstract: In this paper for reducing the weight of the TATA ACE vehicle is
considered. The middle spring of TATA ACE vehicle is used for modelling and
analysis. The composite materials used for modelling and analysis are Glass fiber
reinforced plastics (GFRP), and Carbon fiber reinforced plastics (CFRP).The
Composite leaf spring (GFRP) is fabricated by using the hand layup method. Testing of
GFRP leaf spring is done by using universal testing machine. Maximum load and
maximum deflection can be found out by using universal testing machine. From the
experiments it was observed that if a conventional leaf spring is replaced by a
composite leaf spring an appropriate amount of weight reduction and there by
improved vehicle performance with almost same amount of load bearing capacity was
observed.
Keyword: Glass fiber reinforced plastics (GFRP), universal testing machine.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 175 ISBN 978-93-5268-343-8
TRIBOLOGICAL AND MORPHOLOGICAL STUDIES OF ALUMINIUM
BASED NANO COMPOSITES
W.Kanmani,P.Karthikeyan,Mr.P.Ravisasthiri
JAWAHAR ENGINEERING COLLEGE
Abstract: It is important to take contact temperature into account when developing
friction and wear tests for potential tribo materials and when analyzing the results of
those tests. This paper presents some of the most important analytical and numerical
methods that can be used to predict surface temperature rises in dry or boundary
lubricated pin-on-disk turbo tests. The objective is the development of the relatively
simple,accurate and easy to use expressions that can be used to predict contact
temperatures in pin-on-disk sliding contacts. Results of the methods are to be compared
for Al+SiC(NANO) and Al+SiC(NANO) with MoS2 (NANO) composite.
Key words :wear tests, analytical and numerical methods , pin-on-disk turbo tests .
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 176 ISBN 978-93-5268-343-8
DESIGN AND FABRICATION OF MILLING ATTACHMENT IN LATHE
R.Susan,K.Suhasini,Mr.J.Kokila
JAYA ENGINEERING COLLEGE
Abstract: The lathe with milling machine is to eliminate the need for an operator
owning both a milling machine and a lathe. It is designed to be mounted to the side of
the milling machine and to be used without disturbing a setup in the associated vise.
The details of manufacturing a Miniature Lathe are given in a clear manner. Different
types of components are essential for various purposes. These components include
several operations, initially the component to be machined as irregular shapes. This
shape is into regular form and to our required wish by performing various operations
on it. Therefore a machine is required to convert this irregular shape material into a
finished product. We have selected a Miniature Lathe for doing several small
components which is used for various purposes in variousfields.
Key word: milling machine, Miniature Lathe
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 177 ISBN 978-93-5268-343-8
DESIGN AND FABRICATION OF AUTOMATED GUIDED VEHICLE
SYSTEM
L.Susithra,N.Janes,Mr.A.Austin Segal
EASWARI ENGINEERING COLLEGE
Abstract: Mankind has always strived to give life like qualities to its arti facts in an
attempt to find substitute for himself to carry out his order and also to work in an
hostile environment. The popular concept of a robot is of a machine that looks and
work like a human being. One type of robot commonly used in industry is a robotic
manipulator or simply a robotic arm. It is an open or closed kinematic chain of rigid
links interconnected by movable joints. In some configuration, links can be considered
to correspond to human anatomy as wrist, upper arm and forearm with joint at shoulder
and elbow .at end of arm a wrist joint connects end effectors which may be a tool and
its fixture or a gripper or any other device to work. Here
howapickandplaceLinefollowingrobotcanbedesignedforaworkstationwhereloadingandp
ackingoflead batteries is been presented. All the various problems and obstructions for
the loading process has been deeply analysed and been taken into consideration while
designing the pick and place line following robot.
Key word: Arti facts, hostile environment.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 178 ISBN 978-93-5268-343-8
MECHANICAL PROPERTIES OF CONCRETE WITH REPLACED C&D
FINE AGGREGATE USING SILICA FUME AS AN ADMIXTURE
M.Malaiappan Sindhu1, B.Magesh2
1CACE, Addis Ababa Science and Technology University,Ethiopia.
