Filter by subject




All Available papers:



Environmental Education

International Journal of Science , Engineering and Management, Available online 26th September 2018

E. Divya Devi | S. Lenin

Abstract

Environment is the sum total of all surroundings of a living organism including natural forces and other living things, which provide conditions for development and growth as well as danger and damage. Environment Education is defined in its broader sense to encompass raising awareness, acquiring new perspectives, values, knowledge and skills, and formal and informal processes leading to changed behaviour in support of an ecologically sustainable environment. This paper deals with the promotion of environmental education and also the steps to enhance the features of environmental education

Design Aspects of MAP Turbo Decoder for Wireless Communication Systems

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 2nd June 2017

E. Sujatha | Dr. C. Subhas,Dr. M. N. Giri Prasad

Abstract

Long Term Evolution-Advanced (LTE-A) targets the peak data rates in surplus of 3Gbps for present and next generation wireless communication systems. Turbo coding, the stated channel coding scheme in 3rd Generation Partnership Project (3GPP) LTE standard, is an advanced forward error correction (FEC) coding to achieve higher throughput of advanced Wireless Communication Systems. To support the peak throughputs, parallel turbo decoding procedure has become a necessity and the corresponding VLSI implementation is extremely challenging task to the design engineers. The higher throughput applications require higher parallelism of turbo decoder design; which results in increased hardware complexity, major source of power consumption and silicon area. This paper addresses the design and implementation aspects of different parallel turbo decoders, which meet peak data rates of 3GPP LTE and LTE-Advanced standards, where throughput, power consumption, silicon area and latency are the most decisive cost factors

Reverse Engineering for Restoration and Preservation of Old Artifacts and Cultural Heritage

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 21st March 2018

K B Kommula | S T Laudya, S Eslavath, S N R Karri, Dr R Pandey

Abstract

India is a country with a rich cultural heritage. The historical heritage dates back to centuries from primitive times. The notion of preservation of cultural heritage has been exercised for several years. With the advancement of digital technology, it has opened a new avenue for preserving the cultural heritage of a nation. Due to natural or man-made disasters, we see a loss of many historic buildings which are to be passed on to future generations. The digitization of these historical objects is very important to store these and prevent them from getting extinct. The digital preservation of various visual arts like paintings, sculptures, and ancient architectural buildings is the key technology till date to preserve the culture of a nation. This paper shows various methods of storing the historic objects by using scanners through the concept of reverse engineering. Using reverse engineering the shortcomings in the documentation can be improved. The work is concerned with preserving the cultural heritage by making the digital copy of the object and to reuse the data, when needed. When there is a need of a particular model of the past they can be revived without any loss in their heritage. The main objective of this paper is to show how to use reverse engineering method to digitalize the characteristics of the old artifacts which are considered national treasure.

Study on Consumer Brand Preference towards Green Tea in Thoothukudi City

International Journal of Science , Engineering and Management, Available online 29th August 2018

R.Mohana | DR.K.Kamalakannan

Abstract

Tea has been cultivated for centuries and remains one of the most widely consumed beverages in the world. Tea is one of the most refreshing and popular beverage. Green tea is the common scientific name of the herb Camellia Sinensis. It has been cultivated in China and the Asian region for thousands of years, and today, tea is the second most popular drinks, served both hot and cold. Many health benefits are said to be gained by consuming tea, Green Tea has recently become more widespread in India. Green Tea has been historically promoted for having a variety of positive health benefits. Green Tea may help to reduce the risk of cancer, promote oral health, reduce blood pressure, and help with weight control. In this regard, the main objective of the study is know the preference of the consumers regarding the consumption of Green Tea. The collected data with the help of well - structured questionnaire. Sixty five samples were taken in Thoothukudi town for this study. The data subjected to analysis and the findings of the study reveals that the maximum of the respondents prefer Tajmahal brand of green tea. Majority of the respondents are having green tea in evening alone and most of the respondents are said the green tea price is high. The study also reveals that majority of respondents feel the green tea for diet support.

"Cycle Time Reduction of Transmitting Output Power Measurement of URRF Radio"

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Prof.Suhas A R | Pratiksha R Matlawar , Rashmi R

Abstract

Radio Station RRF(UG) is extensively used by the Indian Military for communication related purposes. In this radio, measurement of output power at different frequencies is one of the most important factors to be considered for the purpose of secured communications. In this paper, we develop a method based on automation to measure output power at different frequencies using LABVIEW software. This reduces the time required for output power measurement

"The Study of Mechanical properties of LM6 Reinforced with Albite Particulate Composites and fabricated by Chill Casting Method"

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th November 2017

AnjumAnwarShaik | Shamanth.T, Syed Mohsin, Zamran Lateef Baig

Abstract

The study is intended to investigate mechanical properties of LM6 based metal matrix composite, where Albite particulates are character enhancing reinforcement. Composites were fabricated by chill casting process utilizing copper as a chill. Specimens were prepared as per ASTM standards at different weight percentages of Albite varied from 0 to 12 with an increment of 3. The microstructure study clearly indicates the uniform distribution of Albite particulate in matrix alloy. These results revealed that increase in weight percentage of Albite as reinforcement in LM6 matrix alloy increases the tensile strength, compressive strength and hardness giving rise to the improved microstructure of composite.

'Prediction of Students’ Performance: Artificial Neural Network Approach

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th January 2018

K. G. Nandha Kumar | 

Abstract

Neural network techniques are applied in an ample number of fields in the recent decades. Educational data mining is one among them where the data mining could be carried out effectively. The core tasks are classification, clustering and grasping of association rules. These could be accomplished with suitable educational data. Enormous algorithms, techniques, and tools are available for data mining. Identifying a best suitable algorithm for a specific task is still intricate. This paper deals with the performance of some well formed neural network methods on students’ performance prediction. Predictive analysis is a significant task in the education domain. Exploitation of students’ mark data leads to the better predictive analysis. In the field of educational data mining, most of the research work focuses on predictive analysis and models. There is a scope for multidimensional predictions. This paper indicates some viewpoints of neural network based educational data mining.

(G,D) - Number of Weak Product and Composition of Graphs

International Journal of Science , Engineering and Management, Available online 31st August 2018

A.Niranjana |  K. Palan,S. Kalavathi

Abstract

(G,D)-number of graphs was introduced by Palani K and Nagarajan A. Let G be a (V,E) graph. A dominating set is a subset D of V such that every vertex in V-D is adjacent to atleast one vertex of D. A (G,D)-set D of G is a subset D of V(G) which is both a dominating and a geodetic set of G.In this paper, we find the (G,D)-number of weak(or kronecker) product and strong product (or composition)of some standard graphs.

2-8GHz, 1.6dB Integrated CMOS LNA Using Image network technique for 4G LTE application

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 30th August 2017

Sandeep Kumar | Chamindra Jayawickrama, Alaaddin Al-shidaifat, Ashish Kumar, Wonju Song, Hanjung Song

Abstract

The paper proposed 2-8GHz wide bandwidth CMOS low noise amplifier using image network technique for 4G LTE application. The proposed circuit are made by cascade stage of CMOS common gate-common source (CG-CS), input and output matching network. The novel image network technique in the proposed circuit investigates inverse impedance at the output and provides higher wideband and low noise figure. These two most important observed parameters overcome the problem of high speed data rate in the 4G LTE application. The proposed circuit is implemented and analyzed using RF simulator ADS. Chip fabrication and measurement is done by using TSMC 45nm commercial design Kit. The results achieved minimum noise figure of 1.6dB with highest gain of 18dB. Experimental and simulated results are made good agreement with each other.

3D Face Recognition

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Mr. Jayraj |  Nilabja Roy, Swapnil Aryan Sinha

Abstract

3D face recognition is one of the novel ways of having a security feature. This could be considered much more safer than a finger print scanner as it uses the crests and troughs on the face to accurately map every centimeter of the face, now because of his technology the machine cannot be fooled by showing a photo of the person because it won't be able to detect the crests and troughs on the face. In order to cheat the machine, one would have to make a 3D model of the face with exact depths at every centimeter which is very difficult. PCA algorithms, resulting in improved recognition performance, both individually and in combination. We have also examined the effect of depth resolution on performance of 3D recognition which is very accurate.

3D Printing Technology or Additive Manufacturing System

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Girish Anil Patil | Siddhesh Sharad Chaskar,Himani Mahesh Limaye,Bhavesh Sheth, Prof.M.V.Shivramwar, Prof.N.B.Chaudhari

Abstract

Manufacturing system is a method of organizing product from the availability of raw material from start to the final output subtractive manufacturing is a type of production in which metal removal takes place by various methods like drilling, milling, cutting, etc. But in this era of 20th century we have in manufacturing system called additive manufacturing it is in its initial stage till end of 20th century and is known by prototype manufacturing which has now become 3D printing technology it is a rapid and reliable process. The main difference in subtractive and additive manufacturing system is that in subtractive material removal takes place while in additive material addition takes place by layers to form the final product. This additive manufacturing system or 3D printing technology will become the fastest and most accurate method of production till 21st century and will be used by almost all the manufacturing industries in the world. As being a simple process i.e. just upload the 3D design of the model in the system and the 3D printing machine will make the 3D model of the product by applying number of layers of the required material till the final dimension of the product is achieved. Material used in formation of product may be plastics, metal but there are limitations not all metals can be used selective metals are used A brief information on this technology is being discussed in the paper.

4G Wireless Security Threats Due To the Interference

International Journal of Engineering Research in Computer Science and Engineering, Available online 10th January 2018

Nagesha A. G. |  Dr. Gowrishankar S. S.

Abstract

The 4G wireless network standards are motivated to frequency reuse, where it will raise the system capacity and normalize the planning of radio networks. As the system capacity increases, the signal to noise (SNR) ratio will be degraded due to the interference in the cells. The present security will not suitable for the physical layer of Long Term Evolution (LTE) networks. The key characteristics of the channels of wireless networks are open and broadcasting. As these networks can be attacked easily through interference, signal jamming and eavesdropping. Hence the security issues in physical design will be considered as the critical issues in LTE networks. So, before discussing security issues, we should identify the threats and vulnerabilities raised in the low-level layer of wireless networks. Later in this paper, the secure schemes and other procedures will be explained where that can be adopted in the physical layer.

5 D Optical Storage Devices: Superman of All Storages

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Abhinandan Das | 

Abstract

Storage of data is very essential for the continuity of human race. Storage devices like pen drives, hard discs or even the internal storage offered in our mobile phones are not enough for storage of special types of data which may include microscopy, digital images and all sorts of computing data. Moreover, we face problems like crashing of the hard disc, pen drives etc. untimely. It is sometimes difficult to retrieve those vital data. Hence, we need to device a storage medium that can be used to read, write, store and erase data including those of medical imaging and microsurgery. At this juncture, nanotechnology comes into the foreplay, which has successfully recorded, read, and erased data from a piece of Nano-structured glass. This technique could revolutionize microscopy in general and medical imaging in specific and, perhaps more importantly for computing, it could also be used to store binary data, like an optical disc. Unlike DVDs or Blue-rays, which seem to be capable of storing data for an unlimited period of time without a reduction in data integrity, the 5D optical storage could allow for densities as high as 360 terabytes per disc, and unless it is crushed in a vice, these discs are so non-volatile that data stored on them should survive the human race. However the implementation of digital data storage, which is a crucial step towards the real world applications, has not been demonstrated by ultrafast laser writing. Here, a digital copy of the text file in 5D using polarization controlled selfassembled ultrafast laser Nano structuring in silica glass has been successfully recorded and retrieved.

5G technology: The Key Enabler in Reaching the Unreached, Its Advantages and Initiatives Government Can Take to Empower Indians Compete Globally.

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th December 2017

Skanda Kumar.B | Nandan goud.B

Abstract

A new revolution of the telecommunication is the 5G technology where various mobile phones will be able to leverage data anywhere, anytime that is expected to spread rapidly, over the coming years.In this paper the author is trying to portray its advantages over previous generations of internet, and some of the initiatives that can be taken by the government are discussed that can put 5G into mainstream ,this is necessary because the advancements in mobile technology and web technology with current old school 2G internet which majority of the rural Indians have, can be regarded as unusable internet and obsolete in nature because most needed features like e-Education, E-medication, E-commerce which lead to symbiotically beneficiary between rural and urban India is restricted by 2g internet there by proving just connecting people to the internet is not the solution for modern India instead it is the connecting people to the high-speed internet is the answer for which 5G will play a huge role.

5G Wireless Mobile Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

MS. S. Pavithra | MS.J.Uma Sawmiya, MS.R.Bavani , MS.Smitha

Abstract

5th generation mobile network or simply 5G isthe forthcoming revolution ofwireless technology.It is beyond the thinking of normal human.With its ultra-high speed ,it changes the usability of a mobile phone.

6*6 Radom Color Grid Authentication (2 Step)

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Sudershan M | Veena Potdar, Madhu B

Abstract

Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to have significant drawbacks. To overcome the vulnerabilities of traditional methods, numerous graphical password authentication systems have been proposed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this novel graphical password scheme to abolish well known security threats like brute force attacks, dictionary attacks, phishing attacks and spyware attacks.

A 12nm FinFET Level Shifter for near threshold circuits

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 26th July 2018

Radhika | Jayadeva T S

Abstract

Power has turned into the essential plan imperative for chip designers today. While Moore's law perpetuates to provide additional transistors, power related constraints have started to preclude those devices from being utilized. These days, low power designs, particularly multi-voltage designs turn into a well-known and proficient approach to reduce both dynamic power and static power consumption. A key parameter in designing of effective multiple supply circuits is limiting the cost of the level transformation between diverse voltage domains while keeping up the overall robustness of the design. To such a reason, level shifter (LS) circuits can be used. In order to achieve reduction in power consumption, a proposed level shifter topology has been used in this paper which uses a low contention between PMOS and NMOS transistor due to which dynamic energy consumption is reduces, speed is also increased due to the use of a feedback loop and also due to the near-threshold computing its energy efficiency is more. As 12nm technology node delivers better density and a performance boost over Global Foundries' current-generation 14nm FinFET, which satisfies the processing needs of the most demanding compute-intensive applications from artificial intelligence and virtual reality to high-end smart-phones and networking infrastructure, the proposed level shifter has been scaled down to 12nm technology node which is capable of converting near-threshold voltage signal to above threshold voltage signal(i.e. from 250mV to 500mV) with 284.1229nW of power dissipation

A 90NM Low Power Ota Using Adaptive Bias

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Suman | Rekha S

Abstract

Low power class AB operational trans-conductance amplifier (OTA) which is fully differential operating at low voltage 0.4 V supply designed in low cost 90nm technology is proposed in this paper. Differential pairs such as P channel and N channel with complementary input configuration are used in input stage to achieve input common mode range (ICMR) which is full rail to rail. For increasing slew rate without sacrificing power consumption adaptive bias circuits are used hence amplifier works in class AB. The common mode feed forward circuit (CMFF) is employed for maximizing common mode rejection ratio (CMRR). To make system power efficient whole amplifier operates in weak inversion region. After designing layout of an op amp, Simulation with parasitic is carried out and shows that DC gain of 51.15 dB, 876.5 kHz unity gain bandwidth (UGB)with 77.7 phase margin for 10 pF capacitive load and slew rate of 0.1 V/?s; CMRR and PSRR are 116.9 and 97.30 dB respectively. The proposed OTA dissipates very less power of 4.78 ?W and shows ability to use in applications where less energy is mandatory.

A Body Wearable Antenna for Online Real-Time Health Monitoring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 28th March 2018

Mohd Kashif | Zeeshan Ali Haq

Abstract

Healthcare system in India is very fragile in a sense that that ratio between doctors and patients is very poor. Also, the medical cost is very high. In such situation, there arises a purpose of online health monitoring which would reduce the ratio and cut down on the medical cost. A textile antenna for online health monitoring is proposed in this paper. The antenna is designed to operate at 2.54 GHz frequency in ISM band. It will enable the patient to easily wear the system and transmit the real-time health monitoring data to the nearby hospital system. The ISM band ensures the licence free data transmission over the channel. The designed antenna is a rectangular patch of wearable textile material.

A Brief Analysis of Ac Drives and Its Importance in Automation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 30th March 2018

Ramanuj Borgohain | Vijay Rahangdale, C.J.Sharma

Abstract

This paper explains the description and operation of AC Drives (Variable Frequency Drive, VFD). The various benefits, applications, types and ratings of VFD are also studied in this paper. The use of VFD has been increased dramatically in the recent past over a wide range. This paper provides the basic understanding of how AC Drives are being used in the field of automation.

A Brief Review On The Application Of Swarm Intelligence To Web Information Retrieval

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Ramya C | Dr. Shreedhara K S

Abstract

Web Information Retrieval process has become one of the most focused research paradigms because of large quantity of growing web data as internet is ubiquitous. To this distributed, uncertain and volatile data, accurate and speed access is required. So there is a need to optimize the search process using some efficient approaches. For such novel approach a literature survey is presented on evolutionary bio-inspired Swarm Intelligence techniques to optimize search process in Web Information Retrieval Systems.

A Case study of 5S implementation in Manufacturing Enterprises

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Gopinath S | Vikram H,Sivarampandian J

Abstract

In todays competitive world, it is quite necessary for an organization to maintain certain key strategical tools to survive in the market. Lean manufacturing is defined as a systematic procedure which helps in the process of waste management and elimination within an enterprise. Lean manufacturing involves 5S which is a set of principles and standards. This research paper emphasis on formulating key essential certifications that a manufacturing industry must procure so to maintain standards. 5S is one of the key tools that a company can acquire that helps it in continuous improvement culture. 5S proclaims for certain visual disciplines to be maintained. 5S strategical represents systematic approach for the overall improvement in quality, productivity and improvement. This research paper proposes the various aspects of 5S and value based analysis is done using certain analytical softwares. SMEs were approached with different questionnaires and proper survey data was collected, interpreted and used for analysis. Relationship between each category is realized and conclusion drawn.

A Case Study of Association Rule for the Confidence and Support Using Apriori Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

S.Uma Gowri | Dr V. Lakshmi Praba

Abstract

The data mining approach, a relatively new technique, is deployed in large databases to find novel and useful patterns that might otherwise remain unknown. Association rule learning which follows the apriori algorithm is a popular and well research technique for discovering interesting relations between variables in large databases. Among various algorithms available for mining frequent item set we include apriori algorithm. Main objective of apriori algorithm is to find out hidden information which is the major goal data mining. In this study, we use United States Congressional Voting dataset and analyze the information based on predefined rules

A Case Study of Low Span Pre-Engineered Industrial Building

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd March 2018

R. D. Shambharkar | P. A. Deotale, Vivek Naik, D. K. Parbat

Abstract

The design of an industrial building is governed mainly by functional requirements and the need for economy of construction. The main dimensions will be directed by the particular operational activities involved, but the structural designer’s input on optimum spans and the selection of suitable cross-sections profile can have an important bearing on achieving overall economy. An aspect where the structural designer can make a more direct contribution is in lengthwise dimensions i.e. the bay lengths of the building. Here a balance must be struck between larger bays involving fewer, heavier main components such as columns, trusses, purlins, crane beams, etc. and smaller bays with a large number of these items at lower unit mass. An important consideration in this regard is the cost of foundations since a reduction in the number of columns will always result in lower foundation costs. In this a Case Study of Low Span Pre-Engineered Industrial building located at Vijayawada, used for the Cement Godown having building width of 15m, length of 50m and height of 5m. The minimum total weight of PEIB was found to be 22.51 Tonnes and optimized cost of this building was estimated as 12.54 Lakhs at the spacing of 7.14m as against conventional having a total weight of 34.4 Tonnes and cost of 14.448 Lakhs at the bay spacing of 6.25m.Therefore material saved by using PEIB was 11.73 Tonnes (32.85%) & net money saved by using PEIB was 1.91 Lakhs.

A Case Study on Process Automation Using PLC In Soft-Drink Manufacturing

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Sneha J. Gadkari | Amit S. Patil,Sushil L. Khade,S. A. Soundattikar

Abstract

Industrial Automation uses control system such as computer or robots and information technology, for controlling different type of processes and machinery and is the process of integrating industrial machinery to automatically perform task such as welding, material handling, packaging, blending etc. Using hardware and soft-ware automation increases productivity, safety and profitability which are the need of any manufacturing industry loading for sustenance in the global competition. The conventional processes are time consuming, less accurate and involve more human interference and thus automation offers an advantage of making the jobs easier and reducing the risk and defects in these process. Soft drink manufacturing is one such process which may involve multiple outputs at every next instant. The mixing of the ingredient must be accurate according to recipe selected and must the display the problem if any encountered automated through alarms. The paper describes the soft-drink manufacturing built using PLC for accurate and faster control.

A Case Study on Sustainable Development in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Jimmy Chacko | Shubham Wankhede,Anushruti Kukreja,Reshma Raskar Phule

Abstract

The concept of Sustainable Development is an attempt to combine growing concerns about a range of environmental issues with socio-economic values. To aid understanding of these different policies a classification of different trend of thought is necessary. To meet the ever increasing needs of the rapid urbanization one such area that needs to be developed is the airport. Airports are the air transport systems nodes and have major impact on a regions economy, social conditions and environment. An Airport can only be considered to be operating sustainably if all three dimensions are balanced. Airport Sustainability can be evaluated at global, national and regional levels. This paper emphasizes the importance of regional level planning in analyzing airport sustainability. The paper presents a detailed case study of Chhatrapati Shivaji Mumbai International Airport and evaluates its sustainability on regional level under different growth and reduction scenarios. The airport concentrates on the environmental performance, global connectivity, local employment, resource optimization. Moreover, the basic concepts like waste water, air quality and noise management, solid waste management are been stressed. The construction of the airport posed a lot of hindrance for the engineers as they had to tackle the geographical and climatic conditions around the airport. Also to tackle the wildlife incursions and strikes into the airside a close watch is kept on all the birds. The increase of roadways around the airport has elevated the overall transportation capacity. Managing water resources, waste water treatment and using the recycled waste is one of the prominent traits of the airport, the peacock shaped feather skylights for natural lighting and the use of energy efficient materials in construction has led the Mumbai Airport from a worn airport to one of the worlds top airport giving it a gold certification from LEED[4].

A cloud based bus alert system for navigation of blind people

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

Dr.R.Thendral | A.Gayathri, P.Kalaivani, T.Kiruthika

Abstract

Generally, journey in bus is a safe and comfort factor, but due to increase in number of buses and passengers its going be tougher and it will be more difficult for blind people to travel in bus. In this project, we proposed a novel system which can help blind people to find the bus at the bus stop. The main problem is navigation in real time traffic and checking the available buses along with their routes. In this project the blind person will get the information from the bus depository database. The desired output will be announced earphone and the bus is tracked by GPS. The blind people in the bus station are provided with a smart phone which is connected by the cloud. The cloud will store the information about the bus number and timings. Blind people instructions goes to cloud platform then cloud will process the corresponding response then get the desired result. So that blind people can clearly know about bus location and timings of bus arrival to their respective places. For developing this project, we used Voice Activity Detector algorithm, Route Selection algorithm, DTW algorithm for location estimation

A Cloud-Based Intrusion Detection System Using BPN Classifier

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2018

Priyanka Alekar | 

Abstract

The intrusion detection systems are developed in order to monitor the network activity and tack the malicious interruption in network. In this context the generated traffic data is need to be analyzed. In most of the IDS design for traffic data analysis machine learning and data mining algorithms are utilized. These algorithms are able to deal with the data for discovering the valuable or target patterns from data. But in network the data is generated and communicated in a small amount of time and the algorithms consumes a significant amount of time. In this context different feature selection approaches are implemented with the IDS systems which reduce the dimensions of the data. With the fewer amounts of data attributes learning algorithms are trained well but detection performance can be affected. On the other hand for efficient computing and dealing with large amount of data the cloud computing is used. The cloud computing provides scalable resources and efficient computing methodology for process the data is fewer amount of time. Therefore in this presented work both the computing techniques namely cloud computing and data mining both are used for improving the performance and working of traditional IDS systems. The proposed data model works in client server architecture where the server performs the computations and produces the decision by analysis of client submitted traffic samples. For training and testing of data model the SVM (support vector machine) and BPN (back propagation neural network) is used. Additionally for experimentation the KDD CUP data is consumed. The experimental results show the proposed technique reduces the overhead of client end computing efforts and enhance the decision capability of IDS systems.

A Combination Technique of Multi-wavelets and Interpolation for Resolution Enhancement of Digital Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th July 2017

Sreeletha S H | M Abdul Rahiman

Abstract

This paper explains the effect of various multi-wavelet interpolation methods on digital images to enhance the resolution of the images. A high resolution image is a major challenge for any image processing application, especially in defense and medical scenario. Here resolution enhancement technique is done in wavelet domain using multi-wavelets and interpolation methods. Visual perception of an image has to be improved by various enhancement techniques since the hardware image acquisition methods drops to a limit. Some spectral and spatial problems such as motion blur, pixilation and poor perception may still prevail in digital images which requires rectification before processing further. The Super Resolution images are generated by applying enhancement techniques on a set of noisy and blurred low resolution images . In this paper, some of the resolution enhancement techniques such as Discrete Wavelet Transform, Stationery Wavelet Transform and a combination of DWT and SWT with various interpolation techniques are experimented. The DWT-SWT with Bilinear interpolation method illustrates the improvement in the resolution factor of the image, thereby improving the visual perception of images

A Compact Metamaterial Inspired Quad band Antenna for C-Band Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th February 2018

Nandupriya P N | Sumi M

Abstract

This paper presents a compact microstrip patch antenna for the frequency bands 3.2, 4.5, 6.2 and 7.1 GHz. The resonant modes for WiMAX and C-band applications are achieved by using metamaterial inspired split ring structure and complementary split ring structure. The proposed antenna with a compact size of 27 mm × 25 mm is designed. The extraction procedure of negative permeability for the proposed metamaterial structure is discussed.

A Comparative Analysis between Traditional Virtualization and Container Based Virtualization for Advancement of Open Stack Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th May 2018

Krishna Parihar | Arjun Choudhary, Vishrant Ojha

Abstract

LXD based machine containerized new concept in the virtualization world. Its give performance to the bare metal virtualizations. A Centralized system is accessed through IP and can be scalable on demand as per requirement, Technology that eases the user problem like hardware, as well as software most popular technologies, is known as Cloud Computing. As per enterprise and industries demand cloud computing holds a big part of IT world. An OpenStack is a way to manage public and private cloud computing platform. A Linux Container Hypervisor brings Cloud Computing to the next generation Hypervisor with its features Fast, Simple, Secure. The main goal of this paper is factual calibrate is determine various virtualization technique and performance analysis.

A Comparative Analysis of Eigen Palm, Fisher Palm and Combined Eigen Palm with Fisher Palm Based Palm Print Authentication

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Vinodkumar | R. Srikantaswamy

Abstract

Personal recognition utilizing palm print, has become a most promising approach recommended by several researchers. Palm print, recognition algorithms are very essentially worthwhile in a wide variety of applications like crime investigation, security control, passport verification etc. This paper describes comparative analysis of palm print, recognition algorithms such as PCA, LDA and combined PCA with LDA. In PCA, the unique images of palm print, are mapped to a minor set of the feature space, which is termed as Eigen palms; they are training sets eigenvectors and they signify the palm prints principal components pretty best. Formerly, the Eigen palm features will be acquired thru projecting a novel image of palm print, to the subspace which is being spanned by the Eigen palms. In LDA, Every single palm print, image is treated like a coordinate point in higher dimension space of image, which is called palm print, space. Fishers linear discriminate is utilized to map palm print, image linearly from this palm print, space into a considerably lesser dimensional space of feature (Fisher palm space), in this space the palm prints image from the different palm will be discriminated considerably much more proficiently. In combined PCA with LDA: initially we map the palm print, image from image space to Eigen palm space via PCA, furthermore we make use of LDA to attain a classifier which is of linear. The elementary objective of combined LDA and is PCA to advance LDAs generalization capability. The obtained recognition result from combined PCA with LDA outperforms similar work in the literature including Eigen palms and Fisher palms matching algorithms individually.

A comparative study of artificial brains

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 17th August 2017

Agrata shukla | 

Abstract

The development of truly intelligent system are challenging tasks. The artificial brain projects aims to simulate the real human brain.Human brain have neurons about 1011 neurons with 10 15 interconnections.However,it is difficult to create 1011 artificial neurons with 10 15 interconnections .There are many artificial brains developed during past decades trying to achieve the goal. This papers gives a comparative study of some artificial brain projects.As technology develops ,the artificial brain projects progressed to achieve the goal .The development of blue brain project is the very well known. Henry Markon started blue brain project. It uses IBM “Blue Gene” supercomputer to simulate the neural signal of rat brain. IBM computer scientist Dharmendra Modha started cognitive computing project aiming the construction of a “brain atlas”for highly local cortical regions. Kwabena boahen[5] an stanford researcher started “Neurogrid project”.The research goal is to “understand how cognition arises from neuronal properties” Eligene M.Izhikuch[6] the chairman and CEO of “Brain corporation “ started the “large scale model of mammalian thalamo-cortical systems.This model based on experimental data from many mammalians species. Horwitz strated “Brain Image and modeling project” that differ from previous model because they lack neuron-level processing. Master prince and Suliman Alsuhaibani[4] created adaptive artificial brain for humoid robot.This uses pattern recognization and machine learning. There are discussion of some projects with some future recommendations.

A comparative study of Excess Loop Delay Compensation Techniques in Continuous Time Delta- Sigma Modulators

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 23rd August 2017

Aditi Singh | Kumaravel S

Abstract

Continuous time ∑∆ Convertor is an highly power efficient modulator which has overcome the pipeline and Discrete time modulator as they require more number of high speed gain stages.Morever it is has an aliasing free Nquist band which is made available by oversampling and an on chip filter is also present.The input is resistive with no sampling so it is easier to drive the entire modulator with miniscule noise and an on- chip clock conditioner is used.There are several drawbacks associated with CTDSM like clock jitter and excess loop delay.In this paper different techniques to reduce Excess Loop Delay(ELD) in a continuous time delta sigma modulator is analysed and presented.

A Comparative Study of Hybrid Electric Vehicles

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 10th February 2018

Faizah Fayaz | Farhad Ilahi Bakhsh

Abstract

Two big problems which restrict the development of automobile industry are environmental pollution and energy storage. With this concern, the Hybrid electrical vehicle has been developed to achieve energy saving and emission reduction. A conventional vehicle actuated with only internal combustion engine cannot enhance the fuel economy due to wide range operation requirement of the power train. Instead of this, a Hybrid electrical vehicle which uses ICE and two motors can effectively improve the efficiency of the power train. This type of Hybrid electrical vehicle provides four modes of operation, including Electrical vehicle (EV) mode, range extending (RE) mode, hybrid mode, and engine mode. Despite continuous development in HEV’s: short range, long recharging time and cost still act as barriers to their widespread adoption. Therefore, the increasing interest in the development of HEV’s has broken in new designs of HEV’s namely Series Hybrid electrical vehicle, Parallel Hybrid electrical vehicle, Battery electrical vehicle, Plug-in Hybrid electrical vehicle, Range extending Hybrid electrical vehicle. This paper reviews technology used in HEV’s, their types, the effect of different technology mixes for efficient battery recharging and their development towards sustainable, efficient and environmentally friendly transportation.

A Comparative Study of Low Power Transition, Area Overhead and Fault Coverage Testing Techniques for Digital Circuits

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 9th August 2017

Suhas B Shirol | Rajashekar B Shettar

Abstract

In recent years, the technology is changing faster than the Moore's law stated hence to develop the devices which are efficient with respect to power, area and speed has become a challenge in field of VLSI. The main focus of this paper is comparative study of Low Power Transition, Low Area and High Fault Coverage in BIST architectures, it has been seen that during test power consumed is higher due to transition activity, area overhead is more and fault coverage is less for CUT.

A Comparative Study of Price Indices of Some Essential Agricultural Commodities

International Journal of Science , Engineering and Management, Available online 8th May 2018

Sarika Y. Thakare | Sunil B. More

Abstract

This research paper deals with the comparative study of rise in the prices of various commodities which are very commonly used in India. The rise in prices are studied for past twelve years i.e. from the year 2005 to 2016. For this, some commonly used food grains such as rice, wheat, jowar and bajra are studied for their variations in the prices year wise. Also the most popular and required types of vegetable such as onion, tomato and potato are considered for comparative study of fluctuations in prices. This research paper also gives the behavioral changes in the prices of the mostly desired fruits such as banana, apple, mango and orange. To study all about these, Index numbers are used which is a useful way of expressing economic data time series and comparing commodities. With the help of time series analysis and index number theory, it is tried to study the comparative variations among the prices of various products which are very important in our day to day life. In this paper, an attempt is made to study the inflation rate, reasons behind the fluctuations and its impact on farmers and customers. Also it is tried to study whether these variations are very significant or not

A Comparative Study of Region-Based Segmentation Algorithms on Brain MRI Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Kavyashree G | Sudheesh K V

Abstract

Image Segmentation is the one of the principle component of image processing. In medical image processing the segmentation play an important role for classification, image analysis, and extraction of brain tumour, Different image segmentation methods are used for examination of medical images but efficient segmentation methods lead to accurate diagnosis. In this paper, we review the different segmentation algorithm on MRI Brain Images has been presented in order to obtain the accurate algorithm. The segmentation algorithms has been divided into four categories K-means, Fuzzy c means, Special constrained Fuzzy-c-means and Expectation Maximization. Efficient algorithm is obtained by computing the evaluation criteria such as Martin Criteria, Probability rand index and Variation of information.

A Comparative Study of the Renewable Solar Energy and Other Renewable Energy Sources Evaluation of Globalization

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 10th May 2018

Reetika Gupta | Teeksha Chadha, Nikhil Kumar, Vishal Sharma

Abstract

Many industries in India are working towards increasing the performance ratio of solar power plants in large scale. To increase the utilization and development of solar energy which is an Eco-friendly atmosphere in the world? The main problem in renewable energy system is the variation in power generation from time to time due to the intermittent nature of the renewable sources. Solar penal should be given to encourage more people to explore renewable then to other renewable energy. In terms of environmental impact, solar power is a much more optimal resource than fossil fuels solar energy harnesses the power from the sun. We can take radiation in the form of light from the sun and convert it into electricity. This is typically done through photovoltaic cells, or PV cells, which are made of semi-conductive materials like silicon. When sunlight is absorbed by the PV cells, photons of light can transfer that energy to electrons, which create energy in the form of an electric current as the electrons flow through the material. Solar energy is classified as a renewable energy source since it is a source of energy that can theoretically regenerate and replenish itself indefinitely. While some argue that nuclear energy should also be classified as renewable, most agree that it is a sustainable energy source. Nuclear power supplies about 4.8% of the world’s total energy while solar power supplies less than 1.4%. Nuclear power generates around 10.6% of the electricity used around the world while solar energy supplies less than 6.3%. It looks like we have nuclear energy to thank more for the electricity flowing through our technology. The best way to compare solar energy and fossil fuels without subsidies is to examine global energy prices. Consider this: global coal prices have historically averaged $0.06 cents per kilowatt-hour (kWh). Until the past decade, no alternative energy resource came close to rivalling that price. Fossil fuel steam averages around $0.05 cents/kWh and small-scale natural gas can go as low as $0.03 cents/kWh. It’s no wonder that the world was shocked in 2016 when a major commercial solar installation bid the lowest price for PV to date at $0.029 cents per kWh – effectively leveling the playing field between solar and fossil fuels’ cheapest offerings

A Comparative Study on Ann and Hmm Based Automatic Speech Recognition Systems for Controlling Micro Air Vehicles

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Pragathi G | Veena S, Roopa S

Abstract

Speech is one of the effective modes of communication and when made to be recognized by a computer, it can be used in many different areas of application. This paper makes a comparison between Hidden Markov Model Artificial Neural Networks (ANN) used in controlling of Micro Air Vehicle (MAV) based on speech-activated commands from Ground Control Station (GCS). Therefore, Automatic Speech Recognition (ASR) Systems are developed based on ANN and HMM separately and the recognition accuracies obtained in both the cases are validated against each other.

A Comparative Study on Design Wind Speed Using Extreme Value Type-1 Distribution and IS875 Approach

International Journal of Science , Engineering and Management, Available online 19th April 2018

N. Vivekanandan  | 

Abstract

Assessment of wind speed in a region is a pre-requisite while designing tall structures viz. cooling towers, stacks, transmission line towers, etc. This can expediently be carried out by Extreme Value Analysis (EVA) of hourly wind speed (HWS) data using probability distribution, or by using standard procedures available under Bureau of Indian Standards code of practices (IS 875) for building and structures. This paper details a study on EVA of HWS data recorded at India Meteorological Department observatories of Delhi and Visakhapatnam adopting five parameter estimation methods of Extreme Value Type-1 (EV1) distribution. The adequacy of fitting of EV1 distribution was quantitatively assessed by Goodness-of-Fit (GoF) tests such as Anderson-Darling and Kolmogorov-Smirnov, and diagnostic test using root mean squared error. The GoF and diagnostic tests results present the order statistics approach (OSA) is better suited amongst five methods adopted for estimation of wind speed for Delhi and Visakhapatnam. The results of 3-second average wind speed obtained from EVA of hourly rainfall adopting EV1 (using OSA) distribution are compared with IS 875 approach for arriving at a design wind speed. Based on the results obtained from EV1 distribution and IS 875 approach, the recommendations are made and presented in the paper.

A Comparative Study on Effect of Different Material for Retrofitting of Concrete Columns

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th August 2017

Mandakaruhi Rymbai | Peerzada Jaffar Abass, S. Ganesh

Abstract

Antique structures are prone to be afflicted by the fluctuating load or the change in the environment circumstances such as effect due to earthquake load, wind load and other unpredictable factors. Rehabilitation of such structure will cost a lot and the alternate way to reduce that cost is by choosing the structure to be bolster with various type of strengthening technique using distinct material. One of the best technique used is by wrapping different material from the external surface. Retrofitting of material is a widely-used method and has been followed since long time back especially during this time period where natural calamities can happen anytime anywhere, so people are inclined to apprehensive with their structure condition. The retrofitting material being used here are steel jackets, elastic tapes, rubber tubes and glass fiber reinforced polymer(GFRP) with epoxy resin as adhesive. The concrete column used is having the dimension of 80mmX80mmX300mm a type of short column. The wrapping location tested at two specific places- first type wrapping is to be done at the distance 100mm from both edges of the columns and in the second type the wrapping location to be done is 100mm to 200mm distance of the column i.e.at the center of the column. The columns are both end fixed and two grade of concrete used for the tested columns i.e.M20 and M25 for confirmation. The cracking load that can be absorb by the columns were tested by using digital compressive testing machine. Each grade of columns tested on 28days curing into three category- first categories were the standard columns, the second category in which the columns were first subjected to the compressive load then retrofitting done after subjecting to load for the second-time testing and the third category in which the retrofitting of columns was directly followed after its 28days curing then the columns were subjected to the compressive load. The results obtained were being simulated into the ANSYS software and the finite element analysis is done which gives similar result as compared to the experimental values.

A Comparative Study on Fake Review Detection Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th May 2018

A.Lakshmi Holla | Dr Kavitha K.S

Abstract

Opinion mining has played a significant role in providing product recommendations to users. Efficient recommendation systems help in improving business and also enhance customer satisfaction. The credibility of purchasing a product highly depends on the online reviews. However many people wrongly promote or demote a product by buying and selling fake reviews. Many websites have become source of such opinion spam. This in turns leads to recommending undeserving products. This literature survey is done to study the various fake review detection techniques in detail and to get ourselves familiar with the works done on this subject.

A Comparative Study on Rural and Urban Women with Respect to Entrepreneurial Activity

International Journal of Science , Engineering and Management, Available online 13th September 2017

Ashima Kapoor | 

Abstract

Rural and urban women are makers of family; they help the nation to grow. In our country development, women are socially and economically necessary. Entrepreneurship is the activity which is present in the women but is not capitalized in India in which it should be. The Big reason in India is that it is Male dominated country where the voice of women cannot be heard by the society. They think women are born only for household work because of which the rural and urban women cannot explore themselves. So in this study we will try to find out the various problems and inspiring factors of women entrepreneurship in rural and urban areas of Delhi. We will try to suggest the ways of eliminating and reducing the problems of the women entrepreneurship in rural and urban areas

A Comparison of Basalt Fibre with that of Basalt (Rock) for a Composite Application

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 21st December 2017

R Ranjith Kumar | Rajnish R Dubey, Bharath Kumar, Dr C Anil Kumar, Vinod kumar Biradar

Abstract

In the present days, technological life the components with composite material is growing every year more than 10 % throughout the world. One of the basic reinforcing elements of composite materials is fibres because fibrous materials are widely applied in quality of thermal, sound-proof, strength and so on. Another basic reinforcing elements of composite materials are particulates in the form of flakes or short fibre, these material size and structures vary from Nano to micro depending upon the application. The present investigation is to have a comparison between the Basalt rock properties with that of Basalt fibres for several applications.

A Comprehensive Review – Anatomical, Functional and Molecular profiling of honey bee wax moth Galleria mellonella

International Journal of Science , Engineering and Management, Available online 4th September 2017

S. Pooja Sri | S. Sribal

Abstract

The greater wax moth Galleria mellonella attracts the view of many researchers by their anatomical, functional and molecular profiling patterns. Mostly the larvae feeds on honey bee hive and Larvae of the greater wax moth Galleria mellonella have been shown to provide a useful insight into the pathogenesis model of a wide range of microbial infections including mammalian fungal (Fusarium oxysporum, Aspergillus fumigatus, Candida albicans) and bacterial pathogens, such as Staphylococcus aureus, Proteus vulgaris, Serratia marcescens, Pseudomonas aeruginosa, Listeria monocytogenes or Enterococcus faecalis [1]. Like mammals, insects possess a complex innate immune system. In addition, analogies are found between the epithelial cells of insect larval midguts and intestinal cells of mammalian digestive systems. Finally, several basic components essential for the bacterial infection process such as cell adhesion, resistance to antimicrobial peptides, tissue degradation and adaptation to oxidative stress are likely to be important in both insects and mammals [2]. Thus, insects are polyvalent tools for the identification and characterization of microbial virulence factors involved in mammalian infections [1]. In 1934, many researchers focused on studying the larval body fluids to understand the biochemical mechanism of the honey bee moth. The larva of Galleria mellonella is available as in commercial for feeding the predatory insects. Not only this organism is used an innate immunity model but also it is now investigating for doing a research in genetic hereditary studies of sterility mechanism. The main aim of this review paper is to provide the current knowledge of this organism anatomical, functional, molecular profiling. My future aspects is to do whole genome sequence of this organism and also to create novel knock out model for understanding the interaction of foreign particles with the innate immune response disorders

A Comprehensive Review on Natural Fiber Reinforced Polymer Composites

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th June 2018

Dharmender | Vasudev Malhotra, Sanjeev Goyal, V.P.Dutta

Abstract

This century plays the dominant role in the development of high-performance material made from natural resources in all over the world. The large variations in characteristics and properties are the supreme challenges in the development of natural fiber polymer composites. The number of variables such as fiber-type, matrix materials and applications are prejudiced natural fibers reinforced with polymer composite properties. Finally, the new development of natural fiber reinforced polymer composites will be studied and concluded

A Comprehensive Review on Recent Development of Islanding Detection Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th April 2018

Diksha A.Shinde | Prof. R. S. Somalwar

Abstract

Incredible growth in demand of electricity with efficient, reliable and eco-friendly power has motivated progress of distributed generation (DG). This is located at distribution system and now a day renewable energy sources used as a DG. But problem of using DG is unintentional islanding, which has perspective to make voltage and frequency out of synchronism and can damage equipment along with thoughtful issue of worker safety. Hence system should identify islanding and avoid its adverse effect. There are many islanding detection methods (IDM) but there is no such technique by which all the problems related to islanding being solved. In this paper new islanding detection technique is proposed on the basis of voltage ripple at inverter side of micro-grid base system. Its performance will be verified under wide range of operating condition in MATLAB/Simulink software.

A Comprehensive Study of Surface Geometry, Humidity and Dry Patches on Falling Film Heat Transfer

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 5th February 2018

Rajneesh Kaushal | 

Abstract

Heat transfer through falling film evaporation has wide industrial applications like in cooling towers of thermal power plants and refrigeration and air conditioning industries. There are various factors which can improvise the falling film evaporation performance or effectiveness like enhanced tube surface geometry and working conditions. The relative humidity of air has a great influence on falling film evaporation. Also, dry out of the surface of tubes because of excessive thermal loading or less flow rate of cooling water film has a significant role in the effectiveness of falling film evaporation. Thus, a comprehensive review has been conducted to study the effects of surface geometry (horizontal smooth and plain tubes, porous structures, finned and enhances surfaces, liquid feeder configuration etc.), falling film pattern, dry out crisis phenomenon and relative humidity of the air. Finned and enhanced surfaces were supposed to increase the heat transfer rate than the others. Dry out a phenomenon which occurs due to instability problem can be checked by stability factor or minimum wetting rate. The humidity of air leads to increment in mass transfer coefficient and heat flux.

A Comprehensive Study of Wireless Charging Lane for Electric Vehicles

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 30th March 2018

Shalaka Bhandarkar | Aishwarya Naik, Dr.A.Sudha

Abstract

In this paper, a brief study of wireless charging lane is presented. Electrical vehicle dynamic charging by wireless power transfer is becoming prevalent. This new power supply mode allows running cars to be charged with electricity at any time on the road. This charging is done on the basis of inductive coupling theory. Various types of wireless transfer methods are compared. Problems arising in the wireless power transmission are also discussed and optimal design for wireless charging for power maximization is also presented

A Comprehensive Survey on MEMS Technology in RF as Road Map towards Future Research

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Prof. Raju Yanamshetti | Sandeep Kumar Kulkarni

Abstract

Since 1980 there have been significant research with MEMS switch in the field of RF (Radio Frequency). In every 3-5 years there have been a break through achieved with MEMS in RF technology. This breakthrough include improvement in the switching voltage, improvement in the overall pass-band, improvement at the insertion loss and improvement at the switching speed. Currently MEMS switch offers a tremendously high frequency around 70GHz in comparison to FET which offers 4GHz, similarly diode offers 20GHz, EMR 5GHz, EMRSMA 40GHz . Even though insertion loss is now reduced to 0.25db, switching voltage has come down to 2 to 4 V, there are areas where MEMS still need significant amount of research in terms of unit cost MEMS switches are significantly high value in comparison to other peers, have present lesser less life time and represent high switching power (even though switching power comedown. A dedicated research is needed in the direction of MEMS based RF technology to improve this factor were they lag other semiconductor counterpart. This research requires and understanding of technological advancement in the area of MEMS along with the parameter and factor that have resulted changes and advancement. In this paper we present historical water fall in the advancement of MEMS over RF technology along with comprehensive analysis with the other parallel technology in terms of standard matrices and theoretical foundations.

A Conceptual Framework for Green Supply Chain Management based on Drivers and Challenges

International Journal of Science , Engineering and Management, Available online 27th June 2018

Sourabh Jain | Dr. Ajay Verma

Abstract

Green supply chain management has been seemed as an environmental innovation with considering several environmental affect into chain management. The essential reason of this find out about is to reveal the new progressive areas of this emerging field such as all those improvement that are relevant to environmental and social sustainability towards operation management and furnish chain management. Sustainable improvement has made top notch growth in establishing environmental and social sustainability in the direction of operations administration and the furnish chain. This paper also point out the reasons why any company adopt green supply chain management. The motive of this research paper is formed a conceptual framework for green supply chain management based on drivers and challenges. Several drivers and challenges are obtained by literature review

A Conceptual Framework for Green Supply Chain Management based on Drivers and Challenges

International Journal of Science , Engineering and Management, Available online 19th July 2018

Sourabh Jain | Dr. Ajay Verma

Abstract

Green supply chain management has seemed as an environmental innovation with considering several environmental effects into chain management. The essential reason of this find out about is to reveal the new progressive areas of this emerging field such as all those improvements that are relevant to environmental and social sustainability towards operation management and furnish chain management. Sustainable improvement has made top-notch growth in establishing environmental and social sustainability in the direction of operations administration and the furnish chain. This paper also points out the reasons why any company adopt green supply chain management. The motive of this research paper is formed a conceptual framework for green supply chain management based on drivers and challenges. Several drivers and challenges are obtained by literature review.

A Conceptual Model Based Approach to Assess the Hydrologic Processes in Dakshin Dinajpur district of West Bengal, India

International Journal of Science , Engineering and Management, Available online 8th December 2017

Rupak Kumar Paul | 

Abstract

The lumped version of HBV model was calibrated for areas comprising five adjacent catchments to which the district Dakshin Dinajpur is nested. With the calibrated parameter the model was applied to the district to simulate the components of hydrological system (e.g. runoff, actual evaporation, groundwater recharge etc.,) and subsequently multiple linear regression analysis was done to assess the impact of natural and human factors, if any, on each component with a view to having a comprehensive understanding of behavior of hydrologic system pertaining to the district. To substantiate the output of regression analysis Mann-Kendall test was applied to observe whether the trend in explanatory variables, if any, correspond to that in response variables. It is observed that in last sixteen years on an average there is no change in monsoon rainfall while non-monsoon rainfall is decreasing gradually that causes reduction in annual runoff by about 31.93% with respect to its estimated value in the base year 2000. Direct runoff is decreasing at the rate of 6.84 mm per year. There is no change in groundwater recharge that comes from monsoon rainfall through the base flow is declining over the time at the rate of 6.73 mm per year and this can be attributed to increasing withdrawal of groundwater for irrigation use in a lean season so far as the result of regression analysis indicates. Thus, two factors – rainfall and groundwater based irrigation – have been proved statistically to be capable of explaining the changing behavior of hydrologic processes in the district.

A Critical Review of Carbon Nanotube based MEMS Piezoresistive Pressure Sensor for Medical Application

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Siddarud Bannikoppa | Ajayakumar C. Katageri,B.G.Sheeparmatti

Abstract

This paper discuss about the critical review on design of carbon nanotube based MEMS piezoresistive pressure sensors, use of different types of carbon nanotubes such as multi-walled carbon nanotubes (MWCNTs), single-walled carbon nanotubes (SWNTs) and vertically aligned carbon nanotubes (VANTs), sensing mechanism, applications, etc. The structural deformation of the piezoresistive nano structure will result in change of resistance. CNT is a sophisticated material with interesting electrical, mechanical, physical properties that can be used for fabrication of micro pressure sensors on different substrates, which may serve as alternative for silicon based pressure sensors when bio-compatibility and low cost applications are required.

A CUDA Based Implementation of Image Verification Tool Using Computer Vision Libraries

International Journal of Science , Engineering and Management, Available online 13th April 2018

Naveed Anjum Khan | S. K. Kapde

Abstract

Image Verification has become the major trend in automation industry to Validate images from high-resolution cameras at the greater performance. Recent Technological developments in computing have made it possible for image Processing algorithms to work at greater speed and at higher accuracy. However, in traditional serial manners, the operations of both methods are time-consuming. In this project, initially we are proving the possibility of CUDA based implementation of image comparison algorithms to automate image verification using NVIDIA CUDA Enabled Graphics Processing Unit, later we are going to compare the results with serial implementation and, finally a service executable based tool is developed using COM as well as named pipes based Inter-Process Communication interface to make these parallel algorithms accessible by third-party tool like Lab view.

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Nisha Ranjan Sah | Tejashwini P, Veeresh S, Yathish,Mrs. Prema.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Nisha Ranjan Sah | Tejashwini P, Veeresh S, Yathish, Mrs. Prema.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google service

A Data Mining Approach With Anonymization Techniques Using Keyword Search On Health Based Records

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th January 2018

Sri. E. Ramesh | Dr. B Tarakeswara Rao

Abstract

A medicinal services framework incredibly upgrades the patient social insurance records which are put away in the cloud server. Accessible encryption conspire is utilized which improves the inquiry system. Conjunctive watchword look encourages the approved clients to get to the records by giving numerous catchphrases, so it ends up plainly troublesome for the aggressors to figure the watchword and recover the records. Re-encryption conspire gives greater security to the records by re- scrambling the encoded list before transferring them to the cloud server. Since the patient's social insurance records comprise of touchy data, it might be badly designed for the patient when his records are gotten to by everybody. To beat the issue in our proposed work we present the idea called K-Anonymity which is utilized so it gives just an incomplete access to the approved clients by utilizing two techniques concealment and speculation. This has been exceptionally productive in the standard model.

A DC Actuator based elevation mechanism for Patient Positioner System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd July 2017

Tarakeshava M K | A.R.Priyarenjini

Abstract

Hydraulics based motion control has been used from many years in healthcare imaging and scanning applications like PET, CT, MRI etc. Achieving positional accuracy and repeatability is very crucial in medical imaging systems to get good scan reports. For scanner table elevation mechanism, a digital processor controlled hydraulic based methodology is used in existing systems. However hydraulic based design has its own disadvantages. So, this paper presents a new method of elevation mechanism for patient positioning system, which uses electrical DC actuator instead of hydraulics. Also, describes the use of optical encoders for table position tracking and PID controllers to control DC motor speed control

A Detailed Review on Alkali-Activated Slag (AAS) and Fly Ash Based Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 5th January 2018

Sonal Banchhor | Dr Meena Murmu, Dr Shirish.V.Deo

Abstract

In the present world, the technology is changing at a high pace, concrete is one among them and has turned into a key piece of our lives. With each passing day, the use of cement is expanding at a high rate. One of the core constituents of concrete is Portland cement. With the increase in utilization of concrete, the manufacturing and consumption of cement have increased drastically. Despite the fact that bond has uncommon restricting properties and is extremely apt for use in concrete, the assembling of concrete outcomes in the discharge of a lot of CO2. Due to this, researchers have commenced finding alternatives to cement that are economical as well as environment-friendly. Fly ash and Ground granulated blast furnace slag are industrial by-products which postulate admirable binding properties to concrete and accommodate as a supersession of cement. These alternatives are generally termed as Supplementary cementations materials (SCMs). The utilization of these materials not only avails in reducing the consumption of cement but withal accommodates as an efficient method for their safe disposal. This paper analyses the effect of utilizing these materials that can be utilized in concrete as partial replacement of cement. The literature review of sundry researchers reveals that a single alternative cannot provide all the benefits that cement does. Rather, a suitable combination of these products can be incorporated in concrete to provide properties better than that of Portland cement concrete. And research in the field of AAS and fly ash concrete states that this new material is high potential to replace an alternative to Portland cement. This article presents an in-depth review of alkali-activated slag and flies ash-based concrete. The paper covers composition, mixing and curing process, benefits, limitations, and applications of AAS and fly ash-based concrete.

A Detailed Study on Fundamental Characteristics and Functional Operations of Manet

International Journal of Engineering Research in Computer Science and Engineering, Available online 28th August 2017

Narayanasamy Rajendran | Dr. E.R.Naganathan

Abstract

A MANET is a collection of independent mobile nodes that communicates with each other through wireless medium. The MANET architecture is dynamic in nature, the nodes act as transmitter and receiver. The vehicular ad hoc network topology changes frequently due to the dynamic nature of the autonomous mobile nodes. MANET is exposed to multiple kinds of attacks due to its fundamental characteristics like no security mechanism, dynamic topology, no central control devices and open wireless medium. The impact of attacks affects the security, quality of service and the performance of MANET. MANET is the best alternative for developing countries where communications infrastructure doesn’t exist. To understand the how MANET is created, configured and controlled we need to understand the following area: MANET Architecture, Clustering Formation, Identification of Host and IP address auto configuration, Handover mechanisms on MANET, Routing on MANET, MANET file sharing, Different types of attacks and Security on MANET.

A Detailed Study on Security Threat Analysis in Wearable Devices

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Srimanth DS | Sudhanva Krishna V, Vishwajith M V,Venkatesan S

Abstract

Wearable devices can be anything from small wrist-mounted systems to bulky backpack computers. Wearable device is a combination of devices typically a belt or backpack PC, head-mounted display, wireless hardware and some input devices. The fundamental principle of wearable device is to collect data ubiquitously and continuously, about the individual user and also their surroundings. This can pose many privacy challenges and are hindered by poor security. They are not mature yet in term of device security and privacy acceptance of the public. Low processing power of wearable device leads to developer’s inability to implement certain complicated security mechanisms and algorithms on the device. This paper analyzes various security issues and attacks on the user’s data

A Detailed Study on Vegetation Indices - Towards Agriculture Degradation Monitoring In Madurai Region, South India

International Journal of Science , Engineering and Management, Available online 31st August 2018

A.Priyanga | S.Jeyaram Shibu,R.A.Alagu Raja

Abstract

The appetite for up-to-date information about earth’s surface is ever increasing, as such information pro- vides a base for a large number of applications, including local, regional and global resources monitoring, land-cover and land-use change monitoring, and environmental studies. The data from remote sensing satellites provide opportunities to acquire information about land at varying resolutions and has been widely used for change detection studies. Change detection is a technology ascertaining the changes of specific features within a certain time interval. It provides the spatial distribution of features and qualitative and quantitative information of features changes. The main aims are to determine whether vegetation composition, structure and condition are changing over time or in response to a management intervention. . Remote sensing refers to the detection and recording of values of emitted or reflected electromagnetic radiation with sensors in aircrafts or satellites. The remote sensing datasets, such as satellite imageries and aerial photographs, would be a useful tool for monitoring purposes. This paper gives with comparing the performance of various vegetation indices parameters on semi arid region Madurai, Tamilnadu. There are forty index parameters calculated for this purpose. These parameters are grouped into first generation indices and second generation indices. The classified vegetation indices are further grouped into two main categories: indices created from the combination of two spectral bands, notably the red and near infrared , and indices created from the combinations of three or four bands. Some of the popular indices calculated are NDVI, SAVI, TVI, EVI, and PVI computed for the Resourcesat (IRS- P6) satellite imagery and the results are compared. From the vegetation classified output maps, the change map is computed. The change map is a measure of extent to which vegetation has been degraded in the study area during the two dcades.. In this paper, a method is proposed for vegetation cover estimation from multi spectral satellite data based on vegetation index. The timely difference between the vegetation cover of Madurai region, Tamilnadu during different time periods have been computed using post classification change detection comparison. The results show the extent of vegetation degradation during the concerned time p

A Detailed Survey on Big Data Application in Global Banking Data Management & Decision Making

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th December 2017

Kavyashree. J | Gouri Jambure, Vasudeva. R

Abstract

In today’s world of Investment Banking and other financial domain areas, the requirement and demand for the automation in data processing is very high. The data is accumulated from different data sources with an increase in the rules and regulations, but that should also come with a plan of cost reduction without compromising in quality and scalability. The underlining technologies that handle big data with should guarantee of optimization and also keep global financial institutions interest in it. So this paper or case study covers the Big Data architecture and design that would help banking institutions make key decisions. We have used Hadoop map-reduce and no-SQL flexibility also maintaining the quality, banking rules and standards. The data that is proposed to be consumed or used for this analysis is from different sources and techniques, techniques that are followed in regular banking practices. That would include “front end” or “backend data processing”. Business process modelling would require data transmission OR orchestration from different sources that are required to make key and important financial decisions.

A Detailed Survey on Big Data Application in Global Banking Data Management & Decision Making

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 28th December 2017

Dhanya G S | Hemsai L, Sachin Kumar, Imthiyaz Ali, Yuvaraj Patil

Abstract

This presentation mainly focuses on Information security. Information security deals with the privacy and security concerns of the data. Are all our data safe and secure with us? How can our data be secured from data phishing and hacking? How is the data misused? Everyday at least 10 millions of the records are getting swiped. Here we see how to protect the data.

A Device For Blind Human Ultrasonic Echolocation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Manika Bajpai | Dr. A.K. Wadhwani

Abstract

This paper present a device that combined the principles of ultrasonic human echolocation and animal echolocation .This device is helpful for blind and visually impaired people. Some animals such as (bats and dolphin) sense by active echolocation, in which emitted acoustic pulses and their reflection are used to sample the environment .Bats and dolphin are highly informative compared to humans. Active echolocation is also used by some blind humans, who use signals such as tongue clicks cane taps as mobility aids. The device consists of a headset with an ultrasonic emitter and stereo microphones affixed with artificial pinnae. Methods-: The echoes of ultrasonic pulses are recorded and time-stretched to lower their frequencies into the human auditory range before being played back to the user. Results- Simple words were able to lateral depth and distance judgments. This device is working as record the echoes. Conclusion-: This device is suggests can be used effectively for environment and human auditory system. Many humans is suffer for blindness (cardiac patient) and night visions this devices uses in this people.

A dimensionless approach to model granule size variation in UASB reactor: Model development and its validation

International Journal of Science , Engineering and Management, Available online 5th February 2018

Vidya Singh | Ram Pal Singh, Anuradha Pandey, Narendra Deo Pandey

Abstract

Granule size and its variation plays an important role in satisfactory performance of upflow anaerobic sludge blanket (UASB) reactor especially in the treatment of industrial and low strength domestic wastewaters. The present study is aimed to model the granule size variation based on fourteen quantifiable variables influencing the granulation and granular size development in UASB reactor. They include organic loading rate, inflow rate, gas production rate, volatile suspended solids, total suspended solids, specific methanogenic activity, sludge volume index, operation time, time for which constant organic loading rate was maintained during the reactor operation, effluent COD concentration, polymer dosing, liquid upflow velocity, granules settling velocity and reactor diameter. Dimensionless mathematical functions are developed for granule size variation using these variables. The non- linear multiplier function with each dimensionless terms as power function is subjected to non-linear regression and the function so developed has been then validated using the experimental results from literature. The results show that the developed non-linear function is capable of predicting the granule size variation in UASB reactor satisfactorily with maximum error in prediction being less than 5.5%. The results of sensitivity analysis show that the liquid inflow rate is the most sensitive parameter among the fourteen variables considered in simulation of granule diameter.

A Discriminative Robust Local Binary Patter for Object Recognition

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Chithra M G | 

Abstract

Object recognition is very important process in computer vision. Texture and edge information is mainly used for object recognition. Local Binary Pattern (LBP) and Local Ternary Pattern (LTP) are mainly used for object recognition. But these two techniques suffer from noise and intra-class variations due to small pixel fluctuations. To solve this problem a new algorithm called Robust Local Binary Pattern (RLBP) and Discriminative Robust Local Binary Pattern (DRLBP) are used for object recognition. Comparative analysis is done between RLBP and DRLBP using Caltech 101 dataset.

A Distributed Publisher Driven Secure Data Sharing Scheme for Information Centric Iot

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th April 2018

Ch.Tishitha | N.Kesava Rao, M.Anupa, A.Jyothsna, K.Mounika

Abstract

This paper presents a critical review of Failure Modes and Effect Analysis (FMEA). Although the method is almost 70 years old, in literature there are still many researchers, both from academy and industry, devoted to improve it and overcoming unsolved and still open problems. The aim of this work consists in analysing a representative pool of scientific papers (220) and patents (109), in order to have an overview of the evolution of the method and try to understand if the efforts spent to improve it effectively answer to the several criticisms found in literature. All documents have been classified according to authors, source, and four technical classes dealing with the applicability of the method, representation of the cause and effect chain, risk analysis and integration with the problem-solving phase. A detailed analysis of the results allowed us to identify the most current problems, the improvement paths, and which other methods and tool are proposed to be integrated with FMEA.

