Filter by subject




All Available papers:



Design Aspects of MAP Turbo Decoder for Wireless Communication Systems

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 2nd June 2017

E. Sujatha | Dr. C. Subhas,Dr. M. N. Giri Prasad

Abstract

Long Term Evolution-Advanced (LTE-A) targets the peak data rates in surplus of 3Gbps for present and next generation wireless communication systems. Turbo coding, the stated channel coding scheme in 3rd Generation Partnership Project (3GPP) LTE standard, is an advanced forward error correction (FEC) coding to achieve higher throughput of advanced Wireless Communication Systems. To support the peak throughputs, parallel turbo decoding procedure has become a necessity and the corresponding VLSI implementation is extremely challenging task to the design engineers. The higher throughput applications require higher parallelism of turbo decoder design; which results in increased hardware complexity, major source of power consumption and silicon area. This paper addresses the design and implementation aspects of different parallel turbo decoders, which meet peak data rates of 3GPP LTE and LTE-Advanced standards, where throughput, power consumption, silicon area and latency are the most decisive cost factors

"Cycle Time Reduction of Transmitting Output Power Measurement of URRF Radio"

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Prof.Suhas A R | Pratiksha R Matlawar , Rashmi R

Abstract

Radio Station RRF(UG) is extensively used by the Indian Military for communication related purposes. In this radio, measurement of output power at different frequencies is one of the most important factors to be considered for the purpose of secured communications. In this paper, we develop a method based on automation to measure output power at different frequencies using LABVIEW software. This reduces the time required for output power measurement

"The Study of Mechanical properties of LM6 Reinforced with Albite Particulate Composites and fabricated by Chill Casting Method"

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th November 2017

AnjumAnwarShaik | Shamanth.T, Syed Mohsin, Zamran Lateef Baig

Abstract

The study is intended to investigate mechanical properties of LM6 based metal matrix composite, where Albite particulates are character enhancing reinforcement. Composites were fabricated by chill casting process utilizing copper as a chill. Specimens were prepared as per ASTM standards at different weight percentages of Albite varied from 0 to 12 with an increment of 3. The microstructure study clearly indicates the uniform distribution of Albite particulate in matrix alloy. These results revealed that increase in weight percentage of Albite as reinforcement in LM6 matrix alloy increases the tensile strength, compressive strength and hardness giving rise to the improved microstructure of composite.

2-8GHz, 1.6dB Integrated CMOS LNA Using Image network technique for 4G LTE application

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 30th August 2017

Sandeep Kumar | Chamindra Jayawickrama, Alaaddin Al-shidaifat, Ashish Kumar, Wonju Song, Hanjung Song

Abstract

The paper proposed 2-8GHz wide bandwidth CMOS low noise amplifier using image network technique for 4G LTE application. The proposed circuit are made by cascade stage of CMOS common gate-common source (CG-CS), input and output matching network. The novel image network technique in the proposed circuit investigates inverse impedance at the output and provides higher wideband and low noise figure. These two most important observed parameters overcome the problem of high speed data rate in the 4G LTE application. The proposed circuit is implemented and analyzed using RF simulator ADS. Chip fabrication and measurement is done by using TSMC 45nm commercial design Kit. The results achieved minimum noise figure of 1.6dB with highest gain of 18dB. Experimental and simulated results are made good agreement with each other.

3D Face Recognition

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Mr. Jayraj |  Nilabja Roy, Swapnil Aryan Sinha

Abstract

3D face recognition is one of the novel ways of having a security feature. This could be considered much more safer than a finger print scanner as it uses the crests and troughs on the face to accurately map every centimeter of the face, now because of his technology the machine cannot be fooled by showing a photo of the person because it won't be able to detect the crests and troughs on the face. In order to cheat the machine, one would have to make a 3D model of the face with exact depths at every centimeter which is very difficult. PCA algorithms, resulting in improved recognition performance, both individually and in combination. We have also examined the effect of depth resolution on performance of 3D recognition which is very accurate.

3D Printing Technology or Additive Manufacturing System

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Girish Anil Patil | Siddhesh Sharad Chaskar,Himani Mahesh Limaye,Bhavesh Sheth, Prof.M.V.Shivramwar, Prof.N.B.Chaudhari

Abstract

Manufacturing system is a method of organizing product from the availability of raw material from start to the final output subtractive manufacturing is a type of production in which metal removal takes place by various methods like drilling, milling, cutting, etc. But in this era of 20th century we have in manufacturing system called additive manufacturing it is in its initial stage till end of 20th century and is known by prototype manufacturing which has now become 3D printing technology it is a rapid and reliable process. The main difference in subtractive and additive manufacturing system is that in subtractive material removal takes place while in additive material addition takes place by layers to form the final product. This additive manufacturing system or 3D printing technology will become the fastest and most accurate method of production till 21st century and will be used by almost all the manufacturing industries in the world. As being a simple process i.e. just upload the 3D design of the model in the system and the 3D printing machine will make the 3D model of the product by applying number of layers of the required material till the final dimension of the product is achieved. Material used in formation of product may be plastics, metal but there are limitations not all metals can be used selective metals are used A brief information on this technology is being discussed in the paper.

5 D Optical Storage Devices: Superman of All Storages

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Abhinandan Das | 

Abstract

Storage of data is very essential for the continuity of human race. Storage devices like pen drives, hard discs or even the internal storage offered in our mobile phones are not enough for storage of special types of data which may include microscopy, digital images and all sorts of computing data. Moreover, we face problems like crashing of the hard disc, pen drives etc. untimely. It is sometimes difficult to retrieve those vital data. Hence, we need to device a storage medium that can be used to read, write, store and erase data including those of medical imaging and microsurgery. At this juncture, nanotechnology comes into the foreplay, which has successfully recorded, read, and erased data from a piece of Nano-structured glass. This technique could revolutionize microscopy in general and medical imaging in specific ó and, perhaps more importantly for computing, it could also be used to store binary data, like an optical disc. Unlike DVDs or Blue-rays, which seem to be capable of storing data for an unlimited period of time without a reduction in data integrity, the 5D optical storage could allow for densities as high as 360 terabytes per disc, and unless it is crushed in a vice, these discs are so non-volatile that data stored on them should survive the human race. However the implementation of digital data storage, which is a crucial step towards the real world applications, has not been demonstrated by ultrafast laser writing. Here, a digital copy of the text file in 5D using polarization controlled selfassembled ultrafast laser Nano structuring in silica glass has been successfully recorded and retrieved.

5G Wireless Mobile Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

MS. S. Pavithra | MS.J.Uma Sawmiya, MS.R.Bavani , MS.Smitha

Abstract

ď5th generation mobile networkĒ or simply 5G isthe forthcoming revolution ofwireless technology.It is beyond the thinking of normal human.With its ultra-high speed ,it changes the usability of a mobile phone.

6*6 Radom Color Grid Authentication (2 Step)

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Sudershan M | Veena Potdar, Madhu B

Abstract

Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to have significant drawbacks. To overcome the vulnerabilities of traditional methods, numerous graphical password authentication systems have been proposed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this paper we propose this novel graphical password scheme to abolish well known security threats like brute force attacks, dictionary attacks, phishing attacks and spyware attacks.

A 90NM Low Power Ota Using Adaptive Bias

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Suman | Rekha S

Abstract

Low power class AB operational trans-conductance amplifier (OTA) which is fully differential operating at low voltage 0.4 V supply designed in low cost 90nm technology is proposed in this paper. Differential pairs such as P channel and N channel with complementary input configuration are used in input stage to achieve input common mode range (ICMR) which is full rail to rail. For increasing slew rate without sacrificing power consumption adaptive bias circuits are used hence amplifier works in class AB. The common mode feed forward circuit (CMFF) is employed for maximizing common mode rejection ratio (CMRR). To make system power efficient whole amplifier operates in weak inversion region. After designing layout of an op amp, Simulation with parasitic is carried out and shows that DC gain of 51.15 dB, 876.5 kHz unity gain bandwidth (UGB)with 77.7ļ phase margin for 10 pF capacitive load and slew rate of 0.1 V/?s; CMRR and PSRR are 116.9 and 97.30 dB respectively. The proposed OTA dissipates very less power of 4.78 ?W and shows ability to use in applications where less energy is mandatory.

A Brief Review On The Application Of Swarm Intelligence To Web Information Retrieval

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Ramya C | Dr. Shreedhara K S

Abstract

Web Information Retrieval process has become one of the most focused research paradigms because of large quantity of growing web data as internet is ubiquitous. To this distributed, uncertain and volatile data, accurate and speed access is required. So there is a need to optimize the search process using some efficient approaches. For such novel approach a literature survey is presented on evolutionary bio-inspired Swarm Intelligence techniques to optimize search process in Web Information Retrieval Systems.

A Case study of 5S implementation in Manufacturing Enterprises

International Journal of Science , Engineering and Management, Available online 29th June 2017

Gopinath S | Vikram H,Sivarampandian J

Abstract

In todayís competitive world, it is quite necessary for an organization to maintain certain key strategical tools to survive in the market. Lean manufacturing is defined as a systematic procedure which helps in the process of waste management and elimination within an enterprise. Lean manufacturing involves 5S which is a set of principles and standards. This research paper emphasis on formulating key essential certifications that a manufacturing industry must procure so to maintain standards. 5S is one of the key tools that a company can acquire that helps it in continuous improvement culture. 5S proclaims for certain visual disciplines to be maintained. 5S strategical represents systematic approach for the overall improvement in quality, productivity and improvement. This research paper proposes the various aspects of 5S and value based analysis is done using certain analytical softwareís. SMEís were approached with different questionnaires and proper survey data was collected, interpreted and used for analysis. Relationship between each category is realized and conclusion drawn.

A Case Study on Process Automation Using PLC In Soft-Drink Manufacturing

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Sneha J. Gadkari | Amit S. Patil,Sushil L. Khade,S. A. Soundattikar

Abstract

Industrial Automation uses control system such as computer or robots and information technology, for controlling different type of processes and machinery and is the process of integrating industrial machinery to automatically perform task such as welding, material handling, packaging, blending etc. Using hardware and soft-ware automation increases productivity, safety and profitability which are the need of any manufacturing industry loading for sustenance in the global competition. The conventional processes are time consuming, less accurate and involve more human interference and thus automation offers an advantage of making the jobs easier and reducing the risk and defects in these process. Soft drink manufacturing is one such process which may involve multiple outputs at every next instant. The mixing of the ingredient must be accurate according to recipe selected and must the display the problem if any encountered automated through alarms. The paper describes the soft-drink manufacturing built using PLC for accurate and faster control.

A Case Study on Sustainable Development in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Jimmy Chacko | Shubham Wankhede,Anushruti Kukreja,Reshma Raskar Phule

Abstract

The concept of Sustainable Development is an attempt to combine growing concerns about a range of environmental issues with socio-economic values. To aid understanding of these different policies a classification of different trend of thought is necessary. To meet the ever increasing needs of the rapid urbanization one such area that needs to be developed is the airport. Airports are the air transport systemís nodes and have major impact on a regionís economy, social conditions and environment. An Airport can only be considered to be operating sustainably if all three dimensions are balanced. Airport Sustainability can be evaluated at global, national and regional levels. This paper emphasizes the importance of regional level planning in analyzing airport sustainability. The paper presents a detailed case study of Chhatrapati Shivaji Mumbai International Airport and evaluates its sustainability on regional level under different growth and reduction scenarios. The airport concentrates on the environmental performance, global connectivity, local employment, resource optimization. Moreover, the basic concepts like waste water, air quality and noise management, solid waste management are been stressed. The construction of the airport posed a lot of hindrance for the engineers as they had to tackle the geographical and climatic conditions around the airport. Also to tackle the wildlife incursions and strikes into the airside a close watch is kept on all the birds. The increase of roadways around the airport has elevated the overall transportation capacity. Managing water resources, waste water treatment and using the recycled waste is one of the prominent traits of the airport, the peacock shaped feather skylights for natural lighting and the use of energy efficient materials in construction has led the Mumbai Airport from a worn airport to one of the worldís top airport giving it a gold certification from LEED[4].

A Combination Technique of Multi-wavelets and Interpolation for Resolution Enhancement of Digital Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th July 2017

Sreeletha S H | M Abdul Rahiman

Abstract

This paper explains the effect of various multi-wavelet interpolation methods on digital images to enhance the resolution of the images. A high resolution image is a major challenge for any image processing application, especially in defense and medical scenario. Here resolution enhancement technique is done in wavelet domain using multi-wavelets and interpolation methods. Visual perception of an image has to be improved by various enhancement techniques since the hardware image acquisition methods drops to a limit. Some spectral and spatial problems such as motion blur, pixilation and poor perception may still prevail in digital images which requires rectification before processing further. The Super Resolution images are generated by applying enhancement techniques on a set of noisy and blurred low resolution images . In this paper, some of the resolution enhancement techniques such as Discrete Wavelet Transform, Stationery Wavelet Transform and a combination of DWT and SWT with various interpolation techniques are experimented. The DWT-SWT with Bilinear interpolation method illustrates the improvement in the resolution factor of the image, thereby improving the visual perception of images

A Comparative Analysis of Eigen Palm, Fisher Palm and Combined Eigen Palm with Fisher Palm Based Palm Print Authentication

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Vinodkumar | R. Srikantaswamy

Abstract

Personal recognition utilizing palm print, has become a most promising approach recommended by several researchers. Palm print, recognition algorithms are very essentially worthwhile in a wide variety of applications like crime investigation, security control, passport verification etc. This paper describes comparative analysis of palm print, recognition algorithms such as PCA, LDA and combined PCA with LDA. In PCA, the unique images of palm print, are mapped to a minor set of the feature space, which is termed as Eigen palms; they are training setís eigenvectors and they signify the palm printísí principal components pretty best. Formerly, the Eigen palm features will be acquired thru projecting a novel image of palm print, to the subspace which is being spanned by the Eigen palms. In LDA, Every single palm print, image is treated like a coordinate point in higher dimension space of image, which is called palm print, space. Fisherís linear discriminate is utilized to map palm print, image linearly from this palm print, space into a considerably lesser dimensional space of feature (Fisher palm space), in this space the palm printís image from the different palm will be discriminated considerably much more proficiently. In combined PCA with LDA: initially we map the palm print, image from image space to Eigen palm space via PCA, furthermore we make use of LDA to attain a classifier which is of linear. The elementary objective of combined LDA and is PCA to advance LDAís generalization capability. The obtained recognition result from combined PCA with LDA outperforms similar work in the literature including Eigen palms and Fisher palms matching algorithms individually.

A comparative study of artificial brains

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 17th August 2017

Agrata shukla | 

Abstract

The development of truly intelligent system are challenging tasks. The artificial brain projects aims to simulate the real human brain.Human brain have neurons about 1011 neurons with 10 15 interconnections.However,it is difficult to create 1011 artificial neurons with 10 15 interconnections .There are many artificial brains developed during past decades trying to achieve the goal. This papers gives a comparative study of some artificial brain projects.As technology develops ,the artificial brain projects progressed to achieve the goal .The development of blue brain project is the very well known. Henry Markon started blue brain project. It uses IBM ‚ÄúBlue Gene‚ÄĚ supercomputer to simulate the neural signal of rat brain. IBM computer scientist Dharmendra Modha started cognitive computing project aiming the construction of a ‚Äúbrain atlas‚ÄĚfor highly local cortical regions. Kwabena boahen[5] an stanford researcher started ‚ÄúNeurogrid project‚ÄĚ.The research goal is to ‚Äúunderstand how cognition arises from neuronal properties‚ÄĚ Eligene M.Izhikuch[6] the chairman and CEO of ‚ÄúBrain corporation ‚Äú started the ‚Äúlarge scale model of mammalian thalamo-cortical systems.This model based on experimental data from many mammalians species. Horwitz strated ‚ÄúBrain Image and modeling project‚ÄĚ that differ from previous model because they lack neuron-level processing. Master prince and Suliman Alsuhaibani[4] created adaptive artificial brain for humoid robot.This uses pattern recognization and machine learning. There are discussion of some projects with some future recommendations.

A comparative study of Excess Loop Delay Compensation Techniques in Continuous Time Delta- Sigma Modulators

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 23rd August 2017

Aditi Singh | Kumaravel S

Abstract

Continuous time ‚ąĎ‚ąÜ Convertor is an highly power efficient modulator which has overcome the pipeline and Discrete time modulator as they require more number of high speed gain stages.Morever it is has an aliasing free Nquist band which is made available by oversampling and an on chip filter is also present.The input is resistive with no sampling so it is easier to drive the entire modulator with miniscule noise and an on- chip clock conditioner is used.There are several drawbacks associated with CTDSM like clock jitter and excess loop delay.In this paper different techniques to reduce Excess Loop Delay(ELD) in a continuous time delta sigma modulator is analysed and presented.

A Comparative Study of Low Power Transition, Area Overhead and Fault Coverage Testing Techniques for Digital Circuits

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 9th August 2017

Suhas B Shirol | Rajashekar B Shettar

Abstract

In recent years, the technology is changing faster than the Moore's law stated hence to develop the devices which are efficient with respect to power, area and speed has become a challenge in field of VLSI. The main focus of this paper is comparative study of Low Power Transition, Low Area and High Fault Coverage in BIST architectures, it has been seen that during test power consumed is higher due to transition activity, area overhead is more and fault coverage is less for CUT.

A Comparative Study of Region-Based Segmentation Algorithms on Brain MRI Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Kavyashree G | Sudheesh K V

Abstract

Image Segmentation is the one of the principle component of image processing. In medical image processing the segmentation play an important role for classification, image analysis, and extraction of brain tumour, Different image segmentation methods are used for examination of medical images but efficient segmentation methods lead to accurate diagnosis. In this paper, we review the different segmentation algorithm on MRI Brain Images has been presented in order to obtain the accurate algorithm. The segmentation algorithms has been divided into four categories K-means, Fuzzy c means, Special constrained Fuzzy-c-means and Expectation Maximization. Efficient algorithm is obtained by computing the evaluation criteria such as Martin Criteria, Probability rand index and Variation of information.

A Comparative Study on Ann and Hmm Based Automatic Speech Recognition Systems for Controlling Micro Air Vehicles

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Pragathi G | Veena S, Roopa S

Abstract

Speech is one of the effective modes of communication and when made to be recognized by a computer, it can be used in many different areas of application. This paper makes a comparison between Hidden Markov Model Artificial Neural Networks (ANN) used in controlling of Micro Air Vehicle (MAV) based on speech-activated commands from Ground Control Station (GCS). Therefore, Automatic Speech Recognition (ASR) Systems are developed based on ANN and HMM separately and the recognition accuracies obtained in both the cases are validated against each other.

A Comparative Study on Effect of Different Material for Retrofitting of Concrete Columns

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th August 2017

Mandakaruhi Rymbai | Peerzada Jaffar Abass, S. Ganesh

Abstract

Antique structures are prone to be afflicted by the fluctuating load or the change in the environment circumstances such as effect due to earthquake load, wind load and other unpredictable factors. Rehabilitation of such structure will cost a lot and the alternate way to reduce that cost is by choosing the structure to be bolster with various type of strengthening technique using distinct material. One of the best technique used is by wrapping different material from the external surface. Retrofitting of material is a widely-used method and has been followed since long time back especially during this time period where natural calamities can happen anytime anywhere, so people are inclined to apprehensive with their structure condition. The retrofitting material being used here are steel jackets, elastic tapes, rubber tubes and glass fiber reinforced polymer(GFRP) with epoxy resin as adhesive. The concrete column used is having the dimension of 80mmX80mmX300mm a type of short column. The wrapping location tested at two specific places- first type wrapping is to be done at the distance 100mm from both edges of the columns and in the second type the wrapping location to be done is 100mm to 200mm distance of the column i.e.at the center of the column. The columns are both end fixed and two grade of concrete used for the tested columns i.e.M20 and M25 for confirmation. The cracking load that can be absorb by the columns were tested by using digital compressive testing machine. Each grade of columns tested on 28days curing into three category- first categories were the standard columns, the second category in which the columns were first subjected to the compressive load then retrofitting done after subjecting to load for the second-time testing and the third category in which the retrofitting of columns was directly followed after its 28days curing then the columns were subjected to the compressive load. The results obtained were being simulated into the ANSYS software and the finite element analysis is done which gives similar result as compared to the experimental values.

A Comparative Study on Rural and Urban Women with Respect to Entrepreneurial Activity

International Journal of Science , Engineering and Management, Available online 13th September 2017

Ashima Kapoor | 

Abstract

Rural and urban women are makers of family; they help the nation to grow. In our country development, women are socially and economically necessary. Entrepreneurship is the activity which is present in the women but is not capitalized in India in which it should be. The Big reason in India is that it is Male dominated country where the voice of women cannot be heard by the society. They think women are born only for household work because of which the rural and urban women cannot explore themselves. So in this study we will try to find out the various problems and inspiring factors of women entrepreneurship in rural and urban areas of Delhi. We will try to suggest the ways of eliminating and reducing the problems of the women entrepreneurship in rural and urban areas

A Comprehensive Review ‚Äď Anatomical, Functional and Molecular profiling of honey bee wax moth Galleria mellonella

International Journal of Science , Engineering and Management, Available online 4th September 2017

S. Pooja Sri | S. Sribal

Abstract

The greater wax moth Galleria mellonella attracts the view of many researchers by their anatomical, functional and molecular profiling patterns. Mostly the larvae feeds on honey bee hive and Larvae of the greater wax moth Galleria mellonella have been shown to provide a useful insight into the pathogenesis model of a wide range of microbial infections including mammalian fungal (Fusarium oxysporum, Aspergillus fumigatus, Candida albicans) and bacterial pathogens, such as Staphylococcus aureus, Proteus vulgaris, Serratia marcescens, Pseudomonas aeruginosa, Listeria monocytogenes or Enterococcus faecalis [1]. Like mammals, insects possess a complex innate immune system. In addition, analogies are found between the epithelial cells of insect larval midguts and intestinal cells of mammalian digestive systems. Finally, several basic components essential for the bacterial infection process such as cell adhesion, resistance to antimicrobial peptides, tissue degradation and adaptation to oxidative stress are likely to be important in both insects and mammals [2]. Thus, insects are polyvalent tools for the identification and characterization of microbial virulence factors involved in mammalian infections [1]. In 1934, many researchers focused on studying the larval body fluids to understand the biochemical mechanism of the honey bee moth. The larva of Galleria mellonella is available as in commercial for feeding the predatory insects. Not only this organism is used an innate immunity model but also it is now investigating for doing a research in genetic hereditary studies of sterility mechanism. The main aim of this review paper is to provide the current knowledge of this organism anatomical, functional, molecular profiling. My future aspects is to do whole genome sequence of this organism and also to create novel knock out model for understanding the interaction of foreign particles with the innate immune response disorders

A Comprehensive Survey on MEMS Technology in RF as Road Map towards Future Research

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Prof. Raju Yanamshetti | Sandeep Kumar Kulkarni

Abstract

Since 1980 there have been significant research with MEMS switch in the field of RF (Radio Frequency). In every 3-5 years there have been a break through achieved with MEMS in RF technology. This breakthrough include improvement in the switching voltage, improvement in the overall pass-band, improvement at the insertion loss and improvement at the switching speed. Currently MEMS switch offers a tremendously high frequency around 70GHz in comparison to FET which offers 4GHz, similarly diode offers 20GHz, EMR 5GHz, EMRSMA 40GHz . Even though insertion loss is now reduced to 0.25db, switching voltage has come down to 2 to 4 V, there are areas where MEMS still need significant amount of research in terms of unit cost MEMS switches are significantly high value in comparison to other peers, have present lesser less life time and represent high switching power (even though switching power comedown. A dedicated research is needed in the direction of MEMS based RF technology to improve this factor were they lag other semiconductor counterpart. This research requires and understanding of technological advancement in the area of MEMS along with the parameter and factor that have resulted changes and advancement. In this paper we present historical water fall in the advancement of MEMS over RF technology along with comprehensive analysis with the other parallel technology in terms of standard matrices and theoretical foundations.

A Critical Review of Carbon Nanotube based MEMS Piezoresistive Pressure Sensor for Medical Application

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Siddarud Bannikoppa | Ajayakumar C. Katageri,B.G.Sheeparmatti

Abstract

This paper discuss about the critical review on design of carbon nanotube based MEMS piezoresistive pressure sensors, use of different types of carbon nanotubes such as multi-walled carbon nanotubes (MWCNTs), single-walled carbon nanotubes (SWNTs) and vertically aligned carbon nanotubes (VANTs), sensing mechanism, applications, etc. The structural deformation of the piezoresistive nano structure will result in change of resistance. CNT is a sophisticated material with interesting electrical, mechanical, physical properties that can be used for fabrication of micro pressure sensors on different substrates, which may serve as alternative for silicon based pressure sensors when bio-compatibility and low cost applications are required.

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Nisha Ranjan Sah | Tejashwini P, Veeresh S, Yathish,Mrs. Prema.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

Nisha Ranjan Sah | Tejashwini P, Veeresh S, Yathish, Mrs. Prema.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google service

A DC Actuator based elevation mechanism for Patient Positioner System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd July 2017

Tarakeshava M K | A.R.Priyarenjini

Abstract

Hydraulics based motion control has been used from many years in healthcare imaging and scanning applications like PET, CT, MRI etc. Achieving positional accuracy and repeatability is very crucial in medical imaging systems to get good scan reports. For scanner table elevation mechanism, a digital processor controlled hydraulic based methodology is used in existing systems. However hydraulic based design has its own disadvantages. So, this paper presents a new method of elevation mechanism for patient positioning system, which uses electrical DC actuator instead of hydraulics. Also, describes the use of optical encoders for table position tracking and PID controllers to control DC motor speed control

A Detailed Study on Fundamental Characteristics and Functional Operations of Manet

International Journal of Engineering Research in Computer Science and Engineering, Available online 28th August 2017

Narayanasamy Rajendran | Dr. E.R.Naganathan

Abstract

A MANET is a collection of independent mobile nodes that communicates with each other through wireless medium. The MANET architecture is dynamic in nature, the nodes act as transmitter and receiver. The vehicular ad hoc network topology changes frequently due to the dynamic nature of the autonomous mobile nodes. MANET is exposed to multiple kinds of attacks due to its fundamental characteristics like no security mechanism, dynamic topology, no central control devices and open wireless medium. The impact of attacks affects the security, quality of service and the performance of MANET. MANET is the best alternative for developing countries where communications infrastructure doesn’t exist. To understand the how MANET is created, configured and controlled we need to understand the following area: MANET Architecture, Clustering Formation, Identification of Host and IP address auto configuration, Handover mechanisms on MANET, Routing on MANET, MANET file sharing, Different types of attacks and Security on MANET.

A Detailed Study on Security Threat Analysis in Wearable Devices

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Srimanth DS | Sudhanva Krishna V, Vishwajith M V,Venkatesan S

Abstract

Wearable devices can be anything from small wrist-mounted systems to bulky backpack computers. Wearable device is a combination of devices typically a belt or backpack PC, head-mounted display, wireless hardware and some input devices. The fundamental principle of wearable device is to collect data ubiquitously and continuously, about the individual user and also their surroundings. This can pose many privacy challenges and are hindered by poor security. They are not mature yet in term of device security and privacy acceptance of the public. Low processing power of wearable device leads to developer’s inability to implement certain complicated security mechanisms and algorithms on the device. This paper analyzes various security issues and attacks on the user’s data

A Device For Blind Human Ultrasonic Echolocation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Manika Bajpai | Dr. A.K. Wadhwani

Abstract

This paper present a device that combined the principles of ultrasonic human echolocation and animal echolocation .This device is helpful for blind and visually impaired people. Some animals such as (bats and dolphin) sense by active echolocation, in which emitted acoustic pulses and their reflection are used to sample the environment .Bats and dolphin are highly informative compared to humans. Active echolocation is also used by some blind humans, who use signals such as tongue clicks cane taps as mobility aids. The device consists of a headset with an ultrasonic emitter and stereo microphones affixed with artificial pinnae. Methods-: The echoes of ultrasonic pulses are recorded and time-stretched to lower their frequencies into the human auditory range before being played back to the user. Results- Simple words were able to lateral depth and distance judgments. This device is working as record the echoes. Conclusion-: This device is suggests can be used effectively for environment and human auditory system. Many humans is suffer for blindness (cardiac patient) and night visions this devices uses in this people.

A Discriminative Robust Local Binary Patter for Object Recognition

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Chithra M G | 

Abstract

Object recognition is very important process in computer vision. Texture and edge information is mainly used for object recognition. Local Binary Pattern (LBP) and Local Ternary Pattern (LTP) are mainly used for object recognition. But these two techniques suffer from noise and intra-class variations due to small pixel fluctuations. To solve this problem a new algorithm called Robust Local Binary Pattern (RLBP) and Discriminative Robust Local Binary Pattern (DRLBP) are used for object recognition. Comparative analysis is done between RLBP and DRLBP using Caltech 101 dataset.

A Dual Band Microstrip Double Slot Antenna for Wi-Fi and WIMAX Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

N.Parthiban | Dr. M. Mohamed Ismail

Abstract

In this paper a dual band microstrip slotted antenna is proposed. This antenna has a simpler structure than other antennas designed for realizing dual band characteristics. Simulation studies of the proposed structure are studied and analyzed using High Frequency Structure Simulator (HFSS) software. The design antennas are then fabricated and tested using Vector Network Analyzer. We obtained good results in testing. The radiating patch is placed on a FR-4 dielectric substrate ( =4.3, tan őī = 0.02) with conducting ground. The Co-axial feeding technique is used. In the Operating frequency range of 2.4-2.48 GHz, have a return loss of less than -10 dB for Wi-Fi applications. Operating frequency range of 2.66-2.77 GHz, 4.28-4.4 GHz and have a return loss of less than -10 dB for WIMAX applications.

A DVR Based Control Scheme for Power-Quality Improvement

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

K.P. Bheemanna | N. Rajeshkumar Gowd , G. Subba Rao Gupta

Abstract

Because of increasing complexity in the power system, voltage sag is getting to be a standout amongst the most critical power quality issues. Voltage sag is a short decrease voltage from nominal voltage, happens in a brief timeframe. On the off chance that the voltage sags surpass a few cycles, and then manufacturing systems making utilization of delicate electronic types of equipments are prone to be influenced prompting real issues. It at last prompts wastage of assets (both material and human) and in addition money related misfortunes. This is conceivable just by guaranteeing that continuous stream of power is kept up at legitimate voltage levels. This project tends take a solution at the using so as to take care of the sag issues custom power gadgets, for example, Distribution Static compensator (D-STATCOM).Proposed plan takes after another calculation to create reference voltage for a distributed static compensator (DSTATCOM) working in voltage-control mode. The proposed plan guarantees that unity power factor (UPF) is accomplished at the heap terminal amid ostensible operation, which is unrealistic in the conventional technique. Likewise, the compensator infuses lower streams in this manner, diminishes misfortunes in the feeder and voltagesource inverter. Further, a sparing in the rating of DSTATCOM is accomplished which expands its ability to alleviate voltage sag. About UPF is kept up, while directing voltage at the heap terminal, amid burden change. The state-space model of DSTATCOM is joined with the miscreant prescient controller for quick load voltage regulation amid voltage unsettling influences. With these elements, this plan permits DSTATCOM to handle power-quality issues by giving power factor redress, consonant end, load adjusting, and voltage regulation in light of the heap necessity. The performance of the proposed system can be improved by adding Dynamic Voltage Restorer(DVR)

A Exposure Based Technique With Dwt To Enhance The Image

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th September 2017

Abhay Verma | Manish Dixit

Abstract

This paper gives a technique to enhance the contrast of low exposure gray image. For this threshold is calculated of gray image and it is utilized to clip the gray image into different images. And then this clipped image is individually equalized utilizing histogram equalization with discrete wavelet transform for the enhancement of the image.

A Flexible Approach of Mobile Cloud Computing and Big Data Analytics for Networked Healthcare Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th June 2017

Hemalatha T | K Venkata Chalapathi

Abstract

Now a day’s Mobile devices were rapidly growing as indispensable part in our daily life, facilitating to do various useful tasks. Mobile cloud computing combines mobile with cloud computing to enlarge their capabilities, benefits and reduces their limitations, like battery life less memory and CPU power. Big data analyzing technologies facilitate extracting value from data consisting four Vs: volume, velocity, variety and veracity. This paper focuses networked healthcare as well as the task of mobile cloud computing and big data analytics in its enablement. The inspiration and development of applications over networked healthcare and systems were offered along with the adoption of healthcare cloud. A cloudlet based infrastructure of mobile cloud-computing to be utilized for healthcare. The methods, tools, and applications of big data analytics were focused. Experimental results are considered in the design of networked healthcare systems with big data as well as the technologies of mobile cloud-computing.

A Fully-Integrated Low -Power Fast-Transient Capacitor-Free Low Dropout Regulator

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Mohsina Begum | Rekha S

Abstract

A completely subsidiary LDO with fast transient examination and psr of full range PSR is made to give free of tainting supply for building pieces which are touchy to clamor in extensive band prattle correspondence frameworks Ldo has high recurrence for proposed plan glitches are diminished constricted on the other hand the execution of the framework change happens A triangle circle LDO is produced and checked at 65nm zone when contrasted with other present completely associated incorporated outlines here overwhelming post is taken as yield shaft and higher recurrence is designated to inner posts with aggregate Iq calm current of 50 For Vin Vout of 1 23v and 1 V separately the 43 mV undershoot and 81 9 mV overshoot is acquired for 0 to 9 99 mA of burden transient at 200 ps edge times 1 16 ns of transient reaction is gotten and FOM is almost 5 73 ps The PSR is computed for entire range is superior to anything 20db stacked capacitors on chip of 40pf is incorporated for model estimation

A Futuristic Approach for Towerless Mobile Networks Contributing to Digital India

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Jyothi Sulochana | K Hemavathi ,P Kalamani ,Lorate Shiny

Abstract

This project is an attempt to develop the mobile networks to have a wireless voice call happening without the help of the towers. Our main aim is to remove the towers in the communication process. The towers have been hazardous to many birds and animals. This project uses the Raspberry Pi boards with the inbuilt wi-fi on board. The Raspberry Pi with the wi-fi is used for the prototype, which would be used to develop a voice call application which would transfer the voice through the wifi communication. It is proposed to develop this technology to be able to access only till the distance of 30 meters which is the distance limit of the wi-fi communication. It would be possible to move this communication to be expanded by the use of the Wimax technology which would be able to communicate in the range of kilometers. This project uses two Raspberry Pi kits with Wi-fi inbuilt on it and would be able to communicate by developing the voice call application and would be able to use the audio jack on the kit. A hardware implementation would be developed and the results would be analyzed for performance.

A Futuristic Approach for Towerless Mobile Networks Contributing to Digital India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Mr.Jagadeesha Kumar B G | Neelesh Dindur, Nikhil Jaju, Pagadala Sai Koushik, Pavankumar A B

Abstract

The project intent is to upgrade sanitation system in a village, an initiative for Welfare of the Society, primarily aimed to harness benefits for the rural people using sustainable concepts like anaerobic treatment procedures. The selected village for our project is Paduvalapattna in Mandya district, which is at a distance of 108km from Bengaluru. Key features of the proposed Sanitation System in village would include the use of Up flow Anaerobic Sludge Blanket and laying out of sewer network with assessing the water quality and best practices to improve hygienic conditions around the village. The main scope of this project is to improve the health condition of rural people.

A Fuzzy Logic Based Techniques for content based image Retrieval and Digital Data Transmission

International Journal of Engineering Research in Computer Science and Engineering, Available online 13th September 2017

Dr.Ruksar Fatima | Prof Jyoti Neginal

Abstract

Today’s demand of internet in applications in large amount requires to be transmitted in a secure manner. In communication system transmission of digital data is not secure because interception and improper manipulation done by the eavesdropper. We can send digital data in such a way that no one, except the sender and the receiver can suspect the existing of data. In this paper we propose a new fuzzy logic based technique for content based image retrieval and digital data transmission, which transforms a secret digital data by embedding in another digital data with the same size and looking like selected target image. The transformation process can be controlled by a secret key generated by fuzzy logic

A Helping Hand for Differentially Abled patients

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Akshata Acharya | Laxmikant Bordekar, Vrushali Kelkar

Abstract

In this world there are many people who cannot speak and hear properly. These people have difficulty in communicating with people who do not understand sign language. In general, deaf people have difficulty in communicating with others who do not understand sign language. Even those who do speak aloud typically have a deaf voice of which they are selfconscious and that can make them reticent. In developing countries, children with hearing loss and deafness rarely receive any schooling. Adults with hearing loss also have a much higher unemployment rate. Among those who are employed, a higher percentage of people with hearing loss are in the lower grades of employment compared to the general workforce. This paper aims to lower the barrier in communication by enabling the mute communities to communicate with general public more efficiently by translating sign language into text using an electronic glove. The Electronic Glove is made up of normal cloth fitted with flex sensors along the length of each finger and on the wrist. Mute people can use the glove to perform hand gesture and it will be conver ted into text and displayed on the LCD display, for easy understanding by normal people.

A High Efficient Fully Soft Switched Isolated DC-DC Boost Converter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Aravind Murali | Mr.Benny.K.K, Mrs.Priya.S.P

Abstract

This paper proposes a fully soft switched isolated DC-DC boost converter, which consists of only one switch and this switch is turned-on at zero current switching and turned-off at zero voltage switching. All the diodes in this proposed converter is turned-off at zero current condition, regardless of voltage and load variations. This converter consists of a lossless snubber and an isolation transformer. Leakage inductance of this isolation transformer is used for zero voltage switching (ZVS). All these features make this particular boost converter high efficient and low cost. Simulation results are given in order to validate the proposed concept and these results are compared with simulation results of conventional converters

A High Gain Dc-Dc Converter with Coupled Inductor and Charge Pump

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Anitha K | Mrs.Rahumath Beeby, Mrs. Shoma Mani

Abstract

The Green Energy sources such as Photovoltaic cell and Fuel cell are more popular nowadays because of environment pollution and energy shortage. However, the output of these green energy sources seems to be very lowcompared to the dc bus voltage. Thus, a high step-up voltage gain dc-dc converter with high efficiency should be introduced to boost the voltage, and then this green energy can be connected to the grid. In order to obtain a high voltage gain, high efficiency converter, this paper proposes a dual switchdc-dc converter with three-winding-coupled inductor and charge pump. This converter provides a high step up voltage gain with low voltage/current stress on the power switches. It also can achieve a high gain with a small duty cycle, which is helpful to reduce the peak current through the power device and helps to improve the efficiency. A comparisonbetween performance of the proposed converter and previous high step up converters was conducted. Simulation results verify the correctness of the analysis.

A High Gain Low Power CMOS Operational Amplifier

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st July 2017

K.Poshana | K.Lokesh Krishna ,K. Veda Samhitha

Abstract

This paper presents the design and simulation of a high gain low power complementary metal oxide semiconductor operational amplifier in 90nm technology. The aspect ratios of all the transistors were designed. High gain allows the operational amplifier (op-amp) circuit to function efficiently in a closed loop feedback system, whereas wide bandwidth makes the circuit to operate for high speed applications. The proposed op-amp design consists of two stages and operates at 1.2V power supply. It is aimed to meet a set of standard specifications. The entire op-amp design is evaluated using Cadence software tools, while the layout has been developed using Virtuoso. The op-amp circuit is able to achieve 38 dB gain, a 4V output swing, a 12.7 V/őľsecond slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.

A High Gain Low Power CMOS Operational Amplifier

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

K.Poshana | K.Lokesh Krishna , K. Veda Samhitha

Abstract

This paper presents the design and simulation of a high gain low power complementary metal oxide semiconductor operational amplifier in 90nm technology. The aspect ratios of all the transistors were designed. High gain allows the operational amplifier (op-amp) circuit to function efficiently in a closed loop feedback system, whereas wide bandwidth makes the circuit to operate for high speed applications. The proposed op-amp design consists of two stages and operates at 1.2V power supply. It is aimed to meet a set of standard specifications. The entire op-amp design is evaluated using Cadence software tools, while the layout has been developed using Virtuoso. The op-amp circuit is able to achieve 38 dB gain, a 4V output swing, a 12.7 V/Ķsecond slew rate and a CMRR of 61 dB with a power supply voltage of 1.2 V.

A High Speed Performance and Low Power Consumption Design For VLSI Logic Circuits Using Multi-Threshold Voltage CMOS Technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Nisha S Police Patil | Swetha B

Abstract

Due to voltage scaling in CMOS logic circuits, there will be a reduction in threshold voltage which leads to increase in the sub threshold leakage current and hence static power dissipation. Although power consumption is important for modern VLSI design, the main requirements of the VLSI design are, operating speed and occupied area. Multithreshold voltage CMOS (MTCMOS) technology is a good solution providing high speed performance and low power design without area overhead. MTCMOS technology provides the transistors that have low, high and normal threshold voltage. The low threshold voltage transistors are used to reduce the propagation delay in critical (longest) path, the high-threshold voltage transistors are used to reduce the power consumption in shortest path. This paper describes a high-speed performance and low-power consumption design for full adder (using 2 half-adder), 4-bit ripple carry adder, 4x4 multiplier and 16-bit carry look-ahead adder circuits with MTCMOS technology using 45nm technology

A Honeypot based Attack Detection and Prevention System for Smart Cities Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Rohit Kumar | Surbhi Khare, Deepa Kale

Abstract

In today’s world, technology is changing almost every second day. This rapidly changing technology offers lots of benefits but also put some great challenges. Smart city is a concept that merges various Information and Communication Technology (ICT) and Internet of Things(IoT) based service solutions, together. Thus, the concept of smart cities uses all possible technologies in the state-of-the-art form. Hence, there is a need to make sure that the no one could use our networks for their own benefits. Malicious users always wait for the perfect opportunities and attack on the most vulnerable part of the network. A strong defense mechanism is needed to defend against them, otherwise the concept of smart cities would only be a chaos. In this paper, we will explain the different types of possible attacks, analyze them and will propose a mechanism to defend against them, based on Honeypot based services.

A Hybrid Image Binarization Technique for Enhancement of Degraded Document Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th October 2017

Dr. S.Vijayarani | M.Geetha

Abstract

Image processing is a process of analysis and manipulation of digital images, which improves the quality of an image. Image binarization is a pre-processing step which improves the quality of the image. Image binarization is used to improve the image quality and it segment the pixel values into two categories; i.e. black pixel as foreground and white pixel as background. In this research work, binarization techniques are applied to improve the quality of the degraded document images. Different types of image binarization methods used in this work are Otsu, Nick, Niblack and Sauvola. In addition to this, a new hybrid binarization method is proposed which is a combination of local and global method. Performance factors used are PSNR (Peak Signal to Noise Ratio) and NRM (Negative Rate Metric). From the results, it is observed that the proposed hybrid binarization has produced good results than existing methods.

A Hybrid Protocol for Vehicular Communication in VANET Using Location Aided Routing and Base Line Multicasting

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

AnujVerma | ShiviSharma

Abstract

The design a novel location aided routing protocol with the concept of baseline and distance minimization is presented in this paper. The protocol has been implemented successfully for a vehicular Adhoc network and Manhattan model is utilized. The vehicular movement used a new concept of communication using minimization of distance from base line. The base line was drawn from source to destination node. The discussed protocol seems to work quite well and seems to yield encouraging results. The packet delivery ratio was increased significantly and the average delay was reduced significantly.

A Hybrid Scheme of EDBTC Encoding and CHF BHF Extraction for Image Ret Rival Process

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Vineetha Deepti | Pramila B

Abstract

This paper presents a new approach to derive the image feature descriptor from the Error-diffusion based block truncation coding (EDBTC) compressed data stream. In the encoding step, EDBTC compresses an image block into corresponding quantizers and bitmap image using vector quantizer(VQ). Two image features are proposed to index an image, namely, color co-occurrence feature (CCF) and bit pattern features (BPF), which are generated directly from the EDBTC encoded data streams without performing the decoding process. The CCF and BPF of an image are simply derived from the two EDBTC quantizers and bitmap, respectively, by involving the visual codebook. Experimental results show that the proposed method is superior to the block truncation coding image retrieval systems and the other earlier methods, and thus prove that the EDBTC scheme is not only suited for image compression, because of its simplicity, but also offers a simple and effective descriptor to index images in CBIR system. EDBTC method is extremely fast and the image quality achieved is comparable to the previous BTC method. This proposed system is implemented in MATLAB.

A Literature Study on Selenium Webdriver 2.0

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.R. Anitha | 

Abstract

Selenium is a open source automated testing suite for web applications across different web browsers and platforms. It is similar to HP Quick Test Pro but the Selenium focuses on automating web-based applications. The testing is done by using selenium is called selenium testing. This paper studies on selenium Webdriver 2.0 which uses mozilla firefox browser and how it is implemented by using Eclipse IDE. WebDriver calls the Web browser directly and all the test script is executed similarly to make the automation.

A Mathematical Model of Fluid Flows in Open Rectangular and Triangular Channels

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Kavyashree B. A | Dr. P. N. Chandramouli

Abstract

Flow in a closed conduit is regarded as open channel flow, if it has a free surface. This study considers the flows of an incompressible Newtonian fluid through open rectangular and triangular channels. The effects of channel slope, energy coefficient, channel top-width and roughness coefficient on velocity distribution in the open rectangular and triangular channels are investigated. The governing equations of the flows are continuity and momentum equations. The finite difference approximation method is used to solve the governing equations because of its accuracy, stability and convergence and the results are represented graphically. It is found out that the velocity of flow increases as depth increases and an increase in the channel slope, energy coefficient and top-width leads to an increase in flow velocity whereas increase in roughness coefficient leads to a decrease in flow velocity for both rectangular and triangular channels. This study goes a long way in controlling floods, construction of channels and in irrigation

A Metamorphosis Approach to Software Engineering

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

M.Rithvik | Merugu Naresh Babu, Narala Sudhakar Reddy, Puli Nageswara Rao, Ch.Praneeth

Abstract

The most important industry that is going to play a key role now a days is the software industry because it’s the only industry which have high return values .For any industry to have a good survival applications plays a key role because an industry growth can be estimated by its outcomes those are nothing but products and services. Software Engineering is the subject that deals with various methodologies in order to ensemble software. This Paper represents a metamorphosis approach to software because when we perform Engineering we also need to know about reengineering sometimes many interventions may come up with reengineering process .Here we represent such type of reengineering approach with the help of a demo application.

A Method for Error Detection and Correction of Fault Secure OLS Decoder

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sahad B | Chithra M

Abstract

Reliability is one of the major issues of advanced electronic circuits. In recent years there are several error correction codes (ECC) developed to protect the memories and registers in electronic circuits. But the encoder and decoder circuit may also suffer errors, for these reasons concurrent error detection (CED) and correction technique for orthogonal Latin square (OLS) decoder is proposed. This technique is strongly fault secured for single stuck at faults. The most significant advantage is that it achieves 100 percentage fault coverage for the whole CED circuit. The CED and correction is applicable to both binary and non binary OLS codes also. The proposed method can be achieved by performing the checking in parallel with the majority voting, syndrome generator and error corrector and orthogonal generator in the case of the decoder. Synthesis can be done in Xilinx ISE design suite 13.2 and simulation can be done with ModelSim.

A MIMO Dual Band-Notched Monopole Antenna For UWB Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

D.V.N.Koteswara Rao | M.Jahnavi, M.Ratna, K.Anjana Devi, N.L.Chaitanya

Abstract

A Compact monopole Multiple-Input-Multiple-Output(MIMO) dual band-notched Ultra Wide Band Antenna is proposed. This microstrip-fed antenna has a compact size of 22◊36◊1.6 mm3, consisting of two square radiating patches with a defected ground structure. The designed antenna operates over the frequency band between 2.6 to 11.6 GHz with dual band notched characteristics in between 2.6-3.8 GHz for WiMAX, 5.19-5.95 GHz for WLAN with mutual coupling obtained is less than - 15 dB through the entire UWB frequency range except at the notched frequency bands. The Envelope Correlation Coefficient(ECC) is almost less than 0.02 over the entire UWB frequency range except at notched frequency bands. The proposed antenna is simulated by using the CST Microwave studio. Details of the proposed antenna design and simulated results are presented.

A MIMO Dual Band-Notched Monopole Antenna For UWB Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

D.V.N.Koteswara Rao | M.Jahnavi, M.Ratna, K.Anjana Devi, N.L.Chaitanya

Abstract

ACompact monopoleMultiple-Input-Multiple-Output(MIMO) dual band-notched Ultra Wide Band Antenna is proposed. This microstrip-fed antenna has a compact size of 22◊36◊1.6 mm3, consisting of two square radiating patcheswith a defected ground structure.The designed antenna operatesover the frequency band between 2.6 to 11.6 GHz with dual band notched characteristics in between 2.6-3.8 GHzfor WiMAX, 5.19-5.95 GHz for WLAN with mutual coupling obtained is less than -15 dB through the entire UWB frequency range except at the notched frequency bands. The proposed antenna is simulated by using the CST Microwave studio. Details of the proposed antenna design and simulated results are presented.

A MIMO Dual Band-Notched Monopole Antenna For UWB Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

D.V.N.Koteswara Rao | M.Jahnavi, M.Ratna, K.Anjana Devi, N.L.Chaitanya

Abstract

ACompact monopoleMultiple-Input-Multiple-Output(MIMO) dual band-notched Ultra Wide Band Antenna is proposed. This microstrip-fed antenna has a compact size of 22√ó36√ó1.6 mm3, consisting of two square radiating patcheswith a defected ground structure.The designed antenna operatesover the frequency band between 2.6 to 11.6 GHz with dual band notched characteristics in between 2.6-3.8 GHzfor WiMAX, 5.19-5.95 GHz for WLAN with mutual coupling obtained is less than -15 dB through the entire UWB frequency range except at the notched frequency bands. The proposed antenna is simulated by using the CST Microwave studio. Details of the proposed antenna design and simulated results are presented.

A Modernization Approach to Software Engineering

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th August 2017

K.Nirmal Raju | Ch.Sowjanya, N.Susmitha,Ch.Ambedkar,M.Rithvik

Abstract

The Technology is rapidly growing day by day. In this regard the utility of software also is rapidly increasing day by day in many forms like ROBOTICS,ARTIFICIAL INTELLIGENCE,MACHINE LEARNING etc .The tools used in this software are also increased which we call it as an automation that is going to play a key role in the software industry replacing some persons with that particular tool may result in increase of productivity of the company as well as in attaining a reliable product .This paper communicates a meaningful tool that is available at a free of cost to use for a layman to build up a software on his own .This paper entirely presents the communication between a layman and that tool its name is CONSTRUCT2D.Along with the middleware application. The central idea of the paper deals with the scenario of SOFTWARE INDUSTRY,A Start UP.

A Modified Bridge-Type Fault Current Limiter for Fault Ride Through Capacity Enhancement of Doubly Fed Induction Machine (DFIM)-Based Wind Generator

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 12th October 2017

V.Srinivasulu | S.Hussain Vali

Abstract

Transient stability a crucial aspect for doubly fed induction machine (DFIM). A DFIM-based arrangement is adversely operated due to faults, as the stator of generator is linked with the power grid. Even so, there is a obligation for the wind generator to be allied even during fault conditions. Hence , it is much crucial to increase the short-lived stability of the DFIM. For getting better stability of the DFIM, a R- type solid state fault current limiter is suggested in work. Here grounded faults were performed on test system to verify the upshot of the BFCL in transient stability enhancement. Simulations were done in SIMULINK domain. To illustrate the presentation of the proposed modified BFCL(R-SSFCL), its performance is compared with that of the SDBR & conventional BFCL. Simulation results gives the information that the modified R-SSFCL is a good efficient device rather than series dynamic braking resistor(SDBR).

A Multi-Authority Access Control System in Cloud Computing Using Network Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Ms. Vibhute Shubhangi Prakash | Prof. Mr. Kale Navnath D.

Abstract

Data access control is an efficient way to provide the data security in the cloud.and Attribute-based Encryption (ABE) technique cryptographic conducting tool to guarantee data owners direct control on their data in public cloud storage. In this paper, from another point of view, system lead an edge multi-power CP-ABE access control plan for open distributed storage, named TMACS. In TMACS, exploiting (t; n) limit mystery sharing, When system verify to the user the TTP work like a SDN. Its having data controller that can evaluate the each request base on ad-hoc data table, if user is authenticated system can provide the access to specific user. Besides, by proficiently joining the customary multi-power plan with system, system build a half and half one, which fulfils the situation of traits originating from various powers and accomplishing security and framework level strength. The network security mechanism also fulfil with this approach, the system has evaluate on physical network environment with 2 to 4 physical devices and got satisfactory results than existing TMACS

A Multi-Output DC-DC Converter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Deepa Sanal | ] Jeneesh Scaria, Rahul. P

Abstract

A Multi-output DC - DC converter topologies can be used to generate multiple DC outputs from a single DC input source. The voltage gains can be step-up and /or step-down type. This paper proposes a dual-port DC-DC converter topology which generates two outputs, one step-up and one step-down, from a single DC input. Operating modes and steady state behaviour of the proposed converter has been studied in this paper. Using MATLAB/SIMULINK (R2013a) the proposed converter topology is simulated with open loop and closed loop control system to generate two outputs (a step-up and a step-down) from a single DC input and the results are compared.

A New Approach DSS for Suitability Analysis

International Journal of Science , Engineering and Management, Available online 29th June 2017

Nitin Kumar | -

Abstract

Decision support systems (DSS) are highly used in industries like management and administration. However, recently they are also being used in engineering for solving problems up to certain extent. Suitability analysis is a technique used in civil and environmental engineering which is majorly GIS based. A DSS was developed for suitability analysis of various natural aspects of a region with its implementation in civil and environmental. The system is a graphical user interface developed programmatically with the help of MATLAB. It is based on direct interaction and processing with images. It was implemented on LULC, Drain ability, and slope to study the simultaneous effect of these features and observe their combined contribution to the analysis. It was observed that the system can produce the combined effect and also produce the simultaneous effect of variation of weights of features and elements of input images in real time. The number of features being studied simultaneously can be varied according to the requirement of the study.

A New Approach for Mosaic Image Creation for Hiding Secret Image/video for Secure image Transmission

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Shamna E.P | Sabna I

Abstract

Information security is becoming increasingly important in the modern networked age. Secure Image Transmission has the potential of being adopted for mass communication of sensitive data under the scrutiny of an adverse censoring authority. Images from various sources are often used and are transmitted through the internet for various purposes, such as confidential enterprise archives, document storage systems, medical imaging systems, and military image databases. These images may contain secret or confidential information since it should be protected from leakage during transmissions. A new type of computer art image called secret-fragment-visible mosaic image is proposed, which is created automatically by composing small fragments of a given image to become a target image in a mosaic form, achieving an effect of embedding the given image visibly but secretly in the resulting mosaic image. This effect of information hiding is useful for covert communication or secure keeping of secret images. receiver recover the secret image with a high precision. The root mean square error and peak signal to noise ratio are used as quality measures.