2PERI Institute of Technology, India
Abstract: Concrete is the most common construction material prepared using cement
natural aggregate and water. With fast industrialization, infrastructure development and
increase in the population leads to huge construction activities. Due to increase in the
various construction activities the natural resources are fast depleting within turned
result in escalating the cost of construction material and then the total cost of
construction. With rapid urbanization the quantum of construction & demolition waste
(C&D Waste) is constantly increasing. While it is estimated that the construction
industry in India generates about 10-12 million tons of Construction and Demolition
(C&D) waste annually, efforts to manage and utilize this waste is very little. This has
led to Private contractors utilizing unscientific dumping methods there-by putting
severe pressure on scarce urban land as well as reducing life spans of landfills The
study on the application of C&D fine aggregate for concrete preparation has been
going on over the last few decades. The properties like water absorption and specific
gravity of C&D fine aggregate are to be determined for the concrete mix design. It has
been observed that the C&D fine aggregate obtained from concrete waste is rough
texture, angular and has higher water absorption than the natural fine aggregate
affecting the concrete mix proportion. In this project the behavior of concrete under
replacements for natural aggregate (NA) fine with recycled aggregate (RA) is
examined for its structural property. To Increase the strength of C & D aggregate
concrete silica fume added as admixture. The specimens were made for
conventional,100 % replaced C&D waste and C& D waste with 20% silica fume as an
admixture. Properties of this concrete such as compressive strength, splitting tensile
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 179 ISBN 978-93-5268-343-8
DESIGN AND ANALYSIS OF TECH PARK (G+10) BUILDING
Atulkumar Singh1, Ankit Pandey2, P.M.Rameshwaran31&2Students, 3Assistant
Professor, 1,2&3Department of Civil Engineering SRMIST, Ramapuram, India
Abstract – ETABS is the present day leading design software in the market. Many
designs Companies use this software for their project design purposes. So, this project
mainly deals with the comparative analysis of the results obtained from the design of a
regular and a plan multi storey building structure when designed using ETABS
Software separately. These results will also be compared with manual calculation of a
sample beam and column of the same structure designed as per IS 456. In this study we
are analyzing and designing a tall building G+10 storey using E-tabs and by
conventional manual method, finally comparing analyzed and design values. As in
demand such structure are built in R.C. framed structures these days. Our project
design one such building with due regard for all the components of the structure. Now
a day‘s many tall structures and high rise towers are being built all around the world
.Wind plays an important role in design of tall structures because of its dynamic nature.
Effect of wind is predominant on tall structures depending on location of the structure,
height of thestructure
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 180 ISBN 978-93-5268-343-8
USAGE OF MANUFACTURED SAND (M SAND) AS FINE AGGREGATE
FOR CONCRETE IN LIEU OF RIVER SAND.
A.Shanmugam1, P.M.Rameshwaran2
1PG Student,2Assistant Professor, 1&2Department of Civil Engineering SRMIST,
Ramapuram, India
Abstract – Natural or River sand‘s resources are exhausting very rapidly; the existing
River sand crisis has brought all the site concrete and related activities to standstill.
Around 30 % of volume of concrete is Fine aggregate. A good quality of concrete can
be obtained by proper mix and proportion of cement, Fine aggregate, Coarse aggregate,
water and admixture. The fine aggregate used is usually obtained from natural sources
specially river beds, now a day due to constant sand mining the natural sand is
drastically decreasing in manner. Sand digging from river beds will led to severe
environmental issues and moreover Government has banned and restricting the digging
of river sand from rivers, if same scenario continues it will led to increase in cost of
river sand and environmental issue. Natural river sand takes millions of years to form
and is not replenish. Manufactured sand is a substitute of river sand for construction
purpose produce from hard granite stone by crushing. The crushed sand is of cubical
shape with grounded edges, washed and graded to as a construction material. Hence
Manufacture Sand is best alternative solution of river sand. The only long term
replacement of river sand is manufactured sand.