A Dual Band Microstrip Double Slot Antenna for Wi-Fi and WIMAX Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

N.Parthiban | Dr. M. Mohamed Ismail

Abstract

In this paper a dual band microstrip slotted antenna is proposed. This antenna has a simpler structure than other antennas designed for realizing dual band characteristics. Simulation studies of the proposed structure are studied and analyzed using High Frequency Structure Simulator (HFSS) software. The design antennas are then fabricated and tested using Vector Network Analyzer. We obtained good results in testing. The radiating patch is placed on a FR-4 dielectric substrate ( =4.3, tan δ = 0.02) with conducting ground. The Co-axial feeding technique is used. In the Operating frequency range of 2.4-2.48 GHz, have a return loss of less than -10 dB for Wi-Fi applications. Operating frequency range of 2.66-2.77 GHz, 4.28-4.4 GHz and have a return loss of less than -10 dB for WIMAX applications.

A DVR Based Control Scheme for Power-Quality Improvement

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

K.P. Bheemanna | N. Rajeshkumar Gowd , G. Subba Rao Gupta

Abstract

Because of increasing complexity in the power system, voltage sag is getting to be a standout amongst the most critical power quality issues. Voltage sag is a short decrease voltage from nominal voltage, happens in a brief timeframe. On the off chance that the voltage sags surpass a few cycles, and then manufacturing systems making utilization of delicate electronic types of equipments are prone to be influenced prompting real issues. It at last prompts wastage of assets (both material and human) and in addition money related misfortunes. This is conceivable just by guaranteeing that continuous stream of power is kept up at legitimate voltage levels. This project tends take a solution at the using so as to take care of the sag issues custom power gadgets, for example, Distribution Static compensator (D-STATCOM).Proposed plan takes after another calculation to create reference voltage for a distributed static compensator (DSTATCOM) working in voltage-control mode. The proposed plan guarantees that unity power factor (UPF) is accomplished at the heap terminal amid ostensible operation, which is unrealistic in the conventional technique. Likewise, the compensator infuses lower streams in this manner, diminishes misfortunes in the feeder and voltagesource inverter. Further, a sparing in the rating of DSTATCOM is accomplished which expands its ability to alleviate voltage sag. About UPF is kept up, while directing voltage at the heap terminal, amid burden change. The state-space model of DSTATCOM is joined with the miscreant prescient controller for quick load voltage regulation amid voltage unsettling influences. With these elements, this plan permits DSTATCOM to handle power-quality issues by giving power factor redress, consonant end, load adjusting, and voltage regulation in light of the heap necessity. The performance of the proposed system can be improved by adding Dynamic Voltage Restorer(DVR)

A Exposure Based Technique With Dwt To Enhance The Image

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th September 2017

Abhay Verma | Manish Dixit

Abstract

This paper gives a technique to enhance the contrast of low exposure gray image. For this threshold is calculated of gray image and it is utilized to clip the gray image into different images. And then this clipped image is individually equalized utilizing histogram equalization with discrete wavelet transform for the enhancement of the image.

A Fault-Tolerant Memory System for Nano-Memory Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 9th March 2018

Pradeep Kalakoti | Kalakoti. Kalyan

Abstract

Due to the increase in the soft error rate in logic circuits, the encoder and decoder circuitry around the memory blocks have become susceptible to soft errors as well and must also be protected. We introduce a new approach to design fault-secure encoder and decoder circuitry for memory designs. Hamming codes are often used in today’s memory systems to correct a single error and detect double errors in any memory word. In these memory architectures, only errors in the memory words are tolerated and there is no preparation to tolerate errors in the supporting logic (i.e. encoder and corrector). However combinational logic has already started showing susceptibility to soft errors, and therefore the encoder and decoder (corrector) units will no longer be immune from the transient faults. Therefore, protecting the memory system support logic implementation is more important. Here we proposed a fault tolerant memory system that tolerates multiple errors in each memory word as well as multiple errors in the encoder and corrector units. We illustrate using Euclidean Geometry codes and Projective Geometry codes to design the fault-tolerant memory system, due to their well-suited characteristics for this application.

A Flexible Approach of Mobile Cloud Computing and Big Data Analytics for Networked Healthcare Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th June 2017

Hemalatha T | K Venkata Chalapathi

Abstract

Now a day’s Mobile devices were rapidly growing as indispensable part in our daily life, facilitating to do various useful tasks. Mobile cloud computing combines mobile with cloud computing to enlarge their capabilities, benefits and reduces their limitations, like battery life less memory and CPU power. Big data analyzing technologies facilitate extracting value from data consisting four Vs: volume, velocity, variety and veracity. This paper focuses networked healthcare as well as the task of mobile cloud computing and big data analytics in its enablement. The inspiration and development of applications over networked healthcare and systems were offered along with the adoption of healthcare cloud. A cloudlet based infrastructure of mobile cloud-computing to be utilized for healthcare. The methods, tools, and applications of big data analytics were focused. Experimental results are considered in the design of networked healthcare systems with big data as well as the technologies of mobile cloud-computing.

A Framework Designing For RDF Smart Crawler for Extracting Semantic Information

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th April 2018

Gurdas Singh | Brijesh Bakariya

Abstract

Currently, Search engines only provide URL links for search queries. Crawling strategy adopted by most search engines only search on HTML keywords and index the pages, but semantic web retains most rich information in RDF files and crawlers don’t index the RDF. In this work, we deal with the problem and design a smart crawler which can retrieve semantic information for keyword queries. In addition to retrieving the information, the proposed solution also focus on ranking the semantic information. Ordinarily, a covetous framework is used to pick the terms that enlarge the new returns each cost unit. We comprehended that not each record is square with while selecting the request to cover them. Broad reports can be secured by various requests, paying little respect to how the inquiries are picked. In like manner, the criticalness of a record is then again with respect to its size. Our further examination of this issue finds that the noteworthiness of the record depends not simply on the amount of the terms it contains, furthermore the sizes of those terms.

A Fully-Integrated Low -Power Fast-Transient Capacitor-Free Low Dropout Regulator

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Mohsina Begum | Rekha S

Abstract

A completely subsidiary LDO with fast transient examination and psr of full range PSR is made to give free of tainting supply for building pieces which are touchy to clamor in extensive band prattle correspondence frameworks Ldo has high recurrence for proposed plan glitches are diminished constricted on the other hand the execution of the framework change happens A triangle circle LDO is produced and checked at 65nm zone when contrasted with other present completely associated incorporated outlines here overwhelming post is taken as yield shaft and higher recurrence is designated to inner posts with aggregate Iq calm current of 50 For Vin Vout of 1 23v and 1 V separately the 43 mV undershoot and 81 9 mV overshoot is acquired for 0 to 9 99 mA of burden transient at 200 ps edge times 1 16 ns of transient reaction is gotten and FOM is almost 5 73 ps The PSR is computed for entire range is superior to anything 20db stacked capacitors on chip of 40pf is incorporated for model estimation

A Futuristic Approach for Towerless Mobile Networks Contributing to Digital India

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Jyothi Sulochana | K Hemavathi ,P Kalamani ,Lorate Shiny

Abstract

This project is an attempt to develop the mobile networks to have a wireless voice call happening without the help of the towers. Our main aim is to remove the towers in the communication process. The towers have been hazardous to many birds and animals. This project uses the Raspberry Pi boards with the inbuilt wi-fi on board. The Raspberry Pi with the wi-fi is used for the prototype, which would be used to develop a voice call application which would transfer the voice through the wifi communication. It is proposed to develop this technology to be able to access only till the distance of 30 meters which is the distance limit of the wi-fi communication. It would be possible to move this communication to be expanded by the use of the Wimax technology which would be able to communicate in the range of kilometers. This project uses two Raspberry Pi kits with Wi-fi inbuilt on it and would be able to communicate by developing the voice call application and would be able to use the audio jack on the kit. A hardware implementation would be developed and the results would be analyzed for performance.

A Futuristic Approach for Towerless Mobile Networks Contributing to Digital India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Mr.Jagadeesha Kumar B G | Neelesh Dindur, Nikhil Jaju, Pagadala Sai Koushik, Pavankumar A B

Abstract

The project intent is to upgrade sanitation system in a village, an initiative for Welfare of the Society, primarily aimed to harness benefits for the rural people using sustainable concepts like anaerobic treatment procedures. The selected village for our project is Paduvalapattna in Mandya district, which is at a distance of 108km from Bengaluru. Key features of the proposed Sanitation System in village would include the use of Up flow Anaerobic Sludge Blanket and laying out of sewer network with assessing the water quality and best practices to improve hygienic conditions around the village. The main scope of this project is to improve the health condition of rural people.

A Fuzzy Controlled IUPQC for Grid Voltage Regulation as a STATCOM

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th November 2017

B. Divya sree | 

Abstract

This paper shows A improved controller for the dual topology of the unified power quality conditioner (iUPQC) broadening its relevance in power-quality pay, and additionally in microgrid applications. iUPQC will act as a static synchronous compensator (STATCOM) at the grid side, while giving likewise conventional UPQC pay at the load or microgrid side. Another control procedure with Fuzzy logic controller is given here. Past the conventional UPQC power quality highlights, including voltage sag/swell remuneration, the iUPQC will likewise give reactive power support to direct the load-bus voltage as well as the voltage at the grid-side bus by utilizing this controller. Expansion of Fuzzy controller gives low total harmonic distortions in the system. Simulation results are given to confirm the new functionality of the hardware.

A Fuzzy Logic Based Techniques for content based image Retrieval and Digital Data Transmission

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th September 2017

Dr.Ruksar Fatima | Prof Jyoti Neginal

Abstract

Today’s demand of internet in applications in large amount requires to be transmitted in a secure manner. In communication system transmission of digital data is not secure because interception and improper manipulation done by the eavesdropper. We can send digital data in such a way that no one, except the sender and the receiver can suspect the existing of data. In this paper we propose a new fuzzy logic based technique for content based image retrieval and digital data transmission, which transforms a secret digital data by embedding in another digital data with the same size and looking like selected target image. The transformation process can be controlled by a secret key generated by fuzzy logic

A Greedy Search Aware Fuzzy Scheduling in Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th June 2018

Sirisati Ranga Swamy | Dr. Sridhar Mandapati

Abstract

Cloud computing can provide on-demand storage as well as computing services that have a high performance level along with high scalability. The increasing consumption of energy in the cloud data centers is a very prominent problem today. The cloud performance has been affected because of the issues in security. Thereby, the service providers have been held responsible for taking proper care of these systems here and the scheduling will be held responsible for the choice of best and also most suitable resources in the task execution by means of taking certain types of static as well as dynamic parameters along with the restrictions of such tasks into consideration. The scheduling in that of cloud computing will belong to one category of the problems that are called the Non-deterministic Polynomial (NP)-hard based problems owing to the solution space and so it takes a long time in identifying an optimal solution. Here in this work, the fuzzy logic and the methods are greedy in terms of the methods that were proposed. For calculating the value of the fitness in the fuzzy inference system the membership function is used to determine the degree until which these parameters belonging to a fuzzy set which is relevant. The work also introduced another new idea for integrating the approaches in solving the hard problems that are combinatorial. This proposed methodology which shall evaluate all the objects in a manner that can combine the fuzzy reasoning along with a greedy mechanism. It also means that the fuzzy solution space is exploited with some greedy methods. The results of the experiment proved that this method proposed can achieve better performance than that of the fuzzy logic

A Helping Hand for Differentially Abled patients

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Akshata Acharya | Laxmikant Bordekar, Vrushali Kelkar

Abstract

In this world there are many people who cannot speak and hear properly. These people have difficulty in communicating with people who do not understand sign language. In general, deaf people have difficulty in communicating with others who do not understand sign language. Even those who do speak aloud typically have a deaf voice of which they are selfconscious and that can make them reticent. In developing countries, children with hearing loss and deafness rarely receive any schooling. Adults with hearing loss also have a much higher unemployment rate. Among those who are employed, a higher percentage of people with hearing loss are in the lower grades of employment compared to the general workforce. This paper aims to lower the barrier in communication by enabling the mute communities to communicate with general public more efficiently by translating sign language into text using an electronic glove. The Electronic Glove is made up of normal cloth fitted with flex sensors along the length of each finger and on the wrist. Mute people can use the glove to perform hand gesture and it will be conver ted into text and displayed on the LCD display, for easy understanding by normal people.

A High Efficient Fully Soft Switched Isolated DC-DC Boost Converter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Aravind Murali | Mr.Benny.K.K, Mrs.Priya.S.P

Abstract

This paper proposes a fully soft switched isolated DC-DC boost converter, which consists of only one switch and this switch is turned-on at zero current switching and turned-off at zero voltage switching. All the diodes in this proposed converter is turned-off at zero current condition, regardless of voltage and load variations. This converter consists of a lossless snubber and an isolation transformer. Leakage inductance of this isolation transformer is used for zero voltage switching (ZVS). All these features make this particular boost converter high efficient and low cost. Simulation results are given in order to validate the proposed concept and these results are compared with simulation results of conventional converters

A High Gain Dc-Dc Converter with Coupled Inductor and Charge Pump

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Anitha K | Mrs.Rahumath Beeby, Mrs. Shoma Mani

Abstract

The Green Energy sources such as Photovoltaic cell and Fuel cell are more popular nowadays because of environment pollution and energy shortage. However, the output of these green energy sources seems to be very lowcompared to the dc bus voltage. Thus, a high step-up voltage gain dc-dc converter with high efficiency should be introduced to boost the voltage, and then this green energy can be connected to the grid. In order to obtain a high voltage gain, high efficiency converter, this paper proposes a dual switchdc-dc converter with three-winding-coupled inductor and charge pump. This converter provides a high step up voltage gain with low voltage/current stress on the power switches. It also can achieve a high gain with a small duty cycle, which is helpful to reduce the peak current through the power device and helps to improve the efficiency. A comparisonbetween performance of the proposed converter and previous high step up converters was conducted. Simulation results verify the correctness of the analysis.

A High Gain Low Power CMOS Operational Amplifier

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st July 2017

K.Poshana | K.Lokesh Krishna ,K. Veda Samhitha

Abstract

This paper presents the design and simulation of a high gain low power complementary metal oxide semiconductor operational amplifier in 90nm technology. The aspect ratios of all the transistors were designed. High gain allows the operational amplifier (op-amp) circuit to function efficiently in a closed loop feedback system, whereas wide bandwidth makes the circuit to operate for high speed applications. The proposed op-amp design consists of two stages and operates at 1.2V power supply. It is aimed to meet a set of standard specifications. The entire op-amp design is evaluated using Cadence software tools, while the layout has been developed using Virtuoso. The op-amp circuit is able to achieve 38 dB gain, a 4V output swing, a 12.7 V/μsecond slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.

A High Gain Low Power CMOS Operational Amplifier

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

K.Poshana | K.Lokesh Krishna , K. Veda Samhitha

Abstract

This paper presents the design and simulation of a high gain low power complementary metal oxide semiconductor operational amplifier in 90nm technology. The aspect ratios of all the transistors were designed. High gain allows the operational amplifier (op-amp) circuit to function efficiently in a closed loop feedback system, whereas wide bandwidth makes the circuit to operate for high speed applications. The proposed op-amp design consists of two stages and operates at 1.2V power supply. It is aimed to meet a set of standard specifications. The entire op-amp design is evaluated using Cadence software tools, while the layout has been developed using Virtuoso. The op-amp circuit is able to achieve 38 dB gain, a 4V output swing, a 12.7 V/second slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.

A High Sensitive Approach for Gender Detection Based on Human Iris

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

B.Ishwarya | Dr.G. Heren Chellam

Abstract

Now a day’s iris patterns play a vital role in gender classification. Iris patterns are distinctive and cannot be changed until it becomes unnatural. This paper focus on gender has been detected using iris images. This work presents a new method for gender classification based on features of the iris texture selected by mutual information to improve gender classification of iris images For determining the recognition performance of the system database of digitized grayscale eye images were used. This grayscale images are segmented. Traditional iris segmentation methods always time-consuming and sensitive to noise. Here, in iris recognition, the segmentation is based on Hough transform used for automatic segmentation and able to localize the circular iris and pupil region. Edge points of iris boundaries are detected with canny edges steps and the threshold values are matched with the hamming distance. The Hamming distance was employed for classification of iris images. This work comes to the conclusion that iris segmentation is an essential part of recognition system and the prediction is based on iris texture features and stop matching when a generation of Iris close match is found

A High Speed Performance and Low Power Consumption Design For VLSI Logic Circuits Using Multi-Threshold Voltage CMOS Technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Nisha S Police Patil | Swetha B

Abstract

Due to voltage scaling in CMOS logic circuits, there will be a reduction in threshold voltage which leads to increase in the sub threshold leakage current and hence static power dissipation. Although power consumption is important for modern VLSI design, the main requirements of the VLSI design are, operating speed and occupied area. Multithreshold voltage CMOS (MTCMOS) technology is a good solution providing high speed performance and low power design without area overhead. MTCMOS technology provides the transistors that have low, high and normal threshold voltage. The low threshold voltage transistors are used to reduce the propagation delay in critical (longest) path, the high-threshold voltage transistors are used to reduce the power consumption in shortest path. This paper describes a high-speed performance and low-power consumption design for full adder (using 2 half-adder), 4-bit ripple carry adder, 4x4 multiplier and 16-bit carry look-ahead adder circuits with MTCMOS technology using 45nm technology

A Honeypot based Attack Detection and Prevention System for Smart Cities Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rohit Kumar | Surbhi Khare, Deepa Kale

Abstract

In today’s world, technology is changing almost every second day. This rapidly changing technology offers lots of benefits but also put some great challenges. Smart city is a concept that merges various Information and Communication Technology (ICT) and Internet of Things(IoT) based service solutions, together. Thus, the concept of smart cities uses all possible technologies in the state-of-the-art form. Hence, there is a need to make sure that the no one could use our networks for their own benefits. Malicious users always wait for the perfect opportunities and attack on the most vulnerable part of the network. A strong defense mechanism is needed to defend against them, otherwise the concept of smart cities would only be a chaos. In this paper, we will explain the different types of possible attacks, analyze them and will propose a mechanism to defend against them, based on Honeypot based services.

A Hybrid Approach for Improving Text Document Clustering

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th December 2017

R.Janani | Dr. S.Vijayarani

Abstract

Text document clustering is the process of distributing documents into similar groups called clusters, in order that documents within a cluster have the great affinity in comparison to other documents in different clusters. It has been taken into consideration intensified due to the fact of its substantial applicability in various areas like information retrieval, web mining and search engines like Google. It is determining the similarity among documents and based on the similarity it will organize the documents together. Fast and greatness of text document clustering algorithms perform a vital role in dramatically navigating, encapsulating, and establishing the information. The clustering algorithms can only generate the optimal solution. A globally optimal solution can be attained by applying high-geared and high-quality optimization. The main objective of this research work is to group the documents based on their contents and also to improve the clustering accuracy based on the content of the documents. In order to perform this task this research work uses the existing algorithms DBSCAN and PSO. A hybrid algorithm which is a combination of PSO and DBSCAN algorithm is also proposed. The outcome of this research work is the identification of the cluster of documents which has the same contents.

A Hybrid Book Recommender System Using Feature Combination Technique

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th June 2018

Chitresh Kumar Singh | Dr. Manash Pratim Dutta

Abstract

Recommender systems are used to provide personalized recommendations to users in the e-commerce industry. Two main approaches for the recommender systems are collaborative filtering and content based filtering. In collaborative filtering, a user’s preference is calculated by his similarity to the other users. If a user has already rated or bought an item, then the preference for another user is calculated by his similarity to the other user. In content based filtering, the approach is item based, which means that if user has already rated or bought an item, then his preference for another item is based on the similarity of the first item to the second. Both of these filterings are combined in the form of hybrid recommender systems, and when weights are assigned to these recommendations, the system so developed is known as aweighted hybrid recommender system. An often neglected feature in recommender systems is that of ‘Serendipity’. Serendipity means introduction of newer items into the recommender system, which are likely to interest the user. In this paper we have presented a suitable model, based on the feature combination technique, which introduces serendipity feature into the recommender systems.

A Hybrid Image Binarization Technique for Enhancement of Degraded Document Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th October 2017

Dr. S.Vijayarani | M.Geetha

Abstract

Image processing is a process of analysis and manipulation of digital images, which improves the quality of an image. Image binarization is a pre-processing step which improves the quality of the image. Image binarization is used to improve the image quality and it segment the pixel values into two categories; i.e. black pixel as foreground and white pixel as background. In this research work, binarization techniques are applied to improve the quality of the degraded document images. Different types of image binarization methods used in this work are Otsu, Nick, Niblack and Sauvola. In addition to this, a new hybrid binarization method is proposed which is a combination of local and global method. Performance factors used are PSNR (Peak Signal to Noise Ratio) and NRM (Negative Rate Metric). From the results, it is observed that the proposed hybrid binarization has produced good results than existing methods.

A Hybrid Intrusion Detection System Using KMeans Clustering and J48 Classification

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th April 2018

Navita Datta | 

Abstract

This paper is based on a hybrid intrusion detection system by using integrating K-means clustering and J48 classification. Firstly, the features are selected using correlation based feature selection, so that the number of attributes participating in detection of attacks can only be taken into concern and then it reduces the dimensionality of the attributes using Principal Component and Analysis. This algorithm works on the NSL-KDD dataset which is an improved version of the previously used KDD CUP’99 Dataset. Then we apply K-Means clustering over the obtained attributes and lastly we apply J48 classification for its evaluation. The proposed work has been fulfilled with an increase in accuracy and decrease in False Positive Rate

A Hybrid Protocol for Vehicular Communication in VANET Using Location Aided Routing and Base Line Multicasting

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

AnujVerma | ShiviSharma

Abstract

The design a novel location aided routing protocol with the concept of baseline and distance minimization is presented in this paper. The protocol has been implemented successfully for a vehicular Adhoc network and Manhattan model is utilized. The vehicular movement used a new concept of communication using minimization of distance from base line. The base line was drawn from source to destination node. The discussed protocol seems to work quite well and seems to yield encouraging results. The packet delivery ratio was increased significantly and the average delay was reduced significantly.

A Hybrid Scheme of EDBTC Encoding and CHF BHF Extraction for Image Ret Rival Process

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Vineetha Deepti | Pramila B

Abstract

This paper presents a new approach to derive the image feature descriptor from the Error-diffusion based block truncation coding (EDBTC) compressed data stream. In the encoding step, EDBTC compresses an image block into corresponding quantizers and bitmap image using vector quantizer(VQ). Two image features are proposed to index an image, namely, color co-occurrence feature (CCF) and bit pattern features (BPF), which are generated directly from the EDBTC encoded data streams without performing the decoding process. The CCF and BPF of an image are simply derived from the two EDBTC quantizers and bitmap, respectively, by involving the visual codebook. Experimental results show that the proposed method is superior to the block truncation coding image retrieval systems and the other earlier methods, and thus prove that the EDBTC scheme is not only suited for image compression, because of its simplicity, but also offers a simple and effective descriptor to index images in CBIR system. EDBTC method is extremely fast and the image quality achieved is comparable to the previous BTC method. This proposed system is implemented in MATLAB.

A Hybrid Technique to Perform Retinal Vessel Enhancement by Contrast Correction and Morphological Operations for Segmentation

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th January 2018

Mishal Bansal | Navdeep Singh

Abstract

Diabetic Retinopathy is a disease which affects the eyes and may cause vision loss. It can be detected by analyzing the vessels of a retinal vessel. In this paper, we present a blood vessel enhancement and segmentation approach, which is used for analysis of blood vessels. Contrast correction and mathematical morphological operations are used to enhance the blood vessels and then segmentation is performed. The proposed approach is tested on DRIVE dataset and it achieves an average accuracy of 95.40%.

A Hybrid Wind & Solar Energy System for Different Load Variations Using Hysteresis Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 28th March 2018

G. Hari Babu | N. Nageswara Reddy, B.Hanumantha Rao

Abstract

The system introduced in this paper adapts various power-control strategies of a grid-connected hybrid generation system with versatile power transfer. With this hybrid system, the freely available renewable energy sources like wind and photovoltaic energies can be utilized effectively. For this, an adaptive MPPT algorithm along with standard perturbs will be used for the system. Also, this configuration allows the two sources to supply power to the load either separately or simultaneously depending on the availability of the energy sources. The turbine rotor speed is the main determinant of mechanical output from wind energy and Solar cell operating voltage in the case of solar energy for output power. Permanent Magnet Synchronous Generator is coupled with the wind turbine for attaining wind energy conversion system. This hybrid system operates under normal conditions which include normal room temperature in the case of solar energy and normal wind speed at the plain area in the case of wind energy. A PWM Controller is used for an inverter which is replaced with Hysteresis controller. The simulation results are presented to illustrate reliability of this proposed system.

A Implementation on Predictive Analytics for Banking Issues using Mining Technique Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2018

Shahina Farheen | Manika Manerkar, Trupti Payal, Dr. K. Vikram

Abstract

Nowadays, there are many risks related to bank loans, health loan, car loan, for the bank and for those who get the loans. The analysis of risk in bank loans need understanding what is the meaning of risk. In addition, the number of transactions in banking sector is rapidly growing and huge data volumes are available which represent the customers behavior and the risks around loan are increased. Data Mining is one of the most motivating and vital area of research with the aim of extracting information from tremendous amount of accumulated data sets. In this paper a new model for classifying loan in banking sector by using data mining. The model has been built using data form banking sector to predict the status of loans particular user if they want. Here we find out the interested user who are want the service form the banking only those user meet them and discuss them without wasting time, money, man power

A Keyword based Scheme to depict organizing standard research as a field and its part

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th February 2018

G.Sumalatha | S.Swapna

Abstract

Over the most recent three decades, designing instruction explore (EER) has gained noteworthy ground towards a field of interdisciplinary grant. This paper characterizes EER by building up a watchword based plan for investigating EER- related logical distributions and coordinated effort. The catchphrase based plan alludes to a theoretical structure we have created for producing a stingy rundown of watchwords which are remarkable in EER. The produced watchwords were utilized to gather bibliographic records from ISI Web of Science® (WoS), a reference list giving access to the world's driving reference databases and diaries. To play out a far reaching look for EER-related writing by utilizing the scope of truncation rules and the propelled seek choices accessible in WoS, the venture influences following commitments to the flow information to base on interdisciplinary research in EE: (1) building training research is operationalized as a modern and deliberately determined an arrangement of catchphrases and (2) the strategy for the ebb and flow study may fill in as a noteworthy advance towards quantitative examination of the new logical field.

A Lab View Based Power Analysis of Solar Tracking System and Its Implementation in Real Time

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 25th July 2018

Poonam Soni | Aayuti Betude

Abstract

Sun is very important part of our life and hence Sun is become very abundant source of power. Even so, only a fraction of the entire energy is harnessed and that too not efficiently. The world population is increasing day by day and the demand for energy is increasing accordingly. Since oil and coal are getting depleted and it cannot be replenished, we opt for an alternative source of energy. Renewable energy is derived from natural processes that are replenished constantly. Renewable energies are inexhaustible and clean. The energy comes from natural resources such as sun, wind, tides, waves, and geothermal heat. Solar energy is quite simply the energy produced directly by the sun. This project aims at the development of a simple process to track the sun and attain maximum efficiency using Microcontroller and Lab VIEW for real time monitoring

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

R.Gokula Priya | Unnimaya P Madhu, M.Yuvashree, M.Karthikeyan

Abstract

With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have been conducted to improve the cloud security. However, most of them are not applicable for mobile cloud since mobile devices only have limited computing resources and power. Solutions with low computational overhead are in great need for mobile cloud applications. In this paper, we propose a lightweight data sharing scheme (LDSS) for mobile cloud computing. It adopts CP-ABE, an access control technology used in normal cloud environment, but changes the structure of access control tree to make it suitable for mobile cloud environments. LDSS moves a large portion of the computational intensive access control tree transformation in CP-ABE from mobile devices to external proxy servers. Furthermore, to reduce the user revocation cost, it introduces attribute description fields to implement lazy-revocation, which is a thorny issue in program based CP-ABE systems. The experimental results show that LDSS can effectively reduce the overhead on the mobile device side when users are sharing data in mobile cloud environments

A Lightweight Secure knowledge Sharing theme for Mobile Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

D. Bhanu Pratap | CH.D. Sunil Kumar, K.Dumas Sam, P.Goutham, A.Raghavulu

Abstract

With the recognition of cloud computing, mobile devices will store/retrieve personal knowledge from anyplace at any time. Consequently, the information security drawback in mobile cloud becomes additional and additional severe and prevents additional development of mobile cloud. There square measure substantial studies that are conducted to enhance the cloud security. However, most of them don't seem to be applicable for mobile cloud since mobile devices solely have restricted computing resources and power. Solutions with low process overhead square measure in nice want for mobile cloud applications. during this paper, we tend to propose a light-weight knowledge sharing theme (LDSS) for mobile cloud computing. It adopts CP-ABE, AN access management technology employed in traditional cloud surroundings, however changes the structure of access management tree to create it appropriate for mobile cloud environments. LDSS moves an outsized portion of the process intensive access management tree transformation in CP-ABE from mobile devices to external proxy servers. what is more, to cut back the user revocation value, it introduces attribute description fields to implement lazy-revocation, that could be a thorny issue in program based mostly CP-ABE systems. The experimental results show that LDSS will effectively cut back the overhead on the mobile device aspect once users square measure sharing knowledge in mobile cloud environments.

A Literature Review on the Framework of Camouflage of RIT with RDH Methods for Plain Text Images towards Better Outsourcing

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

S.Tamilselvi | R.Sasikala

Abstract

Nowadays there is the very big problem of data hacking into the networking era. There is the number of techniques available to overcome this problem. So, Data hiding is a technique for embedding information into covers such as image, audio, and video files, which can be used for media notation, copyright protection, integrity authentication, covert communication, etc., In this thesis, various existing Data Hiding techniques are studied and reviewed. In this thesis mainly focus on embedding data and restore data with better quality. This thesis discusses Reversible Data Hiding techniques based on Reversible image transformation to embed data and then extract data. The proposed techniques are applied and compared to find which methods are suitable for hiding data into the camouflage image and then losslessly restore the information

A Literature Study on Selenium Webdriver 2.0

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.R. Anitha | 

Abstract

Selenium is a open source automated testing suite for web applications across different web browsers and platforms. It is similar to HP Quick Test Pro but the Selenium focuses on automating web-based applications. The testing is done by using selenium is called selenium testing. This paper studies on selenium Webdriver 2.0 which uses mozilla firefox browser and how it is implemented by using Eclipse IDE. WebDriver calls the Web browser directly and all the test script is executed similarly to make the automation.

A Low Power and Area Efficient Symmetric Stacking Counter

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 8th May 2018

Clince Babu | Manju Priya, E.Ramya

Abstract

A very high speed, power and area efficient counter is required in many applications viz. digital memories, ADCs, DACs, microcontroller circuits, frequency dividers, frequency synthesizer etc. Less area, high speed and low power consumption may be met by reducing the size of hardware. Hence, as the applications are increasing, demand for smaller size and longer life batteries increases. This project derives area, power and speed efficient structure counter based on a VLSI design. It uses multiplexer based full adder circuit, which group all of the “1” bits together. In the proposed structure, one XOR block in the conventional full adder is replaced by a multiplexer block so that the critical path delay is minimized. Proposed system is coded in Verilog and simulated using Xilinx 12.1.

A Map Reduce Methodology based Novel Parallel Particle Swarm Optimization Clustering Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th November 2017

G.Akhilesh | 

Abstract

Over the most recent couple of decades overseeing huge information has turned out to be testing assignment on account of the expanding volume and many-sided quality of the information being made or gathered. The issue here is the means by which to viably oversee and investigate the information and coming about data. The arrangement requires an extensive approach that contains every one of the phases from the underlying information accumulation to its last analysis..Traditional grouping methods don't address every one of the prerequisites satisfactorily. The new methods need to make utilization of practically equivalent to registering ideas keeping in mind the end goal to have the capacity to scale with rising informational collection sizes. In this paper, we suggest a parallel molecule swarm streamlining bunching (MRCPSO) calculation that depends on MapReduce. The test comes about demonstrates The proposed framework is versatile in preparing extensive information on item equipment. Expanding informational collection sizes and accomplishes a near the direct speedup while keeping up the grouping quality.

A Mathematical Model of Fluid Flows in Open Rectangular and Triangular Channels

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Kavyashree B. A | Dr. P. N. Chandramouli

Abstract

Flow in a closed conduit is regarded as open channel flow, if it has a free surface. This study considers the flows of an incompressible Newtonian fluid through open rectangular and triangular channels. The effects of channel slope, energy coefficient, channel top-width and roughness coefficient on velocity distribution in the open rectangular and triangular channels are investigated. The governing equations of the flows are continuity and momentum equations. The finite difference approximation method is used to solve the governing equations because of its accuracy, stability and convergence and the results are represented graphically. It is found out that the velocity of flow increases as depth increases and an increase in the channel slope, energy coefficient and top-width leads to an increase in flow velocity whereas increase in roughness coefficient leads to a decrease in flow velocity for both rectangular and triangular channels. This study goes a long way in controlling floods, construction of channels and in irrigation

A measure of Temporal Contextual Information on Trust based Recommender Systems

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st March 2018

Ankur Chaturevdi | Dilip Kumar Sharma

Abstract

In an era of information age, recommender system helps users to make an effective decision. Collaborative filtering is one of the techniques to provide a personalized recommendation to users. Collaborative filtering based recommender technique provides the recommendation by aggregating ratings from similar users to predict ratings for an active user (who wants a recommendation). The similarity has a greater impact because it acts as a criterion to identify a group of similar users whose ratings will be merged to generate a recommendation for the new item for an active user. However, there are a lot of issues in Collaborative filtering for e.g. data sparsity and cold start, which can be removed by incorporating trust information. We propose a methodology to include temporal context information in providing accurate rating prediction along with Trust matrix and also propose a framework to analyze the performance of Trust-based recommender algorithms on Film Trust dataset which includes temporal context information.

A Mechanical Analogy for Heat Transfer in Surface Films with Transformations

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 20th December 2017

Rahul Basu | 

Abstract

A model for describing effects of a variable frequency heat source on the surface of a film is developed. The effect of material parameters is analyzed to describe possible attenuation of the thermal fluctuations and sustaining these through coupling with the surrounding matrix. Application to amorphous alloy formation with phase field concepts is described. An analogy with a damped oscillator driven by surface fluctuations gives the relation of non-dimensional parameters like the Stefan, Fourier and Biot numbers to surface heating with convection. Recent discoveries of high-temperature superconductivity in the femtosecond regimes are included. Impurities and stress fields caused by large oxygen atoms and interaction with the phonon field may be responsible for such effects especially in the "crust" of oxide films. Phonon interactions with driven oscillators in the film may be possible and design of suitable materials to give sustained longer duration high-temperature effects is outlined.

A Metamorphosis Approach to Software Engineering

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th December 2017

M.Rithvik | Merugu Naresh Babu, Ch.Ambedkhar, Narala Sudhakar Reddy, Puli Nageswara Rao

Abstract

The most important industry that is going to play a key role nowadays is the software industry because it’s the only industry which has high return values.For any industry to have a good survival application plays a key role because an industry growth can be estimated by its outcomes those are nothing but products and services. Software Engineering is the subject that deals with various methodologies in order to ensemble software. This Paper represents a metamorphosis approach to software because when we perform Engineering we also need to know about reengineering sometimes many interventions may come up with reengineering process.Here we represent such type of reengineering approach with the help of a demo application.

A Method for Error Detection and Correction of Fault Secure OLS Decoder

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Sahad B | Chithra M

Abstract

Reliability is one of the major issues of advanced electronic circuits. In recent years there are several error correction codes (ECC) developed to protect the memories and registers in electronic circuits. But the encoder and decoder circuit may also suffer errors, for these reasons concurrent error detection (CED) and correction technique for orthogonal Latin square (OLS) decoder is proposed. This technique is strongly fault secured for single stuck at faults. The most significant advantage is that it achieves 100 percentage fault coverage for the whole CED circuit. The CED and correction is applicable to both binary and non binary OLS codes also. The proposed method can be achieved by performing the checking in parallel with the majority voting, syndrome generator and error corrector and orthogonal generator in the case of the decoder. Synthesis can be done in Xilinx ISE design suite 13.2 and simulation can be done with ModelSim.

A MIMO Dual Band-Notched Monopole Antenna For UWB Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

D.V.N.Koteswara Rao | M.Jahnavi, M.Ratna, K.Anjana Devi, N.L.Chaitanya

Abstract

A Compact monopole Multiple-Input-Multiple-Output(MIMO) dual band-notched Ultra Wide Band Antenna is proposed. This microstrip-fed antenna has a compact size of 22361.6 mm3, consisting of two square radiating patches with a defected ground structure. The designed antenna operates over the frequency band between 2.6 to 11.6 GHz with dual band notched characteristics in between 2.6-3.8 GHz for WiMAX, 5.19-5.95 GHz for WLAN with mutual coupling obtained is less than - 15 dB through the entire UWB frequency range except at the notched frequency bands. The Envelope Correlation Coefficient(ECC) is almost less than 0.02 over the entire UWB frequency range except at notched frequency bands. The proposed antenna is simulated by using the CST Microwave studio. Details of the proposed antenna design and simulated results are presented.

A MIMO Dual Band-Notched Monopole Antenna For UWB Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

D.V.N.Koteswara Rao | M.Jahnavi, M.Ratna, K.Anjana Devi, N.L.Chaitanya

Abstract

ACompact monopoleMultiple-Input-Multiple-Output(MIMO) dual band-notched Ultra Wide Band Antenna is proposed. This microstrip-fed antenna has a compact size of 22361.6 mm3, consisting of two square radiating patcheswith a defected ground structure.The designed antenna operatesover the frequency band between 2.6 to 11.6 GHz with dual band notched characteristics in between 2.6-3.8 GHzfor WiMAX, 5.19-5.95 GHz for WLAN with mutual coupling obtained is less than -15 dB through the entire UWB frequency range except at the notched frequency bands. The proposed antenna is simulated by using the CST Microwave studio. Details of the proposed antenna design and simulated results are presented.

A MIMO Dual Band-Notched Monopole Antenna For UWB Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

D.V.N.Koteswara Rao | M.Jahnavi, M.Ratna, K.Anjana Devi, N.L.Chaitanya

Abstract

ACompact monopoleMultiple-Input-Multiple-Output(MIMO) dual band-notched Ultra Wide Band Antenna is proposed. This microstrip-fed antenna has a compact size of 22×36×1.6 mm3, consisting of two square radiating patcheswith a defected ground structure.The designed antenna operatesover the frequency band between 2.6 to 11.6 GHz with dual band notched characteristics in between 2.6-3.8 GHzfor WiMAX, 5.19-5.95 GHz for WLAN with mutual coupling obtained is less than -15 dB through the entire UWB frequency range except at the notched frequency bands. The proposed antenna is simulated by using the CST Microwave studio. Details of the proposed antenna design and simulated results are presented.

A model-based scheduling approach for selection of Real-Time Scheduling Algorithm on basis of Different Parameters

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th March 2018

Ajitesh Kumar | Mona Kumari, S.K.Gupta

Abstract

In Modern days, the real-time system plays an important role in our modern and digital society. The success of any real-time application totally depends upon the selection of optimal scheduling algorithm. In real time application, every task should have the nature of deadlines and time when they arrived, on the basis of these parameters we observe the response time of different scheduling algorithm then we select the optimal algorithm for a particular application. So in this paper, our aim is to reduce the complexity of real-time system researcher for selection of scheduling algorithm for a particular application. This model-based approach is an extent the state of any real-time system in the area of scheduling. This approach works in any uniprocessor system

A Modernization Approach to Software Engineering

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th August 2017

K.Nirmal Raju | Ch.Sowjanya, N.Susmitha,Ch.Ambedkar,M.Rithvik

Abstract

The Technology is rapidly growing day by day. In this regard the utility of software also is rapidly increasing day by day in many forms like ROBOTICS,ARTIFICIAL INTELLIGENCE,MACHINE LEARNING etc .The tools used in this software are also increased which we call it as an automation that is going to play a key role in the software industry replacing some persons with that particular tool may result in increase of productivity of the company as well as in attaining a reliable product .This paper communicates a meaningful tool that is available at a free of cost to use for a layman to build up a software on his own .This paper entirely presents the communication between a layman and that tool its name is CONSTRUCT2D.Along with the middleware application. The central idea of the paper deals with the scenario of SOFTWARE INDUSTRY,A Start UP.

A Modified Algorithm for finding Representative Pattern Sets

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

R.Prabamanieswari | D.S.Mahendran, T.C. Raja Kumar

Abstract

Many algorithms and techniques are developed for enumerating itemsets from transactional databases. They produce a large number of frequent itemsets when the minimum support threshold is low and /or the dataset is dense. A large number of discovered patterns makes further analysis of generated patterns troublesome. Therefore, it is important to find a small number of representative patterns to best approximate all other patterns. This paper modifies the algorithm MinRPset for finding representative pattern sets. It follows the same concepts such as - covered and greedy method in MinRPset but, it uses NCFP-tree instead of CFP-tree for storing frequent itemsets in a compressed manner. The experiment results show that our algorithm gives better execution time to generate representative patterns sets for the mushroom dataset in an efficient manner comparing to the algorithm MinRPset

A Modified Bridge-Type Fault Current Limiter for Fault Ride Through Capacity Enhancement of Doubly Fed Induction Machine (DFIM)-Based Wind Generator

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 12th October 2017

V.Srinivasulu | S.Hussain Vali

Abstract

Transient stability a crucial aspect for doubly fed induction machine (DFIM). A DFIM-based arrangement is adversely operated due to faults, as the stator of generator is linked with the power grid. Even so, there is a obligation for the wind generator to be allied even during fault conditions. Hence , it is much crucial to increase the short-lived stability of the DFIM. For getting better stability of the DFIM, a R- type solid state fault current limiter is suggested in work. Here grounded faults were performed on test system to verify the upshot of the BFCL in transient stability enhancement. Simulations were done in SIMULINK domain. To illustrate the presentation of the proposed modified BFCL(R-SSFCL), its performance is compared with that of the SDBR & conventional BFCL. Simulation results gives the information that the modified R-SSFCL is a good efficient device rather than series dynamic braking resistor(SDBR).

A Modified P&O Maximum Power Point Tracking Method with Reduced Steady State Oscillation and Improved Tracking Efficiency

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 13th December 2017

V.Poojitha | J.Suresh

Abstract

This work proposes a method to reduce the steady state oscillation and to mitigate the probability of losing the tracking direction of the perturb and observed (P&O) based maximum power point tracking (MPPT) for PV system. The modified scheme retains the conventional P&O structure, but with a unique technique to dynamically alter the perturbation size. At the same time, a dynamic boundary condition is introduced to ensure that the algorithm will not diverge from its tracking locus. The modified P&O is simulated in Matlab Simulink and its performance is benchmarked using the standard MPPT efficiency (ηMPPT) calculation. Furthermore, the proposed concept is validated experimentally using a buck-boost converter, fed by a solar PV array simulator (PVAS). Based on the EN 50530 dynamic irradiance tests, the proposed method achieved an average ηMPPT almost 1.1% higher than the conventional P&O when irradiance changes slowly and about 12% higher under fast change of irradiance.

A Multi-Authority Access Control System in Cloud Computing Using Network Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Ms. Vibhute Shubhangi Prakash | Prof. Mr. Kale Navnath D.

Abstract

Data access control is an efficient way to provide the data security in the cloud.and Attribute-based Encryption (ABE) technique cryptographic conducting tool to guarantee data owners direct control on their data in public cloud storage. In this paper, from another point of view, system lead an edge multi-power CP-ABE access control plan for open distributed storage, named TMACS. In TMACS, exploiting (t; n) limit mystery sharing, When system verify to the user the TTP work like a SDN. Its having data controller that can evaluate the each request base on ad-hoc data table, if user is authenticated system can provide the access to specific user. Besides, by proficiently joining the customary multi-power plan with system, system build a half and half one, which fulfils the situation of traits originating from various powers and accomplishing security and framework level strength. The network security mechanism also fulfil with this approach, the system has evaluate on physical network environment with 2 to 4 physical devices and got satisfactory results than existing TMACS

A Multi-Gating Security Framework to Prevent Tailgating Attack of the Host Agent Platform in a Mobile Agent System

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th April 2018

Aboloko .S. Oberoro | S.A. Idowu, Y.A Adekunle, O.D.Alao

Abstract

Mobile agents can be described as programs that perform a given task on behalf of its owner. The growing need for Mobile Agent Technology (MAT) has been accompanied by corresponding issues like security and ethics. These challenges have resulted in global cold-feet towards mobile agent technology. The fundamental security issues in a mobile agent system are masquerading, denial of service, eavesdropping, alteration, repudiation and tailgating. Various models and techniques to detect and prevent these attacks, especially the host agent platform, have been proposed and implemented. However, most of these existing studies on the host agent platform dwelt mainly on authorized access security issues. An unauthorized social engineering security issue like tailgating attack is yet to be given the deserved consideration. This study developed a Multi gating Security The framework that detects and prevents a tailgating attack of the host agent platform in a mobile agent system.

A Multi-Output DC-DC Converter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Deepa Sanal | ] Jeneesh Scaria, Rahul. P

Abstract

A Multi-output DC - DC converter topologies can be used to generate multiple DC outputs from a single DC input source. The voltage gains can be step-up and /or step-down type. This paper proposes a dual-port DC-DC converter topology which generates two outputs, one step-up and one step-down, from a single DC input. Operating modes and steady state behaviour of the proposed converter has been studied in this paper. Using MATLAB/SIMULINK (R2013a) the proposed converter topology is simulated with open loop and closed loop control system to generate two outputs (a step-up and a step-down) from a single DC input and the results are compared.

A New Approach DSS for Suitability Analysis

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Nitin Kumar | -

Abstract

Decision support systems (DSS) are highly used in industries like management and administration. However, recently they are also being used in engineering for solving problems up to certain extent. Suitability analysis is a technique used in civil and environmental engineering which is majorly GIS based. A DSS was developed for suitability analysis of various natural aspects of a region with its implementation in civil and environmental. The system is a graphical user interface developed programmatically with the help of MATLAB. It is based on direct interaction and processing with images. It was implemented on LULC, Drain ability, and slope to study the simultaneous effect of these features and observe their combined contribution to the analysis. It was observed that the system can produce the combined effect and also produce the simultaneous effect of variation of weights of features and elements of input images in real time. The number of features being studied simultaneously can be varied according to the requirement of the study.

A New Approach for Mosaic Image Creation for Hiding Secret Image/video for Secure image Transmission

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Shamna E.P | Sabna I

Abstract

Information security is becoming increasingly important in the modern networked age. Secure Image Transmission has the potential of being adopted for mass communication of sensitive data under the scrutiny of an adverse censoring authority. Images from various sources are often used and are transmitted through the internet for various purposes, such as confidential enterprise archives, document storage systems, medical imaging systems, and military image databases. These images may contain secret or confidential information since it should be protected from leakage during transmissions. A new type of computer art image called secret-fragment-visible mosaic image is proposed, which is created automatically by composing small fragments of a given image to become a target image in a mosaic form, achieving an effect of embedding the given image visibly but secretly in the resulting mosaic image. This effect of information hiding is useful for covert communication or secure keeping of secret images. receiver recover the secret image with a high precision. The root mean square error and peak signal to noise ratio are used as quality measures.

A New Approach for Secure Traffic Data Analytics using Hadoop

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th November 2017

Phani Raja.I | 

Abstract

Nowadays traffic congestion is an extreme difficulty. Traffic congestion is most predominant in metro towns. There are distinct reasons for traffic congestion such as growing population, rising earning main to greater automobiles on the road, the inadequate capability of roads to address traffic and so on. A cluster of garage devices is wanted to save such big amounts of data and also a parallel computing version for studying the ones huge inputs of data. Hadoop is one such framework that gives the reliable cluster of storage facility, which stores huge statistics in an allotted way using a unique report machine, known as Hadoop Distributed File System and presents efficient parallel processing feature through MapReduce framework. Using Map Reduce the filtered traffic data may be fetched without problems, to offer quit user with traffic analysis and giving beneficial predictions.

A New Approach to Fuzzy Bitopological Space via γ-Open Sets

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th May 2018

Birojit Das | Baby Bhattacharya

Abstract

B. C. Tripathy and S. Debnath [B. C. Tripathy, S. Debnath, -Open Sets and -Continuous Mappings in Fuzzy Bitopological Spaces, J. of Intelligence and Fuzzy Systems, 24, 631-635 (2013)] first introduced the concept of fuzzy -open set in a fuzzy bitopological space to show that the collection of all these sets forms a fuzzy topology and also studied fuzzy pairwise - continuity. In this present treatise, we redefine this set as fuzzy -open set with the help of fuzzy preopen set to show that it is completely independent from fuzzy open set. Moreover, we introduce fuzzy -generalized closed set as a generalization of fuzzy closed set and then we establish various properties and characterizations along with interrelationship among them. Also, we show an important result which states that though every fuzzy closed set is a fuzzy generalized closed set and fuzzy -generalized closed set but fuzzy generalized closed set and fuzzy -generalized closed set are totally independent of each other. Furthermore, we introduce the notion of fuzzy continuous function, continuous function, fuzzy -continuous function and - continuous function in a fuzzy bitopological space and study those functions with various properties and interrelationships. Lastly, we define a new type of closure operator and prove certain results based on this conception.

A new approach to secure internet of things(IoT) devices using encryption and anonymity capabilities of The Onion Router (TOR)

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th December 2017

Skanda Kumar.B | Nandan goud.B

Abstract

A new revolution of the Internet is the Internet of things (IoT) where various devices and systems are connected to leverage data anywhere, anytime that is expected to spread rapidly, over the coming years.it is estimated that IOT is beneficial for smart home devices as nearly 40 billion connected devices are expected to be in use by 2020 but the biggest problem with such it devices is with limited functionalities is the security. Securing communications between devices and their back-end systems is one of the most severe problems. In some specific IoT cases, VPN can handle the secure connection, but VPN is not always possible. Hence there Is an immediate need for better technologies and innovative methods through which the hot network security can be greatly enhanced by using The Onion Router(TOR )By default, all traffic in the Tor network is encrypted and the identities and locations of traffic sources are very effectively concealed. Thanks to this, someone intercepting traffic from Tor networks is neither able to identify the sender nor view or alter the messages. These features would be useful when securing an IoT system. Tor network is commonly considered only something which is criminal. in this paper the author is trying to look TOR objectively which is perfectly legal and show its positives uses like securing IoT devices preventing any future catastrophic large-scale cyber attacks.

A New Bidirectional Intelligent Semiconductor Transformer for SMAR GRITD Application

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

M.Veerasozhan | M.Saranya

Abstract

This paper includes a better topology of solid-state transformer (SST). In the process of designing the Ac to DC, DC to AC and Ac to AC conversions have been united in order to achieve greater efficiency. To get good and better efficiency from various SST, the AC to AC converters are being united in one matrix converter for better output performance. The newly proposed solid state transformer performs critical functions and has many more advantages such as correction in power factor, sag and swell elimination, flicker of voltage reduction and safe capability in order of error situations. Now additionally, it has includes many other benefits also such as low weight, minimum volume and reduction of dangerous liquid dielectrics includes just because it involves medium frequency transformer. The working and some actions of the newly proposed SST have been tested by the results via simulations.

A new Design and Control of a Two-Wheel Self-Balancing Robot using the Arduino Microcontroller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 10th March 2018

S.Manikandan | Reshma, G Vani prasanna, Ch Swetha, V S Hariharan

Abstract

In the last decade, the open source community has expanded to make it possible for people to build complex products at home. [1] In this thesis a two-wheeled self-balancing robot has been designed. These types of robots can be based on the physical problem of an inverted pendulum [2]. In this paper, we can see the design, construction and control of a two-wheel self-balancing robot. This system consists of a pair of DC motor and an Arduino UNO R3 microcontroller board, make a robot which can balance itself on two wheels the platform will not remain stable itself. Our job will be to balance the platform using distance sensors and to maintain it horizontally. At first, we have decided to just balance the robot on its two wheels

A new encryption methodology of aes algorithm using high speed s-box

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th August 2017

Sarala S Shirabadagi | Swetha Nadagoud

Abstract

Cryptography plays an important role in the security of data. Encryption ensures data integrity by protecting the data from being corrupted or modified.RSA and DSA are the most commonly used methods for the authentication. Encryption uses symmetric and asymmetric encryption algorithms such as Triple-DES and Blowfish for maintaining the confidential. The AES is widely used for encryption of audio/video data contents in real time. Due to the significance of the AES algorithm and the numerous real-time applications, the main concern of this paper is to present new efficient hardware implementations for this algorithm.AES uses four operations, namely SubBytes, ShiftRows , MixColumns and Key Additions transformations. SubBytes transformation is done through S-BOX. This paper describes full custom design of high speed S-BOX for AES encryption algorithm and its implementation in FPGA and ASIC. The proposed AES architecture has delayed improvement of approx. 1.6 ns along with area improvement of 287 FPGA slices when implemented in the Spartan-6 FPGA of Xilinx. The full custom design of the S-BOX has been done in 180 nm technology in Cadence using novel XOR gate which has high speed and low power consumption . The designed S-BOX chip consumes 22.6 μW and has 8.2 ns delay after post layout simulation

A New Higher Order Shear Deformation Theory for bending Analysis of Isotropic and Orthotropic Plates with Linear thermal Loading

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 24th February 2018

Sandhya K. Swami | Yuvraj M. Ghugal, Surekha A. Bhalchandra

Abstract

In this paper, analytical solutions of isotropic and orthotropic laminated composite plates are analyzed by using Higher Order Shear Deformation Theory. By using Principal of virtual work we get the governing equations. A simply supported square plate is used to compare various numerical results. The shear correction factor is obviated in this theory. It observed that solution obtained from present theory make a good agreement with exact higher order shear deformation theory.

A new historicist study of Jack London‘s novella 'The Red One‘ and Solomon Islands Tribes and Traditions

International Journal of Science , Engineering and Management, Available online 27th December 2017

S. Malathi | S.S.Jansi Rani

Abstract

This paper reviews the novella, ‘The Red One’ written by Jack London (1916), in a new historicist perspective. The novella is set in Guadalcanal of Solomon Islands. New historicist practice selects an anecdote. The anecdote is the microcosmic image of the power relations which the critic seeks to elaborate in relation to the main text of discussion. A paragraph from a letter written by a missionary to prospective funders for the church is selected as the anecdote. The anecdote reveals the preconceived ideas of a European visiting the islands for the first time. The description is compared with anthropological studies on the tribes and traditions of the islanders. The traditions of the islanders are viewed from a colonial perspective in the anecdote. Expressions for fear of forest, savages hiding in it for the opportunity to kill and eat the missionaries are analyzed. The novella and the anecdote share the same ideology. Descriptions of practices of the islanders like the head-hunting, cannibalism, mortal fear of the forest, deep-seated covetousness of the protagonists in both narratives are discussed. What emerges is the manifest colonial discourse that seeks to usurp the land, enslave the people to sustain its economy. The power relations between the colonials and the natives are established. Historical accounts of blackbirding or capturing people by force for indentureship, missionary correspondence, legal documents, and letters are used to explore the ideology and social texts of colonialism. The flexibility of new historicist methodology, which does not prescribe a canonical standard for research, is used effectively. Illustrations of the islanders and their artifacts and missionaries are included.

A New Hybrid Multi Level Inverter with a New Switching Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Adapala Tejasree | I Siva Prasad

Abstract

Multilevel inverters have been an attractive topology for academia as well as industry in the recent decade for high power and medium voltage energy control. An asymmetric multilevel inverter, a new topology increases the level of output with reduced lower order harmonics and total harmonic distortion. In this paper, a new multi-level inverter (MLI) is introduced. This paper mainly focusing on reduction of Total Harmonic Distortion (THD). By adding one step voltage to the conventional MLI to increase number of levels without increasing the number of switches and to achieve minimum THD with simple switching technique called equal area criteria (EAC). By calculating switching angles at which the power switch should operate to eliminate lower order harmonics. In conventional method (symmetrical voltage sources), we need nineteen power switches to get 31-level. But in proposed MLI only eight power switches we can get up to 31-level with V1:2V1:4V1:8v1 voltage ratios and grate reduction of THD with in IEEE standards. The proposed 31-level inverter is simulated with resistive load using MATLAB/Simulink and the simulation results shown for 31-level.

A New Incremental Mining of Frequent Item Set On Large Unstructured Dataset

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th May 2018

G.K.Sharmila | Dr. T. Hanumantha Reddy

Abstract

The information present in the unstructured dataset are often inaccurate in nature.In this paper we examine the problem of preserving the mining result for a dataset that is changing by pushing a new tuple into the dataset. The problem is technically difficult because an uncertain[14] dataset contains an exponential number of possible worlds. To overcome this problem we proposed a KNN (k-nearest neighbor) algorithm to get the content of each review.Here we need to apply k-value based on that display the review with the classification. All our approaches support both tuple and attribute uncertainty, which are two common uncertain data set models.

A New Optimization Technique for Performance and Energy Preservation In Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Javed Hussain | Durgesh Kumar Mishra

Abstract

The rapid growth of the computational requirement need to develop effective and efficient technologies for serving better. In various research domains in computational cloud the security, resource utilization and energy preservation are the main area of research and development. In this paper we are going to discuss the capability of optimization algorithm for scheduling the resources and allocating the virtual machines for improving the performance and energy efficiency of the computational cloud. Therefore the detailed discussion on the required objectives and the solution formulation is provided. In further the simulation technique of the proposed model and their results are also reported for analysis. According to the gain performance and experimental observations the proposed technique is suitable for both the kinds of resource scheduling and optimization.

A New Parallel VLSI Architecture for Real-time Electrical Capacitance Tomography

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

G.Dillirani | A.Meghana

Abstract

This paper presents a fixed-point reconfigurable parallel VLSI hardware architecture for real-time Electrical Capacitance Tomography (ECT). It is modular and consists of a front-end module which performs precise capacitance measurements in a time multiplexed manner using Capacitance to Digital Converter (CDC) technique. Another FPGA module performs the inverse steps of the tomography algorithm. A dual port built-in memory banks store the sensitivity matrix, the actual value of the capacitances, and the actual image. A two dimensional (2D) core multi- processing elements (PE) engine intercommunicates with these memory banks via parallel buses. A Hardware-software codesign methodology was conducted using commercially available tools in order to concurrently tune the algorithms and hardware parameters. Hence, the hardware was designed down to the bit-level in order to reduce both the hardware cost and power consumption, while satisfying real-time constraint. Quantization errors were assessed against the image quality and bit-level simulations demonstrate the correctness of the design. Further simulations indicate that the proposed architecture achieves a speed-up of up to three orders of magnitude over the software version when the reconstruction algorithm runs on 2.53 GHZ-based Pentium processor or DSP Ti’s Delphino TMS320F32837 processor. More specifically, a throughput of 17.241 Kframes/sec for both the Linear-Back Projection (LBP) and modified Landweber algorithms and 8.475 Kframes/sec for the Landweber algorithm with 200 iterations could be achieved. This performance was achieved using an array of [2×2] × [2×2] processing units. This satisfies the real-time constraint of many industrial applications. To the best of the authors’ knowledge, this is the first embedded system which explores the intrinsic parallelism which is available in modern FPGA for ECT tomography

A New Passive Filter Design for Harmonic Mitigation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 19th July 2018

Sunil Naikodi | Srinivas N.R, B.A.Sridhara

Abstract

Passive filters are generally preferred in power converters to nullify the high-frequency harmonics caused by pulse width modulation (PWM). Employment of passive filters is an effectual solution that can be used to attain harmonic mitigation to a greater extent mainly because filters are put forward to increase the efficiency. Isolated DC-DC converters were usually used topologies. In power electronics application half-bridge converter is one of the suitable converters. Stress on the switches can be minimized by using the half-bridge converter. Hence, half bridge converter is modified based on the application and LLCCLL filter is connected at the input side to reduce the input side harmonics. With these notes taken into account, the objective of this paper is to design a new topology of passive LLCCLL filter for harmonic mitigation. Thus, it also improves the power factor of the load. Hence, simulation is carried out in P-SIM software and hardware implementation will carry out in the medical x-ray equipment to measure the reduction of the harmonic level

A New Situational Based Security Model in Offline Distributed Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th December 2017

Dr. Cuddapah Anitha | Prof.M.Padmavathamma

Abstract

As we are aware that software can easily be copied or moved from one system to another by any means, software developers define various measures for protecting their products from unauthorized usage. This has become a major challenge in the software industry and for the developers of the software products in protecting their intellectual property rights. To overcome the hazards associated with these problems, this paper presents a mechanism called Node Lock Licensing Methodology and its variants to safeguard the software product or sensitive information from unauthorized disclosure thereby defining certain access permissions on the product.

A New Technique for Secured Authentication with Pc Control through SMS

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

Birundha.K | Harini.S, Hemalatha.G, Kalaiselvi. P, A.V.Santhosh Babu

Abstract

Short message service (SMS) is a technology that can use mobile devices to send and receive text message, with wide coverage area, high popularity, high reliability, low expenditure, easy development and other characteristics. Using GSM modem or short message platform of network, short messages can be send and receive between the computer and the mobile terminal. PC can be secured by using GSM without internet.Any user trying to misbehave in the system, then the application will send alert message to the administrator’s mobile, then the administrator can shut down the system from any remote location through his mobile by sending a SMS

A note on Ultra L-Topologies

International Journal of Science , Engineering and Management, Available online 28th August 2018

Pinky | 

Abstract

In this paper, we investigate the lattice structure of the set FX of all Ltopologies on a given finite set X when membership lattice L is a finite Boolean lattice. All the ultra L-topologies and their number in the lattice FX are determined.

A Novel Ancient Document Image Binarization Technique

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

P.Gangadhara Reddy | Dr.T.Ramashri

Abstract

Due to many environmental factors, improper handling and the poor quality of the materials used in the creation of old document images cause them to suffer a high degree of degradation which includes faded ink, bleed-through, show-through, uneven illumination, variations in image contrast and deterioration of the cellulose structure. In proposed algorithm a robust phase-based binarization technique is used for the binarization and enhancement of historical documents and manuscripts. The main object of proposed method consists of preprocessing, main binarization, and post-processing. The preprocessing step mainly involves image denoising with phase preservation, followed by some morphological operations to denoise the image and detection of edge information by using canny edge detector. Then, the phase congruency features used for the main binarization step. The foreground of ancient documents can be modeled by phase congruency. After completing the three binarization steps on the input images using phase congruency features and a denoised image, the enhancement processes are applied. A median filter and a phase congruency feature are used to construct an object exclusion map image. This map is then used to remove unwanted lines and interfering patterns. while in the post processing step, specialized adaptive Gaussian and median filters are considered. One of the outputs of the binarization step, which shows high recall performance, is used in a proposed post processing method to improve the performance of other binarization methodologies.