A New Bidirectional Intelligent Semiconductor Transformer for SMAR GRITD Application

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

M.Veerasozhan | M.Saranya

Abstract

This paper includes a better topology of solid-state transformer (SST). In the process of designing the Ac to DC, DC to AC and Ac to AC conversions have been united in order to achieve greater efficiency. To get good and better efficiency from various SST, the AC to AC converters are being united in one matrix converter for better output performance. The newly proposed solid state transformer performs critical functions and has many more advantages such as correction in power factor, sag and swell elimination, flicker of voltage reduction and safe capability in order of error situations. Now additionally, it has includes many other benefits also such as low weight, minimum volume and reduction of dangerous liquid dielectrics includes just because it involves medium frequency transformer. The working and some actions of the newly proposed SST have been tested by the results via simulations.

A new encryption methodology of aes algorithm using high speed s-box

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th August 2017

Sarala S Shirabadagi | Swetha Nadagoud

Abstract

Cryptography plays an important role in the security of data. Encryption ensures data integrity by protecting the data from being corrupted or modified.RSA and DSA are the most commonly used methods for the authentication. Encryption uses symmetric and asymmetric encryption algorithms such as Triple-DES and Blowfish for maintaining the confidential. The AES is widely used for encryption of audio/video data contents in real time. Due to the significance of the AES algorithm and the numerous real-time applications, the main concern of this paper is to present new efficient hardware implementations for this algorithm.AES uses four operations, namely SubBytes, ShiftRows , MixColumns and Key Additions transformations. SubBytes transformation is done through S-BOX. This paper describes full custom design of high speed S-BOX for AES encryption algorithm and its implementation in FPGA and ASIC. The proposed AES architecture has delayed improvement of approx. 1.6 ns along with area improvement of 287 FPGA slices when implemented in the Spartan-6 FPGA of Xilinx. The full custom design of the S-BOX has been done in 180 nm technology in Cadence using novel XOR gate which has high speed and low power consumption . The designed S-BOX chip consumes 22.6 őľW and has 8.2 ns delay after post layout simulation

A New Hybrid Multi Level Inverter with a New Switching Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Adapala Tejasree | I Siva Prasad

Abstract

Multilevel inverters have been an attractive topology for academia as well as industry in the recent decade for high power and medium voltage energy control. An asymmetric multilevel inverter, a new topology increases the level of output with reduced lower order harmonics and total harmonic distortion. In this paper, a new multi-level inverter (MLI) is introduced. This paper mainly focusing on reduction of Total Harmonic Distortion (THD). By adding one step voltage to the conventional MLI to increase number of levels without increasing the number of switches and to achieve minimum THD with simple switching technique called equal area criteria (EAC). By calculating switching angles at which the power switch should operate to eliminate lower order harmonics. In conventional method (symmetrical voltage sources), we need nineteen power switches to get 31-level. But in proposed MLI only eight power switches we can get up to 31-level with V1:2V1:4V1:8v1 voltage ratios and grate reduction of THD with in IEEE standards. The proposed 31-level inverter is simulated with resistive load using MATLAB/Simulink and the simulation results shown for 31-level.

A New Optimization Technique for Performance and Energy Preservation In Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Javed Hussain | Durgesh Kumar Mishra

Abstract

The rapid growth of the computational requirement need to develop effective and efficient technologies for serving better. In various research domains in computational cloud the security, resource utilization and energy preservation are the main area of research and development. In this paper we are going to discuss the capability of optimization algorithm for scheduling the resources and allocating the virtual machines for improving the performance and energy efficiency of the computational cloud. Therefore the detailed discussion on the required objectives and the solution formulation is provided. In further the simulation technique of the proposed model and their results are also reported for analysis. According to the gain performance and experimental observations the proposed technique is suitable for both the kinds of resource scheduling and optimization.

A New Parallel VLSI Architecture for Real-time Electrical Capacitance Tomography

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

G.Dillirani | A.Meghana

Abstract

This paper presents a fixed-point reconfigurable parallel VLSI hardware architecture for real-time Electrical Capacitance Tomography (ECT). It is modular and consists of a front-end module which performs precise capacitance measurements in a time multiplexed manner using Capacitance to Digital Converter (CDC) technique. Another FPGA module performs the inverse steps of the tomography algorithm. A dual port built-in memory banks store the sensitivity matrix, the actual value of the capacitances, and the actual image. A two dimensional (2D) core multi- processing elements (PE) engine intercommunicates with these memory banks via parallel buses. A Hardware-software codesign methodology was conducted using commercially available tools in order to concurrently tune the algorithms and hardware parameters. Hence, the hardware was designed down to the bit-level in order to reduce both the hardware cost and power consumption, while satisfying real-time constraint. Quantization errors were assessed against the image quality and bit-level simulations demonstrate the correctness of the design. Further simulations indicate that the proposed architecture achieves a speed-up of up to three orders of magnitude over the software version when the reconstruction algorithm runs on 2.53 GHZ-based Pentium processor or DSP Ti’s Delphino TMS320F32837 processor. More specifically, a throughput of 17.241 Kframes/sec for both the Linear-Back Projection (LBP) and modified Landweber algorithms and 8.475 Kframes/sec for the Landweber algorithm with 200 iterations could be achieved. This performance was achieved using an array of [2×2] × [2×2] processing units. This satisfies the real-time constraint of many industrial applications. To the best of the authors’ knowledge, this is the first embedded system which explores the intrinsic parallelism which is available in modern FPGA for ECT tomography

A Novel Ancient Document Image Binarization Technique

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

P.Gangadhara Reddy | Dr.T.Ramashri

Abstract

Due to many environmental factors, improper handling and the poor quality of the materials used in the creation of old document images cause them to suffer a high degree of degradation which includes faded ink, bleed-through, show-through, uneven illumination, variations in image contrast and deterioration of the cellulose structure. In proposed algorithm a robust phase-based binarization technique is used for the binarization and enhancement of historical documents and manuscripts. The main object of proposed method consists of preprocessing, main binarization, and post-processing. The preprocessing step mainly involves image denoising with phase preservation, followed by some morphological operations to denoise the image and detection of edge information by using canny edge detector. Then, the phase congruency features used for the main binarization step. The foreground of ancient documents can be modeled by phase congruency. After completing the three binarization steps on the input images using phase congruency features and a denoised image, the enhancement processes are applied. A median filter and a phase congruency feature are used to construct an object exclusion map image. This map is then used to remove unwanted lines and interfering patterns. while in the post processing step, specialized adaptive Gaussian and median filters are considered. One of the outputs of the binarization step, which shows high recall performance, is used in a proposed post processing method to improve the performance of other binarization methodologies.

A Novel Approach for Design and Analysis of A Modular Multilevel Converters For HVDC Networks

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Y. Dilli Krishnaiah | J.Yugandhar

Abstract

Modular multilevel converters are a rising voltage source converter topology reasonable for some applications. The expanded usage of HVDC power transmission arrangements has brought about Modular Multilevel Converter sturning into a more regular converter sort. Different applications incorporate interfacing renewable vitality power sources to the system and engine drives. Measured multilevel converters are gainful for medium voltage engine drives in light of the fact that the properties of this converter topology, for example, low twisting, take into account an effective engine drive plan. In this paper we exhibited the configuration and execution of a vigorous Modular Multilevel Converter which can be interconnected with the conventional HVDC power dispersion systems which gives various remarkable execution highlights like bidirectional power flow coordination, dependable step up and step down operation particular multilevel dc/dc converter, termed the DC-MMC, that can be sent to interconnect and bidirectional adaptation to internal failure which is as often as possible found in the DC circuit breakers. The center part of the proposed Modular Multilevel Converter make utilization of interleaved strings of fell submodules.The proposed converter model actualizes an open circle voltage control technique to guarantee the power equalization of each discrete capacitor module with the assistance of flowing AC ebbs and flows. The proposed converters are composed, executed and tried in the Matlab Environment. The recreation results pronounced that the proposed methodology is best in all viewpoints and beats all the current methodologies.

A Novel Approach For Image Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Jyoti T. G. Kankonkar | Nitesh Naik

Abstract

Image security is a major concern as the digital communication and digital data is growing rapidly. Image data is generated in loads every day. We need faster and robust mechanisms to secure the image data. Various fields such as military scopes, security firms, social network etc. need systems that can protect the images while communicating and data transfers. In this paper the proposed idea involves use of image encryption using chaotic approach with a combination of image stitching mechanism. This unique combination provides double layered protection to the images. In order to transfer an image, the image is first partitioned, encrypted and then transferred making it difficult for attackers to access the whole image. On the other end, the encrypted image is decrypted using a symmetric key generated using chaotic approach that uses logistic map function and linear feedback shift register which is followed by image stitching procedure..

A Novel Approach for Improvement of Power Quality in Transmission System by Using Distributed Power- Flow Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Raja Reddy Duvvuru | B.Venkata Prasanth , V.Ganesh

Abstract

The Electronic based FACTS controllers are static equipment. Its principle purpose is to control AC transmission. The parameters of FACTS are enhancement of controllability, ability of power transfer, control of line impedance, load angle and the magnitude of bus voltage. A unified power controller is to be a static device and this system device should have quick reactive transmission. This paper focuses on the issues like voltage sag and swell of power quality. DPFC is used to moderate the voltage variation and improve power quality and also used to couple the phase controllable bridges to produce current which is injected into a transmission line by using series of transformers. The UPFC is a combination of a static synchronous compensator (STATCOM) and a static synchronous series compensator (SSSC) which is coupled with common DC link. The DPFC eliminates the common dc link between the shunt and series converters and also it performs in transmission line to exchange real power between converters at the 3rd harmonic frequency. The DPFC employs several 1-phase converters like D-FACTS concepts as the series compensator. These concepts reduce the rating of the components and offer a high reliability. Since the DPFC can immediately control the active and reactive power flow and the voltage magnitude, it implies a great potential for power oscillation damping. The case study contains a DPFC located in an exceedingly single-machine infinite bus power grid with 2 parallel transmission lines that simulated in MATLAB/Simulink. The bestowed simulation results of a DPFC device wont to improve the facility quality.

A Novel Approach for Radar Image De-Noising Using Non Sub Sampled Contour Let Transform and Adaptive Threshold Algorithm

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Kanike Vijay Kumar | M.V.Ramana Reddy , M. Jyothirmai

Abstract

Aiming at the problem of ground penetrating radar image de-noising, a new adaptive image de-noising algorithm based on non sub sampled Contour let transform is proposed. The algorithm firstly performs non sub sampled Contour let transform to the noise image, to obtain the coefficients of each directional sub band and each scale, then, according to the energy of the coefficient, the de-noising threshold value is adjusted adaptively. Simulation results show that, compared with the wavelet threshold de-noising algorithm, the proposed algorithm can effectively remove the Gauss white noise in the image, improve the peak signal to noise ratio (PNSR), while preserving the edge details of the image, it can improve the PSNR value and reduce the Gibbs phenomenon.

A Novel Approach on MEMRISTOR and its Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Suganya J | Raja.G.V , Jeya Ramanan.S , Hariharan

Abstract

A MEMRISTOR is a passive device which has two terminals, operating based on the principle of MEMRIS TANCE. Memristance (M) which is derived from flux (?) variation with respect to charge (q). When an electric charge flow through a MEMRISTOR, it have capable of remembering past history of the device for a long time. This resultís gives MEMRISTOR acting like a non-volatile memory. MEMRISTOR basis concept was implemented in various areas like audio signal processing, image processing, logic imply, crossbar switch implementation, etc and HP MODEL MEMRISTOR, which is described briefly in this paper.

A Novel Approach to Control Speed of an Automobile

International Journal of Engineering Research in Computer Science and Engineering, Available online 7th October 2017

Dr.Manoj Priyatham M | Aishwarya. B, Aishwarya. K, Lakshmi Mache, Likitha. A

Abstract

Speed Control of automobiles is very much required in our daily life due to the increased rate of accidents reported. Hence, there is a need of a novel approach by which vehicles speed can be automatically controlled. This paper presents a novel approach to control the speed of the automobiles at remote places for fixed time. In this approach, automobile throttle position is controlled not only by Control Unit [CU] also accordingly to one of the inputs received from the accelerator pedal position sensor, but also by a microcontroller unit which receives the pedal position from the sensor and then microcontroller unit transfer to the CU. The Microcontroller Unit also interfaced is capable of detecting any other trans receiver. Threshold level is set to the pedal sensor which alerts the system by a buzzer sound, when the speed of automobile exceeds the pre-determined value. The microcontroller controls the speed accordingly at desired places. When we deploy, the transmitter sense data frames with field containing maximum speed and time.

A Novel Approach to Street Light Automation

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th October 2017

Dr. Manoj Priyatham M | B.R.Pallavi, Shruthi A.S, Pallavi R

Abstract

Sometimes street lights will be ON even if it is day time, power wastage takes place due to continuous lightening of street light. So, the concept of Automatic Street light system can be introduced which will save our natural resources and is also a powerful technique .In this paper, we propose a design which consists of microcontroller with intensity regulator in it. Here, light can be sensed by LDR (or) by solar panel, we have proposed two sensors LDR and photoelectric sensor (PES) which recognizes the movement of street. Whereas, LDR senses the light. Here PICmicrocontroller is used .This system is totally automatic which turns ON when sunlight goes down and turns OFF during daytime. So maximum power will be saved.

A Novel Approach to Student Information Broadcasting via GSM Network

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Ankit Pande | Mr. ShubhamKakade ,Mr. Kushal V. Kothari, Mr. Akshit Wankhede , Dr.NitaThakre

Abstract

Broadcasting of Student information via GSM Network is a modern approach to send the academic information to the parents in regular manner. This will be helpful for parents to receive on demand service of information regarding daily progress of student like Attendance, exam forms, Examination marks, Event in college, Placement related Info, Fees information etc. As the information world is changing into digital, it is important to transform the information stored in colleges in traditional manner into digital manner. As the information stored into digital manner will be available at 24*7. GSM network is one of the low cost technologies which is helpful to broadcast the information stored in central database in rapidly.

A Novel Approach to Wireless Power Transmission in Non-Radiative Field

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Niranjan L | Charmila G, Bindhu V, Jyothi M, Meghana M

Abstract

This paper explores the possibility of providing wireless power transmission from the source to the load without using interconnection of wires. The most common form of wireless power transmission is carried out using induction, followed by electro dynamic induction. The next generation portable devices will receive power wirelessly. The first step in wireless power is providing power to a charging pad wirelessly. The market for this device would be businesses with large conference rooms. The device would allow users to plug their phones and computers into the conference room table without large power bricks and cords running everywhere. The pads can conveniently be placed under the table and inside the ceiling so there are no visible wires that could ruin the aesthetic feel of the room. The ease of installation and convenience of this device would make the marketability of this product quite large and if finished could be seen in thousands of conference rooms. If we increase the efficiency of coupling unit the it will increased the power slightly further, wireless power transmission could become a standard means for charging a mobile device.

A Novel Architecture for the Future Wireless Technology Ė Li-Fi

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ishwarya Rajeshwari | Kirthika.L, Prathiksha.K

Abstract

We are in the era of internet. We have brought the evolution of using air as a medium for data transfer which is called the Wi-Fi. Though it provides the better speed but with the large number of users the radio spectrum is congested. To address this problem we can go for alternate way of using light as a medium. Professor Harald Hass who teaches at the University of Edinburgh in UK brought the visible light communication into picture through the concept of ďdata through illuminationĒ and it was called ďLi-Fi Light FidelityĒ. Li-Fi is a new paradigm for short range wireless technology to provide unprecedented connectivity within a localized data-centric environment. In this the data transmission is achieved by varying the intensity of LED very faster than human eye can follow which is brought through Visible light communication (VLC). The development by the University of Edinburghís Li-Fi R&D Centre uses a solar panel to receive high speed Li-Fi transmitted data while also generating electrical power for the operation of the function. Using this technique, two functions namely energy harvesting as well as decoding of light signals into useful information can be performed.

A Novel Cascaded Two-Level H-Bridge Voltage Source Inverter Based STATCOM for High Power Applications

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

S. Rama Maddileti | V.Venkata Krishna Reddy , V.Rafi

Abstract

In this paper presents a var compensation by a cascaded two-level H-Bridge VSI based multilevel static compensator (STATCOM) using SVPWM. The topology consists of two voltage source inverters are connected in cascaded through a 3-phase transformer. The benefit of this topology is that by maintaining asymmetric voltages at the dc capacitors of the inverters, the levels in the waveform of output voltage can be increases. This results power quality (PQ) improved. The main object of this paper is balancing the dc link capacitor voltages of multilevel inverters during balancing and unbalancing conditions. This controller is controlling inverter voltage in such a way that either Ėve sequence current flowing into the inverter is eliminated or reduces the unbalancing in the grid voltages. The performance of the control scheme during balanced and unbalanced conditions is analysed through MATLAB/SOMULINK.

A Novel Duty Cycle Sliding Control Methodology for Non-Isolated Cuk Converters Applied to Renewable Energy Systems

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Aditya Anilkumar | Phalgun Madhusudan, Abhishek Paramanand, Srinidhi H Srinivas, A Sreedevi

Abstract

This paper discusses application of control of duty cycle for a non-isolated Cuk converter applied to provide continuous low ripple DC output from a hybrid renewable source consisting of a low power solar panel and windmill pair. The convention, in technology today is to utilise complex feedback loops to control output voltage with respect to sporadic swings in input. This paper provides simulational results for the efficacy of control methodology consisting of sliding the duty cycle and also a second order linear equation for the control characteristics with this method.

A Novel Implementation of secure VLSI logic design

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Kusuma B T | A.R.Priyarenjini

Abstract

Crypto circuits can be attacked by third parties using differential power analysis (DPA), which uses power consumption dependence on data being processed to reveal critical information. To protect security devices against this issue, differential logic styles with (almost) constant power dissipation are widely used. However, to use such circuits effectively for secure applications it is necessary to eliminate any energy-secure flaw in security in the shape of memory effects that could leak information. This paper proposes a design methodology to improve pull-down logic configuration for secure differential gates by redistributing the charge stored in internal nodes and thus, removing memory effects that represent a significant threat to security. To evaluate the methodology, it was applied to the design of AND/NAND and XOR/XNOR gates in a 90 nm technology, adopting the Sense amplifier based logic (SABL) style for the pull-up network. Sbox 8 can be implemented using these circuits for the security purpose.

A Novel Low Cost RCD Snubber and Totem Pole Drive Circuit for PMDC Motor

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ajit Nivrutti Shinde | Uday Tanajirao Patil , Mr.Sandip Sarjerao Godhade

Abstract

Manufacturing plant in industries like chemical, pharmaceutical, plastic and textiles all need speed variation. And it could be flat belt application, flow management application or combining of liquids. There are different kinds of motors-AC, PMDC, Servo or steppers which are used according to the applications. Of these, PMDC motors have widely used .The PMDC motors are easy to control compare to other types of motors. The treadmill is a walker which is used for exercise. This is one application in which a PMDC motor plays an important role in its operation. The PMDC motors are used to operate these machines. In this paper, implementation of PIC 16F877A microcontroller to change the speed of PMDC motor fed by a MOSFET has been investigated .The MOSFET is driven by high frequency PWM signal .Controlling the PWM duty cycle is same as to control the motor terminal voltage, that changes directly the motor speed. Experimental results are obtained that shows the use of microcontroller for speed management and over current protection of a DC motor.

A Novel Method for Color Image Enhancement Applied to Bio-Medical images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

K.Janaiah | R.S.K Vibhav, Prof.R.V.S. Satyanarayana

Abstract

Anovelapproach for biomedical colour image enhancement method is proposed in this paper by using mathematical analysis of dual tree complex wavelet transform. The doctor requires the enhanced medical images to give better diagnosis. Thecontrast of biomedical colour images can be improved by data directionality of dual tree complex wavelet transform. The reduction in noise can be done by using wavelet coefficient shrinkage. In this paper we reduced noise present in both enhancedand non-enhanced medical colour images. We have taken the tumour image and computed the PSNR and SSIM of both enhanced image and proposed method by applying Gaussian noise, Poisson noise and speckle noise.

A Novel Method of Digitization & Noise Elimination of Digital Signals Using Image Processing Concepts

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

M.R. Prasad | Pavithra G , Dr. T.C.Manjunath

Abstract

The primary purpose of this research work is to develop a speech recognition system, which will be capable of recognizing and interpreting an individualís voice. This will thus obviate the use of keyboards and other such input devices to output the data. The scope of this work is limited to the recognition of digits. Matlab, a versatile software tool is made use of for the processing of the signals. This processing involves filtering, shaping, correlating the speech signal which will enable the computer to interpret the commands given by the user. The signature of every spoken digit is unique from which we can derive the parameters which differ from digit to digit. These parameters serve as a concrete base for the implementation of a speaker independent voice recognition system. Using such parameters simultaneously and using probability concept the digits are sorted and arranged in the descending order of their probability. The digit with the highest probability is displayed.

A Novel Pricing Based Algorithm for Intelligent and Economical Load Shedding for Conventional and Smart Grid Applications

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Aditya Anilkumar | Phalgun Madhusudan

Abstract

Intelligent load shedding, as a concept has been in vogue from the beginnings of large scale power systems. Attempts to optimise load shedding using various optimisation techniques and parameters have given several approaches to this problem with tradeoffs in speed and performance. Emphasis on the speed of computation gives sub optimal solutions and emphasis on optimal results slows computations to such an extent that real time optimal solutions are rarely possible to implement. Also, in cases of open energy markets, load shedding involves heavy costs to be borne, by the consumer, the supplier and the facilitator. This makes a live, real time economically intelligent load shedding algorithm conducive for power system operators nowadays. This paper proposes and tests, by simulation, the performance of the novel AP algorithm for economic load shedding.

A NOVEL QUANTUM DOT CELLULAR AUTOMATA BASED DESIGN FOR MULTIPLEXERS

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Nandini Rao G | Dr.P.C Srikanth, Dr.Preeta Sharan

Abstract

Quantum-dot cellular automata (QCA) is a novel and potentially attractive technology in nanometer scale and a possible alternative for CMOS. QCA has large potential in terms of high space density and power dissipation with the development of the high speed computer with low power consumption. This paper provides efficient design and layouts of digital circuits based on QCA using QCADesigner tool. The novel design provides the superior performance factors with respect to area, latency, circuit stability and low power dissipation. In this paper we present a number of new results on 2:1 and 4:1 multiplexers and detailed simulation using QCAD designer tool is presented

A Novel Survey on Neural Network Based Cloud Computing Platform for Securing Data

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Santosh | 

Abstract

Current technological advancement of internet or online platform made tremendous changes in the modern human society. Now a days situation has been created in such a way that whatever we want we would like to go for online, it may be shopping, marketing, banking, purchasing of goods, real estate, agricultural, collaborative learning through on line, pharmaceutical industries, medical field etc. When folks think of online activities there is always a feel of insecurity of their transaction, private data, mode of operation, etc. So there is indeed of vital solution which guarantees the security of operation, safety of private data, protectant environment for on line activities. Cloud computing gives the best online environment for various internet based activities. Here we discuss, analyze and understand the cloud computing environment for data security using Back propagation neural networks (BPN).

A Novel Three Phase Dual-Input Dual-Output Indirect Matrix Converter by Model Predictive Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Choppa Manoj Kumar | T.Gurubhavan

Abstract

This paper presents a novel Matrix converter two AC input and two ac outputs. The presented topology is based on the traditional indirect matrix converter (IMC) but with its rear and front end six switch converter is replaced by a compact nine switch rectifier, inverter with only three extra switches added. The proposed converter can produce two sets of three phase ac outputs. This Indirect matrix converter topology can independently supply ac power from two different three phase ac power sources. A model predictive control (MPC) uses the discrete time model of the converter and load parameters are used to predict the behavior of the input reactive power on the supply side and the output currents for each valid switching state the control method selects the best commutation state. The control action which minimizes the cost function is selected and applied to the system for the next time interval. This paper presents a finite control set of model predictive control strategy for a dual input- dual output indirect matrix converter.

A paper on ‚ÄěUtilization of Mechanical Linkages for Water Savage in Wash Basin

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Pratiksha Patil | Sheetal Sapkal,Mayuri Sathe,Geetanjali Pawar

Abstract

Now day by day, water wastage has become the most common problem about which awareness should be must taking India’s future into account. After a survey, one of the leading newspapers declared that, in public buildings, there is a large wastage of water while using wash basin for different purposes like washing face or hands using soap due to the time gap between opening and closing of the tap. This project tried to minimize this time gap.

A Paper on ĄUtilization of Mechanical Linkages for Water Savage in Wash Basin?

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Pratiksha Patil | Sheetal Sapkal,Mayuri Sathe, Geetanjali Pawar

Abstract

Now day by day, water wastage has become the most common problem about which awareness should be must taking Indiaís future into account. After a survey, one of the leading newspapers declared that, in public buildings, there is a large wastage of water while using wash basin for different purposes like washing face or hands using soap due to the time gap between opening and closing of the tap.This project tried to minimize this time gap.

A Parallel Area Delay Efficient Interpolation Filter Architecture

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Anusha Ajayan | Rafeekha M J

Abstract

Interpolators are widely used in digital signal processing to increase the sampling rate digitally. A multi-standard Software Defined Radio (SDR) system involves interpolation with different filter coefficients, filter length and up-sampling factors to meet the stringent frequency specification. An SDR receiver consumes huge amount of resource when these interpolators are implemented individually in a hardware circuit. A reconfigurable Finite Impulse Response (FIR) interpolation filter is suitable for a resource and power constrained multi-standard SDR receiver. Now-a-days interpolation filter architecture with a few multipliers or without any multipliers are available. Area complexity, irregular dataflow and low hardware utilization efficiency are the major disadvantages of these architectures. In this work, a new parallel multiplier based reconfigurable structure is derived for interpolation filter. Elimination of redundancy and producing multiple outputs without reconfiguration are the features of this architecture. To validate the design, code can be developed using VHDL in Xilinx ISE Design Suite 13.2 and to be simulated in ModelSim SE 6.3f. The Xilinx synthesized result shows that, this architecture has less area, delay and Area-Delay Product (ADP) compared to the other existing architectures.

A Parametric Study of Grit Blasting Nozzle Variables for Aerospace Metals Surface Preparation

International Journal of Science , Engineering and Management, Available online 31st May 2017

Dr. E. Daniel Kirby | Dr. Ravindra Thamma,Miroslaw Kot

Abstract

Grit blasting is a common and reliable method for surface preparation of aerospace metal components for subsequent operations. Unfortunately, the complex nature of aerospace components creates difficulty in providing sufficient cleaning of surfaces within tight cavities and intricate geometries. Manufacturers of grit blasting equipment have created different media types and sizes, along with different nozzles and blasting parameters, in order to provide a large variety of capabilities within this technology. This investigation of different nozzle designs and parameters, involved the use of quantitative methods, developed to evaluate the effectiveness of grit blast surface cleaning. The most critical aspect of grit blasting is the erosion effect on surface of the material, and therefore the amount of material removed is used as the response parameter for this study. This analysis will show amount of material removal and recommendations as to which method provides the safest parameters before significant amount of material is removed.

A Photo Voltaic System Based Dual Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

S.Sarada | C.Ganesh , L.Chandra kanth

Abstract

This scheme presents an integrated solution for Photo Voltaic cell(PV) fed water-pump drive machine which uses an Open-End Winding Induction Motor (OEWIM). The dual inverter fed OEWIM drive achieves the functionality of a three level inverter and needs low value DC bus voltage. This helps in optimal arrangement of Photo voltaic cells, this can avoid large strings and helps in improving the PV performance with wide band-width of operating voltage. It also reduces the voltage rating of the DC-link capacitors and switching devices used in the system. The proposed control scheme achieves an integration of both Maximum Power Point Tracking (MPPT) and V/f control for the efficient utilization of the PV panels and the motor. The proposed control scheme requires the sensing of PV voltage and current only. Thus, the system requires less number of sensors.

A Power Quality Improved Bridgeless Converter with fuzzy logic controller Based Computer Power Supply

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 20th September 2017

P.Vishnu Vardhan | P.Sreenivasulu

Abstract

Poor power quality, moderate dynamic reaction, high gadget stretch, consonant rich, occasionally thick, peaky, mutilated info current are the significant issues which are every now and again experienced in traditional switched mode power supplies (SMPSs) utilized as a part of personal computers (PCs). To overcome these issues, it is proposed here to utilize a non-isolated bridgeless buck-support single ended primary inductance converter (SEPIC) in discontinuous conduction mode (DCM) at the front end of a SMPS. The bridgeless SEPIC at the front end gives solidly controlled output dc voltage even under successive information voltage and load varieties. The output of the front-end converter is connected with a half scaffold dc-dc converter for seclusion and furthermore to obtain distinctive dc voltage levels at the heap end that are required in a PC. Controlling a solitary output voltage can direct the various dc output voltages also

A Preliminary Study about an emerging approach in Cryptography: Quantum Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

Poornachander V | 

Abstract

The word cryptography is the artwork of mystery writing. Generally, humans consider cryptography because the art of mangling data into obvious unintelligibility in a way permitting a secret technique of untangling. The fundamental provider supplied by cryptography is the potential to send data among members in a manner that others can’t read in a right format. Here we will give attention to the sort of cryptography this is based on representing information as numbers and mathematically manipulating those numbers. And we have various encryption techniques to send data in a cryptographic manner. Here we have an emerging technology for this new era called Quantum cryptography. The first-rate and famous instance of quantum cryptography is the quantum key distribution which gives an information-theoretically comfy method to the important thing change trouble. Presently used famous public-key encryption and signature schemes may be damaged by using quantum adversaries. The benefit of quantum cryptography lies in the truth that it permits the completion of diverse cryptographic responsibilities which can be established or conjectured to be not possible the usage of simplest classical (i.e. non-quantum) verbal exchange. This paper deals with the detailed technology about Quantum Cryptography

A Proposal for Epidemic Prediction using Deep Learning

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sagar Palao | Abhishek Shahasane,Siddhesh Dighe, Harsh Gupta,Anjali Yeole

Abstract

HealthCare has been a surging need in India. The inception of Smart India, Smart Villages has further emphasized the need of a Smart & Healthy India. However little reflection of such digitally empowered country has been seen in the field of healthcare. This has further increased the importance of the definition of ubiquity of information and computing technology in healthcare that demand constant surveillance and vigilance of healthcare to predict epidemic outbreak and biological attack. The paper’s primary focus is to analyze and determine the spread of diseases and epidemic in cities/villages. And using this analysis to predict where the next outbreak of epidemic will be. This prediction helps the health authorities to take necessary action in terms of assuring that sufficient resources are available to suffice the need and if possible stop the occurrence of such epidemic by taking necessary actions. To achieve this, we use deep neural network as the heart of our prediction. It receives its training from the past experiences of data which we have collected from hospitals and our spread network. Using this training with our dynamic data it makes predictions as well as adaptively learns from the real time data.

A Quad Two-Level Inverter Topology

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

C.Ganesh | S.Srada , I.Sreekanthaiah

Abstract

A multilevel inverter topology for a four-pole induction-motor drive is presented in this paper, which is constructed using the induction-motor stator winding arrangement. A single dc source with a less magnitude when compared with conventional fivelevel inverter topologies is used in this topology. Therefore, power balancing is-sues (which are major challenges in conventional multilevel inverters) are minimized. As this configuration uses a single dc source, it provides a path for zero-sequence currents because of the zero-sequence voltages present in the output, which will flow through the motor phase winding and power electronic switches. To minimize these zero-sequence currents, sineĖtriangle pulse width modulation (SPWM) is used, which will shift the lower order harmonics near to switching frequency in the linear modulation region. However, in the case of over modulation, harmonic voltages will be introduced close to the fundamental frequency. In this regard, a modified SPWM technique is proposed in this paper to operate the drive in the over modulation region up to the modulation index of 2/?3. The proposed quad two-level inverter topology is experimentally verified with a laboratory prototype on a four-pole 5- hp induction motor. Experimental results show the effectiveness of the pro-posed topology in the complete linear modulation region and the over modulation region.

A Real Time Fruit Grading Technique Based on Machine Vision and Image Processing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Chandra Sekhar Nandi | Bipan Tudu, Chiranjib Koley

Abstract

In agricultural and food industry the proper grading of fruits is important to increase the profitability. In this paper, a scheme for real time mango (Mangifera Indica L.) grading technique according to their maturity level and quality attributes like size, shape, weight, surface defect has been proposed. The proposed scheme works on intelligent machine vision based techniques for grading of mangoes in four different categories, which are determined on the basis of market value. In this system video image is captured by a CCD camera placed on the top of a conveyer belt carrying mangoes, thereafter several image processing techniques are applied to collect features which are sensitive to the maturity level and quality level. For maturity prediction Support Vector Machine (SVM) based classifier has been employed and for estimation of quality from the quality attributes, Multi Attribute Decision Making (MADM) system have been adopted. Finally fuzzy incremental learning algorithm has been used for grading based on maturity and quality. The performance accuracy achieved using this proposed system for grading of mango fruit is nearly 90%. Moreover, the repeatability of the proposed system is found to be 100%.

A Realtime Telehealth System using Lpc2148

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Nilay Tambat | Sowmya K B

Abstract

The world of automation is rapidly improving and growing. Along with it application of IoT is also increasing. Application of engineering and technology has proved its significance in the field of bio-engineering. Health monitoring systems have become the need and the hot areas of development in the society. Along with monitoring there is also a need to analyze the monitored data. In this paper a system to measure/monitor a two vital parameters of human body is developed. The monitored values are stored on cloud using a WiFi module and analysis on the data stored on the cloud is done using Tableau , An Android Application and an IoT platform ThingSpeak. If abnormal values are detected then immediately the values are sent to the doctor as well as the family members using GSM module. The data is continuously updated in the database. With the help of this system the doctor can monitor and analyze the parameters of the person remotely , the physical presence of the person is not required , which means wherever the person might be doctor will be able to advice and suggest the needed medication to the person.

A Reliable Congestion Control Framework for Wireless Sensor Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th October 2017

P.Prittopaul | R.Vijayalakshmi

Abstract

Well designed congestion control techniques allow efficient transmission of significant volumes of data from a large number of nodes along one or more routes towards the data processing centers. Since the priority of generated traffic in network level is not uniform in WSNs, an architecture framework is proposed based on priority of generated traffics for service identification in network level in order to meet better service quality and efficiency. The proposed method is efficient in terms of end to end delay, throughput, power consumption and lifetime of network.

A Reliable Congestion Control Framework for Wireless Sensor Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 4th September 2017

P.Prittopaul | R.Vijayalakshmi

Abstract

Well designed congestion control techniques allow efficient transmission of significant volumes of data from a large number of nodes along one or more routes towards the data processing centers. Since the priority of generated traffic in network level is not uniform in WSNs, an architecture framework is proposed based on priority of generated traffics for service identification in network level in order to meet better service quality and efficiency. The proposed method is efficient in terms of end to end delay, throughput, power consumption and lifetime of network.

A Report on Business Intelligence The Role of Data Analysis and Data Mining in Contemporary Organizations and The Ethical Implications of Collecting, Storing and Using Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mr. Richardson Lawrence | 

Abstract

Diabetic Retinopathy (DR) is an eye disease due to diabetes which causes visual loss. So it is rational to provide treatment for DR at first stages of disease. Hemorrhages are the first symptoms that signify person have diabetic retinopathy. Therefore, their recognition is very essential. In this paper image contrast is improved by pre-processing and then blood vessels are detected as the boundaries of hemorrhages are not differentiate when they are in contact with blood vessels.then classify the image on the basis texture feature such as area, standard deviation etc. finally normal, moderate or Severe DR is detected on the basis of texture feature

A Review Approach on Cardless ATM Access with Biometric Security Using IOT

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Mr.J.A Patel | Darade Bhavna, Ms.Baglane Ruchita ,Ms.Bodke Punam ,Ms.BodkeArchana

Abstract

This paper describes a method of implementing two way authentications. The first one is biometric thumb verification is done and in second is 4 digit pin verification. If it’s wrong then we find that the user is fake and LCD displays the THEFT message and also the buzzer is ON. If it is right then we find that the user is not fake and the LCD displays ENTER THE KEY message, in this case buzzer is OFF.

A Review Approach on Design and Development of Transportation Path Follower Robot for Material Handling

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Mr. Pathade Akash | Mr. Bajaj Kishan,Mr. Bajaj Kaushik,Ms. Patil Tanvi

Abstract

In this project instead of doing manual work, automatized work is done. Transportation path follower robot is a type of robot which is used for material handling and transporting the material from one place to another. The main purpose of this project is to reduce labour, cost involved with it and also to save the time. It is six wheel electric rover, which will provide paper work from administration office to every department. Robotic vehicles are capable of traveling where people cannot go, or where the hazards of human presence.

A Review Approach on Manual Fixture Automation Using PLC

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Mr. Patel Jagdish | Ms. Lawte Kanchan, Ms. Patil Isha, Ms. Raut Devyani

Abstract

a fixture is a mechanical setup that holds a job so that it will aid the industrial processes carried out on it with ease, in terms of accessibility and reach. The processes may include manipulation of a job like rotation, clamping, de-clamping and positioning. Fixtures can be handled manually to hold a job. But such manual process becomes tedious in complex processes which causes human fatigue as well as it is time consuming. Hence PLC (Programmable Logic controller) can be used to automate the industrial fixture, to reduce the complexity of the process. In our project we are trying to construct a PLC based control system to simulate the automation of an industrial fixture and analyzed it for safety and increase productivity which will be beneficial for manufacture industry.

A Review of Block based Image Compression Using Hybrid Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

S.Narasimhulu | Dr.T.Ramashri

Abstract

This Paper gives review of different types of Images and the different techniques for Image Compression. Based on this Review we recommended general method for Image Compression. Image Compression is the technique of reducing the image size without degrading the quality of the image. Various types of images and different compression techniques are discussed here. Image Compression is the solution associated with transmission and storage of large amount of information for digital Image. SPIHT is computationally very fast and among the best image compression algorithms known today. According to statistic analysis of the output binary stream of SPIHT encoding, propose a simple and effective method combined with Huffman encode for further compression. In this paper the results from the SPHIT algorithm are compared with the existing methods for compression like discrete cosine transform (DCT) and discrete wavelet transform (DWT).

A Review of Codes on Building Irregularities for Seismic Analysis

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Meenakshi Landge | Dr. R. K. Ingle

Abstract

Possibility of damage happening during earthquake ground motion is more where there are occurrences of structural weakness and this weakness generally produced because of the irregularity.The presence of structural irregularity changes the seismic response and the change in the seismic response depends upon the type of structural irregularities. In this paper, criteria and limits specified by IS 1893(Part 1) for different types of irregularities are discussed and standards defined by other countries (ASCE-7-10, NBCC2005, TEC2007, NZS1170 and EC8: 2004) have been compared. The code’s main advice for the designers is to avoid irregularities altogether if possible.Alsoto avoid casualties, architects should design appropriately and understand the dynamic behavior. To do that, the basis of seismic codes which are substantial bases should be used in architectural studies

A Review of Digital Watermarking and Its Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Anu | 

Abstract

This is agreed by one and all that today’s era is IT oriented and Internet has reached to every corner of our lives. Communicating over Internet or networks is a routine for us, this leads to the need of transmission security and safety of our confidential information which is being communicated. Digital Watermarking is a medium to assure integrity, piracy detection and knowing any kind of tempering done with the communicated data. It is also used for applications like owner’s authentication, copyright maintenance and monitoring broadcasts. In this paper we will review digital watermarking with its techniques, applications, classification and factors effecting watermarking

A Review of Load Balancing in Network-Wide Intrusion Detection Systems

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 19th July 2017

Miss. Prachi N. Deshmukh | Dr. V. M. Thakare

Abstract

There are various stakeholders having similar goals as well as policies due to which modification to the present internet is restricted to incremental updates; implementation of every novel fundamentally extraordinary innovation is beside inconceivable. To deal with this issue, proposed the concept of network virtualization, here designed as a diversifying attribute without having restriction of any system. By permitting multiple heterogeneous system structures to live together on a shared physical substrate, network virtualization gives flexibility, promotes diversity, and promises security and increased manageability. It reduces the maximum computation load, provide better resilience under traffic variability, and offer improved detection coverage.

A Review of Modern Paradigms in Data Compression Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Mr. Giridhar S. Sudi | Dr. Meghana Kulkarni , Mr. Vikrant K. Shende

Abstract

Data compression has been extensively applied to the motion-picture industry and consumer electronics especially in high-definition TVs, advanced multi-media systems, remote sensing systems via satellite, aircraft, radar, teleconferencing, email and social media, mobile phones, hand held PCs etc. Efficient compression of data would significantly decrease the overheads in both the communication and data storage. The efficiency of a data compression scheme is measured by the compression ratio, the resulting distortion after lossy compression, and the implementation complexity. This paper reviews the evolution of compression techniques over the years and the present day modern techniques being explored. Artificial Intelligence (AI) approaches appear to be very promising for intelligent information processing due to their massively paralleled computing structures. The main problems solved by Artificial Intelligence (AI) techniques such as Artificial Neural Networks, Fuzzy Logic systems and Genetic Algorithms include optimization, classification, prediction and pattern recognition. Due to the efficiency of AI paradigms in solving complex problems, researchers are applying these techniques to develop new intelligent data compression systems.

A Review of Net Metering with Ongrid Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Prof. Mr. I.D. Pharne | Mr. S. S. Malage , Mr. A. J. Patil , Mr. A. D. Landage

Abstract

With the increase in implement of solar PV in India, a net metering policy is need of ours. Solar energy is clean, inexhaustible and environment-friendly resource among all renewable energy options. In this paper, concept of net metering through solar system and analysis of data carried out is explored for the beneficial of consumers for studying the feasibility of net metering in India. Also it is found that simple net metering policy is unable to accommodate various categories of consumers. So, making a net metering, which is more scalable, feasible and financially viable is challenge. According to consumersí classifications net metering is a billing mechanism that credits solar energy system owners for the electricity they add to the grid.

A Review of the Optical Character Recognition Methodology in Image Processing Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Dr. T.C.Manjunath | Pavithra G , M.R. Prasad

Abstract

This review paper deals with a review of the optical character recognition using the Matlab software. OCR or optical character recognition is the process of converting scanned images of machine-printed or handwritten text (numerals, letters, and symbols) into a computer-processable format; also known as optical character recognition (OCR). A typical OCR system contains three logical components, viz., an image scanner, OCR software and hardware, and an output interface. OCR systems can largely be grouped into two categories: task-specific readers and general-purpose page readers. A task-specific reader handles only specific document types. Such as bank checks, letter mail, or credit-card slips. General-purpose page readers are designed to handle a broader range of documents such as business letters, technical writings, and newspapers. The relevant literature presented here will be of an extensive use to many of the readers who are pursuing a research in the design & development of optical character recognition systems

A Review of Ultrasound Image Segmentation

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd July 2017

Sreepriya P | 

Abstract

Image segmentation is one of the most critical tasks in automatic image analysis or facilitating the delineation of anatomical structures and other regions of interest. It can be defined as a process of partitioning an image into multiple segments, so as to change the representation of an image into something that is more meaningful and easier to analyze. Ultrasound images plays a crucial role because the acquisition of these images is non invasive, cheap and does not require ionizing radiations compared to other medical imaging techniques. Due to acoustic interferences and artifacts, the automatic segmentation of anatomical structures in ultrasound imagery becomes a real challenge. Thus, to enhance the capabilities of ultrasound as a qualitative tool in clinical medicine, here discusses the ultrasound image segmentation methods, focusing on techniques developed for clinical application. And also discuss the formation of ultrasound images and different methods of image segmentation. Last section explains the classification based on filters for reducing the speckle noises.

A Review on a Novel Approach for Image Segmentation Using Fast Gradient and Nontrivial Transformation

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

N.Lakshmi | K.R.Surendra, N.Pushpalatha

Abstract

A comparative analysis to fast multi label color image segmentation using Convex optimization techniques were studied. The presented model is in some ways related to the well-known MumfordĖShah model, but deviates in certain important aspects. The optimization problem has been designed with two goals in mind. It represent fundamental concepts of image segmentation, such as incorporation of weighted curve length and variation of intensity in the segmented regions, while allowing transformation into a convex concave saddle point problem that is computationally inexpensive. The nontrivial transformation of this model into a convexĖconcave saddle point problem, and the numerical treatment of the problem were studied. By applying an algorithm to various images it shows that the results are competitive in terms of quality at unprecedentedly low computation times. This algorithm allows high-quality segmentation of megapixel images in a few seconds and achieves interactive performance for low resolution images.

A Review on a Person Cross Domain Re Identification Based Adaptive Ranking Support Vector Machines (AdaRSVMs)

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

V .Hemanth Kumar | Y.Penchalaiah, Pushpalatha

Abstract

An adaptive ranking support vector machines (AdaRSVMs) method is used for re identification under target domain cameras without person labels. It addresses a new person re identification problem without label information of persons under non overlapping target cameras. Given the matched (positive) and unmatched (negative) image pairs from source domain cameras, as well as unmatched (negative) and unlabeled image pairs from target domain cameras, To overcome the problems introduced due to the absence of matched (positive) image pairs in the target domain, we relax the discriminative constraint to a necessary condition only relying on the positive mean in the target domain. To estimate the target positive mean, we make use of all the available data from source and target domains as well as constraints in person re identification. Inspired by adaptive learning methods, a new discriminative model with high confidence in target positive mean and low confidence in v target negative image pairs is developed by refining the distance model learnt from the source domain. Experimental results show that the proposed AdaRSVM outperforms existing supervised or unsupervised, learning or non-learning re identification methods without using label information in target cameras. Moreover, our method achieves better re identification performance than existing domain adaptation methods derived under equal conditional probability assumption.

A Review on Anti Spoofing For Face by Using Light Field Camera

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

T. Silpasree | N.DilipKumar, N.Pushpalatha

Abstract

The liability of face recognition systems in biometrics is a growing concern today, as still it remains vulnerable to various sophisticated attacks that undetermined the reliability of biometric systems. In this paper, we present a novel approach to accurately detect and mitigate the Spoofy attacks on the face by introducing light field camera (LFC), also known as plenoptic camera. Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it also exhibits an unique characteristic of rendering multiple depth (or focus) images in a single capture, also known as refocusing, which provides the high quality artefact face features. Introducing a novel idea of exploring the inherent characteristics of Light Field Camera to detect spoof attacks by estimating the variation of the focus between multiple depth images. To this extent, we first collect a new biometric face artefact database using LFC. We then generate the face artefacts samples by simulating three different kinds of spoof effects including photo print and electronic screen attacks. Extensive experiments carried out on the light field face artifact database have revealed the outstanding performance of the proposed anti spoofing scheme when benchmarked with various well established stateof-the-art schemes.

A Review on Atmospheric Effects on Free Space Optical Link

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Shaik.Taj Mahaboob | A.Sree Madhuri

Abstract

Free space optics, an emerging technology which is going to revolutionize the high speed communication by providing data rates up to tens of Gbps is grabbing the attention of the researchers to employ it on an operational basis. Although the present day microwave frequency bands support a good quality communication, their speeds are low and they cannot accommodate more data in the available bandwidth as much as the free space optics can. Any communication system operating in free space is vulnerable to the atmospheric attenuation. So the atmospheric effects which degrade the performance of free space optical signal need to be studied in order to renew its standard potential even under bad climatic conditions. . In this paper we discuss some of the atmospheric effects which degrade the standard performances of a Free Space Optical Link at different geographical locations.

A review on bridging (Reducing) the SG (Semantic Gap) in CBIR and Annotation

International Journal of Science , Engineering and Management, Available online 29th June 2017

Tabassum Nahid Sultana | Md Abdul Haleem Bahadur, [3]Dr. Ruksar Fatima,[4]Mohammed Shakeeb Ahmed

Abstract

: this paper has tried to identify the problems in content based image retrieval technique. The key obstacle of CBIR approaches is the SG i.e., the difference between the low level features to high level concept of human perception. To extend the image retrieval process beyond low level visual descriptors to high level image semantics. Therefore researches proposed different SBIR techniques to bridge the SG using various machine learning algorithms for the extraction of semantic images to increase the accuracy of the image retrieval process.

A Review on Comparative Study of Various Rating Systems

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Dakhole Namita.G | Gadgil J.M

Abstract

Now a days building energy efficiency rating system have been developed worldwide to manage the energy consumption of existing buildings. There are various rating systems accepted in India like LEED, GRIHA and IGBC which have their various rating criteria and rating thresholds. These various certification programs are dedicated to the design sustainable buildings by incentivizing reductions in energy, water, and building materials consumption, while at the same time enhancing occupant health and overall community connectivity. The increasing population growth, demands for buildings, services and comfort, which results in an increasing energy demand. For this reason design of energy efficient buildings are the main objective of upcoming era. The rating systems mainly focuses on energy efficiency, the reduction of the use of resources, water and materials, as well as the reduction of impacts on human health and the environment during the building's lifecycle. In this research paper, various studies are discussed related to comparison of green ratings in various countries and the performance of green buildings. This shows that various rating systems emphasizes on different criteria according to their priorities whereas, criteria should be set according to the topographical and climatic conditions of particular place

A Review on Dissemination Of Energy-Efficient Broadcast To Channel Randomness In Mobile Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

V.Bindu Madhavi | N.Pushpalatha

Abstract

Efficient broadcast in mobile networks is a challenging task due to high dynamic topology and energy efficiency and channel randomness. Based on an in-depth analysis of the popular Susceptible Infectious Recovered (SIR) epidemic broadcast scheme. In this paper a a study on novel energy-efficient broadcast scheme was done through dissemination process. This is able to adapt to fast changing network topology and channel randomness. Dissemination in mobile ad-hoc networks (MANETs) has to propagate a way of sore carry forward. Analytical results are provided to characterize the proposed scheme, including the fraction of nodes that can receive the information and the delay of the information dissemination process.

A Review on Drilling Process of Carbon Fiber Reinforced Plastic Laminates

International Journal of Science , Engineering and Management, Available online 29th June 2017

Ashwanth. B | Balaji. P,Guruprasaad. M,Suresh Kumar. M. S

Abstract

Carbon Fibre Reinforced Plastics have found wide range of application in aerospace, automobiles, sports and in energy sector due to their high strength to weight ratio. Drilling CFRP composites is a challenge as they are anisotropic materials. Over the years though lot of work has been done to address this issue there is still huge scope for improvement in drilling CFRP composites. This paper gives a literary review of drilling of CFRP composites over the years. This paper also identifies the various factors causing delamination and affecting the quality of the drill and thus provides general recommendations for the selection of process parameters of the drill for better quality of finish.

A Review on Error Correction and Object Removal for Videos Based on Inpainting with Short-Term Windows

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

K. Ushasree | I. Suneetha , Jaganath Nayak , N. Pushpalatha

Abstract

Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle these challenges, a computationally-efficient algorithm that separately inpaint foreground objects and background is proposed. Using Dynamic Programming, foreground objects are holistically inpainted with object templates that minimize a sliding-window dissimilarity cost function. Static background are inpainted by adaptive background replacement and image inpainting.In this propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

A Review on Error Correction and Object Removal for Videos Based on Inpainting with Short-Term Windows

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

K. Ushasree | I. Suneetha , N. Pushpalatha

Abstract

Video inpainting is the process of repairing missing regions (holes) in videos. Most automatic techniques are computationally intensive and unable to repair large holes. To tackle these challenges, a computationally-efficient algorithm that separately inpaint foreground objects and background is proposed. Using Dynamic Programming, foreground objects are holistically inpainted with object templates that minimize a sliding-window dissimilarity cost function. Static background are inpainted by adaptive background replacement and image inpainting.In this propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

A Review on Graphene Based Supercapacitors

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Omkar Ganesh Bhegade | Himkedar Jadhav, Prof.M.Mahajan,Prof.D.Shastri ,Dr.N.Patil

Abstract

This paper looks at the research that is being carried out on use of Graphene as an electrode material for supercapacitors which may be the replacement for the lithium ion batters in future. It also discuss about the scope of graphene based supercapacitors in various fields. Science and technology have been advancing rapidly over the last few decades; storing the energy has always been a problem. The problem faced by conventional energy storage system is that a battery can potentially hold a lot of energy, but it can take a long time to charge and a capacitor, on the other hand, can be charged very quickly, but canít hold that much energy comparatively. The solution emerged was the supercapacitor that is able to provide both of these positive characteristics without compromise. Currently, research is being carried out on enhancing the capabilities supercapacitor and Graphene is proving itself to be the best electrode material for it. Graphene is a nanomaterial of 2D flat monolayer carbon (bonded in hexagonal lattice). Graphene is a parent of all carbon allotropes with versatile properties

A Review on IOT Based Smart Home

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Prof.Kavita S. Patil  | Priyanka Tile , Prajakta Somvanshi

Abstract

A number of internet users is increasing day by day. Now days there are many ways to communicate but most of the communication is done through the internet. With increase in digital devices in home there is needed to access and control the appliances from remote locations. IOT is one of the fast rising internet technologies which provides communication between the things without human interface and allows the user to access devices from remote location.

A Review on Load Positioning Application of Shape Memory Alloy

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 9th June 2017

Namitha S N | Praveen Kumar Konda,Ashwin Kumar, Sachin C N Shetty

Abstract

Shape Memory Alloy (SMA) is a special material, which have the ability to return to its original shape when it is heated. SMA is different from other materials due to its two unique properties- Shape Memory Effect (SME) and Superelasticity. When there is a limitation of shape recovery, these alloys promote high restitution forces. Because of these properties, there is a great technological interest in the use of SMA for different applications[6]. This paper focuses on the brief review on applications of SMA in different fields. They have applications in aircraft and spacecraft, civil structures, robotics, automotive, telecommunication, piping, medicine, optometry etc.

A Review on Mechanical Characterization Using Rice Husk Ash in Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd August 2017

Shridharmurthy H N | Karan Singh M, Manjesh Kumar M P,Darshan M,Harshith N Gowda

Abstract

The main objective is to study the mechanical properties of a high strength concrete by using Rice Husk Ash (RHA) instead of different replacement in levels of an Ordinary Portland Cement (OPC). The standard cylinders (300mm height x 150mm dia), prisms (100mm X 100mm X500mm) and cubes (150mm X 150mm X 150mm) were casted. In all specimens having M50 and M40 grade mix are casted and tested. The comparison is done between the RHA of both grades with high strength concrete of various amount replacement of the cement viz i.e, 15%, 10% ,5%, 0% and along with high strength concrete without RHA. The compressive test is done for various number of days. A interesting and quite encouraging results are obtained of mechanical properties of RHA for a particular number of days. By increasing the Rice Husk Ash fineness, enhanced strength of the blended concrete are compared to coarser Rice Husk Ash and control OPC mixture. Increase in water demand in concrete by incorporation of the Rice Husk Ash. Up to 20% of cement can be replaced by RHA without adversely affecting in the strength and it shows excellent improvement in the strength.