Keywords:Fine aggregates (Manufactured sand & Natural / river sand), Compressive
strength, Workability
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 181 ISBN 978-93-5268-343-8
SIMPLE MODEL OF GRAPHITE AND ITS APPLICATIONS IN
SUPERLATTICE
K.Anand1, P.M.Rameshwaran2
1PG Student,2Assistant Professor, 1&2Department of Civil Engineering SRMIST,
Ramapuram, India
Abstract – Scanning probe microscopy investigations have extensively used graphite
as a substrate due to its chemical inertness and ease of cleaving. The atomically flat
surface of graphite has provided an ideal platform for surface scientists to deposit
various kinds of materials of interest for imaging and examining. The natural graphite
surface is also worthy of further understanding as it consists of a variety of defects
among which superlattice structure is reported to be found on graphite surfaces, and its
origin is not yet completely understood. It is of general interest and wide applicability
to have a simplistic model for theoretical interpretation of scanning tunnelling
microscope (STM) images of graphite, and even molecular dynamic simulations on
graphite. Here we describe a model of graphite which is easy to comprehend and
simple to implement. This model simulates the atomic density of graphite layers, which
in turn correlates with the local density of states. The mechanism and construction of
such a model is explained with all the necessary details which are not explicitly
reported before. This model is applied in investigating the corrugation conservation
phenomenon and rippling fringes of the superlattice which we observed on
graphite.The―odd-
even‖transitionalongtheatomicrowsofasuperlatticeissimulatedandthisresultis discussed
with reference to other reports in the literature. A comparison is made with the result of
Cee about the validity of the moiré rotation patternassumption.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 182 ISBN 978-93-5268-343-8
INTEGRATING BEM, BIM, VR FOR VISUALIZING LIGHT IN A BUILDING
AND ENERGY EFFICIENT MODELLING
L.Divya
PG Scholar, VPDM, PSG College of Technology, Coimbatore
Abstract – Lighting options in a building cannot be seen with the naked eye by the
user and constructor before construction. Virtual reality(VR) gives the customers the
ability to tour the home before and after it‘s built and view all of it‘s tech possibilities.
For builders looking to install green technology (lighting), virtual reality is a great way
to get the home buyer engaged. With virtual reality engineers, architectures can use
various designing and range of colours to see where sunlight lands naturally. While it
could be used for decorative purpose, this also helps the engineer to assess how much
natural light the property will receive, by reducing their dependence on artificial light
sources. VR design allows users to try multiple light cycles, on seeing their design
during different hours of the day. By experiencing the orientation of the building, the
architect can adjust to reduce heating and cooling costs for the property or to optimize
the building‘s solar energy system. BIM(Building Information Modelling) and
BEM(Building Energy Modelling) tools (such as REVIT ARCHITECTURE
,ECOTECT) enables analysing and visualizing environmental factors based on the
design properties and can be used to improve the building design for better
performance. However, these tools have limitations in providing interactivity with
users for creating multiple visualization results to be used for analysing design options.
So that integrating design tool which consists of BIM,BEM and VR technologies
enables visualizing information in relationship with the actual architectural design,
space configuration and thermal environment, and provides efficient designfeedbacks.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 183 ISBN 978-93-5268-343-8
REVIEW ON PARTIAL REPLACEMENT OF FINE AGGREGATE BY
COPPER SLAG, E-WASTE AND M-SAND
S.Yamini Roja1, A.Anusuya2, SP.Keerthana3, S.Lakshmanan4& C.Prakash5
1Assistant Professor, 2,3,4&5Students , 1,2,3,4&5Department of Civil Engineering Sri
Ramakrishna Institute of Technology, Coimbatore.