A Novel Approach for Breast Cancer Detection

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 26th July 2018

Amrutesh R Gowda | Manohar B, Nischay G Gowda, P Naveen Kumar

Abstract

Cancer is one of the most dangerous life-threatening diseases. Out of all the different types of cancer, breast cancer is the most common which is mostly seen in women of age 30-60. According to breastcanceruk.org, every 1 in 8 women in the UK is affected by breast cancer. Even though a permanent antidote is yet to be found for breast cancer, it can be prevented with early detection. The certain clinical method is used for the identification of cancer. Our approach for detection of a cancer tumour is by using Image processing technique through MATLAB code for the detection of type of tumor and the situ of the tumour. In the code a mammogram image is taken as input, then we perform Otsu -thresholding method to separate the tumour part from the background. Then we apply the ANN to find the required parameters. Accuracy, Selectivity and Specificity can be obtained through the algorithm

A Novel Approach for Design and Analysis of A Modular Multilevel Converters For HVDC Networks

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Y. Dilli Krishnaiah | J.Yugandhar

Abstract

Modular multilevel converters are a rising voltage source converter topology reasonable for some applications. The expanded usage of HVDC power transmission arrangements has brought about Modular Multilevel Converter sturning into a more regular converter sort. Different applications incorporate interfacing renewable vitality power sources to the system and engine drives. Measured multilevel converters are gainful for medium voltage engine drives in light of the fact that the properties of this converter topology, for example, low twisting, take into account an effective engine drive plan. In this paper we exhibited the configuration and execution of a vigorous Modular Multilevel Converter which can be interconnected with the conventional HVDC power dispersion systems which gives various remarkable execution highlights like bidirectional power flow coordination, dependable step up and step down operation particular multilevel dc/dc converter, termed the DC-MMC, that can be sent to interconnect and bidirectional adaptation to internal failure which is as often as possible found in the DC circuit breakers. The center part of the proposed Modular Multilevel Converter make utilization of interleaved strings of fell submodules.The proposed converter model actualizes an open circle voltage control technique to guarantee the power equalization of each discrete capacitor module with the assistance of flowing AC ebbs and flows. The proposed converters are composed, executed and tried in the Matlab Environment. The recreation results pronounced that the proposed methodology is best in all viewpoints and beats all the current methodologies.

A Novel Approach for Identification of Hadoop Cloud environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th November 2017

Swathi Agarwal | 

Abstract

Because of the advanced propensities inside the teaching of science and innovation brought about the trends of the viable data switch, the capacity of dealing with colossal data and the recovery of information effectively. On account that the data that is spared is expanding voluminously, strategies to retrieve relative comprehension and assurance associated concerns are to be tended to viable to quiet this bulk information. Moreover, with rising benchmarks of mammoth information, these security issues are a testing undertaking. This paper addresses the constraint of agreeable information switch utilizing the principles of learning mining in cloud condition making use of Hadoop MapReduce. In light of the experimentation, achievedoutcome are examined and spoken to with perceiving to time and space unpredictability when thought about Hadoop with non Hadoop approach

A Novel Approach For Image Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Jyoti T. G. Kankonkar | Nitesh Naik

Abstract

Image security is a major concern as the digital communication and digital data is growing rapidly. Image data is generated in loads every day. We need faster and robust mechanisms to secure the image data. Various fields such as military scopes, security firms, social network etc. need systems that can protect the images while communicating and data transfers. In this paper the proposed idea involves use of image encryption using chaotic approach with a combination of image stitching mechanism. This unique combination provides double layered protection to the images. In order to transfer an image, the image is first partitioned, encrypted and then transferred making it difficult for attackers to access the whole image. On the other end, the encrypted image is decrypted using a symmetric key generated using chaotic approach that uses logistic map function and linear feedback shift register which is followed by image stitching procedure..

A Novel Approach for Improvement of Power Quality in Transmission System by Using Distributed Power- Flow Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Raja Reddy Duvvuru | B.Venkata Prasanth , V.Ganesh

Abstract

The Electronic based FACTS controllers are static equipment. Its principle purpose is to control AC transmission. The parameters of FACTS are enhancement of controllability, ability of power transfer, control of line impedance, load angle and the magnitude of bus voltage. A unified power controller is to be a static device and this system device should have quick reactive transmission. This paper focuses on the issues like voltage sag and swell of power quality. DPFC is used to moderate the voltage variation and improve power quality and also used to couple the phase controllable bridges to produce current which is injected into a transmission line by using series of transformers. The UPFC is a combination of a static synchronous compensator (STATCOM) and a static synchronous series compensator (SSSC) which is coupled with common DC link. The DPFC eliminates the common dc link between the shunt and series converters and also it performs in transmission line to exchange real power between converters at the 3rd harmonic frequency. The DPFC employs several 1-phase converters like D-FACTS concepts as the series compensator. These concepts reduce the rating of the components and offer a high reliability. Since the DPFC can immediately control the active and reactive power flow and the voltage magnitude, it implies a great potential for power oscillation damping. The case study contains a DPFC located in an exceedingly single-machine infinite bus power grid with 2 parallel transmission lines that simulated in MATLAB/Simulink. The bestowed simulation results of a DPFC device wont to improve the facility quality.

A Novel Approach for Radar Image De-Noising Using Non Sub Sampled Contour Let Transform and Adaptive Threshold Algorithm

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Kanike Vijay Kumar | M.V.Ramana Reddy , M. Jyothirmai

Abstract

Aiming at the problem of ground penetrating radar image de-noising, a new adaptive image de-noising algorithm based on non sub sampled Contour let transform is proposed. The algorithm firstly performs non sub sampled Contour let transform to the noise image, to obtain the coefficients of each directional sub band and each scale, then, according to the energy of the coefficient, the de-noising threshold value is adjusted adaptively. Simulation results show that, compared with the wavelet threshold de-noising algorithm, the proposed algorithm can effectively remove the Gauss white noise in the image, improve the peak signal to noise ratio (PNSR), while preserving the edge details of the image, it can improve the PSNR value and reduce the Gibbs phenomenon.

A Novel Approach for Smart Hydroponic Farming Using IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 25th May 2018

R.Rajkumar | R.Dharmaraj

Abstract

The effects of the global warming make more difficult for planting in uncontrolled environment. In traditional farming method, farmers require fine quality of soil with natural mineral strengths. It also requires working cost for ploughing and removal of weeds and also needs large amount of space and water. In case of seasonal plants, the yield does not satisfy the customer needs and the expectation of farmers in productivity. For these reasons, a farming method which needs lesser requirements in cost factor and also it easy to maintain and control the important factors such as light, water level temperature, and humidity throughout the year is needed. This proposed work presents a Hydroponic style of farming which is the method of growing plants without soil & sunlight. In this method the plants are grown with only their roots exposed to the mixture of ash fertilizer with water instead of underground soil. This method is a type of indoor agriculture style which is independent of weather, and it also avoids the cost of ploughing and labour works. Watering and controlling of humidity is done with the help of a microcontroller Kit connected to Wireless sensor network with internet which senses the humidity, temperature and water level. With the help of this IoT technology, the real time status of plant’s growth could be monitored by the authorized person from remote location. This technology helps efficiently for the agricultural development with minimum resource utilization.

A Novel Approach for Speech File Detection

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 8th June 2018

Punnoose A K | 

Abstract

This paper discuss a novel approach to detect speech files using a frame classifier. The speech files tends to have the subphones, corresponding to a phone, recognized in sequence, while run through a frame classifier. Duration of subphone sequence corresponding to a phone also tends to differ in speech and noise. Distributions are used to capture the count statistics of recognized subphone sequence, along with the phone duration. A probabilistic framework is formulated to score a wave file for the presence of speech. Relevant speech and noise datasets are used to benchmark the approach.

A Novel Approach on MEMRISTOR and its Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Suganya J | Raja.G.V , Jeya Ramanan.S , Hariharan

Abstract

A MEMRISTOR is a passive device which has two terminals, operating based on the principle of MEMRIS TANCE. Memristance (M) which is derived from flux (?) variation with respect to charge (q). When an electric charge flow through a MEMRISTOR, it have capable of remembering past history of the device for a long time. This results gives MEMRISTOR acting like a non-volatile memory. MEMRISTOR basis concept was implemented in various areas like audio signal processing, image processing, logic imply, crossbar switch implementation, etc and HP MODEL MEMRISTOR, which is described briefly in this paper.

A Novel Approach to Control Speed of an Automobile

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th October 2017

Dr.Manoj Priyatham M | Aishwarya. B, Aishwarya. K, Lakshmi Mache, Likitha. A

Abstract

Speed Control of automobiles is very much required in our daily life due to the increased rate of accidents reported. Hence, there is a need of a novel approach by which vehicles speed can be automatically controlled. This paper presents a novel approach to control the speed of the automobiles at remote places for fixed time. In this approach, automobile throttle position is controlled not only by Control Unit [CU] also accordingly to one of the inputs received from the accelerator pedal position sensor, but also by a microcontroller unit which receives the pedal position from the sensor and then microcontroller unit transfer to the CU. The Microcontroller Unit also interfaced is capable of detecting any other trans receiver. Threshold level is set to the pedal sensor which alerts the system by a buzzer sound, when the speed of automobile exceeds the pre-determined value. The microcontroller controls the speed accordingly at desired places. When we deploy, the transmitter sense data frames with field containing maximum speed and time.

A Novel Approach to Street Light Automation

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th October 2017

Dr. Manoj Priyatham M | B.R.Pallavi, Shruthi A.S, Pallavi R

Abstract

Sometimes street lights will be ON even if it is day time, power wastage takes place due to continuous lightening of street light. So, the concept of Automatic Street light system can be introduced which will save our natural resources and is also a powerful technique .In this paper, we propose a design which consists of microcontroller with intensity regulator in it. Here, light can be sensed by LDR (or) by solar panel, we have proposed two sensors LDR and photoelectric sensor (PES) which recognizes the movement of street. Whereas, LDR senses the light. Here PICmicrocontroller is used .This system is totally automatic which turns ON when sunlight goes down and turns OFF during daytime. So maximum power will be saved.

A Novel Approach to Student Information Broadcasting via GSM Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Ankit Pande | Mr. ShubhamKakade ,Mr. Kushal V. Kothari, Mr. Akshit Wankhede , Dr.NitaThakre

Abstract

Broadcasting of Student information via GSM Network is a modern approach to send the academic information to the parents in regular manner. This will be helpful for parents to receive on demand service of information regarding daily progress of student like Attendance, exam forms, Examination marks, Event in college, Placement related Info, Fees information etc. As the information world is changing into digital, it is important to transform the information stored in colleges in traditional manner into digital manner. As the information stored into digital manner will be available at 24*7. GSM network is one of the low cost technologies which is helpful to broadcast the information stored in central database in rapidly.

A Novel Approach to Wireless Power Transmission in Non-Radiative Field

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Niranjan L | Charmila G, Bindhu V, Jyothi M, Meghana M

Abstract

This paper explores the possibility of providing wireless power transmission from the source to the load without using interconnection of wires. The most common form of wireless power transmission is carried out using induction, followed by electro dynamic induction. The next generation portable devices will receive power wirelessly. The first step in wireless power is providing power to a charging pad wirelessly. The market for this device would be businesses with large conference rooms. The device would allow users to plug their phones and computers into the conference room table without large power bricks and cords running everywhere. The pads can conveniently be placed under the table and inside the ceiling so there are no visible wires that could ruin the aesthetic feel of the room. The ease of installation and convenience of this device would make the marketability of this product quite large and if finished could be seen in thousands of conference rooms. If we increase the efficiency of coupling unit the it will increased the power slightly further, wireless power transmission could become a standard means for charging a mobile device.

A Novel Architecture for the Future Wireless Technology Li-Fi

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Ishwarya Rajeshwari | Kirthika.L, Prathiksha.K

Abstract

We are in the era of internet. We have brought the evolution of using air as a medium for data transfer which is called the Wi-Fi. Though it provides the better speed but with the large number of users the radio spectrum is congested. To address this problem we can go for alternate way of using light as a medium. Professor Harald Hass who teaches at the University of Edinburgh in UK brought the visible light communication into picture through the concept of data through illumination and it was called Li-Fi Light Fidelity. Li-Fi is a new paradigm for short range wireless technology to provide unprecedented connectivity within a localized data-centric environment. In this the data transmission is achieved by varying the intensity of LED very faster than human eye can follow which is brought through Visible light communication (VLC). The development by the University of Edinburghs Li-Fi R&D Centre uses a solar panel to receive high speed Li-Fi transmitted data while also generating electrical power for the operation of the function. Using this technique, two functions namely energy harvesting as well as decoding of light signals into useful information can be performed.

A Novel Attribute Based Data Sharing With Attribute Weights in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th January 2018

V.Geetha | V.Sridhar Reddy

Abstract

Data sharing scheme by using attribute-based to reduce the key escrow issue but also develops the expressiveness of attribute, because of that the resulting scheme is more user-friendly to cloud computing. In this proposed work we are introducing an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service operator can compromise the whole secret key of a user individually. We introduce the concept of the attribute with weight, being provided to enhance the expression of the attribute, which can not only extend the expression from binary to the arbitrary state but also lighten the complexity of access policy. So that, both storage cost and encryption complexities for a ciphertext are relieved. In our proposed work the modification process is after the data owner sends the secret key to the user, the particular cloud user can view the data which is stored on the cloud server. Once the user used that secret key means the key will be automatically changed for that shared data, this dynamic key will be sent to the data owner also.

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

R.Poornimadevi | P.Valvarasi, M.Ambika, A.K.Punitha

Abstract

Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the communication capabilities of IMDs. In healthcare applications, after mutual authentication, a user (for example, doctor) can access the health data from the IMDs implanted in a patient’s body. However, in this kind of communication environment, there are always security and privacy issues such as leakage of health data and malfunctioning of IMDs by an unauthorized access. We propose a new secure remote user authentication scheme for IMDs communication environment to overcome security and privacy issues in existing schemes. We provide the formal security verification using the widely-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. We also provide the informal security analysis of the proposed scheme. The formal security verification and informal security analysis prove that proposed scheme is secure against known attacks

A Novel Cascaded Two-Level H-Bridge Voltage Source Inverter Based STATCOM for High Power Applications

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

S. Rama Maddileti | V.Venkata Krishna Reddy , V.Rafi

Abstract

In this paper presents a var compensation by a cascaded two-level H-Bridge VSI based multilevel static compensator (STATCOM) using SVPWM. The topology consists of two voltage source inverters are connected in cascaded through a 3-phase transformer. The benefit of this topology is that by maintaining asymmetric voltages at the dc capacitors of the inverters, the levels in the waveform of output voltage can be increases. This results power quality (PQ) improved. The main object of this paper is balancing the dc link capacitor voltages of multilevel inverters during balancing and unbalancing conditions. This controller is controlling inverter voltage in such a way that either ve sequence current flowing into the inverter is eliminated or reduces the unbalancing in the grid voltages. The performance of the control scheme during balanced and unbalanced conditions is analysed through MATLAB/SOMULINK.

A Novel Duty Cycle Sliding Control Methodology for Non-Isolated Cuk Converters Applied to Renewable Energy Systems

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Aditya Anilkumar | Phalgun Madhusudan, Abhishek Paramanand, Srinidhi H Srinivas, A Sreedevi

Abstract

This paper discusses application of control of duty cycle for a non-isolated Cuk converter applied to provide continuous low ripple DC output from a hybrid renewable source consisting of a low power solar panel and windmill pair. The convention, in technology today is to utilise complex feedback loops to control output voltage with respect to sporadic swings in input. This paper provides simulational results for the efficacy of control methodology consisting of sliding the duty cycle and also a second order linear equation for the control characteristics with this method.

A Novel DWT Based Techniques for Underwater Image Enhancement

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 23rd January 2018

Dr. S. Selva Nidhyananthan  | R.Sindhuja

Abstract

In Recent years, the underwater image processing area has received a great attention from researchers. In the oceanic environment, capturing a clear underwater image is having a crucial importance. Underwater images are usually degraded due to the effects of absorption and scattering. The quality of underwater images is affected by the color cast, poor visibility, foggy appearance and misty. In order to overcome those limitations, an underwater image enhancement technique built on a DWT method is proposed. The main aim of the proposed algorithm is to increase the quality of underwater images. In this paper, 100 different images are used to perform the comparison of the proposed technique with the previous techniques. Performance of the proposed method of DWT is evaluated using the Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM) and Absolute Mean Brightness Error (AMBE). Performance measurement of the Wavelet techniques produces better enhancement results than previous techniques like Contrast Limited Adaptive Histogram Equalization (CLAHE).

A Novel Framework for Context Based Focused Search Engine

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th May 2018

Dr.K.Vaishali | 

Abstract

Context based Focused search engine is the information retrieval tool that narrows the search space by finding the documents relevant to user query only. The objective of a focused search engine is to return more specific results in response to a user query rather than large number of results. In this paper, the architecture for such a focused search engine has been proposed that works on the basis of the context of web pages and serve the user with contextually more related web pages semantically.

A Novel Framework for Traffic Flow Prediction with Deep Learning Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

S.Narmadha | Dr.V.Vijayakumar

Abstract

Traffic flow prediction is the process of predicting future traffic conditions in short-term or long term basis, based on real time and the past traffic data. It is an important component of an Intelligent Transportation System (ITS) in smart city development. Apart from traffic data from sensors, Incidents detection, Lane closure and Weather data also some of the main reasons to cause the congestion. Combine factors and provide an efficient prediction of congestion. It provides innovative and smarter services to the transport users. Deep learning is a promising technology used to predict the traffic congestion with high accuracy. Deep belief network, Recurrent neural network, Convolutional neural network are some of the well known existing algorithms used in transportation analysis. In this paper a novel framework is proposed for intelligent transport systems which can solve so many issues such as pollution, accidents, and unwanted delays.

A Novel Implementation of secure VLSI logic design

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Kusuma B T | A.R.Priyarenjini

Abstract

Crypto circuits can be attacked by third parties using differential power analysis (DPA), which uses power consumption dependence on data being processed to reveal critical information. To protect security devices against this issue, differential logic styles with (almost) constant power dissipation are widely used. However, to use such circuits effectively for secure applications it is necessary to eliminate any energy-secure flaw in security in the shape of memory effects that could leak information. This paper proposes a design methodology to improve pull-down logic configuration for secure differential gates by redistributing the charge stored in internal nodes and thus, removing memory effects that represent a significant threat to security. To evaluate the methodology, it was applied to the design of AND/NAND and XOR/XNOR gates in a 90 nm technology, adopting the Sense amplifier based logic (SABL) style for the pull-up network. Sbox 8 can be implemented using these circuits for the security purpose.

A Novel Low Cost RCD Snubber and Totem Pole Drive Circuit for PMDC Motor

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Ajit Nivrutti Shinde | Uday Tanajirao Patil , Mr.Sandip Sarjerao Godhade

Abstract

Manufacturing plant in industries like chemical, pharmaceutical, plastic and textiles all need speed variation. And it could be flat belt application, flow management application or combining of liquids. There are different kinds of motors-AC, PMDC, Servo or steppers which are used according to the applications. Of these, PMDC motors have widely used .The PMDC motors are easy to control compare to other types of motors. The treadmill is a walker which is used for exercise. This is one application in which a PMDC motor plays an important role in its operation. The PMDC motors are used to operate these machines. In this paper, implementation of PIC 16F877A microcontroller to change the speed of PMDC motor fed by a MOSFET has been investigated .The MOSFET is driven by high frequency PWM signal .Controlling the PWM duty cycle is same as to control the motor terminal voltage, that changes directly the motor speed. Experimental results are obtained that shows the use of microcontroller for speed management and over current protection of a DC motor.

A Novel Low-Power Reversible Vedic Multiplier

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th April 2018

P.Kiran Kumar | E.Padmaja

Abstract

In reversible computing, modelling low-power circuits is one of the most important technique. As a result of its wide range of applications, major works have been proposed in realizing reversible circuits including primary reversible gates and adders. In reversible computation, multiplier circuits play a vital role in practical applications like quantum dot cellular automata, DNA computing, nanotechnology and low-power CMOS designs. Hence superior multiplier architectures are bound to increase the efficiency of the system. The Vedic multiplier is one such optimistic solution. Implementing this with reversible logic further decreases power dissipation. In this paper, a novel reversible Vedic multiplier is proposed by making use of an algorithm or sutra called Urdhva Tiryagbhyam meaning vertical & crosswise. The power dissipation of proposed reversible multiplier design is reduced by 72.47 %. The reduction in power dissipation is highly achieved by reducing the number of gates which comprise reduction of 12.5 %. The constant inputs are reduced by 16.5 % and a reduction of 28 % is obtained in garbage outputs.

A Novel Method for Color Image Enhancement Applied to Bio-Medical images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

K.Janaiah | R.S.K Vibhav, Prof.R.V.S. Satyanarayana

Abstract

Anovelapproach for biomedical colour image enhancement method is proposed in this paper by using mathematical analysis of dual tree complex wavelet transform. The doctor requires the enhanced medical images to give better diagnosis. Thecontrast of biomedical colour images can be improved by data directionality of dual tree complex wavelet transform. The reduction in noise can be done by using wavelet coefficient shrinkage. In this paper we reduced noise present in both enhancedand non-enhanced medical colour images. We have taken the tumour image and computed the PSNR and SSIM of both enhanced image and proposed method by applying Gaussian noise, Poisson noise and speckle noise.

A Novel Method of Digitization & Noise Elimination of Digital Signals Using Image Processing Concepts

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

M.R. Prasad | Pavithra G , Dr. T.C.Manjunath

Abstract

The primary purpose of this research work is to develop a speech recognition system, which will be capable of recognizing and interpreting an individuals voice. This will thus obviate the use of keyboards and other such input devices to output the data. The scope of this work is limited to the recognition of digits. Matlab, a versatile software tool is made use of for the processing of the signals. This processing involves filtering, shaping, correlating the speech signal which will enable the computer to interpret the commands given by the user. The signature of every spoken digit is unique from which we can derive the parameters which differ from digit to digit. These parameters serve as a concrete base for the implementation of a speaker independent voice recognition system. Using such parameters simultaneously and using probability concept the digits are sorted and arranged in the descending order of their probability. The digit with the highest probability is displayed.

A Novel Pricing Based Algorithm for Intelligent and Economical Load Shedding for Conventional and Smart Grid Applications

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Aditya Anilkumar | Phalgun Madhusudan

Abstract

Intelligent load shedding, as a concept has been in vogue from the beginnings of large scale power systems. Attempts to optimise load shedding using various optimisation techniques and parameters have given several approaches to this problem with tradeoffs in speed and performance. Emphasis on the speed of computation gives sub optimal solutions and emphasis on optimal results slows computations to such an extent that real time optimal solutions are rarely possible to implement. Also, in cases of open energy markets, load shedding involves heavy costs to be borne, by the consumer, the supplier and the facilitator. This makes a live, real time economically intelligent load shedding algorithm conducive for power system operators nowadays. This paper proposes and tests, by simulation, the performance of the novel AP algorithm for economic load shedding.

A NOVEL QUANTUM DOT CELLULAR AUTOMATA BASED DESIGN FOR MULTIPLEXERS

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Nandini Rao G | Dr.P.C Srikanth, Dr.Preeta Sharan

Abstract

Quantum-dot cellular automata (QCA) is a novel and potentially attractive technology in nanometer scale and a possible alternative for CMOS. QCA has large potential in terms of high space density and power dissipation with the development of the high speed computer with low power consumption. This paper provides efficient design and layouts of digital circuits based on QCA using QCADesigner tool. The novel design provides the superior performance factors with respect to area, latency, circuit stability and low power dissipation. In this paper we present a number of new results on 2:1 and 4:1 multiplexers and detailed simulation using QCAD designer tool is presented

A Novel Structure of the Data Objects in Data Aware Networking

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2018

M. Ravi Kumar | V. Sujatha Lakshmi, Y.K Sundara Krishna

Abstract

Innovative progressions in technologies, in particular, the proliferating smart livelihood systems provoking a gigantic data hardship on the networks these days. The proclamation of brand new technologies every day might significantly demand a thumping data to be disseminated around, which causes the existing networks awkward to handle it copiously. In order to address such impediments and to instigate diverse services to be flourished in the prospective networks, the ITU-T recommended a state-ofthe- art network paradigm, known to be as the Data Aware Networking (DAN). This recent approach structures its data in the form of data objects that lets the users have a quick name-based identification and retrieval of the desired data nevertheless of its location, which significantly curtails the burden on the networks and also greatly reduce the blockades in today’s host centric networks. In this paper, we classified the data objects into various categories and proposed a novel structure for the data objects that empowers the DANs intermediary elements to identify a requested data object, process it accordingly in order to disseminate the same to its requester possibly from a nearest DAN element. This novel approach makes the DAN an imperative architecture to realize the future networks

A Novel Structure of the Data Objects in Data Aware Networking

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd April 2018

M. Ravi Kumar | V.Sujatha Lakshmi, Y.K Sundara Krishna

Abstract

Innovative progressions in technologies, in particular, the proliferating smart livelihood systems provoking a gigantic data hardship on the networks these days. The proclamation of brand new technologies every day might significantly demand a thumping data to be disseminated around, which causes the existing networks awkward to handle it copiously. In order to address such impediments and to instigate diverse services to be flourished in the prospective networks, the ITU-T recommended a state-of-the-art network paradigm, known to be as the Data Aware Networking (DAN). This recent approach structures its data in the form of data objects that lets the users have a quick name-based identification and retrieval of the desired data nevertheless of its location, which significantly curtails the burden on the networks and also greatly reduce the blockades in today’s host centric networks. In this paper, we classified the data objects into various categories and proposed a novel structure for the data objects that empowers the DANs intermediary elements to identify a requested data object, process it accordingly in order to disseminate the same to its requester possibly from a nearest DAN element. This novel approach makes the DAN an imperative architecture to realize the future networks.

A Novel Study on Pre-copy Method for Classification of Live Migration of Virtual Machines in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th March 2018

Minal Patel | 

Abstract

Cloud computing is the framework of recent technology and it can set the vision of computing utilities into a reality. The most promising part of cloud computing is that it provides dynamic provisioning and delivers facility for computation, networking, storage etc using datacenters. The working of cloud resources provided through the Internet and it gives services on a pay-per-use basis from different cloud vendors. IaaS services used to develop background processing, PaaS provides programming platforms for developing applications and SaaS provides benefit to cloud users from the elastic scalability without making processes such as software development, installation, configuration, maintenance etc. The migration of a virtual machine has advantages such as increasing energy efficiency, resource sharing and load balancing, fault resilience etc. The pre-copy algorithm of Xen hypervisor is very well known and it is also used in real applications to run migration activities. The migration is categorized into three major types to improve pre-copy: i) compressing memory pages ii) predicting dirty pages iii) reducing dirty pages (performance modelling). Each category has its own importance for the live migration. At first, the compression model is proposed to achieve efficient virtual machine migration. Time series based techniques are developed using historical analysis of past data in the second category. The time series is generated with consecutive iterations of memory pages. Here, two different regression-based models of time series are proposed. In the third category, the performance modelling of live migration is proposed by the measured approach. These models are evaluated for measuring the computation of virtual machine (VM) downtime, the total number of pages transferred and total migration time

A Novel Survey on Neural Network Based Cloud Computing Platform for Securing Data

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Santosh | 

Abstract

Current technological advancement of internet or online platform made tremendous changes in the modern human society. Now a days situation has been created in such a way that whatever we want we would like to go for online, it may be shopping, marketing, banking, purchasing of goods, real estate, agricultural, collaborative learning through on line, pharmaceutical industries, medical field etc. When folks think of online activities there is always a feel of insecurity of their transaction, private data, mode of operation, etc. So there is indeed of vital solution which guarantees the security of operation, safety of private data, protectant environment for on line activities. Cloud computing gives the best online environment for various internet based activities. Here we discuss, analyze and understand the cloud computing environment for data security using Back propagation neural networks (BPN).

A Novel Technology for Treatment of Oil Field Produced Water of Upper Assam basin

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th April 2018

Konwar D | Gogoi SB, Machahary B

Abstract

Produced water (PW) is a complex mixture of organic and inorganic compounds and the largest volume of by-product generated during crude oil recovery operations. It contains substantial quantity of contaminants and other suspended particles and so, it cannot be disposed directly or cannot be injected to the sub-surface for secondary recovery purposes keeping in view of the environmental concerns. Therefore, evaluation of PW characteristics is important and essential for both environment and reservoir management. This study deals with quantification and qualification of physical and chemical parameters of PW collected from different depths and horizons of Upper Assam oil fields and treat it by a self-designed novel technology. The characterization of PW is analyzed and compared with the World Health Organization (WHO) specification to meet the minimum discharge regulations of waste water for a greener ecosystem. The novel technology is the design of the treatment technology by intervention of different membrane technologies. Hollow fibre set-up was used for the treatment of PW by incorporating filter membranes of the order of micro, ultra and nano sizes. The fouling effect of the membranes were found to be minimum. All the membranes showed optimum efficiency with respect to their treatment performances.

A Novel Text Detection Technique Based On Corner Response

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st March 2018

Nishant Singh | Charul Bhatnagar

Abstract

Data about the text incorporated in pictures and videos have a cardinal role in semantic assessments. In this paper, Novel text Detection and Localization (NTDL) algorithm is presented for text detection and localization in the background that incorporates noise in it. This algorithm is constituted by corner response. In contrast to the portions that do not contain text, there are some edges that are dense and corners in portions having text. So, some related strong reactions from regions of text and minimal reactions from portions that do not have text. These reactions furnish some cues that are highly useful for text detection and localization of pictures. By employing a basic schema constituted on the threshold, we obtain regions of candidates for text. These portions are evaluated by interlinking several characteristics like size and colour of linked devices. Lastly, the text line is identified exactly by the projection of response from corners. The outcomes from illustrations present exactness, speed and recalling for suggested methodology and we have obtained the recall of 93.25%, accuracy 97.96% and speed of 98.14% that greatly enhanced the performance of the system.

A Novel Three Phase Dual-Input Dual-Output Indirect Matrix Converter by Model Predictive Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Choppa Manoj Kumar | T.Gurubhavan

Abstract

This paper presents a novel Matrix converter two AC input and two ac outputs. The presented topology is based on the traditional indirect matrix converter (IMC) but with its rear and front end six switch converter is replaced by a compact nine switch rectifier, inverter with only three extra switches added. The proposed converter can produce two sets of three phase ac outputs. This Indirect matrix converter topology can independently supply ac power from two different three phase ac power sources. A model predictive control (MPC) uses the discrete time model of the converter and load parameters are used to predict the behavior of the input reactive power on the supply side and the output currents for each valid switching state the control method selects the best commutation state. The control action which minimizes the cost function is selected and applied to the system for the next time interval. This paper presents a finite control set of model predictive control strategy for a dual input- dual output indirect matrix converter.

A paper on „Utilization of Mechanical Linkages for Water Savage in Wash Basin

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Pratiksha Patil | Sheetal Sapkal,Mayuri Sathe,Geetanjali Pawar

Abstract

Now day by day, water wastage has become the most common problem about which awareness should be must taking India’s future into account. After a survey, one of the leading newspapers declared that, in public buildings, there is a large wastage of water while using wash basin for different purposes like washing face or hands using soap due to the time gap between opening and closing of the tap. This project tried to minimize this time gap.

A Parallel Area Delay Efficient Interpolation Filter Architecture

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Anusha Ajayan | Rafeekha M J

Abstract

Interpolators are widely used in digital signal processing to increase the sampling rate digitally. A multi-standard Software Defined Radio (SDR) system involves interpolation with different filter coefficients, filter length and up-sampling factors to meet the stringent frequency specification. An SDR receiver consumes huge amount of resource when these interpolators are implemented individually in a hardware circuit. A reconfigurable Finite Impulse Response (FIR) interpolation filter is suitable for a resource and power constrained multi-standard SDR receiver. Now-a-days interpolation filter architecture with a few multipliers or without any multipliers are available. Area complexity, irregular dataflow and low hardware utilization efficiency are the major disadvantages of these architectures. In this work, a new parallel multiplier based reconfigurable structure is derived for interpolation filter. Elimination of redundancy and producing multiple outputs without reconfiguration are the features of this architecture. To validate the design, code can be developed using VHDL in Xilinx ISE Design Suite 13.2 and to be simulated in ModelSim SE 6.3f. The Xilinx synthesized result shows that, this architecture has less area, delay and Area-Delay Product (ADP) compared to the other existing architectures.

A Parametric Study of Grit Blasting Nozzle Variables for Aerospace Metals Surface Preparation

International Journal of Science , Engineering and Management, Available online 31st May 2017

Dr. E. Daniel Kirby | Dr. Ravindra Thamma,Miroslaw Kot

Abstract

Grit blasting is a common and reliable method for surface preparation of aerospace metal components for subsequent operations. Unfortunately, the complex nature of aerospace components creates difficulty in providing sufficient cleaning of surfaces within tight cavities and intricate geometries. Manufacturers of grit blasting equipment have created different media types and sizes, along with different nozzles and blasting parameters, in order to provide a large variety of capabilities within this technology. This investigation of different nozzle designs and parameters, involved the use of quantitative methods, developed to evaluate the effectiveness of grit blast surface cleaning. The most critical aspect of grit blasting is the erosion effect on surface of the material, and therefore the amount of material removed is used as the response parameter for this study. This analysis will show amount of material removal and recommendations as to which method provides the safest parameters before significant amount of material is removed.

A Parametric Study on Seismic Response of RC Building Having Vertical Geometrical Irregularity by IS1893 (Part 1):2016

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd March 2018

Vikas Yachawad | S. V. Bakre

Abstract

From the past some decades we dealt with several earthquakes, which proved that the influence of the effects induced due to the earthquake is severe in the irregular structure. As behavior and instance of these natural hazards are unpredictable, we can just design the structure which can resist the effects induced by them hence several codes have been developed to differentiate these type of vertical and horizontal irregularities. Some critical measure also given in these codes to deal with these type of irregularities. The objective of this study is to carry out the seismic analysis of vertically irregular buildings as per IS1893:2016 and compare the effects of those irregularities with the analysis results of the regular building structure. A regular and three stepped building with a different configuration has been taken for the analysis. Seismic analysis of those buildings has been carried out by using equivalent static analysis (ESA) and response spectrum analysis (RSA). Use of magnification factor has been taken into consideration to scale up the response spectrum analysis results up to the results of an equivalent static analysis. Regularity index for an irregular building has been calculated to compare modification in the time period of same irregular building over code specified time period and thereby modification in spectral acceleration and base shear. First mode participation factor and time period of an irregular building are found to be lesser than the regular building whereas the base shear of an irregular building is higher than the regular building.

A Pattern Prediction on Electricity Consumption using Hidden Markov Model

International Journal of Engineering Research in Computer Science and Engineering, Available online 28th March 2018

Dr. Kishore Kumar Senapati | 

Abstract

The present era is the digital era and digital technologies are many impacts on human life as well as societies. Starting from Smart city design to social networking peoples are now using digital technologies. As the use of technologies grows the demand for its source that is electricity grows. Predication of electricity demand is a crucial problem and providing a solution through statistical rules is a big challenge. Present day Electricity demand pattern is considered to play a crucial role in the modernization of community. So, forecasting of household energy consumption precisely is essential due to the fluctuating demand –response of energy. It is also considered very significant for energy planning, development mechanism and economic success. In this paper, Statistical technique model is used to predict future consumption demand of electrical consumption rate. The prediction with output likely sequence works significantly by the implementation of Hidden Markov Model (HMM) using the Viterbi Algorithm with emphasis is given to forecasting future energy consumption demand where data pattern changes monthly and shows non-linear trends. This paper uses an extensive data sample of author’s working university database. The final forecasted outcome is tested and compared with actual data. Experimental results show an aggregate of 0.0366 error rate showing non–linear trends of household electricity consumption with respect to factors concerning such as population, climatic conditions and financial strength. The prediction model based on the small-scale fraction of households summarizing for most likely aggregate consumption response. The proposed model helps in recognizing future electricity consumption pattern which will be used in smart city design and provide a solution for electrification of urban and rural as well as any planning in government and non-government organizations for electricity consumption.

A Personalized Web Search for Relevant Web Pages: A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 3rd May 2018

Arati Anilrao Wardekar | Poonam Gupta

Abstract

Due to heavy usage of internet large amount of diverse data is spread over it which provides access to particular data or to search most relevant data. It is very challenging for search engine to retrieve required data as per user’s need and which takes more time. So, to reduce large amount of time spend on searching most relevant data we proposed the “Smartcrawler”. In this proposed approach, results taken from different web search engines to achieve relevant pages. Take online link from web and performing two stages crawling on that data or URL’s. In which sight locating and in-site exploring is carried out or obtaining most relevant site with the help of page ranking and reverse searching techniques. This system can works online and offline manner. This survey presents the fundamental challenges and studies existing models and solutions. It also highlights direction or way for future work.

A Photo Voltaic System Based Dual Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

S.Sarada | C.Ganesh , L.Chandra kanth

Abstract

This scheme presents an integrated solution for Photo Voltaic cell(PV) fed water-pump drive machine which uses an Open-End Winding Induction Motor (OEWIM). The dual inverter fed OEWIM drive achieves the functionality of a three level inverter and needs low value DC bus voltage. This helps in optimal arrangement of Photo voltaic cells, this can avoid large strings and helps in improving the PV performance with wide band-width of operating voltage. It also reduces the voltage rating of the DC-link capacitors and switching devices used in the system. The proposed control scheme achieves an integration of both Maximum Power Point Tracking (MPPT) and V/f control for the efficient utilization of the PV panels and the motor. The proposed control scheme requires the sensing of PV voltage and current only. Thus, the system requires less number of sensors.

A Power Quality Improved Bridgeless Converter with fuzzy logic controller Based Computer Power Supply

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 20th September 2017

P.Vishnu Vardhan | P.Sreenivasulu

Abstract

Poor power quality, moderate dynamic reaction, high gadget stretch, consonant rich, occasionally thick, peaky, mutilated info current are the significant issues which are every now and again experienced in traditional switched mode power supplies (SMPSs) utilized as a part of personal computers (PCs). To overcome these issues, it is proposed here to utilize a non-isolated bridgeless buck-support single ended primary inductance converter (SEPIC) in discontinuous conduction mode (DCM) at the front end of a SMPS. The bridgeless SEPIC at the front end gives solidly controlled output dc voltage even under successive information voltage and load varieties. The output of the front-end converter is connected with a half scaffold dc-dc converter for seclusion and furthermore to obtain distinctive dc voltage levels at the heap end that are required in a PC. Controlling a solitary output voltage can direct the various dc output voltages also

A Preliminary Study about an emerging approach in Cryptography: Quantum Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

Poornachander V | 

Abstract

The word cryptography is the artwork of mystery writing. Generally, humans consider cryptography because the art of mangling data into obvious unintelligibility in a way permitting a secret technique of untangling. The fundamental provider supplied by cryptography is the potential to send data among members in a manner that others can’t read in a right format. Here we will give attention to the sort of cryptography this is based on representing information as numbers and mathematically manipulating those numbers. And we have various encryption techniques to send data in a cryptographic manner. Here we have an emerging technology for this new era called Quantum cryptography. The first-rate and famous instance of quantum cryptography is the quantum key distribution which gives an information-theoretically comfy method to the important thing change trouble. Presently used famous public-key encryption and signature schemes may be damaged by using quantum adversaries. The benefit of quantum cryptography lies in the truth that it permits the completion of diverse cryptographic responsibilities which can be established or conjectured to be not possible the usage of simplest classical (i.e. non-quantum) verbal exchange. This paper deals with the detailed technology about Quantum Cryptography

A Privacy-Preserving Data-Sharing Framework for Smart Grid

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th April 2018

SK.Dayeen Sidhika | Dr.P.Venkateswara Rao, S.Yamini, T.Hemalatha

Abstract

Distributed energy resources (ERs), featured with small-scale power generation technologies and renewable energy sources, are considered as necessary supplements for smart grid. To ensure that merged resources contribute effectively to the grid, data generated by consumer side should be shared among the ERs. However, it also introduces challenges of the protection of consumer privacy. To address these difficulties, we propose a new framework to share data in smart grid by leveraging new advances in homomorphic encryption and proxyre-encryption. Our proposed framework allows ERs to analyze consumer data while ensuring consumer privacy. An additional benefit of our proposed framework is that consumer data is transmitted over the smart grid only once. Furthermore, we present a concrete scheme falling into the proposed framework. Extensive analysis shows that the concrete scheme is secure and efficient.

A Process for Implementation of Data Preprocessing In Weka & Datapreparator Tool

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th March 2018

Vani .N  | Dr. Veeragangadhar Swamy .T.M

Abstract

Data Preprocessing is an important task in today technology to convert raw data into a knowledgeable format from web log file which helps identify individual user and session, path completion and removes inconsistent data, noisy data and irrelevant data with the help of data cleaning process. We propose tools for data cleaning processes such as Weka and DataPreparator to execute cleaning data which results in an efficient analysis of raw data into useful information and improves quality of data. In this paper, we use Weka and Data Preparator tool for data cleaning, visualization, integration data and produces the needy data for mining

A Proficient DLAU Design for FPGA Implementation

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd June 2018

Vijayashree | 

Abstract

These days, the size of systems are increasingly large scale due to the practical applications, which poses significance importance in the field of neural networks. Deep neural networks(DNN)has been employed for image recognition since it can accomplish high exactness by copying conduct of optic nerve in living animal. In order to enhance the execution and additionally to keep up low power cost, in this paper, we design deep learning accelerator unit(DLAU), which is the scalable accelerator for largescale networks using field-programmable gate array(FPGA) as hardware prototype. In order to improve throughput, it utilizes the tile techniques and employs three pipelined processing units to explore the locality for deep learning applications

A Proficient Unambiguous Congestion Control Model for High Rate Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th January 2018

Vivek J. Vyas | Dr. Kishor H. Atkotiya

Abstract

The traditional TCP observes after a destitute performance on high bandwidth intermission creation links projected for associate information broadcast frequency of thousands of Megabits per seconds (Mbps). This is common because of the point of over congestion, the Transmission Control Protocol’s algorithm for controlling drips window of the congestion window to half of the current window size and drives interested in additive increase methodology that might be sluggish for the captivating comfort of immense magnitude of practicable bandwidth. In this paper, we have open a renewed version and to remove the deficiencies of the TCP protocol then remark to take out a knowledge of the alike built on a range of factors that are., Stability, Fairness, Bandwidth Utilization, Performance and Throughput, intended as long as associate information broadcast through the Networks of High Rate.

A Proposal for Epidemic Prediction using Deep Learning

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sagar Palao | Abhishek Shahasane,Siddhesh Dighe, Harsh Gupta,Anjali Yeole

Abstract

HealthCare has been a surging need in India. The inception of Smart India, Smart Villages has further emphasized the need of a Smart & Healthy India. However little reflection of such digitally empowered country has been seen in the field of healthcare. This has further increased the importance of the definition of ubiquity of information and computing technology in healthcare that demand constant surveillance and vigilance of healthcare to predict epidemic outbreak and biological attack. The paper’s primary focus is to analyze and determine the spread of diseases and epidemic in cities/villages. And using this analysis to predict where the next outbreak of epidemic will be. This prediction helps the health authorities to take necessary action in terms of assuring that sufficient resources are available to suffice the need and if possible stop the occurrence of such epidemic by taking necessary actions. To achieve this, we use deep neural network as the heart of our prediction. It receives its training from the past experiences of data which we have collected from hospitals and our spread network. Using this training with our dynamic data it makes predictions as well as adaptively learns from the real time data.

A Proposed Bring Your Own Device eLearning Framework for Private Secondary Schools in Dubai, UAE

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd March 2018

Manoj Mechankara Varghese | Varughese K. John, Poonsri Vate-U-Lan

Abstract

Objectives This paper aims to study the impact of BYOD implementation on learning outcomes of ninth grade students in the subjects of Science and Mathematics. The target sample size of this study will involve 48 teachers and 1800 ninth grade students from six private schools in Dubai, UAE. Methods/Statistical Analysis The study is based on the principles of quantitative research. The casual comparative study will be based on independent and dependent variable. The examination scores in Science and Mathematics, student age and gender of the 1,800 ninth grade students will be collected as quantitative data for descriptive statistical and comparative analysis using the IBM SPSS software. The two examination scores of the students will be used to determine the level of academic achievement and will become the dependent variables of the study. The information on BYOD Implementation and the level of usage of technology by 48 teachers and 1800 students will be tested by administering a survey questionnaire research instrument to 10 teachers and 50 students who are representative of the larger population of the study. The information collected from the survey questionnaire instruments will become the independent variables for the study. Findings The two major findings of this study were that students' achievement has been significantly improved by the use of BYOD tools and applications with the traditional teaching methods and that students' achievement has been varying significantly in relation to gender as far as BYOD tools and applications are implemented and practiced. The benefits of BYOD on student learning include increased engagement, communication, collaboration, interaction and personalization. The factors that were crucial to effective BYOD implementation include adequate teachers training, a proper BYOD eLearning Framework, the availability of virtual learning environment (VLE's) and the availability of relevant pedagogy based digital curriculum content (DCC). Application/Improvement The research findings of this work will be used to develop a BYOD eLearning Framework for private secondary schools in Dubai which will help school to effectively implement BYOD programs.

A Proposed System on Detecting Stress Based On Social Interactions on Social Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 3rd May 2018

Indu Dokare | Gayatri Pawar, Manisha Mirchandani, Shreya Narsapur, Kajal Rajani

Abstract

Stress is essentially humans' response to various types of desires or threats. This response, when working properly, can help us to stay focussed, energized and intellectually active; but if it is out of proportion, it can certainly be harmful leading to depression, anxiety, hypertension and a host of threatening disorders. Cyberspace is a huge soap box for people to post anything and everything that they experience in their day-to-day lives. Subsequently, it can be used as a very effective tool in determining the stress levels of an individual based on the posts and status updates shared by him/her. This is a proposal for a website which takes the Twitter username of the subject as an input, scans and analyses the subject's profile by performing Sentiment Analysis and gives out results. These results suggest the overall stress levels of the subject and give an overview of his/her mental and emotional state. The tool used for analysis of the social media account is Rapidminer. Rapidminer is an environment for various data mining and machine learning procedures with a very effective and simple GUI.[1]

A Proxy-based Collaboration System to Minimize Content transfer Time and Energy Consumption

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

P. Hruday Kumar | A.Narayana Rao, K.V.Venkatramana, S.S.Phani, P.Kiran

Abstract

Mobile cooperative community (MCC) is associate degree rising technology that enables multiple mobile nodes (MNs) to perform a resource intensive task, lovemassive content transfer, during a cooperative manner. during this paper, we have a tendency to introduce a proxy-based collaboration system for the MCC wherever a content proxy (CProxy) determines the number of chunks and therefore the sharing order scheduled to every MN, and therefore the received chunks area unit shared among MNs via Wi-Fi Direct. we have a tendency to formulate a multi-objective optimisation drawback to attenuate each the cooperative content transfer time and therefore the energy consumption in associate degree MCC, and propose a heuristic algorithmic rule for resolution the optimisation drawback. intensive simulations area unit applied to guage the results of the amount of MNs, the wireless information measure, the content size, and dynamic channel conditions on the content transfer time and therefore the energy consumption. Our results demonstrate that the projected algorithmic rule are able to do near-optimal performance associate degreed considerably cut back the content transfer time and has an energy consumption adore that of alternative algorithms. Index Terms Mobile cooperative community, content transfer, proxy-based collaboration system, _-local search of sharing order (_-LSSO).

A Quad Two-Level Inverter Topology

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

C.Ganesh | S.Srada , I.Sreekanthaiah

Abstract

A multilevel inverter topology for a four-pole induction-motor drive is presented in this paper, which is constructed using the induction-motor stator winding arrangement. A single dc source with a less magnitude when compared with conventional fivelevel inverter topologies is used in this topology. Therefore, power balancing is-sues (which are major challenges in conventional multilevel inverters) are minimized. As this configuration uses a single dc source, it provides a path for zero-sequence currents because of the zero-sequence voltages present in the output, which will flow through the motor phase winding and power electronic switches. To minimize these zero-sequence currents, sinetriangle pulse width modulation (SPWM) is used, which will shift the lower order harmonics near to switching frequency in the linear modulation region. However, in the case of over modulation, harmonic voltages will be introduced close to the fundamental frequency. In this regard, a modified SPWM technique is proposed in this paper to operate the drive in the over modulation region up to the modulation index of 2/?3. The proposed quad two-level inverter topology is experimentally verified with a laboratory prototype on a four-pole 5- hp induction motor. Experimental results show the effectiveness of the pro-posed topology in the complete linear modulation region and the over modulation region.

A Ranking Based Recommendations System for Web Pages Using Sentiment Analysis and Demographics

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th April 2018

M.Mallikarjuna Rao | Dr.K.Fayaz

Abstract

Nowadays, the quantities of internet business organizations are expanding step by step and likewise immense number of items is coming into the market. At the point when clients need to purchase the items and large simply observe a numerical rating of the items and then buy them. Later they come to realize that items are bad. The present rating frameworks includes collaborative rating, content rating and substance construct rating based with respect to the exchanges of client after the item is acquired. This does not think about the slants communicated on the item not at all like couple of which consider the reviews and perform opinion examination on the reviews yet they don't consider different features conceivable in the item and slant investigation in light of those features. In the paper we exhibit an approach in which the slant investigation will be performed per review and per feature. Likewise the feature based assessment investigation calculation is executed for 3 distinct situations specifically single Feature, Multiple Features and No Feature. For No feature we much consider the calculation of Frequency on every token in the sought question. At last charts are likewise gotten in light of each feature which items are the best. For gathering of reviews the approach considers a disconnected review inside the application and continuous reviews for any sort of online business site by utilizing Web Crawler calculation. The execution influences utilization of most recent innovation to stack to be specific spring system for the backend and Ext JS Framework for the front end

A Real Time Fruit Grading Technique Based on Machine Vision and Image Processing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Chandra Sekhar Nandi | Bipan Tudu, Chiranjib Koley

Abstract

In agricultural and food industry the proper grading of fruits is important to increase the profitability. In this paper, a scheme for real time mango (Mangifera Indica L.) grading technique according to their maturity level and quality attributes like size, shape, weight, surface defect has been proposed. The proposed scheme works on intelligent machine vision based techniques for grading of mangoes in four different categories, which are determined on the basis of market value. In this system video image is captured by a CCD camera placed on the top of a conveyer belt carrying mangoes, thereafter several image processing techniques are applied to collect features which are sensitive to the maturity level and quality level. For maturity prediction Support Vector Machine (SVM) based classifier has been employed and for estimation of quality from the quality attributes, Multi Attribute Decision Making (MADM) system have been adopted. Finally fuzzy incremental learning algorithm has been used for grading based on maturity and quality. The performance accuracy achieved using this proposed system for grading of mango fruit is nearly 90%. Moreover, the repeatability of the proposed system is found to be 100%.

A Realtime Telehealth System using Lpc2148

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Nilay Tambat | Sowmya K B

Abstract

The world of automation is rapidly improving and growing. Along with it application of IoT is also increasing. Application of engineering and technology has proved its significance in the field of bio-engineering. Health monitoring systems have become the need and the hot areas of development in the society. Along with monitoring there is also a need to analyze the monitored data. In this paper a system to measure/monitor a two vital parameters of human body is developed. The monitored values are stored on cloud using a WiFi module and analysis on the data stored on the cloud is done using Tableau , An Android Application and an IoT platform ThingSpeak. If abnormal values are detected then immediately the values are sent to the doctor as well as the family members using GSM module. The data is continuously updated in the database. With the help of this system the doctor can monitor and analyze the parameters of the person remotely , the physical presence of the person is not required , which means wherever the person might be doctor will be able to advice and suggest the needed medication to the person.

A Recent Survey on Multiclass Object Recognition and Classification based on Machine learning methods

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st March 2018

Harpreet Singh | Dinesh Gupta, Alok Kumar Singh Kushwaha

Abstract

Multiclass object recognition and classification from the video stream is active research topic in computer vision due to its wide range of application in many emerging areas such as surveillance, medical, safety, vehicle detection. Object recognition and classification task are far more challenging because of image and video data are of heavy and highly variable in nature and harsh nature of real-world recognition and classification scenarios. The processing of image and video data is required to be in real-time. The objective of this paper presents a comprehensive qualitative and quantitative comparative study of several state-of-the-art object recognition and classification methods. We have also examined merits, demerits efficiency of pioneering machine learning methods being used for object recognition and classification.

A Reliable Congestion Control Framework for Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th October 2017

P.Prittopaul | R.Vijayalakshmi

Abstract

Well designed congestion control techniques allow efficient transmission of significant volumes of data from a large number of nodes along one or more routes towards the data processing centers. Since the priority of generated traffic in network level is not uniform in WSNs, an architecture framework is proposed based on priority of generated traffics for service identification in network level in order to meet better service quality and efficiency. The proposed method is efficient in terms of end to end delay, throughput, power consumption and lifetime of network.

A Reliable Congestion Control Framework for Wireless Sensor Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 4th September 2017

P.Prittopaul | R.Vijayalakshmi

Abstract

Well designed congestion control techniques allow efficient transmission of significant volumes of data from a large number of nodes along one or more routes towards the data processing centers. Since the priority of generated traffic in network level is not uniform in WSNs, an architecture framework is proposed based on priority of generated traffics for service identification in network level in order to meet better service quality and efficiency. The proposed method is efficient in terms of end to end delay, throughput, power consumption and lifetime of network.

A Remote User Authentication Operation using CaRP schemes

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th December 2017

Mrs.Sindhu M.R | Mrs.Sarita Patil, Mrs.UrmilaBiradar, Nilesh P Sable

Abstract

Image based password schemes are constructed to authenticate users. Graphical passwords are composed of images and sketches with human memory for visual information. Improved password memorability and strength against guessing attacks are the key benefits of graphical password schemes. Graphical passwords are classified into three main categories. They are recall, recognition and cued-recall methods. Recall based graphical password systems are drawn metric systems. Recognition based systems, also known as cogno metric systems or search metric systems. Cued recall systems typically require that users remember and target specific locations within an image. Graphical passwords and Captcha schemes are integrated to perform the user authentication with improved security mechanism. Captcha as graphical passwords (CaRP) is a graphical password scheme used for user authentication. Online guessing attacks, relay attacks and shoulder surfing attacks are handled in CaRP. CaRP is click-based graphical passwords where a sequence of clicks on an image is used to derive a password. Dynamic captcha challenge image is used for each login attempt in CaRP. Text Captcha and image-recognition Captcha are used in CaRP scheme. Text CaRP scheme constructs the password by clicking the right character sequence on CaRP images. CaRP schemes can be classified into two categories recognition based CaRP and recognition-recall based CaRP. Recognition-based CaRP seems to have access to an infinite number of different visual objects. Recognition-recall based CaRP requires recognizing an image and using the recognized objects as cues to enter a password. Recognition-recall combines the tasks of both recognition and cued-recall. Password information is transferred and verified using hash codes. Secure channels between clients and the authentication server through Transport Layer Security (TLS). The system is improved with distribution analysis and transmission security features. Pattern based attacks are handled with Color and Spatial patterns. Pixel colors in click points are considered in the color pattern analysis model. Pixel location patterns are considered in the spatial pattern analysis model.

A Report on Business Intelligence The Role of Data Analysis and Data Mining in Contemporary Organizations and The Ethical Implications of Collecting, Storing and Using Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mr. Richardson Lawrence | 

Abstract

Diabetic Retinopathy (DR) is an eye disease due to diabetes which causes visual loss. So it is rational to provide treatment for DR at first stages of disease. Hemorrhages are the first symptoms that signify person have diabetic retinopathy. Therefore, their recognition is very essential. In this paper image contrast is improved by pre-processing and then blood vessels are detected as the boundaries of hemorrhages are not differentiate when they are in contact with blood vessels.then classify the image on the basis texture feature such as area, standard deviation etc. finally normal, moderate or Severe DR is detected on the basis of texture feature

A Resource Allocation Strategy using PSO in Heterogeneous Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th March 2018

Neeraj Kumar Pandey | N.K.Joshi

Abstract

The most important problem in the cloud service provider is to maintain the elastic property of the cloud in such a way that user will pretend the cloud as limitless. So the challenge is how to make the limited sources unlimited. Every task must be granted what it requires by any mean otherwise it will degrade the performance of cloud. So resource allocation has a lot of solution. Resource allocation is an NP-hard problem so no particular solution can perform well always. But these kinds of problems are solved by nature in many ways such that such as ant colony optimization (ACO) algorithm, particle swarm optimization (PSO) algorithm and firefly algorithm. In this paper, a particle swarm optimization technique has been used to resolve the most critical problem of the cloud service provider at cloud data centre. This technique is basically taken from the collective and collaborative nature of the nature swarm. This technique can be used to allocate the resource to the task request by minimizing the makes span, flow time and task execution cost. The simulation and test results show the better efficiency than the other similar existing technique.

A Review Approach on Cardless ATM Access with Biometric Security Using IOT

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Mr.J.A Patel | Darade Bhavna, Ms.Baglane Ruchita ,Ms.Bodke Punam ,Ms.BodkeArchana

Abstract

This paper describes a method of implementing two way authentications. The first one is biometric thumb verification is done and in second is 4 digit pin verification. If it’s wrong then we find that the user is fake and LCD displays the THEFT message and also the buzzer is ON. If it is right then we find that the user is not fake and the LCD displays ENTER THE KEY message, in this case buzzer is OFF.

A Review Approach on Design and Development of Transportation Path Follower Robot for Material Handling

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Mr. Pathade Akash | Mr. Bajaj Kishan,Mr. Bajaj Kaushik,Ms. Patil Tanvi

Abstract

In this project instead of doing manual work, automatized work is done. Transportation path follower robot is a type of robot which is used for material handling and transporting the material from one place to another. The main purpose of this project is to reduce labour, cost involved with it and also to save the time. It is six wheel electric rover, which will provide paper work from administration office to every department. Robotic vehicles are capable of traveling where people cannot go, or where the hazards of human presence.

A Review Approach on Manual Fixture Automation Using PLC

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Mr. Patel Jagdish | Ms. Lawte Kanchan, Ms. Patil Isha, Ms. Raut Devyani

Abstract

a fixture is a mechanical setup that holds a job so that it will aid the industrial processes carried out on it with ease, in terms of accessibility and reach. The processes may include manipulation of a job like rotation, clamping, de-clamping and positioning. Fixtures can be handled manually to hold a job. But such manual process becomes tedious in complex processes which causes human fatigue as well as it is time consuming. Hence PLC (Programmable Logic controller) can be used to automate the industrial fixture, to reduce the complexity of the process. In our project we are trying to construct a PLC based control system to simulate the automation of an industrial fixture and analyzed it for safety and increase productivity which will be beneficial for manufacture industry.

A Review of Advantages and Limitations of Cloud Centric Analytics

International Journal of Engineering Research in Computer Science and Engineering, Available online 10th January 2018

Richa Mehra | Deepak Agarwal

Abstract

Cloud analytics signifies any Data Analytics or Business Intelligence process that is performed in collaboration with a cloud service provider. Cloud-based business intelligence arrived soon after the first wave of cloud applications but several early pioneers -- LucidEra, Oco, PivotLink -- didn't survive. Fears about putting data in the cloud were among the early impediments to success. Now that mission-critical apps and sensitive corporate data are increasingly moving online, it makes sense that cloud- based analytics and BI platforms are gaining customers. Cloud Analytics is a Cloud based service model which comprises of the elements of the data analytics process are provided by a public or a private cloud. Various applications and services of Cloud Analytics are being offered under a subscription-based or pay-per-use model, which is also known as Software as a Service (SaaS)- based business intelligence (BI). Cloud analytics is a cloud-enabled solution which allows an organization or individual to carry out business analysis or intelligence procedures. These solutions and services are provided through various cloud models, such as hosted data warehouses, SaaS business intelligence (BI) and social media analytics products powered by the cloud. Cloud analytics services and a typical data analytics service, both are the same in features and capabilities. But the cloud analytics integrates some or all of the service models of cloud computing in delivering that solution. [1][2].

A Review of Block based Image Compression Using Hybrid Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

S.Narasimhulu | Dr.T.Ramashri

Abstract

This Paper gives review of different types of Images and the different techniques for Image Compression. Based on this Review we recommended general method for Image Compression. Image Compression is the technique of reducing the image size without degrading the quality of the image. Various types of images and different compression techniques are discussed here. Image Compression is the solution associated with transmission and storage of large amount of information for digital Image. SPIHT is computationally very fast and among the best image compression algorithms known today. According to statistic analysis of the output binary stream of SPIHT encoding, propose a simple and effective method combined with Huffman encode for further compression. In this paper the results from the SPHIT algorithm are compared with the existing methods for compression like discrete cosine transform (DCT) and discrete wavelet transform (DWT).

A Review of Blue Economy for Potential Growth of Infrastructure in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd March 2018

Mahendra Umare | V.P. Varghese, A M Badar, D P Singh, N R Dhamge

Abstract

Geographically, India is blessed with great peninsular region well connected by ports. Presently, all the ports in India account for handling almost 90 percent of its export and import trades. However, its contribution is just 1 percent against by railways & roads, which accounts 9 percent and 6 percent of the total goods transportation in India respectively. It is estimated that India has about 42 percent of the proportional share of goods trade in its GDP growth whereas, other developed countries has about 70 to 75 percent. It reflects that India has great potential in ocean economy. Therefore, keeping the focus on blue economy development, India can integrate its ports development and can have more sustainable business solutions for its overall economic, social, and socio-economical growth. This paper elucidates the status of the contribution of blue economy in India’s development and opportunities in various sectors of the blue world in achieving a growth of infrastructure.

A Review of Codes on Building Irregularities for Seismic Analysis

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Meenakshi Landge | Dr. R. K. Ingle

Abstract

Possibility of damage happening during earthquake ground motion is more where there are occurrences of structural weakness and this weakness generally produced because of the irregularity.The presence of structural irregularity changes the seismic response and the change in the seismic response depends upon the type of structural irregularities. In this paper, criteria and limits specified by IS 1893(Part 1) for different types of irregularities are discussed and standards defined by other countries (ASCE-7-10, NBCC2005, TEC2007, NZS1170 and EC8: 2004) have been compared. The code’s main advice for the designers is to avoid irregularities altogether if possible.Alsoto avoid casualties, architects should design appropriately and understand the dynamic behavior. To do that, the basis of seismic codes which are substantial bases should be used in architectural studies

A Review of Digital Watermarking and Its Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Anu | 

Abstract

This is agreed by one and all that today’s era is IT oriented and Internet has reached to every corner of our lives. Communicating over Internet or networks is a routine for us, this leads to the need of transmission security and safety of our confidential information which is being communicated. Digital Watermarking is a medium to assure integrity, piracy detection and knowing any kind of tempering done with the communicated data. It is also used for applications like owner’s authentication, copyright maintenance and monitoring broadcasts. In this paper we will review digital watermarking with its techniques, applications, classification and factors effecting watermarking

A Review of Fuel Adulteration Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 12th April 2018

Pranjali P. Dharurkar | 

Abstract

Air Pollution has become a global issue today for our country. Air Pollution causes mainly due to adulterated fuel due to which it causes tailpipe emission from the vehicles. Due to fuel contamination, the original properties are altered. Consumers are having the complaint that they don’t have the appropriate tool to verify the quality of fuel. All the existing systems are very raw and simple. The testing of petrol must be done with the appropriate tool. Fuel must be in pure form for the smooth working of vehicles and automobiles. The very Raw method is used for testing of petrol like filter paper test. In filter paper test, a drop of petrol is taken on filter paper and then if the color of paper remains same then it is pure otherwise it is impure. Some of the systems are introduced are tedious and time-consuming

A Review of Load Balancing in Network-Wide Intrusion Detection Systems

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 19th July 2017

Miss. Prachi N. Deshmukh | Dr. V. M. Thakare

Abstract

There are various stakeholders having similar goals as well as policies due to which modification to the present internet is restricted to incremental updates; implementation of every novel fundamentally extraordinary innovation is beside inconceivable. To deal with this issue, proposed the concept of network virtualization, here designed as a diversifying attribute without having restriction of any system. By permitting multiple heterogeneous system structures to live together on a shared physical substrate, network virtualization gives flexibility, promotes diversity, and promises security and increased manageability. It reduces the maximum computation load, provide better resilience under traffic variability, and offer improved detection coverage.