A Review on Protection of Compensated Power Transmission Line

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 1st September 2017

Ashok Manori | Manoj Tripathy, Hari Om Gupta

Abstract

This paper presents a survey of present and past developments in the field of protection of transmission lines having FACTS devices and also suggests the best suitable solutions for the problems. In present time extra high voltage transmission lines are used to transmit large amount of power over a wide interconnected power network. Transmission lines are capable of transmitting electric power up-to its thermal limit. To utilize the full capacity of transmission line for transmission of electric power over a power network, flexible alternating current transmission systems (FACTS) are installed in the transmission line at different locations. Presence of FACTS systems changes the transmission parameters and hence adversely affects the transmission line protection system by creating problems viz. reaching problem, zone setting, inversion (voltage and current) and resonance issues. Therefore, there is a great need to identify the wider impact of different FACTS devices on the existing protection system and simultaneously the remedies of the problems.

A Review on RAM (Reliability, Availability, and Maintainability) Analysis, its Applications and its Incorporation in the Modern World

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Shantanu Kaushik | Piyush Singhal

Abstract

This review paper focuses on the significance of RAM (Reliability, Availability, and Maintainability) analysis in all fields and it also tries to explain its existence in the modern world. The three factors reliability, availability, and maintainability together helps to manage a system effectively if all three are taken good care of separately and their combined effects and profits are evaluated with respect to system requirements, overall functioning and productivity in the long run. Therefore, RAM analysis is of great importance nowadays to effectively coordinate all the functions without any unexpected system failure. This paper also outlines the applications of RAM analysis being used in various fields and how it has been incorporated successfully in all these fields.

A Review On SCARA Manipulator For Various Applications

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th July 2017

Dr.PVS Subhashini | L Sai Sandeep,E Karnuakar, Dr.NVS Raju

Abstract

Selective Compliance articulated robot arm (SCARA) is an accepted robotic manipulator for industrial applications. Earlier SCARA manipulator was used exclusively for assembly purposes like printed circuit board, pick and place etc. But at present research on SCARA widens in the areas of production operations and for medical applications.The present paper will be a review on SCARA manipulator for various applications which includes literature on SCARA kinematics, dynamics and applications. This paper presents kinematics and dynamics of a SCARA robot using techniques like modeling, mathematical etc. In the literature most of the authors used packages like solid works, NX, MATLAB, ANSYS for analyses purpose. Overall this paper presents literature for the SCARA manipulator to a greater extent.

A Review on Spatial Pattern Methods for BrainComputer Interface

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

B. Bijitha | Nandakumar P

Abstract

Brain-computer interface technology is the one in which the userís mental intentions are captured and used as control signals for external devices. BCI researches are becoming more popular as it can be used as a means of communication for people with severe disability. The efficiency of a BCI system depends on its signal processing stages. The signal processing stages include the signal acquisition, feature extraction and classification. In this paper, a brief review of one of the feature extraction methods called spatial pattern algorithms for BCI is provided.

A Review on Spectrum Efficient OFDM Based on Structured Compressed Sensing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sreelakshmi V | Nandakumar P

Abstract

Spectrum efficiency is becoming increasingly important for wireless communication systems in order to avoid the congestion of users for the spectrum. OFDM has already been extensively adopted by numerous wireless communication systems like DVB-T, WiMAX, LTE, WiFi, etc, and it is also widely recognized as a prominent modulation technique for future wireless communication systems. Thus, developing spectrum efficient OFDM scheme is essential to achieve high transmission efficiency. Time domain synchronous OFDM (TDS-OFDM) has a higher spectrum efficiency than standard cyclic prefix OFDM (CP-OFDM) by replacing the unknown CP with a known pseudorandom noise (PN) sequence. Currently, TDS-OFDM can support constellations up to 64QAM, but cannot support higher-order constellations like 256QAM due to the residual mutual interferences between the pseudorandom noise (PN) guard interval and the OFDM data block. To solve this problem, break the iterative interference cancellation and propose a new idea of using multiple inter-block-interference (IBI)-free regions of very small size to realize simultaneous multi-channel reconstruction under the framework of structured compressive sensing.

A Review on Spectrum Sliced Elastic Optical Path Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Triveni C L | P C Srikanth , T Srinivas

Abstract

Recent developments in the area of technologies, data center networks, cloud computing and social networks have caused the growth of a wide range of network applications. The data rate of these applications also varies from a few megabits/second (Mbps) to several gigabits/second (Gbps) for that reason increasing the burden on the internet. Best solution for this is to utilize the advancement in optical networks. In WDM network bandwidth up to 100Gbps can be utilized from the optical fiber in an energy efficient manner but its not efficient when traffic demands vary frequently. Spectrum sliced elastic optical path networks (SLICE) has been proposed as a long term solution to handle the ever increasing data traffic and the diverse demand range. SLICEs provide abundant bandwidth by enabling sub-wavelength, super-wavelength and multiple-rate data traffic accommodation in highly spectrum efficient manner.

A review on the biomass energy resources and conversion technology in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 5th July 2017

Amit Kumar | Dr. Rajakumar D.G

Abstract

Sustainable economic development is closely linked with the energy availability. The demand for energy continues to increase steadily from last several decades, due to rapid industrialization and globalization. Most of the world’s commercial energy needs are met by fossil fuels coupled with negative environmental effects. The burning of the fossil fuels is a big contributor for increasing the level of CO2 in the atmosphere. To combat global warming and other environmental problems associated with these fossil fuels many countries, including India, are increasingly adopting renewable energy sources. Such energy sources generally depend on energy flows through the earth’s ecosystem from the insolation of the sun and the geothermal energy of the earth. India is moving toward a trend of generating electricity from renewable resources such as Solar, Wind, Biomass, etc. The total installed capacity for electricity generation in India is 310 GW as on 31st December 2016 in that Renewable power plant contributes 88.96 GW (28.69%) in particular biomass contributes 4.99 GW (1.61%). In view of this, present study has made an attempt to have a brief review on various categories of biomass and its resources available in the Indian context and its wide range of applications based on the process of conversion methods or technologies used. Study also brings various possibilities of using different biomasses and their suitability in the context of energy resource.

A Review Paper on Application of Solar System in the Field of Agriculture

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Prof. C.W. Jadho | Shradhha Makade , Shubhangi Nagapure , Vaishnavi Welpulwar

Abstract

India is the country of villages. This being said the major occupation of majority of villages in India is farming. There also have been changes in agricultural technology and practices with recent advancements in engineering and technology. Seed sowing is the basic operations needed to get better revenue from agriculture. Manual sowing should not give adequate spacing between row to row. Manual sowing is very time consuming process and costly. Hence, it is a necessary for appropriate seed drill for sowing seed. Indian farmer perform agriculture mostly with manual operation. The pain involved in doing each and every manual operation related to agriculture. Thus this project deals with design and fabrication of a smart seed sowing machine for Indian farmers. This Paper deals with the various sowing methods used in India for seed sowing . The comparison between the traditional sowing method and the new proposed machine which can perform a number of simultaneous operations and has number of advantages. As day by day the labor availability becomes the great concern for the farmers and labor cost is more, this machine reduces the efforts and total cost of sowing the seeds.

A Review Paper on Biodiesel

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Akshaykumar R. Chavan | Akshay L. Karvekar,Tanuja S. Adasul,Akash A. Zambre, Suyog S. Patil

Abstract

Now days increases the demand of petroleum products because of increasing industrialization and uses of automobile. Due to this increases the rate of petroleum products. The fossil fuels quantity is limited on the earth. So it is necessary to find out an alternative fuel. There are many researchers are doing their research on alternative fuel and they are developed an alternative fuel i.e. Biodiesel. Biodiesel is produced from transesterification and esterification process. For production of biodiesel various raw materials are used such as Vegetable oils, Animal fats and Short chain alcohols. Also various crops are used for biodiesel production such as Jatropha, Undi, Castor, Karnja, Soya bean, Sunflower, Palm, Corn, Jojoba, Cotton, Moha etc. Biodiesel is prepared from renewable resources, so it having less emission than petroleum products.

A Review paper on Catalytic Converter for Automotive Exhaust Emission

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

N.Karthik Kumaran | A.Balaji,S.Manonmani,R.Mohan kumar

Abstract

The purpose of this paper is to present Air pollution caused from mobile springs is a tricky of universal curiosity. Vehicle population is probable to grow close to 1300 million by the year 2030. Due to inadequate combustion in the engine, there are a number of incomplete combustion products CO, HC, NOx, particulate matters etc. These pollutants have harmful impact on air quality, environment and human health that hints in rigorous norms of pollutant emission. Numbers of alternative technologies like upgrading in engine design, fuel pre-treatment, use of alternative fuels, fuel additives, exhaust treatment or better tuning of the combustion process etc. are being considered to reduce the emission levels of the engine. Among all the types of machineries developed so far, use of catalytic converters based on platinum (noble) group metal is the best way to control automotive exhaust emissions. This evaluation paper discusses automotive exhaust emissions and its impact, automotive exhaust emanation control by platinum (noble) group metal based catalyst in catalytic converter, history of catalytic convertor, types of catalytic convertor, restriction of catalytic convertor and also triumphs of catalytic convertor.

A Review Paper on the Most Trending Technology: ‚Äú Big Data & it‚Äôs Processing using Hadoop ‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd September 2017

Harshini Tanuku | Keerthi Bangari

Abstract

Big data is defined as a collection of big and complex data sets that have gigantic amount of data, that encompass social media data analytics, data management efficiency and real-time data. Big data analytics is termed as the process in which huge amounts of data are studied for further processing and industrial usage. Big data is processed using a technology known as ‚ÄúHadoop‚ÄĚ that uses the MapReduce paradigm for processing the huge datasets

A Review: IOT Smart Vehicle

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Thoshif Khan | Aakash Luckshetty , Md.Tauseef

Abstract

The Internet of Things (IOT) is the system of physical objectsógadgets, vehicles, structures and different things inserted with hardware, programming, sensors, and system availability that empowers these items to gather and trade data. The IOT permits objects to be detected and controlled remotely crosswise over existing system infrastructure making open doors for more straightforward combination of the physical world into PC based frameworks, and bringing about enhanced proficiency, exactness and financial advantage. Smart vehicle is one of the applications of IOT which is generally used for the comfort, safety, security and privacy of the drivers. From the past decades, there has been reported several cases which are related to vehicle theft due to this vehicle security has been burning topic all over the world to overcome the challenges related to the vehicle security, We provide a complete survey in ďIOT smart vehicleĒ. This paper also describes vehicle detection tracking and monitoring using IOT application.

A Robust Encryption and Searching System to Share Confidential Data onto the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr. Thejas S | Dr. G. Raghavendra Rao

Abstract

as cloud computing provides storing and sharing records via a cloud service because of on demand resource access and elasticity. For secure record sharing requires encryption of records before outsourcing. Key management system is one of the important aspects of the system. For sharing large number of documents, each record needs to be encrypted using different keys. Since to decrypt these records requires all keys which is very different task. Hence this approach uses aggregated key system, which aggregates all the keys. Later at the time of decryption of all records it requires one aggregated key. Considering large number of records in the cloud. For the efficient access of these records, it is necessary to search for the records over encrypted file. For this purpose , required to build for the index file. Multi keyword entries searches for the relevance record by matching keywords with the index file

A Robust Fusion of DWT and PCA for Video Watermarking using Optimization Technique

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Anjaneyulu Sake | Ramashri Tirumala

Abstract

Watermarking is a component of inserting data into the multimedia, for example, image, audio or video. This paper propose for Fusion based video watermarking using hybrid technique to protect the copy right of images. In order to improve the efficiency of video watermarking two main processes are used namely watermark embedding process and watermark extraction process. Before embedding process the input video sequence convert into number of frames. Here Principal Component Analysisand Discrete Wavelet Transform is applied in watermark image. The swam optimization algorithm is proposed for generating random frame selection for the embedding process. The result obtain from the watermark embedding process is the watermark video sequence. Next watermark extraction process is carried out. It is the reverse process of watermark embedding. In watermark extraction process, it extracts the watermark image from the watermark video sequence. The experimental results show that this combine technique gives double security for the protection of video content and achieves good PSNR and NC.

A Secure Deduplication Mechanism for Sensitive Data in Public Cloud Storage

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Deepa P.B | Dr.Rudramurthy M.S

Abstract

nowadays, cloud-based services are gaining more importance in leveraging services for large scale storage and distribution. These provide cost effectiveness, time saving and efficient utilization of computing resources. Many enterprises have decided to envision a staged migration for their data to public cloud, for better management of backup data. As data progressively grows, the cloud storage systems continuously face challenges in saving storage capacity. Data Deduplication gives solution to such challenges. It is a data compression technique for eliminating the redundant data. Assuming that cloud service provider may not be trustworthy (i.e. is honest but curious). The security, bandwidth and latency are of top concerns for an enterprise to store sensitive data in the public cloud storage. Considering these security challenges, we propose and implement a client side deduplication scheme for securely storing enterprise sensitive data via the pubic cloud. Efficiently and reliably managing the huge number of convergent keys by the user is a critical issue. Hence we have built a system where each convergent key is secured and the same is outsourced to the cloud. To avoid the weakness of convergent encryption, double encryption is done. By following this method, we can save storage space and cost. It also reduces bandwidth and ensures better confidentiality towards unauthorized users.

A Secure Parallel Network File System using Protocols

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Digambar Waghole | Jabbar Tamboli, Shrutika Chintal , Supriya Vinode , VaishaliShinde

Abstract

We examine the issue of key foundation for secure numerous correspondences. The issue is enlivened by the multiplication of huge scale dispersed file frameworks supporting parallel access to numerous capacity gadgets. Our work concentrates on the present Internet standard for such file frameworks, i.e. parallel Network File System (pNFS), which makes utilization of Kerberos to establishparallelsessionkeys between clientsandstoragedevices. Our survey of the current Kerberos-based convention demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the stockpiling gadgets has overwhelming workload that confines the adaptability of the convention; (ii) the convention does not give forward mystery; (iii) the metadata server creates itself all the session keys that are utilized between the customers and capacity gadgets, and this naturally prompts key escrow. In this paper, we propose a mixed bag of confirmed key trade conventions that are intended to address the above issues. We demonstrate that our conventions are fit for decreasing up to give or take 54% of the workload of the metadata server and simultaneously supporting forward mystery and escrow-freeness.

A Secured Public key Exchange Technique for Elliptic Curve Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

A.Vithya Vijayalakshmi | A. Dalvin Vinoth Kumar, Er. Karthigai Priya Govindrajan, Dr. L. Arockiam

Abstract

Security is the most important factor in Internet of Things (IoT). The public key cryptography systems like RSA, DSA are not suitable for IoT Devices because of the key size and energy consumption. ECC cryptography system is more suitable for IoT lightweight devices. ECC provides same level of security as like RSA with small key size and less energy computation. Key exchange is challengeable task due to Routing transmission attacks like DoS attack. The proposed technique is to enhance key exchange system in ECC based security protocols. The public key is encrypted before shared into network. The path selection algorithm is used to choose two different paths. One is for encrypted public key sharing and another is for unlock-key for encrypted public key sharing. The possibility of attacks during key sharing is investigated; the key size and energy consumption is compared. This technique is suitable for Tmote Sky and MICAz nodes

A Secured Remote Health Monitoring System Based on IoT

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 17th August 2017

Priya.R | A. Pravin Renold

Abstract

The Personal Healthcare Devices (PHDs) measure vital signals of patient. The advantages of PHDs are: (1) wearable (2) Support diseased people (3) Continuous monitoring of health and precaution leads to increased lifetime. Due to the advent of different communication standards such as low power Bluetooth, zigbee, and Internet of Things, the PHDs could be connected to caretakers or doctors and provide proper advice or medication. This project deals with designing a firmware for PHDs, which is interoperable and secure.The advantages of the proposed system are: i. Low cost PHDs could be designed compatible for the firmware ii. Ensures privacy iii. Improves patient care There exists a challenge in terms of maintaining privacy of patient’s data when connecting PHDs to the network. .In this work, we integrate PHDs with internet for sharing health data using Constrained Application Protocol (CoAP) and AES algorithm for Security purpose. CoAP is based on the Representational State Transfer (REST) model and can be considered a real enabler for Internet of Things (IoT). IoT is characterized by an interconnected set of individually addressed and constrained devices in a distributed system, with sensing/active devices for physical phenomena, data collection, and applications using sensing, computation and actuation.

A Simple Authentication Protocol for Secure Data Collection in Wireless Sensor Network

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Triveni Mane | Raveendra.G

Abstract

For numerous applications large scale sensor network are used and data have been collected are used in process of making decision. Information that are from different origins over intervening nodes that collects information packets. A intervening malicious nodes may introduced by the attacker in the network and or disturbs present nodes. Therefore for making correct decision it is very difficult to providing high data trustworthiness. To find the trustworthiness of sensor data a key factor is represented by data provenance. In sensor network provenance management introduces various challenges like limited bandwidth and energy consumption, efficiency storage and secure transference. This paper prefers a light weight mechanism for securely sending of provenance for sensor input information. To encode provenance the suggested scheme depends on in-packet bloom filter. Here we used this efficient mechanism for verification of provenance and reconstruction of data at base station.

A Single Stage Inverter for Photovoltaic Application

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Nitha Bosi P.T. | 

Abstract

Renewable energy technologies offers clean, abundant energy gathered from self renewing resources such as sun, wind etc. As power demand increases, power failure also increases. So, renewable energy source can be used to provide constant loads. But the voltage range of photovoltaic cell is influenced by several environmental factors and it varies in wide range. So the inverter system must operate in both buck and boost modes. This paper presents a single stage buck boost inverter topology. The voltage boosting is done with the help of ac-ac unit composed of active switches. Thus reducing the passive elements and this increases the efficiency of the system. Operational analyses in both modes are presented. MATLAB simulink model is developed. Experimental results are presented to verify the operation.

A Smart Automatic Mains Failure Panel with Diesel Generator Control and Wi-Fi

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Abhijith Mohanan. N | Kiranlal. C, Anju, G.R, Krupa Mariam, Jacob, Sharmila

Abstract

This paper focuses on the development of a smart Auto Mains Failure (AMF) panel meant for day to day electrical applications. AMF panel is unavoidable in industries, hospitals, educational industries etc. where generator is compulsory. It acts as the switching mechanism between the generator, load and the main power supply. It ensures consistent power supply to the load. An AMF panel, which can be controlled from a distance using Wi-Fi is presented here. The proposed system displays the generator parameters and indicates the type of fault in the supply mains and saves energy. The hardware model of the system is explained, which can be used for the validation of the results.

A Smart Prepaid Anti-theft Energy meter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Ann Mary Michael | Mathews Mathew, Raghav Nath , Reeja Mathew, Rohit Koshy Roy

Abstract

Power utilities in different countries are incurring huge losses due to electricity theft. This paper proposes the control of electricity theft by using a prepaid energy metering system. In this system a smart energy meter is installed in every consumer unit and at the service provider side a server is maintained. The meter and the server are equipped with GSM module which facilitates bidirectional communication. By sending a PIN number hidden in a scratch card to the server using SMS consumers can easily recharge their energy meter. The bidirectional GSM communication using SMS ensures the effectiveness of these measures. Pilferage of electricity can be substantially reduced by incorporating the proposed measures along with the prepaid metering scheme. Legal actions against dishonest consumers are also taken in this system.

A Smart Prepaid Anti-Theft Energy Meter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Ann Mary Michael | Mathews Mathew , Raghav Nath , Reeja Mathew , Rohit Koshy Roy

Abstract

Power utilities in different countries are incurring huge losses due to electricity theft. This paper proposes the control of electricity theft by using a prepaid energy metering system. In this system a smart energy meter is installed in every consumer unit and at the service provider side a server is maintained. The meter and the server are equipped with GSM module which facilitates bidirectional communication. By sending a PIN number hidden in a scratch card to the server using SMS consumers can easily recharge their energy meter. The bidirectional GSM communication using SMS ensures the effectiveness of these measures. Pilferage of electricity can be substantially reduced by incorporating the proposed measures along with the prepaid metering scheme. Legal actions against dishonest consumers are also taken in this system.

A Smart Robotic Vehicle To Survey The Ocean

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st August 2017

Nagarjun J | Dileep Kumar N, Bharath R, Mohan Kumar P, Mrs Sahana Salagare

Abstract

Ocean exploration plays a vital role in global climate control and understanding environmental change and helps in research areas for the purpose of oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention like Tsunami and earthquakes. Today’s Existing systems are a data buoy which provides weather forecasting, Survey ships which are huge and heavier and satellites which are cost inefficient. To overcome existing system drawback and to provide multifunctioning, we are implementing smart robotic vehicle which provides live video acquisition, exact location co-ordinates ofthe device to the user, metal detection, automatic and manual control ofthe device. In this paper, we are developing a smart Robotic vehicle which is cost effective, small in size, consumes less power and has various applications towards oceanographic research.

A Smart Sensor Interface for WSN in IoT Environment using FPGA

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sreedrisya S | Abhilash R V

Abstract

Measurement is an important subsystem of embedded system. Its main function is to collect the information from systems and feed to the processor for controlling the whole system. For collecting data, different types of sensors are used. Each sensor has to write complex and clumsy program code. Most of the control panels available in industries are wired panels and the machines are controlled and monitored by an operator in a room. It leads to the invention of sensor interface device controlled by wireless modules like zigbee, MiWi etc. Microcontrollers, one of the sensor interface device have some restrictions like connect number, sampling rate and signal types of sensors. To overcome these problems Field Programmable Gate Array (FPGA) is adapted as core controller. By using this, data can read in parallel and in real time with high speed from different sensors. MiWi module developed by Microchip is used here as wireless transceiver. But every wireless communication modules have limitations in the range. The concept of Internet of Things (IoT) is applied on the wireless sensor interface device. IoT is a concept of connecting and controlling devices through internet. Wide range of applications is available in IoT like industry, agriculture, environment protection etc. To maintain security in communication, data can send in encrypted form using suitable algorithm. A wireless sensor interface device designed using VHDL and is implemented in IoT environment using Java and C#.

A Static Structural and Modal Analysis of Rectangular Plate by using ANSYS

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

S. S. Kadam | Dr. G R. Gandhe,D. H. Tupe

Abstract

Finite element analysis is performed on quadrilateral rectangular plate by using finite element method based software ANSYS (version 15). And the comparison results are studied and compared out by using material properties of reinforced cement concrete and ferrocement and the appropriate loads acting on the structure and also compared with regression analysis on graphs by using static structural and modal analysis. Analysis results shows the effect of stress results with respect to their characteristics strength. Regression analysis are obtained very good agreement with the results obtained by finite element analysis based on software ANSYS- exact solutions. This job are very useful for obtaining the results are not only at node points but also the entire surfaces of the quadrilateral rectangular plate.

A Step towards Sustainable Environment for Better Tomorrow

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Laxman Gaikwad | Saurabh Deshmukh,Asmita Deshmukh,Bhavik Bohra,Reshma Raskar Phule

Abstract

Sustainability is a process in which the design, planning and construction are done in such a way that it minimizes the total environmental impact while enhancing user comfort and productivity. This paper mainly focuses on the achievement of CII - Sohrabji Godrej Green Business Centre (CII Godrej GBC), the first LEED platinum rated building in India, in the field of sustainability with the combination of high tech innovative techniques and efficient resource using methods. The paper describes the effective implementation of the sustainability parameters in the building such as incorporating traditional concepts into modern and contemporary architecture like extensive landscaping, incorporating solar PV systems, indoor air quality monitoring, a high efficiency HVAC system, a passive cooling system using wind towers, high performance glass, aesthetic roof gardens, rain water harvesting, and root zone treatment system which reduces adverse effects of the building on environment. As a result, CII Godrej GBC gasconades a 50% saving in overall energy consumption, 35 % reduction in potable water consumption and usage of 80% of recycled/recyclable material, which is much more as compared to the conventional green building [1]. The paper also emphasizes on how these techniques and methods can be implemented in every commercial or residential building at small or large scale, which will not only improve the present environmental conditions of the country to a large extent but also reduce the exploitation of natural resources.

A Study in Knowledge Acquisition in AI Systems through Genetic Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Kumar Shekhar Singh | 

Abstract

Knowledge Base in an integral part of any AI system. Knowledge Acquisition refers to purposeful addition or refinements of knowledge structures to a knowledge Base. However knowledge acquisition is a complex and difficult task for AI researchers.Machine learning is the autonomous/mechanical procedure involving computers through which an AI. System itself enriches its knowledge Base.A useful taxonomy for machine learning is one that is based on the behavarioul strategy employed in the learning process. Some important conventional methods depending upon the degree of inference procedure are memorization, Analogy Inductive &Deductive inference.Attempts to develop machine learning systems began in 1950s. These design included self Adaptive system which modified their own structures in an attempt to produce an optional response to some input stimuli.Genetic Algorithms (GA) are based on population genetics. GAs learn through crossovers and mutations to provide optimum results. Higher performing knowledge structures can be mated (cross-over) to give birth to offsprings which possess many of their parent traits. Generations of structures are thus created until an acceptable level of performance has been reached. The following paper presents a study in different aspects of implementation of GAs for knowledge Acquisition in AI systems

A Study of Hybrid ANN-HMM Model for ASR

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ashish Shendre | Dr. Sanjay Nalbalwar

Abstract

ASR (Automatic Speech Recognition) is most important for human computer interaction. In spite of tremendous advance in the ASR technique it is still far-away from human level performance. HMM (Hidden Markov model) based ASR system has made advancement but faced lots of limitation in practical problems. ANN (Artificial Neural Network) was used to replace HMM but the attempt was not that successful when trying to model high level dependency. Then attempt was made to combine this two to get the better performance. ANN-HMM hybrid model was introduced to combine the benefit of both and to increase the overall performance of ASR system. Large number of different hybrid architecture has proposed in the literature. Objective of this review paper is to focus on ANN-HMM. Most of the part of the paper is focused on describing the architecture of HMM, Neural Networkand how to use ANN for improvement of speech recognition.

A Study of the Effect of Pyrites and Rhizobium Inoculation on Chlorophyll and Sugar Content in Black Gram under Sodicity Stress Condition.

International Journal of Science , Engineering and Management, Available online 16th June 2017

Raj Rupali Singh | 

Abstract

The study reveals that sodic conditions of soil resulted in poor bio-synthesis in black gram plants and hence both chlorophyll‚Äėa‚Äô, ‚Äėb‚Äô and reducing and non-reducing sugar contentsdecreased with increasing levels of RSC water treatments. Incorporation of iron pyrites as an ameliorating agent significantly improved the availability of nutrients and enhanced the chlorophyll and sugar content. The Rhizobium inoculated treatments supplemented with 50 g iron pyrites pot-1 adjusted best among all the treatments and plants could withstand irrigation with 2.5 meL-1 RSC water without being adversely affected. Further, 7.5 meL¬¨-1 proved detrimental for plant growth and recorded maximum reduction in sugar and chlorophyll contents in the treatments which were not supplied with pyrites

A Study of WannaCry Ransomware Attack.

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th September 2017

Dr Supreet Kaur Sahi | 

Abstract

The problem with Cyber security is continuously evolving nature of security threats. The traditional approach focused on high demand resources ignoring less important components at dangerous risks. Such an approach is insufficient in current environment and biggest example of this is WannaCry Ransomware attacks. This article highlights different characteristics of security threats. The globe has experienced a Ransomware cyber-attack ‚ÄúWannaCry‚ÄĚ that has infected thousand computers worldwide. WannaCry has ability to spread through network by exploiting a critical vulnerability. This article also highlights preventive steps against the attack. Finally a formula is discussed to enhance Network Security.

A Study on 802.11 Wireless Routers Hacking Techniques and Security Encryption Levels

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Amith Raj | Sneha H.R, Bindu Bhargavi S.M, Rekha Jayaram

Abstract

A device that performs both the functions of routing and the functions of a wireless access point is called as a wireless router. It can also be used to provide access to the private computer network or Internet. A set of Media Access Control(MAC) and Physical Layer specifications for implementing wireless local area network (WLAN) computer communication is defined in IEEE 802.11. It supports different connection types like PPPOE, Static IP address, Dynamic IP address and Bridge as provided by the ISP. These devices can also be used as modems and WiFi Router protected with a password. There are various WLAN encryption techniques like WEP, WPA, WPA-2(PSK). But all of these encryptions are vulnerable and can be hacked using certain softwares and techniques. In this paper, a number of hacking techniques using softwares like Aircrack, WiFite are explained for research purpose. This paper also discusses about setting up a secure WiFi router using different encryption techniques with combination of security features of routers like Mac Address filtering and Firewalls to protect from hackers and attackers. The primary purpose of this research is to demonstrate a brief idea on ethical hacking and provide sufficient security for home and enterprise network.

A Study on ‚ÄúCritical Pedagogy‚ÄĚ in NCF 2005 adopted by English teachers at Upper Primary stage in Manipur with reference to low achievement of students

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st September 2017

Punith.B.M | Sachin Godi ,Sachin Shetty, Sangameshwaraswamy , Yogananda B.S

Abstract

Throughout the study, the main aim is to increase the productivity in the starter assembly line . In each workstation the processing time is different and the longest time consumption in workstation will be identified and observation is carried out . This related workstation is studied by time study techniques. The time is taken by stopwatch. The goal of the work is to seek in increase in the line efficiency and productivity rate hence proposed to the company. The major drawback is the setup change of performance test bench of the starter . These particular problems thus affect the productivity and the line efficiency as well. Thorough observation revealed the change over time for a workstation also an important aspect in the production time . It plays a major role in the company’s overall income , as the result of that the major change should be taken so as to reduce the change over time . The setup change of performance test bench consumed more time and results in less production. So we should reduce the setup change time by removing the non-value added activities and bring in new techniques . This change has a better line efficiency and increase in rate of productivity

A Study on ‚ÄúCritical Pedagogy‚ÄĚ in NCF 2005 adopted by English teachers at Upper Primary stage in Manipur with reference to low achievement of students

International Journal of Science , Engineering and Management, Available online 1st September 2017

Dr. M. Gunamani Singh | 

Abstract

This paper presents the results from a qualitative research study that explores the experiences of high school teachers with some of teaching techniques and approaches in critical pedagogy.The study considers teachers who may not have explicitly learned about or applied critical pedagogy in teaching. It investigates how feasible and desirable they find the techniques and approaches in critical pedagogy to be based on their teaching experiences these teachers work in school with largely upper ‚Äď middle class students, so the issue of applying critical pedagogy with affluent students adds a dimension of interest to this study.It was generally expected that school teachers would be implementing several teachingapproaches relating to critical pedagogy prescribed in NCF-2005 but these pedagogieswere found only partially implementedby them at Elementary stage in Manipur. Probably this could be one of the main reasons that the problem of low achievement in English persisted in some schools and English language learners did not attain the proficiency of languageskills required at the end of the Elementary stage in Manipur. Therefore, there isneed to address this issue because it may not help future careers of the children. After the identification of this problem, ten schools (5 Private English medium schools and 5 Government schools) were selected for our study. Among these 5 Private schools, 2 of them were convent schools. Of the 5 Government schools, one is a model school where relatively more facility has been created by the Government. In order to carry out the investigation, questionnaires were administered to the teachers of English, who are working in these ten schools and their responses were analyzed. In addition, the Heads/Principals were also consulted by the investigator in relation to teaching/learning process, evaluation systems and their administration. We found some

A Study on Basic Aspects of Coding a Website

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Raja Mohamed S | Mrinal Anand, Raj Kumar G

Abstract

A web site is a collection of pages of information. Creating a web page is similar to writing a letter with a word processor and saving it on the computer, but the pages have to be saved as HTML format, rather than as Word documents, Excel spreadsheets, PDF files, Zip files etc., is that the way we read web sites with a program called a web browser. The designing of a website can be pushed on the server using CSS and HTML and this is called the Front-End. After finishing the Frond-End, the Back-End turns the Front-End into the action, for example, making the forms as records in the database. We use any Server-Side Languages such as PHP and JS for doing this using MySQL as Database. This paper presents the coding basics of designing a website. A basic e-commerce website is also created.

A Study on Comparison of Various Image Encryption schemes based on Chaotic Maps

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rachit Jain | J.B.Sharma

Abstract

This paper shows the study on image encryption scheme using different Chaotic Maps. The main purpose is security management in transmission and storage. There are various image encryption techniques which have been continuously studied to fulfill the demand of real-time secure image transmission through wireless networks and over the Internet. Conventional image encryption methods like data encryption standard (DES), has the weakness of low-level efficiency and high redundancy when the image is large. The chaos-based image encryption technique provides an efficient way to deal with the difficult problems of high security, pseudorandom property, topological transivity and fast image encryption. The objective of this paper is to compare Logistic map, Baker map and Arnold cat map image encryption techniques by visually, statistically and noise analysis to get an efficient approach of image encryption.

A Study on Hardness Attributes of Ban Ana and Jute Polyester Composites

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Megha.B.E | Keerthi Gowda.B.S, G.L.Easwara Prasad

Abstract

Polyester Composites have clinched utmost prominence and are implemented in various spheres of applications. The proffered research work involves evaluation of the hardness parameters of Banana and Jute Fiber reinforced Polyester Composites, assenting the precept of Shore-D Hardness Tester. Banana and Jute Fiber reinforced Polyester Composites were prepared using polyester resin and banana fibers of 10mm length, polyester resin and jute fibers of 30mm length respectively ,varying the fiber volume fraction from 5% to 25%,with an increment of 5%,to 3mm and 5mm thicknesses. The Banana fiber reinforced Polyester Composites of 5mm thickness. with fiber volume fraction of 20% exhibited higher Shore-D Hardness values. Same trend was traced by the Jute fiber reinforced Polyester Composites.

A Study on Need of Inclusive Development and Environment Sustainability in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Chintan Vora | Reshma Raskar-Phule

Abstract

With 1.2 billion people living and expected to increase by another 300 million in coming decades, India is definitely going to face lofty demands of resources to satisfy the needs of its people. Having realized that the existing non-renewable resources are not sufficient for the current as well as the future needs, it is very important for India to avail its immense treasure of renewable resources by adopting sustainability. Procuring sustainability is a hard row to hoe. This paper mainly focusses on the situation of India and the challenges it is facing in utilizing the available natural and non-renewable resources in an efficient way to reduce the stress on these resource utilization, keeping in mind the needs of the future generation. Various aspects such as water risk management, adoption of renewable energy, waste management have been discussed in this paper. Finally an attempt is made in this paper to drive the attention of the aspiring and growing companies towards sustainable development. In this context, this paper presents some examples of successful corporate of India who are triumphant in employing sustainable development industries by giving problem-based-solution and explains the methodologies adopted by them to contribute towards the 175GW of energy goal of India

A Study on Pressure Sensor Based On Photonic Crystal

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Indira Bahaddur | Dr. P C Srikanth, Dr. Preeta Sharan

Abstract

Photonic crystal technology is used in many areas of detection and measurement of parametrs like pressure, temperature, displacement etc.MOEMS based micro-sized pressure sensor can be developed to detect even sub-micron range dimension change using the photonic crystal. The applied pressure on the object will change the dimension of the waveguide carved in the photonic crystal. As a result, this change in spacing can alter the propagation feature of electromagnetic waves that pass through them that is changing the transmission spectrum. So, this change can directly be mapped to pressure on the observed object. In this paper, the pressure sensor using photonic crystal has been modeled and analyzed.

A Study on Quality of Windrow Compost Produced From Different Municipal Solid Wastes in India

International Journal of Science , Engineering and Management, Available online 31st May 2017

Gade.Venkatesham | M.Chandra Sekhar,T.Bala Narsaiah,P.Akhila Swathanthra

Abstract

Indian Municipal solid waste (MSW) consists of 50-55 % of bio degradable organic matter. This typical composition suggests composting as a suitable option, if source segregation can be adopted. Composting of MSW is proved to be a sustainable option in many countries as the other methods of disposal pose challenges like demand for land, leachate pollution, gas production, low calorific value, heterogeneity of combustible materials, air pollution, etc. Composting organic material in MSW will result in compost, which can be used as soil conditioner in agriculture. With the cost of inorganic fertilizers on the rise in the recent decades, compost can be a good substitute for farmers. The present paper reports the results of a study wherein the quality of compost produced by adopting Windrow/aerobic Composting. As a part of above study Windrow/aerobic Composting samples are collected from different Municipal corporations which are using Windrow/aerobic Composting and the quality of compost is analyzed. Fertilizing Index and Clean Index are used for assessing the quality of the compost. The indices are categorized into marketable classes (A, B, C & D) or restricted use class (RU-1, RU-2 & RU-3) based on their fertilizing parameter and Heavy metal content.

A Study on Quality of Windrow Compost Produced From Different Municipal Solid Wastes in India

International Journal of Science , Engineering and Management, Available online 31st May 2017

Gade.Venkatesham | M.Chandra Sekhar,T.Bala Narsaiah,P.Akhila Swathanthra

Abstract

Indian Municipal solid waste (MSW) consists of 50-55 % of bio degradable organic matter. This typical composition suggests composting as a suitable option, if source segregation can be adopted. Composting of MSW is proved to be a sustainable option in many countries as the other methods of disposal pose challenges like demand for land, leachate pollution, gas production, low calorific value, heterogeneity of combustible materials, air pollution, etc. Composting organic material in MSW will result in compost, which can be used as soil conditioner in agriculture. With the cost of inorganic fertilizers on the rise in the recent decades, compost can be a good substitute for farmers. The present paper reports the results of a study wherein the quality of compost produced by adopting Windrow/aerobic Composting. As a part of above study Windrow/aerobic Composting samples are collected from different Municipal corporations which are using Windrow/aerobic Composting and the quality of compost is analyzed. Fertilizing Index and Clean Index are used for assessing the quality of the compost. The indices are categorized into marketable classes (A, B, C & D) or restricted use class (RU-1, RU-2 & RU-3) based on their fertilizing parameter and Heavy metal content.

A Study on Software Development Life Cycle & its Model

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th September 2017

Navita | 

Abstract

Software development life cycle (SDLC) is a well defined and systematic approach. It practiced for the development of a reliable high quality software system. There are many SDLC models available. This paper describes five SDLC model , namely ;waterfall model ,iterative model, v shaped model ,spiral model, prototype model. Each development model has their advantages and disadvantages. The aim of this paper is to present a study on software development life cycle (SDLC) and SDLC models with their advantages and disadvantages.

A Study on Surface Properties of Chips Produced by Large-Strain Extrusion Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th June 2017

Kunal Arora | Harsh Kansal, Krishna Murari , Hitesh Mittal, Sumit Kumar

Abstract

manufacturing of bulk nano structured are in high demand in today‚Äôs industry because of recent development and application of advanced materials. Many traditional machining processes were used but none of them have been able to produce complex shapes precisely at low cost. In order to overcome this difficulty Large‚Äďstrain extrusion machining (LSEM) is introduced. It is basically a fabrication process. It is a single step manufacturing process. It is a method of severe plastic deformation (SPD) which is used particularly for machining bulk nano structured materials. It is a low cost manufacturing technique with advantage of machining and controlling dimensions simultaneously. Different shapes such as foils, sheets and bars of controlled dimensi ons are produced with controlled geometric parameters of the deformation using large strain extrusion machining. The paper reviews all the characteristics of large strain extrusion machining, its background, its developments, effect of various parameters ( rake, feed, speed) on mechanical properties of chips, its mechanics, study of chips at microstructure and nano level. Effect of strain, porosity, hardness and other properties on chips have also been studied.

A study on the application of GIS in PCP of Rural Water Supply

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st July 2017

Nikita T. Bhagat | Dr. Sumedh Y. Mhaske

Abstract

The preconstruction planning (PCP) phase of any project is an individual stage that impacts the planning and execution of a construction project. In this stage, planners and contractors using their experience plan the project considering time, cost and quality constraints. In recent time, importance is being placed on using different tools like GIS in the preconstruction planning stage. In planning a water supply distribution scheme, an information system is needed that will help the construction planners to plan the project. Geographic information system is a computer based system that is used for storing, manipulating, and analysing large amount of data. This paper focuses on the water supply distribution scheme of a village Mahuli, in Maharashtra, India. In this paper study of application of GIS on one of the aspects of water supply preconstruction planning, i.e. distribution pipeline network, details and analysis in GRAM++ is done. The purpose of the study is to know the advantages of using GIS and achieving time effectiveness.

A Study on the Impact of Mobile Phone Addiction amongst the Youth in Chandigarh

International Journal of Science , Engineering and Management, Available online 27th September 2017

Dr. Anubhuti Sharma | Agreema Sharma

Abstract

The present endeavor was aimed to study the impact of mobile phone addiction amongst the youth in Chandigarh. For this purpose, 110 college students (55 males and 55 females) with an age range of 17-22, were randomly selected from various colleges of Chandigarh. Problematic Mobile Phone Use Questionnaire (Billieux, et. Al. 2008) was administered on the sample. Descriptive statistics comprising of means and standard deviations were applied to assess the impact. Gender differences were also delved into. Results showed the dysfunctional mobile phone usage affecting males and females differently

A study on the Morphological Variation in Mandibles of Four Wasp Species

International Journal of Science , Engineering and Management, Available online 1st September 2017

Kiran Vati K | K. Bhasker Shenoy

Abstract

Adult wasp have chewing and lapping type of mouthparts. The mandibles are structurally different in different species of wasps, suggesting that the variation in mandible is due to specific activities that it does in its life time. The function of mandibles are retained primarily for biting, chewing and also for handling other material like mud or mastication of plant fibers during nesting. Variation in mandibles of four wasp species is presented in this paper. The structure of the mandibles is elongate with presence /absence of teeth in solitary wasps like Delta pyriforme pyriforme (Fabricius, 1775) and Sceliphron caementarium (Drury 1773). These wasps use the mandibles to excavate wet mud from the ground and carrying it. Mandibles are also used for capturing prey like caterpillars or spiders which are carried to its nesting sites. In case of social wasps like Vespa tropica (Linnaeus, 1758) and Ropalidia marginata (Lepeletier, 1836) the mandible is short with large teeth’s. These wasps use mandibles to masticate the wood or plant fibers to convert it into a soft pulp which is utilized in the construction of papery nests. Mandibles are also used in mastication of prey, which is given as feed for the developing wasp larva

A study on the pH Value of Fly Ash Concretes

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Dr.Mudimby Andal | Dr. T.D.Gunneswara Rao

Abstract

Use of fly ash in concrete as replacement to cement is an established practice accepted all over the world. The reason is mainly due to the fact that replacement or addition of fly ash reduces the cement consumption and make the concrete economical. Flyash concretes are more durable than conventional concretes. However, the addition of fly ash in concrete decreases the pH of concrete and reduction in pH value disturbs the passivation layer formed around the rebars. The passivation layer is formed around the rebars in concrete due to the higher alkalinity of concrete. Thus the addition/replacement of cement by fly ash affect the pH and thereby the alkalinity. This article describes the effect of replacement of cement by fly ash on the pH value of the end product i.e., fly ash concrete. Fly ash concrete and mortar specimens are cast and tested for pH. It is found that replacement of cement by fly ash reduces the pH of the matrix. With the increase in the age of fly ash concrete reduction in pH value is found to be more. This indicates that the reaction of fly ash with Calcium Hydroxide present in concrete with time reduces the pH value. It is concluded that the treated flyash would be more effective and beneficial than replacement of cement with untreated fly ash..

A Study on Trends, Reviews and Effects of Online Shopping in India

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

Tushti .P. Bakrania | 

Abstract

In the recent scenario of E - business online shopping has developed a huge importance. The development and growth of online shopping has given n number of opportunities to the organization to provide competitive advantages. There are n number of companies which are selling their products through on line portals or provides service online. Compared to other countries online shopping in India is not very common but it is growing at an immense speed then other countries. This paper gives brief idea of online shopping in India its positive and negative effects. It also provides scope of upgrading in online shopping websites. A finding says that online shopping is the best convenient way for consumers. But people also worry with the risk associated with it like privacy and security risk. Many organizations uses Internet to provide information and communicate with people which helps them to get idea what consumers exactly want, what are there demands and organization can also get feedback through them. But, there are various uncertainties attached with online shopping such as misuse of personal data, return or exchange policies, testing of product etc.

A Study on Various Satellite Image Resolution Enhancement Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Aditi Sharma | Ajay Khunteta

Abstract

Due to the low frequency nature and as the result of interpolation on satellite images, they may appear as blurred image. To enhance the frequency of those images, Resolution techniques are used. This is used in a several number of applications such as laser and inkjet printing, medical imaging, remote sensing, with some vital objections such as distortions, blurring aliasing, ringing artifacts etc. Enhancing the resolution of an image includes increasing the number of pixels presents to show the details of an image as well as sharpness of the image. This paper studied about the basics of interpolation with some conventional satellite image enhancement techniques and analyses the performance of various image resolution enhancement techniques for satellite images. These techniques are compared on the basis of Root mean square error (RMSE), Mean square error (MSE) and Peak signal to noise ratio (PSNR) factors.

A Study Onmacro Economic Determinants Of NonPerforming Loans In Indian Public Sector Banks

International Journal of Science , Engineering and Management, Available online 29th June 2017

Ms. Adithi Ramesh | Prof. Dr.C.B.Senthil Kumar

Abstract

The macroeconomic variables will have a serious impact in the success of credit market.Non-performing loan is an important factor that is being considered to monitor the performance of the banks and financial institutions in the credit market. This paper focuses on study of the relationship and significance between Non-performing loans of public sector banks in India and macroeconomic factors such as Gross Domestic Product (GDP) growth, Inflation, Credit growth and unemployment.

A Study Project on Online Monitoring and Controlling of Substation Using SCADA

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Krupa M | Shruthi B

Abstract

Development of nation depends upon electric energy and at present scenario there is large gap between electric generation and load [1]. This gap can be filled with proper control, monitoring and coordinating the distribution components at power sector [2]. In this view, Automation of power transmission system has increasingly been adopted by power utilities worldwide in recent years. As part of its efforts to provide a more reliable supply to the customer and to enhance operational efficiency, the automation of the power system can be achieved by SCADA [3].

A Study User Behavior Using Phishing Education and Training

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

Ms. Vidya Mhaske-Dhamdhere | Dr. Prasanna Joeg, Dr. Sandeep Vanjale

Abstract

In this paper, we present results of surveys of users on their ability to recognize phishing emails as opposed to legitimate emails. User awareness is one of the most important approaches to phishing detection. We first conducted a survey of user confidence in their ability to detect phishing. We then designed a survey questionnaire that contained some legitimate emails and some phishing emails. We conducted a second survey to test the ability of a sample set of users to detect phishing. The results were mixed. After the second survey, we conducted a training session on the same group of users to train them to detect phishing. After the training we conducted a third survey with a somewhat different questionnaire to test their ability to detect phishing. Our results suggest that training considerably improves the ability to detect phishing. However, a significant minority are still not able to detect phishing.

A Survery on a Hadoop Framework for Big Data Applications

International Journal of Engineering Research in Computer Science and Engineering, Available online 10th November 2017

Swathi | Dr. P.Niranjan

Abstract

The big data is the idea of gigantic scope of information, which is being made step by step. In current years dealing with these information is the significant test. Hadoop is an open source proposition which is utilized successfully to deal with the big data applications. The two center ideas of the hadoop are Mapreduce and Hadoop conveyed document framework . HDFS is the capacity system and guide lessen is the programming dialect. Results are created quicker than other customary database operations. A few dialects which encourages us to program the mapreduce system inside brief time frame

A Survey of Recent Approaches for Detection of Alzheimerís Disease

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Arpita Raut | Vipul Dalal

Abstract

Alzheimerís is a progressive and irreversible neurological disease. It is the most common cause of dementia in people of the age group 65 years and above. Detection of Alzheimerís disease in the early stage is very crucial as it can prevent serious damage to the patientís brain. Many different methods have been proposed to detect Alzheimerís disease. In this paper, we have surveyed different techniques and approaches for detection of Alzheimerís disease.

A Survey of Routing Protocols in Mobile Ad Hoc Networks

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Sahana T S | Sandhya A S, Pooja B N,Priya J, Mrs. Sheela Devi.M

Abstract

Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA. This research paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective is to make observations about how the performance of these protocols can be improved.

A Survey on Artificial Intelligence In Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

S.Thyanesh Pandi | K.Niranjana, R.Vignesh, R.Abishek, J.Suriya Prabha

Abstract

IOT is the internetworking of ďthingsĒ that collects and exchanges information from the environment. AI, on the other hand, is the engine or the ďbrainĒ that will enable analytics and decision making from the data collected by IoT. In other words, IoT collects the data and AI processes this data in order to make sense of it. The AI and IOT systems are working together in devices like fitness trackers and Google Home. AI can be used to make inferences about this data and summarize it before transmitting it to other devices. This would reduce the flood of data to a manageable level. This would enable the attachment of a larger number of devices to the network. This paper describes the advantages, applications, analysis and result of using Artificial Intelligence in Internet of Things.

A Survey on Correlation Filter and its Applications

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Neenu Jose | Nandakumar P

Abstract

Correlation filters will find applications in pattern recognition such as biometric recognition, object alignment, action recognition, object detection and tracking. The advanced correlation filters were introduced to offer distortion-tolerant object recognition. The recent major advance in correlation filter design is zero-aliasing correlation filters (ZACFs) that eliminate the aliasing in correlation filter design due to the circular correlation caused by the use of discrete Fourier transforms (DFTs).

A Survey on Efficient Load balancing and mobile data collection for dual data uploading using Clustering for network prolong in WSN

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Tejashree S | Dr. P I Basarkod

Abstract

the wireless sensor network (WSN) can be connected for various application for example, industrial, military application health monitoring, habitat monitoring and so on. The WSN can be utilized for sensor hubs to gather the information at the regular intervals and Energy capacity is a vital perspective in wireless sensor networks. To defeat this issue the proficient method of clustering is utilized to accomplish more data transmission, long system lifetime, less tedious procedure, minimize energy utilization. In this paper, we examine at the load balancing and dual data uploading using clustering technique in wireless sensor networks. To avoid the overloading of any single source and to optimize the utilization of boosting the throughput, minimize the response time in the load balancing method.

A Survey on Electroencephalography (EEG)-Based Brain Computer Interface

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

K.Aparna | R.Chandana Priya

Abstract

In this paper the main objective is to develop a system which allows disabled people to communicate with other persons and helps to interact with external environment and also to establish a communication system which will translate the human intentions reflected by brain signals into analog speech signals those are audible via speakers. Brain‚Äďcomputer interface i.e., (BCI) is a new emerging area is mainly for the patients in the treatment bed. TheBrain Computer Interface will receive brain signals, analyze them, and then translate them into commands those are transfer to output devices which will carry out desired actions. Electroencephalography records the brain‚Äôs electrical activity, obtained by firing of neurons within the brain. If, we find out the difference in those low signal frequencies, those will yields to design a BCI. Based on variation in those frequencies, human thoughts can be recognized as a prototype mechanism.

A Survey on Emergency Navigation using Wireless sensor Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 12th October 2017

P.Prittopaul | R.Vijayalakshmi

Abstract

Wireless sensor networks (WSNs) provide emergency navigation services, given their easy deployment and the ability of intelligent sensing and communication. They help people in escaping from a hazardous region safely and quickly when an emergency occurs. However guiding more and more people to the same exit, causes congestion which does not help in timely evacuation. Many a times, trapped people move back and forth during navigation, known as oscillation. Frequent oscillations lead to the people remaining in danger for a longer period of time, and decreases their chances of survival. The evacuation systems must provide shortest and safest navigation path with reduced congestion. In this paper, we give a survey of various emergency navigation schemes. The existing systems are evaluated in terms of parameters such as scalability, congestion avoidance, evacuation time, survival rate, communication cost, reaction to emergency dynamics and navigation efficiency with guaranteed safety.

A Survey on interactive multi-label segmentation using cellular automata

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Monika | 

Abstract

Image segmentation is the process of partitioning a digital image into multiple segments. The goal of segmentation is to change the representation of an image into more meaningful and easier to analyze format. There are various interactive approaches to segment the area of interest from the given image. In this paper a survey on various image segmentation techniques has been performed and the methods are classified and compared as per the techniques used. The results of the segmentations are also compared both quantitatively and qualitatively. This survey provide a base for the future research in field of image segmentation.

A Survey On IOT Based Smart Home

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Prof. Kavita S. Patil | Apurva R. Kokate , Shruti R. Wagh

Abstract

The main goal of this paper is to describe the systems which automatically control the devices through mobile. The various implemented systems are use in the house to control appliances like fan, light, and water pump by just turn ON or OFF the switch from mobile phone .

A Survey on Key Frame Based Video Summarization Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th November 2017

Himani Parekh | 

Abstract

The large amount of videos usage increase the volume of data, more time to access and more man power is required. Video summarization is the solution for this problem. Summarized video can be used to review the important aspect of particular video, indexing and faster browsing. Video summarization techniques are classified into key frame based classification and skim based classification. This paper focuses on process and techniques of key frame based classification.

A Survey on MapReduce for Dynamic Job Ordering and Slot Configaration

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th November 2017

J .Sravanthi | Dr. P.Niranjan

Abstract

MapReduce is a well known parallel registering worldview for vast scale information preparing in groups and information centers. A MapReduce workload for the most part contains an arrangement of jobs, each of which comprises of various guide tasks took after by two diminish assignments that guide undertakings can just keep running in delineate and lessen tasks can just keep running in decrease spaces, and the general execution limitations that guide undertakings are executed before lessen tasks, diverse employment execution requests and guide/lessen opening setups for a MapReduce workload have essentially extraordinary execution and framework use. This study proposes two classes of calculations to limit the influence traverse and the aggregate finishing to time for a disconnected MapReduce workload. Our top of the line of calculations concentrates at work requesting streamlining for a MapReduce workload under a given direct/lessen space arrangement. Interestingly, our inferior of calculations considers the situation that we can perform advancement for outline for a MapReduce workload.

A Survey on Non-Parametric Classification Methods

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Hema Sree Kotari | Ravikumar Penugonda

Abstract

In this modern era, along with the rapid development of computer hardware ‚Äď increase processing speed and the size of the memory available ‚Äď there has been a rapid development of data analysis methods that previously were not possible for practical use due to the required computing power. This paper will provide a survey of non-parametric techniques. It does not focus greatly on the technical aspects of each method beyond the headline advantages and disadvantages.