Abstract – In India, there is a great demand for aggregate mainly in civil engineering
field for road and concrete constructions. Generally, concrete is a combination of
cement, fine aggregate, coarse aggregate and water. About 35% of concrete is
comprised of fine aggregate. River sand is extracted from river bed and it has
represented an awesome threat to environment. This has led government to ban the
dragging of sand. So, it is necessary to find an alternate for river sand. It is found that
M-sand will be the most promising alternate material. Also, utilization of waste
material and by-products is a partial solution to rectify environmental and ecological
problem. E-waste and copper slag are the waste material from the waste electronic
products and extracted waste from copper respectively. They cause serious effects on
environment and human health. In order to reduce these effects, it can be used in
concrete. Use of these materials, not only helps in getting them utilized in concrete and
other construction material, but also helps in reducing the cost of concrete
manufacturing. It has numerous indirect benefits such as reduction in landfill cost,
saving in energy and protecting the environment from pollution effects. In this paper,
various literatures have been discussed about the usage of these waste materials which
will bring multifarious benefits on environmentaleffects.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 184 ISBN 978-93-5268-343-8
ONSITE VISUALISATION INTEGRATED WITH BUILDING
INFORMATION MODELLING IN MIXED REALITY
S.Reji
PG Scholar, Virtual Prototyping and Digital Manufacturing Department of
Production Engineering
PSG College of Technology, Coimbatore
Abstract – People have a very hard time visualizing architectural concepts. It‘s nearly
impossible for most people to fully understand what an architectural space will be like
by viewing 2D floor plans, illustrations, animations or scale models. These are all
ultimately abstract and distorted ways of visualizing a design, and not at all
representative of how we experience architecture in the real world. With Mixed reality,
we can gain a very holistic understanding of what the building will feel like before
investing the massive amount of resources it takes to make it a reality. It‘s a lot easier
to change a pixel than it is to move a brick wall after it‘s built. MR helps people
understand architecture in a way nothing else comes close to, which we believe will
ultimately lead to the creation of better, more efficient built environment. Through this
project BIM can be integrated with Mixed Reality for intelligent visualization of
building onsite.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 185 ISBN 978-93-5268-343-8
Dynamic analysis of a composite tall structure using Etabs software
S.Ahmed Hussain1 and G.Nithyambigai2
21Department of Civil Engineering SRM Institute of Technology Chennai, India
2Assistant Professor (Sr.G)
[email protected], [email protected]
Abstract – Buildings with height more than 150m are categorized as Tall buildings (IS
875 part 3 -2015). Tall buildings are susceptible to Dynamic forces. The Engineer can
adopt any number lateral load resisting systems to stabilize the structure. Some of the
systems are Rigid Frame system, Braced Frame system, Outrigger System, Core wall
system etc. The Dynamic effects in a Tall Building are caused by either Wind or
Seismic activity. The composite construction is opted to speed up the construction
process. Structural Steel and Concrete together gives the composite action. The lighter
the structure, lesser will be the Seismic activity. Vertical city concept is the
advantageous part in the tall building structure. More residents in a small area of land.
The cons of a tall building are that it gives nauseating feeling to the residents due to the
constant oscillations. The paper presents a tall structure with core wall system which
has Steel Encased Concrete columns and Composite deck slabs. Dynamic effects of
wind will be calculated using Gust factor method of IS 875 part 3 2015. Both Along
and Across wind study is done. Seismic Design is based on the latest IS 1893- 2016
codal provisions. Response spectrum will be studied based on the structural and site
conditions. The typical span of the structure is 10.6m x 11.2m. The structure G+25
floors of commercial activities. The floor to floor height is 4.0m. The analysis and
design are done in ETABS V16. Composite beam and column design will be adhering
to ASCI 360-10 codal provisions. Composite beams will be check for Floor vibrations
as per Design guide 10 of ASCI. The main objective of the project is to study the
dynamic behavior of the tall composite structure due to seismic and wind forces.