A Review of Modern Paradigms in Data Compression Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Mr. Giridhar S. Sudi | Dr. Meghana Kulkarni , Mr. Vikrant K. Shende

Abstract

Data compression has been extensively applied to the motion-picture industry and consumer electronics especially in high-definition TVs, advanced multi-media systems, remote sensing systems via satellite, aircraft, radar, teleconferencing, email and social media, mobile phones, hand held PCs etc. Efficient compression of data would significantly decrease the overheads in both the communication and data storage. The efficiency of a data compression scheme is measured by the compression ratio, the resulting distortion after lossy compression, and the implementation complexity. This paper reviews the evolution of compression techniques over the years and the present day modern techniques being explored. Artificial Intelligence (AI) approaches appear to be very promising for intelligent information processing due to their massively paralleled computing structures. The main problems solved by Artificial Intelligence (AI) techniques such as Artificial Neural Networks, Fuzzy Logic systems and Genetic Algorithms include optimization, classification, prediction and pattern recognition. Due to the efficiency of AI paradigms in solving complex problems, researchers are applying these techniques to develop new intelligent data compression systems.

A Review of Net Metering with Ongrid Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Prof. Mr. I.D. Pharne | Mr. S. S. Malage , Mr. A. J. Patil , Mr. A. D. Landage

Abstract

With the increase in implement of solar PV in India, a net metering policy is need of ours. Solar energy is clean, inexhaustible and environment-friendly resource among all renewable energy options. In this paper, concept of net metering through solar system and analysis of data carried out is explored for the beneficial of consumers for studying the feasibility of net metering in India. Also it is found that simple net metering policy is unable to accommodate various categories of consumers. So, making a net metering, which is more scalable, feasible and financially viable is challenge. According to consumers classifications net metering is a billing mechanism that credits solar energy system owners for the electricity they add to the grid.

A Review of Opinion Extraction and Analysis

International Journal of Science , Engineering and Management, Available online 17th April 2018

S. C. Nandedkar | J. B. Patil, P. A. Joshi

Abstract

The Internet is becoming user-centric and people preferring to exchange opinions through online social means such as – discussion forums, blogs and micro-blogs. This user opinion base is a valuable resource for buyers, as well as sellers’ perspective. It is helpful for buyers to choose a good product and helpful for sellers to improve their product. This is the task known as opinion mining and analysis. This paper represents a simple approach for understanding customers review using machine learning technique. It also illustrates the steps: data gathering, preprocessing, POS tagging, dependence analysis, opinion and target word finding. It also gives the technique for measuring the performance of the above-stated system. Finally, it creates the knowledge base to fulfil the said intention.

A Review of the Optical Character Recognition Methodology in Image Processing Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Dr. T.C.Manjunath | Pavithra G , M.R. Prasad

Abstract

This review paper deals with a review of the optical character recognition using the Matlab software. OCR or optical character recognition is the process of converting scanned images of machine-printed or handwritten text (numerals, letters, and symbols) into a computer-processable format; also known as optical character recognition (OCR). A typical OCR system contains three logical components, viz., an image scanner, OCR software and hardware, and an output interface. OCR systems can largely be grouped into two categories: task-specific readers and general-purpose page readers. A task-specific reader handles only specific document types. Such as bank checks, letter mail, or credit-card slips. General-purpose page readers are designed to handle a broader range of documents such as business letters, technical writings, and newspapers. The relevant literature presented here will be of an extensive use to many of the readers who are pursuing a research in the design & development of optical character recognition systems

A Review of Ultrasound Image Segmentation

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 7th February 2018

Sreepriya P | 

Abstract

Image segmentation is one of the most critical tasks in automatic image analysis or facilitating the delineation of anatomical structures and other regions of interest. It can be defined as a process of partitioning an image into multiple segments, so as to change the representation of an image into something that is more meaningful and easier to analyze. Ultrasound images plays a crucial role because the acquisition of these images is non invasive, cheap and does not require ionizing radiations compared to other medical imaging techniques. Due to acoustic interferences and artifacts, the automatic segmentation of anatomical structures in ultrasound imagery becomes a real challenge. Thus, to enhance the capabilities of ultrasound as a qualitative tool in clinical medicine, here discusses the ultrasound image segmentation methods, focusing on techniques developed for clinical application. And also discuss the formation of ultrasound images and different methods of image segmentation. Last section explains the classification based on filters for reducing the speckle noises.

A Review of vehicle to vehicle communication using Li-Fi technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 20th January 2018

A.Karthikeyan | G.Abilesh Raja,B.Habibullah Khan,B.Jefferson

Abstract

Communication between vehicles, a small-scale mock-up using Light Fidelity (Li-Fi) technology, which still needs the more organized inquiry on its sustainability for communication between vehicles. Inter-vehicle communication is an effective method with productive results that we have used in order to communicate between two vehicles. Li-Fi technology is a wireless communication in which light is a source of transferring data by acting as a carrier signal. In Li-Fi technology, for communication between two vehicle data is transmitted using LED and at receiving end we use the photodetector to receive the data. In this technology there is no protocol used so it reduce the complexity. The aim of the paper is to design a module for communication between vehicles through voice transmission.

A Review of Virtual Machine Placement algorithm in Cloud Datacenters for Server Consolidation

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

C.Pandi Selvi | Dr.S.Sivakumar

Abstract

Cloud datacenters contain the number of servers, that there are some servers put in idle, as workload is distributed to all the active servers on the network called server virtualization. In order to minimize the number of active servers, we use server consolidation technique. The four major steps in server consolidation technique are namely hosted overload detection, host underload detection, virtual machine selection & migration and virtual machine placement. Virtual machine placement is the process of mapping physical machine to virtual machine for maximizing the resource utilization, minimizing energy consumption and maximizing the cloud profit. In this paper, an effective virtual machine placement algorithms and widely used approaches, parameters and optimization techniques to reduce the total energy consumption in data centers are analyzed

A Review on a Novel Approach for Image Segmentation Using Fast Gradient and Nontrivial Transformation

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

N.Lakshmi | K.R.Surendra, N.Pushpalatha

Abstract

A comparative analysis to fast multi label color image segmentation using Convex optimization techniques were studied. The presented model is in some ways related to the well-known MumfordShah model, but deviates in certain important aspects. The optimization problem has been designed with two goals in mind. It represent fundamental concepts of image segmentation, such as incorporation of weighted curve length and variation of intensity in the segmented regions, while allowing transformation into a convex concave saddle point problem that is computationally inexpensive. The nontrivial transformation of this model into a convexconcave saddle point problem, and the numerical treatment of the problem were studied. By applying an algorithm to various images it shows that the results are competitive in terms of quality at unprecedentedly low computation times. This algorithm allows high-quality segmentation of megapixel images in a few seconds and achieves interactive performance for low resolution images.

A Review on a Person Cross Domain Re Identification Based Adaptive Ranking Support Vector Machines (AdaRSVMs)

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

V .Hemanth Kumar | Y.Penchalaiah, Pushpalatha

Abstract

An adaptive ranking support vector machines (AdaRSVMs) method is used for re identification under target domain cameras without person labels. It addresses a new person re identification problem without label information of persons under non overlapping target cameras. Given the matched (positive) and unmatched (negative) image pairs from source domain cameras, as well as unmatched (negative) and unlabeled image pairs from target domain cameras, To overcome the problems introduced due to the absence of matched (positive) image pairs in the target domain, we relax the discriminative constraint to a necessary condition only relying on the positive mean in the target domain. To estimate the target positive mean, we make use of all the available data from source and target domains as well as constraints in person re identification. Inspired by adaptive learning methods, a new discriminative model with high confidence in target positive mean and low confidence in v target negative image pairs is developed by refining the distance model learnt from the source domain. Experimental results show that the proposed AdaRSVM outperforms existing supervised or unsupervised, learning or non-learning re identification methods without using label information in target cameras. Moreover, our method achieves better re identification performance than existing domain adaptation methods derived under equal conditional probability assumption.

A Review on Anti Spoofing For Face by Using Light Field Camera

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

T. Silpasree | N.DilipKumar, N.Pushpalatha

Abstract

The liability of face recognition systems in biometrics is a growing concern today, as still it remains vulnerable to various sophisticated attacks that undetermined the reliability of biometric systems. In this paper, we present a novel approach to accurately detect and mitigate the Spoofy attacks on the face by introducing light field camera (LFC), also known as plenoptic camera. Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it also exhibits an unique characteristic of rendering multiple depth (or focus) images in a single capture, also known as refocusing, which provides the high quality artefact face features. Introducing a novel idea of exploring the inherent characteristics of Light Field Camera to detect spoof attacks by estimating the variation of the focus between multiple depth images. To this extent, we first collect a new biometric face artefact database using LFC. We then generate the face artefacts samples by simulating three different kinds of spoof effects including photo print and electronic screen attacks. Extensive experiments carried out on the light field face artifact database have revealed the outstanding performance of the proposed anti spoofing scheme when benchmarked with various well established stateof-the-art schemes.

A review on Application of Coconut Shell in Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th February 2018

Snehal I. Randive | Shilpa V. Patil

Abstract

The rising cost of material is a matter of concern in this developing construction environment. The reason for the increase in cost is high demand and less availability of materials. The research on alternative materials which can reduce the cost of construction and on the other hand increases the strength and durability of structures is on demand, with regard to this the research on waste material such as fly ash, rice husk, slag and sludge is going on. Coconut shell is an agricultural waste which is abundant to the environment and also raises the risk to health as well as environment. From the previous research, it has been found that coconut shell ash (CSA) can increase the strength of concrete and coconut shells can be used as a replacement to the aggregate in concrete. Silica is important oxide present in coconut shell ash that can help in increasing strength of the concrete. Therefore the research in the extraction of silica from CSA as well as the use of coconut shell either in the form of reduced size or the burnt ash is going on. The present paper provides a review of the application of coconut shell in the concrete along with details of experimental work done by various researchers for investigation of the use of coconut in the construction industry. The paper describes the use of coconut shell as partial replacement to the coarse aggregate as well as use of CSA for partial replacement of cement and use of silica extracted from CSA as an admixture along with their effects on properties of concrete

A Review on Atmospheric Effects on Free Space Optical Link

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Shaik.Taj Mahaboob | A.Sree Madhuri

Abstract

Free space optics, an emerging technology which is going to revolutionize the high speed communication by providing data rates up to tens of Gbps is grabbing the attention of the researchers to employ it on an operational basis. Although the present day microwave frequency bands support a good quality communication, their speeds are low and they cannot accommodate more data in the available bandwidth as much as the free space optics can. Any communication system operating in free space is vulnerable to the atmospheric attenuation. So the atmospheric effects which degrade the performance of free space optical signal need to be studied in order to renew its standard potential even under bad climatic conditions. . In this paper we discuss some of the atmospheric effects which degrade the standard performances of a Free Space Optical Link at different geographical locations.

A review on bridging (Reducing) the SG (Semantic Gap) in CBIR and Annotation

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Tabassum Nahid Sultana | Md Abdul Haleem Bahadur, [3]Dr. Ruksar Fatima,[4]Mohammed Shakeeb Ahmed

Abstract

: this paper has tried to identify the problems in content based image retrieval technique. The key obstacle of CBIR approaches is the SG i.e., the difference between the low level features to high level concept of human perception. To extend the image retrieval process beyond low level visual descriptors to high level image semantics. Therefore researches proposed different SBIR techniques to bridge the SG using various machine learning algorithms for the extraction of semantic images to increase the accuracy of the image retrieval process.

A Review on Comparative Study of Various Rating Systems

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Dakhole Namita.G | Gadgil J.M

Abstract

Now a days building energy efficiency rating system have been developed worldwide to manage the energy consumption of existing buildings. There are various rating systems accepted in India like LEED, GRIHA and IGBC which have their various rating criteria and rating thresholds. These various certification programs are dedicated to the design sustainable buildings by incentivizing reductions in energy, water, and building materials consumption, while at the same time enhancing occupant health and overall community connectivity. The increasing population growth, demands for buildings, services and comfort, which results in an increasing energy demand. For this reason design of energy efficient buildings are the main objective of upcoming era. The rating systems mainly focuses on energy efficiency, the reduction of the use of resources, water and materials, as well as the reduction of impacts on human health and the environment during the building's lifecycle. In this research paper, various studies are discussed related to comparison of green ratings in various countries and the performance of green buildings. This shows that various rating systems emphasizes on different criteria according to their priorities whereas, criteria should be set according to the topographical and climatic conditions of particular place

A review on Data Mining Algorithms and Attributes for Decision Support Systems in Education Domain

International Journal of Engineering Research in Computer Science and Engineering, Available online 25th August 2018

Thingbaijam Lenin | 

Abstract

Educational Decision Support System has become one of the fundamental needs for any learning centers. Data mining techniques have found to be capable of providing the Decision Support System (DSS) in education domain. Conventional Data mining algorithms needs to be adapted and modified for applying the educational data. The accuracy of any data mining algorithm is also considered to be affected by the attributes selected. This study focuses on different algorithms and attributes used in developing DSS. It is found that most of the studies aimed on improving the performance academic accomplishment of the students and less research has been conducted in providing a decision support system for organizing and maintaining educational infrastructure, areas of interest of students and courses demanded. It is also found that demographic features and students’ past academic details are mainly used as attributes in this area of study. Student’s psychology, its intelligence and the way student learn have not been found to be used as attributes while considering the DSS in education domain

A Review on Dissemination Of Energy-Efficient Broadcast To Channel Randomness In Mobile Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

V.Bindu Madhavi | N.Pushpalatha

Abstract

Efficient broadcast in mobile networks is a challenging task due to high dynamic topology and energy efficiency and channel randomness. Based on an in-depth analysis of the popular Susceptible Infectious Recovered (SIR) epidemic broadcast scheme. In this paper a a study on novel energy-efficient broadcast scheme was done through dissemination process. This is able to adapt to fast changing network topology and channel randomness. Dissemination in mobile ad-hoc networks (MANETs) has to propagate a way of sore carry forward. Analytical results are provided to characterize the proposed scheme, including the fraction of nodes that can receive the information and the delay of the information dissemination process.

A Review on Drilling Process of Carbon Fiber Reinforced Plastic Laminates

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Ashwanth. B | Balaji. P,Guruprasaad. M,Suresh Kumar. M. S

Abstract

Carbon Fibre Reinforced Plastics have found wide range of application in aerospace, automobiles, sports and in energy sector due to their high strength to weight ratio. Drilling CFRP composites is a challenge as they are anisotropic materials. Over the years though lot of work has been done to address this issue there is still huge scope for improvement in drilling CFRP composites. This paper gives a literary review of drilling of CFRP composites over the years. This paper also identifies the various factors causing delamination and affecting the quality of the drill and thus provides general recommendations for the selection of process parameters of the drill for better quality of finish.

A Review on Error Correction and Object Removal for Videos Based on Inpainting with Short-Term Windows

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

K. Ushasree | I. Suneetha , Jaganath Nayak , N. Pushpalatha

Abstract

Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle these challenges, a computationally-efficient algorithm that separately inpaint foreground objects and background is proposed. Using Dynamic Programming, foreground objects are holistically inpainted with object templates that minimize a sliding-window dissimilarity cost function. Static background are inpainted by adaptive background replacement and image inpainting.In this propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

A Review on Error Correction and Object Removal for Videos Based on Inpainting with Short-Term Windows

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

K. Ushasree | I. Suneetha , N. Pushpalatha

Abstract

Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle these challenges, a computationally-efficient algorithm that separately inpaint foreground objects and background is proposed. Using Dynamic Programming, foreground objects are holistically inpainted with object templates that minimize a sliding-window dissimilarity cost function. Static background are inpainted by adaptive background replacement and image inpainting.In this propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

A Review on Graphene Based Supercapacitors

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Omkar Ganesh Bhegade | Himkedar Jadhav, Prof.M.Mahajan,Prof.D.Shastri ,Dr.N.Patil

Abstract

This paper looks at the research that is being carried out on use of Graphene as an electrode material for supercapacitors which may be the replacement for the lithium ion batters in future. It also discuss about the scope of graphene based supercapacitors in various fields. Science and technology have been advancing rapidly over the last few decades; storing the energy has always been a problem. The problem faced by conventional energy storage system is that a battery can potentially hold a lot of energy, but it can take a long time to charge and a capacitor, on the other hand, can be charged very quickly, but cant hold that much energy comparatively. The solution emerged was the supercapacitor that is able to provide both of these positive characteristics without compromise. Currently, research is being carried out on enhancing the capabilities supercapacitor and Graphene is proving itself to be the best electrode material for it. Graphene is a nanomaterial of 2D flat monolayer carbon (bonded in hexagonal lattice). Graphene is a parent of all carbon allotropes with versatile properties

A Review on Image Enhancement Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th April 2018

S.Deepa | K.Krishnaveni

Abstract

The quality of an image is mostly affected due to weather, lighting or equipment that has been used for image capture. Image enhancement is the process of adjusting or enhancing the digital images by altering its structural features like contrast and resolution so that the results are more suitable for display or further image analysis. The enhancement process includes removal of noise, sharpen or brighten the image and making it clearer to identify the key features. In this paper, Image Enhancement techniques such as Point processing and Histogram Equalization techniques are reviewed and discussed. Point processing operations contain image negative, contrast stretching, thresholding transformation, gray level slicing, logarithmic transformation and power-law transformation. Under Histogram Equalization, Contrast Limited Adaptive Histogram Equalization (CLAHE), Equal Area Dualistic Sub-Image Histogram Equalization (DSIHE), Dynamic Histogram Equalization (DHE) Algorithms are reviewed. The concepts of all these techniques are discussed, compared and their performances are evaluated based on the parameters Absolute Mean Brightness Error (AMBE), Contrast and Peak-Signal-to-Noise-Ratio (PSNR) values

A Review on Image Forgery Detection Techniques on Passive attacks

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th March 2018

Jitesh Kumar Bhatia | Anand Singh Jalal

Abstract

In the today’s era, nearly all of us rely on the images of the memories of our lives and loved ones. The images are useful in proving anything in the court of law by showing them as an evidence of the event, getting insurance of a mishappening, getting appreciation, or for conveying personal lifestyle to their friends through social media. However, various Image editing tools like Adobe Photoshop, Picasa, and Lightroom, etc. can produce forged images, thus changing the perspective of the viewer about the event. Image Forgery has become much prominent nowadays and is being done either for fun or for an intention. Many researchers have worked in finding techniques that can classify the forged and authentic images. This objective of this paper is to provide a glimpse of work done so far in the field of Image Forgery detection.In the today’s era, nearly all of us rely on the images of the memories of our lives and loved ones. The images are useful in proving anything in the court of law by showing them as an evidence of the event, getting insurance of a mishappening, getting appreciation, or for conveying personal lifestyle to their friends through social media. However, various Image editing tools like Adobe Photoshop, Picasa, and Lightroom, etc. can produce forged images, thus changing the perspective of the viewer about the event. Image Forgery has become much prominent nowadays and is being done either for fun or for an intention. Many researchers have worked in finding techniques that can classify the forged and authentic images. This objective of this paper is to provide a glimpse of work done so far in the field of Image Forgery detection.

A Review on IOT Based Smart Home

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Prof.Kavita S. Patil  | Priyanka Tile , Prajakta Somvanshi

Abstract

A number of internet users is increasing day by day. Now days there are many ways to communicate but most of the communication is done through the internet. With increase in digital devices in home there is needed to access and control the appliances from remote locations. IOT is one of the fast rising internet technologies which provides communication between the things without human interface and allows the user to access devices from remote location.

A Review on Load Flow Analysis of Ring Main System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st March 2018

Abhilash D. Pisey | Nandkumar Wagh, Rakesh Shriwastava

Abstract

Load flow analysis of the complex power system is very much essential for operation, planning and sharing of power to the electrical power utilities and power engineers. In an interconnected Ring mains system, the bus voltages and complex power comprising of active and reactive components have to be assessed. Various methods are available to evaluate the system under normal and abnormal conditions. In this paper, a review of various methods available and the recent advancements in the techniques of load flow analysis has been made and presented. In particular iterative methods has been proposed to be applied to 132 KV Nagpur Ring Main System with the data of seven bus system. The overview of the performance of the said system to be tested in MATLAB Simulink environment for all the proposed methods of load flow in normal and abnormal conditions shall be presented in further work.

A Review on Load Positioning Application of Shape Memory Alloy

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 9th June 2017

Namitha S N | Praveen Kumar Konda,Ashwin Kumar, Sachin C N Shetty

Abstract

Shape Memory Alloy (SMA) is a special material, which have the ability to return to its original shape when it is heated. SMA is different from other materials due to its two unique properties- Shape Memory Effect (SME) and Superelasticity. When there is a limitation of shape recovery, these alloys promote high restitution forces. Because of these properties, there is a great technological interest in the use of SMA for different applications[6]. This paper focuses on the brief review on applications of SMA in different fields. They have applications in aircraft and spacecraft, civil structures, robotics, automotive, telecommunication, piping, medicine, optometry etc.

A Review on Mechanical Characterization Using Rice Husk Ash in Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd August 2017

Shridharmurthy H N | Karan Singh M, Manjesh Kumar M P,Darshan M,Harshith N Gowda

Abstract

The main objective is to study the mechanical properties of a high strength concrete by using Rice Husk Ash (RHA) instead of different replacement in levels of an Ordinary Portland Cement (OPC). The standard cylinders (300mm height x 150mm dia), prisms (100mm X 100mm X500mm) and cubes (150mm X 150mm X 150mm) were casted. In all specimens having M50 and M40 grade mix are casted and tested. The comparison is done between the RHA of both grades with high strength concrete of various amount replacement of the cement viz i.e, 15%, 10% ,5%, 0% and along with high strength concrete without RHA. The compressive test is done for various number of days. A interesting and quite encouraging results are obtained of mechanical properties of RHA for a particular number of days. By increasing the Rice Husk Ash fineness, enhanced strength of the blended concrete are compared to coarser Rice Husk Ash and control OPC mixture. Increase in water demand in concrete by incorporation of the Rice Husk Ash. Up to 20% of cement can be replaced by RHA without adversely affecting in the strength and it shows excellent improvement in the strength.

A Review on Medicinal Importance and Synthesis of benzothiazolo-[2, 3b]-quinazolin-1-one Derivatives via Multi-Component Reactions

International Journal of Science , Engineering and Management, Available online 13th April 2018

Satish A. Dake | Ashok R. Yadav, Changdev V. Mane, Jyoti M. Weldode, Rajendra P. Pawar

Abstract

Synthesis of benzothiazolo-[2, 3b]-quinazolin-1-ones and their derivatives offered important biological and pharmaceutical applications in Chemistry research field. Multi-component reactions in recent days gained a new aspect in designing methods to produce sophisticated libraries of biologically active heterocyclic compounds. Green Chemistry has become a powerful tool in Chemistry in the last decade and recent areas of interest are the production of organic bioactive molecules via MCRs with an environmentally friendly solvent system such as water, ionic liquids etc. Multi-component methodologies contribute remarkable advantages over conventional reactions due to maintaining their atom economy, convergence, easy work-up procedure, structural multiplicity and short reaction time. The present review expresses various synthetic methods and medicinal importance of benzothiazolo-[2,3b]-quinazolin-1-ones and their derivatives.

A Review on Protection of Compensated Power Transmission Line

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 1st September 2017

Ashok Manori | Manoj Tripathy, Hari Om Gupta

Abstract

This paper presents a survey of present and past developments in the field of protection of transmission lines having FACTS devices and also suggests the best suitable solutions for the problems. In present time extra high voltage transmission lines are used to transmit large amount of power over a wide interconnected power network. Transmission lines are capable of transmitting electric power up-to its thermal limit. To utilize the full capacity of transmission line for transmission of electric power over a power network, flexible alternating current transmission systems (FACTS) are installed in the transmission line at different locations. Presence of FACTS systems changes the transmission parameters and hence adversely affects the transmission line protection system by creating problems viz. reaching problem, zone setting, inversion (voltage and current) and resonance issues. Therefore, there is a great need to identify the wider impact of different FACTS devices on the existing protection system and simultaneously the remedies of the problems.

A Review on RAM (Reliability, Availability, and Maintainability) Analysis, its Applications and its Incorporation in the Modern World

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Shantanu Kaushik | Piyush Singhal

Abstract

This review paper focuses on the significance of RAM (Reliability, Availability, and Maintainability) analysis in all fields and it also tries to explain its existence in the modern world. The three factors reliability, availability, and maintainability together helps to manage a system effectively if all three are taken good care of separately and their combined effects and profits are evaluated with respect to system requirements, overall functioning and productivity in the long run. Therefore, RAM analysis is of great importance nowadays to effectively coordinate all the functions without any unexpected system failure. This paper also outlines the applications of RAM analysis being used in various fields and how it has been incorporated successfully in all these fields.

A Review On SCARA Manipulator For Various Applications

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th July 2017

Dr.PVS Subhashini | L Sai Sandeep,E Karnuakar, Dr.NVS Raju

Abstract

Selective Compliance articulated robot arm (SCARA) is an accepted robotic manipulator for industrial applications. Earlier SCARA manipulator was used exclusively for assembly purposes like printed circuit board, pick and place etc. But at present research on SCARA widens in the areas of production operations and for medical applications.The present paper will be a review on SCARA manipulator for various applications which includes literature on SCARA kinematics, dynamics and applications. This paper presents kinematics and dynamics of a SCARA robot using techniques like modeling, mathematical etc. In the literature most of the authors used packages like solid works, NX, MATLAB, ANSYS for analyses purpose. Overall this paper presents literature for the SCARA manipulator to a greater extent.

A Review on Software-Defined Wireless Sensor Networks (SDWSN) and its Challenges

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 11th June 2018

Tanuja Zende | 

Abstract

Software Defined Networking brings about innovation, configuration in network computing and simplicity in network management. SDN technology is an enormous approach to cloud computing which facilitates network management and enables efficient network configuration programmatically that improves network performance and monitoring. WSN consist of nodes that interact with the environment to achieve the sensing task thereby sensing the physical parameters such as temperature, pressure, volume etc and also help control them. These nodes can perform computation, sensing, actuation and wireless communication functions, particularly with the advent of Internet of Things (IoT)that is essential for monitoring several objects in applications such as smart cities, smart water networks, smart health care, smart power grids, smart farming and intelligent transport systems etc WSNs are continuously becoming important .Traditional networks often lack flexibility that brings into effect instant changes because of the rigidity of the network. It also depicts over dependency on proprietary services. SDN separates the control plane and the data plane, therefore moving the control logic to a central controller from the node. WSN is a very good platform for Low-Rate Wireless Personal Area Networks (LR-WPAN) with minimum resources and short communication ranges. Although the scale of WSN expands it faces many challenges, namely heterogeneous-node networks and network management. The approach of SDN seeks to alleviate most of the challenges and hence foster sustainability and efficiency in WSNs. The combination of SDN and WSN gives rise to a new prototype named as Software Defined Wireless Sensor Networks (SDWSN). The SDWSN model is therefore envisioned to play a vital role in the IoT paradigm. This paper presents a review of the SDWSN literature. Also it takes care of the challenges facing this paradigm

A Review on Spatial Pattern Methods for BrainComputer Interface

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

B. Bijitha | Nandakumar P

Abstract

Brain-computer interface technology is the one in which the users mental intentions are captured and used as control signals for external devices. BCI researches are becoming more popular as it can be used as a means of communication for people with severe disability. The efficiency of a BCI system depends on its signal processing stages. The signal processing stages include the signal acquisition, feature extraction and classification. In this paper, a brief review of one of the feature extraction methods called spatial pattern algorithms for BCI is provided.

A Review on Spectrum Efficient OFDM Based on Structured Compressed Sensing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Sreelakshmi V | Nandakumar P

Abstract

Spectrum efficiency is becoming increasingly important for wireless communication systems in order to avoid the congestion of users for the spectrum. OFDM has already been extensively adopted by numerous wireless communication systems like DVB-T, WiMAX, LTE, WiFi, etc, and it is also widely recognized as a prominent modulation technique for future wireless communication systems. Thus, developing spectrum efficient OFDM scheme is essential to achieve high transmission efficiency. Time domain synchronous OFDM (TDS-OFDM) has a higher spectrum efficiency than standard cyclic prefix OFDM (CP-OFDM) by replacing the unknown CP with a known pseudorandom noise (PN) sequence. Currently, TDS-OFDM can support constellations up to 64QAM, but cannot support higher-order constellations like 256QAM due to the residual mutual interferences between the pseudorandom noise (PN) guard interval and the OFDM data block. To solve this problem, break the iterative interference cancellation and propose a new idea of using multiple inter-block-interference (IBI)-free regions of very small size to realize simultaneous multi-channel reconstruction under the framework of structured compressive sensing.

A Review on Spectrum Sliced Elastic Optical Path Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Triveni C L | P C Srikanth , T Srinivas

Abstract

Recent developments in the area of technologies, data center networks, cloud computing and social networks have caused the growth of a wide range of network applications. The data rate of these applications also varies from a few megabits/second (Mbps) to several gigabits/second (Gbps) for that reason increasing the burden on the internet. Best solution for this is to utilize the advancement in optical networks. In WDM network bandwidth up to 100Gbps can be utilized from the optical fiber in an energy efficient manner but its not efficient when traffic demands vary frequently. Spectrum sliced elastic optical path networks (SLICE) has been proposed as a long term solution to handle the ever increasing data traffic and the diverse demand range. SLICEs provide abundant bandwidth by enabling sub-wavelength, super-wavelength and multiple-rate data traffic accommodation in highly spectrum efficient manner.

A review on the biomass energy resources and conversion technology in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 5th July 2017

Amit Kumar | Dr. Rajakumar D.G

Abstract

Sustainable economic development is closely linked with the energy availability. The demand for energy continues to increase steadily from last several decades, due to rapid industrialization and globalization. Most of the world’s commercial energy needs are met by fossil fuels coupled with negative environmental effects. The burning of the fossil fuels is a big contributor for increasing the level of CO2 in the atmosphere. To combat global warming and other environmental problems associated with these fossil fuels many countries, including India, are increasingly adopting renewable energy sources. Such energy sources generally depend on energy flows through the earth’s ecosystem from the insolation of the sun and the geothermal energy of the earth. India is moving toward a trend of generating electricity from renewable resources such as Solar, Wind, Biomass, etc. The total installed capacity for electricity generation in India is 310 GW as on 31st December 2016 in that Renewable power plant contributes 88.96 GW (28.69%) in particular biomass contributes 4.99 GW (1.61%). In view of this, present study has made an attempt to have a brief review on various categories of biomass and its resources available in the Indian context and its wide range of applications based on the process of conversion methods or technologies used. Study also brings various possibilities of using different biomasses and their suitability in the context of energy resource.

A Review Paper on Application of Solar System in the Field of Agriculture

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Prof. C.W. Jadho | Shradhha Makade , Shubhangi Nagapure , Vaishnavi Welpulwar

Abstract

India is the country of villages. This being said the major occupation of majority of villages in India is farming. There also have been changes in agricultural technology and practices with recent advancements in engineering and technology. Seed sowing is the basic operations needed to get better revenue from agriculture. Manual sowing should not give adequate spacing between row to row. Manual sowing is very time consuming process and costly. Hence, it is a necessary for appropriate seed drill for sowing seed. Indian farmer perform agriculture mostly with manual operation. The pain involved in doing each and every manual operation related to agriculture. Thus this project deals with design and fabrication of a smart seed sowing machine for Indian farmers. This Paper deals with the various sowing methods used in India for seed sowing . The comparison between the traditional sowing method and the new proposed machine which can perform a number of simultaneous operations and has number of advantages. As day by day the labor availability becomes the great concern for the farmers and labor cost is more, this machine reduces the efforts and total cost of sowing the seeds.

A Review Paper on “Experimental Studies and Performance Evaluation of Hard Turning Operation by Using Pcbn Tools"

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th April 2018

Sanket S Satpute | Mangesh D Urney

Abstract

The Quality of each and every hard turned part mainly depends on mechanical properties of the tool material and workpiece material, In this research work the Multi-objective study of hard turning process parameters for obtaining greater hard turned material strength with good mechanical properties. The tool used for this study is PCBN tool and which is used on an EN8D workpiece. This EN8D material is widely used commercially for both continuous and interrupted machining modes which help us to study the parameters such as tool life, tool wear, tensile strength, depth of cut, microgeometry, turning speed, Angle of cutting etc.

A Review Paper On “Multiobjective Optimization Of Process Parameters In Shielded Metal Arc Welding For Joining Stainless Steel 304l And Mild Steel 1018

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th April 2018

Abhiram M Budrukkar | Umesh S. Patil

Abstract

The Quality of weld mainly depends on mechanical properties of the weld metal and heat affected zone (HAZ), In this research work the review of Multiobjective optimization of welding process parameters for obtaining greater weld strength with good mechanical properties of dissimilar metals like stainless steel 304l and Mild steel 1018 is done. The process used for welding is shielded Metal Arc welding and dissimilar metal used are stainless steel 304l and mild steel 1018. Welding speed, voltage, current, electrode angle, feed rate, Arc length are taken as controlling variables. The weld strength (N/mm2) and Bead geometry variables and Heat Affected Zone are obtained through set of experiment. Based on the previous research, the possible best outcomes and best method has been chosen.

A Review Paper on Biodiesel

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Akshaykumar R. Chavan | Akshay L. Karvekar,Tanuja S. Adasul,Akash A. Zambre, Suyog S. Patil

Abstract

Now days increases the demand of petroleum products because of increasing industrialization and uses of automobile. Due to this increases the rate of petroleum products. The fossil fuels quantity is limited on the earth. So it is necessary to find out an alternative fuel. There are many researchers are doing their research on alternative fuel and they are developed an alternative fuel i.e. Biodiesel. Biodiesel is produced from transesterification and esterification process. For production of biodiesel various raw materials are used such as Vegetable oils, Animal fats and Short chain alcohols. Also various crops are used for biodiesel production such as Jatropha, Undi, Castor, Karnja, Soya bean, Sunflower, Palm, Corn, Jojoba, Cotton, Moha etc. Biodiesel is prepared from renewable resources, so it having less emission than petroleum products.

A Review paper on Catalytic Converter for Automotive Exhaust Emission

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

N.Karthik Kumaran | A.Balaji,S.Manonmani,R.Mohan kumar

Abstract

The purpose of this paper is to present Air pollution caused from mobile springs is a tricky of universal curiosity. Vehicle population is probable to grow close to 1300 million by the year 2030. Due to inadequate combustion in the engine, there are a number of incomplete combustion products CO, HC, NOx, particulate matters etc. These pollutants have harmful impact on air quality, environment and human health that hints in rigorous norms of pollutant emission. Numbers of alternative technologies like upgrading in engine design, fuel pre-treatment, use of alternative fuels, fuel additives, exhaust treatment or better tuning of the combustion process etc. are being considered to reduce the emission levels of the engine. Among all the types of machineries developed so far, use of catalytic converters based on platinum (noble) group metal is the best way to control automotive exhaust emissions. This evaluation paper discusses automotive exhaust emissions and its impact, automotive exhaust emanation control by platinum (noble) group metal based catalyst in catalytic converter, history of catalytic convertor, types of catalytic convertor, restriction of catalytic convertor and also triumphs of catalytic convertor.

A Review Paper on Content Based Image Retrieval Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 18th July 2018

Ankita Gajanan Tandale | N. M. Kandoi

Abstract

Content-based image retrieval (CBIR) is a technique used for retrieving similar images from the large collection of image database. CBIR basically responsible for extracting features of images. A ‘feature’ means anything that is localized, meaningful and detectable. Almost all the CBIR techniques start from the query by example i.e. one image. The system first extracts the feature of the query image, searches the database for images with similar features, and exhibits relevant images to the user in order of similarity to the query. In this, the content of the image is nothing but the features of the image like color, texture and shape etc. This paper presents review of different CBIR techniques which are helpful for finding relevant images for the query image

A Review Paper on Facial Expression Recognition: Atlas Construction and Sparse Representation

International Journal of Science , Engineering and Management, Available online 19th April 2018

Ashwini S. Sugave | Ashwini Gaikwad

Abstract

The human face can exhibit complex and strong changes that are both unpredictable and varying in time. Nowadays, facial expression recognition has become a emerging and research topic due to advancement in this field. In this paper , we study about many facial expression techniques, but these two techniques are most utilized for facial expression recognition. In existing method atlases are constructed using conventional group-wise registration method due to which lot of subtle and important information lost. To overcome this limitation sparse based atlas construction method and Spatio-temporal information are represented for better performance in recognition process. This paper presents a quick survey of facial expression recognition.

A Review Paper on Guidance Navigation and Obstacle Avoidance for Wheeled Mobile Robot Using Lab VIEW

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th April 2018

Priyanka Bhanudas Aghadate | Aarti Wadhekar

Abstract

This project represents the system to navigate the vehicle with an ultrasonic sensor and National Instrument myRIO real-time controller. The previously developed navigation system was developed using MATLAB based model running on a minicomputer that interface with encoders and motors through specialty control board. This embedded hardware device use for real-time implementation performing the task like detecting obstacle distance using the sensor. LabVIEW is graphical programming code was specially developed to control motor with PWM signal based on sensor feedback and to calculate algorithms perfectly. It has a wide range of applications areas which comprises Agricultural monitoring, Military applications. Based on this the LabVIEW and the myRIO solution is found to be user-friendly and very effective for the purpose of real-time implementation of GNC algorithm. This project also develops efficiency in navigation

A Review Paper on Investigation into the Effect of Pounding on High Rise Structure

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st March 2018

Bhagyashri Thele | Dr.Valsson Varghese

Abstract

It has been widely seen that when an earthquake occurs it causes large and intense shaking of the ground. So the building or the structure of any shape, size or of any height will experience the motion at its base. The level of damage caused by an earthquake on a structure depends on the intensity of release of strain energy and the duration of shaking. The amplitudes are largest with respect to the large earthquake and the duration of shaking generally increases with the size of an earthquake. When two adjacent building vibrates out of phase the collision occurs due to the insufficient separation or gap this phenomenon is known as pounding of the building. This paper includes the study of pounding between adjacent buildings with same or different properties. Lump mass system is considered using MDOF system. In this time history analysis is carried out using past earthquake of Imperial Valley

A Review Paper on the Most Trending Technology: “ Big Data & it’s Processing using Hadoop ”

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd September 2017

Harshini Tanuku | Keerthi Bangari

Abstract

Big data is defined as a collection of big and complex data sets that have gigantic amount of data, that encompass social media data analytics, data management efficiency and real-time data. Big data analytics is termed as the process in which huge amounts of data are studied for further processing and industrial usage. Big data is processed using a technology known as “Hadoop” that uses the MapReduce paradigm for processing the huge datasets

A Review: IOT Smart Vehicle

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Thoshif Khan | Aakash Luckshetty , Md.Tauseef

Abstract

The Internet of Things (IOT) is the system of physical objectsgadgets, vehicles, structures and different things inserted with hardware, programming, sensors, and system availability that empowers these items to gather and trade data. The IOT permits objects to be detected and controlled remotely crosswise over existing system infrastructure making open doors for more straightforward combination of the physical world into PC based frameworks, and bringing about enhanced proficiency, exactness and financial advantage. Smart vehicle is one of the applications of IOT which is generally used for the comfort, safety, security and privacy of the drivers. From the past decades, there has been reported several cases which are related to vehicle theft due to this vehicle security has been burning topic all over the world to overcome the challenges related to the vehicle security, We provide a complete survey in IOT smart vehicle. This paper also describes vehicle detection tracking and monitoring using IOT application.

A Revocable Two Factor Data Security Model for Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th January 2018

Padakanti Sabitha | V.Sridhar Reddy

Abstract

Since data in cloud will be placed anywhere, because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing. This requirement imposes clear data management choices: original plain data must be accessible only by trusted parties that do not include cloud providers, intermediaries, and Internet; in any untrusted context, data must be encrypted. Satisfying these goals has different levels of complexity depending on the type of cloud service. This system proposed an improve data security protection mechanism for cloud using two components. In this system sender sends an encrypted message to a receiver with the help of cloud system. The sender requires to know identity of receiver but no need of other information such as certificate or public key. To decrypt the cipher text, receiver needs two parts. The first thing is a unique personal security device or some hardware device connected to the computer system. Second one is private key or secrete key stored in the computer. Without having these two things cipher text never decrypted. The import ant thing is the security device lost or stolen, then cipher text cannot be decrypted and hardware device is revoked or cancelled to decrypt cipher text.

A Robust Encryption and Searching System to Share Confidential Data onto the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Thejas S | Dr. G. Raghavendra Rao

Abstract

as cloud computing provides storing and sharing records via a cloud service because of on demand resource access and elasticity. For secure record sharing requires encryption of records before outsourcing. Key management system is one of the important aspects of the system. For sharing large number of documents, each record needs to be encrypted using different keys. Since to decrypt these records requires all keys which is very different task. Hence this approach uses aggregated key system, which aggregates all the keys. Later at the time of decryption of all records it requires one aggregated key. Considering large number of records in the cloud. For the efficient access of these records, it is necessary to search for the records over encrypted file. For this purpose , required to build for the index file. Multi keyword entries searches for the relevance record by matching keywords with the index file

A Robust Fusion of DWT and PCA for Video Watermarking using Optimization Technique

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Anjaneyulu Sake | Ramashri Tirumala

Abstract

Watermarking is a component of inserting data into the multimedia, for example, image, audio or video. This paper propose for Fusion based video watermarking using hybrid technique to protect the copy right of images. In order to improve the efficiency of video watermarking two main processes are used namely watermark embedding process and watermark extraction process. Before embedding process the input video sequence convert into number of frames. Here Principal Component Analysisand Discrete Wavelet Transform is applied in watermark image. The swam optimization algorithm is proposed for generating random frame selection for the embedding process. The result obtain from the watermark embedding process is the watermark video sequence. Next watermark extraction process is carried out. It is the reverse process of watermark embedding. In watermark extraction process, it extracts the watermark image from the watermark video sequence. The experimental results show that this combine technique gives double security for the protection of video content and achieves good PSNR and NC.

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th January 2018

Dasari Madhavi | V.Sridhar Reddy, N. Srinivas

Abstract

In view of extending omnipresence of dispersed registering, a consistently expanding number of data proprietors are energized to outsource their data to cloud servers for uncommon solace and reduced cost in data organization. Regardless, fragile data should be encoded before outsourcing for security [1] necessities, which obsoletes data utilization like watchword based record recuperation. In this paper, I present an ensured multi-catchphrase situated look scheme over mixed cloud data, which at same time reinforces dynamic revive operations like cancelation and incorporation of reports. Specifically, vector space appear and for most part used TF_IDF show are participated in document advancement and request age. I assemble an exceptional tree-based record structure and propose an "Unquenchable Depth-first Search" count to give gainful multi-watchword situated look. The ensured kNN computation is utilized to scramble the document and question vectors, and meanwhile ensure correct substance attain figuring between encoded record and request vectors. Remembering ultimate objective to restrict quantifiable strikes, apparition terms are added to rundown vector for blinding inquiry things. In view of usage of our outstanding tree-based rundown structure, the proposed plan can achieve sub-straight request time and deal with cancelation and incorporation of proceedings of adaptably. Expansive tests are coordinated to demonstrate the efficiency of proposed plot

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th March 2018

P.Rasagna | Rafia Tamkeen, T.Srikanth, Syed Abdul Moeed

Abstract

Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TF_IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between the encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd May 2018

Y.Kalyani | N.Yedukondalu, Sk.Alma, T.Sujitha, S.Sindhu Priya

Abstract

Affording secure and economical massive knowledge aggregation ways is incredibly enticing within the field of wireless device networks (WSNs) analysis. In real settings, the WSNs are broadly speaking applied, comparable to target pursuit and atmosphere remote watching. However, knowledge will be simply compromised by a colossal of attacks, comparable to knowledge interception and knowledge meddling, etc. during this paper, we have a tendency to principally concentrate on knowledge integrity protection, provide Associate in Nursing identity-based mixture signature (IBAS) theme with a chosen booster for WSNs According to the advantage of mixture signatures,our theme not solely will keep knowledge integrity, however can also scale back information measure and storage value for WSNs. what is more, the protection of our IBAS theme is strictly bestowed supported the procedure Diffie–Hellman assumption in random oracle model.

A Secure Deduplication Mechanism for Sensitive Data in Public Cloud Storage

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Deepa P.B | Dr.Rudramurthy M.S

Abstract

nowadays, cloud-based services are gaining more importance in leveraging services for large scale storage and distribution. These provide cost effectiveness, time saving and efficient utilization of computing resources. Many enterprises have decided to envision a staged migration for their data to public cloud, for better management of backup data. As data progressively grows, the cloud storage systems continuously face challenges in saving storage capacity. Data Deduplication gives solution to such challenges. It is a data compression technique for eliminating the redundant data. Assuming that cloud service provider may not be trustworthy (i.e. is honest but curious). The security, bandwidth and latency are of top concerns for an enterprise to store sensitive data in the public cloud storage. Considering these security challenges, we propose and implement a client side deduplication scheme for securely storing enterprise sensitive data via the pubic cloud. Efficiently and reliably managing the huge number of convergent keys by the user is a critical issue. Hence we have built a system where each convergent key is secured and the same is outsourced to the cloud. To avoid the weakness of convergent encryption, double encryption is done. By following this method, we can save storage space and cost. It also reduces bandwidth and ensures better confidentiality towards unauthorized users.

A Secure Parallel Network File System using Protocols

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Digambar Waghole | Jabbar Tamboli, Shrutika Chintal , Supriya Vinode , VaishaliShinde

Abstract

We examine the issue of key foundation for secure numerous correspondences. The issue is enlivened by the multiplication of huge scale dispersed file frameworks supporting parallel access to numerous capacity gadgets. Our work concentrates on the present Internet standard for such file frameworks, i.e. parallel Network File System (pNFS), which makes utilization of Kerberos to establishparallelsessionkeys between clientsandstoragedevices. Our survey of the current Kerberos-based convention demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the stockpiling gadgets has overwhelming workload that confines the adaptability of the convention; (ii) the convention does not give forward mystery; (iii) the metadata server creates itself all the session keys that are utilized between the customers and capacity gadgets, and this naturally prompts key escrow. In this paper, we propose a mixed bag of confirmed key trade conventions that are intended to address the above issues. We demonstrate that our conventions are fit for decreasing up to give or take 54% of the workload of the metadata server and simultaneously supporting forward mystery and escrow-freeness.

A Secured Cryptographic Technique for Protecting Online data in the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th April 2018

Ashish Ladda | Sandhya Mekala

Abstract

Cloud computing may be an in style space of analysis for inventors. And it's important in information sharing applications. On cloud the info being shared should be secure. The pliability and therefore the potency of the info is rely upon the protection parameter. To attain purpose we tend to outline new algorithms that is rely upon public key cryptography and outline constant size cipher text by exploitation these key we are able to decode cipher text. The opposite encrypted files except this cipher stay personal. The survey depicts some encoding schemes introduced during this information privacy for firmly and economical sharing of confidential information over a secure channel. Recently analysis concentrate on aggregation of keys of the keys in signal aggregation key that is assistance on load of network information sharing being vital practicality in cloud storage implement show to firmly, expeditiously, and flexibly share information with others.

A Secured Public key Exchange Technique for Elliptic Curve Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

A.Vithya Vijayalakshmi | A. Dalvin Vinoth Kumar, Er. Karthigai Priya Govindrajan, Dr. L. Arockiam

Abstract

Security is the most important factor in Internet of Things (IoT). The public key cryptography systems like RSA, DSA are not suitable for IoT Devices because of the key size and energy consumption. ECC cryptography system is more suitable for IoT lightweight devices. ECC provides same level of security as like RSA with small key size and less energy computation. Key exchange is challengeable task due to Routing transmission attacks like DoS attack. The proposed technique is to enhance key exchange system in ECC based security protocols. The public key is encrypted before shared into network. The path selection algorithm is used to choose two different paths. One is for encrypted public key sharing and another is for unlock-key for encrypted public key sharing. The possibility of attacks during key sharing is investigated; the key size and energy consumption is compared. This technique is suitable for Tmote Sky and MICAz nodes

A Secured Remote Health Monitoring System Based on IoT

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 17th August 2017

Priya.R | A. Pravin Renold

Abstract

The Personal Healthcare Devices (PHDs) measure vital signals of patient. The advantages of PHDs are: (1) wearable (2) Support diseased people (3) Continuous monitoring of health and precaution leads to increased lifetime. Due to the advent of different communication standards such as low power Bluetooth, zigbee, and Internet of Things, the PHDs could be connected to caretakers or doctors and provide proper advice or medication. This project deals with designing a firmware for PHDs, which is interoperable and secure.The advantages of the proposed system are: i. Low cost PHDs could be designed compatible for the firmware ii. Ensures privacy iii. Improves patient care There exists a challenge in terms of maintaining privacy of patient’s data when connecting PHDs to the network. .In this work, we integrate PHDs with internet for sharing health data using Constrained Application Protocol (CoAP) and AES algorithm for Security purpose. CoAP is based on the Representational State Transfer (REST) model and can be considered a real enabler for Internet of Things (IoT). IoT is characterized by an interconnected set of individually addressed and constrained devices in a distributed system, with sensing/active devices for physical phenomena, data collection, and applications using sensing, computation and actuation.

A Serve on Multi-keyword Based Search and Privacy Preservation of Distributed Document in the Network

International Journal of Science , Engineering and Management, Available online 18th April 2018

Dipeeka P. Radke | Shweta Warhadkar, Unnati Kedare

Abstract

In information networks, owners can store their documents over distributed multiple servers. It facilitating user to store and access their data in and from multiple servers by sitting anywhere and on any device. It is a very challenging task to provide efficient search on distributed document also provide the privacy on owner’s document. The existing system provides one possible solution that is privacy preserving indexing(PPI). In this system, documents are distributed over multiple private servers which are collectively controlled by cloud/public server. When the user wants some documents, their query to the public cloud, which then returns the candidate list that is private server list to the user. After getting the list, the user can search the document on a specific private server but in this system, documents are stored in plain text form on the private server that is privacy is compromised. But proposed system enhanced this existing system to make it more secure and efficient. First documents are stored in encrypted form on the private server and then use key distribution centre (KDC) for allowing decryption of data received from the private server, at the client side. The proposed system also implements TF-IDF, which provides the ranking results to users.

A Simple Authentication Protocol for Secure Data Collection in Wireless Sensor Network

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Triveni Mane | Raveendra.G

Abstract

For numerous applications large scale sensor network are used and data have been collected are used in process of making decision. Information that are from different origins over intervening nodes that collects information packets. A intervening malicious nodes may introduced by the attacker in the network and or disturbs present nodes. Therefore for making correct decision it is very difficult to providing high data trustworthiness. To find the trustworthiness of sensor data a key factor is represented by data provenance. In sensor network provenance management introduces various challenges like limited bandwidth and energy consumption, efficiency storage and secure transference. This paper prefers a light weight mechanism for securely sending of provenance for sensor input information. To encode provenance the suggested scheme depends on in-packet bloom filter. Here we used this efficient mechanism for verification of provenance and reconstruction of data at base station.

A Simulink Model of PV Array using P&O Technique for Maximizing the Power

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 28th March 2018

Prakash Kumar Mahto | Nimish Kumar, Rohit Kumar, Sarbesh Bhattacherjee, Nitai Pal

Abstract

The following paper is based on simulation of Perturb and Observe (P&O) technique to find the maximum power point of a photovoltaic (PV) cell. The maximum power point tracking algorithm is based on changing either voltage or current. The algorithm works so that the operating point works at maximum power output. The system is designed for the 2KW resistive load with the boost converter to get the desired dc output voltage. The filters are used to minimize the ripple at dc side. Standard test condition for irradiance and temperature is considered which is 1000 W/m2 and 25o C.

A Single Stage Inverter for Photovoltaic Application

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Nitha Bosi P.T. | 

Abstract

Renewable energy technologies offers clean, abundant energy gathered from self renewing resources such as sun, wind etc. As power demand increases, power failure also increases. So, renewable energy source can be used to provide constant loads. But the voltage range of photovoltaic cell is influenced by several environmental factors and it varies in wide range. So the inverter system must operate in both buck and boost modes. This paper presents a single stage buck boost inverter topology. The voltage boosting is done with the help of ac-ac unit composed of active switches. Thus reducing the passive elements and this increases the efficiency of the system. Operational analyses in both modes are presented. MATLAB simulink model is developed. Experimental results are presented to verify the operation.

A Smart Automatic Mains Failure Panel with Diesel Generator Control and Wi-Fi

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Abhijith Mohanan. N | Kiranlal. C, Anju, G.R, Krupa Mariam, Jacob, Sharmila

Abstract

This paper focuses on the development of a smart Auto Mains Failure (AMF) panel meant for day to day electrical applications. AMF panel is unavoidable in industries, hospitals, educational industries etc. where generator is compulsory. It acts as the switching mechanism between the generator, load and the main power supply. It ensures consistent power supply to the load. An AMF panel, which can be controlled from a distance using Wi-Fi is presented here. The proposed system displays the generator parameters and indicates the type of fault in the supply mains and saves energy. The hardware model of the system is explained, which can be used for the validation of the results.

A Smart Intiative for Automobiles and Road Safety

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th June 2018

Nisha MS | Nanda Kumar V, Karthika K, Latha S, Geethika k

Abstract

The project is to engender a progressive city by utilizing today’s available premium technological resources by constructing our planet to be a better and safe place to live based on the idea of smart cities. In this proposed project, the Automobiles are equipped with RFID tags, audio instructor and roadside unit with RFID detector. When the vehicle enters those restricted zones, automatically speed will be controlled using the 89S52 microcontroller as well as an audio is heard in the vehicle. Whenever a red signal jump has been found by using sensors on the roadside automatically penalty amount from the prepaid smart card inside the vehicle will be deducted and credited to RTO account

A Smart Prepaid Anti-theft Energy meter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Ann Mary Michael | Mathews Mathew, Raghav Nath , Reeja Mathew, Rohit Koshy Roy

Abstract

Power utilities in different countries are incurring huge losses due to electricity theft. This paper proposes the control of electricity theft by using a prepaid energy metering system. In this system a smart energy meter is installed in every consumer unit and at the service provider side a server is maintained. The meter and the server are equipped with GSM module which facilitates bidirectional communication. By sending a PIN number hidden in a scratch card to the server using SMS consumers can easily recharge their energy meter. The bidirectional GSM communication using SMS ensures the effectiveness of these measures. Pilferage of electricity can be substantially reduced by incorporating the proposed measures along with the prepaid metering scheme. Legal actions against dishonest consumers are also taken in this system.

A Smart Prepaid Anti-Theft Energy Meter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Ann Mary Michael | Mathews Mathew , Raghav Nath , Reeja Mathew , Rohit Koshy Roy

Abstract

Power utilities in different countries are incurring huge losses due to electricity theft. This paper proposes the control of electricity theft by using a prepaid energy metering system. In this system a smart energy meter is installed in every consumer unit and at the service provider side a server is maintained. The meter and the server are equipped with GSM module which facilitates bidirectional communication. By sending a PIN number hidden in a scratch card to the server using SMS consumers can easily recharge their energy meter. The bidirectional GSM communication using SMS ensures the effectiveness of these measures. Pilferage of electricity can be substantially reduced by incorporating the proposed measures along with the prepaid metering scheme. Legal actions against dishonest consumers are also taken in this system.

A Smart Robotic Vehicle To Survey The Ocean

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st August 2017

Nagarjun J | Dileep Kumar N, Bharath R, Mohan Kumar P, Mrs Sahana Salagare

Abstract

Ocean exploration plays a vital role in global climate control and understanding environmental change and helps in research areas for the purpose of oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention like Tsunami and earthquakes. Today’s Existing systems are a data buoy which provides weather forecasting, Survey ships which are huge and heavier and satellites which are cost inefficient. To overcome existing system drawback and to provide multifunctioning, we are implementing smart robotic vehicle which provides live video acquisition, exact location co-ordinates ofthe device to the user, metal detection, automatic and manual control ofthe device. In this paper, we are developing a smart Robotic vehicle which is cost effective, small in size, consumes less power and has various applications towards oceanographic research.

A Smart Sensor Interface for WSN in IoT Environment using FPGA

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Sreedrisya S | Abhilash R V

Abstract

Measurement is an important subsystem of embedded system. Its main function is to collect the information from systems and feed to the processor for controlling the whole system. For collecting data, different types of sensors are used. Each sensor has to write complex and clumsy program code. Most of the control panels available in industries are wired panels and the machines are controlled and monitored by an operator in a room. It leads to the invention of sensor interface device controlled by wireless modules like zigbee, MiWi etc. Microcontrollers, one of the sensor interface device have some restrictions like connect number, sampling rate and signal types of sensors. To overcome these problems Field Programmable Gate Array (FPGA) is adapted as core controller. By using this, data can read in parallel and in real time with high speed from different sensors. MiWi module developed by Microchip is used here as wireless transceiver. But every wireless communication modules have limitations in the range. The concept of Internet of Things (IoT) is applied on the wireless sensor interface device. IoT is a concept of connecting and controlling devices through internet. Wide range of applications is available in IoT like industry, agriculture, environment protection etc. To maintain security in communication, data can send in encrypted form using suitable algorithm. A wireless sensor interface device designed using VHDL and is implemented in IoT environment using Java and C#.

A state-of-the-art review of FMEA/FMECA including patents

International Journal of Engineering Research in Computer Science and Engineering, Available online 28th April 2018

Jyoti | 

Abstract

This paper presents a critical review of Failure Modes and Effect Analysis (FMEA). Although the method is almost 70 years old, in literature there are still many researchers, both from academy and industry, devoted to improve it and overcoming unsolved and still open problems. The aim of this work consists in analysing a representative pool of scientific papers (220) and patents (109), in order to have an overview of the evolution of the method and try to understand if the efforts spent to improve it effectively answer to the several criticisms found in literature. All documents have been classified according to authors, source, and four technical classes dealing with the applicability of the method, representation of the cause and effect chain, risk analysis and integration with the problem-solving phase. A detailed analysis of the results allowed us to identify the most current problems, the improvement paths, and which other methods and tool are proposed to be integrated with FMEA.

A State-of-the-Art Review on Fatigue Analysis of Steel Bridges

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd March 2018

Sushank Dani | L.M.Gupta

Abstract

Fatigue is a localized and progressive cumulative damage accumulation due to continuous cyclic movement on a structure. The effects due to this can be dangerous as compared to conventional static load. On bridges, fatigue occurs due to the passage of vehicular load. In railway steel bridges, there are structural members with low dead load stresses but high live load stresses due to movement of wagons and locomotives. These high live load stresses cause a decrease in strength well below the design stresses. This, in turn, reflects the reduction in useful life of the bridge. Here, live load stresses are assessed for different members and details of bridges. Various analytical methods suggested such as nominal stress method, Hot spot stress method, Effective notch method, etc. The results of these methods are compared with the field measurement data obtained from strain gauges or structural health monitoring methods. The nominal stress method has been mentioned in various codes like BS 5400: 1980 (Part X), Steel Bridge Code, RDSO, etc. While the hot spot stress method depends on the finite element analysis of bridges. It finally concludes with the calculation of stress concentration factors for a particular detail. The failure due to fatigue does not depend upon the maximum stress, but on the stress range (absolute difference of maximum and minimum stresses) and the number of cycles corresponding to that stress range also called as stress history. Using the S-N curve and Palmgren-Miner’s cumulative damage rule, the damage assessment for each moving load is calculated followed by useful life estimation of a structure. This is a brief methodology for nominal stress method. The revised fatigue Appendix ‘G’ in Steel Bridge Code, RDSO has incorporated this method in addition to geometrical stress method (or hotspot stress). The nominal stress method is widely used for fatigue evaluation and design of steel bridges, but the hot spot stress method is more accurate and effective. Though the field measurement data presents most accurate information for determining the fatigue life of the structure, the above said two methods can be applied successfully to fatigue analysis and design. The main objective of the study is to find the difference in methodologies for assessment of fatigue and its application on railway steel bridges. Recently, a number of studies have been started on the use of probability concept in fatigue life determination of bridges. Though, these require combined basic of reliability and probability so they are more dependent on experimental and statistical data. Based on the above analysis, a predefined maintenance and inspection schedule can also be prepared. This schedule depends upon the service life of each structural member or details

A Static Structural and Modal Analysis of Rectangular Plate by using ANSYS

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

S. S. Kadam | Dr. G R. Gandhe,D. H. Tupe

Abstract

Finite element analysis is performed on quadrilateral rectangular plate by using finite element method based software ANSYS (version 15). And the comparison results are studied and compared out by using material properties of reinforced cement concrete and ferrocement and the appropriate loads acting on the structure and also compared with regression analysis on graphs by using static structural and modal analysis. Analysis results shows the effect of stress results with respect to their characteristics strength. Regression analysis are obtained very good agreement with the results obtained by finite element analysis based on software ANSYS- exact solutions. This job are very useful for obtaining the results are not only at node points but also the entire surfaces of the quadrilateral rectangular plate.

A Step Towards Integrating Smart City Services - A review

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 28th December 2017

Chetan Solanki | Ninad Bhatt

Abstract

Internet of Things (IoT) is an advanced automation and analytics system which make full use of networking, sensing, big data and artificial intelligence technology to deliver complete systems for a product or service. IoT visualizes to connect billions of sensors to the Internet and expects to use them for efficient and effective resource management in Smart Cities. This paper presents an in-depth literature survey for making a city “smart”. The purpose of this article is to summarize the present state of understanding the smart city concept and to present a proposed communication platform for the development of city services with the use of IoT concepts. Paper initially introduces the origin and the main issues of smart city concept and then presents the fundamentals of a smart city by analyzing its definition and application domains. Further, a data-centric view of smart city architectures is depicted. Thereafter, Smart City concept includes many aspects of city management like smart energy, smart water management, smart transportation and smart health. Such applications touch upon in this article. Finally, a zone-wise architecture of recent smart city research is presented. The proposed framework is based on a hierarchical model of data storage and defines how different stakeholders will be communicating and offering services to citizens. The architecture facilitates step by step implementation of the aforesaid services of smart city and their integration with the usage of central cloud.

A Step towards Sustainable Environment for Better Tomorrow

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Laxman Gaikwad | Saurabh Deshmukh,Asmita Deshmukh,Bhavik Bohra,Reshma Raskar Phule

Abstract

Sustainability is a process in which the design, planning and construction are done in such a way that it minimizes the total environmental impact while enhancing user comfort and productivity. This paper mainly focuses on the achievement of CII - Sohrabji Godrej Green Business Centre (CII Godrej GBC), the first LEED platinum rated building in India, in the field of sustainability with the combination of high tech innovative techniques and efficient resource using methods. The paper describes the effective implementation of the sustainability parameters in the building such as incorporating traditional concepts into modern and contemporary architecture like extensive landscaping, incorporating solar PV systems, indoor air quality monitoring, a high efficiency HVAC system, a passive cooling system using wind towers, high performance glass, aesthetic roof gardens, rain water harvesting, and root zone treatment system which reduces adverse effects of the building on environment. As a result, CII Godrej GBC gasconades a 50% saving in overall energy consumption, 35 % reduction in potable water consumption and usage of 80% of recycled/recyclable material, which is much more as compared to the conventional green building [1]. The paper also emphasizes on how these techniques and methods can be implemented in every commercial or residential building at small or large scale, which will not only improve the present environmental conditions of the country to a large extent but also reduce the exploitation of natural resources.