A Survey on Reversible Image Data Hiding with Contrast Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

SK Taj Mahaboob | Shaik Baba Fakruddin

Abstract

The main aim of this paper is to explain different watermarking techniques. In this paper we will give an overview on different types of techniquesused for preparation ofreversible data hiding and explain the significant growth in reversible watermarking and increase of embedding payload in the host image withoutdistortion in many fields. The paper focus on comparative analysis of different watermarking techniques and explaining their significance briefly

A Survey On Secure Connectivity Techniques For Internet Of Things Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Mr. Vikram Neerugatti | Dr. A. Rama Mohan Reddy

Abstract

Internet of things involves network of Nodes (sensors, Actuators, fog, cloud etc). Sensor node is a small in size, computing power and storage capacity is less. Due to this nature of Sensor the security module is not incorporated in it. So IoT Nodes has more scope for the Intruders, to attack the systems by using this weak connection of Nodes. Lot of research work has to do in this area, to establish a secure connectivity among various IoT nodes. While accomplishing the secure connectivity of things in IoT, need to consider all the security parameters like (confidentiality, authentication, integrity, etc.). The existing techniques/ Algorithms for secure connectivity of devices are not developed for nodes that which used in an IoT technology and not deal with all security parameters. This paper addressed the various existing secure connectivity techniques with advantages and disadvantages, that which is used to direct Research towards development of secure connectivity Techniques for IoT nodes.

A Survey on Security Features Based on Some Interactions and TheirRespective Co-Operation in Handheld Devices for Communication

International Journal of Engineering Research in Computer Science and Engineering, Available online 5th August 2017

Arogia Victor Paul M | Numan Shaikh, Sharon M, Anil Sagar T, S. Venkatesan

Abstract

Since from the last decade mobile communication and its usage have grown drastically, also it has become a serious business tool nowadays. Mobile devices are the major platform for the users to transfer and exchange a very huge and critical data for communication. Also most of the communications are based on handheld devices like smart phones, palmtops, tablets etc. These devices are variably used for applications like banking sector, personal digital assistance, remote login, m-commerce, e-commerce, internet access, entertainment and also medical usage. However due to usage of handheld devices rapidly, there might be a security issues which might restrict the usage of mobile devices. This article survey gives some basic glimpses about the security features such as authentication, authorization, privacy, confidentiality, and data securityin handheld devices and it briefs an idea on how to overcome various issues like threats and vulnerabilities that effect the human interactions and their cooperation using handheld devices, and also it provides various solutions to the mobile devices ensuring security.

A Survey on Security Issues in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th June 2017

D.Divya | T.Lakshmi

Abstract

Cloud computing is a rising innovation worldview that moves ebb and flow mechanical and figuring ideas into utilitylike arrangements like power and water frameworks. Mists draw out an extensive variety of advantages including configurable registering assets, financial reserve funds, and administration adaptability. In any case, security and protection concerns are appeared to be the essential impediments to a wide selection of mists. The new ideas that mists present, for example, multi-tenure, asset sharing and outsourcing, make new difficulties to the security group. Tending to these difficulties requires, notwithstanding the capacity to develop and tune the safety efforts produced for customary processing frameworks, proposing new security strategies, models, and conventions to address the interesting cloud security challenges. In this work, we give a far reaching investigation of distributed computing security and protection concerns. We recognize cloud vulnerabilities, arrange known security dangers and assaults, and present the best in class practices to control the vulnerabilities, kill the dangers, and adjust the assaults. Moreover, we examine and distinguish the constraints of the present arrangements and give bits of knowledge without bounds security points of view. At long last, we give a cloud security system in which we exhibit the different lines of barrier and recognize the reliance levels among them. We recognize 28 cloud security dangers which we arrange into five classifications. We additionally introduce nine general cloud assaults alongside different assault episodes, and give viability examination of the proposed countermeasures

A Survey on Segment Based Evaluation of Co- factor Used in Human Gait Recognition

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th October 2017

Dr. P.S.Smitha | Sruthi Nath C

Abstract

Gait recognition is an effective biometric feature to identify persons from a distance by the way people walk or run. While gait has several attractive properties as a biometric, the greatest disadvantage in gait recognition is to identify an individual with cofactors and in different emotional and environmental conditions. Different views and angles of the camera also constitutes in degradation of the gait identification. Thus different measures and methods have been proposed for enhancing the gait identification in these cases. This paper is study of gait recognition during these conditions and discussing ways for lowering the degradations. This paper presents a literature review of cofactor affected gait recognition and propose a method to identify cofactor affected probes in certain view angles. Recent researches in gait identification techniques are presented in this paper.

A Survey on Sequence Creation in Cognitive Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Bhargavi G | Vidyasagar K N , Bharathi SH

Abstract

Intelligent (Cognitive) radio networks have a large communication spectrum. This is dynamic in nature. This leads to the necessity for main central channel where two nodes can talk to each other and conclude on the parameters for information exchange between each other, for this they need to meet on a pre-decided channel to communicate, this channel where the decisions are made should be decided by making use of the full available spectrum. In order to reduce collisions and also to make use of the entire available spectrum, a protocol must be devised. ETCH (An efficient channel hopping based MAC layer protocol) is proposed for communication establishment between cognitive radio networks. Two other protocols, Synchronous-ETCH and asynchronousETCH, assuming the presence of global clock synchronization and one without the assumption of existence of a global clock respectively.

A Survey on Traffic Aware Routing For Less Delay and More Integrity of Data Services in WSN

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Deepashree K N | Dr. Bharathi S. H

Abstract

Applications performing on the same Wireless Sensor Network (WSN) foundation more often than not has distinctive Quality of Service (QoS) necessities. Two fundamental interest are low linger and high information accuracy. Be that as it may, by and large, these two requests cannot be satisfied at the same moment. In this paper, taking into account the idea of potential in material science, we propose IDDR, a multi-way dynamic directing calculation, to tackle this issue. By developing a virtual half and half potential field, IDDR isolates bundles of utilizations with unique QoS requests as indicated by the weight relegated to every parcel, and courses them towards the sink through partitioned ways to improve the information loyalty for trustworthiness touchy applications and additionally diminish the end-to-end delay for postponement delicate ones. Recreation results exhibit that IDDR gives information respectability and postponement separated administrations.

A Survey on Travel Based Application using Social Media

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Shanker Shalini | Dr.M.Sheerin Banu

Abstract

Big data provides analysis of large amount of dataset and accurate result can be obtained using this dataset analysis. When considering travel application many user opt for static travel planning without any now feature that incorporates in the application. Blindly they agree any travel plan thatís been listed in the application. In this paper various analysis is done and survey is been done to make user friendly travel application so that user can specify their Point Of Interest (POI) and as such planning is done dynamically based on users location with the help of geo-tagging and collaborative filtering. We find here what are all recommendation system that can suitable to incur in the travel application with the help of geo-tagging and location based filtering. Thus to find user friendly travel based application this survey is done.

A Survey on Various Image Compression Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Mohammed Salim M.K. | Nandakumar P

Abstract

Image compression technique is widely used in multimedia applications such as image, video, audio data and medical field. Image compression aims to reduce the redundancy of an image data and reduce the storage space of an image. Different image compression techniques were proposed to achieve high compression ratios and high image qualities in low computation time. This document presents the review of various lossless and lossy compression techniques.

A survey on various types of Sentiment Analysis Approaches from Big data

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd October 2017

Navaneethakrishnan P | Ravikumar B

Abstract

In recent years, Big Data Analytics has become an essential topic for researchers.It gains more popularity due to immense data set that becomes overwhelming to users. Therefore itis essential to extract opinions from the internet and predict online customer’s preferences, which could prove valuable for economic or marketing research.This inspire the researcher to develop a system that can identify and classify opinion the huge amount of text data based on the approach of Sentiment Analysis or Opinion Mining. The paper presents a survey covering the techniques and methods in sentiment analysis and challenges appear in the field. Sentiment analysis is done in data from applications like social network. There is a need for analyzing the sentiments of data and thereby defining the behaviour of the user. This involves feature extraction and thereby developing relationship trees within the scope of data.

A Survey on Water Quality Analysis for Industrial Application under IOT Environment

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

P.Kalamani, | Divya R Krishnan, Meghana B.V, Mary Theresa M, Himadri Sengupta

Abstract

Internet of Things (IoT) is global network of ‚Äúsmart device‚ÄĚ that can sense and interrelate with their environment using the internet for their communication and interaction with users and other systems. The traditional method of testing Turbidity, PH & Temperature is to collect samples manually and then send them to laboratory for analysis. However, it has been unable to meet the demands of water quality monitoring today. By manually monitoring the water quality is very time consuming as well as its complicated to get water parameter in real time. To overcome this a set of Monitoring of Turbidity, PH & Temperature of Water quality are going to be placed in the reservoir as the variations in these parameter will get to know the presence of pollutants. In this paper a new approach has been adopted to analyze the quality of the water under IoT environment. The proposed system contains data acquisitions node, controlling unit as ARM, base station and monitoring unit, where all these units are connected to each other .Data can be collected from various sensor and each sensors has its own way to read the data about physical phenomenon ,so necessity to write diverse code for each sensor for data collection procedures. Meanwhile to control and to do some pre-processing work MCU unit has been adopted, after data collection from various sensor such as its Temperature, Turbidity, PH, etc at base station is sent to display on monitoring node and also compared with standard values .By continually monitoring water quality people get awareness locality water condition so we can minimize its critical effect on human life ,filed, animals etc with high frequency.

A survey on Wireless Sensor Network Attacks And Defenses

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Pramod Nath | Pragya Rajput

Abstract

Wireless Sensor Networks (WSN) are combination of several thousand sensor nodes that have several capabilities such as to detect, to sense, to monitor, to process and to compute. WSN have many applications in real time scenarios such as in military, industries, health care and so on. WSN has infrastructure less structure, so the ability to cope with the node failure, fault tolerance and its security attack are the main concern. The sensor nodes are more vulnerable to security threats and attacks because of the harsh and hostile environment. Efficient implementation of different security protocols has huge impact to adverse the potential threat. The main aim of this paper is to present security issues and challenges faced by WSN. This paper explains attacks in WSN, its flaws and their countermeasures that can be used to handle the pitfall.

A Survey Paper on Diabetes Retinopathy

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th September 2017

Dr.Ruksar Fatima | Laxmi Math

Abstract

The retina is the only part of the human body where the blood circulation can be observed directly. Several systemic diseases can affect the retinal blood vessels, which makes the retinal image analysis a potential diagnostic tool, as it allows assessing vascular changes in an easy and non-invasive way. Retinal image analysis is one of the active research areas with the goal of providing computer-aided methods to help the quantification, measurement and visualization of retinal landmarks and biomarkers. In diabetic retinopathy (DR), the blood vessels often show abnormalities at early stages [1], as well as vessel diameter alterations [2]. Changes in retinal blood vessels, such as significant dilatation and elongation of main arteries, veins, and their branches [2, 3], are also frequently associated with hypertension and other cardiovascular pathologies.

A Survey: Detection Techniques on Selfish & Multi-Selfish Attacks in Cognitive Radio Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Vanitha K.C | Dr. Bharathi S.H , Vidyasagar K.N

Abstract

Cognitive radio network is a rare communication technology which suggests the Unlicensed persons to use more amount of bandwidth existing in the spectrum which is not used by licensed persons. CRN identifies large number of available communication channels in spectrum very efficiently. The free spectrum of CRN is used by the users who are Unlicensed without harming the licensed users (PU) which are involved in communication. The main goal of CRN is to solve the problem of Spectrum Scarcity by making the unlicensed user to use the spectrum when it is free that means when the licensed user (PU) will not use the spectrum that time the unlicensed user can use it dynamically. Advantage of CR is to provide efficient data transmission without the breakup in the comminucation.CRN faces problems on selfish attacks which are carried out by the SU which sends fake information to the person near to SU as that to occupy all free channels available in spectrum. Selfish SU Nodes and Multi-selfish SU Nodes are degrading the performance by sending fake message to closer nodes of CRN. Here we suggested how to identify Selfish and Multi-selfish SU nodes by the two different algorithms based on survey.

A Switched Capacitor based Multilevel Inverter using Stepped Waveform Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

P.Anilkumar Reddy | G.Ratnaiah

Abstract

It is pretty preferable to adapt high frequency (HF) transmission rather than low frequency AC power distribution systems (PDS).Because HF inverter acts as source side in HFAC PDS. A new switched capacitor (SC) based multilevel inverter (MLI) is proposed in this paper which is designed by SC at frontend and H-Bridge backend. SC is connected in series and in parallel to increase the number of voltage levels. With increase in number of voltage levels total harmonic distortion (THD) can be reduced. A stepped waveform method is proposed in this paper to determine the switching angles. The circuit topology, stepped waveform technique, operation, Fourier analysis, parameter determination and topology enhancement are examined. An experimental prototype with output frequency of 25 kHz is implemented to compare the results.

A Theoretical Study of Magnetic Impurity Effect on Superconducting Properties of Manganese doped MgB2

International Journal of Science , Engineering and Management, Available online 29th June 2017

Gargee Sharma | Smita Sharma

Abstract

In the present study we investigated the theoretical calculation of Superconducting state parameter (SSP) by doping of MN on MgB2 superconductor for concentration (x=0.006, 0.007, 0.014, 0.016, 0.020). We use Ashcroft's pseudo potential in conjunction Random phase approximation (RPA) dielectric screening function with methodology based on BCS- Elias berg Mc. Millan framework in which material properties like electron-phonon coupling strength (?) and Coulomb pseudo potential (Ķ*) are obtained from the knowledge of electron-ion pseudo potential. The super-conducting state properties like transition temperature (TC), isotope effect exponent (?) and interaction strength (N0V) are then obtained by using the values of ?, Ķ* and relevant to the superconductor .It is also observed that addition of Manganese to superconductor MgB2 causes the parameters ?, Ķ*, ?, N0V, TC decreases with increasing in Manganese concentration. Present calculation also observed that TC for alloys Mg1-xMnxB2 is excellent agreement with the experimental results. It is observed that the increase in doping concentration of MN causes all the superconducting parameters to decrease. This suggests decrease in superconducting behavior of MgB2 due to effect of magnetic impurity MN.

A Thermo Electric Heating Based Solar Powered Egg Incubator For Remote Areas

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

VinuSankar | Rani Chacko , Anish Benny

Abstract

Incubators are devices which provides virtual atmosphere for egg hatching. Many conventional egg hatching mechanisms are existed in the early days and in nowadays electrical incubator become a replacement for conventional egg incubators. Due to high initial and operating cost it is not accessible for small scale poultry farmers. In this thesis a new thermo electric heating based solar powered egg incubator with closed loop temperature and humidity control, egg turning mechanism, effective ventilation is introduced. The cooling feature of thermo electric module can be utilized for refrigeration applications.

A Travelogue of VAR System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Dhanya G S | Yamini P , Nithya N , Radha R Anusha Suresh

Abstract

This paper describes the design, development and testing of an AR system that was developed for aerospace and ground vehicles to meet stringent accuracy and robustness requirements. The system uses an optical see-through HMD, and thus requires extremely low latency, high tracking accuracy and precision alignment and calibration of all subsystems in order to avoid misregistration and ďswimĒ. The paper focuses on the optical/inertial hybrid tracking system and describes novel solutions to the challenges with the optics, algorithms, synchronization, and alignment with the vehicle and HMD systems. Tracker accuracy is presented with simulation results to predict the registration accuracy. A car test is used to create a through-the-eyepiece video demonstrating well-registered augmentations of the road and nearby structures while driving. Finally, a detailed covariance analysis of AR registration error is derived.

A Unified Fuzzy Control Strategy used in Distributed Generation For the 3- ‚Ī∑ Inverter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 10th October 2017

M.sivaganga | P. Raja sekhar

Abstract

This paper is representation a unified controller stratagem intended for DG during equally grid tied and island modes. The current references generation part module is analyzed a unified controller stratagem in both modes. The proposed controller strategies compose of a novel, voltage loop with an inner inductor, current loop within the synchronous reference frames. The module elements preserve analyze through two aspects. Primary, through introducing P compensator with Q-axis furthermore PI compensator with D-axis correspondingly, an internal inductor current loop controller is activating in the grid tied mode and preserve be mechanically inactivated upon occurrences of island. Thus, for the detection of uncertain islanding or two different controllers modes there is no want for two switches and change from the grid tied mode toward the island mode, the load voltage worth is able to enhance. The module next part is to nearby the load current, feed forward in direction of compact with the problem caused through the non-linear local load, in these, not only the waveform of the grid current inside grid tied is enhanced, but also the worth of the loaded voltage inside the island mode is enhanced. In conclusion the effectiveness of the propose controller stratagem and fuzzy control are validated through the simulation results.

A Unified Metric for Opportunistic Routing in Wireless Mesh Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Harikishore S | Dr.V.Sumalatha, P.Jayarami Reddy

Abstract

In wireless mesh networks, the routing of packets from source to destination is crucial and challenging task. The wireless mesh networks find applications in disaster management, video on demand, intelligent, health care systems, etc. Various routing protocols exist in literature to improve the efficiency of the wireless mesh networks calculated in terms of reliability, cost, throughput, error rate, etc. The opportunistic routing proves to be more efficient protocol best suited for wireless mesh networks as it avoids duplicate transmission and improves performance of the network. The routing metrics are essential to evaluate the best possible path for packet delivery. This paper conveys the essence of the existing metrics used for analyzing the routing protocol considered for evaluation. Further we introduce a new opportunistic routing metric called Unified Expected Distance Progress with Successful Transmission Rate (UEDPSTR) which is compared with the characteristics of the network.

A Vehicle for Physically Challenged

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Karthikeyan.K | Shrenik.V , Manikandan.G Pillai , Madhushankar Subramonia , Ramachandran.S

Abstract

The aim of this project is to make a vehicle especially for people who have lost their hands due to some accidents in some point of time in their lives but this vehicle can be upgraded for people who have lost their legs as well with some modifications in the initial design. The specialty about this vehicle is that the steering, acceleration as well as the braking system is designed to be operated using the legs of the driver. This project has been an attempt to change the lives of the above mentioned section of the society. Changes have been done in the steering of a vehicle. A customized fork bolt has been designed for front wheel. The fork bolt is of larger length than usual and over this accelerator and brake pedals are placed on each side of the extended fork bolt. The pedals are attached to a foot rest for the comfort of the driver. The comfort of the driver has been taken care of by providing a comfortable seat and other safety precautions which shall protect the driver from any accident, etc. Through this vehicle a purpose is given to the physically challenged as using this vehicle, they would be able to help in transportation and give their contribution for the development of the society in the larger scale.

A Vicinity Overhaul Protocol for Estimating the Dropped Packets in Wireless Sensor Platforms

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rajesha N | H L Viswanath

Abstract

Environment checking is utilized to distinguish crustal developments, approaching tidal waves, contamination (global warming), an Earth-wide temperature boost, and numerous different truths that are committed to influence human lives. Sensor networks for environment observing can comprise of segment and/or floor sensors, conceivably associated with berthed floats giving integration back to the region. When all is said in done, these sensors are extravagant. Sensor network architecture is a going fordependent point of comparision. Models/Algorithms that were proposed for remote sensor systems are appropriate for this inventive atmosphere, along with can't be connected it with no varies otherwise still a totally innovative invent. The main principle implementations of sensor networks are region upgrade as well as checking the encompassing environment.

Aadhaar and Server based Electoral system

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Yugansh Garg | Sakshi Mishra

Abstract

This paper describes an advance Aadhaar and server based electoral system for Indian elections. The voting systems in an easier way that all voter can cast votes via biometric Aadhaar based authentication .It provides a higher security pre-casting which could reduce the chances of temperance as a simultaneous backup is created at State/Central level servers. In this system we renounce the use of traditional voter ID cards and election voter verification list. This method would help us to eliminate invalid votes, ends booth capturing and makes counting easier, faster and accurate

Abandoned Object Detection Based on Statistics for Labeled Regions

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Miss.Snehal B. Dahivelkar | Prof. S. B. Borse

Abstract

Many public or open areas are facilitated with cameras at multiple angles to monitor the security of that area for keeping citizens safe. This is known as the surveillance system. Terrorism & global security are one of the major issues worlds facing now days. Abandoned object detection is an essential requirement in many video surveillance contexts. terrorist attacks involving some suspicious bags, box, or any other thing which are left unattended at railway stations, shopping malls, airports or any other public venue, with the rising concern about the security in public places abandoned object detection become very useful system to detect and recognize the suspicious activities that might dangerous to public safety. The most challenging task in video surveillance system is to detect such kind of suspicious bags. So, for that purpose it is necessary to have an efficient threat detection system which can detect & recognize strongly dangerous situations. Many methods were employed for detection of unattended objects but in this paper our focus is on the detection of abandoned objects in video surveillance system. The goal of this project is to design and implement a system which will be able to detect abandoned luggage using the captured videos from the camera as the input of the system. The system realizes image segmentation and image tracking, creates blobs of Objects, labels the blobs based on the shape and size of binary blobs and accordingly the status of baggage is defined in order to take appropriate action. The complexity of the problem arises from obstructions present in scene, lightening conditions & shadows. Our system is able to successfully overcome these difficulties to obtain impressive results.

Accelerating Batched Perfectly Stirred Reactor (PSR) Calculations Using General Purpose Graphics Processing Unit (GPGPU) Computing

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 16th June 2017

Sudip Adhikari | Alan Sayre , Abhilash J. Chandy

Abstract

Detailed analysis of efficiency and pollutant emission characteristics of practical turbulent combus- tion devices using complex combustion kinetics often depend on the interactions between the chemistry of both gaseous species and soot, and turbulent flow char- acteristics. Modeling of such combustion system often requires the use of chemical kinetic mechanisms with hundreds of species and thousands of reactions. Per- fectly stirred reactors (PSR) are idealized reactor en- vironments, where the reacting species have high rate of stirring, and the combustion products are uniformly distributed inside the reactor. The fundamental equa- tions describing a PSR constitute systems of highly nonlinear algebraic equations, due to the complex rela- tionship between the net production rate of the species and the species concentration, which ultimately makes the equations stiff, and the solution of such equations become highly compute-intensive leading to the need for a efficient and robust solution algorithms. Graph- ics processing units (GPUs) have widely been used in the past as an effective alternative to central process- ing units (CPUs), and highly parallel threads of GPUs can be used in a efficient manner to improve the al- gorithm performance for speeding up the calculations. A highly parallelized GPU implementation is presented for a batched calculation of PSR model.

Acceleration Control with Latitude and Longitude & Toll pay Transactions on Mass and RFID Method

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

G.Pavan Kumar | N.Dilip Kumar

Abstract

Now- a- days the usage of vehicles are increasing day by day in human life. Every home is having at least one or two vehicles, as the traffic has been increasing in the present world, due to increase in number of vehicles there is a probability of more number of accidents. We are having a more number of technologies to reduce the number of accidents. The method involves in this paper have more intelligent and interactive methods for avoiding the accidents. The proposed system is not involved in framing the protocol to avoid accidents, but, involved to implement a system to control the speed of the vehicles. This method provides an alternating system using a GPS technology (using latitude and longitude) that controls vehicle speed. Most of the tolls collect the pay using the type of vehicle, due to this an empty passenger vehicle has to pay the same amount as a full occupancy vehicle. To avoid this type of variation in payees a different method used, so as to get benefited by the owner of the vehicle, hence the proposed system deals with toll pay based on the mass using Load cell technology and RFID.

Accident Avoiding System for Heavy Cutting Machine

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

SachinAnant | BiradarVinayak T., Basavaraj N. , Pramath N P , Sharat VD

Abstract

The aim of our project is to take a system wide approach to preventing the machine accident.The system includes not just the machine and the operator; but rather it includes everything from the initial design of the machine to the training of every one that is responsible for any aspect of it, to the documentation of all changes to regular safety audits and finally a corporate culture of safety first. Design is the part of a machine life where the greatest impact can be made in relation to avoiding accidents. The designer should ensure that the machine is safe to set up and operate, safe to install, safe to maintain, safe to repair and safe to decommission. Although safe operation is usually at the forefront of a designer mind safe maintenance and repair should also be a high priority. Around 50% of fatal accidents involving industrial equipment are associated with maintenance activities and design contributory factor in some 32% of these fatalities.

Acoustoelectric Effect In Solid State Materials and Devices

International Journal of Science , Engineering and Management, Available online 29th June 2017

Awadhesh Prasad | 

Abstract

Acoustoelectric effect is the appearance of a dc electric current, when an acoustic wave passes through a conducting medium. This paper reviews the study of Ultrasonic stress on the semiconductor materials and devices used in various scientific and other measurements. A historical review of earlier findings is also reported with special reference to associated mechanisms. Ultrasonic stress studies in solid state devices require further attention and the work done in this area is also discussed. Different kinds of the mechanism, interpretation responsible for the change in the characteristics of the solid state devices and materials have been discussed. Ultrasonic stress produces a pressure effect on a target object placed in the ultrasonic field. Ultrasonic wave may be regarded as a coherent beam of phonons, absorbed in front of the material. In terms of the charge carriers, an electron hole pair is created due to the Ultrasonic field.

ACT System In Railways using Actuator

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 6th July 2017

Shanthosh Dhanajaya | SanthoshKumar B R,Vinod K,PrasannaKumar E, Prof. K V Malini, Prof. Vennila D A

Abstract

The main purpose of this paper is to detect the obstacle on the curved railway track and to take preventive step to save the lives. The major problem in the obstacle detection is at the curved portion of the track. So this paper provides the detection process in every case accurately. Our focus is on systems where the sensors are fixed on the railway sleepers of curved portion, were it can detect the obstacle i.e., living and non living objects and communicate with the loco pilot through IOT technology to stop the train automatically. For backup protection actuators are used either it can be pneumatic or hydraulic blowers. The solution to prevent these accidents is to create early warning detection device for locomotive driver before the collision or accident occurred so that locomotive drivers can avoid them.

Active And Reactive Power Control Of 3 Phases DFIG By Using Vector Control

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Abhishek Lokhande | Sagar Kekade , Vaibhav Thakare , Mayur Deshmukh , Prof. J. D. Patil

Abstract

This paper presents vector control of grid-connected wind turbines; also the second goal of this research is to survey the vector control for wind turbines with doubly-fed induction generators (DFIGs) when a short circuit faults in grid happens. In fact in this paper, vector control of stator-flu x is applied for stator- and rotor-side converters in order to control of active and reactive powers simultaneously, and to keep the DC-link voltage constant. Also the method performances are tested in different cases.

Active and Reactive Power Control of Three Phase Grid Connected System with Proportional-Resonant Controller by using SVPWM Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 12th October 2017

Peddinti Raja | 

Abstract

This paper presents detailed analysis of operation and design of Proportional resonant (PR) controller by using SVPWM technique. On the basis of LCL filter, double-loop current control scheme with the proportional-resonant method is simulated. The proposed control method can reduce the steady-state error of the current, and eliminate the impact of the grid frequency offset on the net current, and the system oscillation caused by the resonance frequency can be decreased, too. Therefore, the stability and robustness of the grid-connected system are improved Under Unbalanced conditions Active and Reactive power are controlled and regulated by current ‚Äďloop on stationary reference frame by using PR controller along SVPWM, and results are used to provide a comparison between the different control strategies. The analysis is performed on a traditional three-phase voltage source inverter, used as a simple and comprehensive reference frame. Among the conclusions are the feasibility and great potential of PR particularly for power systems with a reduced number of switching states. In addition, the possibility to address different or additional control objectives easily in a single cost function enables a simple, flexible, and improved performance controller for power-conversion .The operation and performance parameters are compared for two models under unbalanced conditions. The study was done by simulating the system on Mat lab for 3KW grid connected system .Finally, both simulation and experimental results are presented in conclusion.

Adaptive Cruise Control

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Aditya Badave | Vivek Gondil, Devank Joshi

Abstract

Adaptive Cruise Control (ACC) is Assistive Control System used in a vehicle, to explain the concept of Adaptive Cruise Control; we designed a prototype which is based on microcontroller. This helps to understand the working of Adaptive Cruise Control. This paper gives brief information about Adaptive Cruise Control and how it works.

Adaptive Electromagnetic Braking in Vehicle to Avoid Accidents

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

A.V.Todkar | S.A.Nachankar, P.G.Survashi, S.R.Patil , A.V.Kamble , Miss.P.M.Koli

Abstract

An electromagnetic braking is a new and revolutionary concept. Electromagnetic braking system is a modern technology braking system used in commercial vehicles. It aims to minimize the brake failure to avoid the road accidents. It also reduces the maintenance of braking system. So for reliable braking the proposed scheme use the electromagnet while the function of this electromagnet is to develop a magnetic force to engage the brake .In that ultrasonic sensor measure distance between vehicle and obstacle and Proximity sensors measure the speed of vehicle. Comparing the distance and speed, the 89S52 microcontroller gives the signal to relay and electromagnet when safety distance is reduced than safety limit. Constant speed can be achieved by the using resistive touchpad screen. For that DC motor is used to pull accelerator to control the speed. The proposed scheme is simulated in Proteus and implemented in hardware (prototype).

Adaptive Human Machine Interface Approach for Face Recognition

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Mr. L. Guru Kumar | Dr. G. Harinatha Reddy

Abstract

Feature extraction is one of the challenging issues in face recognition and matching process. Here we proposea novel method for dense featureextraction in face recognition.This methodology consists of two steps. In first step, encoding scheme is defined that shifts high dimensional data into compact representation by maximizing intra user correlation. In second step an adaptive feature matching is done for image classification which works for images with different scaling limits. This methodology is implemented on local facial database. We introduce a novel human-machine interface based on movements of head pose. This human machine interface works by detecting facial features from live cam and then tracking face features.Movement and actions of cursor are performed by using facial feature tracking. We prove that our methodology yields better results compared to state-of-art criteria, our method performs better at noisy condition, illumination changes, complex background and at different head poses.

Adaptive Mimo System with OSTBC using Spatial Diversity and Spatial Multiplexing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 20th September 2017

Ch.Tidula | Dr.Ch.Santhi Rani

Abstract

The advances in wireless technology leads to the simultaneous growth in the field of communication by increasing the data speed with high accuracy .It is a very complex task to increase the requirements of a data rate. So in order to meet these requirements Multiple-Input-Multiple -Output (MIMO) system has been developed. The adaptive system is having the variable number of transmit and receive antennas. Adaptive MIMO system uses an adaption algorithm. The number of transmit and receive antennas will change depending on this algorithm and it uses an Orthogonal Space Time Block Codes (OSTBC). These codes help in improving accuracy and providing high data rates. This can be done by using the two techniques spatial diversity and spatial multiplexing. The frames present in the adaptive system will operate with either one, two or three or four transmit and receive antennas. The OSTBC encoder block will encode the information symbols from the QPSK modulator by using the Almouti code. The QPSK demodulator will demodulate the output of the OSTBC combiner. The frame error rate for three transmit and two receive antennas is 0.1999 at 10db and the frame error rate for four transmit and two receive antennas is 0.5107. From the above results it is observed that the three transmit and two receive antennasisbetter.

Advance Biogas System for Irrigation - A Typical Application

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Dr. Amol B. Ubale | Priyanka Tupe-Waghmare,Swapnaja A. Ubale

Abstract

Anaerobic reaction of the organic substances like vegetable/food waste, animal/human waste and agricultural waste produces gas called as Biogas. This gas chemically consist of CH4, CO2 as major content( 50-75% & 30-40%) and other constituents such as N, H2S, H , O2 and H2O vapour in small amount (about 10% all). It is well known fact that CH4 is a good IC engine fuel. As the gas mix with air easily it can be used as fuel in compression ignition (CI) engines. CO2 content from it can be either reduced or completely removed by simple water scrubbing process. The burning of this gas gives clean energy with low emission. If it is used in compressed form in cylinders, it can be a supplement to compressed natural gas (CNG) and liquefied petroleum gas (LPG) and. Present study has demonstrated a small capacity biogas plant which is constructed using kitchen waste as feed stock. The gas produced from it is supplied to computerized CI engine test rig of 3.5 KW. Various tests were carried out at different speeds and load conditions. Typical running conditions are demonstrated with 2300 rpm and 20 N-m. The system works fairly well at low load conditions.

Advanced communication Through Fleshredtacton

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th August 2017

Haritha K Sankari | B.S.Vignesh, K.R.Pooja, S.Kousika

Abstract

Our body could soon be the backbone of a broadband personal data network linking your mobile phone or MP3 player to a cordless headset, your digital camera to a PC or printer, and all the gadgets you carry around to each other. RedTacton is a new; it is completely distinct from wireless and infrared. A transmission path is formed at the moment a part of the human body in contact with a RedTacton transceiver. Physically separating ends the contact and thus ends communication. Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path. Uses the minute electric field emitted on the surface of the human body .Technically according to the user's natural, physical movements. Communication is possible using any body surfaces, such as the hands, fingers, arms, feet, face, legs or torso. RedTacton works through shoes and clothing as well. Here, the human body acts as a transmission medium supporting half-duplex communication at 10Mbit/s. The key component of the transceiver is an electric-field sensor implemented with an electro optic crystal and laser light.

Advanced Health Care System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Pinky Mary Sunny | Sreejith Hari Kumar, Toms Mathew, Tinu Cyriac,Mr.K.M.Abubeker

Abstract

Modern healthcare systems, despite all its breakthroughs and giant leaps of innovations still struggle to achieve an effective response that above all, rises to be a time-effective technique to treat patients. Through this paper, we introduce a system that strives to integrate the existing medical techniques with innovations in electronics and present them on a common platform, thus enhancing the effectiveness and doctor-patient interaction experience. The domain of implementation of this project is NI LabView. The basic building block of programs written in LabVIEW is VI. VI stands for virtual instruments. It is similar to a function or subroutine in other programming language. It includes the front panel (containing controls and indicators), the block diagram (containing control terminals, wires and structures and various other object nodes), the VIís icon and its connector pane (as well as compiled executable code which is hidden behind the scenes). The various blocks for ECG generation and its signal processing steps including wide band noise removal and base line wandering reduction has been achieved on LabVIEW. Monitoring of this signal and mechanisms in case of atrial depolarization (beginning of heart attack) and other atrio ventricular problems have also been set up. Monitoring and alarm mechanisms for irregularity in BP have been implemented. The patientís body parameters are updated into a mainframe database called EMR (Electronic Medical Report) on a real-time basis. The NI LabView 2013 simulator provides a single platform to integrate different VI module executions.

Advanced Intelligent Car System to Prevent Accidents Using Alcohol Detector and Eye Blink Sensor

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Manasa Gattu | Shailaja Chetla , Krishna Marsukola , Sumanth Mateti , Sudha Arvind

Abstract

This paper describes a real-time online prototype driver-fatigue monitor. It is about making cars more intelligent and interactive this may notify or resist user under Unacceptable conditions, they may provide critical information of real time situations to rescue or police or owner himself. In this paper, we provide by means of accident prevention using eye blink sensor and alcohol detector where the vehicle is stopped immediately and intimated where ever needed. If the driver is drunk then the buzzer indicates and the vehicle doesnít allow the driver to start the vehicle. If the driver is drowsy, then the system will give buzzer signal and the speed of the vehicle is reduced and using ultrasonic sensor it checks whether any vehicle is present on the left side, if not the vehicle is parked. According to this project when a vehicle meets with an accident immediately pressure sensor will detect the signal and sends an alert message through the GSM MODEM including the Location to police control room or a rescue team.

Advanced IOT Based Blood Bank

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 11th July 2017

Aruna R | PradyneshPatil, Rajeev S, Shruti Sanga A , Swathi R

Abstract

Blood is the saver of all life in the case of emergency and,In an emergency situation, if thestock of blood are insufficient or unavailable, the only source of blood will be the people who donate the blood on a voluntary basis. It is certain that, time is a very crucialcomponent in such situations. For this reason, the health care centre should contact the nearestavailable donors in order to ensure the service as quickly as possible and hence this is a time-consuming process.This issue can be overcome by automating the entire system along withaportable smartphone application. The blood packets will be monitored and updated periodically. The Application provides a way to synchronize the information between blood banks and Hospitals with the help of Internet. The android application can be accessed by registered hospitals to check the availability of Blood and can send Request for blood to the nearest blood bank or donor matching with blood requirements.Only a registered person, with willingness to donate blood, will be able to access the service. The application uses GPS technology that will providea way to trace the way to the blood bank or nearby hospitals. The user will get the route to reach the desired location and eliminates the need for manual interventions, thus savingtime.The information about the donor, hospitals and blood banks will be stored in the central database and can accessed globally by authorized user anytime and anywhere.

Advanced Railway Automation and Its Application

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Somashekar.V | Gangadhar.S , Sunil.R , prof. Srilatha

Abstract

The objective of this project is to efficiently avoid the collision of automobile vehicles and to provide a greatest security to the users in adverse or in bad weather conditions by using Collision Avoidance System (CAS). The main aim of this paper is to make an automated place announcement system for Train using RFIDís and vibrator. The radio frequency wireless card for tracking the station data. The paper consists of microcontroller with the RF receiver and the vibrator. The whole system is attached to the vehicle (BUS or Train). The encoded RFID tags are placed in the BUS stops or the railway stations. The microcontroller in the TRAIN is programmed in such a way that every station name is saved in the controller which is having a unique code. So whenever the bus or train reaches the station, the reader in the bus or in the train receives the codes, which are transmitted from the tag and the microcontroller receives this code and checks in the look up table, saved in the chip. Whichever matches, the controller will displays that station name on LCD and activates the respective seat vibrators. If fire happens in a particular train compartment, then respective compartments will be detached.

Advanced Vehicle Tracking and Trapping System

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th October 2017

Vishnu C.R | Surag M.T, C. Raseek

Abstract

The advanced vehicle tracking and trapping system is very much useful in the increasing vehicle robberies of the world. This system has been implemented with Arduino, Global Positioning System(GPS) and Global system for mobile communication (GSM) technology, with a relay in order to stop the vehicle and android phone application in order to provide a user friendly environment. In addition to this a trapping and locking system is implemented. Trapping system is an internal ring gear attached with a DC motor which lock the driver in the seat and don’t let him escape. The locking system is a rack and pinion arrangement with a DC motor, installed inside the door by making a hole. In this advanced world simple tracking system is not effective, by chance we reach the vehicle there is a chance to the escape of the thief. We can’t control these robberies if the thief is escaped. This system is helpful to give real punishment to the intruder. In such a situation everything set in a simple mobile application in a cost effective way is very convenient for the user.

Advances in Aircraft Mechanical Systems and Components

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 5th July 2017

G. BhavaniSankar | H. N. Bhaskar

Abstract

Aircraft is a complex system of systems. Structural elements are complemented by the Avionics and Mechanical Systems. Avionics would provide the communications, navigation, other control functions and commands. The Mechanical Systems would execute these and provide the power to realize a safe flight starting from takeoff to landing. Each system has its role to play in the successful mission of the aircraft’s each flight. Each system will have sub-systems and components to achieve their functional requirements and meeting the reliability, maintainability and safety (RMS) requirements. It is a known fact that many technological advances originate from the Aerospace industry and trickle down to other walks of life. In recent years, the aviation business has entered a major growth period with increased air transportation demand projected for the future. On the other hand, the rising awareness of environmental issues on a global scale necessitates a reduction in substances of concern i.e. decreased greenhouse gas emissions. Furthermore, as the international demand for fuel increases, fuel prices are rising, and the aviation business is urgently requesting better fuel efficiency for economic reasons as well. There is also serious research happening in the area of alternate fuel, fuel cell and all electric aircraft. These needs, currently drive the requirement for newer technology and changes in how aircrafts are made and flown. Thus energy consumption of each system is one area that is scrutinized closely. Going one step ahead the exergy analysis to minimize the entropy generation by these systems and to curtail the endogenous avoidable and exogenous avoidable parts of the exergy destruction occurring in each component are extensively used in Propulsion System and ECS development. Weight reduction is another important aspect in all these systems. Landing Gear System (LGS) weight is generally about 4.0% of the aircraft take-off weight. Developments like equipping composite braces on the main landing gear, electrically actuated Landing Gear are some examples of weight reduction in LGS. Advances in these systems not only aim at improving inflight performance but also look into the energy and fuel saving during ground handling, maintenance and thus reducing life cycle cost. This paper details the technology and the innovations that have gone in to evolving these systems over the years both at system level and component level. The paper also looks into the emerging trends in the design and development of these systems. The trends in developing new configurations, evolving the new systems’ architecture, meeting the demanding new requirements at component and system level, using latest software resources for mathematical modeling and simulation, conducting rigorous tests at component and system level at ground and flight test phases and finally meeting the certification requirements are touched upon.

Aerodynamic Analysis of Biplane Configuration Using NACA 001 Airfoil

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd August 2017

Somaling Koti | Dr. S S Desai, Dr. V Ramesh

Abstract

The work reported here to show the effect of biplane configuration on aerodynamic performance of the NACA 0012 symmetric airfoil. The computational analysis was performed with the help of CFD program which were GAMBIT and FLUENT. The flow around the airfoils was incompressible, steady state, two dimensional Nevier-Stokes equations with different turbulence models were used to simulate the flow nature of aerofoils. This analysis have been carried out by varying the gap between the aerofoils such as 25%C, 50%C, 75%C and 100%C at various angle of attack and operating at Reynolds number 3√ó106. An interference effect occurs in gap between biplane configurations which can be varied with differ in angle of attack and chord length. The 50%C gap between the aerofoils shows the maximum increase in lift co-efficient. It is observed that biplane configuration provides greater maneuverability performance such as loops and rolls. The computational solutions gives information that increase in lift co- efficient at low speed conditions with little penalty in drag co-efficient. Computed results have been validated with existing experimental data.

Aging Aware Vedic Multiplier

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ch.R.Sneha Sindhra | U.V. Ratna Kumari

Abstract

Multipliers are most broadly utilized segment as a part of applications, for example, convolution, Fourier transforms, discrete cosine transforms, and advanced shifting. Since outrun of these applications primarily relies upon multiplier speed, multipliers must be composed effectively. The aging effect of the transistors caused by NBTI and PBTI has a large impact on its performance in a long span. In this paper, the device tradition with the accomplishment of Vedic multiplier is addressed not withstanding bypassing multiplier keeping as a main priority to enhance the execution for more speed and less power .The current plan focuses on Vedic multiplier which comprise of multi-level adders for designing mindful circuit. The huge angle of the proposed strategy is that, the created multiplier depends on Vertical and Crosswise structure of Old Indian Vedic Mathematics called Urdhava Tiryakbhyam Sutra. The advancement is to design the multiplier with the carry save adders in order to enhance better performance.

Agribot-“Future Farmer’s Friend"

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

P.Santhi Priya | Angel Prescilla Jean Pierre, Somdutta Bose, Dilli Babu.U, Indumathi.K

Abstract

This robotic vehicle is an agricultural machine of a considerable power and great soil clearing capacity. This multipurpose system gives an advance method to sow, plough, water and cut the crops with minimum man power and labour making it an efficient vehicle. The machine will cultivate the farm by considering particular rows and specific column at fixed distance depending on crop. Moreover the vehicle can be controlled through Bluetooth medium using an Android smart phone. The whole process calculation, processing, monitoring are designed with motors & sensor interfaced with microcontroller

Agricultural Vulnerability Assessment using GIS: A Case Study of Pallar Basin of Chittoor District, Andhra Pradesh

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

T Hemalatha | 

Abstract

Drought is one of the short-term extreme events. There is no operational practice to forecast the drought. Drought indices play a significant role in drought mitigation. In the present study, Pallar basin which is present in Chittoor District of Andhra Pradesh, which are seriously prone to drought, has been established using meteorological and remote sensing based agricultural droughts indices. The meteorological droughts indices was Standard Precipitation index (SPI)and the satellite data based agricultural drought indices was Normalized Difference Vegetation Index (NDVI), Normalized Difference water Index (NDWI). The meteorological and remote sensing based agriculture drought indices has been determined and compared for the period of 2000, 2005 and 2010. The result shows from SPI Index the year 2005 is wet year and the year 2000 and 2010 are dry year. From NDVI index the year 2005 is having more vegetation area and the year 2010 is having less vegetation area. Hence, agricultural drought risk mapping can be used to guide decision making processes in drought monitoring, and to reduce the risk of drought on agricultural productivity.

Agrikart: A New Revolution Agriculture

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Dr. B Shadaksharappa | Mr. Venkatesh Kumar M, Rajesh G,S Srijayanth, Mrs. Myneni Chandana, Chaithra R S

Abstract

The project is based upon Wireless Sensor Network and an android based interface. The advanced development in wireless sensor networks can be used in monitoring various parameters in agriculture. Due to uneven natural distribution of rain water, it is very difficult for the farmers to monitor and control the distribution of water to agricultural field as per the requirements of the crop. There is no ideal irrigation method for all weather conditions, soil structure and variety of crop cultures. The sensors are used to collect various data which is to be then analyzed. The android interface provides the farmer with a framework to communicate with experts and get immediate response. It also provides them detailed information about the governmental policies which they can make use of. The main motive of this idea is to provide the analyzed soil sample and the best suggestion on which crop will minimize the cost and maximize the profit. The application also gives specific weather predictions for the day/week. Details on agricultural loans with their interest rates are also shown in the android application interface. This project aims to reduce the stress and problems that adversely affect the farmers resulting in the loss of crops and human lives.

AI in Cyber Security

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

B.Arshia | M.Gayathri,P.Manaswini

Abstract

Today cyber security is something which can’t be handled by human security analysts alone. They need some degree of automation and this is where AI (Artificial Intelligence) comes into the picture. Today the world has coupled with the widespread absorption of cloud and mobile technologies having made an infinite platform to cyber security problem. AI-driven cyber security methods are able to learn and get better as they evolve by using the technique like AI2 (AI square), QRadar. By using these methods we show that the system learns to defend against unseen attacks and thus detection rates are reduced fivefold. This in turn helps to keep the systems, networks and sensitive data secure.

Air Production and Power Generation From Speed Braker in Road Ways

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

Karthik P | Chandan Kumar C, Raghu N, Hemanth Reddy C,Anand. K. A

Abstract

In our project we are producing the compressor air using with the aid of speed breaker setup in road ways. This is the simple and easy method of producing the compressor air with out using the electricity. Now days the electric power is demand is increased. So we are generating the compressed air without using the electric power. Here instead of electric drive we are using the mechanical drive to generate the compressed air. We are using the speed breaker to generate the compressor air.The main aim of this concept is to generate the electric power through the fabrication of air turbines with speed brake arrangement. Nowadays power demand is increased, so this project is used to generate the electrical power in order to compensate the electric power demand.

Algorithm for Protection of Key in Private Key Cryptography

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Neha Tyagi | Ashish Agarwal, Anurag Katiyar, Shubham Garg,Shudhanshu Yadav

Abstract

This paper is in reference with our previous paper entitled ‚ÄúProtection of Key in Private Key Cryptography‚ÄĚ published by ‚ÄúInternational Journal of Advanced Research‚ÄĚ in Feb 2017 edition... In this paper we have tried to devise an algorithm that would protect the key in transmission, as in the era of digitization, threats to information security instigate the concerned people to take proactive measures for communication between two communicating parties. Since our major focus is on the symmetric key cryptography, also called as private key cryptography, we have studied different techniques of securing a private key or shared key or secret key that are used to shield information in such systems. The different statistical data being published so far and recent phishing scam which plays with the information transfer by taking away the user‚Äôs identity highlights the need to make our security measures strong enough to counter such unwanted accesses. After looking into the functioning of widely accepted protocols and thinking of introducing a few changes to enhance their functionality, we here, are going to focus mainly on application of asymmetric key cryptographic algorithm named RSA algorithm. We have already referred to suggestions by means of several research papers being published so far related to our area of interest such as N-Prime RSA, magic rectangle, etc. We have tried to present a method taking one step ahead in the available sketch and without diminishing the basic essence of the algorithm. We also refer to some examples and its application as thought of in its modified form to further support our idea.

Algorithms for Underwater Video Enhancement

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Ketan Awade | Tejashree Badve, Mohit Dhale, Prof. S. M. Kulkarni

Abstract

The paper describes the techniques for underwater images and videos enhancement. Initially the conventional approaches like wavelength compensation and image dehazing (WCID), dark channel prior method, contrast limited adaptive histogram equalization (CLAHE) have been studied and analysed. Analysis of all the three methods have highlighted the shortcomings of the individual methods. The fusion method is described in this paper which has exhibited comparatively better results for the enhancement of underwater images and videos. In the proposed method the inputs are taken from the degraded images, the colour correction and the contrast enhancement techniques are applied on the input image. The weighted maps are used for increasing the visibility of the degraded object due to absorption and scattering. The resultant output is characterized by lower noise, improved contrast and better exposed dark regions.

All optical NOT Gate using modified Photonic Crystal Platform

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Savita Soma | Dr.Sanjay Gowre

Abstract

This paper deals with designing and simulation of all optical NOT gate constructed by using 2-D modified Photonic Crystal. A typical NOT Gate can be constructed on square lattice of 8 Ķm*8 Ķm photonic crystal of silicon rods in doped substrate with refractive index of 3.40 and 1.1 respectively. The lattice constant ?= 1Ķm and radius of the rods r= 0.2?Ķm. Not gate is realized by combining the cross-waveguide geometries and varying its diameter by pitch (d/?). The gate is implemented for the operating wavelength of 1.55Ķm using Rsoft's Fullwave simulator.

All Time Medicine Counter For Medicine Self-Dispensing For Public

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st July 2017

Malashree.G | Gnaneshwari. V, Ubaidulla, Sneha. S, Swetha B Gumati

Abstract

Medicines play a crucial role in maintaining health, preventing illness, managing, chronic conditions and curing disease. All Time Medicine (ATM) is a machine which delivers the medicine in emergency cases and ensure availability of drugs 24x7 and hence the name ‚ÄúAll Time Medicine‚ÄĚ. ATM will be very useful in saving life in case of an accident on highways, remote areas, rural areas and places where medical stores are not within the reach in case of emergency. At least first aid can be made easily accessible with the help of this system. This project consists of Advanced RISC Machine PIC micro controller which controls the other sub systems such as RFID Reader, Global System for Mobile communication (GSM), medicine dispenser, inventory control. RFID tag identifies the specific user. GSM sends the message to the inventory control when the medicines needs to be refill. Medicine Dispenser is the storage part of the machine, which stores the medicine.

Alleviation of Power Quality Tribulation Using Series Active Power Filter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

G.Gomathy | G.Anupriya, R.Srinidhi, M.Hareeshma

Abstract

This paper presents a control strategy Synchronous Reference Frame Theory (SRF) for three phase Dynamic Voltage Restorer (DVR) using MATLAB/SIMULINK. DVR is a three phase converter coupled with a DC Capacitor, which acts as Series Active Power Filter (SAPF). Since, power quality focuses on distribution side, the quality of power interns of voltage should not distorted by different faults. Hence, DVR plays an important role with the control strategy to make DVR active during fault conditions. Simulation results are carried out for LLL-G (Voltage Sag), L-G (Voltage Unbalance), increase in supply voltage (Voltage Swell), and distortion fluctuations in voltage (Voltage flickering) using MATLAB/SIMULINK

Amalgamation of Mind Wandering with Military and Defence

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Priyanka Tripathi | Tanu Varshney, Priyanka Chaudhary , Vimal Singh

Abstract

In this paper we are going to present, how to curb the affect of mind wandering during military training and in the field of defence. Basically, mind wandering software will check the ability to stay focused on the task and make t imely decisions. This paper also discuss about the different types of training that is provided to the soldiers and about the consequences of the mind wanderi ng pills.

Ambubot with Defibrillator for Medical Services in Smart Cities

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 12th September 2017

G.V. Raja | Archana.N, Asha.R, N. Kavya, Navya.N

Abstract

A smart city is an urban development vision to integrate information and communication technology (ICT) and Internet of things (IoT) technology in a secure fashion to manage a city's assets. Through the use of sensors integrated with realtime monitoring systems, data are collected from citizens and devices ‚Äď then processed and analyzed. The information and knowledge gathered are keys to tackling inefficiency. Time is a critical issue when dealing with people who experience a sudden cardiac arrest that unfortunately could die due to inaccessibility of the emergency treatment. Therefore, an immediate treatment using Automated External Defibrillator (AED) must be administered to the victim within a few minutes after collapsing. Hence, we have designed and developed the Ambulance Robot, shortened as Ambubot, which brings along an AED in a sudden event of cardiac arrest and facilitates various modes of operation from manual to autonomous functioning to save someone‚Äôs lives in smart cities. Details of design and development of such robot is presented in this paper.

Ambulatory Assistive System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

S.Vinoth kumar | Dr. R.Jayaparvathy

Abstract

The advancements in wireless communication and sensor technology have grown significantly in the recent years particularly in medical applications. Existing health care systems do not provide real-time monitoring of the patient's health condition. To overcome this limitation, Wireless Body Area Networks(WBANs) have been introduced. WBAN allows for mobility of patients due to its portability and location independent monitoring. We propose the design and implementation of a Wireless Body Area Network for a patient in an ambulance to obtain the vital parameters namely ECG signal, Blood pressure, Temperature etc., from the patient's body using appropriate sensors and transmit them to the WBAN co-ordinator. The WBAN co-ordinator sends the information to a GSM module. This information can be communicated to a doctor/expert to provide continuous treatment before the patient in the critical state reaches the hospital. The collected information will be maintained in a database to be extracted by the people/expert anytime and anywhere using suitable Android application. We also analyze the effect of path loss associated with the signal transmission due to varying position of the nodes. The impact of pathloss on energy consumption of the nodes is also analyzed in this work.

An Adaptive-Profile Modified Active Shape Model for Automatic Landmark Annotation Using Open CV

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rajesh K M | Naveenkumar M

Abstract

Detection and tracking of face and facial features are the fundamental steps for many applications like Biometrics, human computer interface, video surveillance and expression analysis This paper addresses the challenges in current techniques and presents an adaptive-profile accurate method for facial feature detection and real time tracking. Face and facial features are detected by improved Active shape model (ASM), This application is developed by using Intelís Open source computer vision project, OpenCV, Microsoftís .NET framework and DLIB.

An Advanced Architecture with low Complexity of Partially Parallel Polar Encoder

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

U.Mahendra Narasimha Raj | E.V.Narayana

Abstract

Due to the channel achieving property, the polar code has become one of the most favorable error-correcting codes. As the polar code achieves the property asymptotically, however, it should be long enough to have a good error-correcting performance. Although the previous fully parallel encoder is intuitive and easy to implement, it is not suitable for long polar codes because of the huge hardware complexity required. In this brief, we analyze the encoding process in the viewpoint of very-large-scale integration implementation and propose a new efficient encoder architecture that is adequate for long polar codes and effective in alleviating the hardware complexity. As the proposed encoder allows high-throughput encoding with small hardware complexity, it can be systematically applied to the design of any polar code and to any level of parallelism.