Comparison with conventional concrete structure is done to check whether the
composite structure is economical than the conventional RCstructure.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 186 ISBN 978-93-5268-343-8
Study on Design And Analysis Of Raft Foundation By RCC And Pt Methods And
The Optimizations Achieved
A.Aswini1
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Raft foundation is a large slab supporting a number of columns and walls
under the entire structure or a large part of the structure to lower the contact pressure
compared to spread footing. Foundations are generally designed by Reinforced
Concrete Method. However, with the advancement in Post tensioning systems in
building construction, Raft foundations are designed in PT over the recent years. This
Project aims to establish a detailed comparative study on the design of the foundation
system, Raft by prevalent IS Codes in Reinforced Concrete system using Finite
Element Method softwares such as ETABS (Extended Three-Dimensional Analysis of
Building system), SAFE (Slab Analysis by Finite Element Method) and Post
Tensioned System by using a time tested 2 D Software, RAPT (Reinforced and Post
Tensioned). The Foundation will be suitably designed as per the prescribed standards
by the methods listed
above.Anelaboratecomparisononthesystemswithrespecttodesignperformanceintermsofs
tresses, Capacity and deflection shall be overviewed. Also, the Quantities of Steel,
Concrete and Pre-stressing steel shall be compared and the most optimal solution for
the available grid shall be suggested. The various enhancements in the design of Raft
Foundation by different softwares shall be studied. Also, the evolution in the design
through softwares and the nuances it brings in the design compared to conventional
method shall be elaborated.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 187 ISBN 978-93-5268-343-8
ANALYSIS AND DESIGN OF MASS LIQUID STORAGE TANK
SUPPORTING STRUCTURE
G.Arumugam1
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Liquid storage tanks constitute an important component of life line systems
such as water distribution system, petroleum plants etc. The response of liquid storage
tanks isolated by the sliding systems is investigated under two horizontal components
of real earthquake ground motion. The continuous liquid mass is lumped as convective
mass, impulsive mass and rigid mass. The corresponding stiffness associated with these
lumped masses is calculated depending upon the properties of the tank wall and liquid
mass. The governing equations of motion of the tank with a sliding system are derived
and solved by Newmark‘sstep- by-step method with iterations. The frictional forces
mobilized at the interface of the sliding system are assumed to be velocity dependent
and their interaction in two horizontal directions is duly considered.. The various
parameters considered are (i) the period of isolation (ii) the damping of isolation
bearings and (iii) the coefficient of friction of sliding bearings. It has been found that
the bi-directional interaction of frictional forces has noticeable effects and if these
effects are ignored then the sliding base displacements will be underestimated which
can be crucial from the design point of view. In the design codes, mechanical analogs
of tank-fluid system are commonly used to obtain the sloshing frequency,
hydrodynamic pressure and design seismic forces.. The experimental study is done on
laboratory models of tanks, which are excited using an Electro-Magnetic Shake Table.
The numerical study is done with the help of finite element model of tank- fluid system
using software using StaadPro.Tank supporting structure is designed according to IS:
456-2008 and earthquake loading is applied as per IS: 1893-2002 and mild steel
cylindrical welded oil storage tank IS 803-1976.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 188 ISBN 978-93-5268-343-8
EFFECT OF EARLY CARBONATION ON DURABILITY PERFORMANCE
OF CONCRETE.
D Ravichandran1
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Natural Carbonation is the major problem in all RCC Structures such as
Corrosion of Steel Rebar‘s. Principal Green House Gas, Carbon dioxide so far utilized
far Carbonation to study / design of cover depth of the RCC Component. Accelerated
Carbonation Technology will be helpful in minimize the effect of natural carbonation
in the PCC construction materials. Early Carbonation will resist the weathering
carbonation. Emission of carbon dioxide in to the Atmosphere will cause natural
disaster like unexpected storms or cyclone cloud burst, landslide, forest fire, flooding
of low lying residential area, water borne diseases in flooded area, and desert
formation. The acceleration carbonation will be carried out with the various pressure
condition of pure carbon di oxide for various environmental conditions. To find out the
optimum environmental condition for maximum carbon uptake in OPC, PPC and
Portland Slag cement based in plain cement concrete. To find out the grade of concrete
which is favourable for maximum carbon- dioxide uptake. To study the strength
characteristic compressive and durability properties of plain cement concrete.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 189 ISBN 978-93-5268-343-8
ANALYSIS AND DESIGN OF QUENCHING TOWER
N. Gopinath1
Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Ethylene quench oil and quench water towers may have the highest failure
rates in fractional distillation due to the rigorous service that these tower perform.