A Study in Knowledge Acquisition in AI Systems through Genetic Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Kumar Shekhar Singh | 

Abstract

Knowledge Base in an integral part of any AI system. Knowledge Acquisition refers to purposeful addition or refinements of knowledge structures to a knowledge Base. However knowledge acquisition is a complex and difficult task for AI researchers.Machine learning is the autonomous/mechanical procedure involving computers through which an AI. System itself enriches its knowledge Base.A useful taxonomy for machine learning is one that is based on the behavarioul strategy employed in the learning process. Some important conventional methods depending upon the degree of inference procedure are memorization, Analogy Inductive &Deductive inference.Attempts to develop machine learning systems began in 1950s. These design included self Adaptive system which modified their own structures in an attempt to produce an optional response to some input stimuli.Genetic Algorithms (GA) are based on population genetics. GAs learn through crossovers and mutations to provide optimum results. Higher performing knowledge structures can be mated (cross-over) to give birth to offsprings which possess many of their parent traits. Generations of structures are thus created until an acceptable level of performance has been reached. The following paper presents a study in different aspects of implementation of GAs for knowledge Acquisition in AI systems

A Study of Brain Tumor MRI Image Using Distance Based Clustering Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd January 2018

Dr. O.A. Mohamed Jafar | J. Zehara Sulthana

Abstract

Brain tumor segmentation is a challenging problem. The medical expert can analyze the MRI (Magnetic Resonance Imaging) but this activity is error-prone and time consuming process. Data clustering is the process of grouping similar objects. Existing brain tumor segmentation methods use Euclidean distance metric. In this paper, a study of hard and fuzzy methods based on different distance metrics – Manhattan and Chebyshev used for brain tumor segmentation is done. The result of Adaptive Fuzzy K-means (AFKM) is compared with K-means and Fuzzy K-means (FKM) algorithms. The AFKM based on Chebyshev distance gives better result than K-means and FKM techniques in terms of accuracy and quantitative measurements.

A study of Change in Input Power Factor and Negative Sequence Current Component during Inter-Turn Fault in Dry Type Transformer

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 5th April 2018

Rohit Kumar | Sarbesh Bhattacherjee, Prakash Kumar Mahto

Abstract

A power transformer is considered as an influential part of any power system network. The lifespan and performance of transformer mainly depends upon its load parameters. All industries necessitate reduction in cost of operation and maintenance of its equipment. A lot of techniques have been studied and developed concerning incipient fault detection in oil immersed transformer and dry type transformer for accomplishing its cost effective goals. From the analysis, inter turn faults has resulted in 70-75% transformer failures. Therefore, it becomes crucial to exterminate this fault at an initial stage henceforth saving transformer from severe faults, reducing outage time and loss of capital. In this present work a physical model of 10 KVA, 6600/550 Volt transformer is simulated in a power system using MATLAB/SIMULINK software. The experiment is performed at different percentages of inter-turn fault that is 1%, 3%, 5% and 10% on the secondary side of the multi-winding transformer and the change in power factor and negative sequence component of current is tabulated for corresponding fault. The present work is found beneficial in incipient fault detection in underground mines where only air cooled or dry type transformer is present and Buchholz Relay is absent to sense any emerging fault in the transformer

A Study of Graph Kernels through Two Decades

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th May 2018

Jyoti | 

Abstract

In the real world all events are connected. There is a hidden network of dependencies that governs behavior of natural processes. Without much argument it can be said that, of all the known data- structures, graphs are naturally suitable to model such information. But to learn to use graph data structure is a tedious job as most operations on graphs are computationally expensive, so exploring fast machine learning techniques for graph data has been an active area of research and a family of algorithms called kernel based approaches has been famous among researchers of the machine learning domain. With the help of support vector machines, kernel based methods work very well for learning with Gaussian processes. In this survey we will explore various kernels that operate on graph representations. Starting from the basics of kernel based learning we will travel through the history of graph kernels from its first appearance to discussion of current state of the art techniques in practice

A Study of Hybrid ANN-HMM Model for ASR

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Ashish Shendre | Dr. Sanjay Nalbalwar

Abstract

ASR (Automatic Speech Recognition) is most important for human computer interaction. In spite of tremendous advance in the ASR technique it is still far-away from human level performance. HMM (Hidden Markov model) based ASR system has made advancement but faced lots of limitation in practical problems. ANN (Artificial Neural Network) was used to replace HMM but the attempt was not that successful when trying to model high level dependency. Then attempt was made to combine this two to get the better performance. ANN-HMM hybrid model was introduced to combine the benefit of both and to increase the overall performance of ASR system. Large number of different hybrid architecture has proposed in the literature. Objective of this review paper is to focus on ANN-HMM. Most of the part of the paper is focused on describing the architecture of HMM, Neural Networkand how to use ANN for improvement of speech recognition.

A Study of Needs of Enhancing Vocational Teachers’ Professional Competencies in Thailand

International Journal of Science , Engineering and Management, Available online 25th January 2018

Tongluck Boontham | 

Abstract

The objectives of this research were to study the needs and guidelines on enhancing vocational teacher’s professional competencies. The sample was 400 vocational teachers in vocational schools in Thailand using multi-stage random sampling. Research instruments were dual-response forma questionnaire. Data were analyzed using Priority Needs Index (PNI) and content analysis. The research findings were as follows; 1. The current state of enhancing to vocational teachers’ professional competencies was at a high level and the expected state of enhancing to vocational teachers’ professional competencies was at the highest level as follows; instruction aspect, self-development aspect and teaching professional ethics aspect. That means the needs of enhancing vocational teacher’s professional competencies in all aspects. 2. The most critical needs were self-development Aspect, followed by instruction aspect, and teaching professional ethics aspect as follows; The most critical needs in self-development were research and development. The most critical needs in instruction aspect were instruction planning preparation. The most critical needs in teaching professional ethics were living the good life.

A Study of New Horizon on Emerging IoT Technology

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th March 2018

Pallavi Singh | Durgesh Kumar Keshar, V.K. Patle, Sanjay Kumar

Abstract

Nowadays, IoT (internet of thing) has a great impact on emerging technology with the internet. There is a number of IoT applications which used to make human’s life easier. IoT can be defined as an electrical or electronic device. IoT devices have the capability to exchange the information between IoT devices as well as communicate with the global world. Generally, IoT devices are considered as a wireless device. Therefore the reliability, security and accuracy are the new areas of research on IoT Technology. In this paper, we have studied the various IoT communication technologies and compare their features

A Study of Personality Type Determining the Choice of Bachelor of Education Programme

International Journal of Science , Engineering and Management, Available online 11th June 2018

K.Runi Nakro | Dr. Imtisungba

Abstract

The purpose of this study is to determine the type of personality of student teachers opting for BED programme. The survey method was used in the present study. Introversion-Extroversion test developed by Dr. R.A.Singh was used for collection of the data. The sample consisted of 115 student teachers of both second and fourth semesters of State college of teacher education, Kohima, Nagaland. The findings of study reveals that majority of the student teachers enrolled to the BED programme belong to extrovert type of personality. female.

A Study of Stock Market Investors’ Perception towards Price and Term of the Investment

International Journal of Science , Engineering and Management, Available online 25th May 2018

Dr. Shalu Kotwani | 

Abstract

During last one decade investment pattern of investors has changes. Now the investors consider many factors like primary and secondary sources of information, risk and return of the investment, sectors’ volatility and so on, before investing, but still the most important and common basic factor that is considered by the investors is price and term of the investment. Based on the current price of the security, the investor decides for how much time he is going to hold that security. This research focuses on what investors of stock market think about price and term of the investment and how this factor affects their investment decision. To extend the same, this research reviews the previous studies on the investors’ perception and stock market concepts. Z- test was used on 160 stock market investors of Indore, Ujjain, Dewas and Bhopal.

A Study of the Effect of Pyrites and Rhizobium Inoculation on Chlorophyll and Sugar Content in Black Gram under Sodicity Stress Condition.

International Journal of Science , Engineering and Management, Available online 16th June 2017

Raj Rupali Singh | 

Abstract

The study reveals that sodic conditions of soil resulted in poor bio-synthesis in black gram plants and hence both chlorophyll‘a’, ‘b’ and reducing and non-reducing sugar contentsdecreased with increasing levels of RSC water treatments. Incorporation of iron pyrites as an ameliorating agent significantly improved the availability of nutrients and enhanced the chlorophyll and sugar content. The Rhizobium inoculated treatments supplemented with 50 g iron pyrites pot-1 adjusted best among all the treatments and plants could withstand irrigation with 2.5 meL-1 RSC water without being adversely affected. Further, 7.5 meL¬-1 proved detrimental for plant growth and recorded maximum reduction in sugar and chlorophyll contents in the treatments which were not supplied with pyrites

A Study of Trend Analysis Using LDA and Information Filtering

International Journal of Science , Engineering and Management, Available online 19th April 2018

Nisha K. Lagad | Padmapani P.Tribhuvan

Abstract

Term and pattern related approaches are used in information filtering. These approaches are used for generating users information needs from a large number of documents. A prediction for these techniques is the documents in the collection are all about the same topic. However, in reality, users’ interests can be diverse and the documents in the collection often involve multiple topics. Topic modelling, such as Latent Dirichlet Allocation is given to generate statistical models to represent multiple topics in a collection of documents, and this has been widely utilized in the fields of machine learning and information retrieval. Patterns are always thought to be more discriminative than single terms and words for describing documents. However, the large amount of discovered patterns hinder them from being effectively used in real time applications, therefore the selection of the most discriminative patterns from the number of discovered patterns becomes crucial.

A Study of WannaCry Ransomware Attack.

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th September 2017

Dr Supreet Kaur Sahi | 

Abstract

The problem with Cyber security is continuously evolving nature of security threats. The traditional approach focused on high demand resources ignoring less important components at dangerous risks. Such an approach is insufficient in current environment and biggest example of this is WannaCry Ransomware attacks. This article highlights different characteristics of security threats. The globe has experienced a Ransomware cyber-attack “WannaCry” that has infected thousand computers worldwide. WannaCry has ability to spread through network by exploiting a critical vulnerability. This article also highlights preventive steps against the attack. Finally a formula is discussed to enhance Network Security.

A study of Wireless Sensor Network Data Acquisition

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th March 2018

D.Priyanka | D.Bhagyalaxmi

Abstract

Wireless sensor network (WSN) data acquisition has the unparalleled advantage of other networks due to its self-organizing network structure. However, its limited resources many key problems have not been solved well. This paper summarizes the key technologies and the main challenges in WSN data acquisition, WSN network protocol and its main performance indicators, and several current technologies and the combination of WSN were analyzed and discussed, and finally, the wireless transmission future research on key technologies of sensor network data acquisition has prospected.

A Study of Wireless Sensor Networks and Its Revolutionary Changes

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th May 2018

Akhil Chowdary D | Dr Sai Madhavi D, Muneeshwara

Abstract

Many evolutionary changes are brought into WSN in the past few years, may be due to advancement in networking, semiconductor technologies giving a scope for low cost deployment as well as maintenance with long lasting life, giving a scope for WSN to be a part of many applications .In future WSN can be expected to grab the role of standardized mix of hardware and software giving solutions to many new upcoming applications. The embedded designers must be able to make proper choices in selecting transducer, battery technologies, frequency, networking protocols, semiconductor design, and sensor/actuator technology including energy storage.

A Study on 802.11 Wireless Routers Hacking Techniques and Security Encryption Levels

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Amith Raj | Sneha H.R, Bindu Bhargavi S.M, Rekha Jayaram

Abstract

A device that performs both the functions of routing and the functions of a wireless access point is called as a wireless router. It can also be used to provide access to the private computer network or Internet. A set of Media Access Control(MAC) and Physical Layer specifications for implementing wireless local area network (WLAN) computer communication is defined in IEEE 802.11. It supports different connection types like PPPOE, Static IP address, Dynamic IP address and Bridge as provided by the ISP. These devices can also be used as modems and WiFi Router protected with a password. There are various WLAN encryption techniques like WEP, WPA, WPA-2(PSK). But all of these encryptions are vulnerable and can be hacked using certain softwares and techniques. In this paper, a number of hacking techniques using softwares like Aircrack, WiFite are explained for research purpose. This paper also discusses about setting up a secure WiFi router using different encryption techniques with combination of security features of routers like Mac Address filtering and Firewalls to protect from hackers and attackers. The primary purpose of this research is to demonstrate a brief idea on ethical hacking and provide sufficient security for home and enterprise network.

A Study on Agent-Based Modeling - Topological Interactions

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd February 2018

R.Saradha | Dr. X. Mary Jesintha

Abstract

Agent-Based Model (ABM) is a class of computational models for simulating the actions and interactions of autonomous agents with a view to accessing their effects on the system as a whole. It combines elements of game theory, complex system, emergence, computational sociology, multi-agent system and evolutionary programming. ABMs are also called individual-based models (IBMs). ABMs are a kind of micro sale model that simulate the simultaneous operations and interactions of multiple agents to re-create and predict the appearance of complex phenomena. The key notion is that simple behavioral rules generate complex behavior. Most Agent-Based Models are composed of numerous agents specified at various scales, Decision-making heuristics, Learning rules or adaptive processes, An interaction topology, Non-agent environment. ABMs are typically implemented as computer simulations, either as custom software or via ABM toolkit, and this software can be used to test how changes in individual behavior will affect the system’s emerging overall behavior. This paper presents an overview of how agents communicate agent communication languages and interaction protocols.

A study on Aluminum Nitradation process: Literature Survey and development of frame work for processing AlN

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th June 2018

Akarsha Kadadevaramath | V. Auradi, Prakash Kurma Raju

Abstract

Aluminum Nitridation (AlN) has lot many applications in the automobile industry, aerospace, electronics where a high temperature application is required and other areas. There are various techniques, methods and approaches are used by various researchers in this area. Hence, this article presents a brief review of the research progress achieved on Preparation and feasibility formation mechanism in the field of Aluminum Nitride (AlN) and proposes the research objective and frame work developed for Aluminum Nitride formation for electronic industry applications.

A Study on “Critical Pedagogy” in NCF 2005 adopted by English teachers at Upper Primary stage in Manipur with reference to low achievement of students

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st September 2017

Punith.B.M | Sachin Godi ,Sachin Shetty, Sangameshwaraswamy , Yogananda B.S

Abstract

Throughout the study, the main aim is to increase the productivity in the starter assembly line . In each workstation the processing time is different and the longest time consumption in workstation will be identified and observation is carried out . This related workstation is studied by time study techniques. The time is taken by stopwatch. The goal of the work is to seek in increase in the line efficiency and productivity rate hence proposed to the company. The major drawback is the setup change of performance test bench of the starter . These particular problems thus affect the productivity and the line efficiency as well. Thorough observation revealed the change over time for a workstation also an important aspect in the production time . It plays a major role in the company’s overall income , as the result of that the major change should be taken so as to reduce the change over time . The setup change of performance test bench consumed more time and results in less production. So we should reduce the setup change time by removing the non-value added activities and bring in new techniques . This change has a better line efficiency and increase in rate of productivity

A Study on “Critical Pedagogy” in NCF 2005 adopted by English teachers at Upper Primary stage in Manipur with reference to low achievement of students

International Journal of Science , Engineering and Management, Available online 1st September 2017

Dr. M. Gunamani Singh | 

Abstract

This paper presents the results from a qualitative research study that explores the experiences of high school teachers with some of teaching techniques and approaches in critical pedagogy.The study considers teachers who may not have explicitly learned about or applied critical pedagogy in teaching. It investigates how feasible and desirable they find the techniques and approaches in critical pedagogy to be based on their teaching experiences these teachers work in school with largely upper – middle class students, so the issue of applying critical pedagogy with affluent students adds a dimension of interest to this study.It was generally expected that school teachers would be implementing several teachingapproaches relating to critical pedagogy prescribed in NCF-2005 but these pedagogieswere found only partially implementedby them at Elementary stage in Manipur. Probably this could be one of the main reasons that the problem of low achievement in English persisted in some schools and English language learners did not attain the proficiency of languageskills required at the end of the Elementary stage in Manipur. Therefore, there isneed to address this issue because it may not help future careers of the children. After the identification of this problem, ten schools (5 Private English medium schools and 5 Government schools) were selected for our study. Among these 5 Private schools, 2 of them were convent schools. Of the 5 Government schools, one is a model school where relatively more facility has been created by the Government. In order to carry out the investigation, questionnaires were administered to the teachers of English, who are working in these ten schools and their responses were analyzed. In addition, the Heads/Principals were also consulted by the investigator in relation to teaching/learning process, evaluation systems and their administration. We found some

A Study on Basic Aspects of Coding a Website

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Raja Mohamed S | Mrinal Anand, Raj Kumar G

Abstract

A web site is a collection of pages of information. Creating a web page is similar to writing a letter with a word processor and saving it on the computer, but the pages have to be saved as HTML format, rather than as Word documents, Excel spreadsheets, PDF files, Zip files etc., is that the way we read web sites with a program called a web browser. The designing of a website can be pushed on the server using CSS and HTML and this is called the Front-End. After finishing the Frond-End, the Back-End turns the Front-End into the action, for example, making the forms as records in the database. We use any Server-Side Languages such as PHP and JS for doing this using MySQL as Database. This paper presents the coding basics of designing a website. A basic e-commerce website is also created.

A Study on Comparison of Various Image Encryption schemes based on Chaotic Maps

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Rachit Jain | J.B.Sharma

Abstract

This paper shows the study on image encryption scheme using different Chaotic Maps. The main purpose is security management in transmission and storage. There are various image encryption techniques which have been continuously studied to fulfill the demand of real-time secure image transmission through wireless networks and over the Internet. Conventional image encryption methods like data encryption standard (DES), has the weakness of low-level efficiency and high redundancy when the image is large. The chaos-based image encryption technique provides an efficient way to deal with the difficult problems of high security, pseudorandom property, topological transivity and fast image encryption. The objective of this paper is to compare Logistic map, Baker map and Arnold cat map image encryption techniques by visually, statistically and noise analysis to get an efficient approach of image encryption.

A Study on Energy Storage and Management for Grid Optimization in Isolated Areas

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th November 2017

P.Dileep Kumar | 

Abstract

The remote and rocky districts confront lasting issues with their electric system, for example, solidness issues; sudden drops in voltage and power quality that influence individuals' day by day life at home and their gadgets' execution. The explanations behind the low quality of power are because of the matured, remote neighborhood dispersion organizes and the regularly unforgiving climate conditions particularly amid winter months. Encouraging the framework in switch arranges is our proposed arrangement which will diminish power should be transmitted over incredible separations. Vitality generation in remote areas could be profitable on the off chance that it incorporated the usage of nearby sustainable power sources. The arrangement of generation, stockpiling and administration of vitality could give more prominent system steadiness which would then prompt better power quality, diminishment of potential misfortunes and disappointments under particular conditions. The present investigation concentrates on the utilization of sustainable sources to make a keen vitality stockpiling framework with the objective to accomplish the network benefits dissected. By inspecting as of now accessible advances and considering their potential business applications sooner rather than later alongside their costs, it gives the idea that a promising methodology is to utilize inexhaustible in a half and half mode joined with batteries for vitality stockpiling. The article builds up a vitality framework (counting photovoltaic, wind and hydroelectric power stations), which offers vitality as indicated by the request progressively with fitting displaying. The point of the article is to make a framework for delivering, putting away and overseeing energy by utilizing sustainable sources and batteries at insignificant natural effect.

A Study on Hardness Attributes of Ban Ana and Jute Polyester Composites

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Megha.B.E | Keerthi Gowda.B.S, G.L.Easwara Prasad

Abstract

Polyester Composites have clinched utmost prominence and are implemented in various spheres of applications. The proffered research work involves evaluation of the hardness parameters of Banana and Jute Fiber reinforced Polyester Composites, assenting the precept of Shore-D Hardness Tester. Banana and Jute Fiber reinforced Polyester Composites were prepared using polyester resin and banana fibers of 10mm length, polyester resin and jute fibers of 30mm length respectively ,varying the fiber volume fraction from 5% to 25%,with an increment of 5%,to 3mm and 5mm thicknesses. The Banana fiber reinforced Polyester Composites of 5mm thickness. with fiber volume fraction of 20% exhibited higher Shore-D Hardness values. Same trend was traced by the Jute fiber reinforced Polyester Composites.

A Study on Impact of Digital Marketing in Customer Purchase Decision in Thoothukudi

International Journal of Science , Engineering and Management, Available online 20th September 2018

R. Tiffany | S. Santhana Kamala,M.Phorkodi

Abstract

Digital marketing can be defined as the process of promoting of brands using digital distribution channels comprising internet, mobile and other interactive channels. The basic advantage in this form of advertising lies in its low cost model. The aim of the study is to examine the implication of digital marketing in consumer purchase decision and to find out whether the consumers are aware of digital marketing and the digital channels influence their purchase decision. The study is carried out through survey from 50 respondents. The results of the survey are analyzed using chi square test. The findings revealed that customers are aware of digital marketing and they prefer to by shopping goods through digital channels. The study is performed in a particular geographical area and this may be considered as a limitation to judge the purchase decisions of all customers of various regions. As the world is moving towards digital era, the digital channels play a vital role in the increase of sales of any firm’s products. So the present study made an attempt to reveal the impact of digital marketing on customer purchase decision. This report will help to get an idea about digital marketing and how the digital marketing has impact on revenue generation for digital marketing companies

A Study on Job Satisfaction of Women Employees in Fireworks Industries at Sivakasi

International Journal of Science , Engineering and Management, Available online 23rd August 2018

V.Murugeswari | 

Abstract

- A woman is the builder and moulder of a nation’s destiny. Though dedicate and soft, she has a heart far stronger and bolder than man. She is the supreme inspiration for man’s onward, an embodiment of peace, love, pity and compassion. Ostensibly the position occupied by women in a society determines the degree of development of that particular nation. Fireworks industry is one of the labour intensive industries in our country especially in South India. It mainly depends more upon women that men. Hence in this study an attempt is made by the researcher to study how far the women labourers involved in the fireworks industry are satisfied with their job. The present study has been undertaken with the primary objective of analyzing the factors influencing job satisfaction and opinion of women employees in fireworks industry. The investigation encompassed an extensive survey to obtain primary data from sample respondents of 114 employees in Sivakasi. The interview schedule covered all the details like personal data, factors like system of wage payment, bonus, advance , incentives etc., The data were collected using the investigation list which contained 25 phrases on Likert scale in order to measure the opinion of women employees.

A Study on Keystroke Dynamics for Touch Screen

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd February 2018

Dr Sonali Vyas | Pragya Vaishnav

Abstract

At present maximum people store private and sensitive data on their Smartphone. Consequently, the demand is growing for secure mobile authentication methods. Setting a password-based authentication is the most frequently used method to protect data from intruders. However, people tend to use password, which can be easily remembered, hence easy to crack. Therefore, an additional mechanism is needed to enhance the security of password based authentication. One such complementary method is to use the typing pattern of the user, known as keystroke dynamics. Keystroke dynamics or typing dynamics refers to the automated method of identifying or confirming the identity of an individual based on the manner and the pattern of typing on a keyboard. Keystroke dynamics is a behavioural biometric, Keystroke dynamics on mobile referred as Touch dynamics and refers to the process of measuring and assessing human touch rhythm on touchscreen mobile devices (e.g. smartphones and digital tablets). In this paper, we are mentioning the different patterns to authenticate the touch screen mobiles

A Study on Manufacturing of Bricks using Black Cotton Soil & Red Soil

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th June 2018

Hubli Kiran | Beedimani Priyanka, Aishwarya, Karale Suneel

Abstract

Over a past few decades, there have been a wide ranges of alternatives available in the field of construction, especially with reference to manufacture of bricks. Further, there are some inventions like fly ash brick, concrete blocks etc. There are also researches using black cotton soil as a raw material in the manufacturing of bricks along with few admixtures to alter the properties of the black cotton soil. This research study describes the feasibility of using black cotton soil as a raw material with additional stabilizer in the brick production as partial replacement of clay in Indian context. The study has revealed that the bricks manufactured using this method have good quality with acceptable strength and further, they can be manufactured in a cost effective manner

A Study on Mechanical Properties of Aluminium Alloy (LM6) Reinforced with Al2O3

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th May 2018

Samant Gaurish Mahabaleshwar | Dr Krupashankara M S, Dr Mahesh B Parappagoudar

Abstract

A phrase heard often in recent years, advanced composite materials like Al/Al2O3 metal matrix composite is gradually becoming very important materials in industries due to their superior properties. The present study examines the mechanical properties of aluminum (LM6)/ Al2O3 reinforced particles metal-matrix composites (MMCs) by varying weight fractions of Al2O3. For this (LM6)/ Al2O3 reinforced particles MMCs are fabricated by stir casting method at air atmosphere . The MMCs are prepared in the form of bars with varying the reinforced particles by weight fraction ranging from 3 %, 5 % and 7 %. The reinforced particles size of Al2O3 is varying between 25-40 microns. The Mechanical properties like, Brinell Hardness, Rockwell hardness & Wear test are investigated on prepared specimens of MMCs. It was observed that the hardness of the composite is increased gradually from 5 % to 7%.

A Study on Mining Applications in Uncertain RFID Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

N.Bala Vignesh | Dr. V. Joseph Peter

Abstract

RFID technology is an emerging technology uses radio frequency waves to transfer data between readers and tagged objects, and provides fast data collection with precise identification of objects with unique identifications without line-of-sight. RFID technology consists of data gathering, distribution, and management systems that have an ability to identify or scan information with increased speed and accuracy. RFID technology can be used for locating, tracking and monitoring physical objects. Sensors in RFID devices are intrinsically sensitive to environmental factors. The signal from sensors suffers from high uncertainties due to the nature of signal fluctuation in real-world conditions. The uncertainties that exist in RFID data complicate tasks of determining objects positions and containment relationships. This technology has significant advantages, RFID has been widely used for access control, objects tracking, smart box, highway tolls, logistics and supply chain, security and healthcare, etc. In particular, RFID has been adopted and deployed to collect various types of data in the manufacturing field. In this paper we focus on study of data mining applications of uncertain RFID data

A Study on Mining High Utility Item sets for Promoting Business Activities

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

R. Sheeba Mary Ananthi | Dr. V. Joseph Peter

Abstract

In recent era, High Utility Itemset Mining (HUIM) is an emerging critical research topic. In traditional approach, the items which occur frequently together are extracted from a database. But the frequency of Itemset is not sufficient to reflect the actual utility. Utility mining is an extension of frequent Itemset mining by considering the utility of an item. Utility Mining is the process of discovering all item sets whose utility values are equal to or greater than the user specified threshold in a transaction database. Utility Mining covers all aspects of economic utility in data mining and helps in direction of itemset having high utility. The main objective of high utility itemset mining is to find the itemset having maximum utility values. We can extract the high utility from rare itemsets, irregular occurrence, from different discount strategies. In this paper, we present a various algorithms for High Utility Mining to promote business activities

A Study on Near-Duplicate Image Detection System

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th April 2018

Dr.A.Mercy Rani | B.Anitha, K.Anukeerthi

Abstract

Due to the abundant increase of imaging technologies, manipulation of digital images create a severe problem in various fields such as medical imaging, journalism, scientific publications, digital forensics etc. This gives the challenges in a matching of slightly modified images to their original ones which are called as Near-Duplicate image detection. The images are altered using some features such as cropping, changing its shape, contrast, saturation, framing etc. Digital Image Processing plays a vital role in finding Near-duplicate images in various applications. The near-duplication image detection process is used to find the duplicate image by comparing the slightly altered images to the original one to assist in the detection of forged images. This paper presents the overview of near duplication images, near duplicate image detection system, algorithms and it gives the analysis of the various researchers held in this field

A Study on Need of Inclusive Development and Environment Sustainability in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Chintan Vora | Reshma Raskar-Phule

Abstract

With 1.2 billion people living and expected to increase by another 300 million in coming decades, India is definitely going to face lofty demands of resources to satisfy the needs of its people. Having realized that the existing non-renewable resources are not sufficient for the current as well as the future needs, it is very important for India to avail its immense treasure of renewable resources by adopting sustainability. Procuring sustainability is a hard row to hoe. This paper mainly focusses on the situation of India and the challenges it is facing in utilizing the available natural and non-renewable resources in an efficient way to reduce the stress on these resource utilization, keeping in mind the needs of the future generation. Various aspects such as water risk management, adoption of renewable energy, waste management have been discussed in this paper. Finally an attempt is made in this paper to drive the attention of the aspiring and growing companies towards sustainable development. In this context, this paper presents some examples of successful corporate of India who are triumphant in employing sustainable development industries by giving problem-based-solution and explains the methodologies adopted by them to contribute towards the 175GW of energy goal of India

A Study on Partial Replacement of Fine Aggregates by Quarry Dust and Cement with Fly Ash

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th June 2018

Angadikudethi Mohan Kumar | B.Moorthi, R.Yugandhar, V.Deepu, Shaik Jaheed Ali

Abstract

Quarry dust is a waste product obtained from quarrying , by and large it is characterized as the buildup. Quarry dust being overall, product will also likewise reduce environmental effect is devoured by development industry in vast amounts .Hence the utilization of quarry dust as in fine total in solid will reduce not only regular sand as well as decrease the natural issues. In addition, Generally in 10 to 25% by weight of Portland concrete. The utilization of mineral admixtures like fly ash remains in quarry clean cement by as incomplete substitution of cement, improves the pumping of the concrete, strength, durability and reduction of cement consumption. It also reduces the CO2 emission during the manufacturing of Portland cement. Therefore an attempt has been made to study the performance of organic, inorganic inhibitors dosage of 1%,2%,3% and 4% by weight of cement in quarry dust concrete to control the rebar corrosion. M20 grade of Concrete cube of size 150X150X150 mm, cylinder of size 150mm diameter and 300 mm long cast for compressive, split tensile tests after 3,7 and 28 days , curing the specimen cubes shapes have been tried

A Study on Pattern Recognition of Tumor images in Medical Image Analysis

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th February 2018

Dr. V. Usharani | 

Abstract

Medical image investigation is carried out through some intelligent ideas and techniques that require distinctive solid information and reports. Nobody is very clear about what type of information and proofs are used for the sharp finding but however some low ranking features like shapes, texture and other pixel related statistics which are taken from the images may be used for prediction. Based on this understanding medical images can be identified through the use of exclusive pattern recognition algorithms. In this paper for cancer analysis through the use of unique forms in medical pictures, varieties of tumours’ and pattern recognition process in medical image diagnosis might be studied considerably.

A Study on Physiological and Biological Feature Descriptors of Human Aging

International Journal of Science , Engineering and Management, Available online 13th March 2018

K. A. Patil | 

Abstract

Human aging research now crosses all areas of physiology and biology. Human age prediction is applied in many realworld areas like forensic art, passport renewal, border security, finding a missing person or criminal, preventing vending machines from selling products, e.g., alcohol, tobacco, to under-aged individuals etc. Incredible changes found in human body during the craniofacial growth and behavioral pattern. This paper presents a study on various physiological and biological approaches used to predict human age. In this paper we discussed many interesting studies of these approaches and given a thorough analysis of problems in human age prediction.

A Study on Post Traumatic Stress Disorder (PTSD) with respect to Gender

International Journal of Science , Engineering and Management, Available online 28th August 2018

Rubia Jan | Zainab Hamid,Dr. Shawkat Ahmad Shah, Dr. Arshad Hussain

Abstract

It has been evaluated that by 2020 psychological trauma will be the main cause of disability, next to depression and heart diseases (Michaud, Murray & Bloom, 2001). The present study entitled as “A Study on Post Traumatic Stress Disorder (PTSD) with respect to Gender” was aimed to understand the PTSD in respect to gender. The objectives of the study were to assess levels of PTSD experienced by male and female, apart from this it also aimed to explore the significant difference in male and female participants with respect to PTSD. The sample of the study consists of 100 participants. Out of 100 participants, 50 were male and 50 were female. PTSD symptom scale (PSS) developed by Foa, Riggs, Dancu and Rothbaum (1993) was used to assess the levels of PTSD. The collected data was subjected to comparative analysis (t-test) with the help of SPSS. The comparative analysis highlighted that there is significant mean difference in PTSD with respect to gender. Further comparison of means indicates that female participants have higher PTSD as compared to male participants.

A Study on Pressure Sensor Based On Photonic Crystal

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Indira Bahaddur | Dr. P C Srikanth, Dr. Preeta Sharan

Abstract

Photonic crystal technology is used in many areas of detection and measurement of parametrs like pressure, temperature, displacement etc.MOEMS based micro-sized pressure sensor can be developed to detect even sub-micron range dimension change using the photonic crystal. The applied pressure on the object will change the dimension of the waveguide carved in the photonic crystal. As a result, this change in spacing can alter the propagation feature of electromagnetic waves that pass through them that is changing the transmission spectrum. So, this change can directly be mapped to pressure on the observed object. In this paper, the pressure sensor using photonic crystal has been modeled and analyzed.

A Study on Quality of Windrow Compost Produced From Different Municipal Solid Wastes in India

International Journal of Science , Engineering and Management, Available online 31st May 2017

Gade.Venkatesham | M.Chandra Sekhar,T.Bala Narsaiah,P.Akhila Swathanthra

Abstract

Indian Municipal solid waste (MSW) consists of 50-55 % of bio degradable organic matter. This typical composition suggests composting as a suitable option, if source segregation can be adopted. Composting of MSW is proved to be a sustainable option in many countries as the other methods of disposal pose challenges like demand for land, leachate pollution, gas production, low calorific value, heterogeneity of combustible materials, air pollution, etc. Composting organic material in MSW will result in compost, which can be used as soil conditioner in agriculture. With the cost of inorganic fertilizers on the rise in the recent decades, compost can be a good substitute for farmers. The present paper reports the results of a study wherein the quality of compost produced by adopting Windrow/aerobic Composting. As a part of above study Windrow/aerobic Composting samples are collected from different Municipal corporations which are using Windrow/aerobic Composting and the quality of compost is analyzed. Fertilizing Index and Clean Index are used for assessing the quality of the compost. The indices are categorized into marketable classes (A, B, C & D) or restricted use class (RU-1, RU-2 & RU-3) based on their fertilizing parameter and Heavy metal content.

A Study on Quality of Windrow Compost Produced From Different Municipal Solid Wastes in India

International Journal of Science , Engineering and Management, Available online 31st May 2017

Gade.Venkatesham | M.Chandra Sekhar,T.Bala Narsaiah,P.Akhila Swathanthra

Abstract

Indian Municipal solid waste (MSW) consists of 50-55 % of bio degradable organic matter. This typical composition suggests composting as a suitable option, if source segregation can be adopted. Composting of MSW is proved to be a sustainable option in many countries as the other methods of disposal pose challenges like demand for land, leachate pollution, gas production, low calorific value, heterogeneity of combustible materials, air pollution, etc. Composting organic material in MSW will result in compost, which can be used as soil conditioner in agriculture. With the cost of inorganic fertilizers on the rise in the recent decades, compost can be a good substitute for farmers. The present paper reports the results of a study wherein the quality of compost produced by adopting Windrow/aerobic Composting. As a part of above study Windrow/aerobic Composting samples are collected from different Municipal corporations which are using Windrow/aerobic Composting and the quality of compost is analyzed. Fertilizing Index and Clean Index are used for assessing the quality of the compost. The indices are categorized into marketable classes (A, B, C & D) or restricted use class (RU-1, RU-2 & RU-3) based on their fertilizing parameter and Heavy metal content.

A Study on Software Development Life Cycle & its Model

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th September 2017

Navita | 

Abstract

Software development life cycle (SDLC) is a well defined and systematic approach. It practiced for the development of a reliable high quality software system. There are many SDLC models available. This paper describes five SDLC model , namely ;waterfall model ,iterative model, v shaped model ,spiral model, prototype model. Each development model has their advantages and disadvantages. The aim of this paper is to present a study on software development life cycle (SDLC) and SDLC models with their advantages and disadvantages.

A Study on SOFTWARE RECEIVER FOR GPS SIGNAL

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 9th March 2018

Madhu Dilip Potadar | Dr. P C Srikanth

Abstract

Today Navigation depends on the Satellite Navigation Systems which covers the entire globe there are so many Global Navigation Satellite System (GNSS), United States has GPS, Russia has GLONASS, European has Galileo, China uses Bei-Dou navigation System, and India uses IRNSS. In this paper, we would like to discuss Universal receiver which supports different satellite Navigation system here signal from the satellite is RF signal convert to digital and further processing will be done in digital domain which permits the true software receiver for a navigation satellite system.

A Study on Surface Properties of Chips Produced by Large-Strain Extrusion Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th June 2017

Kunal Arora | Harsh Kansal, Krishna Murari , Hitesh Mittal, Sumit Kumar

Abstract

manufacturing of bulk nano structured are in high demand in today’s industry because of recent development and application of advanced materials. Many traditional machining processes were used but none of them have been able to produce complex shapes precisely at low cost. In order to overcome this difficulty Large–strain extrusion machining (LSEM) is introduced. It is basically a fabrication process. It is a single step manufacturing process. It is a method of severe plastic deformation (SPD) which is used particularly for machining bulk nano structured materials. It is a low cost manufacturing technique with advantage of machining and controlling dimensions simultaneously. Different shapes such as foils, sheets and bars of controlled dimensi ons are produced with controlled geometric parameters of the deformation using large strain extrusion machining. The paper reviews all the characteristics of large strain extrusion machining, its background, its developments, effect of various parameters ( rake, feed, speed) on mechanical properties of chips, its mechanics, study of chips at microstructure and nano level. Effect of strain, porosity, hardness and other properties on chips have also been studied.

A study on the application of GIS in PCP of Rural Water Supply

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st July 2017

Nikita T. Bhagat | Dr. Sumedh Y. Mhaske

Abstract

The preconstruction planning (PCP) phase of any project is an individual stage that impacts the planning and execution of a construction project. In this stage, planners and contractors using their experience plan the project considering time, cost and quality constraints. In recent time, importance is being placed on using different tools like GIS in the preconstruction planning stage. In planning a water supply distribution scheme, an information system is needed that will help the construction planners to plan the project. Geographic information system is a computer based system that is used for storing, manipulating, and analysing large amount of data. This paper focuses on the water supply distribution scheme of a village Mahuli, in Maharashtra, India. In this paper study of application of GIS on one of the aspects of water supply preconstruction planning, i.e. distribution pipeline network, details and analysis in GRAM++ is done. The purpose of the study is to know the advantages of using GIS and achieving time effectiveness.

A Study on the Impact of Mobile Phone Addiction amongst the Youth in Chandigarh

International Journal of Science , Engineering and Management, Available online 27th September 2017

Dr. Anubhuti Sharma | Agreema Sharma

Abstract

The present endeavor was aimed to study the impact of mobile phone addiction amongst the youth in Chandigarh. For this purpose, 110 college students (55 males and 55 females) with an age range of 17-22, were randomly selected from various colleges of Chandigarh. Problematic Mobile Phone Use Questionnaire (Billieux, et. Al. 2008) was administered on the sample. Descriptive statistics comprising of means and standard deviations were applied to assess the impact. Gender differences were also delved into. Results showed the dysfunctional mobile phone usage affecting males and females differently

A study on the Morphological Variation in Mandibles of Four Wasp Species

International Journal of Science , Engineering and Management, Available online 1st September 2017

Kiran Vati K | K. Bhasker Shenoy

Abstract

Adult wasp have chewing and lapping type of mouthparts. The mandibles are structurally different in different species of wasps, suggesting that the variation in mandible is due to specific activities that it does in its life time. The function of mandibles are retained primarily for biting, chewing and also for handling other material like mud or mastication of plant fibers during nesting. Variation in mandibles of four wasp species is presented in this paper. The structure of the mandibles is elongate with presence /absence of teeth in solitary wasps like Delta pyriforme pyriforme (Fabricius, 1775) and Sceliphron caementarium (Drury 1773). These wasps use the mandibles to excavate wet mud from the ground and carrying it. Mandibles are also used for capturing prey like caterpillars or spiders which are carried to its nesting sites. In case of social wasps like Vespa tropica (Linnaeus, 1758) and Ropalidia marginata (Lepeletier, 1836) the mandible is short with large teeth’s. These wasps use mandibles to masticate the wood or plant fibers to convert it into a soft pulp which is utilized in the construction of papery nests. Mandibles are also used in mastication of prey, which is given as feed for the developing wasp larva

A study on the pH Value of Fly Ash Concretes

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Dr.Mudimby Andal | Dr. T.D.Gunneswara Rao

Abstract

Use of fly ash in concrete as replacement to cement is an established practice accepted all over the world. The reason is mainly due to the fact that replacement or addition of fly ash reduces the cement consumption and make the concrete economical. Flyash concretes are more durable than conventional concretes. However, the addition of fly ash in concrete decreases the pH of concrete and reduction in pH value disturbs the passivation layer formed around the rebars. The passivation layer is formed around the rebars in concrete due to the higher alkalinity of concrete. Thus the addition/replacement of cement by fly ash affect the pH and thereby the alkalinity. This article describes the effect of replacement of cement by fly ash on the pH value of the end product i.e., fly ash concrete. Fly ash concrete and mortar specimens are cast and tested for pH. It is found that replacement of cement by fly ash reduces the pH of the matrix. With the increase in the age of fly ash concrete reduction in pH value is found to be more. This indicates that the reaction of fly ash with Calcium Hydroxide present in concrete with time reduces the pH value. It is concluded that the treated flyash would be more effective and beneficial than replacement of cement with untreated fly ash..

A Study on the Working Condition of Salt Pan Workers in Thoothukudi

International Journal of Science , Engineering and Management, Available online 29th August 2018

S. Prakash | Dr.N. Maria Nevis Soris

Abstract

Salt is very essential dietary commodity. Common salt is an article of daily necessity for human consumption. It has been important commodity for hundred years. It is used widely in the chemical industry and has various industrial uses. It is considered to be the basic as well as a highly indispensable commodity. Salt can be consumed by both rich and poor only to the limited and fixed quantity irrespective of the price or health. Salt is not found in nature. It is available in abundant quantities in sea water. Salt is a cheap and bulk commodity. It is produced in our country by the private, Co-operative and Government sectors. India now ranks third in the world in the production of salt. Salt is an important physiological necessity of life. With an enormous and growing population, the demand for salt is vital importance. Salt is used for several purpose. It is used for cooking as table salt and as a preservative in the preparation of condiments, pickles and food stuffs. It is also used to a limited extent in agriculture as an insecticide, wood killer and for stock feeding. It finds use in curing fish, meat packing, dairying and other industries to prevent deterioration. It is used in several industries such as glass, leather, soap, oil purification, dyestuffs, textiles, ceramics, refrigeration etc., in this regard, the main objective of the study is knowing the consumer working condition of salt pan workers in Thoothukudi.

A Study on Trends, Reviews and Effects of Online Shopping in India

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

Tushti .P. Bakrania | 

Abstract

In the recent scenario of E - business online shopping has developed a huge importance. The development and growth of online shopping has given n number of opportunities to the organization to provide competitive advantages. There are n number of companies which are selling their products through on line portals or provides service online. Compared to other countries online shopping in India is not very common but it is growing at an immense speed then other countries. This paper gives brief idea of online shopping in India its positive and negative effects. It also provides scope of upgrading in online shopping websites. A finding says that online shopping is the best convenient way for consumers. But people also worry with the risk associated with it like privacy and security risk. Many organizations uses Internet to provide information and communicate with people which helps them to get idea what consumers exactly want, what are there demands and organization can also get feedback through them. But, there are various uncertainties attached with online shopping such as misuse of personal data, return or exchange policies, testing of product etc.

A Study on various Cryptographic Techniques used in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th December 2017

Mr. Girish Kumar D | Dr. Rajashree V Biradar

Abstract

Cloud Computing (CC)is the delivery of on-demand shared computing resources to computer or other devices, CC has changed the way we think about the way we perform our day to day operation and now a day’s almost all applications are using CC to meet their requirements without actually licensing or purchasing the software and also the infrastructure. There is a lot of chance to misuse of data by the third party (Cloud Service Provider) and the main security factors which affect the performance of the system are confidentiality, availability and integrity of data. Many encryption algorithms have been developed and implemented to provide security for the data which is stored in the cloud, but no algorithm provides 100% security for the data which is stored in the cloud. This paper gives a study of different encryption techniques used in CC that is used to provide security for the data stored in the cloud.

A Study on Various Satellite Image Resolution Enhancement Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Aditi Sharma | Ajay Khunteta

Abstract

Due to the low frequency nature and as the result of interpolation on satellite images, they may appear as blurred image. To enhance the frequency of those images, Resolution techniques are used. This is used in a several number of applications such as laser and inkjet printing, medical imaging, remote sensing, with some vital objections such as distortions, blurring aliasing, ringing artifacts etc. Enhancing the resolution of an image includes increasing the number of pixels presents to show the details of an image as well as sharpness of the image. This paper studied about the basics of interpolation with some conventional satellite image enhancement techniques and analyses the performance of various image resolution enhancement techniques for satellite images. These techniques are compared on the basis of Root mean square error (RMSE), Mean square error (MSE) and Peak signal to noise ratio (PSNR) factors.

A Study on Web Buckling Of Plate Girders

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd March 2018

Neeraj Singh Thakur | D. Datta

Abstract

The plate girder is fabricated from plates and the designer has greater freedom to vary the section to correspond with changes in the applied forces. Thus variable depth plate girders have been increasingly designed in recent years. For a given bending moment the required flange areas can be reduced by increasing the distance between them.Thus for an economical design, it is advantageous to increase the distance between flanges. To keep the self-weight of the girder as the minimum, the web thickness should be reduced as the depth increases, but this leads to web buckling. Web buckling considerations being more significant in plate girders than in rolled beams since Rolled beam section are manufactured by keeping depth to thickness ration such that there will be no local bucking in the web. The web buckling of plate girder can be avoided by using the thicker web or by using stiffeners.In this paper feasibility of using stiffeners to reduce the dead load, material and fabrication cost of plate girders is studied. Use of transverse stiffeners lead to creating tension field in the plate girders prior to buckling and this tension field helps to increases the buckling resistance of web. In this paper as per IS: 800:2007 design of plate girder is done. The optimum section for the given load is found out by varying the thickness of web and number of stiffeners in different trials. Finally, the most suitable section for a given load is proposed in this paper

A Study Onmacro Economic Determinants Of NonPerforming Loans In Indian Public Sector Banks

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Ms. Adithi Ramesh | Prof. Dr.C.B.Senthil Kumar

Abstract

The macroeconomic variables will have a serious impact in the success of credit market.Non-performing loan is an important factor that is being considered to monitor the performance of the banks and financial institutions in the credit market. This paper focuses on study of the relationship and significance between Non-performing loans of public sector banks in India and macroeconomic factors such as Gross Domestic Product (GDP) growth, Inflation, Credit growth and unemployment.

A Study Project on Online Monitoring and Controlling of Substation Using SCADA

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Krupa M | Shruthi B

Abstract

Development of nation depends upon electric energy and at present scenario there is large gap between electric generation and load [1]. This gap can be filled with proper control, monitoring and coordinating the distribution components at power sector [2]. In this view, Automation of power transmission system has increasingly been adopted by power utilities worldwide in recent years. As part of its efforts to provide a more reliable supply to the customer and to enhance operational efficiency, the automation of the power system can be achieved by SCADA [3].

A Study to Assess the Family and Social Life among Nurses Working Night Shift Duty at Nizwa Hospital

International Journal of Science , Engineering and Management, Available online 2nd April 2018

Sheikha Mohammed Al-Mukhaini | Vijayalakshmi

Abstract

Background: Nurses as healthcare providers are obliged to work rotation shift to provide the needs of sick people. Nurses working night duty spend all night awake which has a bad effect on them by increasing the load and led to the difficulty to meet their family life and social life needs in the next day. Therefore this study focused on assessing the family life and social life needs among nurses doing night shift in Nizwa Hospital in Sultanate of Oman. Aim: To assess the family life needs and social life needs among nurses doing the night shift. Methods: A descriptive quantitative survey design was used in this study. Data was collected through self-administration questionnaire. Using convenient sampling 100 staff nurses from all the departments were selected for the study. Collected data were analyzed using frequency and percentage. Results: The findings of the study indicate that the majority of the nurses are female (67%) are married (82%), most of them (54%) have 1 to 2 children. Over of family needs, 90 (90%) of the family sleep pattern is disturbed. While 88 (88%) of their family depends on nurses in most of their personal needs. Majority of the respondents 72 (72%) do not have a good relationship with a spouse. 88 (88%) of the subject doing night shift restrict them from attending any social functions in their village. And 47 (47%) of them they are not able to maintain social relationships with their friends or relatives. There are some factors affecting and influencing night duty. Effect on sleep pattern 62 (62%), drowsy driving 33 (33%), are affecting factors wherein the most factors influencing nurses during night shift are able to finish personal morning work 24 (24%), the night off days are good for relaxation and visit beauty centre 17 (17%). Conclusion: Nurses’ family life and social life needs affect by doing night duty but there are some factors which help in the persistence to do night shift and it motivates nurses to continue their service for the patients.

A Study User Behavior Using Phishing Education and Training

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

Ms. Vidya Mhaske-Dhamdhere | Dr. Prasanna Joeg, Dr. Sandeep Vanjale

Abstract

In this paper, we present results of surveys of users on their ability to recognize phishing emails as opposed to legitimate emails. User awareness is one of the most important approaches to phishing detection. We first conducted a survey of user confidence in their ability to detect phishing. We then designed a survey questionnaire that contained some legitimate emails and some phishing emails. We conducted a second survey to test the ability of a sample set of users to detect phishing. The results were mixed. After the second survey, we conducted a training session on the same group of users to train them to detect phishing. After the training we conducted a third survey with a somewhat different questionnaire to test their ability to detect phishing. Our results suggest that training considerably improves the ability to detect phishing. However, a significant minority are still not able to detect phishing.

A Subset Sparse Based Subspace Clustering on High Dimensional Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd July 2018

Prathima V.R | Dr. Fayaz.K

Abstract

- Data mining and machine learning has been an important research topic in recent years. The topic of sparsely distributed data and the various issues related with curse of dimensionality of high-dimensional data, make most of the traditional clustering algorithm, lose action in high dimensional space. Therefore, clustering of data in high dimensional space is becoming the hot research areas. Clustering in data mining can be used as a data exploration or future prediction tool. With the advent of raise in huge data or high dimensional data such as DNA arrays, Images or GPS data, bag-of-words document representation etc., the goal of clustering is to group multiple data points in such way that they can be represented more efficiently for better understanding of the data. In this context we study the pitfalls of high dimensional data clustering concepts and algorithms are discussed then we study the SSC, SSSC, SMRS algorithms. This paper offers a subset based algorithm for automatically determining the optimal number of clusters on high dimensional data. The Main aim of this paper is to design an algorithm with reasonable complexity which computes representatives and clustering high-dimensional data accurately. In this paper we have made the following contributions i.e. designing of algorithm which used the divide-and-conquer strategy, which can able to compute the representatives within reasonable time and this algorithm is named as Hierarchical Sparse representatives.

A Survey of Cluster Ensembles and its Applications: Specific Problem Domains

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th May 2018

Jyoti | 

Abstract

Cluster ensembles have been shown to be better than any standard clustering algorithm at improving accuracy and robustness across different data collections. This meta-learning formalism also helps users to overcome the dilemma of selecting an appropriate technique and the corresponding parameters, given a set of data to be investigated. Almost two decades after the first publication of a kind, the method has proven effective for many problem domains, especially microarray data analysis and its down- streaming applications. Recently, it has been greatly extended both in terms of theoretical modelling and deployment to problem solving. The survey attempts to match this emerging attention with the provision of fundamental basis and theoretical details of state-of-the-art methods found in the present literature. It yields the ranges of ensemble generation strategies, summarization and representation of ensemble members, as well as the topic of consensus clustering. This review also includes different applications and extensions of cluster ensemble, with several research issues and challenges being highlighted

A Survey of Image Mining Techniques for Diagnosing Heart Disease

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

M.Umamaheswari | K.Krishnaveni

Abstract

Image mining refers to a data mining technique which is used to extract the knowledge directly from the images. It supports a large field of applications such as medical diagnosis, agriculture, industrial work, space research and the educational field. Heart disease is one of the popular causes of death in the world. Heart disease diagnosis is a most important challenge faced by medical fields and hospitals. The goal of this paper is to present a study of various image mining techniques and different algorithms used to diagnose the heart diseases

A Survey of Recent Approaches for Detection of Alzheimers Disease

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Arpita Raut | Vipul Dalal

Abstract

Alzheimers is a progressive and irreversible neurological disease. It is the most common cause of dementia in people of the age group 65 years and above. Detection of Alzheimers disease in the early stage is very crucial as it can prevent serious damage to the patients brain. Many different methods have been proposed to detect Alzheimers disease. In this paper, we have surveyed different techniques and approaches for detection of Alzheimers disease.

A Survey of Routing Protocols in Mobile Ad Hoc Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Sahana T S | Sandhya A S, Pooja B N,Priya J, Mrs. Sheela Devi.M

Abstract

Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA. This research paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective is to make observations about how the performance of these protocols can be improved.

A Survey of Various Routing Algorithms for Mobile Ad-Hoc Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

P. Roselin | Dr. M. Sivajothi, Dr.T.C. Raja kumar

Abstract

A Mobile Ad-hoc Network (MANET) is form over wireless media by the various mobile nodes. In other word we can say if various mobile nodes from a network without any infrastructure, such kind of network is known as Mobile Ad-hoc Network. In MANET communication between two mobile devices are performed by routing protocol. This paper presents a coherent survey on routing algorithm of ad hoc mobile networks, with the intent of serving as a quick reference to the current research issues in ad hoc networking. In this survey paper we proved an overview of various routing protocols proposed by various researchers. We will also provide comparative study of all routing protocol to find out the performance of protocol for large MANET

A Survey on a Hadoop Framework for Big Data Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st November 2017

B.Swathi | Dr. P.Niranjan

Abstract

The big data is the idea of the gigantic scope of information, which is being made step by step. In current years dealing with this information is the significance test. Hadoop is an open source proposition which is utilized successfully to deal with the big data applications. The two central ideas of the Hadoop are MapReduce and Hadoop conveyed document framework. HDFS is the capacity system and guide lessen is the programming dialect. Results are created quicker than other customary database operations. A few dialects which encourage us to program the MapReduce system inside brief time frame.

A Survey on Artificial Intelligence In Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

S.Thyanesh Pandi | K.Niranjana, R.Vignesh, R.Abishek, J.Suriya Prabha

Abstract

IOT is the internetworking of things that collects and exchanges information from the environment. AI, on the other hand, is the engine or the brain that will enable analytics and decision making from the data collected by IoT. In other words, IoT collects the data and AI processes this data in order to make sense of it. The AI and IOT systems are working together in devices like fitness trackers and Google Home. AI can be used to make inferences about this data and summarize it before transmitting it to other devices. This would reduce the flood of data to a manageable level. This would enable the attachment of a larger number of devices to the network. This paper describes the advantages, applications, analysis and result of using Artificial Intelligence in Internet of Things.

A Survey on Association Rule Mining using Apriori Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th May 2018

Sneha R. M | B. S. Varsha, G. K. Meghana, Anusha, S Sahitya

Abstract

Data mining refers to the process of extracting useful and interesting knowledge from large set of data. There are many aspects like clustering techniques, classification, association rule mining etc. Among these, association rule mining is the important aspect for data mining. The algorithm’s performance directly effects the efficiency , integrity and effectiveness of ultimate data mining results. Apriori algorithm is one of the influential algorithm for mining association rules. The basic idea of this Apriori algorithm is to identify all the frequent itemsets.

A Survey on Correlation Filter and its Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Neenu Jose | Nandakumar P

Abstract

Correlation filters will find applications in pattern recognition such as biometric recognition, object alignment, action recognition, object detection and tracking. The advanced correlation filters were introduced to offer distortion-tolerant object recognition. The recent major advance in correlation filter design is zero-aliasing correlation filters (ZACFs) that eliminate the aliasing in correlation filter design due to the circular correlation caused by the use of discrete Fourier transforms (DFTs).

A Survey on Efficient Load balancing and mobile data collection for dual data uploading using Clustering for network prolong in WSN

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Tejashree S | Dr. P I Basarkod

Abstract

the wireless sensor network (WSN) can be connected for various application for example, industrial, military application health monitoring, habitat monitoring and so on. The WSN can be utilized for sensor hubs to gather the information at the regular intervals and Energy capacity is a vital perspective in wireless sensor networks. To defeat this issue the proficient method of clustering is utilized to accomplish more data transmission, long system lifetime, less tedious procedure, minimize energy utilization. In this paper, we examine at the load balancing and dual data uploading using clustering technique in wireless sensor networks. To avoid the overloading of any single source and to optimize the utilization of boosting the throughput, minimize the response time in the load balancing method.

A Survey on Electroencephalography (EEG)-Based Brain Computer Interface

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

K.Aparna | R.Chandana Priya

Abstract

In this paper the main objective is to develop a system which allows disabled people to communicate with other persons and helps to interact with external environment and also to establish a communication system which will translate the human intentions reflected by brain signals into analog speech signals those are audible via speakers. Brain–computer interface i.e., (BCI) is a new emerging area is mainly for the patients in the treatment bed. TheBrain Computer Interface will receive brain signals, analyze them, and then translate them into commands those are transfer to output devices which will carry out desired actions. Electroencephalography records the brain’s electrical activity, obtained by firing of neurons within the brain. If, we find out the difference in those low signal frequencies, those will yields to design a BCI. Based on variation in those frequencies, human thoughts can be recognized as a prototype mechanism.

A Survey on Emergency Navigation using Wireless sensor Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 12th October 2017

P.Prittopaul | R.Vijayalakshmi

Abstract

Wireless sensor networks (WSNs) provide emergency navigation services, given their easy deployment and the ability of intelligent sensing and communication. They help people in escaping from a hazardous region safely and quickly when an emergency occurs. However guiding more and more people to the same exit, causes congestion which does not help in timely evacuation. Many a times, trapped people move back and forth during navigation, known as oscillation. Frequent oscillations lead to the people remaining in danger for a longer period of time, and decreases their chances of survival. The evacuation systems must provide shortest and safest navigation path with reduced congestion. In this paper, we give a survey of various emergency navigation schemes. The existing systems are evaluated in terms of parameters such as scalability, congestion avoidance, evacuation time, survival rate, communication cost, reaction to emergency dynamics and navigation efficiency with guaranteed safety.

A Survey on Existing Energy Management Schemes and a Theoretical Approach on Smart Energy Management

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 14th July 2018

Chaithanya S S | Sharen Ranjit, Girish girilal

Abstract

As energy scarcity is the major issue, energy management is the solution. In this modern society, consumer needs power round-the-clock to fulfill that introduction of renewables along with grid power was the solution. Utilization of renewables is to be well established to make it more efficient and smarter. Overview of different methods of energy management schemes is briefed here. A theoretical approach for the betterment of the utilization of renewables along with grid power is the main objective of the paper. This approach will make the system self-reliant and self-learning. This will reduce the human work.

A Survey on Heart Disease Prediction Using Data Mining Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

A.Sahaya Arthy | G.Murugeswari

Abstract

Data Mining is the process of transforming the raw data into useful information for decision making. Medical Data mining has potential to explore the hidden pattern in data set of the medical domain. These hidden patterns can be used for clinical diagnosis and disease prediction. Heart disease is one of the common and major causes for death in India. According to the report of Global Burden of Disease, 1.7 million Indians died because of cardiovascular illnesses. The number of deaths due to cardiovascular illnesses has grown up by 53% since 2005. According to ASSOCHAM-Deloitte joint study, the cases of cardiovascular diseases are growing at 9.5% annually. At the same time, it is considered to be the most preventable and controllable disease. There are certain factors which may cause heart diseases. The factors include change in life style, food habits, mental stress, smoking, alcohol consumption, obesity, blood pressure and diabetes etc. This research paper intends to provide a survey of data mining techniques used in medical field particularly in heart disease prediction. Various research works on association rule mining, classification and Ontology approaches for disease prediction are analyzed and presented in this paper

A Survey on interactive multi-label segmentation using cellular automata

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Monika | 

Abstract

Image segmentation is the process of partitioning a digital image into multiple segments. The goal of segmentation is to change the representation of an image into more meaningful and easier to analyze format. There are various interactive approaches to segment the area of interest from the given image. In this paper a survey on various image segmentation techniques has been performed and the methods are classified and compared as per the techniques used. The results of the segmentations are also compared both quantitatively and qualitatively. This survey provide a base for the future research in field of image segmentation.

A Survey On IOT Based Smart Home

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Prof. Kavita S. Patil | Apurva R. Kokate , Shruti R. Wagh

Abstract

The main goal of this paper is to describe the systems which automatically control the devices through mobile. The various implemented systems are use in the house to control appliances like fan, light, and water pump by just turn ON or OFF the switch from mobile phone .

A Survey on Key Frame Based Video Summarization Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th November 2017

Himani Parekh | 

Abstract

The large amount of videos usage increase the volume of data, more time to access and more man power is required. Video summarization is the solution for this problem. Summarized video can be used to review the important aspect of particular video, indexing and faster browsing. Video summarization techniques are classified into key frame based classification and skim based classification. This paper focuses on process and techniques of key frame based classification.

A Survey on MapReduce for Dynamic Job Ordering and Slot Configaration

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th November 2017

J .Sravanthi | Dr. P.Niranjan

Abstract

MapReduce is a well known parallel registering worldview for vast scale information preparing in groups and information centers. A MapReduce workload for the most part contains an arrangement of jobs, each of which comprises of various guide tasks took after by two diminish assignments that guide undertakings can just keep running in delineate and lessen tasks can just keep running in decrease spaces, and the general execution limitations that guide undertakings are executed before lessen tasks, diverse employment execution requests and guide/lessen opening setups for a MapReduce workload have essentially extraordinary execution and framework use. This study proposes two classes of calculations to limit the influence traverse and the aggregate finishing to time for a disconnected MapReduce workload. Our top of the line of calculations concentrates at work requesting streamlining for a MapReduce workload under a given direct/lessen space arrangement. Interestingly, our inferior of calculations considers the situation that we can perform advancement for outline for a MapReduce workload.

A Survey on Non-Parametric Classification Methods

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Hema Sree Kotari | Ravikumar Penugonda

Abstract

In this modern era, along with the rapid development of computer hardware – increase processing speed and the size of the memory available – there has been a rapid development of data analysis methods that previously were not possible for practical use due to the required computing power. This paper will provide a survey of non-parametric techniques. It does not focus greatly on the technical aspects of each method beyond the headline advantages and disadvantages.