An Agglomerative Clustering Method for Solving Vehicle Routing Problem

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

P Praveen | B. Rama

Abstract

A magnified arrangement is intended for the vehicles to diminish the aggregate cost of dissemination by which it can supply the products to the clients with its referred to limit can be named as a vehicle directing issue. In factor neighbourhood look technique, chiefly a productive vehicle steering can be accomplished by figuring the separation network esteem in view of the client's area or the way where the client's lives. The fundamental target of the paper is to lessen the aggregate separation made a trip to convey the products to the clients. The proposed calculation is a chain of importance based upgraded agglomerative bunching calculation procedure which is utilized as a part of the information mining situation successfully. The proposed calculation diminishes the aggregate separation doing out to every course and the vital thing need to consider is that the improved grouping calculation can decrease the aggregate separation when contrasted with the beforehand proposed variable neighborhood seek strategy.

An algorithm for the detection of Diabetic Retinopathy, Maculopathy and performing human authentication

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Vipanchi H S | Chandrashekar M Patil

Abstract

Diabetes when effects the eye, results in diabetic retinopathy which intern results in maculopathy. An automated graphical approach has been suggested to detect the Diabetic Retinopathy (DR) and Diabetic Maculopathy (DM) simultaneously by identifying microaneurysms and exudates respectively at the early stage. Microaneurysms (MA) and exudates are the found out by feature extraction process. Depending upon the presence of microaneurysms, the different stages of retinopathy are identified as mild, moderate and severe condition. Human authentication is performed based on the blood vessel pattern matching. This approach is tested over DRIVE, HRF, DIARETDB0, and DIARETDB1 databases and expected results are obtained.

An Alternative Method For Forming The State Matrix Required For Aes Encryption Algorithm To Enhance Security

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Mr. Vikrant Shende | Dr. Meghana Kulkarni , Mr. Giridhar Sudi

Abstract

This paper presents an alternative method for forming the state matrix required for AES encryption algorithm. The design uses alternative method for mapping the individual bytes of the block to different columns of the state matrix depending on previously defined encryption vector. This adds an extra layer of security to the process, but at the same time keeps algorithm simple to implement.

An Analysis of Important Issues Associated with Cloud Computing

Journal of IOT Applications for smart city, Available online 29th August 2017

Rohit Nagar | K. Gupta, Raj Mohan Singh

Abstract

Cloud computing is a service based technology on internet which provides many facilities to the users to access plenty of resources on demand from anywhere and anytime in the world. Cloud computing mainly aims to give proficient access to the remote and geographically distributed resources. As cloud technology is evolving day by day it confronts many numerous challenges. This paper gives an overview of cloud computing and provides a concise but all-round analysis of important issues like scheduling issues, security issues, access control issues, multi tenancy issues, trust management , privacy issues etc.

An Analysis of Keyword Search Retrieval Techniques on Multi-Dimensional Datasets

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Mrs. R.Ramya Devi | T.Shanmuga Priya

Abstract

Information retrieval (IR) is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing. Information retrieval is the most concentrated research field in the real world environment which enables users to retrieve the contents stored in the web. Keyword based search retrieval make ease of this task which can find the most similar information present web source accurate by computing similarity distance between the keywords submitted and the information present on web source. However keyword based similarity finding on multi-dimensional data would be more difficult task which required more computation to be performed. In this analysis work, comparison evaluation of different methodologies that are implemented to perform keyword based search retrieval on multi-dimensional data set has been discussed. Those research methodologies have been discussed based on their working procedures in detail. The different existing research methods are compared in detail based on their merits and demerits. The comparison analysis of research methods are conducted by comparing them with each other in terms of their merits and demerits. From this analysis, efficient research methodology that can perform key word based search retrieval in the flexible and accurate way can be identified in terms of performance improvement.

An Approach for Face Detection Using HAAR Features for Automatic Attendance System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Varshitha Gowda H S | Chandrashekar M Patil

Abstract

Human face detection has a wide application in biometric and security fields. It finds its application in photography, video surveillance and in many other areas. This paper proposes a face detection approach using Viola Jones algorithm with a Haar features converted to integral image to decrease the computational complexity. AdaBoost algorithm is used for feature selection and attentional cascade for fast rejection of non-face windows. This approach performs fifteen times faster than other face detection algorithms. This method is implemented in college for automatic class attendance system, which takes real time image as input and detects faces crops the face region and display along with their count, which helps in taking automatic attendance. With a high accuracy, the detected faces along with the count are updated. An improved result for face detection and accuracy is obtained using this algorithm.

An Approach for Managing Different Applications Using Centralized Load Balancer in Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Abhishek | Akash Kumar , Kunal Gautam, Suresh, Mrs Vani.K.A

Abstract

The data centers and end users are distributed across the globe in a large cloud environment. It is a tiresome situation for cloud data centers to serve huge requests coming from these end users. As a consequence, load balancing mechanism is used to distribute the loads efficiently and effectively among different nodes. To achieve high user contentment and high resource employment ratio, load balancers are used. In this paper we have used a ďcentral load balancerĒ to balance the loads among different virtual machines in cloud data centers.

An approach to promote Frequency regulation using Free Governor mode operation method

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ujwala. Tade | Neelam S. Pinjari, Nutan Attarde, Rekha Sonune

Abstract

As energy consumption as well as reliability based availability of power becomes the main factor to the economic growth. The electrical energy demand in country has been rising at the rate of 15% per annum. Generation capacity has been rising at the rate of 10% per annum. To bridge this gap advanced technologies have been necessary to incorporate in the Indian power sector.. Power system frequency is an important indicator of the quality of power supply. The Indian Electricity Act, the frequency has to be maintained within +/- 3% of the rated frequency, 50Hz. In india the frequency is always low and this causes severe problem to the connected load and power generating equipment. The grid operation in india has undergone a dramatic change in recent years with the introduction of Indian Electricity Grid code(IEGC), Free Governor mode operation(FGMO), Availability Based Triff(ABT). The above factors are gaining importance day by day among all stake holders. The area of my research proposes the success of the FGMO of Chandrapur Thermal Power plant (CTPP) respond to the standard frequency rate and this will make the operation more secure.

An Arduino Uno Microcontroller Based Prototype Overvoltage and Overcurrent Protection System

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th November 2017

Sourin Bhattacharya | Victor Sarkar, Priyam Sadhukhan, Nirab Majumder, Sarbojit Mukherjee, Sourav Saha

Abstract

It is of significant academic interest to develop cheap, dependable and robust protection systems for simple electrical circuitries for both academic and commercial usage. This research paper is intended to propose and implement a prototype overvoltage and overcurrent protection scheme of single phase two terminal passive circuits utilizing the Arduino Uno microcontroller and the Arduino Software (IDE). The proposed scheme would acquire and process conditioned analog input values of voltage and current of a system in real time and the implemented Arduino programmes would monitor whether those values exceed a predefined threshold; exceeding that will trip a relay to protect the system. The scheme would have three major segments that are the current sensing segment, the voltage sensing segment and the relay module and these segments shall be properly interfaced with the Arduino Uno Microcontroller and the load. The scheme is tested on a resistive and a lamp load and an analysis of the obtained data through experimentation on these electrical loads suggest that the proposed scheme is essentially feasible with moderate sensitivity

An Article on ECG Signal Denoising Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 17th August 2017

V. Supraja | Dr .P.Nageswara Rao, Prof.M.N.Giriprasad

Abstract

The presence of noise in an ECG trace complicates the identification analysis. Due to noise the quality of ECG signal is degrades. So the removal of noise is elaborated due to time varying nature of ECG signal. The ECG is widely used for diagnosis and analysis of heart diseases, so a good quality of ECG signal is required. In this article various types of noises corrupting ECG signal and various techniques based on Wavelet Transform, Fuzzy logic , FIR filtering , Empirical Mode Decomposition used in denoising the signal efficiently are presented in this paper. The results are comparing the performances of different denoising techniques based on related parameters are inserted.

An Assimilated Face Recognition System With effective Gender Recognition Rate

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th September 2017

K. Akhil Sreenivasulu | L. Guru Kumar,Dr. G. Harinatha Reddy

Abstract

Gender Recognition in Face Recognition System has prevalent applications in the fields of demographic data collection, video surveillance, security, retail advertising and marketing and it also plays a vital role on object recognition in robot research area, which has shown an intensive attention in the past few years.However, face recognition is still a challenging task since face images are easily confused by changes of the facial factors, such as illumination, pose, the different expressions, or glasses. The goal of this paper is to improve the effectiveness of gender recognition when there are affected(blurred) images in the dataset. We applied novel descriptor based COSFIRE filters to achieve the Gender Recognition[1] in the Face Recognition System. A COSFIRE filter is trainable, in that its selectivity is determined in an automatic configuration process that analyses a given prototype pattern of interest on FERET training set. Extensive experiments were conducted on the GENDER-FERET dataset which contains 474 training and 472 test samples and demonstrated robustness and effectiveness of the proposed model. It also outperforms an approach that relies on handcrafted features and an ensemble of classifiers.

An Asymmetric Multilevel Inverter Topology for PV Applications with Reduced Number of Power Electronic Components

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

K.Srinivasu | S.M.Shariff , Dr. K.Satyanarayana

Abstract

Multilevel inverter performance is high compared to the conventional two level inverters due to their reduced harmonic distortion, lower electromagnetic interference. However the main drawback of multilevel inverter is increased number of switches, complex pulse width modulation control and balancing of capacitor voltages. This paper proposes a single phase fifteen level inverter for photo-voltaic applications. The proposed inverter topology consists of fewer components with low complexity gate drives and control signals. This paper also presents the most relevant control and modulation methods like Staircase modulation technique with sinusoidal wave as reference. In this paper also studied proposed multilevel inverter topology for both symmetric and asymmetric configurations. Proposed multilevel inverter is compared with already existing inverter topologies. The entire system is numerically simulated using MATLAB/SIMULINK and the simulation results are presented.

An Attachment for a Pesticide Sprayer

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Onkar Navatre | Sandesh Patil,Shubham Pawar,Atul Aradhye

Abstract

In this paper, the design and implementation of pesticide sprayer has been presented. The proposed system is the modified model of the hand sprayer which minimizes the difficulties of the hand type of sprayer such that it also reduces time required to spray pesticide, labor skill, cost as well as effort etc. In this sprayer, the rotary motion is converted into reciprocating motion with the help of wheel. It could also be operated in rainy and cloudy weather conditions. This system can be used for spraying pesticides, fungicides, fertilizers and paints also. The developed systems initial cost is little more as compared to conventional sprayer but the running cost of the system is all most zero in other words minimum.

An Average Low-Power Clock Distribution Using Current-Mode Pulsed Flip-Flop with Enable

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sumaiyya Fatima Ghouri | Rekha S

Abstract

The new prototype for clock distribution that utilizes current, instead of the voltage, to disperse a global clock signal with decreasing power utilization. While current mode (CM) signaling has been utilized as a part of balanced signs, this is the prime use in a one-to - numerous clock appropriation systems. To perform this, we make another best current-mode pulsed flip-flop with enable (CMPFFE) utilizing 45 nm CMOS technology. The power is global transports, clock distribution network (CDN), and synchronous signs by and large. The clock distribution system devours the extensive measure of power in synchronous computerized frameworks. Clock distribution systems are the key component of a synchronous and non- synchronous advanced circuit and a huge power. At the point when the CMPFFE is consolidated with a CM transmitter, the main CM clock dispersion system shows lower normal power contrasted with conventional voltage mode.

An Efficient 4-Bit Processor Design Using Quantum Dot Cellular Automata Technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Shalu .M. Sabu | Sukanya Sundaresh

Abstract

Integrated Circuit(IC) fabrication technology is improving, so the internal dimension of semiconductor devices are decreasing day by day. This trend of scaling down dimensions reached its limit in near future. In nanoscale design, Complementary Metal Oxide Semiconductor (CMOS) has certain limitations such as hot electron effect, interconnect crosstalk, power dissipation, operating speed, gate oxide and interconnect scaling. According to the novel nanotechnology Quantum-dot cellular automata (QCA),which provides a better computation platform than traditional CMOS, in which polarization of electrons indicates the digital information. This work relies on an efficient 4 bit processor design based on QCA technology and it is compared with the CMOS technology. The processor mainly consists of a comparator, ALU, accumulator and data memory. The comparator were designed based on Tree-Based(TB) architecture, that is the entire bit is splitted into two halves and computed separately. Finally, it is cascaded together. The ALU consists of arithmetic operations such as full adder, full subtractor and logical operations such as AND and XOR. The data memory is a 4 *4 volatile memory. QCA based design reduces delay, power dissipation and number of cells used. The VHDL language is used for coding and synthesis can be done by means of Xilinx-ISE 13.2

An Efficient and Reliable Diverse Keyword Ranked Search Scheme Over Ciphered Cloud Data

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Ms. Shruthi | Mehul Bhatt, Pushpa J, Sobin Baby, Akhil K. Manoj

Abstract

Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFxIDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a ‚ÄúGreedy Depth-first Search‚ÄĚ algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly.

An Efficient and Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Nagesh S | A H Shanthakumara

Abstract

In cloud giving security, ensures for the sharing information record. Sadly, in view of0the continuous variation of the participation, allocation files while giving protection careful is so far a difficult issue, specially for an untrusted0cloud on account of the arrangement assault. In this exploration work, we propose an ensured information sharing course of action for dynamic individuals. Right off the bat, we propose a protected course for key appointment with no secured correspondence channels, and the clients can safely get their private keys from social event boss. Moreover, our course of action can complete fine-grained find the opportunity to control, any client in the party can utilize the source in the cloud and denied clients can't get to the cloud again after they are repudiated. Thirdly, we can shield the plan from intrigue strike, which proposes that deny clients can't get the exceptional information record paying little regard to the probability that they outline with the untrusted cloud. This course of action can accomplish fine practicality, which gathers past clients require not to revive their private keys for the circumstance either another client appreciates the social event or a client is denied from the party.

An Efficient Cuckoo Search Algorithm for Segmentation of Satellite Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 5th August 2017

K.Bharathi | Mr.M Ravi Kishore,Mr. J Damodhar

Abstract

Satellite imaging is being the most attractive source of information for the governmental agencies and the commercial companies in last decade. Satellite images are characterized by weak local correlation between pixels, complete randomness and small multiple regions of interest which makes difficult to segment. The quality of the images is very important especially for the military or the police forces to pick the valuable information from the details. Satellite images may have unwanted signals called as noise in addition to useful information for several reasons such as heat generated electrons, bad sensor, wrong ISO settings, vibration and clouds. There are several image enhancement algorithms to reduce the effects of noise over the image to see the details and gather meaningful information. Satellite images are acquired with remote sensing. Remote sensing is the science and art of obtaining information about an object or area through a device that is not in contact with the object or the area under investigation. The classification can be done by using Image segmentation via various thresholding algorithms where segmentation is the process of dividing an object into several homogeneous regions such that union of no two adjacent regions is homogeneous. In this work an efficient cuckoo search algorithm is developed for segmentation of satellite images.

An Efficient Design of Dynamic VITERBI Decoder Architecture

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Mr.Parsekar Gaurav Rajanikant | Mrs.Veena H.S , Mr.Girish G Satardekar

Abstract

The emerging applications of wireless networks enforce new challenges in design of algorithms and communication protocols. In such scenario of challenges, coding for error control has be- come extremely important to provide robust communication and maintain quality of service. One method to improve Bit Error Rate (BER) while maintaining high data reliability, is to use an error correction technique like the VITERBI algorithm. The VITERBI algorithm provides an efficient method for Forward Error Correction (FEC) that improves channel reliability. As constraint length associated with input bits increases it needs to implement it with lesser computations and lesser hardware to decode the original data. Therefore Dynamic VITERBI Algorithm is used for decoding which reduces error probability, computation and employ lesser hard- ware with increased speed. The purpose of this paper is to understand VITERBI Algorithm, Adaptive VITERBI Algorithm and to find the alternative to shortcomings in the design and implement the idea on a hardware.

An Efficient Detection Of Primary Users Reoccupation In Cognitive Radio Systems By Active Sensing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

A.Suhanya | RS.Koteeshwari

Abstract

In the past years, fixed spectrum assignment policies worked well. But today, due to the rapid increase in number of users in mobile communication as well as in other communication areas, arises a problem called Ďspectrum scarcityí. It can be solved by developing a new communication paradigm that will use the existing spectrum efficiently. It is achieved with the help of cognitive radio. One of the main functions of the cognitive radio is spectrum sensing. In this paper, Spectrum sensing is carried out by Quite-Active sensing. In that, active sensing is carried out by spectral correlation function which is one of the cyclostationary feature detection with non-cooperative detection. Here, known pilot signals from the primary users base station are duplicated and reallocated in cognitive radio users modulating signal. The spectral correlation is carried out between the cognitive radio user and primary users. With the help of Spectral correlation function, we can efficiently detect the primary users reoccupation in cognitive radio systems. It will provide higher security because the pilots are added with the cognitive radio users modulating signal. And the simulation is carried out with the help of matlab and their results show the effectiveness of proposed approach.

An Efficient Fixed Point DLMS Adaptive Filter For Denoising

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Neethu Mary Raju | Asha A S

Abstract

The fixed point DLMS adaptive filter is employed for image processing applications and typical for image denoising application. Adaptive filter adapts the filter coefficients according to an optimization algorithm. Because of its simplicity and satisfactory convergence performance LMS (Least Mean Square) algorithm is used. It does not support pipelined implementation because of its recursive behaviour. It is modified to a form called the Delayed LMS (DLMS) algorithm, which allows pipelined implementation of the filter. For achieving lower adaptation delay as well as area and delay efficiency, partial product generators (PPG) and ripple carry adder for adding scheme is used. Adaptation delay can be reduced by decoupling the computations at the error computation block and weight update block. It also emphasis on fixed point issues as location of radix point choice of word length and quantization at various stages of computation. It is most popular for real-time adaptive system.

An Efficient Floating Point Arithmetic Unit Using Parallel Prefix Adder

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rinu Susan Babu | Sukanya Sundaresh

Abstract

In fixed point number representation, digits after the decimal point is fixed and it does not provide a high precision value, while in floating point representation the decimal point is not fixed. Based on the concept of floating point number a fused floating point arithmetic unit is designed. Generally alignment, normalization and rounding are the complex process required in floatingpoint operation, which significantly increase the latency. This work relies on a fused floating-point three-term arithmetic unit, which includes a fused floating point three term adder unit, a fused floating point three term subtractor unit and a fused floating point three term multiplier unit. Here addition is the basic operation used in adder unit, subtractor unit and multipliers unit, which results in decrease or increase of delay. In order to improve the performance of a three term floating point arithmetic unit, carry save adder is replaced by a parallel prefix adder like kogge stone adder. A parallel prefix addition mainly includes a pre-processing stage, a carry generation stage and a post processing stage. This floating point three term arithmetic unit using parallel prefix adder is designed using VHDL language and it is synthesised in Xilinx ISE Design Suit 13.2 and can be simulated in Model SimSE 6.3f.

An Efficient Image Processing Based Method for Gills Segmentation from a Digital Fish Image

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

L.V.Pooja | Ashwitha K , Soudri Rakesh Kumar , Aruna Jyothi

Abstract

The quality and freshness of a fish test is for the most part influenced because of the taking care of and capacity conditions amid the post gathering period. The maintenance time and capacity medium are the two principle variables influencing the fish quality. This paper shows a picture handling based technique for programmed and effective division of gills from the fish test picture which can be utilized for fish freshness approval and assurance of any pesticide from the fish test under test. The actualized calculation has delivered a most extreme connection of 92.4% with the ground truth comes about got from specialists. The strategy utilized for gills division is quick and straightforward.

An Efficient Loom of Vegetation Exploration in Remote Sensing Images Using Object-Based Threshold Classification

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th November 2017

Dr. D. Napoleon | S. Dhanya Shree

Abstract

In recent years, despite the increased availability of high resolution satellite images there is a growth of extensive research in field of remote sensing image analysis. As such, there is a need for simple and efficient image classification technique to classify the remote data. The input data is obtained from the Landsat-7 satellite, which formulates to accomplish remote sensing image classification. This research work has been done with Object Based Threshold Classification to find the vegetation exploration with Normalized Vegetation Index, Near Infra-Red and visible brightness. The resultant land cover image with Object-Based Threshold The classification has more data classes and higher resolution than the normal image classification techniques. This research paper discusses an efficient and effective use of image classification which helps to classify the vegetation exploration in remote sensing images.

An Efficient Method for Software Reliability Using Modified Genetic Algorithm: Inflection S-Shaped Model

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

Dr. R.Satyaprasad | G. Bharathi

Abstract

In order to assess software reliability, many software reliability growth models (SRGMs) have been proposed in the past four decades. In principle, two widely used methods for the parameter estimation of SRGMs are the maximum likelihood estimation (MLE) and the least squares estimation (LSE). However, the approach of these two estimations may impose some restrictions on SRGMs, such as the existence of derivatives from formulated models or the needs for complex calculation. In this paper, we propose a modified genetic algorithm (MGA) to assess the reliability of software considering the Time domain software failure data using Inflection S-shaped model which is NonHomogenous Poisson Process (NHPP) based. Experiments based on real software failure data are performed, and the results show that the proposed genetic algorithm is more effective and faster than traditional algorithms

An Efficient Privacy-Preserving Communicating with Multiple Keys Using Assessment toolkit

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Swetha K B | Harshitha M P, Manoj M, VickySamson, Shikar joshi

Abstract

In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys (EPOM). Using EPOM, a large amount of users can safely outsource their information to a cloud server for storage. Moreover, encrypted data which belongs to different users can be processed without compromising on the security of the individual user's (original) data and the final computed results. To avoid the associated key management cost and private key exposure risk in EPOM, we use a distributed two-trapdoor public-key cryptosystem, the core cryptographic primitive. We also present the toolkit to make sure that the commonly used integer operations can be securely handled across different encrypted domains. We then prove that the proposed EPOM achieves the goal of secure integer number processing without resulting in privacy leakage of data to unauthorized parties. Last, we demonstrate the utility and the efficiency of EPOM using simulations.

An Electrical Energy Audit at Siddharth Institute

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

D.Harikrishna | Dr.C.Prabhu Rama Krishnan

Abstract

Energy plays a central role in all organisations, especially those are energy intensive. Energy audit was conducted at the Siddharth Institute of Science & Technology (SISTK), Puttur, to estimate the energy consumed in a daily and on annual basis. Energy auditing consists of several tasks which can be carried out depending on the type of audit & function of audited activity. It started with review of historical data of energy consumption, those data is important in order to understand the patterns of energy used. The next step is to setup an energy audit program. This program should start with survey of the site to gather the information of electrical equipments presently used. The energy audit discussed in this paper will only focused on Siddharth Institute of Science & Technology. It is carried out with an aim and analysis for identifying possible energy saving measures of this institute.

An Energy Efficient Clustering Algorithm in Wireless Sensor Network

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sakshi Sukale | Tanaji D. Biradar

Abstract

In this fast forward world, we require all the information instantly . In some areas, Wireless Sensor Network is helping us to get this information. In aa thousand of cheap micro-sensor nodes allows a user to monitor a remote environment for civil as well as a military application from the main station. The data collected by micro-sensors is communicated through a network to a single sink node. For this communication first cluster sensors into groups, and via cluster head they will communicate to a sink node. Major energy Is getting consumed while communicating with the sink node resulting the sensors life become very short. This consumption of energy is not advisable, and also at the remote place it is very difficult to replace the battery of thousands micro sensor. To solve all these issues the algorithms has been invented . For effective balances cluster head and prolonged network lifetime, there is a novel uneven clustering scheme invented by Qi Zhang(2). By considering residual energy and distance from the sink node the modified algorithm has given a better performance. The same algorithm is called Distance and Energy Based Uneven Clustering (DEUC). By changing the method of selection of cluster head and also changing the probability factor modified DEUC algorithm gives a better performance than the previous one. The modified algorithm improves the lifetime of the node also the energy of the network.

An Enhanced iUPQC Controller to Provide Extra Grid-Voltage Regulation as a STATCOM

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

S.Mahaboob Basha | P.Bhaskar prasad , P.Chakradhar Rao

Abstract

This paper presents an improved controller for the dual topology of the unified power quality conditioner (iUPQC) extending its applicability in power-quality compensation, as well as in micro-grid applications. By using this controller, beyond the conventional UPQC power quality features, including voltage sag/swell compensation, the iUPQC will also provide reactive power support to regulate not only the load-bus voltage but also the vol t-age at the grid-side bus. In other words, the iUPQC will work as a static synchronous compensator (STATCOM) at the grid side, while providing also the conventional UPQC compensations at the load or micro-grid side. Experimental results are provided to verify the new functionality of the equipment.

An EOQ Model for Imperfect Items Deterioration and Time Dependent Rates

International Journal of Science , Engineering and Management, Available online 29th June 2017

Kundan Mishra | -

Abstract

In the presented article we have developed an economic order quantity model at infinite planning horizon. Deterioration is taken into consideration. Demand and production rates are assumed to be time dependent. Production process is not reliable hence a percent of produced items is defective. A mathematical formulation has been done to find the optimum value of order quantity and total average cost. A numerical example is also given to illustrate the theoretical results. Finally the sensitivity analysis is reported to find the effect of different parameters.

An Experiental Investigation on Fresh And Durability Properties of Self Compacting Concrete using Various Blended Cements

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

P.Manjula | Prof C. Sashidhar

Abstract

Self compacting concrete is a concrete that can flow through congested reinforcing bars with elimination of compaction, and without undergoing any significant segregation and bleeding. SCC requires high volume of cement and sand. Use of high volume of cement increases CO2 emissions and leads to the green house effect, and continuous digging of sand from rivers causes depletion of rivers and creates lot of environmental problems. Use of supplementary materials may reduce the above problems with-out altering the SCC performance. This paper presents the fresh and durability properties of SCC using supplementary Cementatious materials like fly ash (25%), silica fume (10%) or Metakaolin (10%) robo sand in place of natural sand; coarse aggregate of size 12mm; GLINIUM 8630 as super plasticizer. The mix proportions were calculated by following European Federation of National Associations for Representing Concrete (EFNARC) guidelines. Mixes were prepared and tested for results. Slump flow, V-funnel and L-box tests are conducted to examine the fresh properties, acid (HCl&H2SO4) resistant and dry shrinkage are for the durability studies. This study shows that quaternary blended cement gives fresh properties and durability properties better than the ternary blended SCC

An Experiment on Effect of Mineral Admixture in Coconut Shell Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 21st September 2017

T.S. Lakshmi | K. Gunasekaran,K.S. Satyanarayanan

Abstract

The demand to make this material lighter has challenged scientists and engineers alike. The challenge in making a lightweight concrete is decreasing the density while maintaining strength and without adversely effecting cost. One such alternative is coconut shell (cs), as coarse aggregate in the production of concrete. Even though coconut shell possesses several desirable properties, its relative low tensile strength and deformation properties prompted many researches to work on to improve these properties. One such development of improving or modifying the properties of concrete is by supplementing the mineral admixtures with coconut shell concrete. Experimental investigations and analysis of results were conducted to study the compressive and flexural strength behavior of concrete with varying percentage of mineral admixtures. The concrete mix adopted were m25 with varying percentage of mineral admixtures ranging from 2%, 4%, 6%, 8%, 10%, 12%, 14%, 16%, 18%, 20%, 22%, 24%, and 26%. On the analysis of result the concrete with mineral admixtures in coconut shell had improved performance as compared to the ordinary concrete.

An Experimental Analysis of Spot Welding Parameters

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th June 2017

Ramkrishna Parihar | 

Abstract

in this experimental work, an attempt is made through ANOVA & using grey based Taguchi method is that weld time is found to be most significant factor. There were four input parameter which are weld time, hold time, weld current and electrode force are considered. There were three outputs attributed which is Tensile Shear Strength (TSS), Heat Affected Zone (HAZ) & Weld Nugget Diameter (WND) is taken. Analysis of variance (ANOVA) has been carried out with the help of Minitab 17 software.

An Experimental and Analytical Investigation on the Behaviour of Concrete Filled Steel Tubular Columns and Frames

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Mohammed Zakir Ali | Putte Gowda

Abstract

In this paper an attempt has been made to investigate the axial load carrying capacity of Concrete Filled Steel Tubular (CFST) columns. The grade of concrete is also one parameter which is studied in the present work. A total of 18 specimens were tested for axial compression. The height of compression members (columns) being 0.5m, 1.0m and 1.5m. Two empty hollow steel tubular columns for height 0.5m, 1m and 1.5m and two each for Concrete filled Steel Tube (CFST) columns for height 0.5m, 1.0m and 1.5m for M20 and M40 grade of concrete were tested. Finally Eurocode 4 and AISC-LRFD 2005 codes were used to compare the experimental results of Concrete Filled Steel Tubular (CFST) columns. The experimental results indicated that there was increase in the axial load carrying capacity of CFST columns from 17.3% to 19.7% and 22.2% to 38% for CFST columns filled with M20 and M40 grade of concrete respectively. The maximum percentage variation for experimental results and theoretical results of axial load carrying capacity of CFST columns evaluated in accordance with AISC-LRFD 2005 was around 21%. The maximum percentage variation for experimental results and theoretical results of axial load carrying capacity of CFST columns evaluated in accordance with Eurocode 4 was around 16%. Although there was some variation in the results between the experimental and theoretical results, but the experimental results were on the conservative side

An Experimental Investigation on Behavior of High Volume Alkali Activated Flyash Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

K.Sasidhar | S. Aruna Jyothy,Dr. B. Damodhara Reddy

Abstract

The usage of plain cement concrete in construction fields is a regular practice which has benefits on the other hand there are disadvantages also like emission of harmful gases and depletion of natural resources. As a part of remedial measures this project deals with the High volume Alkali Activated FlyAsh Concrete which reduces usage of OPC and increases quality of concrete. For obtaining better performance for FlyAsh, initially it has to be activated by any suitable base solution. The methodology involves partially replacing cement with 60% and 80% of FlyAsh with NaOH as alkali activator of 3M and 4M morality, adding with a variation of 3%, 5% and 7% with respect to weight of FlyAsh is considered. Results obtained after testing different mixes of High volume Alkali Activated FlyAsh Concrete under various tests and procedures of activation binding to IS codes show significant and desirable results when compared to controlled concrete but for final days of curing than initial ones.

An Experimental Investigation on Machinability of Titanium (Grade -2) using Cryogenic Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th July 2017

Samatham Madhukar | Dasari Jagath Prakash, Birudala Raga Harshith Reddy, Dr.V.V.Satyanarayana

Abstract

Among the group of super hard alloys, titanium is one of the fastest growing materials used in aerospace applications. The prime rationale for designers to choose titanium in their designs is its relative low mass for a given strength level and its relative resistance to high temperature. One drawback of these titanium material is their poor machinability. Many researches are going on to develop a machining technique that improves the machinability of hard materials. One such method that is under research for is cryogenic machining. In this type of machining the traditional coolant is replaced by the Liquid Nitrogen. Only the Liquid nitrogen is more preferable in machining because it is cost effective, safe, nonflammable and environmental friendly gas, in addition to that it cannot contaminate work piece, no separate mechanism for disposal .In this paper a machining test is conducted on the titanium Grade -2 material and the machining parameters temperature at the cutting area, cutting forces , power consumption , surface roughness are found by varying the speed, feed , depth of cut for the both normal machining and cryogenic machining.

An Experimental Investigation on Machinability of Titanium and Steels using Cryogenic Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th July 2017

Samatham Madhukar | Aitha Shravan , Katarapu Ram Kumar, J. Jagadesh Kumar

Abstract

Machinability is a property or quality of any material that can be clearly defined and quantified, to indicate how easy (or difficult) it is, to perform machining operations on it. In fact, the term is ambiguous, but the machinability of any material can be assessed using parameters like (i) tool life (ii) cutting forces (iii) power consumption (iv) surface finish and (v) chip morphology. In the current paper machinability of the materials like Mild steel, Stainless Steel and Titanium are studied; however special emphasis is given to Titanium as it difficult to machine due to high cutting forces, temperatures, chemical reactions with tools, and a relatively low modulus of elasticity. Titanium does not form a built-up edge on tools which is a common problem while machining steels and this result in good surface finishes even at low cutting speeds. The lack of a built-up edge, however, increases the alloying and abrading action of the thin chip which races over a small tool-chip contact area under high pressures. The combination of above characteristics and relatively poor thermal conductivity of titanium results in abnormally high tool-tip temperatures. To overcome this, one of the best techniques available is Cryogenic Machining. Cryogenic machining is a process in which the traditional lubrocooling is replaced by liquid nitrogen (LN2). Liquid nitrogen is more preferable in machining to dissipate heat generated because it is cost effective, safe, non-flammable and environment friendly gas. In addition, it does not contaminate work piece and no separate mechanism for disposal is required. In the current paper, the overall machining is done on turning machine and the parameters like Cutting forces, Surface finish, Temperature at cutting area and power consumption are obtained for the three materials. The overall results are tabulated and the conclusions are drawn accordingly. The main objective of the research is to improve the machinability of materials by using Cryogenic Machining techniques.

An Experimental Investigation on Machinability of Titanium and Steels using Cryogenic Machining

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 13th July 2017

Samatham Madhukar | Aitha Shravan,Katarapu Ram Kuma, J. Jagadesh Kumar

Abstract

Machinability is a property or quality of any material that can be clearly defined and quantified, to indicate how easy (or difficult) it is, to perform machining operations on it. In fact, the term is ambiguous, but the machinability of any material can be assessed using parameters like (i) tool life (ii) cutting forces (iii) power consumption (iv) surface finish and (v) chip morphology. In the current paper machinability of the materials like Mild steel, Stainless Steel and Titanium are studied; however special emphasis is given to Titanium as it difficult to machine due to high cutting forces, temperatures, chemical reactions with tools, and a relatively low modulus of elasticity. Titanium does not form a built-up edge on tools which is a common problem while machining steels and this result in good surface finishes even at low cutting speeds. The lack of a built-up edge, however, increases the alloying and abrading action of the thin chip which races over a small tool-chip contact area under high pressures. The combination of above characteristics and relatively poor thermal conductivity of titanium results in abnormally high tool-tip temperatures. To overcome this, one of the best techniques available is Cryogenic Machining. Cryogenic machining is a process in which the traditional lubrocooling is replaced by liquid nitrogen (LN2). Liquid nitrogen is more preferable in machining to dissipate heat generated because it is cost effective, safe, non-flammable and environment friendly gas. In addition, it does not contaminate work piece and no separate mechanism for disposal is required. In the current paper, the overall machining is done on turning machine and the parameters like Cutting forces, Surface finish, Temperature at cutting area and power consumption are obtained for the three materials. The overall results are tabulated and the conclusions are drawn accordingly. The main objective of the research is to improve the machinability of materials by using Cryogenic Machining techniques.

An Experimental Investigation on Machinability of Titanium and Steels using Cryogenic Machining

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th July 2017

Samatham Madhukar | Aitha Shravan ,Katarapu Ram Kumar ,J. Jagadesh Kumar

Abstract

Machinability is a property or quality of any material that can be clearly defined and quantified, to indicate how easy (or difficult) it is, to perform machining operations on it. In fact, the term is ambiguous, but the machinability of any material can be assessed using parameters like (i) tool life (ii) cutting forces (iii) power consumption (iv) surface finish and (v) chip morphology. In the current paper machinability of the materials like Mild steel, Stainless Steel and Titanium are studied; however special emphasis is given to Titanium as it difficult to machine due to high cutting forces, temperatures, chemical reactions with tools, and a relatively low modulus of elasticity. Titanium does not form a built-up edge on tools which is a common problem while machining steels and this result in good surface finishes even at low cutting speeds. The lack of a built-up edge, however, increases the alloying and abrading action of the thin chip which races over a small tool-chip contact area under high pressures. The combination of above characteristics and relatively poor thermal conductivity of titanium results in abnormally high tool-tip temperatures. To overcome this, one of the best techniques available is Cryogenic Machining. Cryogenic machining is a process in which the traditional lubro-cooling is replaced by liquid nitrogen (LN2). Liquid nitrogen is more preferable in machining to dissipate heat generated because it is cost effective, safe, non-flammable and environment friendly gas. In addition, it does not contaminate work piece and no separate mechanism for disposal is required. In the current paper, the overall machining is done on turning machine and the parameters like Cutting forces, Surface finish, Temperature at cutting area and power consumption are obtained for the three materials. The overall results are tabulated and the conclusions are drawn accordingly. The main objective of the research is to improve the machinability of materials by using Cryogenic Machining technique

An Experimental Study on Compressive Strength Behaviour of Polypropylene Fiber Reinforced Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Mr. Rahul G. Attarkar | Dr. S. P. Raut

Abstract

The role of construction materials is dominant in construction industry to obtained satisfactory results. The conventional concrete with traditional materials is unable to achieve desired strength at optimum proportioning of materials. Incorporation of additional materials such as fibers in conventional concrete improves its properties. In this present work a Polypropylene Fiber is used in cement concrete at different fiber content to study compressive behaviour of concrete after 7 and 28 days of curing. Results showed, Incorporating polypropylene fiber in cement concrete increases compressive strength. However excess dose of fiber affects workability of concrete.

An Experimental Study on Flexural Behaviour of Steel Fibre Reinforced Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Sandeep Gowda M | Ashwin K N,J K Dattatreya

Abstract

The objective of this study is to analyze the effects of steel fibre reinforcement in concrete for different dosages. Concrete mixes were prepared using M30 grade concrete with hooked end steel fibres of aspect ratio 80 (L/D where L=60mm and D=0.75mm) were added at a dosage of 0.25%, 0.5%, 0.75%, and 1.0% to volume fraction of concrete. The flexural strength was determined using a two point loading system. Load v/s deflections graphs were plotted for various percentages of fibre concrete specimens. Test results were compared with plain concrete specimen. From the experimental work it is found that with the increase in the steel fibre content in concrete there is an increase in flexural strength. The flexural strength at 1% steel fibre content is 9.1N/mm2 and the 0% fibre content is 5.78N/mm2 hence increase of 57.43% flexural strength is obtained.

An Experimental Study on Optimum Dosage of Ground Granulated Blast Furnace Slag for High Strength Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 17th August 2017

S.D. Mankar | S.S.Jamkar

Abstract

The present investigation is to use the waste product from steel industry which is helpful in cement production if it is ground at a fineness of cement which also helps to reduce the carbon emission. Ground Granulated Blast Furnace Slag (GGBFS) is used as a mineral additive for concrete production and substitutes for cement, it behaves as a binder material along with cement.The optimum dosage of GGBFS as cementitious material is characterized by high compressive strength, low heat of hydration, resistance to chemical attack, better workability, good durability and cost-effective.This paper presents a laboratory investigation on optimum level of ground granulated blast-furnace slag on compressive strength of concrete.18 concrete mix sample were cast with water to cementitious material (w/cm) ratio 0.32 and 0.30 each; using GGBFS as partial replacement of cement from 0% to 50% at an interval of 10%. The specimens were cured for 28 days in potable water. The compressive strength of concrete is examined.The test results revealed that the compressive strength of concrete mixtures containing GGBFS increases as the amount of GGBFSincrease, upto certain limit. The optimum dosage of GGBFS is found at. This can be explained by the presence of unreacted GGBFS, behaves as a filler material in the paste and not as a binder

An Experimental Study on Suppression of Vortex Shedding with Different Structural Configurations

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd August 2017

Sanal M V | Prof. Sunil A S

Abstract

The flow phenomena around bluff bodies or non-streamlined bodies in fluids are always of some engineering importance. Most of the engineering structures like buildings, bridges etc. can be considered as bluff bodies as far as the air or water flow in which the structure is being situated, is considered. This paper aims at the study of vortex induced vibration and suppression of the VIV on some common models of structures which can be considered, of having some engineering importance. The main parameter associated with the VIV formation is the Strouhal number (St.) which is the non-dimensional frequency of vortex shedding. The VIV was captured by using Fieldpaq Dynamic Signal Analyzer which has frequency ranges from 0 Hz to 40 kHz. The cylinders with varying number of fins and splitter plate length are tested. The methods to control VIV can be classified into three as active, passive or compound method. The passive method, would give some structural modifications on the model and considered to reduce the VIV formation. On the other hand,. Among these, the active and compound methods are costlier compared to the passive method. Therefore on an economic point of view the engineers are keen to develop more and more methods to suppress the VIV effectively with a lesser cost i.e., by employing the passive method. My study is on employing the model with straight fins.

An Improved Blind Source Separation Using Bispectrum Slide Detection in Blind Spectrum Sensing

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rina Parikh | Shreya Matta, Anusha Garg

Abstract

Cognitive radio is a pivotal solution to combat the existing problem of inefficient usage of spectrum bands. Spectrum sensing is one of the most important issues in cognitive radio system. The unlicensed secondary user should detect the available idle spectrum resource accurately and thus reuse it opportunistically. Blind spectrum sensing refers to a condition where the signal can be detected under low SNR environment without any prior knowledge about the gain, noise variance and threshold of the channel. Based on the concept of Random Matrix Theory and Blind Source Separation method, a novel spectrum sensing approach is proposed using Bispectrum slide detection analysis. The novel approach of combining Random Matrix Theory with Bispectrum Slide detection based blind source separation in blind spectrum sensing has been proposed in this paper. Simulation results of proposed algorithm are obtained in the form of receiver operating characteristic curves. The results indicate that the proposed approach gives better results with less complexity than commonly used blind spectrum detection techniques.

An Improved Brain Tumor Segmentation Method from MRI Brain Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th November 2017

A.Harshavardhan | Dr. Suresh Babu, Dr. T. Venugopal

Abstract

The objective of the paper is to segment the tumor region from the Magnetic Resonance Imaging (MRI) brain images. The method incorporates the following steps during the tumor localization process namely, smoothing, skull stripping, filtering, image enhancement, followed by defining the region of interest and segmenting the identified tumor region from the input MRI brain image. Experimental results concluded that the proposed method has better performance regarding segmentation accuracy and execution time karma when tested on 15 live brain images with significant tumor regions..

An Improved Genetic Algorithm in C for Knapsack Problem

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th August 2017

Manpreet Kaur | 

Abstract

Genetic Algorithms (GA) provide a simple method to solve complex optimization problems. The performance of a Genetic Algorithm mainly depends on the genetic parameters, operators and the fitness function used. This paper proposed an improved Genetic Algorithm to solve a NP-hard problem i.e. Knapsack problem. The Improved GA is implemented using C programming language. It gives better results when compared against an existing GA to solve the Knapsack Problem. This paper also proposes an optimal parameter setting for Knapsack Problem using GA.

An Improved Maximum Power Point Tracking Of Three Phase Grid Connected Based On Robust Nonlinear Controller

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 22nd September 2017

M.Sangeetha | C.Prasanna Kumari

Abstract

This paper presents a robust nonlinear controller design for a three-phase grid-connected photovoltaic (PV) system to control the current injected into the grid and the dc-link voltage for extracting maximum power from PV units. The controller is designed based on the partial feedback linearization approach, and the robustness of the proposed control scheme is ensured by considering structured uncertainties within the PV system model. An approach for modelling the uncertainties through the satisfaction of matching conditions is provided. The superiority of the proposed robust controller is demonstrated on a test system through simulation results under different system contingencies along with changes in atmospheric conditions. From the simulation results, it is evident that the robust controller provides excellent performance under various operating conditions

An Inexpensive Vision-Based System to Accurately Detect EOR for Automobile Safety

International Journal of Engineering Research in Computer Science and Engineering, Available online 18th November 2017

A.Sri Lakshmi | D.Shekar Goud

Abstract

Distracted driving is one of the main causes of vehicle collisions in the United States. Passively monitoring a driver’s activities constitutes the basis of an automobile safety system that can potentially reduce the number of accidents by estimating the driver’s focus of attention. This paper proposes an inexpensive vision-based system to accurately detect Eyes Off the Road (EOR). The system has three main components: 1) robust facial feature tracking; 2) head pose and gaze estimation; and 3) 3-D geometric reasoning to detect EOR. From the video stream of a camera installed on the steering wheel column, our system tracks facial features from the driver’s face. Using the tracked landmarks the system computes head pose and gaze direction

An Innovative High-Performance E-Governance of Its Citizens To The Services of The Center in Rajasthan State

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th July 2017

Praveen Kumar Sharma | Vijay Singh Rathore

Abstract

The growth of the internet is due primarily to the interests of the private sector, but the Government is now one of the revolutions. Governments all over the world are taking important steps to make their services and on the Internet to provide information. A range of e- Government have taken the initiative to improve the efficiency and effectiveness of the Government's internal operations, communications and civil and transactions of individuals and organizations. The Government of the use of information and communications technology tools to have a significant impact on the development and growth of the country. The importance of the major e-management in the current system is to enable national success and leading countries in this era of the digital economy in the context of government, IT and communications resources, is a concept is called e-governance.The purpose of this paper is to explore the e-Government of Rajasthan is the largest of the National is India. It is a typical task is to explore the integration of e-Government of Rajasthan, still in this article is simply trying to representatives of every aspect of governance in the State of Rajasthan in summary form.

An Integrated Energy Measurement Technique for Smart Grid

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

M.A.P.Nareshkumar | 

Abstract

Smart grid is the integration of advanced information, communication and networking technologies in traditional electric grid to make it smarter and faster in making decisions. With the increase in population, there is increase in the demand for electricity. Nowadays we are generating our own power for home and industries. We can reduce demand by selling power to grid after our own usage. Cost can vary in proportion to the demand. In this paper, we explain to implement a smart meter to display power both EB & generated Solar power, and provide for the actual power consumption. By monitoring both EB cost and renewable energy cost is up a single energy meter both selling and consuming power from grid to home and vice-versa can be known using GSM methods through if it possible to intimate the consuming and selling power from grid to consumers through Messages and also to Electricity Board for government data. The monthly EB cost should be intimated through messages by calculating both real time and critical time cost and also selling power to grid and reduced to determine the actual power consumed. We propose to implement a smart meter to display power both EB & generated Solar power, and provide for the actual power consumption.

An Integrated IVCCRL Approach for the reduction of Negative Bias Temperature Instability in an AES Core

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Anitha Patibandla | Dr.B.L.Raju

Abstract

Reliability of Circuits is one of the major concerns in VLSI circuits and systems designs. Negative Bias Temperature Instability(NBTI), which has a deteriorating effect on the threshold voltage and the drive current of semiconductor devices, is emerging as a major reliability degradation mechanism [1].An important Reliability issue in the recent times is the Negative bias temperature instability (NBTI) in the MOS circuits in Cryptographic cores. Many works propose hardware implementations of cryptographic primitives with the promise of reduction in area, power dissipation and cost. An integrated IVCCRL approach for the reduction of Negative Bias Temperature Instability in an AES Core using the techniques of Input Vector Control (IVC) and Reversible Logic (RL) is being proposed in this paper. The effect of input vector control investigated. Mini-mum leakage vectors, which lead to minimum circuit performance degradation and maximum leakage reduction rate, are selected and used when the circuit is in the standby mode. Analysis on the potential to save the circuit performance degradation by internal node control techniques during circuit standby mode is discussed. The optimization is done for the AES algorithm using NCL Reversible Gates for low power, low cost and low area. Simulation Results have been analyzed and presented.

An Integration of an UPQC In Micro-grid With Improving The Power Quality In Both Interconnected And Islanding Modes of Operation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

G.Venkatesh | L.Baya Reddy , D.B.Eswar Rao

Abstract

the placement, integration, and control of unified power quality conditioner (UPQC) in distributed generation (DG)- based grid connected/autonomous micro-grid/ micro generation (?G) system has been presented here. The DG converters (with storage) and the shunt part of the UPQC Active Power Filter (APFsh) is placed at the Point of Common Coupling (PCC). The series part of the UPQC (APFse) is connected before the PCC and in series with the grid. The dc link can also be integrated with the storage system. An intelligent islanding detection and reconnection technique (IR) are introduced in the UPQC as a secondary control. Hence, it is termed as UPQC?G?IR. The advantages of the proposed UPQC?G?IR over the normal UPQC are to compensate voltage interruption in addition to voltage sag/swell, harmonic, and reactive power compensation in the interconnected mode. During the interconnected and islanded mode, DG converter with storage will supply the active power only and the shunt part of the UPQC will compensate the reactive and harmonic power of the load. It also offers the DG converter to remain connected during the voltage disturbance including phase jump.

An Intelligent Appliance with Multimedia Capability

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Pooja.N | Ramya Sai.M,Rekha.P,Radha.S

Abstract

Smart refrigeration with the help of a smart fridge is a concept that finds its place in smart kitchens. The smart refrigerator is capable of sensing and monitoring its contents and is also able to remotely notify the user about scarce products via SMS (Short Message Service) and email using a GSM module. It also facilitates the purchase of scarce items by providing a link of the online website for purchase of that particular item. This assessment is done with the help of LDR and micro switches employed as pressure sensors (quantity management), odor sensor (quality management) and RFID (shelf life management). The overall food management is done based on coding done using Keil software for the same purpose.

An Intuitive Architecture for Next Generation Digital Personal Assistants

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Mehul Jain | Utkarsh Bhatia

Abstract

Current voice-based digital assistants despite their claims of being intelligent, lack abilities that a true personal assistant must possess like extendable skill set, dynamic adaptation and high context awareness. In this paper, we highlight some design and implementation requirements that must be met in order for the development of next generation digital personal assistants and propose a general architectural backbone that can be used to make headway for such personalized speechoperated assistive technology. In particular, we confer about issues of extensibility of the skill set used by the digital assistant, hypothesis generation and evaluation, extensive user adaptation, and redundant representations handling in the design. Further, we briefly discuss the research and development directions that are undertaken to tackle challenges put by such a system. We then consider a scenario and illustrate the data flow in our architecture.

An Investigation into Factors Causing Time and Cost Overrun in Marine Construction Projects in India

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th July 2017

Shrivas Abhishek | Dr. Saxena Anil Kumar

Abstract

The construction industry is of great significance to the economy of India. The Construction sector in India is the sixth largest economic activity in India and provides employment to a large group of people. However, it is infamous for projects overrunning time and cost. A large number of researches have been conducted to define causes of time and cost overrun in completing construction projects. A study on time and cost overrun of different types of Marine construction projects in India was conducted to determine the causes of overrun and their importance according to each of the project participant’s experience level, i.e., below 5 years, 5-10 years and above 10 years. The field survey conducted included 37 respondents of less than 5 years’ experience, 44 respondents of 5-10 years’ experience and 39 respondents of more than 10 years’ experience. The researcher identified 3 groups of factors causing overrun and in each group 6 factors were placed according to their nature, totaling to 18 factors of time and cost overrun. Data were gathered through a survey, analyzed by using Relative importance index, taking in view different experience levels

An Investigation of Corrosion Behavior at Weld Interface in SA 213 and SA 387 FWTPET Joints

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

P.G.Karuppanna Raja | Dr.M.Rajkumar

Abstract

Friction welding of tube to tube plate using an external tool (FWTPET) is a solid state welding process used for joining tube to tube plate of either similar or dissimilar materials with metallurgical properties. In the present study, FWTPET has been used to weld SA 213 tube with SA 387 tube plate and the corrosion behaviour at weld interface has been analyzed and the weld interface is found to have increased in corrosion resistance value due to the influence of the grain refinement after the welding process. Hence, the present investigation is carried out to analysis the corrosion behaviour at weld interface in the presence and absence of corrosion inhibitor Sodium Potassium Tartrate (SPT) with well water in friction welded dissimilar joints of SA 213 tube and SA 387 tube plate joints and the results are presented.

An Investigation of End-To-End Speaker Recognition Using Deep Neural Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Lakhsmi HR | Sivanand Achanta , Suryakanth V Gangashetty , R Kumaraswamy

Abstract

State-of-the-art automatic speaker recognition (SR) has been dominated by Gaussian mixture model-universal background model (GMM-UBM) based i-vector feature extraction methods. Although these systems are robust, extraction of ivectors is very time consuming and a separate classifier needs to be trained for decision making in the end. Inorder to alleviate the above disadvantages, in this paper we propose to use deep neural networks for end-to-end speaker recognition. We perform several experiments to determine the best suited architecture, the hyper-parameter tuning algorithm and the initialization scheme for SR task. The proposed method combines feature extraction and classification step, and is of very low foot print. Through objective metric (equal error rate) we show that the proposed method outperforms the GMM-UBM conventional system

An Investigation on Nearest Neighbor Search Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Upinder Kaur | (Dr.) Pushpa R Suri

Abstract

The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a dataset, is a tedious task that effects the quality and usefulness of the NNQ processing algorithms which determined by the time as well as space complexity. The simplest solution to the NNS problem is to compute the distance from the query point to every other point in the database. However, due to these complexities issue, the various research techniques have been proposed. It is a technique which has applications in various fields such as pattern recognition, moving object recognition etc. In this paper, a comprehensive analysis on data structures, processing techniques and variety of algorithms in this field is done along with different way to categorize the NNS techniques is presented. This different category such as weighted, additive, reductional, continuous, reverse, principal axis, which are analyzed and compared in this paper. Complexity of different data structures used in different NNS algorithms is also discussed.

An Investigation on Nearest Neighbor Search Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 16th August 2017

Upinder Kaur | (Dr.) Pushpa R Suri

Abstract

The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a dataset, is a tedious task that effects the quality and usefulness of the NNQ processing algorithms which determined by the time as well as space complexity. The simplest solution to the NNS problem is to compute the distance from the query point to every other point in the database. However, due to these complexities issue, the various research techniques have been proposed. It is a technique which has applications in various fields such as pattern recognition, moving object recognition etc. In this paper, a comprehensive analysis on data structures, processing techniques and variety of algorithms in this field is done along with different way to categorize the NNS techniques is presented. This different category such as weighted, additive, reductional, continuous, reverse, principal axis, which are analyzed and compared in this paper. Complexity of different data structures used in different NNS algorithms is also discussed.

An Optimized Approach for Relay Selection in Cognitive Radio Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Navya P | Sadiqa Bawoor

Abstract

The cognitive radio networks benefits has been well recognized in the wireless communication application. In this paper, a decode and forward protocol is implemented in order to increase the security of the system rather than only amplifying and forwarding. The analysis of throughput is also studied with a different approach of scanning the secondary users based on their even and odd numbers. Simulations are conducted for observation steps and average reward for different number of secondary users. The analyses is also done for the increase in throughput with the modified scanning methodology using the simulation.