Almost all o the challenge areas of distillation are concentrated into one column
system; high temperature, solids, fouling potential, oxygenates, polymerization
potential, heat removal by pump arounds, and a mixture of Hydrogen, Steam, and C1 to
C20s. Given this combination, the guidelines for designing this column have to be
flexible yet sturdy to handle each of the challenges. One of the most reliable designs
has been the one developed in 1998 (1). These designs have run continually for eight
years, with previous designs in these revamped columns having less than one year run
length. The authors will examine the history of quench oil and quench water tower‘s
successful and not successful case studies and lessons than can be learned from each of
thecases.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 190 ISBN 978-93-5268-343-8
MICRO STRUCTURAL STUDY AND STRENGTH CHARACTERISTIC OF
ACCELERATED CARBONATION CURING OF CEMENT MORTAR
M Kamalakannan1
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Natural Carbonation is the major problem in all RCC Structures such as
Corrosion of Steel Rebar‘s. Principal Green House Gas, Carbon dioxide so far utilized
far Carbonation to study / design of cover depth of the RCC Component. Accelerated
Carbonation Technology will be helpful in minimize the effect of natural carbonation
in the PCC construction materials. Early Carbonation will resist the weathering
carbonation. Emission of carbon dioxide in to the Atmosphere will cause natural
disaster like unexpected storms or cyclone cloud burst, landslide, forest fire, flooding
of low lying residential area, water borne diseases in flooded area, and desert
formation. The acceleration carbonation will be carried out with the various pressure
condition of pure carbon di oxide for various environmental conditions. The
accelerated carbon technology can be utilized to enhance the early strength of plain
cement concrete and to improve the durability of properties like chloride ingression,
reduce the permeability, acid attack, sulphate attack, freezing and thawing effect.
Microstructure study due to accelerated carbonation in various grade of concrete
according to various environmental conditions (Temperature,Pressure)
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 191 ISBN 978-93-5268-343-8
Analysis and Design of INTZE Type over Head Circular Water Tank
S.Magesh1
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Storage reservoirs and overhead tanks are used to store water. All tanks are
designed as crack free structures to eliminate any leakage. In this project, working
stress method is used to design an INTZE tank and Elements of the INTZE tank are
designed by limit state method. In general, for a given capacity, circular shape is
preferred because stresses are uniform and lower compared to other shapes. Lesser
stresses imply, lower quantities of material required for construction which brings
down the construction cost of water tanks. This project gives in brief, theory, design
and analysis of the INTZE type water tank. Any design of Water Tanks is subjected to
Dead Load + Live Load and Wind Load or Seismic Load as per IS codes of Practices.