A Survey on Reversible Image Data Hiding with Contrast Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

SK Taj Mahaboob | Shaik Baba Fakruddin

Abstract

The main aim of this paper is to explain different watermarking techniques. In this paper we will give an overview on different types of techniquesused for preparation ofreversible data hiding and explain the significant growth in reversible watermarking and increase of embedding payload in the host image withoutdistortion in many fields. The paper focus on comparative analysis of different watermarking techniques and explaining their significance briefly

A Survey On Secure Connectivity Techniques For Internet Of Things Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Mr. Vikram Neerugatti | Dr. A. Rama Mohan Reddy

Abstract

Internet of things involves network of Nodes (sensors, Actuators, fog, cloud etc). Sensor node is a small in size, computing power and storage capacity is less. Due to this nature of Sensor the security module is not incorporated in it. So IoT Nodes has more scope for the Intruders, to attack the systems by using this weak connection of Nodes. Lot of research work has to do in this area, to establish a secure connectivity among various IoT nodes. While accomplishing the secure connectivity of things in IoT, need to consider all the security parameters like (confidentiality, authentication, integrity, etc.). The existing techniques/ Algorithms for secure connectivity of devices are not developed for nodes that which used in an IoT technology and not deal with all security parameters. This paper addressed the various existing secure connectivity techniques with advantages and disadvantages, that which is used to direct Research towards development of secure connectivity Techniques for IoT nodes.

A Survey on Security Features Based on Some Interactions and TheirRespective Co-Operation in Handheld Devices for Communication

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Arogia Victor Paul M | Numan Shaikh, Sharon M, Anil Sagar T, S. Venkatesan

Abstract

Since from the last decade mobile communication and its usage have grown drastically, also it has become a serious business tool nowadays. Mobile devices are the major platform for the users to transfer and exchange a very huge and critical data for communication. Also most of the communications are based on handheld devices like smart phones, palmtops, tablets etc. These devices are variably used for applications like banking sector, personal digital assistance, remote login, m-commerce, e-commerce, internet access, entertainment and also medical usage. However due to usage of handheld devices rapidly, there might be a security issues which might restrict the usage of mobile devices. This article survey gives some basic glimpses about the security features such as authentication, authorization, privacy, confidentiality, and data securityin handheld devices and it briefs an idea on how to overcome various issues like threats and vulnerabilities that effect the human interactions and their cooperation using handheld devices, and also it provides various solutions to the mobile devices ensuring security.

A Survey on Security Issues in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

D.Divya | T.Lakshmi

Abstract

Cloud computing is a rising innovation worldview that moves ebb and flow mechanical and figuring ideas into utilitylike arrangements like power and water frameworks. Mists draw out an extensive variety of advantages including configurable registering assets, financial reserve funds, and administration adaptability. In any case, security and protection concerns are appeared to be the essential impediments to a wide selection of mists. The new ideas that mists present, for example, multi-tenure, asset sharing and outsourcing, make new difficulties to the security group. Tending to these difficulties requires, notwithstanding the capacity to develop and tune the safety efforts produced for customary processing frameworks, proposing new security strategies, models, and conventions to address the interesting cloud security challenges. In this work, we give a far reaching investigation of distributed computing security and protection concerns. We recognize cloud vulnerabilities, arrange known security dangers and assaults, and present the best in class practices to control the vulnerabilities, kill the dangers, and adjust the assaults. Moreover, we examine and distinguish the constraints of the present arrangements and give bits of knowledge without bounds security points of view. At long last, we give a cloud security system in which we exhibit the different lines of barrier and recognize the reliance levels among them. We recognize 28 cloud security dangers which we arrange into five classifications. We additionally introduce nine general cloud assaults alongside different assault episodes, and give viability examination of the proposed countermeasures

A Survey on Segment Based Evaluation of Co- factor Used in Human Gait Recognition

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th October 2017

Dr. P.S.Smitha | Sruthi Nath C

Abstract

Gait recognition is an effective biometric feature to identify persons from a distance by the way people walk or run. While gait has several attractive properties as a biometric, the greatest disadvantage in gait recognition is to identify an individual with cofactors and in different emotional and environmental conditions. Different views and angles of the camera also constitutes in degradation of the gait identification. Thus different measures and methods have been proposed for enhancing the gait identification in these cases. This paper is study of gait recognition during these conditions and discussing ways for lowering the degradations. This paper presents a literature review of cofactor affected gait recognition and propose a method to identify cofactor affected probes in certain view angles. Recent researches in gait identification techniques are presented in this paper.

A Survey on Sequence Creation in Cognitive Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Bhargavi G | Vidyasagar K N , Bharathi SH

Abstract

Intelligent (Cognitive) radio networks have a large communication spectrum. This is dynamic in nature. This leads to the necessity for main central channel where two nodes can talk to each other and conclude on the parameters for information exchange between each other, for this they need to meet on a pre-decided channel to communicate, this channel where the decisions are made should be decided by making use of the full available spectrum. In order to reduce collisions and also to make use of the entire available spectrum, a protocol must be devised. ETCH (An efficient channel hopping based MAC layer protocol) is proposed for communication establishment between cognitive radio networks. Two other protocols, Synchronous-ETCH and asynchronousETCH, assuming the presence of global clock synchronization and one without the assumption of existence of a global clock respectively.

A Survey on Smart Cities using IoT

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th March 2018

M. Soujanya | R.Sushmitha

Abstract

The city of today and tomorrow is an intelligent city, synchronized, and able to optimize information, its flows and its energies. Smart city refers to using information and communication technology to sense, analyze and integrate the key information of urban operation core system so as to make various demands including livelihood, environmental protection, public security, urban services and industrial and commercial activities Smart response. Its essence is to make use of advanced information technology to realize the city's smart management and operation so as to create a better life for people in the city and promote the harmonious and sustainable growth of the city. With the continuous development of human society, the future city will host an increasingly large population. At present, our country is in a period of accelerating urbanization. The problem of "urban disease" in some areas is becoming more and more serious. In order to solve the difficult problem of urban development and realize the sustainable development of the city, building a smart city has become an irreversible historical trend in urban development in the world today.

A Survey on Streaming Video

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th February 2018

N.J.Satheesh Kumar | Dr. B. Ramakrishnan

Abstract

This study presents a video streaming system for wireless networks that employ effective optimization of the pre-compressed video. Among the different approaches, the video Stream-switching technique is getting wide receiving the data. We assessment the VoD and Live streaming data video in crossing through different paths from compression. The case of multicast video can be delivered to the high performance of the proposed scheme, ie significantly improvement for good channel conditions, while improving is utilization minimized in the low. This routing metric takes a report of geometric proximity and congestion degree in order to enlarge delivery ratio and decrease end-to-end delay, which determines the quality of the delivered video. To offer high playback quality to users by maintaining high effective data.

A Survey on the issues of Refactoring

International Journal of Engineering Research in Computer Science and Engineering, Available online 24th May 2018

Aparna K S | Sai Deepthi.K, Sharan Kumar.R, Syeda Shameemunnisa, Sree Geethika.M

Abstract

In this paper, a tremendous attitude of research towards refactoring the software is presented. This paper presents the areas where refactoring can be applied. The Scope of refactoring, how to refactor, when to refactor, impact of refactoring an a quality of software, different methods used, basic principles in refactoring software artifacts and the related work which needs to improve are presented. This paves the way for improvement, giving rise to many more research fields.

A Survey on Traffic Aware Routing For Less Delay and More Integrity of Data Services in WSN

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Deepashree K N | Dr. Bharathi S. H

Abstract

Applications performing on the same Wireless Sensor Network (WSN) foundation more often than not has distinctive Quality of Service (QoS) necessities. Two fundamental interest are low linger and high information accuracy. Be that as it may, by and large, these two requests cannot be satisfied at the same moment. In this paper, taking into account the idea of potential in material science, we propose IDDR, a multi-way dynamic directing calculation, to tackle this issue. By developing a virtual half and half potential field, IDDR isolates bundles of utilizations with unique QoS requests as indicated by the weight relegated to every parcel, and courses them towards the sink through partitioned ways to improve the information loyalty for trustworthiness touchy applications and additionally diminish the end-to-end delay for postponement delicate ones. Recreation results exhibit that IDDR gives information respectability and postponement separated administrations.

A Survey on Travel Based Application using Social Media

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Shanker Shalini | Dr.M.Sheerin Banu

Abstract

Big data provides analysis of large amount of dataset and accurate result can be obtained using this dataset analysis. When considering travel application many user opt for static travel planning without any now feature that incorporates in the application. Blindly they agree any travel plan thats been listed in the application. In this paper various analysis is done and survey is been done to make user friendly travel application so that user can specify their Point Of Interest (POI) and as such planning is done dynamically based on users location with the help of geo-tagging and collaborative filtering. We find here what are all recommendation system that can suitable to incur in the travel application with the help of geo-tagging and location based filtering. Thus to find user friendly travel based application this survey is done.

A Survey on Twitter as a Corpus for Sentimental Analysis and Opinion Mining

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th March 2018

Roopa V | Induja K, Abdul Basith P, Manikandan R.M, Deepak P.M

Abstract

Today, Microblogging is the most popular statement tool among Internet users. Every day people share their opinions on different aspects of life. Therefore, these websites have become rich sources of data for opinion mining and sentiment analysis. Because microblogging has appeared comparatively, there are few research works that were dedicated to this topic. In our paper, we focus on using Twitter, the most popular platform, for the task of sentiment analysis. It shows how we group a corpus for sentiment analysis and opinion mining which discovers phenomena of the corpus by linguistic analyzing. Using corpus, we build a sentiment classifier that is able to determine positive, negative and neutral sentiments for a document. Experimental evaluations show that our proposed techniques are efficient and perform better than previously proposed methods. In our research, we worked with English, however, the proposed technique can be used with any other language.

A Survey on User Behavior Clustering in Multimedia Social Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 25th November 2017

Swetha Koduri | T. Satya kiranmai

Abstract

This Survey investigates how quantitative user data, extracted from server logs, and clustering algorithms can be used to model and understand user-behavior. The Survey also investigates how the results compare to the more traditional method of qualitative user-behavior analysis through observations. The results show that clustering of all user data, only a small subset of users increases the reliability of findings. However, the quantitative method has a risk of missing important insights that can only be discovered through observation of the user. The conclusion drawn in this survey is that a combination of both is necessary to truly understand the user-behavior.

A Survey on Various Image Compression Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Mohammed Salim M.K. | Nandakumar P

Abstract

Image compression technique is widely used in multimedia applications such as image, video, audio data and medical field. Image compression aims to reduce the redundancy of an image data and reduce the storage space of an image. Different image compression techniques were proposed to achieve high compression ratios and high image qualities in low computation time. This document presents the review of various lossless and lossy compression techniques.

A survey on various types of Sentiment Analysis Approaches from Big data

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd October 2017

Navaneethakrishnan P | Ravikumar B

Abstract

In recent years, Big Data Analytics has become an essential topic for researchers.It gains more popularity due to immense data set that becomes overwhelming to users. Therefore itis essential to extract opinions from the internet and predict online customer’s preferences, which could prove valuable for economic or marketing research.This inspire the researcher to develop a system that can identify and classify opinion the huge amount of text data based on the approach of Sentiment Analysis or Opinion Mining. The paper presents a survey covering the techniques and methods in sentiment analysis and challenges appear in the field. Sentiment analysis is done in data from applications like social network. There is a need for analyzing the sentiments of data and thereby defining the behaviour of the user. This involves feature extraction and thereby developing relationship trees within the scope of data.

A Survey on Vehicle Classification Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th April 2018

G.Sundaravalli | K.Krishnaveni

Abstract

Vehicle classification has emerged as a significant field of study because of its importance in the variety of applications like surveillance, security system, traffic congestion, avoidance, accident prevention etc. So far numerous algorithms have been implemented for classifying vehicles; the aim of this paper is to give the opportunity to the researcher to become closely familiar with the methods used for classification of vehicles. Methods based on Image Processing, Neural Networks, and Data Mining are reviewed, discussed and compared. This survey emphasizes that Canny Edge Detection technique gives the better solution than other edge detective techniques in terms of vehicle identification. The Fuzzy c-means clustering and K nearest neighbor algorithms prove better for extracting the features of a vehicle like an area, length-width ratio etc

A Survey on Water Quality Analysis for Industrial Application under IOT Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

P.Kalamani, | Divya R Krishnan, Meghana B.V, Mary Theresa M, Himadri Sengupta

Abstract

Internet of Things (IoT) is global network of “smart device” that can sense and interrelate with their environment using the internet for their communication and interaction with users and other systems. The traditional method of testing Turbidity, PH & Temperature is to collect samples manually and then send them to laboratory for analysis. However, it has been unable to meet the demands of water quality monitoring today. By manually monitoring the water quality is very time consuming as well as its complicated to get water parameter in real time. To overcome this a set of Monitoring of Turbidity, PH & Temperature of Water quality are going to be placed in the reservoir as the variations in these parameter will get to know the presence of pollutants. In this paper a new approach has been adopted to analyze the quality of the water under IoT environment. The proposed system contains data acquisitions node, controlling unit as ARM, base station and monitoring unit, where all these units are connected to each other .Data can be collected from various sensor and each sensors has its own way to read the data about physical phenomenon ,so necessity to write diverse code for each sensor for data collection procedures. Meanwhile to control and to do some pre-processing work MCU unit has been adopted, after data collection from various sensor such as its Temperature, Turbidity, PH, etc at base station is sent to display on monitoring node and also compared with standard values .By continually monitoring water quality people get awareness locality water condition so we can minimize its critical effect on human life ,filed, animals etc with high frequency.

A survey on Wireless Sensor Network Attacks And Defenses

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Pramod Nath | Pragya Rajput

Abstract

Wireless Sensor Networks (WSN) are combination of several thousand sensor nodes that have several capabilities such as to detect, to sense, to monitor, to process and to compute. WSN have many applications in real time scenarios such as in military, industries, health care and so on. WSN has infrastructure less structure, so the ability to cope with the node failure, fault tolerance and its security attack are the main concern. The sensor nodes are more vulnerable to security threats and attacks because of the harsh and hostile environment. Efficient implementation of different security protocols has huge impact to adverse the potential threat. The main aim of this paper is to present security issues and challenges faced by WSN. This paper explains attacks in WSN, its flaws and their countermeasures that can be used to handle the pitfall.

A Survey Paper on Diabetes Retinopathy

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th September 2017

Dr.Ruksar Fatima | Laxmi Math

Abstract

The retina is the only part of the human body where the blood circulation can be observed directly. Several systemic diseases can affect the retinal blood vessels, which makes the retinal image analysis a potential diagnostic tool, as it allows assessing vascular changes in an easy and non-invasive way. Retinal image analysis is one of the active research areas with the goal of providing computer-aided methods to help the quantification, measurement and visualization of retinal landmarks and biomarkers. In diabetic retinopathy (DR), the blood vessels often show abnormalities at early stages [1], as well as vessel diameter alterations [2]. Changes in retinal blood vessels, such as significant dilatation and elongation of main arteries, veins, and their branches [2, 3], are also frequently associated with hypertension and other cardiovascular pathologies.

A Survey Report on Elliptic Curve Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th January 2018

Ajit Karki | 

Abstract

Information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability).During the last three decades, Computer networks created a revolution in the use of information. Information is now distributed. Authorized people can send and receive information from a distance using computer networks. Although the three above mentioned requirements- confidentiality, integrity, and availability- have not changed, they now have some new dimensions. Not only should information be confidential when it is stored; there should also be a way to maintain its confidentiality when it is transmitted from one computer to another. The scorching enlargement in the use of mobile and wireless devices demands a new generation of Public Key Cryptography schemes that have to accommodate limitations on power and bandwidth, at the same time, to provide an ample level of security for such devices. Elliptic Curve Cryptography (ECC) is rising as an attractive public-key cryptosystem for mobile/wireless environments. Compared to long- established cryptosystems like RSA, ECC offers the same security with smaller key sizes, which results in faster computations; lower power consumption, as well as memory and bandwidth savings. This is particularly useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. Nevertheless, the true crash of any public-key cryptosystem can only be evaluated in the context of a security protocol. Elliptic Curve Cryptography (ECC) has become the ideal choice for the insidious computing environment because of its suitability to the devices having limited bandwidth, battery power, less computational resources and less memory.

A Survey: Detection Techniques on Selfish & Multi-Selfish Attacks in Cognitive Radio Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Vanitha K.C | Dr. Bharathi S.H , Vidyasagar K.N

Abstract

Cognitive radio network is a rare communication technology which suggests the Unlicensed persons to use more amount of bandwidth existing in the spectrum which is not used by licensed persons. CRN identifies large number of available communication channels in spectrum very efficiently. The free spectrum of CRN is used by the users who are Unlicensed without harming the licensed users (PU) which are involved in communication. The main goal of CRN is to solve the problem of Spectrum Scarcity by making the unlicensed user to use the spectrum when it is free that means when the licensed user (PU) will not use the spectrum that time the unlicensed user can use it dynamically. Advantage of CR is to provide efficient data transmission without the breakup in the comminucation.CRN faces problems on selfish attacks which are carried out by the SU which sends fake information to the person near to SU as that to occupy all free channels available in spectrum. Selfish SU Nodes and Multi-selfish SU Nodes are degrading the performance by sending fake message to closer nodes of CRN. Here we suggested how to identify Selfish and Multi-selfish SU nodes by the two different algorithms based on survey.

A Switched Capacitor based Multilevel Inverter using Stepped Waveform Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

P.Anilkumar Reddy | G.Ratnaiah

Abstract

It is pretty preferable to adapt high frequency (HF) transmission rather than low frequency AC power distribution systems (PDS).Because HF inverter acts as source side in HFAC PDS. A new switched capacitor (SC) based multilevel inverter (MLI) is proposed in this paper which is designed by SC at frontend and H-Bridge backend. SC is connected in series and in parallel to increase the number of voltage levels. With increase in number of voltage levels total harmonic distortion (THD) can be reduced. A stepped waveform method is proposed in this paper to determine the switching angles. The circuit topology, stepped waveform technique, operation, Fourier analysis, parameter determination and topology enhancement are examined. An experimental prototype with output frequency of 25 kHz is implemented to compare the results.

A System for Picture Co-Segmentation Maximum Normal Subgraph Co-Ordinating

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 27th November 2017

Kasarla Mounika | Huma Afreen

Abstract

Co-segmentation is the issue of all the while partitioning numerous images into areas (sections) relating to various object classes. In this paper, the principle focus is to discover what is "normal" in an arrangement of pictures. So we utilized District Nearness Chart (Cloth), Standard Most extreme Normal Subgraph (MCS) Calculation also as Region Co-developing (RCG) strategies for effective finish objects.

A Systematic Performance of Various Multi Class Imbalance Data Classification in Data Mining

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th April 2018

Ganesh.T | Nirmal Kumar.A, Sankara Gomathi.S

Abstract

The usage of data is increasing day by day. There is a huge amount of data storage is required for handling the millions of twits, shares in social networks (twitter, facebook, WhatsApp, and youtube) per second. Databases are playing a vital role in data warehousing and mining. The process of storing the data in large repository place is known as Data Warehousing. Nowadays, Search Engines are struggling to follow the Search Engine Optimization techniques. So there is a pressure for the data analyst to fetch the data from the data warehouse efficiently. The task of classification with imbalanced datasets have attracted quite an interest from researchers in the recent years. Accordingly, various classification techniques are used to handle the newly arrived large amount of data. So many applications have been designed to address this problem from the different perspective such as data pre-processing, algorithm modification and sensitive learning. The problem of constructing fast and accurate classifiers in large data set is an important task in data mining and knowledge discovery. This paper illustrates the various classification techniques and also to improve the correctness of classifier for Classification Techniques in Data Mining

A Theoretical Study of Magnetic Impurity Effect on Superconducting Properties of Manganese doped MgB2

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Gargee Sharma | Smita Sharma

Abstract

In the present study we investigated the theoretical calculation of Superconducting state parameter (SSP) by doping of MN on MgB2 superconductor for concentration (x=0.006, 0.007, 0.014, 0.016, 0.020). We use Ashcroft's pseudo potential in conjunction Random phase approximation (RPA) dielectric screening function with methodology based on BCS- Elias berg Mc. Millan framework in which material properties like electron-phonon coupling strength (?) and Coulomb pseudo potential (*) are obtained from the knowledge of electron-ion pseudo potential. The super-conducting state properties like transition temperature (TC), isotope effect exponent (?) and interaction strength (N0V) are then obtained by using the values of ?, * and relevant to the superconductor .It is also observed that addition of Manganese to superconductor MgB2 causes the parameters ?, *, ?, N0V, TC decreases with increasing in Manganese concentration. Present calculation also observed that TC for alloys Mg1-xMnxB2 is excellent agreement with the experimental results. It is observed that the increase in doping concentration of MN causes all the superconducting parameters to decrease. This suggests decrease in superconducting behavior of MgB2 due to effect of magnetic impurity MN.

A Thermo Electric Heating Based Solar Powered Egg Incubator For Remote Areas

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

VinuSankar | Rani Chacko , Anish Benny

Abstract

Incubators are devices which provides virtual atmosphere for egg hatching. Many conventional egg hatching mechanisms are existed in the early days and in nowadays electrical incubator become a replacement for conventional egg incubators. Due to high initial and operating cost it is not accessible for small scale poultry farmers. In this thesis a new thermo electric heating based solar powered egg incubator with closed loop temperature and humidity control, egg turning mechanism, effective ventilation is introduced. The cooling feature of thermo electric module can be utilized for refrigeration applications.

A Travelogue of VAR System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Dhanya G S | Yamini P , Nithya N , Radha R Anusha Suresh

Abstract

This paper describes the design, development and testing of an AR system that was developed for aerospace and ground vehicles to meet stringent accuracy and robustness requirements. The system uses an optical see-through HMD, and thus requires extremely low latency, high tracking accuracy and precision alignment and calibration of all subsystems in order to avoid misregistration and swim. The paper focuses on the optical/inertial hybrid tracking system and describes novel solutions to the challenges with the optics, algorithms, synchronization, and alignment with the vehicle and HMD systems. Tracker accuracy is presented with simulation results to predict the registration accuracy. A car test is used to create a through-the-eyepiece video demonstrating well-registered augmentations of the road and nearby structures while driving. Finally, a detailed covariance analysis of AR registration error is derived.

A Unified Fuzzy Control Strategy used in Distributed Generation For the 3- ⱷ Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 10th October 2017

M.sivaganga | P. Raja sekhar

Abstract

This paper is representation a unified controller stratagem intended for DG during equally grid tied and island modes. The current references generation part module is analyzed a unified controller stratagem in both modes. The proposed controller strategies compose of a novel, voltage loop with an inner inductor, current loop within the synchronous reference frames. The module elements preserve analyze through two aspects. Primary, through introducing P compensator with Q-axis furthermore PI compensator with D-axis correspondingly, an internal inductor current loop controller is activating in the grid tied mode and preserve be mechanically inactivated upon occurrences of island. Thus, for the detection of uncertain islanding or two different controllers modes there is no want for two switches and change from the grid tied mode toward the island mode, the load voltage worth is able to enhance. The module next part is to nearby the load current, feed forward in direction of compact with the problem caused through the non-linear local load, in these, not only the waveform of the grid current inside grid tied is enhanced, but also the worth of the loaded voltage inside the island mode is enhanced. In conclusion the effectiveness of the propose controller stratagem and fuzzy control are validated through the simulation results.

A Unified Metric for Opportunistic Routing in Wireless Mesh Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Harikishore S | Dr.V.Sumalatha, P.Jayarami Reddy

Abstract

In wireless mesh networks, the routing of packets from source to destination is crucial and challenging task. The wireless mesh networks find applications in disaster management, video on demand, intelligent, health care systems, etc. Various routing protocols exist in literature to improve the efficiency of the wireless mesh networks calculated in terms of reliability, cost, throughput, error rate, etc. The opportunistic routing proves to be more efficient protocol best suited for wireless mesh networks as it avoids duplicate transmission and improves performance of the network. The routing metrics are essential to evaluate the best possible path for packet delivery. This paper conveys the essence of the existing metrics used for analyzing the routing protocol considered for evaluation. Further we introduce a new opportunistic routing metric called Unified Expected Distance Progress with Successful Transmission Rate (UEDPSTR) which is compared with the characteristics of the network.

A Vehicle for Physically Challenged

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Karthikeyan.K | Shrenik.V , Manikandan.G Pillai , Madhushankar Subramonia , Ramachandran.S

Abstract

The aim of this project is to make a vehicle especially for people who have lost their hands due to some accidents in some point of time in their lives but this vehicle can be upgraded for people who have lost their legs as well with some modifications in the initial design. The specialty about this vehicle is that the steering, acceleration as well as the braking system is designed to be operated using the legs of the driver. This project has been an attempt to change the lives of the above mentioned section of the society. Changes have been done in the steering of a vehicle. A customized fork bolt has been designed for front wheel. The fork bolt is of larger length than usual and over this accelerator and brake pedals are placed on each side of the extended fork bolt. The pedals are attached to a foot rest for the comfort of the driver. The comfort of the driver has been taken care of by providing a comfortable seat and other safety precautions which shall protect the driver from any accident, etc. Through this vehicle a purpose is given to the physically challenged as using this vehicle, they would be able to help in transportation and give their contribution for the development of the society in the larger scale.

A Vicinity Overhaul Protocol for Estimating the Dropped Packets in Wireless Sensor Platforms

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Rajesha N | H L Viswanath

Abstract

Environment checking is utilized to distinguish crustal developments, approaching tidal waves, contamination (global warming), an Earth-wide temperature boost, and numerous different truths that are committed to influence human lives. Sensor networks for environment observing can comprise of segment and/or floor sensors, conceivably associated with berthed floats giving integration back to the region. When all is said in done, these sensors are extravagant. Sensor network architecture is a going fordependent point of comparision. Models/Algorithms that were proposed for remote sensor systems are appropriate for this inventive atmosphere, along with can't be connected it with no varies otherwise still a totally innovative invent. The main principle implementations of sensor networks are region upgrade as well as checking the encompassing environment.

A Wireless Machine Gun for Self-Defence

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 11th June 2018

M.H.Gholve | Suraj S. Ombale, Akshay V. Parthe, Ram P. Shahapure

Abstract

Now-a-days we use manual method on the borders of the country or during wars i.e. the soldiers continuously observe any of the terror movement on the actual line of control. These systems are not safe for the soldier’s life and there are ample of chances of mistakes and dangers. The Automatic Machine Gun is mainly designed to provide remote accessibility using wireless technology (RF Module) by using ATmega328P microcontroller which is control machine and robot for land soldiers in battle field.The aim of the proposed system is to build a system which will offer the world’s most complete line of remote armed delay/denial and unarmed reconnaissance platforms. It is designed to keep enemy out of the line of control. This system can be very useful in ground level combat and save most worthy human life

Aadhaar and Server based Electoral system

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Yugansh Garg | Sakshi Mishra

Abstract

This paper describes an advance Aadhaar and server based electoral system for Indian elections. The voting systems in an easier way that all voter can cast votes via biometric Aadhaar based authentication .It provides a higher security pre-casting which could reduce the chances of temperance as a simultaneous backup is created at State/Central level servers. In this system we renounce the use of traditional voter ID cards and election voter verification list. This method would help us to eliminate invalid votes, ends booth capturing and makes counting easier, faster and accurate

Abandoned Object Detection Based on Statistics for Labeled Regions

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Miss.Snehal B. Dahivelkar | Prof. S. B. Borse

Abstract

Many public or open areas are facilitated with cameras at multiple angles to monitor the security of that area for keeping citizens safe. This is known as the surveillance system. Terrorism & global security are one of the major issues worlds facing now days. Abandoned object detection is an essential requirement in many video surveillance contexts. terrorist attacks involving some suspicious bags, box, or any other thing which are left unattended at railway stations, shopping malls, airports or any other public venue, with the rising concern about the security in public places abandoned object detection become very useful system to detect and recognize the suspicious activities that might dangerous to public safety. The most challenging task in video surveillance system is to detect such kind of suspicious bags. So, for that purpose it is necessary to have an efficient threat detection system which can detect & recognize strongly dangerous situations. Many methods were employed for detection of unattended objects but in this paper our focus is on the detection of abandoned objects in video surveillance system. The goal of this project is to design and implement a system which will be able to detect abandoned luggage using the captured videos from the camera as the input of the system. The system realizes image segmentation and image tracking, creates blobs of Objects, labels the blobs based on the shape and size of binary blobs and accordingly the status of baggage is defined in order to take appropriate action. The complexity of the problem arises from obstructions present in scene, lightening conditions & shadows. Our system is able to successfully overcome these difficulties to obtain impressive results.

Abnormality Feature Extraction in the Spinal Cord MRI Using K-Means Clustering

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

S.Shyni Carmel Mary | S.Sasikala

Abstract

Research on Medical Image proposes an efficient platform for automatic analysis and detection of any Deformations in a given medical image data set especially in Spinal Cord for an effective and better understanding of diagnosis. The abnormality of the spinal cord may include Tumor, Disc a hernia, Fracture, swelling etc., which has been detected from any given modality of Medical images such as MRI, CT, and fMRI etc. In this work, Automated Decision support system is introduced for fast and accurate analysis which will help to confirm the existence of affected part of the Spinal Cord MR image. It has two phases. Phase I: Identifying any anomaly features or distortion is found to have existed in the given image or not by using histograms. Phase II: Involves in Clustering of the image which is used to find the depth of the existence of the calcification in the MRI Spinal Image. The performance of the algorithm and the time taken to complete every cluster phase is analyzed. Further, the algorithm’s efficiency is being observed to prove that it gives a perfect accuracy

AC Solar Generator without Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 28th March 2018

Rahul B. Gaikwad | Mayur Kore, Dr. G.H. Agrawal

Abstract

Due to increase usage of electrical energy day by day energy demand of world is increased. So energy reduction is another problem to overcome this problem we need to find another source like non-conventional source which is easily available. Solar panels today produce a dc power which has to be first converted into ac to mostly used in business and home appliances. Solar panel becomes very expensive when we add this solar panel with the joint of inverter and phase synchronizers in addition to that power loss of different component that is used in dc to ac conversion. This paper reports a new technique for the generation of ac power from solar directly without the inverter. By this technique, we can remove power loss due to the inverter. We can generate a sinusoidal waveform of any freq by controlling the speed of dc motor this is achieved by PIC microcontroller. The control of dc motor play vital role in the project. PWM technique can be used for the speed control of dc motor by using the 89c51 microcontroller and motor drive L293D the L293D is driven by PWM signal generated by 89Cs51 this work is practical and feasible

Accelerating Batched Perfectly Stirred Reactor (PSR) Calculations Using General Purpose Graphics Processing Unit (GPGPU) Computing

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th June 2017

Sudip Adhikari | Alan Sayre , Abhilash J. Chandy

Abstract

Detailed analysis of efficiency and pollutant emission characteristics of practical turbulent combus- tion devices using complex combustion kinetics often depend on the interactions between the chemistry of both gaseous species and soot, and turbulent flow char- acteristics. Modeling of such combustion system often requires the use of chemical kinetic mechanisms with hundreds of species and thousands of reactions. Per- fectly stirred reactors (PSR) are idealized reactor en- vironments, where the reacting species have high rate of stirring, and the combustion products are uniformly distributed inside the reactor. The fundamental equa- tions describing a PSR constitute systems of highly nonlinear algebraic equations, due to the complex rela- tionship between the net production rate of the species and the species concentration, which ultimately makes the equations stiff, and the solution of such equations become highly compute-intensive leading to the need for a efficient and robust solution algorithms. Graph- ics processing units (GPUs) have widely been used in the past as an effective alternative to central process- ing units (CPUs), and highly parallel threads of GPUs can be used in a efficient manner to improve the al- gorithm performance for speeding up the calculations. A highly parallelized GPU implementation is presented for a batched calculation of PSR model.

Acceleration Control with Latitude and Longitude & Toll pay Transactions on Mass and RFID Method

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

G.Pavan Kumar | N.Dilip Kumar

Abstract

Now- a- days the usage of vehicles are increasing day by day in human life. Every home is having at least one or two vehicles, as the traffic has been increasing in the present world, due to increase in number of vehicles there is a probability of more number of accidents. We are having a more number of technologies to reduce the number of accidents. The method involves in this paper have more intelligent and interactive methods for avoiding the accidents. The proposed system is not involved in framing the protocol to avoid accidents, but, involved to implement a system to control the speed of the vehicles. This method provides an alternating system using a GPS technology (using latitude and longitude) that controls vehicle speed. Most of the tolls collect the pay using the type of vehicle, due to this an empty passenger vehicle has to pay the same amount as a full occupancy vehicle. To avoid this type of variation in payees a different method used, so as to get benefited by the owner of the vehicle, hence the proposed system deals with toll pay based on the mass using Load cell technology and RFID.

Accident Avoidance During Poor Visibility Conditions

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd March 2018

D.Manoj Kumar | Mugdha, Shahzeb F. Ali, G. Sreeja, S.R Siddharth

Abstract

T With the dramatic increase in population, the vehicles on the road have increased too. Hence, it has become a necessity to provide a means for a safer and more convenient traveling experience. The present paper focuses on providing a technology which will help people in navigating through roads where visibility conditions are poor and they are more prone to accidents like, in hilly areas where there are blind turns and in foggy weather conditions where visibility is nearly zero.

Accident Avoiding System for Heavy Cutting Machine

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

SachinAnant | BiradarVinayak T., Basavaraj N. , Pramath N P , Sharat VD

Abstract

The aim of our project is to take a system wide approach to preventing the machine accident.The system includes not just the machine and the operator; but rather it includes everything from the initial design of the machine to the training of every one that is responsible for any aspect of it, to the documentation of all changes to regular safety audits and finally a corporate culture of safety first. Design is the part of a machine life where the greatest impact can be made in relation to avoiding accidents. The designer should ensure that the machine is safe to set up and operate, safe to install, safe to maintain, safe to repair and safe to decommission. Although safe operation is usually at the forefront of a designer mind safe maintenance and repair should also be a high priority. Around 50% of fatal accidents involving industrial equipment are associated with maintenance activities and design contributory factor in some 32% of these fatalities.

Accident Detection and Anti-Theft for Automobiles Using Bump Sensor, GPS and GSM Modules

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th May 2018

Sharath Kumar K | Swetha S, T Mounika, Soumya E, Kavitha Juliet

Abstract

The objective of this paper is to detect the accident of an automobile and theft of an automobile. The accident and anti-theft module is integrated the in automobile where the module detects the occurrence of accident or theft of vehicle. This reduces the loss of life or theft of vehicle is detected by android application. The accelerometer sensor and bump sensor detects the accident. The theft of the vehicle is detected by vehicle tracker android application which is provided to the owner of vehicle. If an automobile is met with an accident then the sensors will be activated and the location of the accident will be sent to emergency stations. If the vehicle has been stolen, then the owner of the vehicle will receive the SMS and owner can stop the vehicle.

Accident Forecast Modeling of Oil and Gas Industries: A Research Proposal

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th June 2018

Yogesh K. Mogal | Dr. Santosh B. Rane

Abstract

The oil and gas industry is a major sector among other sectors and causes dangerous accidents. Therefore, the improvement of safety and the prevention of accidents plays important role in oil and gas industry. For analysis of accident or the identification of potential hazardous sources, accident forecasting is more and more important because of occurrence of frequent accidents. The Number of researchers developed different models depending on the available historical data based on past accidents for accident prediction & prevention. The Purpose of this paper is to present a research proposal on accident forecast modeling of oil and gas industries

Acculturation and Changing Food Culture in Kerala

International Journal of Science , Engineering and Management, Available online 26th September 2018

Arya Balachandran | 

Abstract

Indian Food Culture cannot be accounted as a single homogenous one. It varies with states, religions, castes, economic status, geographical peculiarities, availability of products etc. Globalisation and the increase in migrant population have brought in changes in the food patterns of Indians. Each community/ethnic group in India has specific foods which are passed on to their future generations. They are symbolic of the culture and tradition of that particular group. Indian Cuisines are noted for the use of spices and flavours. Kerala, the land of spices has a food culture different from the rest of India which is a combination of multiple cuisines. With the Western, Eastern and other regional influences, food culture in Kerala has underwent many alterations. Acculturation in India has a history which spans from the colonial period under Britain to this period of large corporations. With the merging of cultures, there happens a modification of the diet by retaining traditional food culture and incorporating new food patterns.This diet substitution can affect the health, economy, environment and culture itself adversely. The changes in food culture as a result of acculturation and its consequences form the crux of the paper.

Accuracy of speech emotion recognition through deep neural network and k-nearest

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th March 2018

R.B Pradeeba | K.Tarunika, Dr.P.Aruna

Abstract

Emotion is a positive or negative state of a person’s mind which is related to physiological activities. The main objective of the paper is to apply Deep Neural Network (DNN) and k-nearest neighbour (k-NN) in recognition of emotion from speech-especially scary state of mind. The most precise model will be utilized to generate alert signals through the cloud. Health care system and in particular intensive and palliative care is supposed to be the area of application. Utterance level is the main feature for analysis with special emphasis. Raw data collection, conversion of acoustic signals to waveforms, probable emotion classification and recognition using databases existing, creating alert signals through the cloud is the sequence of steps followed. The finding of the paper is a fruitful contribution to the palliative care system.

Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th April 2018

V.Neeraja | N.Koteswara R, T.Manjari, P.Yamini, V.Keerthana

Abstract

Secure data deduplication can significantly reduce the communication and storage overheads in cloud storage services, and has potential applications in our big data-driven society. Existing data deduplication schemes are generally designed to either resist brute-force attacks or ensure the efficiency and data availability, but not both conditions. We are also not aware of any existing scheme that achieves accountability, in the sense of reducing duplicate information disclosure (e.g., to determine whether plaintexts of two encrypted messages are identical). In this paper, we investigate a three-tier cross-domain architecture, and propose an efficient and privacy-preserving big data deduplication in cloud storage (hereafter referred to as EPCDD). EPCDD achieves both privacy-preserving and data availability, and resists brute-force attacks. In addition, we take accountability into consideration to offer better privacy assurances than existing schemes. We then demonstrate that EPCDD outperforms existing competing schemes, in terms of computation, communication and storage overheads. In addition, the time complexity of duplicate search in EPCDD is logarithmic.

Acoustoelectric Effect In Solid State Materials and Devices

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Awadhesh Prasad | 

Abstract

Acoustoelectric effect is the appearance of a dc electric current, when an acoustic wave passes through a conducting medium. This paper reviews the study of Ultrasonic stress on the semiconductor materials and devices used in various scientific and other measurements. A historical review of earlier findings is also reported with special reference to associated mechanisms. Ultrasonic stress studies in solid state devices require further attention and the work done in this area is also discussed. Different kinds of the mechanism, interpretation responsible for the change in the characteristics of the solid state devices and materials have been discussed. Ultrasonic stress produces a pressure effect on a target object placed in the ultrasonic field. Ultrasonic wave may be regarded as a coherent beam of phonons, absorbed in front of the material. In terms of the charge carriers, an electron hole pair is created due to the Ultrasonic field.

ACT System In Railways using Actuator

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 6th July 2017

Shanthosh Dhanajaya | SanthoshKumar B R,Vinod K,PrasannaKumar E, Prof. K V Malini, Prof. Vennila D A

Abstract

The main purpose of this paper is to detect the obstacle on the curved railway track and to take preventive step to save the lives. The major problem in the obstacle detection is at the curved portion of the track. So this paper provides the detection process in every case accurately. Our focus is on systems where the sensors are fixed on the railway sleepers of curved portion, were it can detect the obstacle i.e., living and non living objects and communicate with the loco pilot through IOT technology to stop the train automatically. For backup protection actuators are used either it can be pneumatic or hydraulic blowers. The solution to prevent these accidents is to create early warning detection device for locomotive driver before the collision or accident occurred so that locomotive drivers can avoid them.

Active And Reactive Power Control Of 3 Phases DFIG By Using Vector Control

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Abhishek Lokhande | Sagar Kekade , Vaibhav Thakare , Mayur Deshmukh , Prof. J. D. Patil

Abstract

This paper presents vector control of grid-connected wind turbines; also the second goal of this research is to survey the vector control for wind turbines with doubly-fed induction generators (DFIGs) when a short circuit faults in grid happens. In fact in this paper, vector control of stator-flu x is applied for stator- and rotor-side converters in order to control of active and reactive powers simultaneously, and to keep the DC-link voltage constant. Also the method performances are tested in different cases.

Active and Reactive Power Control of Three Phase Grid Connected System with Proportional-Resonant Controller by using SVPWM Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 12th October 2017

Peddinti Raja | 

Abstract

This paper presents detailed analysis of operation and design of Proportional resonant (PR) controller by using SVPWM technique. On the basis of LCL filter, double-loop current control scheme with the proportional-resonant method is simulated. The proposed control method can reduce the steady-state error of the current, and eliminate the impact of the grid frequency offset on the net current, and the system oscillation caused by the resonance frequency can be decreased, too. Therefore, the stability and robustness of the grid-connected system are improved Under Unbalanced conditions Active and Reactive power are controlled and regulated by current –loop on stationary reference frame by using PR controller along SVPWM, and results are used to provide a comparison between the different control strategies. The analysis is performed on a traditional three-phase voltage source inverter, used as a simple and comprehensive reference frame. Among the conclusions are the feasibility and great potential of PR particularly for power systems with a reduced number of switching states. In addition, the possibility to address different or additional control objectives easily in a single cost function enables a simple, flexible, and improved performance controller for power-conversion .The operation and performance parameters are compared for two models under unbalanced conditions. The study was done by simulating the system on Mat lab for 3KW grid connected system .Finally, both simulation and experimental results are presented in conclusion.

Adaptive Cruise Control

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Aditya Badave | Vivek Gondil, Devank Joshi

Abstract

Adaptive Cruise Control (ACC) is Assistive Control System used in a vehicle, to explain the concept of Adaptive Cruise Control; we designed a prototype which is based on microcontroller. This helps to understand the working of Adaptive Cruise Control. This paper gives brief information about Adaptive Cruise Control and how it works.

Adaptive Electromagnetic Braking in Vehicle to Avoid Accidents

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

A.V.Todkar | S.A.Nachankar, P.G.Survashi, S.R.Patil , A.V.Kamble , Miss.P.M.Koli

Abstract

An electromagnetic braking is a new and revolutionary concept. Electromagnetic braking system is a modern technology braking system used in commercial vehicles. It aims to minimize the brake failure to avoid the road accidents. It also reduces the maintenance of braking system. So for reliable braking the proposed scheme use the electromagnet while the function of this electromagnet is to develop a magnetic force to engage the brake .In that ultrasonic sensor measure distance between vehicle and obstacle and Proximity sensors measure the speed of vehicle. Comparing the distance and speed, the 89S52 microcontroller gives the signal to relay and electromagnet when safety distance is reduced than safety limit. Constant speed can be achieved by the using resistive touchpad screen. For that DC motor is used to pull accelerator to control the speed. The proposed scheme is simulated in Proteus and implemented in hardware (prototype).

Adaptive Head-Light System For Vehicle

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th February 2018

Priyanka M Dubal | Dr. Alam N. Shaikh

Abstract

Night time driving with conventional headlamps is particularly unsafe Major road accidents occur during night time. About 25% of driving done at night time. About 55% of accidents occur during this period. The highest fatal traffic accident rate occurs on curved roads at nighttime. The existing conventional light systems do not provide illumination in the right direction on curvy roads. Due to this constraint, a need to understand an alternative technology solution. The aim is to improve visibility for driver and so achieve a significant increase in safety and driving comfort. This calls for a flexible front light for automobiles to illuminate the road ahead in the night corner. Adaptive front lighting system (AFS) helps improve driver’s visibility at night time hence achieving enhance safety. AFS (adaptive front-lighting system) used to detect information about the corner in advance with help of sensor which detects the information send it to the motor to adjust headlamps to get the lighting beam which was suitable for the corner. Through this way, it could avoid "blind spot" caused by the fixed lighting area when coming into the corner, and improve driving safety

Adaptive Human Machine Interface Approach for Face Recognition

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Mr. L. Guru Kumar | Dr. G. Harinatha Reddy

Abstract

Feature extraction is one of the challenging issues in face recognition and matching process. Here we proposea novel method for dense featureextraction in face recognition.This methodology consists of two steps. In first step, encoding scheme is defined that shifts high dimensional data into compact representation by maximizing intra user correlation. In second step an adaptive feature matching is done for image classification which works for images with different scaling limits. This methodology is implemented on local facial database. We introduce a novel human-machine interface based on movements of head pose. This human machine interface works by detecting facial features from live cam and then tracking face features.Movement and actions of cursor are performed by using facial feature tracking. We prove that our methodology yields better results compared to state-of-art criteria, our method performs better at noisy condition, illumination changes, complex background and at different head poses.

Adaptive Mimo System with OSTBC using Spatial Diversity and Spatial Multiplexing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 20th September 2017

Ch.Tidula | Dr.Ch.Santhi Rani

Abstract

The advances in wireless technology leads to the simultaneous growth in the field of communication by increasing the data speed with high accuracy .It is a very complex task to increase the requirements of a data rate. So in order to meet these requirements Multiple-Input-Multiple -Output (MIMO) system has been developed. The adaptive system is having the variable number of transmit and receive antennas. Adaptive MIMO system uses an adaption algorithm. The number of transmit and receive antennas will change depending on this algorithm and it uses an Orthogonal Space Time Block Codes (OSTBC). These codes help in improving accuracy and providing high data rates. This can be done by using the two techniques spatial diversity and spatial multiplexing. The frames present in the adaptive system will operate with either one, two or three or four transmit and receive antennas. The OSTBC encoder block will encode the information symbols from the QPSK modulator by using the Almouti code. The QPSK demodulator will demodulate the output of the OSTBC combiner. The frame error rate for three transmit and two receive antennas is 0.1999 at 10db and the frame error rate for four transmit and two receive antennas is 0.5107. From the above results it is observed that the three transmit and two receive antennasisbetter.

Addressing the Issues of Text Analytics

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd February 2018

S.N.Sithi Shamila | Dr.D.S.Mahendran, Dr.Mohamed Sathik

Abstract

The revolution that has swept through information Processing arena has placed the modern world in a unique vantage position. Huge quantum of data has been generated through the normal operations of day-to-day business activities in various fields such as public services, Research, Education, Industries and Institutes. The multiple level transactions captured in these fields have generated such an enormous amount of data which are so challenging to handle as it swings from megabytes to petabytes, and in a swift, to zettabytes as well. The inevitability of the dependence on the Internet in this technologically revolutionized context has paved way for the increased use of data, and this situation has obviously generated considerable research interest to study user view analysis in order to determine the several characteristics of the users which might influence the development of software systems and several other technological products. It has been observed that more than 90 percent of today’s data is either unstructured or semi-structured, and this has complicated and challenged the study of decoding knowledge and information embedded in different recognizable patterns and analyze the text documents from the huge volume of accumulated data. It is in this context, the study of text mining, which is essentially a process of extracting interesting and non-trivial patterns from a large number of text documents, assumes significance. Although there are innumerable techniques and tools to mine the text in order to discover valuable information which with not only future predictions in several areas of business, social, political and economic interest can be made, also it will influence the process of decision making in several spheres. Thus, Sentiment Analysis or Opinion Mining has attained an enormous importance in the modern world today, and it is in this context, an attempt has been made in this paper to briefly discuss and analyze text mining techniques and the issues connected to text mining which affect accuracy and relevance of the results obtained.

Admission Control based Delay-Aware Routing Protocol for MANETs

International Journal of Engineering Research in Computer Science and Engineering, Available online 3rd April 2018

Sunil Kumar Jangir | Naveen Hemrajani

Abstract

Due to the recent developments in the hand-held devices and communication enhancements in wireless networks like mobile ad-hoc network (MANETs), these networks are targeted for providing real time services like video streaming, video conferencing, VOIP etc. Although, the basic design of MANETs is not fully capable to provide multimedia services, therefore some sort of quality-of-service is required in these networks. Providing requisite QoS guarantees in wireless multihop networks is much more challenging than in wired networks. In particular, it is important for routing protocols to provide QoS guarantees by incorporating metrics like achievable throughput, delay, jitter, packet loss ratio, etc. In this paper, we proposed an admission control based delay-aware routing protocol for reliable transmission of delay-sensitive multimedia applications over mobile ad-hoc wireless networks. To show the correctness and effectiveness of proposed scheme we perform simulations on various scenarios. The results obtained through simulation shows that our scheme is able to provide delay guarantees to an application whenever required.

ADQ Solar Tracking System (RTC/FCT) in ARM7 with Isis

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st May 2018

Srivani Athmakur | Rohith Bandari

Abstract

As now-a-days renewable energy is a rapidly gaining notoriety. Specially, Solar filed is trending with new scope of life for a better change in efficiency with advanced sun tracking system. Here by using fuzzy logic with advanced quadratic RTC system in ARM7 by virtually controlling. By considering the meteorological data for a month to calculate the Altitude, Azimuthal angle by using the DC motor with LDR’s to get accurate result with 50% more efficiency then normal result as applying the mirrors in by adjacent to panel. We use 3D accelerometer for better accuracy in fuzzy logic of controlling RS232 communication. Additionally, Filtering the unnecessary data by using optimization of logic. This system has advantage of controlling circuit in virtual media of schematic (ISIS PROTUES) and code controlling in keil4IDE(software).

Adsorption of Acid Red 97 by Α-Fe2o3 Nanopowder: Isotherm and Kinetic Studies

International Journal of Science , Engineering and Management, Available online 15th March 2018

Zulfiqar Ahmed M.N | Chandrasekhar K.B, Nagabhushana B.M

Abstract

α-Fe2O3 nanopowder was prepared by solution combustion synthesis using ferric nitrate as oxidiser and oxalyldihydrazide (ODH) as fuel. The characterization of the nanopowder was done by powder X-ray diffraction (PXRD), Fourier transform infrared spectroscopy (FTIR) and scanning electron microscopy (SEM). The potential of the nanopowder in the adsorption of Acid Red 97 dye was carried out at room temperature. The effect of parameters such as the adsorbent dosage, contact time and initial dye concentration was studied. Isotherm and kinetic studies were employed to analyze the adsorption data. The nanopowder was effective in removal of 20 ppm dye solution. The adsorption efficiency decreased as the initial concentration of the dye solution increased. The adsorption followed pseudo-first order kinetics and obeyed Dubinin-Radushkevich and Temkin adsorption isotherms.

Advance Biogas System for Irrigation - A Typical Application

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Dr. Amol B. Ubale | Priyanka Tupe-Waghmare,Swapnaja A. Ubale

Abstract

Anaerobic reaction of the organic substances like vegetable/food waste, animal/human waste and agricultural waste produces gas called as Biogas. This gas chemically consist of CH4, CO2 as major content( 50-75% & 30-40%) and other constituents such as N, H2S, H , O2 and H2O vapour in small amount (about 10% all). It is well known fact that CH4 is a good IC engine fuel. As the gas mix with air easily it can be used as fuel in compression ignition (CI) engines. CO2 content from it can be either reduced or completely removed by simple water scrubbing process. The burning of this gas gives clean energy with low emission. If it is used in compressed form in cylinders, it can be a supplement to compressed natural gas (CNG) and liquefied petroleum gas (LPG) and. Present study has demonstrated a small capacity biogas plant which is constructed using kitchen waste as feed stock. The gas produced from it is supplied to computerized CI engine test rig of 3.5 KW. Various tests were carried out at different speeds and load conditions. Typical running conditions are demonstrated with 2300 rpm and 20 N-m. The system works fairly well at low load conditions.

Advance Cooling Of Radiators by Using Nanofluids

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th June 2018

Roheshkumar S. Lavate | Rameshwari V. Lalge

Abstract

After combustion of fuel the large heat is liberated inside the combustion chamber. The internal combustion engines are cooled by using either a liquid coolant or air. In air cooling system the air is flow over and around the cylinder, cylinder head and cylinder fins and carry away the heat. In water cooling system the coolant is circulate through a water jacket of cylinder head and cylinder wall. This coolant has absorb heat from the engine and dissipated to atmosphere by the device known as radiator. The Radiator contains number of horizontal tubes surrounded with fins. The heat is carry away by three modes of heat transfer namely Radiation, conduction and convection. Most of the convection takes place because of air flowing around the radiator fin and tube assembly and Conduction takes places between radiator tubes and fins. These coolant offer low thermal conductivity and poor heat transfer characteristics. There is large scope to design a high energy efficient, compact and light in weight automobile radiator by development of advanced nanofluids, which have better conduction and convection thermal properties and better heat transfer characteristics. This paper will introduce new concept of radiators that can adopt the high performance nanofluids. This advance cooling system also raises the total mechanical efficiency of the engine

Advanced communication Through Fleshredtacton

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th August 2017

Haritha K Sankari | B.S.Vignesh, K.R.Pooja, S.Kousika

Abstract

Our body could soon be the backbone of a broadband personal data network linking your mobile phone or MP3 player to a cordless headset, your digital camera to a PC or printer, and all the gadgets you carry around to each other. RedTacton is a new; it is completely distinct from wireless and infrared. A transmission path is formed at the moment a part of the human body in contact with a RedTacton transceiver. Physically separating ends the contact and thus ends communication. Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path. Uses the minute electric field emitted on the surface of the human body .Technically according to the user's natural, physical movements. Communication is possible using any body surfaces, such as the hands, fingers, arms, feet, face, legs or torso. RedTacton works through shoes and clothing as well. Here, the human body acts as a transmission medium supporting half-duplex communication at 10Mbit/s. The key component of the transceiver is an electric-field sensor implemented with an electro optic crystal and laser light.

Advanced Control of DFIG for Wind Energy Conversion System Using Integrated Active Filter

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th December 2017

C.Mohan Krishna | T.Manohar, K Purushotham, S.Imrankhan, A.Venkata Prasad

Abstract

Now a day’s harmonics are a serious problem in power systems. Due to non-linear loads being added to electrical systems harmonics are generated, which causes the system equipment damage. For improvement of power quality, we are using DFIG with active filters. Doubly Fed Induction Generator for Wind Energy Conversion Systems deals with the operation of doubly fed induction generator (DFIG) with an integrated active filter capabilities using the grid-side converter (GSC). The main contribution of this work lies in the control of GSC for supplying harmonics in addition to its slip power transfer. The rotor-side converter (RSC) is used for attaining maximum power extraction and to supply required reactive power to DFIG. Wind energy conversion system (WECS) works as a static compensator (STATCOM) for supplying harmonics even when the wind turbine is in the shutdown condition. Control algorithms of both GSC and RSC are presented in detail. Implemented project DFIG-based WECS are simulated using MATLAB/Simulink.

Advanced Driver Assistance Systems for Pedestrian Crossing Detection

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd June 2018

B.Srilatha | Ramyasri R, Gnanesh Kumar K, R. D., Vidya Rani

Abstract

The pedestrian crossing has been the major purpose behind the person on foot and vehicle crashes during nights as well as in highways, this project is focused on identifyingthe obstacle crossing for supporting an advanced driver assistance system utilizing an IR sensor mounted on the vehicle. In this paper, a particular issue is addressed, which can hugely affect person's lives. To be particular, the discovery of sudden walker intersection to help drivers in maintaining a strategic distance from mishaps. This is mainly concentrated on the Indian sedan cars and their safety with affordable price & device that can be installed in all type of cars. IR sensors are used for the detection of pedestrian crossing which plays a vital role in paper proposed. In case of rash driving on unbalanced roads, the speed of the motor gets dropped down by the accelerometer. When the driver is drunk he will not be able to drive the vehicle when the alcohol content exceeds the limit which stops the engine further. Buzzer used here gives the alert in all kinds of this situation so that can drive the vehicles harmlessly on roads. Here car reduces its speed automatically when it detects the object passing through the vehicle even when the driver is in absent mood or uncontrollable condition. When the vehicle is moving on the steep or sloppy roads, sometimes it might lead to accidents due to the imbalance of the vehicle. This kind of consequences is also handled and overcome. Hence avoids accidents

Advanced Health Care System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Pinky Mary Sunny | Sreejith Hari Kumar, Toms Mathew, Tinu Cyriac,Mr.K.M.Abubeker

Abstract

Modern healthcare systems, despite all its breakthroughs and giant leaps of innovations still struggle to achieve an effective response that above all, rises to be a time-effective technique to treat patients. Through this paper, we introduce a system that strives to integrate the existing medical techniques with innovations in electronics and present them on a common platform, thus enhancing the effectiveness and doctor-patient interaction experience. The domain of implementation of this project is NI LabView. The basic building block of programs written in LabVIEW is VI. VI stands for virtual instruments. It is similar to a function or subroutine in other programming language. It includes the front panel (containing controls and indicators), the block diagram (containing control terminals, wires and structures and various other object nodes), the VIs icon and its connector pane (as well as compiled executable code which is hidden behind the scenes). The various blocks for ECG generation and its signal processing steps including wide band noise removal and base line wandering reduction has been achieved on LabVIEW. Monitoring of this signal and mechanisms in case of atrial depolarization (beginning of heart attack) and other atrio ventricular problems have also been set up. Monitoring and alarm mechanisms for irregularity in BP have been implemented. The patients body parameters are updated into a mainframe database called EMR (Electronic Medical Report) on a real-time basis. The NI LabView 2013 simulator provides a single platform to integrate different VI module executions.

Advanced Intelligent Car System to Prevent Accidents Using Alcohol Detector and Eye Blink Sensor

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Manasa Gattu | Shailaja Chetla , Krishna Marsukola , Sumanth Mateti , Sudha Arvind

Abstract

This paper describes a real-time online prototype driver-fatigue monitor. It is about making cars more intelligent and interactive this may notify or resist user under Unacceptable conditions, they may provide critical information of real time situations to rescue or police or owner himself. In this paper, we provide by means of accident prevention using eye blink sensor and alcohol detector where the vehicle is stopped immediately and intimated where ever needed. If the driver is drunk then the buzzer indicates and the vehicle doesnt allow the driver to start the vehicle. If the driver is drowsy, then the system will give buzzer signal and the speed of the vehicle is reduced and using ultrasonic sensor it checks whether any vehicle is present on the left side, if not the vehicle is parked. According to this project when a vehicle meets with an accident immediately pressure sensor will detect the signal and sends an alert message through the GSM MODEM including the Location to police control room or a rescue team.

Advanced IOT Based Blood Bank

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 11th July 2017

Aruna R | PradyneshPatil, Rajeev S, Shruti Sanga A , Swathi R

Abstract

Blood is the saver of all life in the case of emergency and,In an emergency situation, if thestock of blood are insufficient or unavailable, the only source of blood will be the people who donate the blood on a voluntary basis. It is certain that, time is a very crucialcomponent in such situations. For this reason, the health care centre should contact the nearestavailable donors in order to ensure the service as quickly as possible and hence this is a time-consuming process.This issue can be overcome by automating the entire system along withaportable smartphone application. The blood packets will be monitored and updated periodically. The Application provides a way to synchronize the information between blood banks and Hospitals with the help of Internet. The android application can be accessed by registered hospitals to check the availability of Blood and can send Request for blood to the nearest blood bank or donor matching with blood requirements.Only a registered person, with willingness to donate blood, will be able to access the service. The application uses GPS technology that will providea way to trace the way to the blood bank or nearby hospitals. The user will get the route to reach the desired location and eliminates the need for manual interventions, thus savingtime.The information about the donor, hospitals and blood banks will be stored in the central database and can accessed globally by authorized user anytime and anywhere.

Advanced Railway Automation and Its Application

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Somashekar.V | Gangadhar.S , Sunil.R , prof. Srilatha

Abstract

The objective of this project is to efficiently avoid the collision of automobile vehicles and to provide a greatest security to the users in adverse or in bad weather conditions by using Collision Avoidance System (CAS). The main aim of this paper is to make an automated place announcement system for Train using RFIDs and vibrator. The radio frequency wireless card for tracking the station data. The paper consists of microcontroller with the RF receiver and the vibrator. The whole system is attached to the vehicle (BUS or Train). The encoded RFID tags are placed in the BUS stops or the railway stations. The microcontroller in the TRAIN is programmed in such a way that every station name is saved in the controller which is having a unique code. So whenever the bus or train reaches the station, the reader in the bus or in the train receives the codes, which are transmitted from the tag and the microcontroller receives this code and checks in the look up table, saved in the chip. Whichever matches, the controller will displays that station name on LCD and activates the respective seat vibrators. If fire happens in a particular train compartment, then respective compartments will be detached.

Advanced Recent Trends in Computing & Information Technology

International Journal of Engineering Research in Computer Science and Engineering, Available online 3rd May 2018

Ameet Kurli | Nancy Dias

Abstract

21st century has been defined by application of and advancement in information technology. Information technology has become an integral part of our daily life. Information technology has served as a big change agent in different aspect of business and society. It has proven game changer in resolving economic and social issues. Information technology has been one of the most encouraging research areas throughout the globe over the past two decades. From commerce and government to scientific discovery, healthcare, education, entertainment, and environmental management, information technology is indispensable and will continue to fuel further advances in all facets of human endeavours. The focus is mainly on the intelligent computing techniques as well as the emerging applications of information technology. Its aim is to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications.

Advanced Vehicle Security System on FPGA

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 19th September 2018

K.Murali Chandra Babu | Dr.P.A.Harsha Vardhini

Abstract

Now-a-days the automobiles can be ignited using the key which can control the opening the door, high frequency transceiver system, alarm system and so on. Once the key is lost or taken by unauthorized persons then Biometric recognitions techniques can surpass this situation. The proposed system utilizes the fingerprint system, face recognition system and GSM module. If any user can ignite the vehicle, he/she fingerprint image should match with the database. The face detection system can recognize the faces in vehicle. when nobody is present in the vehicle, if unknown person enters and face image does not match, then alarm will blow and if finger print doesn’t match then message will be sent to the owner of the vehicle with the GSM module.

Advanced Vehicle Tracking and Trapping System

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th October 2017

Vishnu C.R | Surag M.T, C. Raseek

Abstract

The advanced vehicle tracking and trapping system is very much useful in the increasing vehicle robberies of the world. This system has been implemented with Arduino, Global Positioning System(GPS) and Global system for mobile communication (GSM) technology, with a relay in order to stop the vehicle and android phone application in order to provide a user friendly environment. In addition to this a trapping and locking system is implemented. Trapping system is an internal ring gear attached with a DC motor which lock the driver in the seat and don’t let him escape. The locking system is a rack and pinion arrangement with a DC motor, installed inside the door by making a hole. In this advanced world simple tracking system is not effective, by chance we reach the vehicle there is a chance to the escape of the thief. We can’t control these robberies if the thief is escaped. This system is helpful to give real punishment to the intruder. In such a situation everything set in a simple mobile application in a cost effective way is very convenient for the user.

Advancement in an Engineered Cementious Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th June 2018

A. A. Shelke | S. R. Sutar, S. V. Bankar

Abstract

A review of representative research on the behavior of PVA-ECC concrete under flexure and shear action. Concrete is most widely used material but its brittle behavior is one of the most serious problem. This problem can be overcome by using ECC concrete which contains PVA fibers in place of course aggregates and fly ash replacing cement partially. The various materials which are to be used are ordinary Portland cement, fly ash, PVA fiber, Sand, Superplasticizer and water. Superplasticizer is to be used to control rheological properties of fresh concrete. PVA fiber are selected because they have strong bond with the concrete matrix, strain hardening property and provide pseudo-ductility to the concrete thereby increasing flexural and shear strength. The seismic disturbance to a structure can be partially stabilized with the help of ECC concrete

Advancement of BLE Supported Healthcare System with Cloudlet

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st March 2018

Atrayee Gupta | Nandini Mukherjee

Abstract

Previously, we defined Predictor virtual sensor as a precognitive sensor that can be utilized to track events in the priory, which is otherwise impossible for the resource-constrained physical sensor. In this paper, we explain how to embed intelligence with Bluetooth Low Energy supported health sensors, such as smart bands, using a PaaS based cloudlet architecture and Predictor virtual sensor. Here, we provide results using graphical analysis and mathematical models of case studies for precognition, which can be used for other kinds of sensors as well.