An Powerful Instrument Landing System-A Review

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st August 2017

Naveen S V | Mr. Mani C, Dr. T.C.Manjunath

Abstract

It is commonly known that the directional pattern of the instrument landing system (ILS)-localizer antenna system, which constitutes the landing-course information for approaching aircraft, can be disturbed by reflections from large aircraft on the ground. Therefore, airport operators are interested in knowing configurations of landed and taxiing aircraft that lead to such ILS disturbance scenarios. Measurements on a real airport for investigating such scenarios are very cost-intensive and not sufficiently possible due to availability reasons. Therefore, a new scaled measurement setup is presented. Scaling down an aircraft by the factor of 144 requires a scaled ILS-localizer operating at a frequency of nearly 16 GHz, the development and realization of which is presented in this paper. Using this scaled ILS-localizer, measurements with an Airbus A380 and a Boeing B747 are conducted showing the feasibility of the scaled approach. Several configurations are shown where those aircraft lead to interferences of the ILS, exceeding allowed tolerances. A comparison of the reflection behavior of both aircraft shows only slight differences. Additionally, this paper presents the derivation of the bistatic radar cross section of both aircraft to be applicable to scenarios with arbitrary ILS patterns. The paper is the result of the seminar report undertaken by Mr. Naveen under the guidance of the faculty & the HOD

An Renewable Energy Source for Street Light Safety System Using Sensor and GSM

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 19th July 2017

Pagar Prajakta S. | Pandit Dnyaneshari H.,Meshram Apurva S.,Pawar Vijaya R.

Abstract

Now a day, the bridges, lanes, flyovers and highways consume a substantial amount of energy, making improved efficiency a significant challenge. For improving the efficiency, Solar Photo volatile based street light system is very common. But there are some limitations with this ordinary system because of the lack of intelligent performance. It is very essential to automate the system so that we can conserve energy and to maximize the efficiency of the system. However, the highway engineering integrated with smart control for energy optimization and provided safety to the vehicle has not been widely used. In these paper new method is suggested so, as to maximize the efficiency of highway lighting system using solar panel and conserved an energy usage with the help of IR sensor and LDR. This system uses a LDR which provide low resistance at day time and high resistance at night time; accordingly system turns on night time. The information about the vehicle position between IR sensors is transferred by using PIC microcontroller and LCD displays the present statement about the vehicle and GSM send the message to the control station hence we can take the immediate action if requiredsuch a way safety provided

Analysing Different Efficiency Evaluation Methods For Induction Motors

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Alphy Maria Abraham | Gilson Paul George,Josmy Jose, Reenu George

Abstract

Induction motors are the most commonly used machine in industry because of their robust nature. Energy management of induction motor is relevant as they form the bulk segment in industry. So online monitoring and efficiency estimation of the existing induction motors play a vital role in energy management. The air gap torque (AGT) method is a well established technique for determining the efficiency of an induction motor, since it is known to be highly accurate Unlike testing motor efficiency in a laboratory, certain methods given in IEEE Standard 112 cannot be used for motor efficiency evaluations in the field. For example, it is difficult to load a motor in the field with a dynamometer when the motor is already coupled to driven equipment. The motor efficiency field evaluation faces a different environment from that for which IEEE Standard 112 is chiefly written. A field evaluation method consists of one or several basic methods. This paper separates and compares the basic methods according to their physical natures.

Analysis & Simulation of Two Different MPPT Techniques for Photovoltaic System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Mrudani Wakhare | Rashmi Lohkare , Sneha khodke

Abstract

Photovoltaic (PV) is a technical name in which radiant (photon) energy from the sun is converted to direct current (dc) Electrical Energy. PV power output is still low, continuous efforts are taken to develop the PV converter and controller for maximum power extracting efficiency and reduced cost factor. The maximum power point tracking (MPPT) is a process which tracks one maximum power point from array input, varying the ratio between the voltage and current delivered to get the most power it can. In this paper the MPPT algorithm is implemented using Boost & Buck converter. The dynamics of PVA is simulated at different solar irradiance and cell temperature. The P&O MPPT technique is a direct control method enables ease to implement and less complexity.

Analysis and Design of R.C.C. T-girder Bridge under IRC Class AA and Class A Loading

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Sudarshan Prabhakar Patil | Kameshwar Rao Tallapragada

Abstract

Reinforced concrete bridges with different types of deck slab have been widely used for both road and railway bridges. The most common type is the slab deck used for short span bridges. For medium span in the ranges of 12 to 25 m T- Girder and slab deck is widely used. In the case of T Girder and deck slab type, the slab span in two directions since it is cast integrally with main girder and cross girder. The deck slab is generally designed for either by 70 R loading or class AA Tracked wheel loading. IRC recommends bridge designed for class AA loading should also be checked for IRC class A loading. However in conventional analysis many of the important considerations are ignored by the various designers, which proved out to be somewhat unrealistic during the pragmatic conditions. For an assessment of the load carrying capacity of a bridge, one needs to know the maximum bending moment and the shear force included in the beams or girders of the bridge by vehicular loads. These maximum design load effect can be calculated by the conventional method such as Courbon’s method. The main objective of study is to analyse super structure for IRC Class AA loading (Tracked vehicle) and IRC Class A loading to compute the values of bending moment, shear force and deflection for span range from 16 to 24 m. The analysis of super structure of different sections and spans is carried out by Courbon’s method using MS Excel and by using STAAD.pro software. The bending moment and shear force results obtained by STAAD.pro were less up to 18 m span when compared to results obtained by MS Excel and vice-versa as the span increased. The safe design section is obtained by deflection criteria.

Analysis and Mitigation of Harmonics Using Passive Filters

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Mathew Abraham | AnoopR,Barath S Kumar,LiyaDevassy

Abstract

Harmonics are the components of a distorted periodic waveform whose frequencies are integer multiples of the fundamental frequency caused mainly due to the non-linear loads. The effects of harmonics includes increased losses, equipment heating, loss-of-life etc. In this project we analysed the presence of harmonics due to the switching components and non-linear elements in a system. Using a fluke meter we could compare the performance of linear and non-linear elements in a power system. As it is necessary to eliminate the harmonics this project provides an explanation of the design of a passive filter for harmonic mitigation. A passive filter was designed for a 500W, 230V experimental setup and the harmonic distortion was found to be reduced. In addition to explaining the theory behind, useful observations and charts are included so that reader can use this information for the future analysis of their power system circumstances.

Analysis and Prediction of Chronic Kidney Disease using Data Mining Techniques

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th September 2017

Tabassum S | Mamatha Bai B G, Jharna Majumdar

Abstract

Data Mining in Healthcare has become a present trend for obtaining accurate results of medical diagnosis, Chronic Kidney Disease (CKD) has become an international fitness problem and is a place of concern. It is a situation where kidneys turn out to be damaged and cannot filter toxic wastes within the frame. By using Data Mining Techniques, researchers have the scope to predict the Chronic Kidney Disease. This helps doctors to diagnose and suggest the treatment at an early stage. It also helps the patients to know about their health condition at an earlier stage and follow necessary diet and prescriptions.

Analysis of BCH Codes for Different Channel Conditions in Lab VIEW

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Pramod G Joglekar | Pawan Kumar B

Abstract

In recent past digital data and its transmission over either in wired or wireless channel with the minimum bandwidth requirement and high data rate is playing vital role in communication field. According to studies done by Broadband Commission for mobile communication data transmission over wireless channel decides the growth in economic and social sector of the country. Increase in electronic gadgets and number of users in a geographical area is demanding the efficient utilization of bandwidth by assuring more number of users in a limited channel and high speed data rates in communication devices. In this paper a brief study is done to analyze and estimate the channel parameters for different channels considering BCH block code which is one of the efficient Forward Error Correction code.

Analysis of Blood Smear Images for Leukaemia Detection Using Data Mining Algorithms

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Vasundhara Acharya | Dr.Preetham Kumar

Abstract

Blood cell segmentation and extraction of characteristics of cells plays a vital role in the field of medicine. Blood count is used to analyze the overall health of a person. It can be used to identify diseases like anemia, infection and leukemia. White Blood cells, Red Blood cells and platelets forms the parts of blood. In laboratory, blood cell counting is done by using counting chamber known as Hemocytometer, Petri dish and microscope. The entire procedure involves the use of physicianís skills to prepare the plating which is very time consuming and inaccurate task. The aim of this research is to perform a survey on computer aided system that can detect and estimate the number of red blood cells and white blood cells in the blood smear image using image processing algorithms. Image processing algorithms involves the following steps: Inputting the image, pre-processing, image segmentation, feature extraction and applying appropriate counting algorithm. The main objective here is to gain knowledge about the different methodologies used for counting of red blood cells and extracting features of white blood cells. It also throw light on various research directions used.

Analysis of Building Integrated PhotoVoltaic (BIPV)

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Miss Pallavi Nitin Jajoo | Prof. (Dr.)P. S. Patil,Mr. M. M. Wagh

Abstract

Renewable Energy utilisation and correspondingly solar installations is not about fashion but about survival in todayís world. Going Green has become the watchword. In such a scenario the use of solar photovoltaics for the building illumination or utilisation for domestic purposes can significantly reduce the loads on grids as buildings account for more than 30% of total energy consumption. But growing consumer interest in distributed PV technologies and industry competition to reduce installation costs are stimulating the development of multifunctional PV products that are integrated with building materials. This emerging solar market segment, known as building-integrated PV (BIPV), continues to attract the attention of many stakeholders. BIPV offers a number of potential benefits, and there have been efforts to develop cost competitive Products for more than 30 years. In This dissertation, we examine, analyse and evaluate the performance of BIPV. With a focus on residential rooftop systems, and explore key opportunities and challeng

Analysis of Classification Methods for Diagnosis of Pulmonary Nodules in CT Images

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th June 2017

Capt. Dr. S.Santhosh Baboo | E.Iyyapparaj

Abstract

The main aim of this work is to propose a novel Computer-aided detection (CAD) system based on a Contextual clustering combined with region growing for assisting radiologists in early identification of lung cancer from computed tomography(CT) scans. Instead of using conventional thresholding approach, this proposed work uses Contextual Clustering which yields a more accurate segmentation of the lungs from the chest volume. Following segmentation GLCM features are extracted which are then classified using three different classifiers namely Random forest, SVM and k-NN.

Analysis of Data Using Hadoop and Mapreduce

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Bharti Kalra | Dr. Anuranjan Misra, Dr. D. K. Chauhan

Abstract

We are in the world of technology, where data is moving around all the time. This data is becoming bigdata when it comes in huge volume and data can be structured, unstructured or semi-structured. hadoop is the technology to analysis the big data. The objective of this paper is to analysis the data that is collected from the open source using the hadoop and mapreduce programming model.

Analysis of effect of Fiber Orientation & Stacking Sequence on Bending Strength of I-Section Composite Beam

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Ashish A. Desai | Sagar D. Patil, Pravin H. Yadav, Sadanand M. Ghanvat, Milind A. Patil

Abstract

The composite thin-walled beams like I-beams are extensively used as chief structural elements. Composite load carrying structures like aircraft wings, skin, tail planes have solid stiffeners for efficient load bearing abilities. This paper is intended to provide tools that ensure better designing options for composite laminates of I -beam. In this Paper an analytical method & FEM approach calculating bending stiffness, bending stress, bending strain of flange and web laminates. The results show the stacking sequence and fiber angle orientation strongly affects strength of composite I-beam

Analysis of Flow Structure by Varying Divergence Angle and Contour of Supersonic C-D Nozzles

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd August 2017

Vishnu | Mubarak A. K.

Abstract

The shock formation in rocket engine nozzles have been a significant area of study for researchers. The oblique shock formation has an adverse effect on the efficiency of nozzles. Here a CFD analysis of three contour nozzles with change in divergence angle was conducted using ANSYS Fluent. Supersonic jets emanating from a chocked, axisymmetric nozzle at different pressure ratios are analyzed here. The variation of shock structure with change in divergence angle is studied. While varying the geometry the length and area ratio of nozzles was kept constant. Care was taken to keep the nozzle exit angle zero degree. No shock free condition was observed even at design Mach number of M=1.5. Simulation has been done on a clear conical nozzle of divergence angle of 2.950, contour nozzles of divergence angles 40 and 50 respectively. The increase in divergence has shown considerable effect in flow properties. The pressure variation along center line was low for high divergence angle. The better design among the three was analyzed by comparing the static pressure, Mach number and density variation along the center line. These flow parameters were compared for two different pressure ratios. The contour nozzle with divergence angle 50 was found to be the best among the three in design. The axial velocity at the exit was compared among them the nozzle with highest divergence angle had higher axial velocity at exit, so it was inferred that the thrust exerted on the walls was higher. By analyzing the flow characteristics the nozzle with high divergence angle showed improved results.

Analysis of fuzzy logic controller based dual voltage source inverter to compensate unbalanced and nonlinear loads

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 10th October 2017

M. Sreelekha | K. Ravi Sankar

Abstract

This paper describes Fuzzy logic controller dual voltage source inverter (DVSI) to enhance the reliability and power quality of microgrid system. The reference currents for this scheme are produced by using ISCT (Instantaneous symmetrical component theory).ISCT makes DVSI to operate in grid injecting and grid sharing modes. This scheme makes the microgrid to exchange power generated by Distribution Energy Resources (DERs) and also to compensate the local unbalanced nonlinear loads. Fuzzy logic controller (FLC) is used in this proposed scheme instead of PI controller for the better quality of power. This proposed system topology is modeled and simulated in MATLAB/SIMULINK environment.

ANALYSIS OF LOCOMOTION VERSATILE HEXAPOD ROBOT SYSTEM FOR INDUSTRIAL AUTOMATION

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

S.Senthilkumar | P.Suresh , C.R.Tamizhanambi

Abstract

This paper exhibits the hexapod robot movement performance. We analyze the performance of the DC servo motor in the robotic system and to enhance the function, The Hexapod robot movement analysis was made using Virtual Robot Experimentation Platform (V REP) software. Through this simulation we can analysis the performance of hexapod robot body and legs movement in various parameters. The Robotic system was separately analyzed and the simulation results are given..

ANALYSIS OF LOCOMOTION VERSATILE HEXAPOD ROBOT SYSTEM FOR INDUSTRIAL AUTOMATION

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

S.Senthilkumar | P.Suresh , C.R.Tamizhanambi

Abstract

This paper exhibits the hexapod robot movement performance. We analyze the performance of the DC servo motor in the robotic system and to enhance the function, The Hexapod robot movement analysis was made using Virtual Robot Experimentation Platform (V REP) software. Through this simulation we can analysis the performance of hexapod robot body and legs movement in various parameters. The Robotic system was separately analyzed and the simulation results are given..

Analysis of Male and Female Consumers and Customer Experience Items in Retail Stores

International Journal of Science , Engineering and Management, Available online 29th June 2017

Pankaj Deshwal | 

Abstract

TheseThis study confirms how male and female differently evaluate the Items of the consumer experience in the retail store context. Researcher adopted convenient sampling technique for this study. Gender was considered as the demographic variable in this study. The output of one-way ANOVA test was used to show differences. All Items were taken from prior literature. The output shows there is only one Item that is recovery experience where male and female shows differences in their views. The results show that respondents responded their experience with a retail store as positive. All result of the Items is above 3.5 value that shows above average feedback.

Analysis of modern Rail problems and Designing of Multi Operational Railway Track Cleaner

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Manushree C | Shashank Saurav,Suman V,Yeriswamy Gouda,Anil Kumar

Abstract

In this present era, people live a very busy life. Number of people travel around every day via trains. As more people move around, the waste deposition is more. This is causing risk of unhygienic environment that may result in several diseases. This paper is an initiative to decrease that risk by designing vehicle which can run on railway tracks and clean the wastes like used bottles and papers etc. present on tracks and to remove the foul smell in order to keep the environment hygienic.

Analysis of Mutual Coupling effect in Micro Strip antenna arrays using IE3D

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Nataraj A N | Sindhu K S

Abstract

In this paper, effect of mutual coupling on the performance of micro strip antenna array is analyzed using IE3D simulation tool. Array is designed using rectangular micro strip antennas to operate at frequency 2.45GHz. Strength of the mutual coupling is measured by extracting parameter S21. It is observed from the simulations that gain of the array reduces as the mutual coupling increases. As the distance between antenna increases mutual coupling reduces but side lobe level increases.

Analysis of Power System Stability of IEEE 9 Bus System with TCSC and STATCOM

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Pratiksha Panchbhai | P. S. Vaidya

Abstract

In this paper series FACTS device TCSC and shunt FACTS device STATCOM is used to improve the stability of IEEE 9 bus system under fault condition. STATCOM is used to compensate the reactive power and TCSC is used to enhance the power transfer capability of the system. The IEEE 9 bus system is designed in MATLAB SIMULINK software by using the standard data. The system is first tested without any device and then the devices are connected one by one and the results are obtained. The analysis of results shows that without the FACTS device under fault condition there are a lot of oscillation in the system and it takes much time for the system to become stable whereas with FACTS device connected the system oscillations are reduced and also the system becomes stable in less time.

Analysis of Priority Scheduling Algorithm on the Basis of FCFS & SJF for Similar Priority Jobs

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Chandra Shekar N | Karthik V

Abstract

Scheduling is one of the most important activities of the process manager which take decision to choose which of the process in the ready queue will be assigned to the CPU. There are different types of scheduling algorithms available for taking decision. One of them is Priority Scheduling Algorithm, which is based on the priority assigned to each process. In priority scheduling the Processes are executed on the basis of priority, the process having highest priority is executed first. In case of similar priority FCFS is used. In this paper, the priority scheduling algorithm is used in such a way that, in case of similar priority SJF algorithm is used instead of FCFS and average waiting time and average turnaround time is calculated. The comparative analysis is performed on the SJF based priority scheduling and FCFS based priority scheduling to compare the average waiting time and average turnaround time

Analysis of Priority Scheduling Algorithm on the Basis of FCFS & SJF for Similar Priority Jobs

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Chandra Shekar N | Karthik V

Abstract

Scheduling is one of the most important activities of the process manager which take decision to choose which of the process in the ready queue will be assigned to the CPU. There are different types of scheduling algorithms available for taking decision. One of them is Priority Scheduling Algorithm, which is based on the priority assigned to each process. In priority scheduling the Processes are executed on the basis of priority, the process having highest priority is executed first. In case of similar priority FCFS is used. In this paper, the priority scheduling algorithm is used in such a way that, in case of similar priority SJF algorithm is used instead of FCFS and average waiting time and average turnaround time is calculated. The comparative analysis is performed on the SJF based priority scheduling and FCFS based priority scheduling to compare the average waiting time and average turnaround time

Analysis of pull-in Instability in Cantilever Microbeam

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 17th August 2017

Gajendra giri | 

Abstract

We make the static pull-in parameters of electro statically incited decreased width little scale cantilever bar. A computationally profitable single level of-flexibility model is utilized as a part of the setting of Ritz essentialness framework to clear the static attract parameters of the scattered electromechanical model that considers the impacts of flanking field capacitance. The exactness of this single dof show together with the variable-width likeness the Palmer's outlining model is set up through an examination with 3D obliged part reenactments. An interesting surface fitting model is proposed to depict the groupings of both the attract dislodging and attract voltage, over a sensibly wide combination of framework parameters. Idealize coefficients of the proposed surface fitting model are secured utilizing nonlinear apostatize examination. A superb understanding shows that the proposed associations are agreeably right to be securely utilized for the electromechanical plan of decreased little scale cantilever bars.

Analysis of Rayleigh & RICIAN Channel for OFDM System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Divya.B | T.P.Surekha , Arjun.K.R

Abstract

With large amount of energy consumed in wireless LAN (WLAN) system, it becomes an important and meaningful issue to reduce the energy consumption of wireless communication devices nowadays. Here we use IEEE 802.11P standard in order to reduce energy in wireless system. In this paper we draw our attention using with the concept of orthogonal frequency division multiplexing (OFDM) which is a special case of multicarrier transmission, where a single DataStream is transmitted over a number of lower rate subcarriers. The high data rate transmission capability through multipath delay spread, OFDM has been adopted in modern wireless communication systems. The main focus of our paper is analyzing the Rayleigh and Rican channel to know the performance of system. In order to analyze two channels the two parameter are used Bit Error Rate (BER) and Signal-to-Noise Ratio (SNR). Comparing both the channel with and without using Weiner filter is performed. The wireless channel is assumed to include Additive White Gaussian Noise (AWGN) and multipath fading.Simulation results show that the proposed algorithm can effectively reduce noise while using wiener filter.

Analysis of Routing Protocol for Different Packet Size Data Transfer over WSN

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 15th July 2017

Poonam Thakur | Rahul Pethe,r,Dr. G. M. Asutkar, Dr. S. A. Chaturvedi

Abstract

This paper describe to create distributed client node wireless sensor network using nRF24 wireless networking protocol to send their data on cloud through Ethernet based sink node. WSN widely used in health monitoring, environmental, traffic control, automation system. In each area we required sink and server node. We are presenting the results during evaluating WSN by using ATMEGA 32u4 Microcontroller, transceiver nRF24L01 with Ethernet Shield for Real Time Data Acquisition Process. For real time data acquisition system microcontroller Atmega32u4 is easily interfaced with nRF24. Client sensors continuously generates amount of data in the form of packets and frame (date, time, address, sample, data, CRC, ERC) which can easily reach to the destination and observed the result on different monitor format by using Ethernet Shield and open source API i.e. Thingspeak. Nowadays, WSN processes apply on different size packet formats for example text, images, or video data. In this work we proposed DSR, AODV, DSDV, AOMDV routing protocol using coding and compression technique for different parameters like energy, throughput, jitter, packet delivery ratio.

Analysis of Security and Privacy Features in Map Reduce on Clouds

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

K. Roopesh | M. Kiran Kumar

Abstract

Map Reduce is a programming prototype that enables for huge scalability across hundreds or thousands of servers in a Hadoop.. Map Reduce is extensively used daily around the world as an efficient distributed computation tool for a huge class of problems such as search, clustering, log analysis, different types of join operations, pattern matching, matrix multiplication and analysis of social networks. Privacy and security of data and Map Reduce computations are significant concerns when a Map Reduce computation is implements in public or hybrid clouds. In order to perform a Map Reduce functions in hybrid and public clouds, authentication of mappers-reducers, privacy of data-computations, Integrity and reliability of data-computations and freshness-correctness of the outputs are mandatory. Satisfying these necessities defend the operation from a number of types of attacks on data and Map Reduce computations. In this Security and privacy challenges and needs, considering a range of adversarial capabilities, and characteristics within the scope of Map Reduce. We presented security and privacy protocols for Map Reduce and talk about their transparency problems.

Analysis of Seismic Performance of an RC Building Retrofitted with Buckling Restrained Braces

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Megha S. Joy | Bindu Biju

Abstract

According to recent earthquake histories, damages and collapses in structures caused greater loss in life and property. So, it is very important to develop an alternate method to enhance the earthquake resistance of building by more realistic approaches to seismic retrofitting after examining the current building codes. The main aim of seismic retrofitting is increasing lateral strength, strength and ductility. Buckling restrained braces (BRBs) is used for retrofitting with the property to yield both in tension and compression and also increases strength and stiffness. This study presents, analysing G+6 storey RC building seismically retrofitted with BRBs having storey-height 3m for gravity and seismic loads for desired parameters such as storeydisplacement relation, base shear, inter storey drift etc. The configurations of BRB used in this study are inverted V, V bracing, cross, forward and backward diagonal configuration. The comparative study between building with and without BRBs is done.

Analysis of Seismic Performance of an RC Building Retrofitted with Buckling Restrained Braces

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Megha S. Joy | Bindu Biju

Abstract

According to recent earthquake histories, damages and collapses in structures caused greater loss in life and property. So, it is very important to develop an alternate method to enhance the earthquake resistance of building by more realistic approaches to seismic retrofitting after examining the current building codes. The main aim of seismic retrofitting is increasing lateral strength, strength and ductility. Buckling restrained braces (BRBs) is used for retrofitting with the property to yield both in tension and compression and also increases strength and stiffness. This study presents, analysing G+6 storey RC building seismically retrofitted with BRBs having storey-height 3m for gravity and seismic loads for desired parameters such as storeydisplacement relation, base shear, inter storey drift etc. The configurations of BRB used in this study are inverted V, V bracing, cross, forward and backward diagonal configuration. The comparative study between building with and without BRBs is done.

Analysis of Signals Affecting the Quality of Power

Journal of signal processing and wireless technologies, Available online 20th July 2017

Shilpa.R | Savitha Shetty K L., P. S. Puttaswamy

Abstract

Electricity is the most revolutionary development in the human history. Efficient transmission of electric power is of at most importance in the current scenario.power Quality is an important concern for utility as well as consumers. Power quality is one of the major concerns and emerging issues in the present era. ‚ÄúPower quality is a set of electrical boundaries that allows a piece of equipment to function in its intended manner without significant loss of performance or life expectancy‚ÄĚ. With increasing quantities of non-linear loads being added to electrical systems, it has become necessary to investigate the power quality issues as all electrical devices are prone to failure when exposed to one or more power quality problems. The Hilbert transform is an important operator in signal processing, e.g., the definition of the ‚Äúanalytical signal‚ÄĚ uses the Hilbert transform. All kinds of transient power quality events occur frequently, causing power equipment damage and even lead to large scale blackout. Hilbert Huang transform is better than traditional transform approaches. Features are extracted from the power electrical signals by using Hilbert Huang Transform (HHT). Hilbert-Huang transform, is developed by the need to analyze the non-linear and non-stationary data.It is expected to detect the characteristic features from the PQ disturbance signals, which are obtained using Multivariate Empirical Mode Decomposition [MEMD] method

ANALYSIS OF SMI,LSMI,KALMAN BASED LMS AND KALMAN BASED RLS FOR ADAPTIVE BEAMFORMING

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

G.Essakki Priyanka | C.Gayathri , Nazneen Ansari , Dr.G.Indumathi

Abstract

when the array steering vector is known then in adaptive beam forming we can have resolution and interference rejection capability. In this paper we propose a variety of approaches like SMILSMI,Kalman based LMS and Kalman based RLS for adaptive beamforming through simulation result various adaptive beamforming algorithm can be analysed.

Analysis of Soil using Spectral Signatures

International Journal of Engineering Research in Computer Science and Engineering, Available online 26th October 2017

Mrs. Chitra. M. Gaikwad | Prof. Dr. S. N. Kakarwal

Abstract

Soil contains organic matter, clay and particles of rock. The composition of soil varies physically as well as chemically which is important for plant growth. The traditional techniques to measure soil contents are time consuming while remote sensing provides efficient techniques for mapping these contents. The visible infrared, near infrared and short wave infra red bands of electromagnetic spectrum are used to study the soil without destructing its properties. In this paper we present the study of soil spectral signatures. The study of soil is carried out using spectral signatures obtained by using ASD field spectrometer. The association between the spectral data and the soil contents is carried out. The soil samples were collected from Shendra and Chikhalthana in Aurangabad district Maharashtra state (India). Principal component analysis is applied to these spectra for classification purpose.

Analysis of Speed Control of Three Phase Induction Motor by V/f Method Using SVPWM Technique

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Stuti Yadav | 

Abstract

This paper deals with ďAnalysis of speed control of three phase induction motor by V/f Method using SVPWM TechniquesĒ. Induction motor is widely used in industrial plant because we can easily control the speed of the motor by using different techniques. There are so many techniques for the speed control of induction motor like voltage control method, pole changing arrangement, cascade control, V/f method. Rotor resistance control method is used for slip ring induction motor. In V/f Method ac supply is rectified & then applied to a PWM inverter to obtain a variable voltage and variable frequency. By this method we can get different synchronous speed with almost same maximum torque. Thus, the motor is completely utilized & also we have a good range of speed control. BY using SVPWM techniques output voltage obtain will be more than the output voltage obtain by SPWM technique thatís why we are this technique & efficiency of the motor is also improved it means it is more efficient above 90% at full load.THD in the line voltage & line current is also less. This technique is used for speed control of induction motor is used for both constant and fan type load. By using this technique induction motor replace the separately excited dc motor because dc motor takes time to time maintenance for commutator and brush holder. Due to which cost of the drive system is increases. A 4.4kW squirrel cage induction motor is used for analysis purpose. Simulation results are obtained.

Analysis of Surface Roughness and Delamination of Sheet Moulding Composite (SMC) During End Milling Using Taguchi Method

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 23rd August 2017

M.P. Jenarthanan | KalyanKiranChippada, Nikhil Raghavan Guduri

Abstract

This study aims to develop a mathematical model for analyzing the surface roughness and delamination factor and to infer the influence of the individual input machining parameters (cutting speed, depth of cut and feed rate) on the responses in milling of Sheet Metal Composite (SMC) with solid carbide end mill cutter coated with PCD using Taguchi methodology. In Taguchi methodology, three factors and two responses were employed to carry out the experimental investigation. Multiple Regression Analysis from ‚ÄúMinitab‚ÄĚ software was used for regression and graphical analysis of the data were collected. The optimum values of the selected variables were obtained by solving the regression equation. Analysis of variance (ANOVA) was applied to check the validity of the model and for finding the significant parameters. It is seen that Feed rate is the most influencing factor in affecting the surface roughness and delamination. In SMC composite as the speed and feed increases the surface roughness value decreases. Moderate feed and speed gives ideal finish. But the parameter depth of cut shows a wavy nature. Only for a very high depth, the roughness increases. The optimized values of the machining parameters were used to calculate the surface roughness and delamination factor of the machined surfaces, with the chosen range resulting with 93 per cent.

Analysis of tensile and hardness properties of Aluminium7075 based Metal Matrix Composite

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 2nd August 2017

Mohan A. E | Girisha H. N, Amarnath G

Abstract

Aluminum 7075 alloys have been proposed for extensive use in automotive engine applications and there have been discrete cases of experimental implementation. In order to enhance the usability of this material, it has been investigated in composite forms with various ceramic reinforcements. Viability of the different constituents depends on the compatibility of their physical and chemical properties. The service conditions are characterized by extreme stress and temperature conditions very close to failure. Hence thermal stresses play an important role in success of these materials. In this present investigation efforts are made to study the mechanical properties of as cast and heat treatment aluminium nitride particulates reinforced Al7075 composites, containing aluminium nitride particulate of 2-3 microns in different compositions. The vortex method of stir casting was employed, in which the reinforcements were introduced into the vortex created by the molten metal by means of mechanical stirrer. Castings were machined to the ASTM standards on a highly sophisticated lathe. The degree of improvement of mechanical properties of MMCs is strongly depending on percentage composition of aluminium nitride particulate reinforcements. An improved mechanical properties are occurs on reinforced compared to unreinforced MMCs

Analysis of Underwater Acoustic Channel for OFDM System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Jayashree C S | T.P.Surekha , Arjun.K.R

Abstract

Underwater acoustic channel has the characteristics of severe multipath, rapid variation and estimation of its phase is difficult task. Hence achieving high data rate and reliable communication is a challenge for Underwater Acoustic Channel (UAC). Orthogonal frequency division multiplexing (OFDM) has emerged as a promising modulation scheme for underwater acoustic (UWA) communication. Inter symbol interference (ISI) can be avoided by transmitting a number of narrowband subcarriers by using a guard time. This paper deals with the evaluation of Bit Error Rate (BER) of Orthogonal Frequency Division Multiplexing (OFDM) system under different combinations of modulation techniques with convolution channel coding at different coding rates

Analysis of various human synovial joint replacements: A review

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd July 2017

Sugandha | Dr. Puneet Katyal, Dr. Munish Gupta

Abstract

Human body has six types of synovial joints throughout. These joints can be damaged by arthritis and other diseases, injuries, or other causes. Replacing a damaged joint or a paining joint can relieve pain and help one move and feel better. For fabrication of prosthesis, study and analysis of human synovial joints is required. Hips and knees are replaced most often. Other joints that can be replaced include the shoulders, fingers, ankles, and elbows. To better understand the behaviour of replacement joints, various studies have been conducted and formulations have been done on similar systems. In this review paper an attempt has been made to understand the basics of synovial joint, and various studies and analysis done on implants using mathematical and simulator methods

Analysis of various human synovial joint replacements: A review

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 28th July 2017

A Muthuvel | Ashish Kashyap, Arun Kumar, Akash Chobey,Alok Kumar

Abstract

Transfer of heat from one fluid to another is an important operation for most of the chemical industries. The most common application of heat transfer is in designing of heat transfer equipment for exchanging heat from one fluid to another fluid. Such devices for efficient transfer of heat are generally called Heat Exchanger. A heat exchanger is a piece of equipment built for efficient heat transfer from one medium to another. The media may be separated by a solid wall to prevent mixing or they may be in direct contact. Heat exchangers are widely used in space heating, refrigeration, air conditioning, power plants, chemical plants, petrochemical plants, petroleum refineries, natural gas processing, and sewage treatment.

Analysis, Design and Implementation of a Single Phase AC-AC Buck Boost Converter

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 20th September 2017

Kalkutakinahal Akhilesh Reddy | M.N.S. Yogananda Reddy, G. Kishor

Abstract

This paper presents a performance analysis and implementation of Single phase AC-AC Buck Boost Converter. This converter controls the voltage and current delivered to load. The performance of this converter emphasize on the output harmonic content and also on the effective utilization of the input voltage. This converter can be used in practical circuits like speed controlling of Induction motor, traction motor control etc. A single phase AC-AC Buck Boost converter is simulated and implemented to demonstrate the converter features using PSIM.

Analysis, Modeling and Simulation of Fixed Beam Cantilever Using Eigen Frequency

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

B Jyoti | Girija.M.Nimbal , S.V.Halse

Abstract

The modeling is performed by using the finite element analysis software, COMSOL Multiphysics, Structural Mechanics modules, version 4.3. The purpose of the study of static analysis is to find the magnitudes and locations of the maximum strain, stress, and electrical potential on the cantilever beam when an external static load is applied to the beamís free end. The eigen frequency analysis is then performed to find the first six modes of frequencies and the deformation pattern of the beam. The timedependent analysis is used to solve for the transient solution when the applied external load is time dependent and has a frequency that is close to the beamís 1st natural frequency. Such a dynamic load should cause the beam to have maximum strain, stress, and electrical potential than a dynamic load with a frequency further away from the beamís natural frequency. In this paper analysis modeling and simulation of natural frequency of a fixed Ėend beam made of silicon, with a geometry and dimensions of beam having width 40x10-6 m, depth (thickness) 6x10-6 m, length 600x10-6 m. and subjected to a longitudinal stress at 187MPa.

Analysis, Modeling and Simulation of Fixed Beam Cantilever Using Eigen Frequency

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

B Jyoti | Girija.M.Nimbal , S.V.Halse

Abstract

The modeling is performed by using the finite element analysis software, COMSOL Multiphysics, Structural Mechanics modules, version 4.3. The purpose of the study of static analysis is to find the magnitudes and locations of the maximum strain, stress, and electrical potential on the cantilever beam when an external static load is applied to the beamís free end. The eigen frequency analysis is then performed to find the first six modes of frequencies and the deformation pattern of the beam. The time-dependent analysis is used to solve for the transient solution when the applied external load is time dependent and has a frequency that is close to the beamís 1st natural frequency. Such a dynamic load should cause the beam to have maximum strain, stress, and electrical potential than a dynamic load with a frequency further away from the beamís natural frequency. In this paper analysis modeling and simulation of natural frequency of a fixed Ėend beam made of silicon, with a geometry and dimensions of beam having width 40x10-6 m, depth (thickness) 6x10-6 m, length 600x10-6 m. and subjected to a longitudinal stress at 187MPa.

Analytical Assessment of Residual Fatigue Life of Steel Truss Girder

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

R H S Bhaskar | Prof. M.Muthukumar, Narasaiah Naidu

Abstract

Majority of the railway bridges are under study as they are facing the risk of their service life completion. The present study describes the importance of the residual fatigue life available for a truss bridge. The modeling and analytical work was done using TEKLA Structures 17.0. The analytical interpretation of the stress range of the model with the load cycles taken by the structure were co-related to obtain the necessary parameters. The most common method used is Miner’s damage contribution. The effect due to variation of loading amplitude is approximated by means of deterministic approach. Finally the obtained results will be compared with the BS-5400.

Analytical study of patients with breast cancer reporting late to Regional Cancer Centre, Allahabad and its association with sociodemographic profile in Indian women

International Journal of Science , Engineering and Management, Available online 22nd August 2017

Ravi KiranPothamsetty | Radha Rani Ghosh, Baby Paul Thaliath

Abstract

Breast cancer poses a major threat to public health attributing to the fact that for every two women newly diagnosed with breast cancer, one woman dies of it in India. To explore factors associated with delay in seeking referral for cancer treatment among breast cancer patients and evaluate the association between late presentation of the breast cancer and sociodemographic profile. This analytical study design has been conducted at RCC from January 2015 to January 2016.Total patients enrolled in the study was 376 women. Data were collected and recorded using a structured interview technique by the doctors. 31% (n=117) of were attributed to patient delay and system delay respectively. The most common reason of patient delay and system delay were usage of alternative medicines (33%) and delay in sanctioning money through government schemes (33%) respectively. Family history, educational background, economic status, occupation, religion, personal history of breast disease, stage grouping and pattern of presentation were significantly associated with late reporting to RCC (p < 0.05). Significant numbers of women with breast cancer in Allahabad experience reported late to RCC due to poor awareness and misconceptions of the disease. Interactive and comprehensive public health strategy should be implemented for annihilation of barriers.

Analyzing Internet DNS (SEC) Traffic with ?R? For Resolving Platform Optimization

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

J Uma Mahesh | Harekrishna Allu , N Chandrakanth

Abstract

This paper proposes to use data mining methods implemented via R in order to analyze the Domain Name System (DNS) traffic and to develop innovative techniques for balancing the DNS traffic according to Fully Qualified Domain Names (FQDN) rather than according to the Internet Protocol (IP) addresses. With DNS traffic doubling every year and the deployment of its secure extension DNSSEC, DNS resolving platforms require more and more CPU and memory resources. After characterizing the DNS(SEC) traffic thanks to reduction in dimension and clustering methods implemented with R functions and packages, we propose techniques to balance the DNS traffic among the DNS platform servers based on the FQDN. Several methods are considered to build the FQDN-based routing table: K- means clustering algorithm, mixed integer linear programming, and a heuristic scheme. These load balancing approaches are run, and evaluated with R on real DNS traffic data extracted from an operational network of an Internet Service Provider. They result in reducing the platform CPU resources by 30% with a difference of less than 2% CPU between the servers of a platform.

Analyzing Internet DNS (SEC) Traffic with ‚ÄēR‚ÄĖ For Resolving Platform Optimization

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Uma Mahesh | Harekrishna Allu ,N Chandrakanth

Abstract

This paper proposes to use data mining methods implemented via R in order to analyze the Domain Name System (DNS) traffic and to develop innovative techniques for balancing the DNS traffic according to Fully Qualified Domain Names (FQDN) rather than according to the Internet Protocol (IP) addresses. With DNS traffic doubling every year and the deployment of its secure extension DNSSEC, DNS resolving platforms require more and more CPU and memory resources. After characterizing the DNS(SEC) traffic thanks to reduction in dimension and clustering methods implemented with R functions and packages, we propose techniques to balance the DNS traffic among the DNS platform servers based on the FQDN. Several methods are considered to build the FQDN-based routing table: K- means clustering algorithm, mixed integer linear programming, and a heuristic scheme. These load balancing approaches are run, and evaluated with R on real DNS traffic data extracted from an operational network of an Internet Service Provider. They result in reducing the platform CPU resources by 30% with a difference of less than 2% CPU between the servers of a platform.

Analyzing the Customer Switchover Behavior in Mobile Communication

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ajeesh S Nair | Pramod V R, Jithin S

Abstract

This research focuses on developing an integrated model to understand and enlist the interrelationship between various aspects for motivating customers to switch their mobile (telecom)connection; categorize them into four clusters based on their driving and dependence powers. In order to achieve this, frame work, based on the inter relationship between the parameters has been developed and these parameters was observed having high interrelationship. The executives involved in mobile networking business could be the beneficiaries of this study as the result from this research will enable them to attract new customers so as to increase their number of connections and also to prevent their existing customers from switching connection. The parameter used in this research is based on the current global telecom scenario so that the result of the research is completely relevant and practically applicable in the contemporary telecom market.

Analyzing tweets for Real-Time Event Detection and Development of Earthquake Reporting System

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Sumanth V | Aman A. Saxena, Jeevan B, P. Vinay, [Vageesha N. J.

Abstract

Twitter, a popular micro blogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occurs, people make many Twitter posts (tweets) related to the earthquake, which enables detection of earthquake occurrence promptly, simply by observing the tweets. As described in this paper, we investigate the real-time inter- action of events such as earthquakes, in Twitter, and pro- pose an algorithm to monitor tweets and to detect a target event. To detect a target event, we devise a classifier of tweets based on features such as the keywords in a tweet, the number of words, and their context. Subsequently, we produce a probabilistic spatiotemporal model for the tar- get event that can find the center and the trajectory of the event location. We consider each Twitter user as a sensor and apply Kalman filtering and particle filtering, which are widely used for location estimation in ubiquitous/pervasive computing. The particle filter works better than other com- pared methods in estimating the centers of earthquakes and the trajectories of typhoons. As an application, we construct an earthquake reporting system in Japan. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earth- quake by monitoring tweets with high probability (96% of earthquakes of Japan Meteorological Agency (JMA) seismic intensity scale 3 or more are detected). Our system detects earthquakes promptly and sends e-mails to registered users. Notification is delivered much faster than the announcements that are broadcast by the JMA.

Android Speech Recognition Based Voice Command Notice Board

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th July 2017

Manikandan J | Sunaina K Bari, Dimple Prasad Hari, Suchithra P, Chaithra N C

Abstract

In this paper, the development of simple and low cost Android based wireless notice board is presented. The proposed system uses either Bluetooth or Wi -Fi based wireless serial data communication. For this purpose Android based application programs for Bluetooth and Wi-Fi communication between Android based personal digital assistant devices and remote wireless display board are used. At receiver end, a low cost microcontroller board (Arduino Uno) is programmed to receive and display messages in any of the above communication mode. Using the developed system, two different applications for displaying messages on a remote digital notice board and wireless person calling has been implemented. The developed system will therefore aims in wirelessly sharing the information with intended users and also helps in saving the time and the cost for paper and printing hardware.

ANN Control And Comparitive Methods for Analogue Switched Reluctance Motor Drives

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Malini K V | K.Gopinath, M. Savitha, Yeshwanth. S, Sai Prasad K V

Abstract

The Switched reluctance motor is a well known motor for its ruggedness, simple structure, adoptability and inexpensive manufacturing. This paper presents a suitable way of the drive using ANN method of switching. Its linear model switching and characteristics makes the drive suitable for different methods of drive control. Its dynamics, parameters and control characteristics are discussed in detail. The artificial neural network gives the possibility of controlling the drive for various conditions. This paper discussed the methods of control of SRM in various ways and compares the methods. Artificial Neural Networks are computational models used to obtain complex nonlinear relationships between input and output variables. It is one of the powerful modeling techniques, based on a statistical approach, presently adopted in the field of engineering, The key methods of fuzzy logic and ANN mapping by adjusting the controller gain.The scaling factor fine tuned to give tuning mechanism. The reduction in the number of fuzzy sets of controllers improves the characteristics and thereby reduces the number of sets.

ANPR Camera Based Smart Parking Management System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 11th October 2017

Puneeth G | Rohit Anand, Saurabh Jaiswal

Abstract

There are more than one billion cars being used for moving from one place to another but there is a scarcity for parking those vehicles, parking has become a major problem. In some metropolitan areas, finding a parking space for the vehicles during the rush hours is difficult for drivers. The difficulty arises from not knowing where the available spaces may be at that time. Another difficulty that is often faced by the people is to locate their cars when they forget where they last parked there car. The cameras that are used in the existing parking areas are only meant for video surveillance and cannot help in such situations as there is a lack of proper car parking management and guidance system. This paper discusses an innovative car parking management system based on Automatic Number Plate Recognition (ANPR) camera where the system will allow only the authorized cars to enter the parking lot, denying access to unauthorized cars. This system is also designed to guide the car to the nearest parking slot which is available

ANTI ASSAULT

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

J.Vaishnavi |  Eesita Sen, M.K.Liza

Abstract

These days physical attacks, harassments and molestations are the common practices that are being done very frequently across the globe. Safety is a prerequisite but not handy. So to bring it in the hands of the needy Anti Assault is being developed. The basic ideology behind this app is to protect victim who is subjected to different types of attacks or assault. It will be a very helpful app in future to instantly escape from danger and also catch hold the crime practiser.

Anti-Pilferage Ticketing System for Public Transport

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Saira Sultana | Venkatesh H, Jithendra N, Sangeeta A Tagari, Jacob Monsy

Abstract

The paper based public transport ticketing system, prevailing in mega-cities such as Bengaluru, introduces severe problems and corruption in the system. The project suggests a much more user friendly, automated system of ticketing with the use of RFID based cards. The RFID based cards can be preferred over the conventional system due to low cost, easy operation, portability, durability, reliability and more user friendly to use. In the existing system monthly or yearly passes are issued, which can be easily forged and manipulated thereby corrupting the system. In conventional paper based ticketing system, tickets are being printed and thrown away after traveling, thereby littering the environment. Moreover, large numbers of trees are being destroyed since the current system uses paper based ticketing and the used tickets are just wasted. Therefore by promoting RFID based cards passengers can be encouraged, overtime to shun paper tickets in favour of monthly or yearly RFID based passes issued by the concerned authorities.

Antipiracy Screen System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 13th September 2017

Savita.C.H | Kajol R D, Monica N,Latha S,Anil Raju Wadeyar

Abstract

Film theft has such a profound impact on a wide range of economy that it is a crime in almost all countries. One major source of the movie piracy is camcorder piracy i.e., movies are recorded by portable devices inside theaters and then sold on internet and grey markets. Different techniques and strategies are explored to overcome the problem and secure the digital cinema content, some are based on spatiotemporal modulation of light, watermarking techniques, maximizing annoyance and temporal effects. This paper deals with a projection technique to avoid piracy in movie theaters. We aim to defeat camcorder piracy by severely degrading the visual quality of the recorded movie while making the interference signals invisible to the audience. Infrared emitters are installed in movie theaters to interfere with the camcorder and create glares in the recorded frames.

Apartment Automation and Security System Using PLC

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

S. V. Viraktamath | Sindhu D. Hegadekatte , Sangeeta M. Achari, Sudharani Y. Khawast, Swapna G.M , Swapna G.M

Abstract

The most important source of motivation in continuity of technological developments is to upgrade human living standards. The technological development provides and increases human-beingsí safety and comfort directly and indirectly. Developing technologies for this purpose directly affects the life standards by means of smart home systems design. In this paper the implementation of apartment automation and security system using PLC is proposed. The control of the ventilation, lighting and security units in the smart home were carried out. The output from the different sensors is given to PLC which in turn controls the system by switching ON or OFF the actuators.

APF with PI Controller Based Harmonic Reduction in Micro Grid Distribution System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

D.Sai Krishna Kanth | G. Venkatesh , P. Lakshmi Devi

Abstract

In distribution systems, the nonlinear loads draws non-sinusoidal currents from the AC mains due to sudden increase or decrease of load and also affects the load harmonics and reactive power. It also produces excessive neutral currents that give smog in power systems. Due to the nonlinear features and fast switching of power electronic devicesmost pollution problems are created in power systems. The Shunt active power filter(SAPF)controlled PWM converters are based on currentand has seen as a most viable solution. So the harmonics and reactive power compensation is presented in this paper from 3P4W micro-grid distribution system by PI controlled shunt active power filter (SAPF). The technique used to generate desired compensation current extraction is based on offset command instantaneous currents distorted or voltage signals in the time domain because compensation time domainresponse is quick and it produces easy implementation and lower computational load than the frequency domain.The MATLAB/Simpower Systems tool has proved that the combined system inject maximum power and compensate the reactive power and harmonic current drawn by nonlinear loads.

Application of Deep learning Techniques to Natural Language Processing

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Sonam Gandotra | Bhavna Arora

Abstract

Deep learning refers to artificial neural networks comprising of multiple layers. The deep learning algorithms automate the representation of abstract features by composing simple representations from raw data at one level to complex representations at the higher. These algorithms have improved the current state of art results and bought new insights to the current data. In this paper, the deep neural architectures and their application on NLP have been discussed. The paper also evaluates the various approaches to train the data. Various classifications of deep neural nets are also an integral part of the paper. On the basis of architecture and transfer of information from input to output layers via hidden layers, deep neural nets have been broadly classified and elaborated. Brief comparisons of the various techniques used in deep neural networks on various parameters are evaluated and have been presented.

Application of Design of Experiment (DOE) Method for Optimum Parameters of ‚ÄúMahindra Bolero‚ÄĚ Leaf Spring

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 27th June 2017

Chaitali Chaudhari | Supriya Chaudhari, Akshay Dalvi, Mayuri Deshpande,Prof. Sachin Shinde

Abstract

The Automobile Industry has shown keen interest for replacement of steel leaf spring with that of composite leaf spring, since the composite material has high strength to weight ratio, good corrosion resistance and tailor-able properties. The study aim‚Äôs in the rear leaf spring analysis of ‚ÄúMahindra Bolero‚ÄĚ. In this study, the authors attempt is to maximize the stiffness in the leaf spring by application of the DOE (Design of Experiments) method. Experiments have been conducted using standard L-8 orthogonal array by Taguchi. The statistical methods of signal to noise ratio (S/N) and analysis of variance (ANOVA) are applied to investigate the effects of four design parameters (material, width, thickness, number of leaves) on stiffness. A combination of optimal design parameters is also identified.

Application of Design of Experiment (DOE) Method for Optimum Parameters of ‚ÄúMahindra Bolero‚ÄĚ Leaf Spring

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 14th July 2017

Chaitali Chaudhari | Supriya Chaudhari, Akshay Dalvi

Abstract

The Automobile Industry has shown keen interest for replacement of steel leaf spring with that of composite leaf spring, since the composite material has high strength to weight ratio, good corrosion resistance and tailor-able properties. The study aim‚Äôs in the rear leaf spring analysis of ‚ÄúMahindra Bolero‚ÄĚ. In this study, the authors attempt is to maximize the stiffness in the leaf spring by application of the DOE (Design of Experiments) method. Experiments have been conducted using standard L-8 orthogonal array by Taguchi. The statistical methods of signal to noise ratio (S/N) and analysis of variance (ANOVA) are applied to investigate the effects of four design parameters (material, width, thickness, number of leaves) on stiffness. A combination of optimal design parameters is also identified

Application of Flywheel for Energy Storage System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Shridhika Malode | Prof.R.Hiware

Abstract

The worldís energy sources are derived from conventional sources i.e. fossil fuels. These are non renewable energy sources and are limited on the earth whatever energy generated from these primary energy sources should be utilized optimally. A fly wheel is an inertial energy storage device which absorbs mechanical energy and serves as reservoir, storing energy during the period when the supply of energy is more than requirement or in other words, flywheel can store electricity from the electrical supply system in the form of kinetic energy, and can dispense that energy back to the electrical supply system in quick bursts. It is significant and attractive for energy futures sustainable. The key factors of flywheel energy technology, such as flywheel material, Flywheel shape and its supporting assembly are described, which directly influence the amount of energy storage . It is very suitable to such applications including, Cloud Mitigation for Solar PV, Mitigation for Wind, Wind/Diesel/Flywheel Hybrid, Stabilization of Distributed Generation (DG) Systems, Peak Power Support, Frequency Response Reserve (FRR), Uninterruptible Power Supply (UPS), Reactive Power Support (VAR support) and many other applications, with the view of new technologies the cost of Flywheel technology can be lowered and this technology will play a vital role in securing global energy sustainability.

Application of Improved Kanban Systems in Indian Auto Ancillary Industry for SCM

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Asst. Prof. Meda Karan Venkatesh | 

Abstract

Supply Chain Management (SCM) is management of material and information flow in a supply chain to provide the highest degree of customer satisfaction at the lowest possible cost. SCM requires commitment of supply chain partners to work closely to coordinate order generation, order taking and order fulfillment thus, creating an ďextended enterpriseĒ spreading far beyond the producerís location. Supply chains encompass the companies and the business activities needed to design, make, deliver and use a product or service. Businesses depend on their supply chains to provide them with what they need to survive and thrive. Supply chain management is the integration of key business processes from initial raw material extraction to the final or end customer, including intermediate processing, transportation and storage activities and final sale to the end customer. Today, the practice of supply chain management is becoming extremely important to achieve and maintain competitiveness. The paper will aim to improve the Inventory problems which are faced by all types of industry all over the globe, thus making it a kind of universal problem. The primary goal of any company is to minimize the inventory. The improvement which the report suggests can be termed as a kind of practical improvement i.e. usage of improved Kanban Systems resulting in Inventory optimization. This research is expected to help government and private industry in selecting the most influencing problem area and its optimization. It will also help in establishing the relations between various problems areas to that of cost reduction. This increase the prediction accuracy in supply chain thus helping organizations to draft there strategic plans and policy up gradation. With the use of improved Kanban Systems, resulting in more Inventory Optimizing and in turn more cost saving

Application of Nano Science in Direct Methanol Fuel Cell (DMFC)

International Journal of Science , Engineering and Management, Available online 13th September 2017

Suman Rani | 

Abstract

The fuel cell has high energy conversion efficiency and low pollutant emission. The amount of noble metal used in Direct Methanol Fuel cell (DMFC) can be decreased by the use of Platinum nanoparticle, graphene, single walled and multiwalled carbon nano tube. Thus performance of DMFC fuel cell can be increase by controlling the packing density of Pt. nano particle1. They can reduce the amount of Pt. needed. The following aspects are described in this paper: The method used to reduce the Platinum, improving the performance of fuel cell catalyst, the effect of carbon nanotube on fuel cell. We summarise the some of the result of previous studies and raise expectations for microscopic state study for the future research

Application of nanotechnology in design & material science field

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 28th July 2017

A.JyothiSireesh | Syed Abubaker, Vivek kumar, Manasa

Abstract

One of the most interesting things about nanotechnology is that the properties of many materials change when the size scale of their dimensions approaches nanometers. Materials scientists work to understand those property changes and utilize them in the processing and manufacture of materials at the nanoscale. The field of materials science covers the discovery, characterization, properties, and end-use of nanoscale materials. Nanotechnology might be able to increase the efficiency of solar cells, but the most promising application of nanotechnology is the reduction of manufacturing cost. Utilizing nanotechnology in inexpensive solar cell would help to preserve the environment. This paper provides an overview of the current solar cell technologies and their drawbacks. Then, it explores the research field of Nano solar cells and the science behind them. The potential implications that these technologies would have on our society are also discussed. Most other engineering majors work with nanotechnology, but materials science and engineering is at the heart of it across all disciplines. For those who are passionate about nanotechnology, MSE is place to be for the most research, coursework, and experience in nanotechnology. Our department also administers the Clark School's Interdisciplinary Minor Program in Nanoscale Science and Technology, a program open to any student majoring in Engineering, Physics, or Chemistry.