Most of the times tanks are designed for Wind Forces and not even checked for
Earthquake Load
assumingthatthetankswillbesafeunderseismicforcesoncedesignedforwindforces.Inthisst
udyWind Forces and Seismic Forces acting on an Intze Type Water tank for Indian
conditions are studied. Most of the designers consider the wind effect and neglect the
seismic effect on the structure. The Indian Standard Code IS 875(Part-3) 2003 and IS
1893-2000 for Wind & Seismic effect is used in this study and the same is cross
checked with different Seismic Zones i.e. Zone-II, Zone-III, Zone-IV, & Zone-V by
‗Response Spectrum Method‘ and the maximum governing condition from both the
forces is further used for design & analysis of staging.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 192 ISBN 978-93-5268-343-8
DYNAMIC ANALYSIS AND DESIGN OF RCC CUMS STEEL STRUCTURE
IN INDUSTRIAL BUILDING USING SRSS METHOD
S. Moses Vimal Raj1
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – A method to include earthquake directional effects on the seismic analysis
of building is presented. A comparative study to examine the accuracy of the method is
performed. Three linear buildings with different structural characteristics were
analyzed considering actual earth quake acceleration response spectra and acceleration
design spectra. Various techniques for combining modal response were considered. It
was concluded that the proposed method estimates very well the structural response
when the square root of sum of squares (SRSS) technique is applied. The man
advantage of the proposed method is that it avoids the use of arbitrary two orthogonal
directions on seismic analysis of buildings. The method also evades the need for the
standard combination procedure of the earthquake orthogonal effects to obtain the
design stresses. The SRSS (Square Root Sum of Squares) technique has traditionally
been used in the modal response combination for the response spectrum method of
seismic analysis. Over the years, the SRSS techniques has been found not desirable in
several occasions, for example, when modes are closely spaced to each other.
Analytically it can easily be demonstrated that the maximum responses between tow
sufficiently closely spaced modes must be algebraicallycombined.
International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15
ISBN 978-93-5268-343-8 193 ISBN 978-93-5268-343-8
Pushover analysis and design of RCC structures
R.Saravanan
1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089
Abstract – Recent earthquakes, in which most of concrete structures have been
severely damaged or collapsed, have indicated the need for evaluating the seismic
adequacy of existing buildings. About 60% of the land area of our country is
susceptible to damaging levels of seismic hazard. We can‘t avoid future earthquakes,
but preparedness and the safe building construction practices can certainly reduce the
extent of damage and loss. In order to strengthen and resist the buildings for future
earthquakes, some procedures have to be adopted. One of the most familiar procedures
is the nonlinear static pushover analysis which is becoming a popular tool for seismic
performance evaluation of existing and new structures. This analysis of the nonlinear
response of RC structures to be carried out in a routine fashion. It helps in the
investigation of the behavior of the structure under different loading conditions, its load
deflection behavior and the cracks pattern. The accuracy of the predictions was
observed to depend on the approximations involved in the theory of the procedures,
structural properties and ground Motion characteristics. By conducting this push over
analysis, we can know the weak zones in the structure and then we will decide whether
the particular part is to be retrofitted or rehabilitated according to the requirement. In
push over analysis is performed on multistoried frame structures by using most
common software SAP2000 to achieve this objective, RCC framed buildings with 10
stories analyzed. The results obtained from this study show that properly designed
frames will perform well under seismicloads.
CHIEF PATRON
Dr.Naliniselveraj, M.Com.,M.Phil.,
Chairperson, Kings Engineering College.
PATRON
Mr.S.Amirtharaj, B.Tech.,M.B.A. (UK), Director,Kings Engineering College.
CONFERENCE CHAIR
Dr.A.V.Mayakkannan, M.E., Ph.D., Principal, Kings Engineering College.
ORGANIZING CHAIR
Mr.B.Muthazhagan, HOD/IT
Mr.S.Raj Kumar, HOD/ECE Dr.Muniaraj, HOD/MECH
CONVENOR CO-cONVENOR Dr.D.C.Jullie Josephine, Mr.D.R.Denslin Brabin,
HODICSE Asso. Prof./CSE
EVENT CoORDINATORS
Mrs.V.Indhumathi,Asst. Prof. ICSE Mrs.M.Parameswari, Asso.Prof./IT Mr.K.G.Saravanan,Asst. Prof./CSE Mrs.E.Sujatha, Asso. Prof./IT Mr.A.N.Duraival, Asso.Prof./ECE Mr.R.Jeremiah, Asso. Prof/MECH Mr.S.Suthagar,Asst. Prof./ECE Mr.S.HanishAnand, Asso.Prof/MECH
Designed and Published by
RINGS ENGINEERING COLLEGE