Advances in Aircraft Mechanical Systems and Components

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 5th July 2017

G. BhavaniSankar | H. N. Bhaskar

Abstract

Aircraft is a complex system of systems. Structural elements are complemented by the Avionics and Mechanical Systems. Avionics would provide the communications, navigation, other control functions and commands. The Mechanical Systems would execute these and provide the power to realize a safe flight starting from takeoff to landing. Each system has its role to play in the successful mission of the aircraft’s each flight. Each system will have sub-systems and components to achieve their functional requirements and meeting the reliability, maintainability and safety (RMS) requirements. It is a known fact that many technological advances originate from the Aerospace industry and trickle down to other walks of life. In recent years, the aviation business has entered a major growth period with increased air transportation demand projected for the future. On the other hand, the rising awareness of environmental issues on a global scale necessitates a reduction in substances of concern i.e. decreased greenhouse gas emissions. Furthermore, as the international demand for fuel increases, fuel prices are rising, and the aviation business is urgently requesting better fuel efficiency for economic reasons as well. There is also serious research happening in the area of alternate fuel, fuel cell and all electric aircraft. These needs, currently drive the requirement for newer technology and changes in how aircrafts are made and flown. Thus energy consumption of each system is one area that is scrutinized closely. Going one step ahead the exergy analysis to minimize the entropy generation by these systems and to curtail the endogenous avoidable and exogenous avoidable parts of the exergy destruction occurring in each component are extensively used in Propulsion System and ECS development. Weight reduction is another important aspect in all these systems. Landing Gear System (LGS) weight is generally about 4.0% of the aircraft take-off weight. Developments like equipping composite braces on the main landing gear, electrically actuated Landing Gear are some examples of weight reduction in LGS. Advances in these systems not only aim at improving inflight performance but also look into the energy and fuel saving during ground handling, maintenance and thus reducing life cycle cost. This paper details the technology and the innovations that have gone in to evolving these systems over the years both at system level and component level. The paper also looks into the emerging trends in the design and development of these systems. The trends in developing new configurations, evolving the new systems’ architecture, meeting the demanding new requirements at component and system level, using latest software resources for mathematical modeling and simulation, conducting rigorous tests at component and system level at ground and flight test phases and finally meeting the certification requirements are touched upon.

Aerodynamic Analysis of Biplane Configuration Using NACA 001 Airfoil

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd August 2017

Somaling Koti | Dr. S S Desai, Dr. V Ramesh

Abstract

The work reported here to show the effect of biplane configuration on aerodynamic performance of the NACA 0012 symmetric airfoil. The computational analysis was performed with the help of CFD program which were GAMBIT and FLUENT. The flow around the airfoils was incompressible, steady state, two dimensional Nevier-Stokes equations with different turbulence models were used to simulate the flow nature of aerofoils. This analysis have been carried out by varying the gap between the aerofoils such as 25%C, 50%C, 75%C and 100%C at various angle of attack and operating at Reynolds number 3×106. An interference effect occurs in gap between biplane configurations which can be varied with differ in angle of attack and chord length. The 50%C gap between the aerofoils shows the maximum increase in lift co-efficient. It is observed that biplane configuration provides greater maneuverability performance such as loops and rolls. The computational solutions gives information that increase in lift co- efficient at low speed conditions with little penalty in drag co-efficient. Computed results have been validated with existing experimental data.

Aging Aware Vedic Multiplier

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Ch.R.Sneha Sindhra | U.V. Ratna Kumari

Abstract

Multipliers are most broadly utilized segment as a part of applications, for example, convolution, Fourier transforms, discrete cosine transforms, and advanced shifting. Since outrun of these applications primarily relies upon multiplier speed, multipliers must be composed effectively. The aging effect of the transistors caused by NBTI and PBTI has a large impact on its performance in a long span. In this paper, the device tradition with the accomplishment of Vedic multiplier is addressed not withstanding bypassing multiplier keeping as a main priority to enhance the execution for more speed and less power .The current plan focuses on Vedic multiplier which comprise of multi-level adders for designing mindful circuit. The huge angle of the proposed strategy is that, the created multiplier depends on Vertical and Crosswise structure of Old Indian Vedic Mathematics called Urdhava Tiryakbhyam Sutra. The advancement is to design the multiplier with the carry save adders in order to enhance better performance.

Agribot-“Future Farmer’s Friend"

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

P.Santhi Priya | Angel Prescilla Jean Pierre, Somdutta Bose, Dilli Babu.U, Indumathi.K

Abstract

This robotic vehicle is an agricultural machine of a considerable power and great soil clearing capacity. This multipurpose system gives an advance method to sow, plough, water and cut the crops with minimum man power and labour making it an efficient vehicle. The machine will cultivate the farm by considering particular rows and specific column at fixed distance depending on crop. Moreover the vehicle can be controlled through Bluetooth medium using an Android smart phone. The whole process calculation, processing, monitoring are designed with motors & sensor interfaced with microcontroller

Agricultural Vulnerability Assessment using GIS: A Case Study of Pallar Basin of Chittoor District, Andhra Pradesh

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

T Hemalatha | 

Abstract

Drought is one of the short-term extreme events. There is no operational practice to forecast the drought. Drought indices play a significant role in drought mitigation. In the present study, Pallar basin which is present in Chittoor District of Andhra Pradesh, which are seriously prone to drought, has been established using meteorological and remote sensing based agricultural droughts indices. The meteorological droughts indices was Standard Precipitation index (SPI)and the satellite data based agricultural drought indices was Normalized Difference Vegetation Index (NDVI), Normalized Difference water Index (NDWI). The meteorological and remote sensing based agriculture drought indices has been determined and compared for the period of 2000, 2005 and 2010. The result shows from SPI Index the year 2005 is wet year and the year 2000 and 2010 are dry year. From NDVI index the year 2005 is having more vegetation area and the year 2010 is having less vegetation area. Hence, agricultural drought risk mapping can be used to guide decision making processes in drought monitoring, and to reduce the risk of drought on agricultural productivity.

Agrikart: A New Revolution Agriculture

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Dr. B Shadaksharappa | Mr. Venkatesh Kumar M, Rajesh G,S Srijayanth, Mrs. Myneni Chandana, Chaithra R S

Abstract

The project is based upon Wireless Sensor Network and an android based interface. The advanced development in wireless sensor networks can be used in monitoring various parameters in agriculture. Due to uneven natural distribution of rain water, it is very difficult for the farmers to monitor and control the distribution of water to agricultural field as per the requirements of the crop. There is no ideal irrigation method for all weather conditions, soil structure and variety of crop cultures. The sensors are used to collect various data which is to be then analyzed. The android interface provides the farmer with a framework to communicate with experts and get immediate response. It also provides them detailed information about the governmental policies which they can make use of. The main motive of this idea is to provide the analyzed soil sample and the best suggestion on which crop will minimize the cost and maximize the profit. The application also gives specific weather predictions for the day/week. Details on agricultural loans with their interest rates are also shown in the android application interface. This project aims to reduce the stress and problems that adversely affect the farmers resulting in the loss of crops and human lives.

AI in Cyber Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

B.Arshia | M.Gayathri,P.Manaswini

Abstract

Today cyber security is something which can’t be handled by human security analysts alone. They need some degree of automation and this is where AI (Artificial Intelligence) comes into the picture. Today the world has coupled with the widespread absorption of cloud and mobile technologies having made an infinite platform to cyber security problem. AI-driven cyber security methods are able to learn and get better as they evolve by using the technique like AI2 (AI square), QRadar. By using these methods we show that the system learns to defend against unseen attacks and thus detection rates are reduced fivefold. This in turn helps to keep the systems, networks and sensitive data secure.

Air Pollution Monitoring and Estimation Using Diffusion Process

International Journal of Science , Engineering and Management, Available online 29th August 2018

Dr. S.Mary Joans |  M.Pavithra

Abstract

This paper presents a method to monitor and estimate the level of pollution in the environment using diffusion process present in the image processing method. Diffusion process is used to reduce the level of noise present in the images. The percentage of pollution present in the environment is also calculated and the estimation ratio is obtained. Air pollution has become a major issue in the modern world , the reason is industrial emissions and increasing urbanization along with traffic jams and heating/cooling of buildings. Monitoring urban air quality is therefore required by municipalities and by the civil society. Current monitoring systems rely on smoke and exhaust detection system that has been developed for monitoring exhaust gases using far infrared camera which is costly. In this paper, we focus on an alternative or complementary approach, with image processing aiming at obtaining the images from environment and monitoring the pollutants present in the environment using image processing method, along with implementation of the diffusion process to reduce the image noise without removing significant parts of the image content. In image processing the input may be image or video frames. The outputs are also images. Various tasks like classification, feature extraction, recognizing different patterns can be done using image processing method

Air Production and Power Generation From Speed Braker in Road Ways

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

Karthik P | Chandan Kumar C, Raghu N, Hemanth Reddy C,Anand. K. A

Abstract

In our project we are producing the compressor air using with the aid of speed breaker setup in road ways. This is the simple and easy method of producing the compressor air with out using the electricity. Now days the electric power is demand is increased. So we are generating the compressed air without using the electric power. Here instead of electric drive we are using the mechanical drive to generate the compressed air. We are using the speed breaker to generate the compressor air.The main aim of this concept is to generate the electric power through the fabrication of air turbines with speed brake arrangement. Nowadays power demand is increased, so this project is used to generate the electrical power in order to compensate the electric power demand.

Al 6061-Basalt and Zirconia Hybrid Composite

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st August 2018

Dr. C Anil Kumar | Sharath Kumar M , Vishwas Manohar, Supreeth D V, Gurunandan H M

Abstract

The present work mainly investigates the wear behavioral properties of Al6061 / Basalt / ZrO2 Hybrid Metal Matrix Composites. Al6061 / Basalt / Zr02 Hybrid MMCs containing five different wt% (1, 4, 6, 8, 10%) of Natural Basalt rock powder and keeping 2 wt% of Zirconium oxide constant have been fabricated by using a liquid metallurgy (stir casting) method. The dry sliding wear tests were performed using a Pin-on-disc wear testing machine on both composites and a matrix alloys over a different load range, sliding velocity of 1.66m/s and for the various sliding distance of 1-6km. Further, it was observed from the experimental results that the specific wear rate.

Algorithm for Protection of Key in Private Key Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Neha Tyagi | Ashish Agarwal, Anurag Katiyar, Shubham Garg,Shudhanshu Yadav

Abstract

This paper is in reference with our previous paper entitled “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research” in Feb 2017 edition... In this paper we have tried to devise an algorithm that would protect the key in transmission, as in the era of digitization, threats to information security instigate the concerned people to take proactive measures for communication between two communicating parties. Since our major focus is on the symmetric key cryptography, also called as private key cryptography, we have studied different techniques of securing a private key or shared key or secret key that are used to shield information in such systems. The different statistical data being published so far and recent phishing scam which plays with the information transfer by taking away the user’s identity highlights the need to make our security measures strong enough to counter such unwanted accesses. After looking into the functioning of widely accepted protocols and thinking of introducing a few changes to enhance their functionality, we here, are going to focus mainly on application of asymmetric key cryptographic algorithm named RSA algorithm. We have already referred to suggestions by means of several research papers being published so far related to our area of interest such as N-Prime RSA, magic rectangle, etc. We have tried to present a method taking one step ahead in the available sketch and without diminishing the basic essence of the algorithm. We also refer to some examples and its application as thought of in its modified form to further support our idea.

Algorithms for Underwater Video Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ketan Awade | Tejashree Badve, Mohit Dhale, Prof. S. M. Kulkarni

Abstract

The paper describes the techniques for underwater images and videos enhancement. Initially the conventional approaches like wavelength compensation and image dehazing (WCID), dark channel prior method, contrast limited adaptive histogram equalization (CLAHE) have been studied and analysed. Analysis of all the three methods have highlighted the shortcomings of the individual methods. The fusion method is described in this paper which has exhibited comparatively better results for the enhancement of underwater images and videos. In the proposed method the inputs are taken from the degraded images, the colour correction and the contrast enhancement techniques are applied on the input image. The weighted maps are used for increasing the visibility of the degraded object due to absorption and scattering. The resultant output is characterized by lower noise, improved contrast and better exposed dark regions.

All optical NOT Gate using modified Photonic Crystal Platform

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Savita Soma | Dr.Sanjay Gowre

Abstract

This paper deals with designing and simulation of all optical NOT gate constructed by using 2-D modified Photonic Crystal. A typical NOT Gate can be constructed on square lattice of 8 m*8 m photonic crystal of silicon rods in doped substrate with refractive index of 3.40 and 1.1 respectively. The lattice constant ?= 1m and radius of the rods r= 0.2?m. Not gate is realized by combining the cross-waveguide geometries and varying its diameter by pitch (d/?). The gate is implemented for the operating wavelength of 1.55m using Rsoft's Fullwave simulator.

All Time Medicine Counter For Medicine Self-Dispensing For Public

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st July 2017

Malashree.G | Gnaneshwari. V, Ubaidulla, Sneha. S, Swetha B Gumati

Abstract

Medicines play a crucial role in maintaining health, preventing illness, managing, chronic conditions and curing disease. All Time Medicine (ATM) is a machine which delivers the medicine in emergency cases and ensure availability of drugs 24x7 and hence the name “All Time Medicine”. ATM will be very useful in saving life in case of an accident on highways, remote areas, rural areas and places where medical stores are not within the reach in case of emergency. At least first aid can be made easily accessible with the help of this system. This project consists of Advanced RISC Machine PIC micro controller which controls the other sub systems such as RFID Reader, Global System for Mobile communication (GSM), medicine dispenser, inventory control. RFID tag identifies the specific user. GSM sends the message to the inventory control when the medicines needs to be refill. Medicine Dispenser is the storage part of the machine, which stores the medicine.

Allelopathic Potential of the Purified Fraction MNF10 from Nyctanthes arbor-tristis L. on Early Seed Growth and Seedling Characteristics of Vigna radiata (L) Wilczek

International Journal of Science , Engineering and Management, Available online 25th May 2018

Shelmi Antony | Dr. Benny P J, Dr. Sunny Kuriakose

Abstract

The plants are the reservoirs of structurally different bioactive molecules. The isolation and identification of phytochemicals from plants are crucial for the discovery of new bioactive compounds to be used by various industries. Our previous study has reported the strong allelopathic potential of methanolic leaf extract of Nyctanthes arbor-tristis L. for the first time (Antony S and P.J. Benny, 2017). This study highlighted the characterization of an allelochemical present in the purified fraction, MN – F10 from Nyctanthes arbor-tristis L. through various spectroscopic assays. The potential allelopathic effect of MN - F10 was identified by assessing a dose-dependent reduction in the various growth characteristics of Vigna radiata (green gram) seedlings including early seedling growth, length of root and shoot, seedling vigor index and fresh & dry weight. All these growth parameters reduced at the same rate. This study warrants further investigation of the allelopathic potential of MN-F10 in field condition, which will finally lead to the development of a potential bioherbicide.

Alleviation of Power Quality Tribulation Using Series Active Power Filter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

G.Gomathy | G.Anupriya, R.Srinidhi, M.Hareeshma

Abstract

This paper presents a control strategy Synchronous Reference Frame Theory (SRF) for three phase Dynamic Voltage Restorer (DVR) using MATLAB/SIMULINK. DVR is a three phase converter coupled with a DC Capacitor, which acts as Series Active Power Filter (SAPF). Since, power quality focuses on distribution side, the quality of power interns of voltage should not distorted by different faults. Hence, DVR plays an important role with the control strategy to make DVR active during fault conditions. Simulation results are carried out for LLL-G (Voltage Sag), L-G (Voltage Unbalance), increase in supply voltage (Voltage Swell), and distortion fluctuations in voltage (Voltage flickering) using MATLAB/SIMULINK

Alternative Optimization Algorithm for Channel and Clipping Amplitude Estimation in IoT-based Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th June 2018

Thasni mol.K | 

Abstract

- Internet of Things (IoT) is the idea to connect all devices to the internet. In IoT based devices the transmitter side should be low cost and low power. So the complexity of transmitter side should be transferred to the receiver side. Orthogonal Frequency Division Multiplexing (OFDM) is widely recognized as one of the key techniques for high data rate communications in wireless networks. The advantages of OFDM include high spectral efficiency, immunity against multipath fading and negligible inter-symbol interference. But it has a drawback of high PAPR. Among the PAPR reduction techniques clipping is selected because it is the simplest and cost-effective method. In this work, the joint estimation of clipping Amplitude and MMSE based channel estimation method has been proposed and evaluated. Here the channel is estimated by using MMSE technique and an iterative amplitude reconstruction method is used to estimate the clipping amplitude. An alternative optimization algorithm is used for the joint estimation of channel and clipping amplitude which is based on frequency domain block type training symbols. Here the channel is estimated by using LS and MMSE and made a comparison between them. The simulation results show that the MMSE has better performance than LS channel estimation in terms of SNR and MSE. The efficiency of these algorithms is evaluated by using CRLB calculation and achieves that lower bound at medium SNR. The simulation result shows a good performance without any prior information.

Amalgamation of Mind Wandering with Military and Defence

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Priyanka Tripathi | Tanu Varshney, Priyanka Chaudhary , Vimal Singh

Abstract

In this paper we are going to present, how to curb the affect of mind wandering during military training and in the field of defence. Basically, mind wandering software will check the ability to stay focused on the task and make t imely decisions. This paper also discuss about the different types of training that is provided to the soldiers and about the consequences of the mind wanderi ng pills.

Ambubot with Defibrillator for Medical Services in Smart Cities

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 12th September 2017

G.V. Raja | Archana.N, Asha.R, N. Kavya, Navya.N

Abstract

A smart city is an urban development vision to integrate information and communication technology (ICT) and Internet of things (IoT) technology in a secure fashion to manage a city's assets. Through the use of sensors integrated with realtime monitoring systems, data are collected from citizens and devices – then processed and analyzed. The information and knowledge gathered are keys to tackling inefficiency. Time is a critical issue when dealing with people who experience a sudden cardiac arrest that unfortunately could die due to inaccessibility of the emergency treatment. Therefore, an immediate treatment using Automated External Defibrillator (AED) must be administered to the victim within a few minutes after collapsing. Hence, we have designed and developed the Ambulance Robot, shortened as Ambubot, which brings along an AED in a sudden event of cardiac arrest and facilitates various modes of operation from manual to autonomous functioning to save someone’s lives in smart cities. Details of design and development of such robot is presented in this paper.

Ambulatory Assistive System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

S.Vinoth kumar | Dr. R.Jayaparvathy

Abstract

The advancements in wireless communication and sensor technology have grown significantly in the recent years particularly in medical applications. Existing health care systems do not provide real-time monitoring of the patient's health condition. To overcome this limitation, Wireless Body Area Networks(WBANs) have been introduced. WBAN allows for mobility of patients due to its portability and location independent monitoring. We propose the design and implementation of a Wireless Body Area Network for a patient in an ambulance to obtain the vital parameters namely ECG signal, Blood pressure, Temperature etc., from the patient's body using appropriate sensors and transmit them to the WBAN co-ordinator. The WBAN co-ordinator sends the information to a GSM module. This information can be communicated to a doctor/expert to provide continuous treatment before the patient in the critical state reaches the hospital. The collected information will be maintained in a database to be extracted by the people/expert anytime and anywhere using suitable Android application. We also analyze the effect of path loss associated with the signal transmission due to varying position of the nodes. The impact of pathloss on energy consumption of the nodes is also analyzed in this work.

An Adaptive Method for Multi-Level De- Duplication With the Improved Encryption Techniques in Cloud Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th December 2017

Aruna T M | Rajeswari R, Lavanya H V , Meghana B S

Abstract

As we all know that the sensors are the most important part of the embedded system and the robotics world. By using different types of sensors, we can minimize the logic circuits and also make the system more efficient to get output by taking less input. Therefore, here is detailed view of different types of sensors and their applications in the different fields

An Adaptive Method for Multi-Level De- Duplication With the Improved Encryption Techniques in Cloud Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th December 2017

C.Edward Jaya Singh | E.Baburaj

Abstract

These In the present scenario the magnitude of Information Technology dominates each and every field of cells of research. Due to the rapid development in Information Technology, various issues and challenges in storage and security hit the top corner of the atmosphere which provides a solution in the form of cloud technology. In order to make use of the technology in an efficient fruitful manner de-duplication is a concept of elimination and replication which improves the storage and the base of encryption leads to the better contribution in the level of security. Various methods and techniques are been developed for secured storage level in cloud based environments. In order to overcome the complexities and to make an optimal solution; Here, it is proposed a novel method for de-duplication with the improved encryption techniques with the hybridization of AES and RNG Crypto technique. The performance is evaluated with parameters such as Size and computational time. Based on the experimentation results the proposed method provides better results compared to the existing methods.

An Adaptive-Profile Modified Active Shape Model for Automatic Landmark Annotation Using Open CV

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Rajesh K M | Naveenkumar M

Abstract

Detection and tracking of face and facial features are the fundamental steps for many applications like Biometrics, human computer interface, video surveillance and expression analysis This paper addresses the challenges in current techniques and presents an adaptive-profile accurate method for facial feature detection and real time tracking. Face and facial features are detected by improved Active shape model (ASM), This application is developed by using Intels Open source computer vision project, OpenCV, Microsofts .NET framework and DLIB.

An Advanced Architecture with low Complexity of Partially Parallel Polar Encoder

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

U.Mahendra Narasimha Raj | E.V.Narayana

Abstract

Due to the channel achieving property, the polar code has become one of the most favorable error-correcting codes. As the polar code achieves the property asymptotically, however, it should be long enough to have a good error-correcting performance. Although the previous fully parallel encoder is intuitive and easy to implement, it is not suitable for long polar codes because of the huge hardware complexity required. In this brief, we analyze the encoding process in the viewpoint of very-large-scale integration implementation and propose a new efficient encoder architecture that is adequate for long polar codes and effective in alleviating the hardware complexity. As the proposed encoder allows high-throughput encoding with small hardware complexity, it can be systematically applied to the design of any polar code and to any level of parallelism.

An Agglomerative Clustering Method for Solving Vehicle Routing Problem

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

P Praveen | B. Rama

Abstract

A magnified arrangement is intended for the vehicles to diminish the aggregate cost of dissemination by which it can supply the products to the clients with its referred to limit can be named as a vehicle directing issue. In factor neighbourhood look technique, chiefly a productive vehicle steering can be accomplished by figuring the separation network esteem in view of the client's area or the way where the client's lives. The fundamental target of the paper is to lessen the aggregate separation made a trip to convey the products to the clients. The proposed calculation is a chain of importance based upgraded agglomerative bunching calculation procedure which is utilized as a part of the information mining situation successfully. The proposed calculation diminishes the aggregate separation doing out to every course and the vital thing need to consider is that the improved grouping calculation can decrease the aggregate separation when contrasted with the beforehand proposed variable neighborhood seek strategy.

An algorithm for the detection of Diabetic Retinopathy, Maculopathy and performing human authentication

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Vipanchi H S | Chandrashekar M Patil

Abstract

Diabetes when effects the eye, results in diabetic retinopathy which intern results in maculopathy. An automated graphical approach has been suggested to detect the Diabetic Retinopathy (DR) and Diabetic Maculopathy (DM) simultaneously by identifying microaneurysms and exudates respectively at the early stage. Microaneurysms (MA) and exudates are the found out by feature extraction process. Depending upon the presence of microaneurysms, the different stages of retinopathy are identified as mild, moderate and severe condition. Human authentication is performed based on the blood vessel pattern matching. This approach is tested over DRIVE, HRF, DIARETDB0, and DIARETDB1 databases and expected results are obtained.

An Algorithm to Perform Fusion of Partially Focused Images in Fuzzy Domain

International Journal of Science , Engineering and Management, Available online 27th June 2018

Meenu Manchanda | 

Abstract

An algorithm for fusion of partially focused input images in fuzzy domain is proposed. Since fuzzy transform possesses important properties such as shift-invariance, ability to preserve edges in an image, ability to provide better approximation etc. and therefore has been preferred in the paper. Since important features in an image are generally larger than one pixel and therefore the proposed algorithm uses fusion rule based on more than one coefficient (i.e. window based fusion rule) to fuse input images in the fuzzy transform domain. Experiments show that the proposed algorithm is effective and the results are acceptable

An Alternative Method For Forming The State Matrix Required For Aes Encryption Algorithm To Enhance Security

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Mr. Vikrant Shende | Dr. Meghana Kulkarni , Mr. Giridhar Sudi

Abstract

This paper presents an alternative method for forming the state matrix required for AES encryption algorithm. The design uses alternative method for mapping the individual bytes of the block to different columns of the state matrix depending on previously defined encryption vector. This adds an extra layer of security to the process, but at the same time keeps algorithm simple to implement.

An analysis of APU Joint Stock Company’s Brand Value

International Journal of Science , Engineering and Management, Available online 3rd January 2018

Oyuntuguldur Gan-Unur | Tselmeg Otgonbayar, Gantugs Ganbaatar, Onongoo Taivanjargal, Naran-Orgil Tsedendamba

Abstract

In Mongolia has been developing many types of products such cashmere, leather, milk product, all kind of meat product, alcoholic drink, soda drink and many other types of mining resourcing products. Hereof one of the interesting product has been entering the global market it is soda drink. In Mongolia has 4 main competitors of producing soda drink from APU JSC, MCS-Coca- Cola LLC, Vitafit LLC and Altan Joloo Impex and many other follower’s companies have been producing. This research paper focusing on measuring brand image and defining its customer satisfaction

An analysis of Gobi corporations marketing strategy and its consumer perception

International Journal of Science , Engineering and Management, Available online 26th December 2017

OYUNTUGULDUR Gan-Unur | Munkhzaya Narantsetseg, Oyuntulkhuur Tumenjargal, Delgertsetseg Davaadorj, Narantsatsral Gankhuyag

Abstract

Every war and every competition have their own strategies. If you cannot define your suitable strategy, you will be listed one of the unsuccessful company. Therefore, every company needs to define good marketing strategy. Our research findings indicate that Gobi corporations’ marketing strategy. The Gobi corporation is one of the top cashmere producing company in Mongolia. We collected 311 participations from Mongolian consumers and analyzed by competitive marketing strategy.

An Analysis of Higher Education Sector in Mongolia: Business Perspective

International Journal of Science , Engineering and Management, Available online 16th May 2018

OYUNTUGULDUR Gan-Unur | TUGULDUR Ganbold, ALTANSOLONGO Ganpurev, DULGUUN Batmunkh, BATGEREL Shinengerel

Abstract

In Mongolia, as in other countries, graduate education has become a global business in which domestic universities compete with institutions abroad. For working professionals who want to enter the business occupations or update their skills, there are increasingly many alternatives to traditional campus-based degree programs in the home country. Study abroad is a possibility for those willing to take a break from their careers. A record number of Mongolian citizens now travel overseas to enroll in MBA programs throughout the world. Online education is another choice. Every year, online options such as Massive Open Online Courses (MOOCs) and web-based certificates and degrees are more varied and attractive. Given the competitive educational landscape, Mongolians who are dissatisfied with MBA programs at home may either choose an international institution or forego graduate study altogether. This poses a challenge for Mongolia’s universities. How can they retain and develop their hold on the home market? This survey investigates the factors that influence the enrollment choices of Mongolian MBA applicants. Using questionnaire output, we describe the advantages and disadvantages of Mongolian MBA programs from the perspective of applicants. Our analysis leads to observations concerning university rank and competition with educational markets in leading countries. This study concludes by addressing two questions. First, what should Mongolian universities do to make their MBA programs more attractive to Mongolian applicants? Second, what is missing from Mongolian MBA programs, in the eyes of would-be MBA students? At the same time, the research will focus on current MBA program challenges such as ethical and moral programs which impact societal values. Furthermore, it will raise the gender issue where it stands especially in the current MBA programs graduates. By addressing or telling challenges and issues will encourage Mongolia’s MBA program more efficient and successful and productive.

An Analysis of Image Enhancement Based On Histogram Equalization Methods

International Journal of Engineering Research in Computer Science and Engineering, Available online 18th April 2018

S. Dhivya Bharkavi | Dr. Grasha Jacob

Abstract

Histogram Equalization is the most familiar method used in the analysis of contrast and brightness in images. The objective of image enhancement techniques is to process images based on Histogram Equalization so that the result is more suitable than the original image for a specific application. The choice of the technique depends upon the requirement. Histogram equalization method is powerful compared to other methods as it increases the global contrast of many images, especially when the usable data of the image is represented by close contrast values. Through histogram equalization, the intensities can be better spread on the histogram and this allows for areas of lower local contrast to improvement a higher contrast. Various methods have been proposed for limiting the levels of enhancement and most of the enhancement algorithms are based on Histogram Equalization. A comparative study is done on Brightness Preserving System with histogram equalization (BBHE) and Recursive Method of BBHE. Recursive Mean-Separate Histogram Equalization (RMSHE) is another improvement of BBHE. These algorithms clearly state that the Image enhancement using Histogram equalization significantly improve the visual appearance of the image.

An Analysis of Important Issues Associated with Cloud Computing

Journal of IOT Applications for smart city, Available online 29th August 2017

Rohit Nagar | K. Gupta, Raj Mohan Singh

Abstract

Cloud computing is a service based technology on internet which provides many facilities to the users to access plenty of resources on demand from anywhere and anytime in the world. Cloud computing mainly aims to give proficient access to the remote and geographically distributed resources. As cloud technology is evolving day by day it confronts many numerous challenges. This paper gives an overview of cloud computing and provides a concise but all-round analysis of important issues like scheduling issues, security issues, access control issues, multi tenancy issues, trust management , privacy issues etc.

An Analysis of Keyword Search Retrieval Techniques on Multi-Dimensional Datasets

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Mrs. R.Ramya Devi | T.Shanmuga Priya

Abstract

Information retrieval (IR) is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing. Information retrieval is the most concentrated research field in the real world environment which enables users to retrieve the contents stored in the web. Keyword based search retrieval make ease of this task which can find the most similar information present web source accurate by computing similarity distance between the keywords submitted and the information present on web source. However keyword based similarity finding on multi-dimensional data would be more difficult task which required more computation to be performed. In this analysis work, comparison evaluation of different methodologies that are implemented to perform keyword based search retrieval on multi-dimensional data set has been discussed. Those research methodologies have been discussed based on their working procedures in detail. The different existing research methods are compared in detail based on their merits and demerits. The comparison analysis of research methods are conducted by comparing them with each other in terms of their merits and demerits. From this analysis, efficient research methodology that can perform key word based search retrieval in the flexible and accurate way can be identified in terms of performance improvement.

An Analysis of Mongolian Telecommunication Sector Situation And It’s Consumer Perception

International Journal of Science , Engineering and Management, Available online 26th December 2017

Oyuntuguldur Gan-Unur | Bayartsetseg Badralt, Tamiraa Munkhbat, Gombosuren Nyam-Osor, Enkh-Och Zolbayar

Abstract

Globally, the Telecommunication area is a fast-changing apple with latest innovations continuously in the works. The Telecommunication Area in Mongolia is no different. It is active and continuously adapting to new technologies and to the accretion customer demands. Although the bazaar is saturated with account to accession of new consumers, the ambit lies in accretion the bazaar allotment by accretion the account provided to the consumers. At this stage, the bazaar baton is assertively by the akin of account superior and amalgamation offered to the consumers. This account superior is delivered to the consumers by the account providers who are able to do this with the technology and advice of Telecommunication vendors. This constitutes the all- encompassing archetypal of the Telecom aliment chain.

An Analysis of Mongolian Telecommunication Sector Situation And It’s Consumer Perception

International Journal of Science , Engineering and Management, Available online 5th January 2018

Oyuntuguldur Gan-Unur | Bayartsetseg Badralt, amiraa Munkhbat, Gombosuren Nyam-Osor, Enkh-Och Zolbayar

Abstract

Globally, the Telecommunication area is a fast-changing apple with latest innovations continuously in the works. The Telecommunication Area in Mongolia is no different. It is active and continuously adapting to new technologies and to the accretion customer demands. Although the bazaar is saturated with an account to the accession of new consumers, the ambit lies in accretion the bazaar allotment by accretion the account provided to the consumers. At this stage, the bazaar baton is assertively by the akin of account superior and amalgamation offered to the consumers. This account superior is delivered to the consumers by the account providers who are able to do this with the technology and advice of Telecommunication vendors. This constitutes the all- encompassing archetypal of the Telecom aliment chain.

An Analytical approach on Data Mining in AgriClinics-A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd March 2018

K.P.Mangani | Dr. R.Kousalya

Abstract

“Most things except Agriculture can wait” is the statement by Jawaharlal Nehru. To utilize the agriculture in a better way this paper handshakes with the Information technology and establish Agri Clinics which are envisaged to provide expert advice and services to farmers on various aspects like cropping practices, plant protection, crop insurance, post-harvest technology, clinical services for animals, feed and fodder management and crop prices to enhance the productivity of crops and increase the incomes of farmers. The goal of this survey provides a review of different types of data mining approaches and problems being addressed in agriculture-related fields.The agriculture-related data are recorded but they are not digitized so they are integrated in the standardized format which deals with big data that bridge the knowledge of the data to the yield estimation and gives an analytical approach to support decision-making system and recommendations for farmers in agriculture-related fields.

An Android Application for Managing and Maintaining Health Condition of Pregnant Women

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 27th November 2017

Mrs.Sandhya Waghere | Laxmi Patil, Rajeshree Khedkar, Vrushali Chaudhari

Abstract

The purpose of this project is to develop an Android application that can provide a useful guide for the pregnant mom to manage their healthcare issues and maintain all necessary routine checkup with diets by themselves. The application will serve as an alternative to encourage self-care among the pregnant women in order to maintain a healthy weight gain during their pregnancy stages. This application is developed to bring convenience to the pregnant women and increase their self -care awareness. Mobile P2P Network has become part of P2P Network that also deals with various issues of cloud services when is accessed by portable devices in wireless environment. The pregnancy Healthcare data is relatively sensitive compared to other common data which need at most supervision. When Cloud services are accessed by the mobile devices additional challenge like security arises and correct time data delivery. Providing the Security and privacy for the pregnancy medical data is an interesting topic to deal with. In this paper the survey is done about the various challenges faced in Mobile based pregnancy Healthcare P2P Network and the existing scenarios along with pregnant women body checkup with medicine alert system. Our proposed system also consist of diet which is designed to provide the increased nutrients during pregnancy that are essential for the health of the mother and the well-being of the baby

An approach for classification of plant leaf disease using back propagation neural network

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

V.Gayathri | S.Sakkaravarthi

Abstract

In rural field loss of yield for the most part happens because of broad of ailment. Generally the discovery and recognizable proof of the ailment is seen when the ailment advances to extreme stage. The framework is proposed to recognize and characterize the infections in leaf utilizing the picture handling procedures beginning from picture securing, pre-preparing, preparing and testing. . Picture handling strategies for this sort of choice examination includes preprocessing, highlight extraction and characterization arrange. At Processing, an info picture will be resized and area of intrigue choice performed if necessary. Here, shading and surface highlights are extricated from a contribution for arrange preparing and order. Shading highlights like mean, standard deviation of HSV shading space and surface highlights like vitality, complexity, homogeneity and relationship. . Highlights are extricated by the GLCM. BPN-FF classifier will be utilized for arrangement in view of learning with the preparation tests and along these lines giving the data on the irregularity (Early leaf spot, late leaf spot). The framework will be utilized to characterize the test pictures naturally to choose leaf either variation from the norm or great one

An Approach for Face Detection Using HAAR Features for Automatic Attendance System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Varshitha Gowda H S | Chandrashekar M Patil

Abstract

Human face detection has a wide application in biometric and security fields. It finds its application in photography, video surveillance and in many other areas. This paper proposes a face detection approach using Viola Jones algorithm with a Haar features converted to integral image to decrease the computational complexity. AdaBoost algorithm is used for feature selection and attentional cascade for fast rejection of non-face windows. This approach performs fifteen times faster than other face detection algorithms. This method is implemented in college for automatic class attendance system, which takes real time image as input and detects faces crops the face region and display along with their count, which helps in taking automatic attendance. With a high accuracy, the detected faces along with the count are updated. An improved result for face detection and accuracy is obtained using this algorithm.

An Approach for Managing Different Applications Using Centralized Load Balancer in Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd January 2018

Abhishek | Akash Kumar , Kunal Gautam, Suresh, Mrs Vani.K.A

Abstract

The data centers and end users are distributed across the globe in a large cloud environment. It is a tiresome situation for cloud data centers to serve huge requests coming from these end users. As a consequence, load balancing mechanism is used to distribute the loads efficiently and effectively among different nodes. To achieve high user contentment and high resource employment ratio, load balancers are used. In this paper we have used a central load balancer to balance the loads among different virtual machines in cloud data centers.

An approach to promote Frequency regulation using Free Governor mode operation method

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Ujwala. Tade | Neelam S. Pinjari, Nutan Attarde, Rekha Sonune

Abstract

As energy consumption as well as reliability based availability of power becomes the main factor to the economic growth. The electrical energy demand in country has been rising at the rate of 15% per annum. Generation capacity has been rising at the rate of 10% per annum. To bridge this gap advanced technologies have been necessary to incorporate in the Indian power sector.. Power system frequency is an important indicator of the quality of power supply. The Indian Electricity Act, the frequency has to be maintained within +/- 3% of the rated frequency, 50Hz. In india the frequency is always low and this causes severe problem to the connected load and power generating equipment. The grid operation in india has undergone a dramatic change in recent years with the introduction of Indian Electricity Grid code(IEGC), Free Governor mode operation(FGMO), Availability Based Triff(ABT). The above factors are gaining importance day by day among all stake holders. The area of my research proposes the success of the FGMO of Chandrapur Thermal Power plant (CTPP) respond to the standard frequency rate and this will make the operation more secure.

An Arduino Uno Microcontroller Based Prototype Overvoltage and Overcurrent Protection System

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th November 2017

Sourin Bhattacharya | Victor Sarkar, Priyam Sadhukhan, Nirab Majumder, Sarbojit Mukherjee, Sourav Saha

Abstract

It is of significant academic interest to develop cheap, dependable and robust protection systems for simple electrical circuitries for both academic and commercial usage. This research paper is intended to propose and implement a prototype overvoltage and overcurrent protection scheme of single phase two terminal passive circuits utilizing the Arduino Uno microcontroller and the Arduino Software (IDE). The proposed scheme would acquire and process conditioned analog input values of voltage and current of a system in real time and the implemented Arduino programmes would monitor whether those values exceed a predefined threshold; exceeding that will trip a relay to protect the system. The scheme would have three major segments that are the current sensing segment, the voltage sensing segment and the relay module and these segments shall be properly interfaced with the Arduino Uno Microcontroller and the load. The scheme is tested on a resistive and a lamp load and an analysis of the obtained data through experimentation on these electrical loads suggest that the proposed scheme is essentially feasible with moderate sensitivity

An Arduino Uno Microcontroller Based Prototype Overvoltage and Overcurrent Protection System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 11th November 2017

Supreeth Y S | Aditya S K, Sudhanva B, S G Raghavendra Prasad

Abstract

Crimes against women, as many as 2.24 million crimes were reported over the past decade. 26 crimes against women are reported every hour, reveals an IndiaSpend analysis based on the last decade’s data. Personal safety is one of the most important concerns for women, as crimes against them have been increasing. Various safety mobile Apps are flooding the market, yet they are not being of any use. This paper highlights the flaws in the existing Apps and also describes a smart wearable device that is easily accessible in panic situations

An Article on ECG Signal Denoising Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 17th August 2017

V. Supraja | Dr .P.Nageswara Rao, Prof.M.N.Giriprasad

Abstract

The presence of noise in an ECG trace complicates the identification analysis. Due to noise the quality of ECG signal is degrades. So the removal of noise is elaborated due to time varying nature of ECG signal. The ECG is widely used for diagnosis and analysis of heart diseases, so a good quality of ECG signal is required. In this article various types of noises corrupting ECG signal and various techniques based on Wavelet Transform, Fuzzy logic , FIR filtering , Empirical Mode Decomposition used in denoising the signal efficiently are presented in this paper. The results are comparing the performances of different denoising techniques based on related parameters are inserted.

An Assimilated Face Recognition System With effective Gender Recognition Rate

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th September 2017

K. Akhil Sreenivasulu | L. Guru Kumar,Dr. G. Harinatha Reddy

Abstract

Gender Recognition in Face Recognition System has prevalent applications in the fields of demographic data collection, video surveillance, security, retail advertising and marketing and it also plays a vital role on object recognition in robot research area, which has shown an intensive attention in the past few years.However, face recognition is still a challenging task since face images are easily confused by changes of the facial factors, such as illumination, pose, the different expressions, or glasses. The goal of this paper is to improve the effectiveness of gender recognition when there are affected(blurred) images in the dataset. We applied novel descriptor based COSFIRE filters to achieve the Gender Recognition[1] in the Face Recognition System. A COSFIRE filter is trainable, in that its selectivity is determined in an automatic configuration process that analyses a given prototype pattern of interest on FERET training set. Extensive experiments were conducted on the GENDER-FERET dataset which contains 474 training and 472 test samples and demonstrated robustness and effectiveness of the proposed model. It also outperforms an approach that relies on handcrafted features and an ensemble of classifiers.

An Asymmetric Multilevel Inverter Topology for PV Applications with Reduced Number of Power Electronic Components

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

K.Srinivasu | S.M.Shariff , Dr. K.Satyanarayana

Abstract

Multilevel inverter performance is high compared to the conventional two level inverters due to their reduced harmonic distortion, lower electromagnetic interference. However the main drawback of multilevel inverter is increased number of switches, complex pulse width modulation control and balancing of capacitor voltages. This paper proposes a single phase fifteen level inverter for photo-voltaic applications. The proposed inverter topology consists of fewer components with low complexity gate drives and control signals. This paper also presents the most relevant control and modulation methods like Staircase modulation technique with sinusoidal wave as reference. In this paper also studied proposed multilevel inverter topology for both symmetric and asymmetric configurations. Proposed multilevel inverter is compared with already existing inverter topologies. The entire system is numerically simulated using MATLAB/SIMULINK and the simulation results are presented.

An Attachment for a Pesticide Sprayer

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Onkar Navatre | Sandesh Patil,Shubham Pawar,Atul Aradhye

Abstract

In this paper, the design and implementation of pesticide sprayer has been presented. The proposed system is the modified model of the hand sprayer which minimizes the difficulties of the hand type of sprayer such that it also reduces time required to spray pesticide, labor skill, cost as well as effort etc. In this sprayer, the rotary motion is converted into reciprocating motion with the help of wheel. It could also be operated in rainy and cloudy weather conditions. This system can be used for spraying pesticides, fungicides, fertilizers and paints also. The developed systems initial cost is little more as compared to conventional sprayer but the running cost of the system is all most zero in other words minimum.

An Average Low-Power Clock Distribution Using Current-Mode Pulsed Flip-Flop with Enable

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Sumaiyya Fatima Ghouri | Rekha S

Abstract

The new prototype for clock distribution that utilizes current, instead of the voltage, to disperse a global clock signal with decreasing power utilization. While current mode (CM) signaling has been utilized as a part of balanced signs, this is the prime use in a one-to - numerous clock appropriation systems. To perform this, we make another best current-mode pulsed flip-flop with enable (CMPFFE) utilizing 45 nm CMOS technology. The power is global transports, clock distribution network (CDN), and synchronous signs by and large. The clock distribution system devours the extensive measure of power in synchronous computerized frameworks. Clock distribution systems are the key component of a synchronous and non- synchronous advanced circuit and a huge power. At the point when the CMPFFE is consolidated with a CM transmitter, the main CM clock dispersion system shows lower normal power contrasted with conventional voltage mode.

An Effective Approach for Detection of Various Brain Diseases from MRI Using Classification

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th May 2018

Sibi K | Palraj K, Dr.V.Kalaivani

Abstract

Image processing is used in most of the medical applications to diagnose wide variety of diseases. Brain tumor or neoplasm is the abnormal growth of tissues in brain and its surrounding regions. Image processing consists of preprocessing, segmentation and classification techniques which consists of methods for noise removal, feature extraction and morphological operations approach which helps in detecting and extracting the brain tumor from MRI images. In this way, MRI has become a useful medical diagnostic tool for detecting abnormalities in brain images. MRI provides better results than all other medical imaging tools. MR image is a sensitive tool in detecting the brain abnormalities such as tumors and infections during the early stage of the disease. Nowadays various applications are available for diagnosing the diseases from brain images. In our proposed method, a single system is used to detect various brain diseases such as birth defects in the brain, brain tumors and stroke. The abnormalities present in the MRI image are diagnosed based on some metric values. A region-based segmentation technique is used to extract the abnormalities such as brain tumors. A decision-based classification technique is also used which gives optimized results on detecting the range and type of abnormality from the brain images.

An Effective Approach for Diagnosis of Plant Disease using ELM

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th February 2018

S.Vijayalakshmi | D.Murugan

Abstract

The objective of this paper is to identify the diseases in the leaves of all plants. The detection of disease is one of the crucial importance to increase the productivity of plants. Plant pathology is the scientific study of plant diseases, based on this study, to identify the pathogen, and classification under different kind of circumstances. In existing, the automatic plant disease detection without the training set using only prior knowledge. The proposed method, to use detects the diseases by using the ELM (Extreme Learning Machine) techniques. In the above method, initially, the ABC Clustering has approached for segments the affected area. Secondly, using TELP (Transform Encoded Local Pattern), Gradient Features, Color Histogram Techniques for extracting the features from that affected area. Finally, these extracted features are given to the ELM classifier to get the exact type of disease affected by a leaves

An Effective Candidate Refinement Approach for High Dimensional Of K-Nearest Neighbour Search

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th December 2017

Guddati Venkata Satya Sriram | Dr.N.K.Kameswara Rao

Abstract

The volume of various non-textual content data is growing exponentially in the present viable universe. A conventional way of extracting helpful information from such records is to direct substance material generally in view of likenesses exertion. The most effective method to manufacture data frameworks to enable youthful comparability to discover on a major scale is an issue of developing significance. The endeavor is that trademark stacked actualities are normally spoken to as unreasonable dimensional trademark vectors, and the scourge of dimensionality orders that as dimensionality develops, any hunt methodology analyzes an expanding number of huge parts of the dataset lastly worsens its execution. In this article, we take a gander at a few key issues to enhance the precision and effectiveness of high-dimensional comparability asks. This paper is set non-surmised quickening of high-dimensional nonparametric operation including k closest neighbor classifiers. We endeavor to make the most the way that despite the fact that we require particular responses to nonparametric questions, we by and large don't have to expressly find the records directs close Toward the Inquiry, however simply need to answer inquiries concerning the homes of that arrangement of records focuses

An Effective model for mutagenesis prediction using Multi-relational Fuzzy Tree

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th June 2018

Dr. C.R.Vijayalakshmi | Dr. P.G Sivagaminathan, Dr.M.Thangaraj

Abstract

Most of the real world applications such as Loan approval, Credit card fraud detection etc uses relational databases which contain multiple relations that are inter-linked with the help of primary and foreign keys. It is very tricky to examine these applications with the help of traditional classification methods such as RIPPER and RIDOR. These methods are suitable for single relation and generate simple and comprehensible rules. But it cannot handle uncertainties and noises present in the real dataset. This paper presents a novel method for generating multi-relational classification model for mutagenesis prediction. The classifier is constructed based on the fuzzy extension of the decision tree. The experimental results show the efficiency of the proposed method compared to the existing algorithms

An Efficient 4-Bit Processor Design Using Quantum Dot Cellular Automata Technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Shalu .M. Sabu | Sukanya Sundaresh

Abstract

Integrated Circuit(IC) fabrication technology is improving, so the internal dimension of semiconductor devices are decreasing day by day. This trend of scaling down dimensions reached its limit in near future. In nanoscale design, Complementary Metal Oxide Semiconductor (CMOS) has certain limitations such as hot electron effect, interconnect crosstalk, power dissipation, operating speed, gate oxide and interconnect scaling. According to the novel nanotechnology Quantum-dot cellular automata (QCA),which provides a better computation platform than traditional CMOS, in which polarization of electrons indicates the digital information. This work relies on an efficient 4 bit processor design based on QCA technology and it is compared with the CMOS technology. The processor mainly consists of a comparator, ALU, accumulator and data memory. The comparator were designed based on Tree-Based(TB) architecture, that is the entire bit is splitted into two halves and computed separately. Finally, it is cascaded together. The ALU consists of arithmetic operations such as full adder, full subtractor and logical operations such as AND and XOR. The data memory is a 4 *4 volatile memory. QCA based design reduces delay, power dissipation and number of cells used. The VHDL language is used for coding and synthesis can be done by means of Xilinx-ISE 13.2

An Efficient and Fine-grained Big Data Access Control Scheme with Privacy preserving Policy

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd May 2018

M. Leela Amani | PK. VenkateswarLal, M. Sujatha, D. samatha, G. Subhasri

Abstract

How to manage the access of the massive amount of huge knowledge becomes a awfully difficult issue, particularly once huge knowledge ar keep within thecloud. Ciphertext-Policy Attribute based Encryption (CP-ABE) may be a promising secret writing technique that {allows} end-users to encode their knowledge beneath the access policies outlined over some attributes {of knowledge |of knowledge| of information} shoppers and solely allows data shoppers whose attributes satisfy the access policies to decode the information. In CP-ABE, the access policy is connected to the ciphertext in plaintext type, which can also leak some non-public data regarding end-users. Existing ways solely part hide the attribute values within the access policies, whereas the attribute names ar still unprotected. During this paper, we have a tendency to propose AN economical and fine-grained huge knowledge access management theme with privacy-preserving policy. Specifically, we have a tendency to hide the complete attribute (rather than solely its values) within the access policies. to help knowledge coding, we have a tendency to additionally style a unique Attribute Bloom Filter to judge whether or not AN attribute is within the access policy and find the precise position within the access policy if it's within the accesspolicy. Security analysis and performance analysis show thatour theme will preserve the privacy from any LSSS accesspolicy while not using a lot of overhead.

An Efficient and Reliable Diverse Keyword Ranked Search Scheme Over Ciphered Cloud Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Ms. Shruthi | Mehul Bhatt, Pushpa J, Sobin Baby, Akhil K. Manoj

Abstract

Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFxIDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly.

An Efficient and Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Nagesh S | A H Shanthakumara

Abstract

In cloud giving security, ensures for the sharing information record. Sadly, in view of0the continuous variation of the participation, allocation files while giving protection careful is so far a difficult issue, specially for an untrusted0cloud on account of the arrangement assault. In this exploration work, we propose an ensured information sharing course of action for dynamic individuals. Right off the bat, we propose a protected course for key appointment with no secured correspondence channels, and the clients can safely get their private keys from social event boss. Moreover, our course of action can complete fine-grained find the opportunity to control, any client in the party can utilize the source in the cloud and denied clients can't get to the cloud again after they are repudiated. Thirdly, we can shield the plan from intrigue strike, which proposes that deny clients can't get the exceptional information record paying little regard to the probability that they outline with the untrusted cloud. This course of action can accomplish fine practicality, which gathers past clients require not to revive their private keys for the circumstance either another client appreciates the social event or a client is denied from the party.

An Efficient Approach for Image Retrieval Based on Xor Distance Using Binary Hash Codes

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th May 2018

Prateek Prince Thakur | Arpit Chaudhary, Vibhav Prakash Singh, Rajeev Srivastava

Abstract

Deep learning has given very promising results in the field of image retrieval. These results are generally built on the already existing deep learning systems that are used for the standard classification problem. A popular techniques in this domain employees binary hash codes which are used as the semantic representation of the image. The approach has a major bottleneck relating to the time of computation. Our idea is built around combining this approach and performing clustering based upon the hash code. The relevant clusters are then obtained by both direct matching as well as appropriate clusters within some small hamming distance.

An Efficient Automatic Method of Optic Disc Segmentation using Region Growing Technique in Retinal Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th January 2018

Savitha H S | Sowmya.S, Sujatha B.T, Nirmala.M

Abstract

Segmentation of Optic disc (OD) from a retinal image is an essential step while developing automated screening systems for eye disease like diabetic retinopathy, Glaucoma etc. This paper proposes a method of automatic optic disk segmentation based on region growing technique with automatic seed selection. In this method centre of the optic disk is considered as a seed to apply region growing technique to segment the optic disk from the preprocessed retinal image. Automatic detection of the centre of the optic disk is done by double windowing method. The algorithm uses image processing techniques like contrast adjustment, morphological operations & filtering to process the retinal image and to remove the blood vessels from the retinal image. The performance of optic disk segmentation by the proposed method is compared with OptiC disk segmentation ophthalmologists and results are found convincing and efficient. The experimental results indicate this method of segmentation of the OD has good accuracy and also is computationally cheap.

An Efficient Cuckoo Search Algorithm for Segmentation of Satellite Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th August 2017

K.Bharathi | Mr.M Ravi Kishore,Mr. J Damodhar

Abstract

Satellite imaging is being the most attractive source of information for the governmental agencies and the commercial companies in last decade. Satellite images are characterized by weak local correlation between pixels, complete randomness and small multiple regions of interest which makes difficult to segment. The quality of the images is very important especially for the military or the police forces to pick the valuable information from the details. Satellite images may have unwanted signals called as noise in addition to useful information for several reasons such as heat generated electrons, bad sensor, wrong ISO settings, vibration and clouds. There are several image enhancement algorithms to reduce the effects of noise over the image to see the details and gather meaningful information. Satellite images are acquired with remote sensing. Remote sensing is the science and art of obtaining information about an object or area through a device that is not in contact with the object or the area under investigation. The classification can be done by using Image segmentation via various thresholding algorithms where segmentation is the process of dividing an object into several homogeneous regions such that union of no two adjacent regions is homogeneous. In this work an efficient cuckoo search algorithm is developed for segmentation of satellite images.

An Efficient Design of Dynamic VITERBI Decoder Architecture

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Mr.Parsekar Gaurav Rajanikant | Mrs.Veena H.S , Mr.Girish G Satardekar

Abstract

The emerging applications of wireless networks enforce new challenges in design of algorithms and communication protocols. In such scenario of challenges, coding for error control has be- come extremely important to provide robust communication and maintain quality of service. One method to improve Bit Error Rate (BER) while maintaining high data reliability, is to use an error correction technique like the VITERBI algorithm. The VITERBI algorithm provides an efficient method for Forward Error Correction (FEC) that improves channel reliability. As constraint length associated with input bits increases it needs to implement it with lesser computations and lesser hardware to decode the original data. Therefore Dynamic VITERBI Algorithm is used for decoding which reduces error probability, computation and employ lesser hard- ware with increased speed. The purpose of this paper is to understand VITERBI Algorithm, Adaptive VITERBI Algorithm and to find the alternative to shortcomings in the design and implement the idea on a hardware.

An Efficient Detection Of Primary Users Reoccupation In Cognitive Radio Systems By Active Sensing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

A.Suhanya | RS.Koteeshwari

Abstract

In the past years, fixed spectrum assignment policies worked well. But today, due to the rapid increase in number of users in mobile communication as well as in other communication areas, arises a problem called spectrum scarcity. It can be solved by developing a new communication paradigm that will use the existing spectrum efficiently. It is achieved with the help of cognitive radio. One of the main functions of the cognitive radio is spectrum sensing. In this paper, Spectrum sensing is carried out by Quite-Active sensing. In that, active sensing is carried out by spectral correlation function which is one of the cyclostationary feature detection with non-cooperative detection. Here, known pilot signals from the primary users base station are duplicated and reallocated in cognitive radio users modulating signal. The spectral correlation is carried out between the cognitive radio user and primary users. With the help of Spectral correlation function, we can efficiently detect the primary users reoccupation in cognitive radio systems. It will provide higher security because the pilots are added with the cognitive radio users modulating signal. And the simulation is carried out with the help of matlab and their results show the effectiveness of proposed approach.

An Efficient Fixed Point DLMS Adaptive Filter For Denoising

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Neethu Mary Raju | Asha A S

Abstract

The fixed point DLMS adaptive filter is employed for image processing applications and typical for image denoising application. Adaptive filter adapts the filter coefficients according to an optimization algorithm. Because of its simplicity and satisfactory convergence performance LMS (Least Mean Square) algorithm is used. It does not support pipelined implementation because of its recursive behaviour. It is modified to a form called the Delayed LMS (DLMS) algorithm, which allows pipelined implementation of the filter. For achieving lower adaptation delay as well as area and delay efficiency, partial product generators (PPG) and ripple carry adder for adding scheme is used. Adaptation delay can be reduced by decoupling the computations at the error computation block and weight update block. It also emphasis on fixed point issues as location of radix point choice of word length and quantization at various stages of computation. It is most popular for real-time adaptive system.

An Efficient Floating Point Arithmetic Unit Using Parallel Prefix Adder

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Rinu Susan Babu | Sukanya Sundaresh

Abstract

In fixed point number representation, digits after the decimal point is fixed and it does not provide a high precision value, while in floating point representation the decimal point is not fixed. Based on the concept of floating point number a fused floating point arithmetic unit is designed. Generally alignment, normalization and rounding are the complex process required in floatingpoint operation, which significantly increase the latency. This work relies on a fused floating-point three-term arithmetic unit, which includes a fused floating point three term adder unit, a fused floating point three term subtractor unit and a fused floating point three term multiplier unit. Here addition is the basic operation used in adder unit, subtractor unit and multipliers unit, which results in decrease or increase of delay. In order to improve the performance of a three term floating point arithmetic unit, carry save adder is replaced by a parallel prefix adder like kogge stone adder. A parallel prefix addition mainly includes a pre-processing stage, a carry generation stage and a post processing stage. This floating point three term arithmetic unit using parallel prefix adder is designed using VHDL language and it is synthesised in Xilinx ISE Design Suit 13.2 and can be simulated in Model SimSE 6.3f.

An Efficient Image Processing Based Method for Gills Segmentation from a Digital Fish Image

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

L.V.Pooja | Ashwitha K , Soudri Rakesh Kumar , Aruna Jyothi

Abstract

The quality and freshness of a fish test is for the most part influenced because of the taking care of and capacity conditions amid the post gathering period. The maintenance time and capacity medium are the two principle variables influencing the fish quality. This paper shows a picture handling based technique for programmed and effective division of gills from the fish test picture which can be utilized for fish freshness approval and assurance of any pesticide from the fish test under test. The actualized calculation has delivered a most extreme connection of 92.4% with the ground truth comes about got from specialists. The strategy utilized for gills division is quick and straightforward.

An Efficient Loom of Vegetation Exploration in Remote Sensing Images Using Object-Based Threshold Classification

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th November 2017

Dr. D. Napoleon | S. Dhanya Shree

Abstract

In recent years, despite the increased availability of high resolution satellite images there is a growth of extensive research in field of remote sensing image analysis. As such, there is a need for simple and efficient image classification technique to classify the remote data. The input data is obtained from the Landsat-7 satellite, which formulates to accomplish remote sensing image classification. This research work has been done with Object Based Threshold Classification to find the vegetation exploration with Normalized Vegetation Index, Near Infra-Red and visible brightness. The resultant land cover image with Object-Based Threshold The classification has more data classes and higher resolution than the normal image classification techniques. This research paper discusses an efficient and effective use of image classification which helps to classify the vegetation exploration in remote sensing images.

An Efficient Method for Software Reliability Using Modified Genetic Algorithm: Inflection S-Shaped Model

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

Dr. R.Satyaprasad | G. Bharathi

Abstract

In order to assess software reliability, many software reliability growth models (SRGMs) have been proposed in the past four decades. In principle, two widely used methods for the parameter estimation of SRGMs are the maximum likelihood estimation (MLE) and the least squares estimation (LSE). However, the approach of these two estimations may impose some restrictions on SRGMs, such as the existence of derivatives from formulated models or the needs for complex calculation. In this paper, we propose a modified genetic algorithm (MGA) to assess the reliability of software considering the Time domain software failure data using Inflection S-shaped model which is NonHomogenous Poisson Process (NHPP) based. Experiments based on real software failure data are performed, and the results show that the proposed genetic algorithm is more effective and faster than traditional algorithms

An Efficient Privacy-Preserving Communicating with Multiple Keys Using Assessment toolkit

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Swetha K B | Harshitha M P, Manoj M, VickySamson, Shikar joshi

Abstract

In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys (EPOM). Using EPOM, a large amount of users can safely outsource their information to a cloud server for storage. Moreover, encrypted data which belongs to different users can be processed without compromising on the security of the individual user's (original) data and the final computed results. To avoid the associated key management cost and private key exposure risk in EPOM, we use a distributed two-trapdoor public-key cryptosystem, the core cryptographic primitive. We also present the toolkit to make sure that the commonly used integer operations can be securely handled across different encrypted domains. We then prove that the proposed EPOM achieves the goal of secure integer number processing without resulting in privacy leakage of data to unauthorized parties. Last, we demonstrate the utility and the efficiency of EPOM using simulations.

An Efficient Public Distribution System using IOT, GSM and BAN Technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 28th December 2017

Kusuma Prabhu | Rajashree Nambiar, Sowmya bhat, Sachin bhat, Avinash. N.J

Abstract

In India, the government provides various ration materials to economically backward class of people at lower rates. Fraudulent conduct of concerned authorities may lead to improper measurements of the goods or selling of the unused goods without informing ration card holder and government. So central monitoring system is required, which is to be linked with government offices, shopkeeper and the ration card holder. Keeping this in mind, an efficient public distribution system is proposed in this paper using IOT, GSM, BAN technologies. Automatic monitoring of the public distribution system can overcome all the illegal activities by using BAN transmitter & amplifier receiver, where the details about users are provided. Using such a system, Government will be able to control the transactions of ration shop. In this system, once the distribution is done an automatic message is sent to customer and a mail to concerned government office

An Efficient Restoration Mechanism for Big Data Analysis of Cloud Using Compression Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th February 2018

M. Bairavi | M.Chandraleka, A.Meenakshi, S.RAMPRAKASH

Abstract

With the rapidly increasing amounts of data produced worldwide, networked and multi-user storage systems are becoming very popular. However, concerns over data security still prevent many users from migrating data to remote storage. The conventional solution is to encrypt the data before it leaves the owner’s premises. While sound from a security perspective, this approach prevents the storage provider from effectively applying storage efficiency functions, such as compression and deduplication, which would allow optimal use of the resources and consequently lower service cost. Client-side data deduplication, in particular, ensures that multiple uploads of the same content only consume network bandwidth and storage space of a single upload. Deduplication is actively used by a number of cloud backup providers as well as various cloud services. Unfortunately, encrypted data is pseudorandom and thus cannot be deduplicated: as a consequence, current schemes have to entirely sacrifice either security or storage efficiency. In this paper, we present schemes that permit a more fine-grained trade-off in data chunk similarity. The intuition is that outsourced data may require different levels of protection, depending on how popular it is: content shared by many users. Various deduplication schemes are analyzed and provide experimental results that show proposed secure data chunk similarity provide improved results in real time cloud environments

An Efficient Reversible Data Hiding Approach on Digital Video for Secret Data Communication

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

M.Rajakumari | S.Muthukumar

Abstract

The undertaking proposes the upgrade of security framework for mystery information correspondence through encoded information inserting in Shading pictures. In this examination, the writers propose a steganalytic plot for advanced video spread range (SS) information covering up. The proposed technique gauges both the shrouded message and the pickup factor of the SS installing rules. In this strategy, the cover outlines are first assessed and are contrasted and the gotten video outlines. At that point, the remaining lattice is processed and particular highlights are extricated from this framework and additionally the video outlines and assessed outlines. The help vector machine, at that point applies to the extricated highlights to arrange the video as either spotless or suspicious. In the event that the video is announced suspicious, both the shrouded message and the installing procedure pick up factor are assessed and subsequently the first video is remade. The reproduction comes about affirm the achievement of the creators' proposed strategy in identifying the stego video, estimation of the shrouded message and pick up factor and in addition recreation of the first video.