Application of Polypropylene Fibre as a Reinforced Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 11th November 2017

Saurav Jyoti Parasor | 

Abstract

The Polypropylene fibre reinforced concrete (PPFRC) contains very short discrete Polypropylene fibres which act as an internal reinforcement so as to enhance the properties of the concrete. Addition of discrete fibres into a cement mix reduces the cracking in elastic range, increases tensile strength, deformation capacity and toughness of the composite. These properties of PPFRC primarily depend upon length and volume of propylene fibres (PPF) used in the concrete mixture. In India the polypropylene fibre reinforced concrete has limited applications in several structures. The applications are mainly to inhibit the cracking. However due to the lack of awareness, proper design guidelines specifications, its uses are very limited. Therefore there is a need to upgrade information on the properties of Polypropylene Fibre Reinforced Concrete (PPFRC). For the study, polypropylene fibres of lengths 6 mm with 0.1 %, 0.2%, 0.5 %, 1%, 1.25%, 1.5% and 2% volume fractions are used. The result reported includes an experimental investigation for measurement of workability of PPFRC using standard test method and a selected mechanical property of PPFRC to study the effect of volume fraction of (PPF) for predicting PPFRC in compression

Application of Semi Active Suspension Systems in Rail Vehicle Dynamics

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Siddharth Singh | Kirti Sharma,Neha Gupta,Shivmani Yadav

Abstract

The Paper explores the possibilities of implementing various semi active suspension systems in Rail Vehicle Dynamics. The dynamic behavior of the rail vehicle using various semi active suspension techniques is studied and the level of vibration isolation achieved for various suspension systems is compared. Different Semi-active models are explored and compared with the passive suspension model. The analysis is done with the help of MATLAB/SIMULINK model. Possible means of practically implementing the semi active suspension systems are also explored.

Applications of Computational Linguistics to Language Studies: An Overview

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sakthi Vel S. | 

Abstract

Computational Linguistics is the scientific study of human languages. It is one of the most relevant interdisciplinary field of Linguistics and Computer science. Intelligent Natural Language Processing (NLP) is based on the science called Computational Linguistics (CL). It is closely connected with General Linguistics and Applied Linguistics. Computational linguistics might be considered as a synonym of automatic processing of natural language, since the main task of computational linguistics is to construct computer programs to process Text/Speech in natural languages [4]. The paper attempts to provide an introductory view about computational linguistics and its various applications to language studies. The paper has three sections. The first section deals with introduction to computational linguistics, its major divisions (applied and theoretical) and some fundamental ideas about the topic. Second section deals with structure of computational linguistics -a tree diagram representation. The third section describes the various applications of computational linguistics in close association with language studies. Finally the paper summed up with conclusion and list of references.

Applications of Unconventional Statistical and Fermi Estimation Techniques to Study the Economic Feasibility of Micro and Nano Wind Turbine Power Generation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Phalgun Madhusudan | Aditya Anilkumar

Abstract

Electrical engineers around the world are researching applicability of micro and nano wind turbines placed around buildings and structures in cities to harvest clean renewable energy. Economic considerations of such endeavours have been studied to a very low extent. The practical non-existence of such functioning systems around the world prevents engineers from performing highly accurate studies of the economic impact of such projects. This paper uses unconventional statistical modelling in conjunction with Fermi estimation techniques to perform an economic analysis for such projects.

Applying Map Reduction Technique with Genetic Algorithm Approach to Solve Travelling Salesman Problem

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Rajni |  Sunita Rani

Abstract

Travelling salesman problem is a very old mathematical problem. It models a scenario where a salesman has many cities to visit in shortest possible time. Given the distance among the cities, he must calculate the shortest route. Researchers have been working with Travelling Salesman problem for over centuries. Many models have been introduced to solve this legendary mathematical problem. In this Research Work, genetic algorithm is used to solve Travelling Salesman Problem. Genetic algorithm is a technique used for estimating computer models based on methods adapted from the field of genetics in biology. To use this technique, one encodes possible model behaviors into ''genes". We designed a new crossover technique to increase the efficiency of crossover operator of GA for TSP. We also apply map reduce algorithm to efficiently solve the TSP.

Approaches of Artificial Intelligence in Biomedical Image Processing a Leading Tool Between Computer Vision & Biological Vision

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Veenutha G | Shreyas Antin , C H.Nikitha , Mr.Abdul Lateef Haroon P.S.

Abstract

Artificial Intelligence or AI is a subfield of computer science, which can be defined as the intelligence exhibited by a machine or a software having a remarkable impact on the field of biology and medicine. Imaging, on the other hand has become an essential component of many fields in medicine, biomedical applications, biotechnology and laboratory research by which images are processed and analysed. Putting together AI and imaging, the tools and techniques of artificial intelligence are useful for solving many biomedical problems and using a computer based equipped hardware software application for understanding images, researchers and clinicians can enhance their ability to study, diagnose, monitor, understand and treat medical disorders. Therefore the main idea behind this research paper is to focus on understanding the artificial intelligence, its concepts and various models available for the segmentation(or classification) of medical images, its applications, advantages and disadvantages and results and more.

Aquatic Vehicle Navigation System Using AVR Microcontroller

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

S h u b h a n g i K h a d e | S h i t a l P a r k h i , J a y a K h a i r k r , M o n a l i M u d e , R u p a l i G a y b h i y e

Abstract

Distance measurement of an object in the path of a person, equipment, or a vehicle, stationary or moving is used in a large number of applications such as robotic movement control, vehicle control, medical applications, etc. Camera capturing the multiple images by stereovision is 3D concept. In this paper we are going to develop an autonomous system which should be able to monitor obstacle, objects, bouys etc. Measurement using ultrasonic sensors is one of the cheapest among various options and it will spark off the navigation system and intimate the base station about it. Distance measurement of an obstacle by using separate ultrasonic transmitter, receiver and a microcontroller is presented.

Arduino Based Advanced Intelligent Security System for Women with Location Tracking Through GPS Network and Bluetooth Operated App

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

SudhaArvind | Pooja , MouzzamAhmed , PoonamVerma , DivyaPatel

Abstract

Today in the current global scenario, the prime question in every girlís mind, taking into account the ever rising increase of issues on women harassment in recent past, is only about her safety and security. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This paper suggests a new perspective to use technology to protect women. The system resembles a simple button which when activated, tracks the location of the victim using GPS (Global Positioning System) and sends emergency messages using GSM (Global System for Mobile communication), to three emergency contacts and police .The main advantage of this system is that the user does not require a internet connection for operating APP unlike other applications that have been developed earlier. The App shall dial the already saved emergency number once the SMS is sent.

Areca nut as a Potential Bio-adsorbent for Remediation of Chromium

International Journal of Science , Engineering and Management, Available online 29th June 2017

Ankitha R | Prakruthi S, S Sneha, Seema Tharannum

Abstract

Bioremediation is one of the leading sought after techniques for heavy metal removal and to prevent itís contamination in the effluent discharge hence avoiding various toxicological effects. Heavy metals such as chromium have a number of applications such as leather tanning, organochemicals, fertilizers etc. Once chromium is introduced into the environment, it exists in two different oxidation states, Cr (III) and Cr (VI). The trivalent form is relatively innocuous but hexavalent chromium is toxic, carcinogenic and mutagenic in nature, highly mobile in soil and aquatic system and is also a strong oxidant capable of being adsorbed by the skin. In our present study, areca nut husk powder of two different sieve sizes 250?m and 719?m were used in comparison with the same along with PES B (Bacillus amyloliquefaciens) at 37ļC to form a biofilm. Various concentrations of chromium i.e., 0, 50, 100, 150, 200, 250 ppm were treated with the adsorbent components. The amount of chromium from the sample was estimated using DPC method. It was found to reduce chromium to >50% in case of adsorbent with biofilm and up to 50% in case of adsorbent without biofilm for 50 ppm concentration showing maximum capacity. Hence, adsorbent with biofilm has a greater potential compared to adsorbent without biofilm for Cr (VI) bioremediation from polluted effluents.

ARM Based Automatic Meter Reading and Centralized Control System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Santosh Kumar N | Chaithanya V , Abhishek R , Archana S , K Raja Prashanth

Abstract

Electronic energy meter is capable of taking readings and can store it into its memory. Taking energy meter reading is time consuming and an expensive task. The meter reader travels for a long distance and take the reading manually to prepare the bill. Consumers have to go to the billing office, stand in a long line and submit the bill. This is a boring job and time consuming also. It can be avoided by remote monitoring of electronic energy meter and prepaid billing system by the use of cash card. In this paper measurement of energy, remote monitoring, preparing of bill and billing system is presented. Low cost ATMEGA8L microcontroller is used here to control the whole system.

ARM Based Smart Drinking Water Distribution System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

J.Krishna Chaithanya | Dr. T. Ramashri

Abstract

The aim of this project is to implement a smart drinking water distribution system through smart card and detecting contamination of water so that people in rural, slums and also in area where there is scarcity of ground water. Not only providing safe and clean water through this system we can also reduce the wastage of water and crowding near the water tankers. Our approach is to design a system which determines the purity of supplied water and with the help of a smart card setup controls the amount of quantity to each member and also controls the illegal supply of water, thereby organizing the supply of water with lightweight implementation and reliable long time operation. This system adopts the ARM based controller to read the inputs from the sensor and determine the contamination levels if any and then provide the supply of water, Smart card system and GSM wireless network. The system can run well under the unattended operation, great reducing the intensity of work and making the water monitoring more secure, reliable and economical.

ARP Burner Automation Using PLC

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Yeshwanth S Naick | Neethu P.S , Anjana Balchandran , Arya Vijayan , Preenima Prasad , Shincy P Kunjumon

Abstract

Automatic control is the application of control theory for regulation of processes without direct human intervention. Automatic control can self-regulate a technical plant such as a machine or an industrial process operating condition or parameters by the controllers such as PLC, DCS etc. Automation of burner in ARP is carried out using PLC with SCADA. A limitation of presently used Relay logic system is overcome by the proposed method. In PLC, centralized action takes place.PID can be used in it for controller action. Graphical view of the process can be drawn using SCADA.

Arrhythmia Analysis and Classification using Gaussian Mixture Model

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Divya K | Veena Karjigi

Abstract

Automatic detection and classification of ECG heart beats is of high value in diagnosis and treatment of patients with lifethreatening cardiac arrhythmia. Arrhythmia is an abnormal or irregular heart rhythm which reflects the bad condition of heart. Abnormal heartbeat comprises Right Bundle Branch Block (RBBB), Left Bundle Branch Block (LBBB), Atrial Premature Contraction (APC), and Ventricular Premature Contraction (VPC). ECG signal analysis includes QRS complex detection, P and T peak detection, feature selection and beat classification. In this paper, time interval features of ECG signal are extracted and Gaussian Mixture Model (GMM) is used to classify the ECG signals. The ECG signals used for the evaluation are taken from MIT-BIH arrhythmia database. The Experimental results obtained after classification are 84.99%, 96.6%, 93.08%, 94.48% and 62.83% for NORM, LBBB, RBBB, VPC and APC, respectively

Arrhythmia Analysis and Classification using Gaussian Mixture Model

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Divya K | Veena Karjigi

Abstract

Automatic detection and classification of ECG heart beats is of high value in diagnosis and treatment of patients with life-threatening cardiac arrhythmia. Arrhythmia is an abnormal or irregular heart rhythm which reflects the bad condition of heart. Abnormal heartbeat comprises Right Bundle Branch Block (RBBB), Left Bundle Branch Block (LBBB), Atrial Premature Contraction (APC), and Ventricular Premature Contraction (VPC). ECG signal analysis includes QRS complex detection, P and T peak detection, feature selection and beat classification. In this paper, time interval features of ECG signal are extracted and Gaussian Mixture Model (GMM) is used to classify the ECG signals. The ECG signals used for the evaluation are taken from MITBIH arrhythmia database. The Experimental results obtained after classification are 84.99%, 96.6%, 93.08%, 94.48% and 62.83% for NORM, LBBB, RBBB, VPC and APC, respectively.

Artificial Floating Islands as Eco-Engineered Remedy: A Review

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Priyanka Baji | Dr.V.D.Salkar

Abstract

In present years, water pollution has become one of the most critical environmental challenges. The Artificial Floating Islands (AFIs) are an innovative variant of wetlands with substrates-rooted plants and free-floating aquatic plant systems, which consist of aquatic or terrestrial plants growing in a hydroponic manner with buoyant frames floating on the surface of water bodies. Eco engineered remedy such as floating wetland is commonly presented as an important strategy for maintaining and improving water quality and aesthetic appearance of water bodies. Literature review indicates that previous works are carried out at different scales using different design parameters. Artificial Floating Islands (AFIs) are vegetated floating platforms applied in lakes, ponds and reservoirs to improve the aquatic environment. AFIs have four functions: water purification, habitat enhancement shoreline erosion protection, and improved landscape features. This paper reviews the studies carried out by earlier researchers on AFI. The primary advantages of AFIs are that they float and adjust to water level variations in reservoirs and reduce predation risks by providing safe protections for nesting birds. The paper presents the type, structure, function, and developing history of AFIs. By analyzing the social-economic benefits, advices are given for applying AFIs technology to improve the water environment and to improve crops thereby creating a ďwin-winĒ model for both environmental protection and agricultural development in rural places. Based on the review it can be concluded that AFI technology is promising and acceptable even indigenously

Artificial Floating Islands as Eco-Engineered Remedy: A Review

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Priyanka Baji | Dr.V.D.Salkar

Abstract

In present years, water pollution has become one of the most critical environmental challenges. The Artificial Floating Islands (AFIs) are an innovative variant of wetlands with substrates-rooted plants and free-floating aquatic plant systems, which consist of aquatic or terrestrial plants growing in a hydroponic manner with buoyant frames floating on the surface of water bodies. Eco engineered remedy such as floating wetland is commonly presented as an important strategy for maintaining and improving water quality and aesthetic appearance of water bodies. Literature review indicates that previous works are carried out at different scales using different design parameters. Artificial Floating Islands (AFIs) are vegetated floating platforms applied in lakes, ponds and reservoirs to improve the aquatic environment. AFIs have four functions: water purification, habitat enhancement shoreline erosion protection, and improved landscape features. This paper reviews the studies carried out by earlier researchers on AFI. The primary advantages of AFIs are that they float and adjust to water level variations in reservoirs and reduce predation risks by providing safe protections for nesting birds. The paper presents the type, structure, function, and developing history of AFIs. By analyzing the social-economic benefits, advices are given for applying AFIs technology to improve the water environment and to improve crops thereby creating a ďwin-winĒ model for both environmental protection and agricultural development in rural places. Based on the review it can be concluded that AFI technology is promising and acceptable even indigenously.

Artificial Intelligence Approach To Improve Lifespan Of Wireless Sensor Network : A Survey

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 28th August 2017

Mr. Ranjit V. Bobate | Dr. G.M. Asutkar, Prof. Harsha Ramawat

Abstract

Wireless sensor network is a set of specialized transducer with a communication infrastructure meant to monitor and record the condition at diverse region . Sensor node can be imagine as a small computer , extremely basic in terms of their interfaces and their component .therefore resource management in the wireless sensor network is one of the significant research issue in the improvement of lifespan of of wireless sensor network with intelligence . Hence in this research, we find the survey on artificial intelligence techniques like Neural Network , Fuzzy Logic to improve the lifespan of wireless sensor network along with the optimization techniques to conserve the limited resources in a large collection of sensor nodes .

Artificial Intelligence in Business

International Journal of Science , Engineering and Management, Available online 29th June 2017

Sachin Sreekumar | Rahul Gopalakrishnan Nair

Abstract

Artificial Intelligence (A.I) is a term that is gaining popularity in nowadays. In recent years many companies have developed as well as implemented so many artificial systems such as business intelligence, expert systems, voice-recognition systems, natural language processing systems etc. But majority of the organization as well as managers are not properly aware about this potential concept.AI is something that give a system the ability to think itself as well as to make decisions which give every organizations a competitive edge. But the lack of awareness or the fear to adapt to changes make may organizations against these new emerging concepts. The aim of this paper is to determine whether AI had noteworthy impact on business as well as to discover which types of AI methods are used today, and what they are capable of doing.

Artificial Kidney

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Khaleel Naina Mohammed M M S | Arun Mitheran G , Bhuvanesh Kumar R , Kirubasankar.K

Abstract

The main aim of this paper is to reduce the death that is caused by kidney failure and to make every people to get a cheaper treatment towards kidney failure and to find the criteria for this sort of problem, so as a result we have concluded with this idea, so far Hemodialysis was only the rectifier for kidney failure but it is only a temporary cure which is an cyclic process which is said to be done for 2 to 3 times a week as per the subjects condition and the time taken for this process is about hours and the charge is about Rs.1800 and twice a week special injections for blood cell regeneration and blood test is necessary so as an result an person who suffers from kidney malfunction is said to be spending Rs.30,000 approx. it could be even more than that and it is obligatory that transplantation shoulds be done after a phase of instant, so my aphorism is to make an ďArtificial kidneyĒ which can be rooted to an victim at an cost less than that of actual kidney transplantation.

ASIC Implementation of 32-bit MIPS RISC Processor using Multi-VDD Technique

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Jeyakumar R | Suryavanshi Rushank Sharad , David Jey Singh , Jayakrishnan P

Abstract

the phenomena of scaling down the device results into certain hazards in the processor However it can have an adverse impact on the various performance parameters of the processor as area, power and timing. However in order to overcome the enlisted shortcomings the design of Microprocessor without Interlocked Pipeline Stages (MIPS) architecture is preferred. The Microprocessor without Interlocked Pipeline Stages is a RISC processor. The architecture discussed is implemented using Verilog HDL. Further ASIC flow is performed using 32nm technology. However low power realization is achieved by using multiple voltage (Multi-VDD) technique where by the critical path in the design is analyzed and the voltage of that respective path is increased there by achieving a good speed up.

ASIC Implementation of Data Comparison Circuit for Cache Memory

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Basavaraj Mirji | R Pramod , Dr. V. Anandi

Abstract

In current scenario, computing system of microprocessor involves data comparison circuit for matching input data to the stored data in memory. For protection of data and to improve reliability, the recent microprocessor uses error correcting code. In this paper a new architecture for data matching is presented to reduce the delay and hardware circuit complexity. Taking into account the property of the systematic codeword, the deliberate shape comprising of information and parity bits independently, so parallel examination of information and parity bits diminishes the delay of the overall circuit.

Assess the Effect of Body Mind Therapies on the Level of Perceived Stress, Anxiety and Depression Among Substance Users

International Journal of Science , Engineering and Management, Available online 29th June 2017

Mrs. Sundari S Apte | Dr Rakesh Ghildiyal,Dr Mrs. Mary Mathews ,Dr Mrs Tapati Bhattacharjee

Abstract

Humans have used drugs of one sort or another for thousands of years. But their use was limited to certain occasions. In todayís world there is a sharp increase in the substance use from adolescent to old age and there is a rise in the use of them even in fairer sex. A research was conducted to see the effect of body mind therapies on the level of anxiety, depression and perceived stress. Method: A quantitative, quasi experimental study was conducted on 45 subjects who were admitted in the de-addiction canters and met the sampling criteria. The tool consisted of four Section-Ia. Socio demographic data, Ib. substance use data, II. anxiety tool by Beck III. depression tool by Beck and IV. perceived stress questionnaire by Cohenís. The interventions consisted of Guided Imagery based on 12 steps of Alcoholic Anonymous and Self realization based on Sahaja Yoga Meditation. These interventions were given to the group for 3months on regular basis after which they have to practice on their own by using the information booklet and CDResults: It was seen thatthere is change in the level of perceived stress, anxiety and depression after the intervention after t 3months interval of intervention with the p value 0.000 in all the groups including control. The control groups Wilcox on value was lesser than the intervention group

Assessment of Demand Response capability with Thermostatic loads in Residential sector

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Amrutha Maria Mathew | Rishi Menon

Abstract

In competitive electricity markets with deep efficiency concerns, demand response gains significant importance. Moreover, demand response can play a very relevant role in the context of power systems with an intensive use of distributed energy resources, from which renewable intermittent sources are a significant part. During the effort to accommodate larger shares of renewable sources, while maintaining the power balance and ensuring the reliability of the power system, the implementation of demand response mechanisms may provide considerable options to reshape the supply of electrical energy. As demand response levels have decreased after the introduction of competition in the power industry, new approaches are required to take full advantage of demand response opportunities. Here, the study presents a new approach for modeling flexible loads and aims to create further knowledge on the potentials of residential demand response concepts.

Assessment of Energy Conservation at Amman Try Steel Industries through Led Lighting Retrofit

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

K Sarath Kumar | M Sathyamoorthi , M Selva Kumar , V Heawin Jeba Kumar

Abstract

In India, there is a mismatch between power generation and power demand. With the growth of Indiaís economy, demand for energy will also increase. Indian power sector needs to plug the gap between demand and supply through renewable and nonrenewable source. The demand for energy has grown closer to 3.5% per annum over last three decades, the power houses that are generating energy fails to fulfill the demand. Industries and households resort to the use of diesel or portable kerosene generators to generate power for operating part of their loads. According to the Indian petroleum and natural gas statistics, India is one of the worldís largest importers of crude oil, gas and coal which will create the global warming issues. In The lighting energy consumption in India is 71% of total energy consumption. The paper specifically aims on industrial lighting energy consumption, by replacing the traditional lamps in industries with LED lamps thereby contributing to national energy consumption scheme. LED components were purchased from local market and energy auditing at steel industrial where studied. The recommendations were given to industry for retrofit of traditional lamps with LED.

Assessment of the purity of silk and its mixed fabric using image processing in textile showrooms

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Balaji.V | 

Abstract

In today’s world where there is a lot of interest towards fashionable and expensive clothing ,the quality and purity of the material is expected to be of high standards. Especially when it comes to silk clothing, people always are doubtful about the purity of the material, due to the high costs people invest on such clothing. In this paper we aim at determining the purity of silk clothing by using image processing algorithms .We basically take a microscopic image of the fabric and compare it with a dataset of pure silk fabric images and hence determine the percentage purity in mixed fabric clothing

Assistive Scene Text Recognition

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Hymavathi K.P | Fouziya v.k

Abstract

Abundance in text along with development of digitalized camera system lead to a new era of recognition and analysis. Traffic sign board which meant for road safety is all time a matter of fact for the traffic safety. The traffic board which carries signs along with informative texts are to be recognized for safe driving. Apart from normal sign board recognition, here the informative boards are also considered. This is a fewer step towards driver assistive system. The scene recognition faces a lot of challenges like motion blur, occlusion and lighting factors. The goal is to implement a system (model) for recognizing the text and signs in the traffic board and to create sound alert. The HOG based vector machine (SVM) classifies the traffic sign and the text is recognized using MSER based OCR. Advantages of the proposed system are well condition under illumination changes sound alert and text recognition is an added advantage with other methods.

Attacks Resistant to the Routing Level and a Synopsis of Refuge Factor of Routing in Mobile Adhoc Network

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Mrs. U. Srilakshmi | Dr. B. Srinivasa Rao

Abstract

In this composition, the creators have portrayed the different conceivable answers for Security in MANET Systems. Versatile Ad-hoc Networks are spontaneous, self-sorting out systems made out of portable hubs that use work organizing standards for interconnectivity. Steering in impromptu systems is an exceptionally difficult issue because of hubs versatility, dynamic topology, visit connect breakage, impediment of hubs memory, battery, data transfer capacity, and preparing force and absence of main issue like base stations or servers. Portable impromptu system is a self-sufficient arrangement of versatile hubs. Every hub works as an end framework, as well as a switch to forward bundles. The hubs are allowed to move about and arrange themselves into a system. These cause additional difficulties on security. In this paper, assessment of unmistakable on-request steering convention i.e. AODV, MAODV, RAODV has been finished by differing the system estimate. An exertion has been done to do the execution assessment of these conventions utilizing arbitrary way point show. The creators have acquainted the security issues particular with MANETs and present a point by point arrangement of the assaults/assailants against these complex circulated frameworks. At that point we talk about different proactive and responsive arrangements proposed for MANETs. We diagram secure steering answers for keep away from a few assaults against the directing conventions in light of participation between hubs. We additionally give an outline of interruption recognition in MANETs and show the way of IDSs that have been proposed for MANETs in the previous decade.

Attenuation and its Effect on Measurement of Ultrasonic Radiation Pressure

International Journal of Science , Engineering and Management, Available online 29th June 2017

Awadhesh Prasad | -

Abstract

Attenuation is defined as the decrease in power level at the load caused by inserting a device between a source and load. Effect of Ultrasonic stress has been studied in the solid state devices and its output is observed for discussions. Effect of attenuation in the measurement of Ultrasonic Radiation Pressure has been discussed analytically.

Augmentative and Alternative Communication (AAC) Device for People with Communication Disorder

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Deepika T V | Sowjanya M N, Amrutha R

Abstract

Communication involves sharing of oneís desires, thoughts and humors. People suffering from autism, cerebral palsy or with speech disorders, have inability to communicate and this impacts on their quality of life, education and social relationships. The frustration caused by these would lead to behavioral changes. To favor such people, augmentative and alternative communication (AAC) device is designed which can provide such people an opportunity to express themselves and have effective communication. For people who have disabilities of speaking, augmentative and alternative communication device provides a means of communication. A person who is dependent on augmentative and alternative device can communicate easily about their desires at any time.

Augmentative and Alternative Communication (AAC) Device for People with Communication Disorder

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Deepika T V | Sowjanya M N, Amrutha R

Abstract

Communication involves sharing of oneís desires, thoughts and humors. People suffering from autism, cerebral palsy or with speech disorders, have inability to communicate and this impacts on their quality of life, education and social relationships. The frustration caused by these would lead to behavioral changes. To favor such people, augmentative and alternative communication (AAC) device is designed which can provide such people an opportunity to express themselves and have effective communication. For people who have disabilities of speaking, augmentative and alternative communication device provides a means of communication. A person who is dependent on augmentative and alternative device can communicate easily about their desires at any time.

Aushadh Nishtha: A Mobile Based Application to ensure Adherence to Medication in Chronic Non-Communicable Diseases

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Dr. Ankur Joshi | Manu Gupta, Dr.Soumitra Sethia

Abstract

Medication adherence is both vital and difficult to achieve in case of non ‚Äďcommunicable diseases. The challenges arise because of the requirement of behavioural monitoring and continuous scrutiny of the process. This prerequisite to ensure adherence may be addressed by ICT through asynchronous communication via mobile based application. This manuscript describes the conceptual and operation framework of one of the adherence assurance application developed by the authors and investigates further the future prospects of such application.

Authentication by Zero Knowledge Protocol

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

K. Prasanth | E.T. Jabajasphin

Abstract

In wireless sensor network (WSN) various types of sensors are used and deployed in the network to collect useful physical parameters and some highly sensitive information is then been transmitted between the nodes and to the base station, without any human intervention. Hence, message authenticity and security are major requirements in WSN. Since the cryptographic schemes used for wired networks tend to exhaust wireless sensor network resources, they cannot be directly used in sensor networks. Here the Zero Knowledge Protocol (ZKP) is implemented in the network for the authentication and verification of sender sensor nodes before transmitting any sensitive information. In proposed scheme an optimal number of challenge questions are also used to maintain a balance between the added security and the increase in cost. Increase in the number of challenge question makes up to the reduced key size thus providing an improved security. The proposed scheme was assessed based on the MATLAB simulation and an analysis was performed.

Automated Analysis of Digital Relay Data Based on Expert System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Bibihajira | Zubair Khan , Mamatha H , Dr.Pradeep B Jyoti , Ms.Malini K V

Abstract

Modern digital protective relays generate variousfiles and reports which contain abundant data regarding fault disturbances and protection system operation. This paper presents an expert system based application for automated analysis of digital relay data. In this application, forward chaining reasoning is used to predict expected protection operation while backward chaining reasoning is employed to validate and diagnosis of actual protection operation. An EMTP/C++ based digital relay model with capability of insertion of user-defined errors and generation of files and reports is developed. The analysis capability of this application is tested using the relay model.

Automated EB Bill Control Measurement with Automated Power Disconnection

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

N.Mahendren | P.Karthik , S.Balakumar, S.Lalith Kishore, S.Bhoopalan

Abstract

The design presents a latest methodology for avoiding the maintenance costs and high construction in the existing indicator sense technology. Apart the use of wireless meter reading with network technologies has become need of the day. The designed system avoids the man involvement in Power Management. The online banking use to credit the amount in user or consumer account in time, if couldnít, the power connection may be disconnected automatically from the remote server. It displays the equivalent amount and reading information on LCD and data is sent to the server through the GSM Module. The PIC based hardware system consists of a processor core board and the peripheral board. The entire user interface design for microcontroller operation is based on Embedded C Language. This system provides capable meter reading, avoiding the billing mistake and reduces the protection charge. Online banking service is used to automatically debit the bill amount in user bank account this paper also addresses compensations of implementing the GSM communiquť module and design detail and discusses the forwardlooking security of the data communications.

Automated Generation of a Natural Challenge File for File Carving Algorithms

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th November 2017

K. Srinivas | Dr. T. Venugopal

Abstract

File Carving is a technique of reassembling unordered mixed file fragments, without using files’ metadata such as FAT, for reconstructing the actual files present on the disk. In the areas of data recovery and digital forensics this situation arises. A challenge file consists of number of files, in the form of fragments, mixed in random order. In this paper authors have presented a software system that generates a challenge file by implementing, at user level, a file system which broadly follows FAT file system. This software system uses a large size file to store file fragments just like a kernel level file system uses disk to store files. The kernel level file system fragments the file, as per the availability of free clusters, at the time of creation of the file. By viewing the challenge file as a virtual disk, it consists of the number of virtual clusters. The software system presented in this paper, a user level file system, fragments the file, as per the availability of free clusters, on the virtual disk i.e., the challenge file. This challenge file consists of mixed file fragments of number of user files. The content of the challenge file is a result of software module which broadly follows FAT file system. The challenge file thus generated is, therefore a natural challenge file. This challenge file provides the writers of file carving algorithms a platform to test their algorithms. The designers of file carvers can use the challenge file conveniently as a virtual disk, in place of the actual disk, thus eliminating the need of physical hard disk for testing their algorithms. There are number of other benefits of this approach as outlined in this paper

Automated Irrigation & Security System

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Prashantha.K | Shivaraj

Abstract

Efficient water management and security is an important task in any cropping systems. In the present work an attempt has been made to design and develop a system that automatically monitors the moisture content in the irrigation field and protects the crops by usage of GSM and Microcontroller technology. The system makes use of sensors like humidity, IR and PIR to get the feedback from the irrigation field and initiating the necessary action with the help of Microcontroller. After implementation of this system it is observed that the system was able to detect the insecure condition in the field and give alert message to farmer and also maintain required moisture content was maintained automatically. This system provides an ideal solution to the problems faced by farmer in daily life in their field. The system is adaptable and cost-effective. The system uses embedded technology so all advantages of embedded system present here.

Automated Irrigation System Using GSM Module

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Siddharth Bhattacharjee | Machina Hema Mani Kumar , P.N.Vaidyanathan

Abstract

The increasing demand of the food supplies requires a rapid improvement in food production technology. In many countries where agriculture plays an important part in shaping up the economy and the climatic conditions are isotropic, but still we are not able to make full use of agricultural resources. One of the main reason is the lack of rain & scarcity of land reservoir water. Also, the unplanned use of water inadvertently resulting in water wastage. The aim of our project is to minimize the manual intervention of the farmer, which is why we are using a micro-controller PIC- PERIPHERAL INTERRUPT CONTROLLER. It's done using a GSM MODULE attached with the Automated Irrigation System. The micro-controller based AUTOMATED IRRIGATION SYSTEM will serve the following purposes: 1) As there is planned usage of water, a lot of water is saved from being wasted. 2) The soil is irrigated when there is not enough moisture in the soil and the microcontroller decides when should the pump be turned on/off . 3) The water level Indicator checks the amount of water in the water container. Thus this saves much time of the farmers, as they donít have to go and turn the pump on/off manually by monitoring various soil parameters for controlled Irrigation.

Automated Solar Irrigation system with MPPT

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Krishna S. Kolte | Pratik D. Selkar,Abhijit Singare,Sandip Salwe,Reeta Damahe

Abstract

As we know in Mostly in íIndiaí Electrical Energy is generated by the burning of coal. This generation of electrical energy produces lot of pollution. And as we know solar energy is conventional source of energy, it is readily available 12hours in a day. Solar energy can became alternative to this non-conventional energy but there is problem is that photovoltaic cell are less efficient. In order to improve the efficiency of photovoltaic cells MPPT techniques are used.[1] In this paper we present that 12volt battery is charged with the help of solar panel & MPPT. Then this system is used for irrigation purpose by directly applying 12volt dc to the DC pumps with battery, it can also be used in fields by increasing solar panel & battery rating, DC pump for large scale use. It can also used in hotel & motels, bungalows for gardening. This system is completely automated using IC 555.

Automated Tormenting Recognition in light of Semantic-Enhanced Marginalized Stacked Denoisng Auto-Encoder

International Journal of Engineering Research in Computer Science and Engineering, Available online 4th August 2017

Megha Rani Raigonda | Bhavani Namdar

Abstract

Social media now a day is a major communication bridge among peoples almost around the world which helps them to share their day to day activities to the one who is in contact with them in that network; hence it acts as an intermediary among them. As social media have many excellent features for better communication, it does have the many drawbacks which may hurt the intensions of the peoples sometimes due to some weird actions of the users on social media, such as teasing or posting something which hurts the user intensions by using bullying or tormenting words. The major criterion to deal this problem is learning robust representations of texts through text mining concepts in machine learning and NLP. So to prevent this kind of activities on social networks, we are proposing a technique named Semantic-Enhancement for Marginalized Denoising Auto- Encoder(smSDA), which is an extension of the admired machine learning technique Stacked Denoising Auto- Encoder (SDA).

Automatic Auto/Taxi Fare System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Bharathi R | Arunadevi

Abstract

Taxis or auto rickshaws are an important part means of transportation. Integrating auto-rickshaw services complements public transportation systems, ensuring connectivity and easy access throughout the city. The current fare meter of auto-rickshaws and taxis follows a faring scheme that only computes the cost of the journey after the travel. This allows the drivers to trap new comers to a city to take passenger through a route that is longer than the exact route to his destined address leading to payment of fare which is larger than the actual fare. To eliminate this, a new system may be implemented that calculates the fare and route prior to the journey. Here GPS is used to determine the current location .The system uses a mapping scheme for calculating the shortest path from the current location to the destination and thereby computing the estimate of the fare for entire journey. As it gives an exact cost for the distance travelled, the conflicts between the driver and the passenger can be avoided

Automatic Coke Oven Pushing And Charging Schedule

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Sneha Bhimrao Joundale | Devendra Sutar,Sajit Sadanandan

Abstract

Most of the coke ovens plant has the manual schedule for pushing and charging sequence of the ovens. The manual schedule gives rise to several problems which affect the process time resulting in the decrease in the production. This paper presents the full automatic system for coke oven scheduling. Further, using this auto schedule battery machines can be made to work according to schedule leading to man-less operation of battery machines. The optimized auto schedule is created by process control system which uses plc logic based on the scheduling algorithm. This auto schedule system reduces all errors and all battery machines are made to work automatically using the schedule. This approach makes the system completely automatic in operation; which improves an efficiency of the plant and also reduces operator workload. Optimized auto pushing and charging schedule of coke ovens create the comfortable working environment.

Automatic Control and Monitor of Green House using Sensors

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

C.Vamsivarshika | B.Sravani

Abstract

This paper presents a automatic monitoring and control system for greenhouse through Internet of Things(IOT). The system will monitor the various environmental conditions such as humidity, soil moisture, temperature, presence of fire. If any condition crosses certain limits, a message will be sent to the registered number through GSM module. The microcontroller will automatically turn on the motor if the soil moisture is less than a particular value. This project describes the design and implementation of a wireless sensor networks for greenhouse environment monitoring. In this paper we will present an overview of the IOT phenomena as well as its applications on greenhouse. IOT is a vision of a world in which most objects are connected transmitting updates about their performance thereby people use them to do things more Intelligently.

Automatic Crack Detection of Railway Track by using Ultrasonic Waves and GSM System with Mobile Operated Robot

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Ritesh P Tank | Aliraza S Merchant , Yash L Rathod , Mehul M Baraiya , Dhiru A Divrania

Abstract

In countries like India, the most widely used and common mode of transport for the peoples is railway transport. We often observe in news that Railway accidents are quite common in now days. It has been seen that approximately 50% of the rail accident cause due to the derailment, and 90% of this accident is cause due to the cracks on the rail track. Those cracks are unnoticed by the Track-man of railway department who walks 16 km/day along with the railway track for the inspection of the track. This method of inspection is quite unreliable. The aim of our research is to automize the process of detecting cracks on a rail track using cellphone operated vehicle to reduce the human effort. This method for the detecting the cracks uses ultrasonic waves, which propagate through rail track and it detect the cracks and defects on the track and hence preventing the rail accident.

Automatic Detection of Potholes on Roads to AID Drivers

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ramya Gayathri.M | Sree Lakshmi . S , Krishna Kumar. H , Bharathi .S , Geetha .R

Abstract

One of the major problems in developing countries is mainte nance of r o a ds. Well maintaine d roads contribute a major portion to the countryís economy. Identification of pavement distress such as potholes not only helps drivers to avoid accidents or vehicle damages, but also helps authorities to maintain roads. This paper discusses previous pothole detection methods that have been developed and proposes a cost- effective solution to identify the potholes on roads and provide timely alerts to drivers to avoid accidents or vehicle damages. Camera captures the image of the road, Beagle bone is used to identify the potholes on the road, the geographical location coordinates of the potholes are identified using a global positioning system receiver respectively. The sensed data includes pothole width and geographic location, which is stored in the database (cloud).This serves as a valuable source of information to the soceity and vehicle drivers. An android application is used to alert drivers so that precautionary measures can be taken to evade accidents. Alerts are given in the form of a App notification and vibration.

Automatic Door Locking System

International Journal of Engineering Research in Computer Science and Engineering, Available online 6th October 2017

Dr. Manoj Priyatham | Rashmi.K.G, Meghana.R, Likitha Prakash.K, Rashmitha.H.R

Abstract

In this paper, the access of unauthorized user can be prevented by using integrated home security with a microcontroller technology which is cost effective. Here the registered password in the system will enhance the security level to prevent from unauthorized users. If users forget password then the security provides the capability to change and reset the password. This paper provides strong authentication where we enter the first password for the Bluetooth connection and second password for unlocking the door in the mobile application with the help of driver circuit which is attached to the door can be open and locked automatically by obtaining the signal from microcontroller. The automatic password lock system will give user more secured

Automatic Energy Meter Reading and Load Control System Using ZIGBEE

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Dharani.S | Rajalakshmi S

Abstract

Now-a-days technology has developed to a large extend. At the same time the need for systems with automation and high security are preferred. An automatic energy meter reading (AMR) and load control system is presented in this paper. Conventional energy meter reading method for retrieving energy consumption and billing is a tedious process and cost of data logging systems is high. This requires huge labor and long working hour to achieve the reading process. Human billing are prone to reading errors and sometime in houses the electricity power meter is placed in location where it is not easily accessible, the billing will slowed down due bad weather conditions. AMR technology will automatically collects energy consumption data from energy meter and transfer that data to Electricity Board (EB) office by using wireless sensor networks (WSN).This system use LCD display to provide the meter reading, power cut, total load used and power disconnect information at customer side. This information is being sent and received by concerned energy Provider Company with the help of ZigBee network. It can also control loads with the help of relay circuit, when the demand for energy consumption goes high. This system not only reduces the labor cost but also increase energy meter reading accuracy and save huge amount of time.

Automatic Farm Protection and Irrigation?

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

MS Deepa R | Aditi Sharma , Archana.M , Archana.B.Poste , Arun Kumar.R

Abstract

In the field of agriculture, use of proper method of the protection and irrigation is important. The project makes the protection and irrigation automated. With the use of low cost sensors and the simple circuitry makes this project is a low cost product, which can be bought even by a poor farmer. This project is best suited for places where water is scares and has to be used in limited quantity and it is used for protection of farm from various attacks. The heart of the project is the microcontroller. Protection of the farm is done by using PIR sensor, Beeper, Electrical fence and Temperature sensor. For irrigation a wetness sensor is used which checks the moisture level of the soil.

Automatic Flooring Machine

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

Durai.J | Sumit Nande, Faruk, Patil Saurabh, Sangappa

Abstract

Floor tile laying process is a finishing job usually done manually. This process is described in detail including the tile laying work flow, thinset thickness, tiles pattern, tools, tiles installation defects, costs and work rate. A cost analysis of tile laying process was made based on data obtained in one of the construction project in Langkawi in 2005. The labor cost was RM 1.50 per feet square of tiles. The material costs however vary with the quality and design of tiles. A field study was carried out to measure the work rate of manual tile installation where the average rate was 19.2seconds per tile of 300mm x 300mm. The existing research and robot technology is discussed in this research including the various configurations considered by the researchers. Based on these, important elements of floor tile laying automation were identified as lacks of data on tile laying work itself, manipulator design and costs effectiveness. We are here with new mechanized unit which can be more suitable for automation.

Automatic Flooring Machine

International Journal of Science , Engineering and Management, Available online 13th July 2017

Ms. Snehal Kshirsagar | Prof. M.N. Annadate

Abstract

Music conduct by a group requires a conductor to play the music. These conductors perform various music patterns in front of band and depend on this pattern band play the music. The pattern or gesture perform by the conductor are require to be more precise and accurate to play the correct musical node. Because of this a conductor has to practice more and more to draw correct pattern. There is always requiring a teacher or a senior music moderator to judge wrong and right pattern drawn by beginner conductor. It is not always possible to observe each and every student whether they drawn correct or wrong pattern. To overcome this problem we proposed a new technique called Dynamic Time Warping for musical pattern detection. We have implemented this concept on basic three pattern detection. In this method we have used a camera to detect the hand movement and then apply DTW algorithm to detect the correct pattern drawn by the beginner conductor.

Automatic Follow-up Actions for Medical Treatment

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th August 2017

Mohamed Esoof | Mohamed Raseen

Abstract

A system to automate the follow-up actions for medical treatment is proposed in this paper. This system uses the existing that uses Aadhaar based authentication to access the centrally stored medical records. Diseases can be classified as Communicable diseases and Non-Communicable diseases. They can be classified also as Chronic and Non-chronic. Follow-up and treatment for chronic disease is very important since the disease extends to the complete life. The proposed system is very helpful in chronic disease where patient needs constant and periodic treatment. The proposed system use the same Centralized records but also provides time alerts to the Patient and Doctors automatically when the follow-up time is due.

Automatic Food Dryer System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Ass.Prof. A.B.Kumbhar | Ms.Salunkhe Sneha N. , Ms.Jarag Vinaya V. , Mr.Patil Tejas A. , Mr. Gavandi Omkar S. , Mr. Magdum Sanket B.

Abstract

Automatic food dryer system project is mainly based on the agriculture field. Our country is a agriculture based country 80% people in India engaged with agriculture field. So our project makes the some help in agriculture field. The natural drying process has many drawbacks like a requiring more time, more capital cost and more space is required. In this paper we describes automatic food dryer system in which dried food in one chamber which is made up of metal which is fully microcontroller based. The fresh food or fruit is placed inside the chamber. The air is blown inside the chamber to maintain the humidity. Microprocessor are used to control overall process of drying chamber like the control function of heating, blowing the air, giving time indication and maintain constant temperature throughout the chamber. By using sensor and microcontroller we give full control on the drying process. Automatic food drying system is also useful for the small scale farmer.

Automatic Hand Brake Lock and Release Mechanism for Cars

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

B S Yogananda | Naveen,Abhishek Vijay, Amandeep , Jerin Joseph

Abstract

Hand brake is one of the most important components in vehicles. In general the hand brake is operated manually. We are developing Automatic Hand Brake System for safety. The hand brake engagement and disengagement is done with the help of rack & pinion. In cars the hand brake is a latching brake usually used to keep the car stationary. Automobiles e-brakes usually consist of a cable directly connected to a brake mechanism on one end and to some type of mechanism that can be actuated by the driver on the other end .the mechanisms is often a hand ‚Äďoperated lever, on the floor on either side of the driver, a pull handle located below and near the steering wheel column, or a pedal located far apart from the other pedals.The Hand brake lever is coupled with motor. A motor used to apply and release the hand brake through Rack. Motor is driven by the control unit (Micro controller). When ignition is given then a signal is sent to control unit to release the hand brake. When the vehicles is in rest stage i.e when the vehicle is not moving the Hand brake is applied.

Automatic Image Annotation-A Proposed Method

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Sayantani Ghosh | Prof. Samir Kumar Bandyopadhyay

Abstract

Medical images play a central role in patient diagnosis, therapy, surgical planning, medical reference, and medical training. With the advent of digital imaging modalities, as well as images digitized from conventional devices, collections of medical images are increasingly being held in digital form. It becomes increasingly expensive to manually annotate medical images. Consequently, automatic medical image annotation becomes important. This paper reviews annotation of medical records.

Automatic Intelligence Petroling / Serveillance Boat for Navy

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Mayur Hulke | 

Abstract

The automatic patrolling boat is an unmanned self-guided drive system.it is equipped with the automated programmed drive system interfaced with directional sensors IR sensors, distance measurement sensors, accelerometer, heat sensing element motion sensors and long distance audio video camera with a 360 degree rotation mounted on it is small in size and capable of tracking any illegal activity near costal area and take necessary actions and send data to control room

Automatic Light Polarizer and Traffic Density Controller

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Muhammed Irshad | Manoj V.P., Athira Krishna K.R.,Krishnapriya A.R., Hafeefa , Ms. Sangeetha Gopinath

Abstract

Now a dayís accident rates are increasing due to excess intensity of light from the opposite vehicle during late night rides. There is the need of reducing the level of accidents by reducing the intensity of light from the opposite vehicle. The first section of this project aims to develop an Automatic light polarizer that reduces the intensity of light from the opposite vehicle. This system works on the principle of operation of light polarizerís. That is, when two polarizing plates are arranged parallel to each other it becomes transparent and when they are arranged perpendicular it becomes opaque to the light. The second section of this project is Traffic density controller. The traffic density control system aims at reducing the traffic in the main town area by making the vehicles to pass through the bypass junction whenever heavy traffic is detected in the town area. The system includes a transmitter and a receiver. The traffic density is sensed at the transmitter side. At the receiver section, a display is used that displays the information about the density and give instruction for the vehicles to take diversion. The main objective of this project is to minimize the accident levels and to ensure life security.

Automatic Monitoring and Controlling of Greenhouse System using Zigbee

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 1st July 2017

G. Hima Bindu | K. Lokesh Krishna ,K. Hema latha

Abstract

The usage of Wireless Sensor Networks has become really important in recent years because of their ability to manage real-time data for various novel services. In this paper a ZigBee based automatically monitored and controlling system for greenhouse system is designed and implemented. This system utilizes an ARM7 processor, various sensors and ZigBee communication module. The entire system is powered by using a solar plate, placed outside the greenhouse system. Sensors gather various physical data from the field in real time and transmit it to the processor and to the end user via ZigBee communication module. Then necessary actions are initiated to perform action on behalf of people to reduce or eliminate the need of human labor. Necessary threshold values for each sensor measurement have been included in the program, so that the essential parameters necessary for plant growth can be accurately controlled. The proposed system has been tested for a week and reasonable results have been observed, which indicate that this system is very much useful for automatic greenhouse system monitoring and control.

Automatic Monitoring and Controlling of Greenhouse System using Zigbee

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

G. Hima Bindu | K. Lokesh Krishna , K. Hemalatha

Abstract

The usage of Wireless Sensor Networks has become really important in recent years because of their ability to manage real-time data for various novel services. In this paper a ZigBee based automatically monitored and controlling system for greenhouse system is designed and implemented. This system utilizes an ARM7 processor, various sensors and ZigBee communication module. The entire system is powered by using a solar plate, placed outside the greenhouse system. Sensors gather various physical data from the field in real time and transmit it to the processor and to the end user via ZigBee communication module. Then necessary actions are initiated to perform action on behalf of people to reduce or eliminate the need of human labor. Necessary threshold values for each sensor measurement have been included in the program, so that the essential parameters necessary for plant growth can be accurately controlled. The proposed system has been tested for a week and reasonable results have been observed, which indicate that this system is very much useful for automatic greenhouse system monitoring and control.

Automatic Monitoring and Controlling of Greenhouse System using Zigbee

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

G. Hima Bindu | K. Lokesh Krishna, K. Hema Latha

Abstract

The usage of Wireless Sensor Networks has become really important in recent years because of their ability to manage real-time data for various novel services. In this paper a ZigBee based automatically monitored and controlling system for greenhouse system is designed and implemented. This system utilizes an ARM7 processor, various sensors and ZigBee communication module. The entire system is powered by using a solar plate, placed outside the greenhouse system. Sensors gather various physical data from the field in real time and transmit it to the processor and to the end user via ZigBee communication module. Then necessary actions are initiated to perform action on behalf of people to reduce or eliminate the need of human labor. Necessary threshold values for each sensor measurement have been included in the program, so that the essential parameters necessary for plant growth can be accurately controlled. The proposed system has been tested for a week and reasonable results have been observed, which indicate that this system is very much useful for automatic greenhouse system monitoring and control

Automatic Pneumatic Bumper and Brake Actuation Before Collision

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

Aruna S  | Akhilesh Nayaka M, Chethan C,Harshitha MS, Kushal C

Abstract

An automobile's bumper is the front-most or rear-most part, ostensibly designed to allow the car to sustain an impact without damage to the vehicle's safety systems. They are not capable of reducing injury to vehicle occupants in high-speed impacts, but are increasingly being designed to mitigate injury to pedestrians struck by cars

Automatic Railway Gate Control System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sweety Sinha | Pankhuri Priyam , V.Vishnupriya, Showme Joselin

Abstract

In India casualties due to road as well as rail accidents predominates. When we look at a single road mishap ,only a few succumbs but ,in a single rail accident hundreds to thousand tombs are laid. The objective of this paper is to provide an automatic railway gate at the level crossing ,thus replacing the present technique of manual operation done by humans. Also this type of gates can be employed in an unmanned level crossing where the chances of accidents are higher and reliable operation is needed. Since, the operation is automated, mortal accidents can be prevented . This proposed system uses Adriano Uno microcontroller and IR sensors .

Automatic Recognition for Instances of Repetitions in Stuttered Speech using Sequence Training Algorithm

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

G. Manjula | Dr. M. Shiva Kumar

Abstract

Stuttering is a speech disorder in which normal flow of speech is messed out by occurrences of dysfluencies. There are high proportion of prolongations and repetitions in stuttered speech. Stuttered speech recognition technology is a great aid to admit the challenges and it is a prominent technology for Human-computer Interaction . Conventionally, stuttering assessment is done by counting number of dysfluent words as a proportion of total words in a passage. Stuttering assessment is also done by measuring the time of dysfluencies and comparing with the duration of the entire passage. However, it is time-consuming and it results in poor agreement with different individuals assessing the same speech data. Therefore, automatic stuttered speech recognition system is used to automate the dysfluency count and type of dysfluency classification, thus providing an objective and consistent assessment of stuttered speech. Such approach can support Speech Language Pathology (SLP) by doing tedious routine works and allowing more time for therapeutic session between SLP and stutterers. Instances of repetitions in stuttered speech are recognized by using back propogation based sequence training method. Artificial neural network is used to make intelligence through the learning process. In this work Multi-layer Feed forward Network and error back propagation learning algorithm is used to train the network. The combination of the artificial neural network and the back propagation algorithm is the sequence training technique. The experimental investigations reveal that the proposed method shows promising results in identifying the instances of repetitions in stuttered speech

Automatic Resistance Spot Welding Using Arm Controller

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 8th August 2017

Mohan Kumar B N | Aruna E, Dhanush S, SaiNikitha D, Sneha V

Abstract

Resistance Spot welding system which is used for performing a welding process. The paper is divided into 3 sections. First, brief introduction of welding, methods of welding control such as resistance and spot welding is given. Secondly, the critical factor in the design of a welding process is dealt along with the principle of the welding process. Following this, the introduction to the design of the control scheme employed by us with the basic block diagram of the welding system and the functioning is presented. Finally, the conclusions is drawn along with its working and future improvements. The traditional approach in relation to spot welding machines is to use 50 Hz welding transformers. The drawback associated with these transformers is that they are both heavy and bulky. With the development of high power semiconductor switches and DC-DC converter topologies, it is now possible to develop inverter drive resistance spot welding equipment which can be operated at frequencies higher than the 50Hz frequency. The advantage of using high frequencies is the reduction in the size of the transformer. Automated resistance welding machines use micro-controller based control systems to regulate and ensure consistent welds. The design hopes to achieve complete automation of the resistance welding process. This is done by accepting various process inputs from the user and after due process, controlling various parameters like the current, conduction angle, weld count, etc.,. This is achieved by using a micro-controller, which will acquire data from the user and process it to generate suitable control signals as and when required during the welding process. The use of arm microcontroller makes the operation extremely fast, reliable and flexible. In the design, the most important parameter to be monitored and controlled is the primary welding current. For this constant current control method, an adaptive algorithm takes care of the past and present values, to predict the firing angles of thyristors in the next cycle, to ensure the present value of the current is maintained. The design and development of the control software algorithm is dealt with. Finally, the conclusions are drawn along with its working.

Automatic Retinal Disorder Identification In Diabetic Retinopathy And Maculopathy Using Neural Network

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sandeep M S | Dr Chandrashekar M Patil

Abstract

Computational methodologies have become a significant part of the real time applications. One specification application which highly depends on the computing techniques is the medical led ophthalmology is a significant branch of biomedical led which requires computer aided automated techniques for pathology identification in human eyes. Eye is the most essential part of the entire creature in this world for vision. So the main intention of carrying this work is to reduce retinal disorders in younger generation. This work proceeds with detecting the disorder present in human eye based on Diabetic retinopathy and other parameter and develops an efficient algorithm to detect retinal disorder using MATLAB.

Automatic Sewage Cleaning Machine

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 13th July 2017

Viresh.G.S | Puneeth.K ,Mahendra.S ,Karthik.N.S, Balaji.V

Abstract

In this project the proposal concept is to replace the manual work in drainage cleaning by automated system. Now a day‚Äôs even through automation plays a vital role in all industrial applications in the proper disposal of sewages from industries and commercials are still a challenging task. Drainage pipes are using for the disposal and unfortunately sometimes there may be loss of human life while cleaning the blockages in the drainage pipes. To overcome this problem and to save the human life we implement design.‚ÄúAutomatic sewage cleaning system‚ÄĚ. We designed our project to use this in efficient way to control the disposal of wastages and with regular filtration of wastages, clearance of gaseous substance are treated separately and monitor the disposal of frequent manner.