An Efficient Routing and Security Based on CBZA Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th June 2018

S. Muneeswari | N. Venkatesan

Abstract

MANET is one of the wireless Ad Hoc networks with wireless nodes under mobility. Due to its configuration and maintenance capabilities arises the security challenges in MANET. In this paper, an efficient routing with security based protocol towards mobile ad hoc networks is proposed. To provide security against malicious attacks an effective Cluster Based Zone Allocation (CBZA) algorithm is presented. Through NS2 simulations, the proposed CBZA method is compared with the MDR protocol. The proposed method achieves better reliability along with reduced energy consumption and improve the security also. Key generation is used for point to point and end to end communication achieved by Elliptic Curve Cryptography (ECC), is more scalable and requires lesser memory for storing keys. Also, the simulation results promises the detection of misbehaviour nodes and improved security

An Efficient Steganographic Approach for H.264/AVC Compressed Videos

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th March 2018

Saurabh Anand | Anand Singh Jalal

Abstract

Steganography is the art and science of communication which hides the presence of secret information. In this paper, a novel approach to hide the secret information in videos has been proposed for H.264/AVC compressed videos. H.264/AVC is known to be highly efficient and network friendly coding technique. In the proposed approach, we have utilized the F5 algorithm for preventing statistical attacks and improving embedding efficiency. Perceptual quality has been taken into consideration while using the Steganographic technique as well as after the compression by the H.264 method. Firstly, the videos are compressed and then the Steganographic method is applied. From the results, it is evident that F5 method gives the better PSNR values as far as perceptual quality is concerned.

An Electrical Energy Audit at Siddharth Institute

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

D.Harikrishna | Dr.C.Prabhu Rama Krishnan

Abstract

Energy plays a central role in all organisations, especially those are energy intensive. Energy audit was conducted at the Siddharth Institute of Science & Technology (SISTK), Puttur, to estimate the energy consumed in a daily and on annual basis. Energy auditing consists of several tasks which can be carried out depending on the type of audit & function of audited activity. It started with review of historical data of energy consumption, those data is important in order to understand the patterns of energy used. The next step is to setup an energy audit program. This program should start with survey of the site to gather the information of electrical equipments presently used. The energy audit discussed in this paper will only focused on Siddharth Institute of Science & Technology. It is carried out with an aim and analysis for identifying possible energy saving measures of this institute.

An Empirical Analysis of Component Based Software Engineering and Critical Evaluation of Component Selection using Analytic Hierarchy Process: A Quantitative Approach

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd February 2018

Jogannagari Malla Reddy | S.V.A.V. Prasad

Abstract

The Component Based Software Engineering (CBSE) is a sub discipline in Software Engineering, which would build the complex systems with integration of reusable prebuilt components. The reusable components are available in the Commercial of the Shelf (COTS), which are developed by third parties. The reusable concept reduces the development time, budget and human efforts in the software process. The requirement engineer performs crucial role in examining and selecting the proper component based on multiple criteria from the COTS. Analytic Hierarchy Process (AHP) provides the effective quantitative approach, which tackles such critical Multi Criteria Decision making problems. The intent of the paper is to evaluate and select the proper component from COTS using AHP, which leads to the customer satisfaction, reduces ambiguity, and prevents the software failure.

An Energy Efficient Clustering Algorithm in Wireless Sensor Network

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Sakshi Sukale | Tanaji D. Biradar

Abstract

In this fast forward world, we require all the information instantly . In some areas, Wireless Sensor Network is helping us to get this information. In aa thousand of cheap micro-sensor nodes allows a user to monitor a remote environment for civil as well as a military application from the main station. The data collected by micro-sensors is communicated through a network to a single sink node. For this communication first cluster sensors into groups, and via cluster head they will communicate to a sink node. Major energy Is getting consumed while communicating with the sink node resulting the sensors life become very short. This consumption of energy is not advisable, and also at the remote place it is very difficult to replace the battery of thousands micro sensor. To solve all these issues the algorithms has been invented . For effective balances cluster head and prolonged network lifetime, there is a novel uneven clustering scheme invented by Qi Zhang(2). By considering residual energy and distance from the sink node the modified algorithm has given a better performance. The same algorithm is called Distance and Energy Based Uneven Clustering (DEUC). By changing the method of selection of cluster head and also changing the probability factor modified DEUC algorithm gives a better performance than the previous one. The modified algorithm improves the lifetime of the node also the energy of the network.

An Enhanced iUPQC Controller to Provide Extra Grid-Voltage Regulation as a STATCOM

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

S.Mahaboob Basha | P.Bhaskar prasad , P.Chakradhar Rao

Abstract

This paper presents an improved controller for the dual topology of the unified power quality conditioner (iUPQC) extending its applicability in power-quality compensation, as well as in micro-grid applications. By using this controller, beyond the conventional UPQC power quality features, including voltage sag/swell compensation, the iUPQC will also provide reactive power support to regulate not only the load-bus voltage but also the vol t-age at the grid-side bus. In other words, the iUPQC will work as a static synchronous compensator (STATCOM) at the grid side, while providing also the conventional UPQC compensations at the load or micro-grid side. Experimental results are provided to verify the new functionality of the equipment.

An EOQ Model for Imperfect Items Deterioration and Time Dependent Rates

International Journal of Science , Engineering and Management, Available online 22nd January 2018

Kundan Mishra | -

Abstract

In the presented article we have developed an economic order quantity model at infinite planning horizon. Deterioration is taken into consideration. Demand and production rates are assumed to be time dependent. Production process is not reliable hence a percent of produced items is defective. A mathematical formulation has been done to find the optimum value of order quantity and total average cost. A numerical example is also given to illustrate the theoretical results. Finally the sensitivity analysis is reported to find the effect of different parameters.

An Experiental Investigation on Fresh And Durability Properties of Self Compacting Concrete using Various Blended Cements

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

P.Manjula | Prof C. Sashidhar

Abstract

Self compacting concrete is a concrete that can flow through congested reinforcing bars with elimination of compaction, and without undergoing any significant segregation and bleeding. SCC requires high volume of cement and sand. Use of high volume of cement increases CO2 emissions and leads to the green house effect, and continuous digging of sand from rivers causes depletion of rivers and creates lot of environmental problems. Use of supplementary materials may reduce the above problems with-out altering the SCC performance. This paper presents the fresh and durability properties of SCC using supplementary Cementatious materials like fly ash (25%), silica fume (10%) or Metakaolin (10%) robo sand in place of natural sand; coarse aggregate of size 12mm; GLINIUM 8630 as super plasticizer. The mix proportions were calculated by following European Federation of National Associations for Representing Concrete (EFNARC) guidelines. Mixes were prepared and tested for results. Slump flow, V-funnel and L-box tests are conducted to examine the fresh properties, acid (HCl&H2SO4) resistant and dry shrinkage are for the durability studies. This study shows that quaternary blended cement gives fresh properties and durability properties better than the ternary blended SCC

An Experiment on Effect of Mineral Admixture in Coconut Shell Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 21st September 2017

T.S. Lakshmi | K. Gunasekaran,K.S. Satyanarayanan

Abstract

The demand to make this material lighter has challenged scientists and engineers alike. The challenge in making a lightweight concrete is decreasing the density while maintaining strength and without adversely effecting cost. One such alternative is coconut shell (cs), as coarse aggregate in the production of concrete. Even though coconut shell possesses several desirable properties, its relative low tensile strength and deformation properties prompted many researches to work on to improve these properties. One such development of improving or modifying the properties of concrete is by supplementing the mineral admixtures with coconut shell concrete. Experimental investigations and analysis of results were conducted to study the compressive and flexural strength behavior of concrete with varying percentage of mineral admixtures. The concrete mix adopted were m25 with varying percentage of mineral admixtures ranging from 2%, 4%, 6%, 8%, 10%, 12%, 14%, 16%, 18%, 20%, 22%, 24%, and 26%. On the analysis of result the concrete with mineral admixtures in coconut shell had improved performance as compared to the ordinary concrete.

An Experimental Analysis of Spot Welding Parameters

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th June 2017

Ramkrishna Parihar | 

Abstract

in this experimental work, an attempt is made through ANOVA & using grey based Taguchi method is that weld time is found to be most significant factor. There were four input parameter which are weld time, hold time, weld current and electrode force are considered. There were three outputs attributed which is Tensile Shear Strength (TSS), Heat Affected Zone (HAZ) & Weld Nugget Diameter (WND) is taken. Analysis of variance (ANOVA) has been carried out with the help of Minitab 17 software.

An Experimental and Analytical Investigation on the Behaviour of Concrete Filled Steel Tubular Columns and Frames

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Mohammed Zakir Ali | Putte Gowda

Abstract

In this paper an attempt has been made to investigate the axial load carrying capacity of Concrete Filled Steel Tubular (CFST) columns. The grade of concrete is also one parameter which is studied in the present work. A total of 18 specimens were tested for axial compression. The height of compression members (columns) being 0.5m, 1.0m and 1.5m. Two empty hollow steel tubular columns for height 0.5m, 1m and 1.5m and two each for Concrete filled Steel Tube (CFST) columns for height 0.5m, 1.0m and 1.5m for M20 and M40 grade of concrete were tested. Finally Eurocode 4 and AISC-LRFD 2005 codes were used to compare the experimental results of Concrete Filled Steel Tubular (CFST) columns. The experimental results indicated that there was increase in the axial load carrying capacity of CFST columns from 17.3% to 19.7% and 22.2% to 38% for CFST columns filled with M20 and M40 grade of concrete respectively. The maximum percentage variation for experimental results and theoretical results of axial load carrying capacity of CFST columns evaluated in accordance with AISC-LRFD 2005 was around 21%. The maximum percentage variation for experimental results and theoretical results of axial load carrying capacity of CFST columns evaluated in accordance with Eurocode 4 was around 16%. Although there was some variation in the results between the experimental and theoretical results, but the experimental results were on the conservative side

An Experimental Investigation on Behavior of High Volume Alkali Activated Flyash Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

K.Sasidhar | S. Aruna Jyothy,Dr. B. Damodhara Reddy

Abstract

The usage of plain cement concrete in construction fields is a regular practice which has benefits on the other hand there are disadvantages also like emission of harmful gases and depletion of natural resources. As a part of remedial measures this project deals with the High volume Alkali Activated FlyAsh Concrete which reduces usage of OPC and increases quality of concrete. For obtaining better performance for FlyAsh, initially it has to be activated by any suitable base solution. The methodology involves partially replacing cement with 60% and 80% of FlyAsh with NaOH as alkali activator of 3M and 4M morality, adding with a variation of 3%, 5% and 7% with respect to weight of FlyAsh is considered. Results obtained after testing different mixes of High volume Alkali Activated FlyAsh Concrete under various tests and procedures of activation binding to IS codes show significant and desirable results when compared to controlled concrete but for final days of curing than initial ones.

An Experimental Investigation on Machinability of Titanium (Grade -2) using Cryogenic Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th July 2017

Samatham Madhukar | Dasari Jagath Prakash, Birudala Raga Harshith Reddy, Dr.V.V.Satyanarayana

Abstract

Among the group of super hard alloys, titanium is one of the fastest growing materials used in aerospace applications. The prime rationale for designers to choose titanium in their designs is its relative low mass for a given strength level and its relative resistance to high temperature. One drawback of these titanium material is their poor machinability. Many researches are going on to develop a machining technique that improves the machinability of hard materials. One such method that is under research for is cryogenic machining. In this type of machining the traditional coolant is replaced by the Liquid Nitrogen. Only the Liquid nitrogen is more preferable in machining because it is cost effective, safe, nonflammable and environmental friendly gas, in addition to that it cannot contaminate work piece, no separate mechanism for disposal .In this paper a machining test is conducted on the titanium Grade -2 material and the machining parameters temperature at the cutting area, cutting forces , power consumption , surface roughness are found by varying the speed, feed , depth of cut for the both normal machining and cryogenic machining.

An Experimental Investigation on Machinability of Titanium and Steels using Cryogenic Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th July 2017

Samatham Madhukar | Aitha Shravan , Katarapu Ram Kumar, J. Jagadesh Kumar

Abstract

Machinability is a property or quality of any material that can be clearly defined and quantified, to indicate how easy (or difficult) it is, to perform machining operations on it. In fact, the term is ambiguous, but the machinability of any material can be assessed using parameters like (i) tool life (ii) cutting forces (iii) power consumption (iv) surface finish and (v) chip morphology. In the current paper machinability of the materials like Mild steel, Stainless Steel and Titanium are studied; however special emphasis is given to Titanium as it difficult to machine due to high cutting forces, temperatures, chemical reactions with tools, and a relatively low modulus of elasticity. Titanium does not form a built-up edge on tools which is a common problem while machining steels and this result in good surface finishes even at low cutting speeds. The lack of a built-up edge, however, increases the alloying and abrading action of the thin chip which races over a small tool-chip contact area under high pressures. The combination of above characteristics and relatively poor thermal conductivity of titanium results in abnormally high tool-tip temperatures. To overcome this, one of the best techniques available is Cryogenic Machining. Cryogenic machining is a process in which the traditional lubrocooling is replaced by liquid nitrogen (LN2). Liquid nitrogen is more preferable in machining to dissipate heat generated because it is cost effective, safe, non-flammable and environment friendly gas. In addition, it does not contaminate work piece and no separate mechanism for disposal is required. In the current paper, the overall machining is done on turning machine and the parameters like Cutting forces, Surface finish, Temperature at cutting area and power consumption are obtained for the three materials. The overall results are tabulated and the conclusions are drawn accordingly. The main objective of the research is to improve the machinability of materials by using Cryogenic Machining techniques.

An Experimental Investigation on Machinability of Titanium and Steels using Cryogenic Machining

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 13th July 2017

Samatham Madhukar | Aitha Shravan,Katarapu Ram Kuma, J. Jagadesh Kumar

Abstract

Machinability is a property or quality of any material that can be clearly defined and quantified, to indicate how easy (or difficult) it is, to perform machining operations on it. In fact, the term is ambiguous, but the machinability of any material can be assessed using parameters like (i) tool life (ii) cutting forces (iii) power consumption (iv) surface finish and (v) chip morphology. In the current paper machinability of the materials like Mild steel, Stainless Steel and Titanium are studied; however special emphasis is given to Titanium as it difficult to machine due to high cutting forces, temperatures, chemical reactions with tools, and a relatively low modulus of elasticity. Titanium does not form a built-up edge on tools which is a common problem while machining steels and this result in good surface finishes even at low cutting speeds. The lack of a built-up edge, however, increases the alloying and abrading action of the thin chip which races over a small tool-chip contact area under high pressures. The combination of above characteristics and relatively poor thermal conductivity of titanium results in abnormally high tool-tip temperatures. To overcome this, one of the best techniques available is Cryogenic Machining. Cryogenic machining is a process in which the traditional lubrocooling is replaced by liquid nitrogen (LN2). Liquid nitrogen is more preferable in machining to dissipate heat generated because it is cost effective, safe, non-flammable and environment friendly gas. In addition, it does not contaminate work piece and no separate mechanism for disposal is required. In the current paper, the overall machining is done on turning machine and the parameters like Cutting forces, Surface finish, Temperature at cutting area and power consumption are obtained for the three materials. The overall results are tabulated and the conclusions are drawn accordingly. The main objective of the research is to improve the machinability of materials by using Cryogenic Machining techniques.

An Experimental Investigation on Machinability of Titanium and Steels using Cryogenic Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th July 2017

Samatham Madhukar | Aitha Shravan ,Katarapu Ram Kumar ,J. Jagadesh Kumar

Abstract

Machinability is a property or quality of any material that can be clearly defined and quantified, to indicate how easy (or difficult) it is, to perform machining operations on it. In fact, the term is ambiguous, but the machinability of any material can be assessed using parameters like (i) tool life (ii) cutting forces (iii) power consumption (iv) surface finish and (v) chip morphology. In the current paper machinability of the materials like Mild steel, Stainless Steel and Titanium are studied; however special emphasis is given to Titanium as it difficult to machine due to high cutting forces, temperatures, chemical reactions with tools, and a relatively low modulus of elasticity. Titanium does not form a built-up edge on tools which is a common problem while machining steels and this result in good surface finishes even at low cutting speeds. The lack of a built-up edge, however, increases the alloying and abrading action of the thin chip which races over a small tool-chip contact area under high pressures. The combination of above characteristics and relatively poor thermal conductivity of titanium results in abnormally high tool-tip temperatures. To overcome this, one of the best techniques available is Cryogenic Machining. Cryogenic machining is a process in which the traditional lubro-cooling is replaced by liquid nitrogen (LN2). Liquid nitrogen is more preferable in machining to dissipate heat generated because it is cost effective, safe, non-flammable and environment friendly gas. In addition, it does not contaminate work piece and no separate mechanism for disposal is required. In the current paper, the overall machining is done on turning machine and the parameters like Cutting forces, Surface finish, Temperature at cutting area and power consumption are obtained for the three materials. The overall results are tabulated and the conclusions are drawn accordingly. The main objective of the research is to improve the machinability of materials by using Cryogenic Machining technique

An Experimental Study of the Heat Pipe based Evacuated tube Collector for Water Heating

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 3rd February 2018

Dr. Rajneesh Kaushal  | 

Abstract

The objective of the present study is to enhance the heat transfer & efficiency of the Heat Pipe based Evacuated Tube water heater. Heat Pipe based Evacuated Tube collector is made of Borosilicate glass of 58 mm outside diameter and 49 mm inside diameter and length of 1800 mm. The Heat pipe of Evacuated Tube collector is made of copper with length 2000 mm and 12 mm outside diameter and 10 mm inside diameter. The experimental set up is situated 29° 58ˈ N and 76° 53ˈ E at NIT Kurukshetra. The results expressed that Heat Pipe based Evacuated Tube water heater is more efficient than without Heat Pipe based Evacuated Tube Water heater. The Heat Pipe based Evacuated Tube collector efficiency is 72 % and water outlet temperature is 64°C in summer and 52°C in winter. The present research is also focused on the use of various fluids in Heat Pipe.

An Experimental Study on Compressive Strength Behaviour of Polypropylene Fiber Reinforced Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Mr. Rahul G. Attarkar | Dr. S. P. Raut

Abstract

The role of construction materials is dominant in construction industry to obtained satisfactory results. The conventional concrete with traditional materials is unable to achieve desired strength at optimum proportioning of materials. Incorporation of additional materials such as fibers in conventional concrete improves its properties. In this present work a Polypropylene Fiber is used in cement concrete at different fiber content to study compressive behaviour of concrete after 7 and 28 days of curing. Results showed, Incorporating polypropylene fiber in cement concrete increases compressive strength. However excess dose of fiber affects workability of concrete.

An Experimental Study on Flexural Behaviour of Steel Fibre Reinforced Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd January 2018

Sandeep Gowda M | Ashwin K N,J K Dattatreya

Abstract

The objective of this study is to analyze the effects of steel fibre reinforcement in concrete for different dosages. Concrete mixes were prepared using M30 grade concrete with hooked end steel fibres of aspect ratio 80 (L/D where L=60mm and D=0.75mm) were added at a dosage of 0.25%, 0.5%, 0.75%, and 1.0% to volume fraction of concrete. The flexural strength was determined using a two point loading system. Load v/s deflections graphs were plotted for various percentages of fibre concrete specimens. Test results were compared with plain concrete specimen. From the experimental work it is found that with the increase in the steel fibre content in concrete there is an increase in flexural strength. The flexural strength at 1% steel fibre content is 9.1N/mm2 and the 0% fibre content is 5.78N/mm2 hence increase of 57.43% flexural strength is obtained.

An Experimental Study on Optimum Dosage of Ground Granulated Blast Furnace Slag for High Strength Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 17th August 2017

S.D. Mankar | S.S.Jamkar

Abstract

The present investigation is to use the waste product from steel industry which is helpful in cement production if it is ground at a fineness of cement which also helps to reduce the carbon emission. Ground Granulated Blast Furnace Slag (GGBFS) is used as a mineral additive for concrete production and substitutes for cement, it behaves as a binder material along with cement.The optimum dosage of GGBFS as cementitious material is characterized by high compressive strength, low heat of hydration, resistance to chemical attack, better workability, good durability and cost-effective.This paper presents a laboratory investigation on optimum level of ground granulated blast-furnace slag on compressive strength of concrete.18 concrete mix sample were cast with water to cementitious material (w/cm) ratio 0.32 and 0.30 each; using GGBFS as partial replacement of cement from 0% to 50% at an interval of 10%. The specimens were cured for 28 days in potable water. The compressive strength of concrete is examined.The test results revealed that the compressive strength of concrete mixtures containing GGBFS increases as the amount of GGBFSincrease, upto certain limit. The optimum dosage of GGBFS is found at. This can be explained by the presence of unreacted GGBFS, behaves as a filler material in the paste and not as a binder

An Experimental Study on Suppression of Vortex Shedding with Different Structural Configurations

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd August 2017

Sanal M V | Prof. Sunil A S

Abstract

The flow phenomena around bluff bodies or non-streamlined bodies in fluids are always of some engineering importance. Most of the engineering structures like buildings, bridges etc. can be considered as bluff bodies as far as the air or water flow in which the structure is being situated, is considered. This paper aims at the study of vortex induced vibration and suppression of the VIV on some common models of structures which can be considered, of having some engineering importance. The main parameter associated with the VIV formation is the Strouhal number (St.) which is the non-dimensional frequency of vortex shedding. The VIV was captured by using Fieldpaq Dynamic Signal Analyzer which has frequency ranges from 0 Hz to 40 kHz. The cylinders with varying number of fins and splitter plate length are tested. The methods to control VIV can be classified into three as active, passive or compound method. The passive method, would give some structural modifications on the model and considered to reduce the VIV formation. On the other hand,. Among these, the active and compound methods are costlier compared to the passive method. Therefore on an economic point of view the engineers are keen to develop more and more methods to suppress the VIV effectively with a lesser cost i.e., by employing the passive method. My study is on employing the model with straight fins.

An Implementation of Algorithm based on Back Pressure using Shadow in Wireless Ad Hoc Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th November 2017

Mohammad Sirajuddin | 

Abstract

In this work, organize coding has been as of late connected to remote systems to build throughput. Back-weight sort calculations in light of the calculation by Tassiulas and Ephremides have as of late gotten much consideration for mutually directing and planning over multi-bounce remote systems. We investigate the execution of backpressure directing and booking for TCP streams over remote systems. TCP and backpressure are not perfect because of a crisscross between the clog control system of TCP and the line measure based steering and planning of the backpressure structure. We decouple the steering and planning segments of the calculation by outlining a probabilistic directing table that is utilized to course bundles to per-goal lines. The planning choices on account of remote systems are made utilizing counters called shadow lines.

An Improved Blind Source Separation Using Bispectrum Slide Detection in Blind Spectrum Sensing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Rina Parikh | Shreya Matta, Anusha Garg

Abstract

Cognitive radio is a pivotal solution to combat the existing problem of inefficient usage of spectrum bands. Spectrum sensing is one of the most important issues in cognitive radio system. The unlicensed secondary user should detect the available idle spectrum resource accurately and thus reuse it opportunistically. Blind spectrum sensing refers to a condition where the signal can be detected under low SNR environment without any prior knowledge about the gain, noise variance and threshold of the channel. Based on the concept of Random Matrix Theory and Blind Source Separation method, a novel spectrum sensing approach is proposed using Bispectrum slide detection analysis. The novel approach of combining Random Matrix Theory with Bispectrum Slide detection based blind source separation in blind spectrum sensing has been proposed in this paper. Simulation results of proposed algorithm are obtained in the form of receiver operating characteristic curves. The results indicate that the proposed approach gives better results with less complexity than commonly used blind spectrum detection techniques.

An Improved Genetic Algorithm in C for Knapsack Problem

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th August 2017

Manpreet Kaur | 

Abstract

Genetic Algorithms (GA) provide a simple method to solve complex optimization problems. The performance of a Genetic Algorithm mainly depends on the genetic parameters, operators and the fitness function used. This paper proposed an improved Genetic Algorithm to solve a NP-hard problem i.e. Knapsack problem. The Improved GA is implemented using C programming language. It gives better results when compared against an existing GA to solve the Knapsack Problem. This paper also proposes an optimal parameter setting for Knapsack Problem using GA.

An Improved Maximum Power Point Tracking Of Three Phase Grid Connected Based On Robust Nonlinear Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd September 2017

M.Sangeetha | C.Prasanna Kumari

Abstract

This paper presents a robust nonlinear controller design for a three-phase grid-connected photovoltaic (PV) system to control the current injected into the grid and the dc-link voltage for extracting maximum power from PV units. The controller is designed based on the partial feedback linearization approach, and the robustness of the proposed control scheme is ensured by considering structured uncertainties within the PV system model. An approach for modelling the uncertainties through the satisfaction of matching conditions is provided. The superiority of the proposed robust controller is demonstrated on a test system through simulation results under different system contingencies along with changes in atmospheric conditions. From the simulation results, it is evident that the robust controller provides excellent performance under various operating conditions

An Inexpensive Vision-Based System to Accurately Detect EOR for Automobile Safety

International Journal of Engineering Research in Computer Science and Engineering, Available online 18th November 2017

A.Sri Lakshmi | D.Shekar Goud

Abstract

Distracted driving is one of the main causes of vehicle collisions in the United States. Passively monitoring a driver’s activities constitutes the basis of an automobile safety system that can potentially reduce the number of accidents by estimating the driver’s focus of attention. This paper proposes an inexpensive vision-based system to accurately detect Eyes Off the Road (EOR). The system has three main components: 1) robust facial feature tracking; 2) head pose and gaze estimation; and 3) 3-D geometric reasoning to detect EOR. From the video stream of a camera installed on the steering wheel column, our system tracks facial features from the driver’s face. Using the tracked landmarks the system computes head pose and gaze direction

An Innovative Approach for Age and Gender Estimation from Facial Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th January 2018

J. Suneetha | 

Abstract

In this paper, an innovative approach age estimation method based on decision level fusion of global and local characteristics is proposed. The structure and occurrence knowledge of human faces which are extracted with active appearance representations (AAR) are used as global facial characteristics. The local facial characteristics are the wrinkle characteristics extracted with Gabor filters and skin characteristics extracted with local binary patterns (LBP). Then facial characteristic classification is performed using an Innovative classifier which is the combination of an age group classification and specific age estimation. In the age group classification level, three distinct support vector machines (SVM) classifiers are trained using each characteristic vector. Then decision level fusion is performed to combine the results of these classifiers. The specific age of the classified image is then estimated in that age group, using the aging functions modeled with global and local characteristics, separately. Aging functions are modeled with multiple linear regressions. To make a final decision, the results of these aging functions are also fused in decision level.

An Innovative High-Performance E-Governance of Its Citizens To The Services of The Center in Rajasthan State

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th July 2017

Praveen Kumar Sharma | Vijay Singh Rathore

Abstract

The growth of the internet is due primarily to the interests of the private sector, but the Government is now one of the revolutions. Governments all over the world are taking important steps to make their services and on the Internet to provide information. A range of e- Government have taken the initiative to improve the efficiency and effectiveness of the Government's internal operations, communications and civil and transactions of individuals and organizations. The Government of the use of information and communications technology tools to have a significant impact on the development and growth of the country. The importance of the major e-management in the current system is to enable national success and leading countries in this era of the digital economy in the context of government, IT and communications resources, is a concept is called e-governance.The purpose of this paper is to explore the e-Government of Rajasthan is the largest of the National is India. It is a typical task is to explore the integration of e-Government of Rajasthan, still in this article is simply trying to representatives of every aspect of governance in the State of Rajasthan in summary form.

An Innovative Method For Forest Fire Risk Zoning Map Using Fuzzy Inference System And GIS

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th January 2018

A.poonguzhali | Sushmitha B.R, Swati Nagaraj Mesta, Soundarya R, Vanajakshi M

Abstract

Forest Fire causes considerable environmental damage and brings about a significant change in the ecosystem of the region. It is a humanistic and a national duty to protect against fire the forests. Most of such forest fire incidents result from human nonchalance. Other causes such as a thunderstorm, glass objects and etc. are also considered as triggers of such incidents, this paper mainly focuses on the human factor. The considered parameters such as distance from the road, residential areas, river, slope, climate and type of vegetation, and GIS play a significant role in the analysis and determining the factors impacting fire incidents. GIS was used for the analysis and calculations required in regard with these parameters. Therefore the locations with fire risk are determined by a combination of experimental model, fuzzy inference system and GIS. The obtained results indicate high accuracy and good efficiency. Results discussed extensively in the paper. To evaluate the proposed method, the obtained results were compared with fire incidents of past years. The comparison results indicate an improvement in predication by this method in comparison with other methods.

An Insight into Plant Disease Detection Using Image Processing- A Review

International Journal of Engineering Research in Computer Science and Engineering, Available online 25th April 2018

Babu Kumar S | J Nagaraja, S Venkatesan

Abstract

India mainly depends on Agriculture, as 60-75% of Indian population depends on source of Agriculture directly or indirectly. Agriculture plays a very vital role in terms of social and economic aspects of the country. The crop productivity reduces automatically due to disease that may affect the plants, and also may reduce the quality of the crops. This paper includes a detailed survey on plant disease detection from leaf using image processing. The reason for considering leaf as a source for plant disease detection is, studies have shown that the diagnosis of diseased plant can be achieved better from properties of leaf. The better productivity of the crops is achieved if the plants have resistance against various types of diseases, which may be caused due to Bacteria, Virus or Fungi. But due to external factors and internal factors most of the plants are easily prone to get attacked by various diseases easily, resulting in reduced quality and quantity of crops or fruits. Hence detection and diagnosis of the plant disease at the right time helps in proper productivity of crops. Detection can be achieved using various features like color, intensity, region of attack, size, shape, dimensions etc. This paper presents an overview of various techniques using different methods available for plant disease detection.

An Integrated Energy Measurement Technique for Smart Grid

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

M.A.P.Nareshkumar | 

Abstract

Smart grid is the integration of advanced information, communication and networking technologies in traditional electric grid to make it smarter and faster in making decisions. With the increase in population, there is increase in the demand for electricity. Nowadays we are generating our own power for home and industries. We can reduce demand by selling power to grid after our own usage. Cost can vary in proportion to the demand. In this paper, we explain to implement a smart meter to display power both EB & generated Solar power, and provide for the actual power consumption. By monitoring both EB cost and renewable energy cost is up a single energy meter both selling and consuming power from grid to home and vice-versa can be known using GSM methods through if it possible to intimate the consuming and selling power from grid to consumers through Messages and also to Electricity Board for government data. The monthly EB cost should be intimated through messages by calculating both real time and critical time cost and also selling power to grid and reduced to determine the actual power consumed. We propose to implement a smart meter to display power both EB & generated Solar power, and provide for the actual power consumption.

An Integrated Intrusion Detection Model of Cluster- Based Visual Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 2nd June 2018

J.Beryl Tahpenes | R.Nirmalan

Abstract

Visual sensor networks (VSNs) are highly exposed to attacks since they are arranged openly in possibly solitary environments. Due to the bulky and bursty data traffic in VSN, it thrusts the need to establish mechanisms which provide reliable data communication across the network over the unreliable channels. Optimized Adaptive Boosting (OAB) algorithm is used for detection of anomalies in sensor nodes, cluster head nodes and Sink nodes. In this paper, in order to identify the modified packets or attacked packets at the receiver side, we propose a protocol named Efficient Secure Routing for Attacker Identification (ESRAI). This paper proposes an integrated intrusion detection model of cluster-based visual sensor network by combining anomaly and misuse detection, aiming at enhancing overall detection, security and System Accuracy. The proposed integrated model provides high throughput and more security, and it increases the efficiency of entire network when compared to the existing network.

An Integrated IVCCRL Approach for the reduction of Negative Bias Temperature Instability in an AES Core

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Anitha Patibandla | Dr.B.L.Raju

Abstract

Reliability of Circuits is one of the major concerns in VLSI circuits and systems designs. Negative Bias Temperature Instability(NBTI), which has a deteriorating effect on the threshold voltage and the drive current of semiconductor devices, is emerging as a major reliability degradation mechanism [1].An important Reliability issue in the recent times is the Negative bias temperature instability (NBTI) in the MOS circuits in Cryptographic cores. Many works propose hardware implementations of cryptographic primitives with the promise of reduction in area, power dissipation and cost. An integrated IVCCRL approach for the reduction of Negative Bias Temperature Instability in an AES Core using the techniques of Input Vector Control (IVC) and Reversible Logic (RL) is being proposed in this paper. The effect of input vector control investigated. Mini-mum leakage vectors, which lead to minimum circuit performance degradation and maximum leakage reduction rate, are selected and used when the circuit is in the standby mode. Analysis on the potential to save the circuit performance degradation by internal node control techniques during circuit standby mode is discussed. The optimization is done for the AES algorithm using NCL Reversible Gates for low power, low cost and low area. Simulation Results have been analyzed and presented.

An Integration of an UPQC In Micro-grid With Improving The Power Quality In Both Interconnected And Islanding Modes of Operation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

G.Venkatesh | L.Baya Reddy , D.B.Eswar Rao

Abstract

the placement, integration, and control of unified power quality conditioner (UPQC) in distributed generation (DG)- based grid connected/autonomous micro-grid/ micro generation (?G) system has been presented here. The DG converters (with storage) and the shunt part of the UPQC Active Power Filter (APFsh) is placed at the Point of Common Coupling (PCC). The series part of the UPQC (APFse) is connected before the PCC and in series with the grid. The dc link can also be integrated with the storage system. An intelligent islanding detection and reconnection technique (IR) are introduced in the UPQC as a secondary control. Hence, it is termed as UPQC?G?IR. The advantages of the proposed UPQC?G?IR over the normal UPQC are to compensate voltage interruption in addition to voltage sag/swell, harmonic, and reactive power compensation in the interconnected mode. During the interconnected and islanded mode, DG converter with storage will supply the active power only and the shunt part of the UPQC will compensate the reactive and harmonic power of the load. It also offers the DG converter to remain connected during the voltage disturbance including phase jump.

An Intelligent Appliance with Multimedia Capability

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Pooja.N | Ramya Sai.M,Rekha.P,Radha.S

Abstract

Smart refrigeration with the help of a smart fridge is a concept that finds its place in smart kitchens. The smart refrigerator is capable of sensing and monitoring its contents and is also able to remotely notify the user about scarce products via SMS (Short Message Service) and email using a GSM module. It also facilitates the purchase of scarce items by providing a link of the online website for purchase of that particular item. This assessment is done with the help of LDR and micro switches employed as pressure sensors (quantity management), odor sensor (quality management) and RFID (shelf life management). The overall food management is done based on coding done using Keil software for the same purpose.

An Intelligent Crawler

International Journal of Science , Engineering and Management, Available online 18th April 2018

Mrugnayani Sharma | Padmapani P. Tribhuvan

Abstract

A web crawler is a software program or programmed script that browses the world extensive web in a systematic, automated manner. Web crawler peregrinates from web page to page via the making use of the graphical structure of the internet pages. Such programs are additionally kenned as robots, spiders, and worms. In this system explained further, Data mining algorithms were used to introduce intelligence into the crawler. A statistical analysis of the performance of intelligent crawler is presented in this work. While introducing crawler intelligence, data mining algorithm plays an important role. The main objective is to develop an intelligent crawler to serve the purpose of web-indexing which helps in gathering relevant information from over the Internet with the help of search engines. The proposed intelligent crawler must perform crawling in minimum time with a maximum number of results.

An Intuitive Architecture for Next Generation Digital Personal Assistants

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mehul Jain | Utkarsh Bhatia

Abstract

Current voice-based digital assistants despite their claims of being intelligent, lack abilities that a true personal assistant must possess like extendable skill set, dynamic adaptation and high context awareness. In this paper, we highlight some design and implementation requirements that must be met in order for the development of next generation digital personal assistants and propose a general architectural backbone that can be used to make headway for such personalized speechoperated assistive technology. In particular, we confer about issues of extensibility of the skill set used by the digital assistant, hypothesis generation and evaluation, extensive user adaptation, and redundant representations handling in the design. Further, we briefly discuss the research and development directions that are undertaken to tackle challenges put by such a system. We then consider a scenario and illustrate the data flow in our architecture.

An Investigation into Factors Causing Time and Cost Overrun in Marine Construction Projects in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th July 2017

Shrivas Abhishek | Dr. Saxena Anil Kumar

Abstract

The construction industry is of great significance to the economy of India. The Construction sector in India is the sixth largest economic activity in India and provides employment to a large group of people. However, it is infamous for projects overrunning time and cost. A large number of researches have been conducted to define causes of time and cost overrun in completing construction projects. A study on time and cost overrun of different types of Marine construction projects in India was conducted to determine the causes of overrun and their importance according to each of the project participant’s experience level, i.e., below 5 years, 5-10 years and above 10 years. The field survey conducted included 37 respondents of less than 5 years’ experience, 44 respondents of 5-10 years’ experience and 39 respondents of more than 10 years’ experience. The researcher identified 3 groups of factors causing overrun and in each group 6 factors were placed according to their nature, totaling to 18 factors of time and cost overrun. Data were gathered through a survey, analyzed by using Relative importance index, taking in view different experience levels

An Investigation of Corrosion Behavior at Weld Interface in SA 213 and SA 387 FWTPET Joints

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

P.G.Karuppanna Raja | Dr.M.Rajkumar

Abstract

Friction welding of tube to tube plate using an external tool (FWTPET) is a solid state welding process used for joining tube to tube plate of either similar or dissimilar materials with metallurgical properties. In the present study, FWTPET has been used to weld SA 213 tube with SA 387 tube plate and the corrosion behaviour at weld interface has been analyzed and the weld interface is found to have increased in corrosion resistance value due to the influence of the grain refinement after the welding process. Hence, the present investigation is carried out to analysis the corrosion behaviour at weld interface in the presence and absence of corrosion inhibitor Sodium Potassium Tartrate (SPT) with well water in friction welded dissimilar joints of SA 213 tube and SA 387 tube plate joints and the results are presented.

An Investigation of End-To-End Speaker Recognition Using Deep Neural Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Lakhsmi HR | Sivanand Achanta , Suryakanth V Gangashetty , R Kumaraswamy

Abstract

State-of-the-art automatic speaker recognition (SR) has been dominated by Gaussian mixture model-universal background model (GMM-UBM) based i-vector feature extraction methods. Although these systems are robust, extraction of ivectors is very time consuming and a separate classifier needs to be trained for decision making in the end. Inorder to alleviate the above disadvantages, in this paper we propose to use deep neural networks for end-to-end speaker recognition. We perform several experiments to determine the best suited architecture, the hyper-parameter tuning algorithm and the initialization scheme for SR task. The proposed method combines feature extraction and classification step, and is of very low foot print. Through objective metric (equal error rate) we show that the proposed method outperforms the GMM-UBM conventional system

An Investigation on Nearest Neighbor Search Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Upinder Kaur | (Dr.) Pushpa R Suri

Abstract

The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a dataset, is a tedious task that effects the quality and usefulness of the NNQ processing algorithms which determined by the time as well as space complexity. The simplest solution to the NNS problem is to compute the distance from the query point to every other point in the database. However, due to these complexities issue, the various research techniques have been proposed. It is a technique which has applications in various fields such as pattern recognition, moving object recognition etc. In this paper, a comprehensive analysis on data structures, processing techniques and variety of algorithms in this field is done along with different way to categorize the NNS techniques is presented. This different category such as weighted, additive, reductional, continuous, reverse, principal axis, which are analyzed and compared in this paper. Complexity of different data structures used in different NNS algorithms is also discussed.

An Investigation on Nearest Neighbor Search Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Upinder Kaur | (Dr.) Pushpa R Suri

Abstract

The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a dataset, is a tedious task that effects the quality and usefulness of the NNQ processing algorithms which determined by the time as well as space complexity. The simplest solution to the NNS problem is to compute the distance from the query point to every other point in the database. However, due to these complexities issue, the various research techniques have been proposed. It is a technique which has applications in various fields such as pattern recognition, moving object recognition etc. In this paper, a comprehensive analysis on data structures, processing techniques and variety of algorithms in this field is done along with different way to categorize the NNS techniques is presented. This different category such as weighted, additive, reductional, continuous, reverse, principal axis, which are analyzed and compared in this paper. Complexity of different data structures used in different NNS algorithms is also discussed.

An IoT-Cloud Based ECG Telemonitoring System for Smart Healthcare

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

Raguvaasan .S | Balamurugan .S, R.Lakshmi Devi, Dr.V.Kalaivani

Abstract

Internet of Things (IoT) promises to revolutionize the health-care sector through remote, continuous, and non-invasive monitoring of patients. An IoT platform for prediction of Cardiovascular Diseases using a Signal Quality Aware-IoT-enabled ECG telemetry system, intervals detection application has been presented that contains a Processing signal and alert physician for emergency through Android application. It is helpful for the physician to analysis the heart disease as easy and accurate. We are developing a continuous ECG monitoring system by which people can check their ECG signal even at their home, identify any problem in heart or identify cardiovascular diseases and alert the physician for emergency. The size of system is small and it requires less maintenance and operational cost

An Optimized Approach for Relay Selection in Cognitive Radio Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd January 2018

Navya P | Sadiqa Bawoor

Abstract

The cognitive radio networks benefits has been well recognized in the wireless communication application. In this paper, a decode and forward protocol is implemented in order to increase the security of the system rather than only amplifying and forwarding. The analysis of throughput is also studied with a different approach of scanning the secondary users based on their even and odd numbers. Simulations are conducted for observation steps and average reward for different number of secondary users. The analyses is also done for the increase in throughput with the modified scanning methodology using the simulation.

An Overview of COBIT Principals for Bring Your Own Policy Implementation

International Journal of Science , Engineering and Management, Available online 18th April 2018

Dr. Khan Rahat Afreen | 

Abstract

COBIT is a business framework for management and governance of enterprise IT, provided by ISACA, an international professional association focused on IT Governance. As per ISACA, “COBIT helps IT professionals and enterprise leaders fulfil their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.” BYO bring your own is a concept where employees can use their own systems, software, technology for the purpose of accomplishing organizational tasks. It is gaining rapid acceptance by the employers although it has a lot of challenges. COBIT can be the answer to the many questions faced while framing organizational policies around BYOD. While implementing BYOD, major challenges faced are not only from its technical implementation aspect but also from policy implementation and monitoring aspect. Companies may lose sensitive data if it resides on employee-owned devices. COBIT documentation provided by ISACA supports many of the essential causes that are a reason for BYOD initiative. The seven enablers provide an effective foundation for any organization to embrace BYOD policy in a well-structured manner.

An Overview of Text Mining and Its Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th May 2018

M.Kalpana | Dr.S.Nagaprasad, Dr.Manju Khari

Abstract

In KDD data Mining step is generally involved with the pattern detection in numeric knowledge, however fairly often necessary (e.g., important to business) data is hold on within the kind of text. Unlike numeric knowledge, text is usually unstructured, and troublesome to handle. Text mining normally incorporates of the analysis of text documents with the extraction of key phrases, concepts, etc. and also the training of the text practice therein way for additional analysis with lot of data Mining approaches. In explorative knowledge Analysis, some initial information is understood regarding the info, however data mining might facilitate in a very a lot of in-depth information regarding the info. Seeking information from huge knowledge is one amongst the primary attributes of knowledge mining. Manual data investigation about for an only some periods currently, however it creates a bottleneck for big data analysis. Variety of information retrieval techniques measure developed to extract this huge quantity of knowledge. Previous studies on data processing specialized in structured knowledge, like relative and transactional knowledge. Conversely, in certainty, a substantial section of the data is hold on in text databases that consist of enormous collections of documents from varied sources, like news articles, books, digital libraries and web content.

An Overview on Seismic Analysis of Multistoried Building using Equivalent Static Load Method & Response Spectrum Method: A Literature Survey

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th February 2018

Rahul D Patil | Asif Siddique, Mohit Ghate, Janhvee Motghare, Snehal Hadke, Dr. Balbir Singh Ruprai

Abstract

Performance based seismic design in the context of prediction of inelastic seismic responses and seismic performances of a building structure is very important topic to be a concern. Various forces act on a building but earthquake force is one of the most critical force and must be considered while analysis and design of the multi-storeyed building, as per, IS: 1893-2016 recommendations. Various software nowadays are available for analysis and designing of a building by considering the earthquake forces and to review or study the behaviour of multi-storeyed buildings by equivalent static lateral force method and response spectrum method and literature reviews of various papers considering this method are studied. Alternative survey of the research paper is done and it is observed that the response spectrum method is used for analysis of multi-storeyed building and incorporated in most of the course related to earthquake analysis of the building. The equivalent static load method is used often for regular buildings

An Powerful Instrument Landing System-A Review

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st August 2017

Naveen S V | Mr. Mani C, Dr. T.C.Manjunath

Abstract

It is commonly known that the directional pattern of the instrument landing system (ILS)-localizer antenna system, which constitutes the landing-course information for approaching aircraft, can be disturbed by reflections from large aircraft on the ground. Therefore, airport operators are interested in knowing configurations of landed and taxiing aircraft that lead to such ILS disturbance scenarios. Measurements on a real airport for investigating such scenarios are very cost-intensive and not sufficiently possible due to availability reasons. Therefore, a new scaled measurement setup is presented. Scaling down an aircraft by the factor of 144 requires a scaled ILS-localizer operating at a frequency of nearly 16 GHz, the development and realization of which is presented in this paper. Using this scaled ILS-localizer, measurements with an Airbus A380 and a Boeing B747 are conducted showing the feasibility of the scaled approach. Several configurations are shown where those aircraft lead to interferences of the ILS, exceeding allowed tolerances. A comparison of the reflection behavior of both aircraft shows only slight differences. Additionally, this paper presents the derivation of the bistatic radar cross section of both aircraft to be applicable to scenarios with arbitrary ILS patterns. The paper is the result of the seminar report undertaken by Mr. Naveen under the guidance of the faculty & the HOD

An Renewable Energy Source for Street Light Safety System Using Sensor and GSM

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 19th July 2017

Pagar Prajakta S. | Pandit Dnyaneshari H.,Meshram Apurva S.,Pawar Vijaya R.

Abstract

Now a day, the bridges, lanes, flyovers and highways consume a substantial amount of energy, making improved efficiency a significant challenge. For improving the efficiency, Solar Photo volatile based street light system is very common. But there are some limitations with this ordinary system because of the lack of intelligent performance. It is very essential to automate the system so that we can conserve energy and to maximize the efficiency of the system. However, the highway engineering integrated with smart control for energy optimization and provided safety to the vehicle has not been widely used. In these paper new method is suggested so, as to maximize the efficiency of highway lighting system using solar panel and conserved an energy usage with the help of IR sensor and LDR. This system uses a LDR which provide low resistance at day time and high resistance at night time; accordingly system turns on night time. The information about the vehicle position between IR sensors is transferred by using PIC microcontroller and LCD displays the present statement about the vehicle and GSM send the message to the control station hence we can take the immediate action if requiredsuch a way safety provided

An Unsolicited Heart Stroke Alert System for Humans

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th January 2018

S. Jeyadevan | Surya prakash.S, Sujay.S, Shivashankar.S, Sheela.L

Abstract

Health care for the elderly is one of the promising application fields of IoT. Among them, detecting and preventing indoor heatstroke conditions is a crucial issue. We propose a method for monitoring the indoor environment, detecting any risky conditions, and then effectively warning them to the elderly. Since elderly people have different physical weaknesses such as low vision and poor hearing, we designed and developed a system for alerting the elderly through multi-sensory information presentation. It can convey risky situations to the elderly via visual, auditory, and tactile stimuli.

Analysing Different Efficiency Evaluation Methods For Induction Motors

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Alphy Maria Abraham | Gilson Paul George,Josmy Jose, Reenu George

Abstract

Induction motors are the most commonly used machine in industry because of their robust nature. Energy management of induction motor is relevant as they form the bulk segment in industry. So online monitoring and efficiency estimation of the existing induction motors play a vital role in energy management. The air gap torque (AGT) method is a well established technique for determining the efficiency of an induction motor, since it is known to be highly accurate Unlike testing motor efficiency in a laboratory, certain methods given in IEEE Standard 112 cannot be used for motor efficiency evaluations in the field. For example, it is difficult to load a motor in the field with a dynamometer when the motor is already coupled to driven equipment. The motor efficiency field evaluation faces a different environment from that for which IEEE Standard 112 is chiefly written. A field evaluation method consists of one or several basic methods. This paper separates and compares the basic methods according to their physical natures.

Analysis & Hardware Implementation of Three- Phase Voltage Source Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 30th March 2018

Mrunali Salve | Shruti Gaoli, Bhairavi Nikhade, D.M.Holey

Abstract

With advances in solid-state power electronic devices and microprocessors, various pulse-width-modulation (PWM) techniques have been developed for industrial applications. For example, PWM-based three-phase voltage source inverters (VSI) convert DC power to AC power with variable voltage magnitude and variable frequency. This paper discusses three PWM techniques: the sinusoidal PWM (SPWM) technique, third-harmonic-injection PWM (THIPWM) technique & Digital PWM (DPWM) technique along with the analysis of Sensor less close-loop vector control of Induction motor drive. These PWM methods are compared by discussing their ease of implementation and by analyzing the output harmonic spectra of various output voltages and their total harmonic distortion (THD). The simulation results show that THIPWM techniques have lower total harmonic distortion than the SPWM & DPWM techniques & hardware implementation scheme for SPWM Inverter is discussed. The simulation results for Sensorless vector control are also discussed

Analysis & Simulation of Two Different MPPT Techniques for Photovoltaic System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Mrudani Wakhare | Rashmi Lohkare , Sneha khodke

Abstract

Photovoltaic (PV) is a technical name in which radiant (photon) energy from the sun is converted to direct current (dc) Electrical Energy. PV power output is still low, continuous efforts are taken to develop the PV converter and controller for maximum power extracting efficiency and reduced cost factor. The maximum power point tracking (MPPT) is a process which tracks one maximum power point from array input, varying the ratio between the voltage and current delivered to get the most power it can. In this paper the MPPT algorithm is implemented using Boost & Buck converter. The dynamics of PVA is simulated at different solar irradiance and cell temperature. The P&O MPPT technique is a direct control method enables ease to implement and less complexity.

Analysis and Design of Four Legged 400kv Multi- Circuit Transmission Tower with Different Bracing Systems

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th June 2018

Yashodeep N. Borse | Dr. G. R. Gandhe

Abstract

Transmission tower design is very useful because they constructed to carry power lines at safe and sufficient distances from ground level due to high voltage. Transmission tower constitutes 28 to 42% cost of transmission lines. Cost of tower depends upon its configurations and bracing patterns used. Bracing members enhance the stiffness and reduce the slenderness ratio of the tower. In the present study, four-legged multi-circuit 400 kV self-supporting transmission towers having 20 line deviation consisting four different bracing models are considered. Four different bracing patterns i.e. Inverted V bracing, XBX bracing, X-X bracing and W bracing are considered in the lower body. For analysis and design STAAD.Pro software is used as 3D space. For wind, analysis IS 802 (1995) is used. Performance of towers with respect to axial forces and deflections is presented

Analysis and Design of R.C.C. T-girder Bridge under IRC Class AA and Class A Loading

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Sudarshan Prabhakar Patil | Kameshwar Rao Tallapragada

Abstract

Reinforced concrete bridges with different types of deck slab have been widely used for both road and railway bridges. The most common type is the slab deck used for short span bridges. For medium span in the ranges of 12 to 25 m T- Girder and slab deck is widely used. In the case of T Girder and deck slab type, the slab span in two directions since it is cast integrally with main girder and cross girder. The deck slab is generally designed for either by 70 R loading or class AA Tracked wheel loading. IRC recommends bridge designed for class AA loading should also be checked for IRC class A loading. However in conventional analysis many of the important considerations are ignored by the various designers, which proved out to be somewhat unrealistic during the pragmatic conditions. For an assessment of the load carrying capacity of a bridge, one needs to know the maximum bending moment and the shear force included in the beams or girders of the bridge by vehicular loads. These maximum design load effect can be calculated by the conventional method such as Courbon’s method. The main objective of study is to analyse super structure for IRC Class AA loading (Tracked vehicle) and IRC Class A loading to compute the values of bending moment, shear force and deflection for span range from 16 to 24 m. The analysis of super structure of different sections and spans is carried out by Courbon’s method using MS Excel and by using STAAD.pro software. The bending moment and shear force results obtained by STAAD.pro were less up to 18 m span when compared to results obtained by MS Excel and vice-versa as the span increased. The safe design section is obtained by deflection criteria.

Analysis and Design of Suspension Cable Bridge: A Review

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st March 2018

Nakul S. Nagose | RVRK Prasad

Abstract

A suspension bridge is a type of bridge where the deck is hung below the suspension cable in vertical suspenders. The main forces are tension in cable and compression in the towers. The cable is anchored at each end of the bridge to maintain tension in this cable. Single steel wires have a 2.54 mm thick can support over half a ton without breaking. The central sag of the cable is varies from 1/10 to 1/15 of the span. The main disadvantage of aerodynamic profile may be required to prevent the bridge deck vibrating under high wind. The suspension bridge is generally not used for heavy rail traffic where high concentrated live load occurs, which adds dangerous stress to the structure. In suspension cable bridge the types of load such as dead load, live load, wind load and design parameter are determined and analyzed by using software sap2000 for different condition. In the following paper same important papers are discussed below.

Analysis and Implementation of Lossless Image Compression for Various Formatting Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

T.Vaitheeswari | Dr.R.Shenbagavalli, M.Revathi

Abstract

Digital image compression is a method of image data reduction to save storage space. Image compression is the process of reducing the size of the image that will enhance images sharing, image transmission and easy storage of the image. There are two types of image compression techniques. In Lossy compression, the compressed image is not equal to the original image; it means the quality of compressed image is less than the original image. In Lossless compression the compressed image is exactly equal to the original image. In this work, the analysis of different format of images have been implemented using the Lossless image compression techniques such as Huffman coding, EZW and SPIHT. Huffman encoding technique basically works on the rule of probability distribution. The principle is to reduce the size of the image by removing redundancies. Less number of bits is used to encode the image. Huffman encoding method is used in JPEG image. Set partitioning in hierarchical trees (SPIHT) is a waveletbased image compression technique. It gives good image compression ratios and image quality. EZW method is based on progressive encoding to compress an image. Experimental result was carried out on four types of image format such as .bmp, .jpg, .png, .tif. The Performance metrics such as Peak signal-to-noise ratio (PSNR), Compression Ratio (CR), Mean square error (MSE), Bits per pixel (BPP) were measured for each format of images

Analysis and Implementing the NTRU and Braid Group Cryptosystem Algorithms in IoT Devices

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th May 2018

M.Jeyanthi | S.Parameswaran

Abstract

In this paper we give an overview of public-key cryptographic schemes based on non-commutative groups with special consideration to braid groups and we have to analysis several commonly used light weight algorithm public key-exchange protocols with the aim of establishing the best algorithms for lightweight cryptography in critical infrastructure and emergency scenarios. Most of the method currently in use are based on arithmetic over finite field. The potential advent of quantum computer is very troubling because all of these cryptosystem are easily broken by such machine. Braid group based on non-commutative algebraic structure over infinite field .Braid group have certain properties that make them easily amenable to digital computation. The main contributions of this paper are: 1.Performance analysis of several state-of-the-art public-key cryptographic algorithms like NTRU Encryption, Braid groups etc. In order to find those that are most suitable for low power computing platforms 2.Implementing security framework based on the analyses public-key key-exchange cryptographic algorithms in IOT devices. Internet of Things (IoT) enables physical things to communicate, compute and take decisions based on any network activity. *This calls for a secure solution for communication among heterogeneous devices. *In heterogeneous environment motive of each user in IoT can be different in form of communication and computation and is difficult to be judged

Analysis and Mitigation of Harmonics Using Passive Filters

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd January 2018

Mathew Abraham | AnoopR,Barath S Kumar,LiyaDevassy

Abstract

Harmonics are the components of a distorted periodic waveform whose frequencies are integer multiples of the fundamental frequency caused mainly due to the non-linear loads. The effects of harmonics includes increased losses, equipment heating, loss-of-life etc. In this project we analysed the presence of harmonics due to the switching components and non-linear elements in a system. Using a fluke meter we could compare the performance of linear and non-linear elements in a power system. As it is necessary to eliminate the harmonics this project provides an explanation of the design of a passive filter for harmonic mitigation. A passive filter was designed for a 500W, 230V experimental setup and the harmonic distortion was found to be reduced. In addition to explaining the theory behind, useful observations and charts are included so that reader can use this information for the future analysis of their power system circumstances.

Analysis and Prediction of Chronic Kidney Disease using Data Mining Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th September 2017

Tabassum S | Mamatha Bai B G, Jharna Majumdar

Abstract

Data Mining in Healthcare has become a present trend for obtaining accurate results of medical diagnosis, Chronic Kidney Disease (CKD) has become an international fitness problem and is a place of concern. It is a situation where kidneys turn out to be damaged and cannot filter toxic wastes within the frame. By using Data Mining Techniques, researchers have the scope to predict the Chronic Kidney Disease. This helps doctors to diagnose and suggest the treatment at an early stage. It also helps the patients to know about their health condition at an earlier stage and follow necessary diet and prescriptions.

Analysis and Retrieval of Leaf Images Based On Feature Extraction Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th April 2018

M.Rajeshwari | Dr.R.Shenbagavalli

Abstract

Image processing is a method to perform some operations on an image in order to extract some useful information. Feature Extraction is one of the significant techniques in image processing. In this Paper, the analysis was processed in three steps. First, the leaf images were preprocessed using Median Filter and transformed into LBP (Local Binary Pattern).Second, the retrieval was performed using feature extraction methods such as GLCM (Gray Level Co-occurrence Matrix), CGLCM (Color Gray Level Co-occurrence Matrix), Shape and Hybrid. In each method, various statistical measurements like Contrast, Correlation, Energy, Homogeneity, Entropy, Area, Perimeter, and Eccentricity were calculated. The KNN classification algorithm was used to retrieve the relevant images. The dataset was collected by capturing some 10 types of leaves using Digital Camera. Each type contains 10 images and used for analysis. Finally, the Performance measurement such as Precision and Recall were measured for each extraction method. The Hybrid extraction method produces the better result than the individual method. This analysis is used to identify the medicinal leaves and its use from the large collection of Database

Analysis and Treatment of Oil Field Produced Waters of Upper Assam Basin

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th April 2018

Gogoi Tapan Jyoti | Gogoi Subrata Borgohain

Abstract

The largest volume in oil industries comprise of Produced Water (PW) from oil fields. The water besides containing hydrocarbons in soluble, emulsified and free form, also is high in suspended and dissolved solids. Hydrocarbons are considered among the most harmful pollutants as they are lethal to human, animal and plant on direct consumption. Therefore the PW samples have to be treated before discharging it into the environment as it contains harmful constituents. Results showed that the PW samples had water content above 80% along with Oil and Grease (O&G), salinity, turbidity, Total Dissolved Solids (TDS), Total Suspended Solids (TSS), Ca, Fe, Na, K, Li, Mg, Mn, Pb and Zn. However the presence of Cr, Cu, Mo, and Ni have not been observed in the samples. These samples were treated with microfiltration and ultrafiltration in the continuous cross-flow cell. Most of the results after the treatment processes were found to be within range as per Central Pollution Control Board (CPCB) of India. However, the result of dissolved oxygen while treating with microfiltration was not found to be within range. Also, the treatment of oil and grease by both the treatment processes did not meet the specified range set by the pollution control board of India. Therefore further filtration has to be done to bring all the parameters within range.

Analysis Implementation & Design of Optimized High-Speed FIR Filter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 28th March 2018

V.N. Mahawadiwar | Dr.S. S. Shriramwar

Abstract

This paper proposes the analysis & implementation of FIR Filter using low power adder and multipliers. The everincreasing market segment of portable electronics devices demands the availability of low power building blocks. With the explosive growth in Laptops, portable personal communication systems and evaluation of the shrinking technology and flexible circuits, the efforts in low power microelectronics have been identified. In this scheme, the function of the adder is minimized by a technique called scaling and rounding-off Filter coefficient and truncation of unnecessary bits in order to reduce the power consumption of FIR Filter. Evaluation of power, area, and speed for different types of adders and multipliers is carried out and the FIR filter is designed with the optimized combination of adders and multipliers for low power and high-speed application. The Full Adder designed with multiplexers do not exhibit any leakage problems and short circuits problems. The current trend towards low-power design is mainly driven by two forces, the growing demand for long-life autonomous portable equipment and the technological limitations of high-performance VLSI systems. The proposed Design of High-Speed FIR Filter for DSP Application with Optimized Adder & Multiplier is simulated using Active HDL and implemented using Tanner tool.

Analysis of Microgrid

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th January 2018

J.Suganya | Navyashree.A.K, Anusha.A, Praveen.Y.S, Manasa. S

Abstract

Solar energy is a green energy and nearly no carbon traces are present. Hence, the growing demand and challenges to meet the electricity requirement even in remote places can be achieved with a solar microgrid. A microgrid when coordinately controlled can be operated both in grid-connected mode and intentional islanding condition. In this paper control scheme for intentional islanding of utility, the microgrid is analyzed. Also, reviews on various strategies to develop HIL for fast and accurate islanding and coordination control are presented. To overcome generation and demand mismatch study of various centralized adaptive load shedding scheme is investigated.

Analysis of 5-Bit Multiplier Using Reversible Logic

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 23rd January 2018

Krishnapriya T | Lakshmipriya S, Kiruthika T, Swamynathan S.M

Abstract

The Multipliers are the vital component of processors or computers. A Multiplier is one of the key hardware blocks in most digital signal processing systems. It plays an important role in digital filtering, digital communication and spectral analysis. Multiplication is very expensive and slows the overall operation. The performance of many computational problems dominated by the speed where multiplication operation can be executed. Power dissipation becomes one of the primary design constraints. So we are going to analyse multipliers using reversible logic gates.In the current scenario, the reversible logic gate attracting more interest due to low power consumption. The goals of reversible logic are to minimize the garbage, number of inputs, the total number of gates and delay.Under ideal conditions, reversible logic gates produce zero power dissipation.The applications of reversible logic circuits such as low power CMOS, Nanotechnology and optical data processing DNA computing and quantum computing.

Analysis of Additive Manufactured Tibial Spacer Used In Total Knee Replacement Implant

International Journal of Engineering Research in Mechanical and Civil Engineeri