Automatic Soil Moisture Monitoring System

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Khushal G. Katara | Saket C. Joshi,Harsh L. Bhanushali,Bhavishek S. Panikar

Abstract

Irrigation part in farming has always been an important part for farmers. Manual attempts for the irrigation, such as water supply and keeping the records are quite tedious .In order to make it simple and connected to technology, Soil moisture can be detected by soil moisture sensor. This sensor can detect the moisture level of the soil. This can be done automatic with microcontroller, so that whenever moisture level of soil gets low or soil gets dry, Water can be supplied automatically. The android app will store the records and can control the sensor and water pump. This can cut the manual attempts regarding the irrigation and simplify the efforts for farming with technology. Connecting the irrigation with technology makes it to the ‚Äúsmart irrigation‚ÄĚ.

Automatic Toll Payment with Tracking of Theft Vehicles

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ajila Shirin A | Geethu M S , Jayitha O , Kabeer Nisam O , Muhammed Niyas

Abstract

Millions of drivers passing through Toll Gate Stations every day. The conventional way of collecting the toll from the vehicle drivers is to stop the car by the Toll Gate Stations and then pay the amount to the toll collector standing (or perhaps sitting!) by the side of the toll booth, after which the gate is opened either mechanically or electronically for the driver to get through the toll station. An efficient utilization of communication link between RF Modems over a wireless channel to facilitate vehicle monitoring, vehicle authentication and automated toll collection on the highways is proposed. The system is implemented to automatically collecting the toll and more convenient way of traffic management. The implementation is divided into the design of three modules, Vehicle Module, Tollgate station and Central PC End. The three modules communicate via RF Data modem connected to each module.

Automatic Vehicle Accident Detection & Messaging System Using GPS & GSM

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

M.Susmitha | H.Keerthana, Y.Aishwarya, S.Parvezahmed,S. Narasimhulu

Abstract

Road accidents constitute the major part of the accident deaths all over the world. According to the Insurance Institute for Highway Safety (IIHS), new cars and its high-tech safety features have helped to lessen auto related deaths over the past 12 years. Though it credits technology for lessening auto accidents, yet the IIHS cannot help accusing bad driving behavior, like drunken driving, speeding and not using seatbelts for still causing major traffic deaths. Automatic vehicle accident detection and messaging system is an embedded intelligence implanted into the automobile. The purpose of the project is to find the vehicle where it is and locate the vehicle by means of sending a message using a system which is placed inside of vehicle system Most of the times we may not be able to find accident location because we don’t know where accident will happen. In order to give treatment for injured people, first we need to know where the accident happened through location tracking and sending a message to your related one or to the emergency services. So in this work we are using the basic microcontroller Arduino atmega328 for cost effective and also for easy understanding. Here we used assembly programming for better accuracy and GPS and GSM modules which helps to trace the vehicle anywhere on the globe. The exact location of the vehicle is sent to our remote devices (mobile phones) using GSM modem.

Automatic Voiture Verschelles

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 13th July 2017

Dhanya G S | Kadar Basha J,Anjukumar S, Akshayaa D, Jeyaramanan S

Abstract

In this project work an automatic car cover is proposed which will opens itself with the help of push button. It covers the whole car with a thin and a strong material that not only protects the car from rain, dust and mud in parked situation but, also from minor scratches. The model also consists of microcontroller and sensors for sensing the surrounding environment and based on the values, the car cover mechanism would be activated. The cover takes the shape of the car and the car is well protected..

Automatic Wire Measuring & Cutting Machine

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Chhapre Pradeep S | Patil Pavan S.,WaingadeSuraj D,Chougule Rohan A

Abstract

In small scale industries the wire been cutted manually so it is consuming more time.so the automation system solves unskilled labor problems which save cost, increases accuracy and decreases human errors. In an automatic wire cutting machine a stepper motor driven knurled roller is positioned between two wire guide channels to drive a wire toward a cutting station. The length of wire to be cut is set in a length counter and the wire is driven to the predetermined distance. Then the motor is disabled and cutting blade is energized. This automatic wire cutting machine is fully automated in processing wire( round and flat cable). Hence, introducing automation to these basic processes it will be fruitful regarding the companyís development and profit gain as it improves the system in many ways.

Automation of Library System Using Firebird V

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rohit Kelkar | Mohit Deshmukh , Nihar Pawde , Aditya Chauhan

Abstract

Though the ease of dealing with the library services has evolved in past few years, there are still some chances of finding human errors and locating books in library. The automation technology has developed rapidly in the last two decades and so as the ease of dealing with things in day to day life. In this paper we have tried to demonstrate a prototype of Autonomous Robot Fire Bird Vwhich will automate the book issuing system in library. The robot will take input from the user and serach for the desired book among library shelves. Upon getting the respective book, it will hand it over to the user thereby reducing human work.

Automation of Pizza Delivery System Using Firebird V

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sampada Patki | Shivam Deshpande , Shubham Mahajan , Shreyas Pande , Prof.S.V.Pattalwar

Abstract

Firebird V Pizza delivery system is robot automated pizza delivery system which enables to reduce the human errors and efforts and reduce the time complexities achieving the maximum possible accuracy at the same time. Firebird V with ATmega 2560 as a micro- processor is used as a hardware in achieving the objectives. We have used embedded C as a programming tool to help the robot perform the required task.

Automation of Remote Areas in Emergency Using Smart Card Or UID Cards

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Prof. Abhijit V. Warhade | Prof. Pranali K. Misal, Prof. Harsha Ramawat

Abstract

In the age of electronic system it is important to be able to control and acquire information from anywhere. Although many methods for automation system have been developed limitations in the range of device is main problem faced by all these devices. We developed an electronic system consist of four buttons namely police, fire, ambulance and NMC and a card reader. This system will be known as UID station which will be available at every square like ATM stations. Whenever anybody needs to contact any one of the above mentioned departments, he or she will go to the UID station nearer to him or her will swap the card in card reader then will press the required button. In this way the information will be sent to the particular station indicating the information of complainer and number of times the complain received. At every station there will be a button which will be pressed by the station in charge to show that the complain is received. And the complainer will get the confirmation. In this way information is sent at nearest station and problems are solved at fast rate.

Autonomous Robot for Agrilife

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Prof P.G.Salunke | Radhika R. Deshmukh , Shital R. Chaudhari , Nayan P.Gharte , Poonam K. Desale

Abstract

This paper represents the system which perform high speed operation for an advanced agricultural process which consist cultivation based on the robotic platform. The robotic system is an electromechanical system while the artificial system which is driven by the DC motor which has four wheels. Depending upon the crop, considering particular rows & specific columns the watering operation is performed. The robot will sense the crop on both sides and after detection of crop it will shower them equally and at a proper distance. For which proximity sensor would be used. Assembly language is used for programming the microcontroller. Microcontroller is the heart of the system which is used to control and monitor it with help of the DC motor.

Avoiding Intrusion and Privacy Protection for Cloudlet-based Medical Data Sharing

International Journal of Engineering Research in Computer Science and Engineering, Available online 30th August 2017

Karthika.J | Lavanya.S, JayaSankari.J, Mariya sushmitha.T.F, kanimozhi.R

Abstract

The popularity of wearable devices with the development of clouds and cloudlet technology, increased the need to provide better medical care. The process of medical data includes data collection, data storage and data sharing,. In the Traditional healthcare system ,it requires the delivery of medical data to the cloud, which involves users’ integrated information and causes communication energy consumption. Practically, medical data sharing is a critical and most challenging issue. The functions of cloudlet include privacy protection, data sharing and intrusion detection. In the stage of data collection, we first utilize Number Theory Research Unit (NTRU) method to encrypt user’s body data collected by wearable devices. Those data will be transmitted to nearby cloudlet in an energy efficient fashion. Secondly, a new trust model to help users to select trustable partners who want to share stored data in the cloudlet. Thirdly, we divide users’ medical data stored in remote cloud of hospital into three parts, and give them proper protection. Lastly , to protect the healthcare system from malicious attacks, we develop a novel collaborative intrusion detection system method based on cloudlet mesh.

‚ÄúAn automated brain tumour detection and severity analysis using ANN‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Prof. Vrushali Borase | Prof. Gayatri Naik, Prof. Vaishali Londhe

Abstract

A Brain Cancer is very serious disease causing deaths of many individuals. The detection and classification system must be available so that it can be diagnosed at early stages. Cancer classification has been one of the most challenging tasks in clinical diagnosis. At present cancer classification is done mainly by looking through the cells’ morphological differences, which do not always give a clear distinction of cancer subtypes. Unfortunately, this may have a significant impact on the final outcome of whether a patient could be cured effectively or not. This paper deals with such a system which uses computer based procedures to detect tumour blocks and classify the type of tumour using Artificial Neural Network Algorithm for MRI images of different patients. Different image processing techniques such as image segmentation, image enhancement and feature extraction are used for detection of the brain tumour in the MRI images of the cancer affected patients. Detecting Brain tumour using Image Processing techniques involves four stages namely Image Pre-Processing, Image segmentation, Feature Extraction, and Classification. Image processing and neural network techniques are used to improve the performance of detecting and classifying brain tumour in MRI images. MRI scan images are taken for this project to process it.This work presents the artificial neural network approach. It is used to classify the type of tumor in MRI images. The whole system worked in two modes firstly Training/Learning mode and secondly Testing/Recognition mode finally gets a classified output. This paper gives an overview of image segmentation technique based on Particle Swarm Optimization (PSO). PSO is one of the latest and emerging digital image segmentation techniques inspired from the nature. After segmentation features are extracted and submitted to a kernel support vector machine (KSVM).

‚ÄúDevelopment of Computer Aided Diagnosis System (CADx) for Detection of Anomalies in Breast using Textural Features with PNN classifier‚ÄĚ

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 4th September 2017

Miss. Ankita Satyendra Singh | Mrs. M. M. Pawar

Abstract

High False Negative Rate (FNR) is a very significant problem in a Computer Aided Diagnostic System as false negative answer may lead to a very high increase in the number of deaths. The main aim of this paper lies in the development of a new Computer Aided Diagnosis (CADx) system for the proper identification of breast masses. It also focuses at extraction of textural features. The input images are pre-processed by using Adaptive Median Filter and then segmented by using Gaussian Mixture Model i.e. GMM segmentation and further are subjected to feature extraction, selection and finally classification by using PNN classifier. MIAS database is used for research purpose which contains 322 mammogram images out of which 60 images as 20 of benign, 20 malignant and 20 normal are taken into consideration for feature extraction. 22 texture features are extracted and are further classified. PNN classifier with 80-20 train-test partition is used for classification. The Sensitivity, Specificity and Accuracy obtained by the selected features are 100%, 100%, and 100% respectively.

‚ÄúDevelopment of Computer Aided Diagnosis System (CADx) for Detection of Anomalies in Breast using Textural Features with PNN classifier‚ÄĚ

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Miss. Ankita Satyendra Singh | Prof. Mrs. M. M. Pawar

Abstract

High False Negative Rate (FNR) is a very significant problem in a Computer Aided Diagnostic System as false negative answer may lead to a very high increase in the number of deaths. The main aim of this paper lies in the development of a new Computer Aided Diagnosis (CADx) system for the proper identification of breast masses. It also focuses at extraction of textural features. The input images are pre-processed by using Adaptive Median Filter and then segmented by using Gaussian Mixture Model i.e. GMM segmentation and further are subjected to feature extraction, selection and finally classification by using PNN classifier. MIAS database is used for research purpose which contains 322 mammogram images out of which 60 images as 20 of benign, 20 malignant and 20 normal are taken into consideration for feature extraction. 22 texture features are extracted and are further classified. PNN classifier with 80-20 train-test partition is used for classification. The Sensitivity, Specificity and Accuracy obtained by the selected features are 100%, 100%, and 100% respectively

‚ÄúDigibin‚ÄĚ-a smart way of sorting solid waste

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th July 2017

Dr. B Shadaksharappa | Mrs.V.K Shalini, Meenakshi Allagi,Pallavi V Naik,Bhavya C P, K Harshitha

Abstract

Waste Management is the pervasive problem. Nowadays and rising continuously with rise in urbanization. Waste is always the mixture of different types of material. The main goal of this project is to design and develop a sorting system that is portable and also sorts the waste automatically. It’s an eco-friendly automatic system. With the Proliferation of Internet of Things (IOT) Devices as Such as Smart phones and Sensors, this Project describes the effective management of solid waste using embedded system. The solar panel and H-bridge are used by the motor to make the system portable. The moving system stops when a non-living obstacle arrives and takes a turn. Otherwise gets the inputs from the waste dumped by the person which is detected by the sensor. The sensor sends a signal to micro-controller where it decides the type of waste (biodegradable and nonbiodegradable) and separates it automatically and moves forward. Here the IOT module is used to control and monitor the waste. The system consist of mobile app which receives a message when the dustbin is full (3kg) makes the system to alert and the information is sent to the authority who own the and it resend the meesge to the bin for automatic disposal to the dump site. It even includes database of wastage collection on the particular day.

‚ÄúEntrepreneurship Development in India: Challenges and Opportunities‚ÄĚ

International Journal of Science , Engineering and Management, Available online 22nd August 2017

Prof. Reshma R. Pais | Dr. Shivani O. Katakwar

Abstract

Entrepreneurship is vital for economic growth and employment in all societies of the developing countries. In developing country like India, where successful small businesses are the primary engines of job creation and poverty reduction, Entrepreneurship plays an important role. Entrepreneurship has great importance in various economic systems and it prevails in all economic systems in one form or the other. ENTREPRENEURSHIP is the key word to Innovation, Creativity and Motivation. An entrepreneur is a rare person who can visualize and materialize water in the dessert. This paper provides an overview of entrepreneurship development, entrepreneurial qualities, opportunities and challenges faced by an entrepreneur.

‚ÄúHybrid technique of Image Encryption to Enhance Security‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Kalyani D. Kadukar | Prof.R. Krishna

Abstract

The aim of this project is related to novel scheme for separable reversible data hiding in encrypted image is proposed, which consists of image encryption, data embedding and data-extraction/image-recovery ,3D chaos generation,3D histogram equalization, row rotation, column rotation and XOR operation phases. Additional message are embed into some cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message is called reversible data hiding. Separable reversible data hiding, the name its self indicates that it is a separable reversible data technique .That is it is reversible data technique but which is separable. The separable means which is able to separate .The separation of activities i.e. extraction of original cover image and extraction of payload is done in this method. This separation requires some basic cause to occur. In separable data hiding key explained by Xinpeng Zhang the separation exists according to keys. Digital images has increased rapidly on the Internet. Security becomes increasingly important for many applications, confidential transmission, video surveillance, military and medical applications. The transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks

‚ÄúImplementation of file level and block level deduplication and detecting attacks in cloud environment.‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Prof. Samita Mokal | Prof. Nilima Nikam, Prof. Vaishali Londhe

Abstract

In cloud computing, security and storage space management techniques are most important factors for improving the performance of cloud computing. Secure deduplication is a technique for eliminating duplicate copies of storage data, and provides security to them. To reduce storage space and upload bandwidth in cloud storage deduplication has been a well-known technique.. The basic idea in this paper is that we can eliminate duplicate copies of storage data and limit the damage of stolen data if we decrease the value of that stolen information to the attacker. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. we propose Sekey, User Behavior Profiling and Decoys technology. Sekey new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers for insider attacker. As a proof of concept, we implement Sekey using the Ramp secret sharing scheme and demonstrate that Sekey incurs limited overhead in realistic environments. User profiling and decoys, then, serve two purposes. First one is validating whether data access is authorized when abnormal information access is detected, and second one is that confusing the attacker with bogus information. We posit that the combination of these security features will provide unprecedented levels of security for the deduplication in insider and outsider attacker..

‚ÄúMalicious Misbehavior Activity Detection Using Probabilistic Threat Propagation in Network Security‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Tejaswini S. Akulwar | Associate Prof. P. S. Kulkarni

Abstract

A PTP approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or sends some other message to a neighbor node. This system is based on Probabilistic threat propagation. This scheme is used in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief propagation

‚ÄúSecurity privacy preserving for content leaks‚ÄĚ

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Shradha V. Raghorte | Dr . Rahila Sheikh

Abstract

The information leak of sensitive data on systems has a serious threat to organization data security. Statistics show that the improper encryption on files and communications due to human errors is one of the leading causes of information loss. So there a need tools to identify the exposure of sensitive data by monitoring the content in storage and transmission. However, detecting the exposure of sensitive data information is challenging due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, it is utilize sequence alignment techniques used for detecting complex data-leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. The system achieves good detection accuracy in recognizing transformed leaks. It implement a parallelized version of our algorithms in graphics processing unit to achieves high analysis data. In the case of collective privacy preservation, organizations have to cope with some interesting conflicts. For instance, when personal information undergoes analysis processes that produce new facts about users' shopping patterns, hobbies, or preferences, these facts could be used in recommender systems to predict or affect their future shopping patterns. In general, this scenario is beneficial to both users and organizations. However, when organizations share data in a collaborative project, the goal is not only to protect personally identifiable information but also sensitive knowledge represented by some strategic patterns.

‚ÄúVector Speed Control of Induction Motor using self-adjusting Fuzzy controller for Grain Drying System‚ÄĚ

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 27th June 2017

Ms. Ranjitha K. M | Dr. Rajashekar J. S

Abstract

Grain drying is process of drying grain to prevent spoilage during storage and its process has the characteristics of large time delay, nonlinearity, multi disturbance and strong coupling.The Direct Torque Control (DTC) is the fastest responding method in the vector control family in the induction motor control. The torque and the flux estimation is observed directly from the voltage and the current observed from the winding unlike getting the speed and then finding the desired flux and torque.In the actual control process of grain drying, the speed of the discharging motor is controlled to realize the drying target by detecting the outlet grain moisture. In order to reduce the grain moisture content during Continuous flow drying process, to ensure the grain quality of the grain, and enable the uniform moisture content of outlet grain, to control the speed of grain flow, a new improved controller model for grain drying which called the self-adjusting fuzzy controller is proposed and the problem of fixed change rate of the parameters of general PID controller is solved. This Project implements the direct torque control on the Induction motor with low ripples and fast torque dynamics. The flux estimation, torque estimation and the speed control technique for switching the Induction motor is the prime portion of the control system which is taken care by the self-adapting fuzzy controller based system. MATLAB based simulation is carried and compared for the dynamic response and the reduced torque ripples with PI controller.

Bad Road Tracker

International Journal of Engineering Research in Computer Science and Engineering, Available online 17th October 2017

Varsha Singh | Noor Allema

Abstract

This brief paper describes the uses and concepts of enables the user to track all the roads which are not suitable to travel. It gives the shortest and most comfort path to travel. This application can be used by taxi drivers and by common people.

Bandwidth Enhancement of Multi band Microstrip Patch Antenna

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Pavan Kumar Shandilya | Poonam Sinha

Abstract

Microstrip patch antenna is versatile field of antenna theory. A special antenna design that improves electrical performance and sustainability is described here. A single feed compact microstrip patch antenna with resonant frequency 4 GHz is proposed in this paper for two geometries. The proposed antenna design of different geometries (i.e. Rectangular and circular). The simulation results are : For rectangular geometry return loss of -38.86 dB ,VSWR = 1.023 at 5 GHz, and 28% impedance bandwidth at 4.5 Ė 6 GHz and for circular geometry return loss of -19.54 dB ,VSWR = 1.236 at 7 GHz and 25% impedance bandwidth at 6.2 - 8 GHz.

Bank Locker Security System Using Face Recognition

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Roshiny Thomas | Sanjana Mathews, Sona Ojus, Sona Roselin Joseph, Therese Yamuna Mahesh

Abstract

This paper presents an advanced Bank locker security system based on Face Recognition. The locker holders will be able to access their locker after the system recognizes their face and exercises locker door control to allow entry. Detection is performed on the basis of skin color model. This will help reduce computational complexity. Viola Jones Algorithm is used for the same. An additional password protection is provided to enhance locker security. In case of a wrong password entry, the true locker holder will be notified with an alert call from the bank to the saved contact number in the system. The system is designed to capture a personís real-time image, compare it with the stored images in the database and on detecting a match, will grant them access after password entry has been verified. Face recognition is performed using the Principal Component Analysis and a specific face can be recognized by comparing the principal components of the current face to those of the known individuals in a facial database built in advance. Illuminance variations are manipulated using the Discrete Cosine Transform Algorithm (DCT).

Bare PCB Defect Detection and Sorting Using Image Processing Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Harshitha.R | Dr.Mahesh Rao

Abstract

The importance of the Printed Circuit Board inspection process has been magnified by requirements of the modern manufacturing environment where delivery of 100% defect free PCBs is the expectation. To meet such expectations, identifying various defects and their types becomes the first step. In this PCB inspection system the inspection algorithm mainly focuses on the defect detection using the natural images. Many practical issues like tilt of the images, bad light conditions, height at which images are taken etc. are to be considered to ensure good quality of the image which can then be used for defect detection. In this paper results of an attempt made at defect detection considering various factors using the image processing techniques with MATLAB is presented.

Based On GSM Effects of Stand Alones Solar Ė Wind Power Generation

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

B.Meenakshi | S.Anbarasi , G.Indhumathi

Abstract

Hybrid wind-solar power generation is an unpolluted energy. MPPT algorithm is used for hybrid power generation. This MPPT algorithm gives more efficiency of power generation in wind-solar energy, but this MPPT algorithm does not give the constant voltage and current. Because exact sun angle is not located in solar panel. This mechanical model requires high electrical power, which may not be efficient. The proposed system of this paper is using a high frequency charging system (HFCS) and multilevel charging system (BESS). This BESS stands for battery energy storage system in our scheme whatever voltage collect from wind-solar that can be applied whose charging to the battery equivalent to the collected voltage. The HFCS system is applied for high efficiency of voltage from the wind-solar power generator such as switching circuit, relay and polarity controller are used. In this paper we are implementing GSM modem to monitor and control the power generation in wind-solar. The GSM modem is interfaced by using the Embedded microcontroller to monitor the power generation in remote devices. The remote device controls the AC load in power generation.

Basic March-C Algorithm based BIST for Embedded Memories in FPGA

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Hema G D | DivyaPrabha, M.Z. Kurian

Abstract

Built in Self Test is one of the widely used methods for memory testing and it is the cost effective method. The fault in the memory is due to the complexity of the design rules. For complex applications, the memories without faults are necessary. There are many test algorithms for testing of memories, march based tests are the dominant testing algorithms due to simplicity and ability to test the faults. Because of this, march tests are implemented in most modern memories BIST. In this project, by considering optimized march-c algorithm to test the faults. This algorithm uses the concurrent technique. Because of concurrency the testing time is reduced compared to basic march c algorithm. This technique is applied to 256x8 memories it can be extended to any size. For the effectiveness of this algorithm, Built-in selftest technique is considered to test embedded memory of the FPGA.

Batch Normalization and Its Optimization Techniques: Review

International Journal of Engineering Research in Computer Science and Engineering, Available online 15th September 2017

Niveditha Kumaran | Ashlesha Vaidya

Abstract

‚ÄĒ Batch normalization is a boon to the training of a deep neural network. It acts as a panacea to the problem of internal covariate shift and facilitates the usage of higher learning rates. It also accounts for the inclusion of saturating non-linear functions, while excluding the need of drop outs for regularisation. However, mini-batch normalization is not self-sufficient and comes with a few limitations such as inability to deal with non-i.i.d inputs and decreased efficiency with a batch size of one. In this paper, we explore normalization, the need for its optimization, and evaluate the optimization technique provided by researchers.

Behavior and appearance cram of Android Robot for HRI

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th September 2017

R.Priya | 

Abstract

Human‚Äďrobot interaction is the study of interactions between humans and robots. Human‚Äďrobot interaction(HRI) is a multidisciplinary field with aid from human‚Äďcomputer interaction, design, robotics, artificial intelligence, natural language understanding, and social sciences. This is basic setback in robot development is its appearance and behavior. Namely, not only the performance but also the look of a robot influences human-robot interaction. However, there is no approach to overcome this problem. In order to utter this problem, we propose an android robot that has similar appearance as humans and several actuators generating micro behaviors.

Behavior and appearance cram of Android Robot for HRI

International Journal of Engineering Research in Computer Science and Engineering, Available online 20th September 2017

R.Priya | 

Abstract

Human‚Äďrobot interaction is the study of interactions between humans and robots. Human‚Äďrobot interaction(HRI) is a multidisciplinary field with aid from human‚Äďcomputer interaction, design, robotics, artificial intelligence, natural language understanding, and social sciences. This is basic setback in robot development is its appearance and behavior. Namely, not only the performance but also the look of a robot influences human-robot interaction. However, there is no approach to overcome this problem. In order to utter this problem, we propose an android robot that has similar appearance as humans and several actuators generating micro behaviors.

Behavior under Axial Load for Concrete Filled Steel Tubes

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Arjun.K | Shubhalakshmi .B. S,Darshan. N

Abstract

the concrete filled steel tubes are used very less due to lack of knowledge and less availability of proper codes. In this study attempt has been made to study the behavior of concrete filled steel tubes under axial load. Type of concrete used here is selfcompacting concrete which is prepared using proper directions from EFNARRC guidelines. After the experimental work done the obtained results are later compared with the theoretical results obtained by international codes i.e., EC4, ACI-318-1999, ASCI- 2005.

Benefits and Simulation of MPPT Controller for PV Systems

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 11th July 2017

Baskaran | Vanthakanna, Sathishkumar, Vignesh C

Abstract

In the paper we discuss the benefits from the use of the maximum power point tracking algorithm in the control of photovoltaic systems.We compare the advantages of the considered approach in comparison to the previous solutions like the use of pulse width modulation .It is proven in the paper that the microcontroller implementation of the proposed algorithm allows one to reduce both the energy losses and the costs related to system design, Maximum power point tracking controller is preferable than the PWM controller. To perform the MPPT operation in the system the PIC microcontroller is employed. The MPPT controller not only reduces the energy loss and also reducing the cost of laying the system.

BER Analysis of LDPC Coded System in AWGN Channel

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Anumol P Joy | Gils Mary George,Greeshma Paul,Jittu Deena Glady

Abstract

Wireless communication is one of the fastest growing segments in communication industry. However, it is faced with the challenge of providing high- speed communications due to channel impediments which change over time in unpredictable ways. This paper deals with analysis of bit error rate using different modulation techniques and finding a better mechanism for reliable communication. The results obtained shows that the proposed technique is robust for signal transmission over mobile radio channels.

Ber Performance of Wireless Communication System using Jscc and Mio Encryption

Journal of signal processing and wireless technologies, Available online 9th August 2017

Mary Miranda | Jaison Jacob

Abstract

These Most of the communication today occurs through the wireless medium. In such a communication, due to the openness of the network, the transmitted signal may get added with the additive noise present in the channel, which may severely degrade the performance of the communication system. Also, since the transmission of highly confidential messages takes place through wireless networks, security and integrity of the transmitted signal is a challenging issue in such networks. Physical layer security techniques are mainly based on channel characteristics. It has been proved that, using a proper channel coding, can achieve information-theoretic secrecy thereby making the eavesdropper hard to break the encryption, even it has unlimited computing power. This paper combines analog joint source-channel coding (JSCC) followed by multiple inter-symbol obfuscation (MIO) encryption to enhance the security and reduce the bit error rate of wireless communication system. The BER of the proposed method is compared with MIO scheme and the proposed method exhibits a better BER performance than the MIO scheme

Bidirectional AC/DC Converter PWM Strategy To Reduce Switching Loss with Feedforward Control in Grid-Tied Micro Grid System

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 17th August 2017

Pranita Rajkuwar | Sanjay A. Deokar

Abstract

This paper proposes the simplified pulse width modulation ( PWM ) strategy in the bidirectional ac/dc single-phase converter with the feed-forward control scheme. In this, the number of switching of the proposed simplified PWM strategy is reduced to one-fourth to that of the unipolar & bipolar PWM. The feed-forward control scheme is used to achieve better performance of the ac/dc converter in both the rectifier & inverter mode as compared with the conventional dual-loop control scheme. The simplified PWM strategy with feed-forward control scheme has higher efficiency than that of the unipolar PWM & bipolar PWM strategies. Also, the total harmonic distortion is less in this PWM strategy. The simulation & experiments are carried out to verify the validity of the proposed PWM strategy & control scheme.

Big Data Analysis On Gene Mutation Detection For Bacterial Diseases

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sharath Kumar S | Sanil A Jain,Veeresh Shenoy S, Vinith G,M Ravi Krishna

Abstract

Big data and analytics is a method of examining a lot of datasets to uncover hidden patterns, market trends, and other useful business information. In a human body, the gene will generate a significant amount of data; the real challenge here is to find, collect, analyze and manage information so that we can avoid the occurrence of the illness and be healthier. Nowadays many people are losing their lives because of bacterial diseases like MRSA, CRE, etc. So we are trying to collect the data sets of a particular disease and analyze it by detecting gene mutation, which helps people to find which gene is the actual cause of the particular disease. Here we will be finding which mutation is responsible for that drug resistance. This drug resistant gene will be found out in a large population. A mutation is the permanent change of the nucleotide sequence of an organism, genetic elements, virus or extrachromosomal DNA. Errors during DNA replication results in the mutation which further undergoes error-prone repair. Through genetic recombination, mutations can involve the duplication of vast sections of DNA

Big Data and Its Privacy Issues

International Journal of Engineering Research in Computer Science and Engineering, Available online 10th November 2017

P.Latha | Dr. P.Niranjan

Abstract

With the recent growth in knowledge, networking and cost reduction in storage devices, today we are inundated with huge amount of data. The data is collect from various sources and wide variety of application areas. Study was performed on these data by means of precisely developed models. Big data is a straight term used to explain the exponential increase and convenience of structured and unstructured data. In upcoming big data will be essential to big business as well as society like internet capacity. Resolutions that were before build on belief or on conceptual models of reality can now be done based on the composed and store data itself. Big Data study is now used in almost all phase of our society, marketing, banking, communication services, and research. The big data stage has shown the ways for vast opportunities in health care system, science, economic decision, educational system and novel forms of community interaction and activity. But this opportunity also results in challenge in the area of confidentiality and safety. Big data utilize huge quantity of data that may be available in the cloud and it may require data giving out distributed across several servers. It is found that the increase progress of big data also intensify the fear to information security. This paper spotlight on the big data and its privacy issues associated to it.

Big Data Concepts, Challenges and Solution in Hadoop Ecosystem

International Journal of Engineering Research in Computer Science and Engineering, Available online 23rd October 2017

Dr. Ujjwal Agarwal | 

Abstract

Data becomes big data when its volume, variety, and velocity exceed the abilities of our systems architecture and algorithm. This paper discusses about three major sources of big data: machine generated data, people generated data and organization generated data, 6V’s of Big Data: volume, velocity, variety, valence, veracity and value along with we discussed the different variety of data: structured, semi-structured and un-structured data like sensor, images, PDF, CSV, JSON, RDMS, database, table data etc. out of which approximately 5% of available data is in structured form rest other data is in either unstructured or semi structured. Big data is facing lots of challenges due to volume, variety and other complexity in the data. Hadoop is the platform where we can find all our solution related to big data to store process and analysis purpose. The main objective of this paper to describe how Hadoop can solve different challenges of Big data by using HDFS (Hadoop distributed file System), Map Reduce and Hadoop Ecosystem components like Hive, Sqoop, HBase, Pig, spark, Flume, Kafka etc.

Big Data management in Manufacturing Industries for Internet of Things

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Sabitha M.S | Dr.S.Viayalakshmi ,R.M.Rathikaa Sre

Abstract

In the current scenario, enormous technology improvements are happening in the field of Network communication, cloud computing, Big Data and IoT. Information technology is bringing a new business paradigm by introducing Internet of Technology (IoT). Nowadays adoption of IoT and Cloud computing has become mandatory for the Modern enterprises. The biggest challenge in front of us is handling the IoT generated Big Data. Big Data provides an opportunity to find the insights from the machine generated data that converts the business environments into more agile and it answers the questions which were considered beyond our reach before. This paper focuses on the requirement of IoT and Big Data in the modern enterprises.

Big Data-An Emerging and Innovative Technology: Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Keerthana R | Nandini N,Karthik N S, Divya L ,Mrs Sheela devi

Abstract

This paper is a review of the big data concept, its dimensions, its architecture comparison between the earlier concept and the latest, the storage possible i.e. the databases and origin of big data. The relational database, having rigid schema, has been prevailing since a long time but it is difficult to store the unstructured data in relational database. The unstructured data has mainly text nature or is in the form of logs. Here comes the concept of No SQL databases. Big Data is small data with large data size

Bioaccumulation of heavy metals and oxidative stress in Mugil cephalusin Adyar estuary

International Journal of Science , Engineering and Management, Available online 30th August 2017

Sophia.S | Dr.M.C.John Milton

Abstract

Heavy metals in the marine environment are of considerable interest because they remain in the organism and may accumulate and magnify in body tissue. The presence of toxic metals in food chain accumulates in the body tissue of aquatic organisms. Fish is a major component of the aquatic habitat and serve as bio-indicator of heavy metals levels in its habitat. Mugilcephalushas been recognized as a good bio-accumulator of organic and inorganic pollutants. The accumulations of Arsenic (As), Lead (Pb) and Mercury (Hg) in Mugilcephalus from adyar estuary located in chennai, Tamilnadu state, India were estimated. The results revealed that the Pb and Hg concentration was higher during pre-monsoon season and As was higher during monsoon season. The order of accumulation is Pb>As>Hg. Oxidative stress is a common pathway of toxicity and Mugilcephalus posses the well developed antioxidant defense systems for neutralizing the toxic effects of Reactive oxygen species. The estimation of anti oxidant activity shows seasonal variation in SOD, CAT, GST and GSH.

Biodegradable Packaging: An Alternative to Non- Biodegradable Plastics

International Journal of Science , Engineering and Management, Available online 27th October 2017

Uzma Altaf | Farheena Iftikhar

Abstract

Plastic packaging, used extensively nowadays, poses huge threats to environment. Plastics, especially non-biodegradable polymers accumulate in the environment and adversely affect wildlife, wildlife habitat, or humans. To overcome this problem we can replace traditional non-environment friendly plastics with biopolymers, in particular polysaccharides or macromolecules having film-forming properties. These biodegradable materials, which find applications mostly in food packaging, can largely contribute to the reduction of environmental pollution. This review summarizes some of the widely used biodegradable packaging materials.

Biodegrdation of Polyethylene : A Review

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Revati Bhave | Mr.S.J.Mane

Abstract

Ever increasing population, urbanization and modernization posing problem of plastic waste disposal and contamination of land as well surface and subsurface water. Plastic is disposed of ultimately into water bodies and get clogged due to which aquatic habitats get hampered and animals die by consuming plastic when disposed of in open garbage and remain uncollected. It has been observed that in many cities solid waste is not collected on regular intervals and remain littered. Hence treating it effectively so as to minimize pollution becomes the best solution. Polymers are synthetic substances produced by chemical reaction. Plastics are basically polymers that consist of monomers linked together by chemical bond. In the present review, an attempt has been made to put together all available literature on Biodegradation of Low Density Polyethylene (LDPE) with following objectives: 1. Brief mechanism of Polyethylene Degradation 2. Sources and effects of polyethylene. 3. Potential of Specific microorganism in degrading Polyethylene. 4. Various techniques for the analysis of degradation.

Biofilm production and multidrug resistance in clinical isolates of Acinetobacter baumannii in a tertiary care hospital

International Journal of Science , Engineering and Management, Available online 27th October 2017

Kamaldeep Kaur | Prabhjot Kaur Gill, Avneet Kaur Heyar

Abstract

Biological Wastewater Treatment Principles

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ms.P.Sunitha | Prof.D.Usharani, Mr.K.Ravi Kishore, Ms.D.Sucharitha

Abstract

Natural receiving waters including rivers, streams, and tidal areas sustain a background population of microorganisms including bacteria, fungi, and algae. These organisms require energy for respiration and organic carbon food sources in order to synthesize new cells using the following general equation: In the above equation, the microbes occur naturally and consume organic food sources that are naturally present in the water. Some of the carbon matter in the food is biodegraded to release energy that drives the reaction. Energy is released through the biodegradation process by combining part of the organic food source's carbon compounds with oxygen. The by products of this reaction are additional microbial cells and carbon dioxide. Nutrients, primarily nitrogen and phosphorus, complete the reaction and are needed as part of the building blocks used to form new microbial cell tissue. In a clean water environment, the amounts of available organic food supplies are limited. This places a restriction on how fast the above reactions proceeds and also on how many microbes are able to grow. In general, the population of microbes in a clean water environment is restricted to a low background level by the limited amount of organic food that is present. While periodic fluctuations in the food supply may cause brief periods of population swings or declines, the number of microbes in the ecosystem will achieve an equilibrium condition over time that is based on the steady state amount of organic food present. If an artificial organic food supply is allowed to enter the ecosystem, the number of microbes that can be sustained will increase in response to the added food. If the amount of additional food is large, the population of microbes may increase exponentially and will continue to grow up to the point that the amount of food again becomes limiting for the elevated population. Raw sewage contains a high organic carbon content that provides an excellent supply of food for waterborne microbes. If raw sewage is discharged into receiving water, the bacteria population will become elevated in response to the new addition of food. This causes the above biodegradation reaction to proceed rapidly and, in the process, to create larger amounts of new microbes and carbon dioxide. This requires that more oxygen be available for use by the microbes. If sufficient extra food is added by the sewage discharge, the population of microorganisms and the resulting oxygen consumption may proceed so rapidly that all of the receiving water's oxygen is depleted.

Biometric Attendance System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Sneha J. Madake | Asmita D. Murke

Abstract

our project aims at designing student attendance system which could electively manage attendance of students at institutes. Attendance is marked after student identification. For student identification, a fingerprints recognition based identification system is used. Fingerprints are considered to be the best and fastest method for biometric identification. They are secure to use, unique for every person. Fingerprint recognition is still identifying individual from a set of enrolled fingerprints a time taking process. It was our responsibility to improve the fingerprints identification system for implementation on large databases e.g. of an institute. . This system is designed not only to reduce paper work and operational time but also to provide data security. This system is useful for many industries, organizations, security system, schools, colleges and banking sectors.

Biometric based Student attendance and time recording and Communication System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

G.Sobha Rani | A. Venkateswara Rao

Abstract

The aim of this journal focuses at designing a student attendance and time which could effectively manage attendance and maintaining its records of students at educational institutes like Sri Sivani Institute of Technology. Attendance is notified after student identification. The major challenge task in educational institute is taking the attendance of student on daily basis and maintaining the records. For student identification, a fingerprint recognition based identification system is used. Fingerprints are considered to be the unique to each person and can be regarded as some sort of signature, certifying the person's identity. Itís permanent, good anti fake and secure to use. The major advantage of the Fingerprint recognition is that no two persons will have the same fingerprint in this world because of the peculiar genetic code of DNA in each person. The major objective of this paper is very simple to go for paperless attendance recording system to save the environment i.e go for green environment.

Biometric security based on respiration

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Mr. Shiv Kumar | Dr. Arvind Kumar Sharma, Dr Anil Midda

Abstract

Validation is a major issue to any trust situated processing framework and furthermore a basic part in numerous security conventions. Performing confirmation is famously troublesome. After some customary techniques bio-measurements has been generally utilized and embraced as a promising confirmation strategy because of its favorable circumstances over some current strategies, especially, its imperviousness to misfortunes caused by robbery of passwords and savvy cards."Bio measurements" infers "life estimation" however the term related with the usage of exceptional physiological qualities to recognize a person. It's another approach to confirm validness. Bio-measurements uses natural qualities or behavioral elements to perceive a person. In genuine a Bio-measurements framework is an example ID framework that utilizations different examples, for example, iris designs, retina outline and natural qualities like fingerprints, facial geometry, voice acknowledgment and hand acknowledgment et cetera. Bio-metric acknowledgment framework gives probability to confirm one's personality just by deciding "who these individuals are" rather than "what these individuals have or might be recalled". The very actuality that makes it truly fascinating is that the different security codes like the security passwords and the PIN number could be exchanged among individuals yet the physical qualities can't be. As illustrations portable PCs have a unique finger impression sensor coordinated; banks are beginning to utilize bio-metric information too the attendances in some MNCs are likewise in view of bio-metric framework to maintain a strategic distance from unapproved individual's entrance. In any case, bio-measurements presents its own difficulties, for example, being basic once bargained. Be that as it may, the bio-metric security framework is one of the most secure security frameworks till the date. This paper introduces another sort of biometric security framework in light of human breath.

Biometric template protection techniques: A brief survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 21st July 2017

Shilpa N L | Dr. R Aparna

Abstract

One of the natural and reliable solutions to user authentication problem is biometric recognition. Non universality, intra-class variation etc. are some problems in Unimodal biometric system. Therefore multimodal biometric systems are used to overcome these problems and to increase the level of security. The aim of this paper is to summarize the common attacks against biometric systems (fake biometrics, template modification etc.) and discuss techniques that can be used to counter them. The features that extracted from the biometric samples considered a critical part of biometric system which is called biometric template. Template security schemes are dependent on the overall performance parameters of the system and must be computationally hard to avoid modality reconstruction. This paper also summarizes different biometric template protection schemes (salting, visual cryptography etc.) and discusses their advantages and limitations

Biometrics Liveness Detection by Using Image Quality Assessment

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Akash S. Dange | Mrs. M. R. Banwaskar

Abstract

A biometric system is a system that uses behavioral and physiological characteristic (e.g. iris, fingerprint, face, keystroke, signature, voice) of a person to identify that person. Now days, these biometric systems are vulnerable to adversary attacks. So, the development of novel and efficient security measure is required for the identification of fake trait. In this paper, we have presented a software based multi-biometric liveness detection system which is used to identify a live trait and intruder. The proposed system uses 30 image quality measures (IQMs). These quality features are extracted from single image which is acquired for verification purpose. The present system assures that the use of liveness detection enhances security of biometric system and provides better performance and also reduces complexity of the system. It has been observed that, the proposed method is very much effective in detecting liveness of iris, fingerprint and face compared with different progressive approaches.

BIOTRONICS

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Santhosh.S | Karthikeyan.P, Siva Prakash.P, Malar Mannan.P, Pattu Raja, Venkatesan.M

Abstract

Robotic surgery is a new and exciting emerging technology that is taking the surgical profession by storm. Up to this point, however, the race to acquire and incorporate this emerging technology has primarily been driven by the market. In addition, surgical robots have become the entry fee for centers wanting to be known for excellence in minimally invasive surgery despite the current lack of practical applications. Therefore, robotic devices seem to have more of a marketing role than a practical role. Whether or not robotic devices will grow into a more practical role remains to be seen.

Bladeless Turbines

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 17th August 2017

Yashwant Hardikar | Durga P. Ghatge, Gaurav N. Devdikar

Abstract

Turbine that would provide a quite safe, simple andefficient alternative to our supposedly Bladed Turbine engine is the need of the hour. Bladeless WindPower Generation uses a radically new approach to capturing wind energy. The device captures theenergy of vorticity, an aerodynamic effect that has plagued structural engineers and architects for ages (vortex shedding effect). As the wind bypasses a fixed structure, its flow changes and generates a cyclical pattern of vortices. Once these forces are strong enough, the fixed structure starts oscillating. Instead of avoiding these aerodynamic instabilities the design maximizes the resulting oscillation and captures that energy. Naturally, the design of such device is completely different from a traditional turbine. This technology of the Bladeless Turbines puts it at a very low range of capital intensity. It also makes it highly competitive not only against generations of alternative or renewable energy, but even compared to conventional technologies. Bladeless turbines are also thereenest turbines with almost nil harmful effects on the environment. The bladeless turbine has a promisingfuture as a new power generation system.

Blast Resistance Analysis of Door Panel

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Thimmesh. T | M. D. Goel

Abstract

During earlier days, not much importance was given to the blast resistance design of doors in blast resistant design of structures. Later on, due to large numbers of deaths because of failure of doors, high priority was given to the blast resistant design of doors. In earlier cases, doors were traditionally designed using huge solid materials to resist the blast load. The use of traditional design results in increased material quantity and cost of construction. Recent technological advancement lead to use of engineered materials wherein use of reserved material strength was made to resist blast loading. The blast load is the load with high energy and higher frequency, thus need special attention for analysis and design of structural components. The present study deals with the different doors configurations wherein effect of stiffness, natural frequency and mass of the door is investigated. Finite Element (FE) analysis is carried out to study the dynamic response of door under a given blast loading using ABAQUS¬ģ. In the present investigation, tempered AISI 1045 steel is used as door material. Modal analysis is carried out to obtain modal frequency of different door configurations considered in the present investigation wherein mass of all the doors are kept almost constant. Herein, blast loading from 5 kg TNT at a standoff distance of 1 m is applied to the door to understand their dynamic response. The peak displacement of door at different locations has been computed to understand their failure pattern. From the results, it is observed that displacement is significantly reduced just by changing the geometry of door with other parameters being same

BLE Based Automatic Attendance System using PSoC BLE

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Niranjan Shinde | Ashwini Raorane

Abstract

Bluetooth 4.0 named Bluetooth Low Energy (BLE) has low-powered Bluetooth devices. Bluetooth is one of the most widely used wireless technology including large number of mobile phones and other portable devices. This technology is used with IoT (Internet of Things) gives us multiple options for various applications, one of which is education and, attendance system is integral part of education system. The conventional attendance system has so many difficulties. In ‚ÄėBLE Based Attendance System‚Äô project, when students walk into classroom with turned on Bluetooth and enter into classroom, attendance is directly registered on system automatically. This can be achieved as; when teacher enters in classroom they turn on PSoC to take attendance. The board will scan for available BLE devices in the classroom through registered UUIDs (unique addresses provided to every Bluetooth device) of students phones to their specific names/roll no. In this whole scenario students will have to just turn on the Bluetooth on their phone. After this process the attendance will be uploaded on network host (PC, Server, etc.) for further use. The system will give us output in a log which can be further utilized for calculating total attendance, defaulters, etc. So overall this system provides a secure and user friendly approach to a time consuming system

Blind Assistance Technology (B.A.T)

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Abhilash Anandan | Ajith Mathew, Binu Mathew, Dennis John,Geet Rose Jose,Sreedev Krishnakumar

Abstract

A significant challenge that visually impaired people face is finding their belongings when they need them. Most of the object detection methods and algorithms used are too resource hungry to be used on low end hardware. Here, an innovative contour based tagging system has been developed by the authors. The information obtained from these tags is provided in a meaningful and non-intrusive manner. Bone conduction and sound spatialization is used for finding the exact location of objects. Speech recognition is used to accept voice commands from the user. Alongside this is an ultrasonic glove is used to detect obstacles in his path.The glove provides haptic feedback so the user can estimate the distance from the object intuitively.

Blind People Navigate Independently Using ZigBee Technology

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ms. Punam R. Patil | Bhushan V. Patil

Abstract

The blind person present in the bus station uses the ZigBee unit which is recognized by the ZigBee in the bus and it indicates that the blind person is present in the station. Due to this reason bus stops at the particular location. The desired bus that taken by the blind is notified to him with the help of speech recognition system HM2007. The blind gives the destination name using microphones and the voice recognition system recognizes it. The ZigBee transceiver in the bus sends the bus number to the transceiver with the blind and the bus number is announced to the blind through the headphones. The blind takes the bus parked in front of him and when the destination is reached it is announced with the help of voice synthesizer which produce the audio output.

Block Shear Failure in a Steel Angle Tension Member ‚Äď A Review of Design Practic

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

J. R. Dhanuskar | Dr. L. M. Gupta

Abstract

Equations of block shear capacity vary significantly in various standards of steel structure design. A study has been conducted to examine the design equations according to standards from India, America, Europe, Canada, and Japan, as well as proposed improved equations for block shear capacity of tension member. To evaluate these standards and proposed improved equations, available test results for block shear failures in tension member are used. For tension member Indian standard, Eurocode, Japan Standard and Canadian standard are significantly conservative, however American Standard provides a good prediction of block shear capacity.

Blood Pressure Measurement using Pulse Transit Time (PTT)

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Dr.Archana.N.V | M.V.Mallikarjuna Reddy , Bhamini Bhat , Bhargavi.A.S , Bhavana.A.S

Abstract

The present blood pressure (BP) measurement devices are mostly built on the principle of auscultation, oscillometry or tonometry, all of which use an inflatable cuff. This paper aims to develop a cuff-less and continuous technique for measuring BP by pulse transit time (PTT). PTT will be measured as the time interval from the peak of R wave of Electrocardiogram (ECG) to a characteristic point at predetermined thresholds on the Photoplethysmogram (PPG) of the same cardiac cycle. Simultaneous recording of ECG and PPG shall be acquired from fingertips of the subject by stainless steel electrodes and a pair of light emitting diode and photo detector is used to estimate the PTT.A multiple regression model which could estimate unspecified peopleís blood pressure (BP) conveniently & continuously is proposed.

Body Area Network Based Smart Secure Communication System for ATM

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st July 2017

Kotra Pavan Kumar | Poornima B K

Abstract

This paper presents the application of Intra Body Communication system to establish a secure communication channel between a wearable device and Model ATM machine. Red Tacton is a Body Area Networking concept which is coined between wired and wireless, Which enables communication through human body as a transmission medium in turn uses the feeble electrical fields generated from the human body which is harmless, safe and fast. With Advancements in Communication, protection also becomes an integral part and this requirement has resulted into creation of many authorization tools such as card readers used in ATM, user pin codes etc. But since these tools were not secure enough, We propose unique solution using Body Area Networking concept which transfers data using the human body as its conductor, Instead of using radio transmission thus maximizing the security of transmitted signals . The Transmitter (Wearable device) module generates frequency signal corresponding to unique ATM ID and can be transmitted through Human body to BAN receiver (Model ATM machine) for detection and further processing. If the signal matches the unique ATM ID then the user is allowed to enter 4-digit password to access his/her account, If the entered password is correct then user need to enter the OTP which has sent to his mobile for higher security. Once the OTP is entered he/she gets access to his/her different bank accounts at single point of contact. This project proposes BAN based smart secure Communication System for ATM.

Body Area Network Based Smart Secure Communication System for ATM

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st August 2017

Kotra Pavan Kumar | Poornima B K

Abstract

This paper presents the application of Intra Body Communication system to establish a secure communication channel between a wearable device and Model ATM machine. Red Tacton is a Body Area Networking concept which is coined between wired and wireless, Which enables communication through human body as a transmission medium in turn uses the feeble electrical fields generated from the human body which is harmless, safe and fast. With Advancements in Communication, protection also becomes an integral part and this requirement has resulted into creation of many authorization tools such as card readers used in ATM, user pin codes etc. But since these tools were not secure enough, We propose unique solution using Body Area Networking concept which transfers data using the human body as its conductor, Instead of using radio transmission thus maximizing the security of transmitted signals . The Transmitter (Wearable device) module generates frequency signal corresponding to unique ATM ID and can be transmitted through Human body to BAN receiver (Model ATM machine) for detection and further processing. If the signal matches the unique ATM ID then the user is allowed to enter 4-digit password to access his/her account, If the entered password is correct then user need to enter the OTP which has sent to his mobile for higher security. Once the OTP is entered he/she gets access to his/her different bank accounts at single point of contact. This project proposes BAN based smart secure Communication System for ATM.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Sindhura Rao | Ashwini S,Kusuma Mohanchandra

Abstract

In this paper, we introduce a game in which the player plays chess by using a brain-computer interface (BCI). The BCI analyzes the steady-state visual evoked potential (SSVEP) responses recorded with electroencephalography (EEG) on the player’s scalp. The single three command control game is specifically designed around an SSVEP-BCI and validated in several EEG setups while using a neurosky headset. As a final step in the validation of the game, a random experiment on a broad audience was conducted with the Neurosky headset in a real-world setting.

Brain Machine Interface

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Mrs.Apurva Katre | Vinayak Rokade , Shweta Patil , Nayan Karale

Abstract

Last past decade, in India lot of peoples are control all the application by using only hand and legs. but in many developed countries laboratories have start to explore mind machine interface or brain machine interface technology as a radically new communication option for those with neuron muscular impairments that prevent them from using conventional improvement communication method. Brain machine converts neuron activity generated from brain cells into electrical signal. BMIís provide these users with communication channels that do not depend on peripheral nerves and muscles. Current BMIís use electroencephalographic (EEG) activity recorded at the scalp or single-unit activity recorded from within cortex to control of speed of ac or dc motor, control on and off condition of bulb, operation of wheelchair. The main element in each bran machine interface is a translation algorithm that converts electrophysiological input from the user into output that controls external devices. Brain machine interface is depends on concentration power and data interface. Current BMIís have maximum information transfer rates of 5Ė30 b/min. Achievement of greater output and speed depends on improvements in signal processing, effectively interfacing, translation algorithms, and user concentration and training. This type of human efforts can be reduced by using this brain machine interface. Definition of the Problem In a brain machine interface, by using various brain activities we can control the electrical application. Brain machine interface is the direct communication between the brain and external device. We know our brain is generate voltage and brain activity .we canít control the external device using the brain voltage but we control the external device using the different brain activity, but first upon this brain activity is converted into the proper signal and after using the signal to control the all external device. This technique is known as brain machine interface. We know the in India lots of people are handicap. They canít do anything without hand and legs. But they have brain so using brain concentration power controls any electronic and electrical device. Also it use for different field for example industrial, commercial, domestic and educational field.

Brain Tumor Detection using Image Segmentation

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Siddhi N. Nerurkar | 

Abstract

Image segmentation is a process of partitioning a digital image into N regions. In today’s world, Brain tumor detection using image segmentation is fundamental but challenging problem in field of computer vision and image processing due to the diverse image content, image noise, non-uniform object texture and other factors. Accurate detection of size and location of brain tumor plays a vital role in the diagnosis of brain tumor. There are many image segmentation methods available for medical image analysis but the Region based and Clustering techniques are efficient, fast and accurate. This paper presents the two efficient image segmentation algorithms i.e. K-means and region growing techniques for brain MRI images and compare the two algorithms and determine the best one.

Brain Wave Monitoring By Using Open Source Tools

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

A. H. Pudale | Komal Chandiram Jeswani, Priyanka Omprakash Tapadiya, Sonali Madhukar Kadam, Rama Sambhaji Kambl

Abstract

People have no control over their mental state which may change depending on the circumstances. Therefore monitoring these changes is really important in case of a person suffering from depression, or mental disorder. We aim at developing an android application that will monitor the brain waves and provide an appropriate mental condition depending on the values of the waves obtained. We are developing an android application using android studio and interfacing it with arduino board and EEG sensors using bluetooth. Existing system makes use of this technique just for moving objects depending on the value of the waves. Also existing system monitors the mental condition by using facial expressions, heart rate, body temperature and gestures. There does not exists any application which will allow the users to see their mental condition not in the form of just graph but also actual condition after analysing these graph values. In our project we directly attach the sensors to the head so that we get correct brainwaves. So, that we can monitor and provide an appropriate graph and estimated result.

Brand Awareness

International Journal of Science , Engineering and Management, Available online 29th June 2017

Shalom Paul | Jeresh Joseph

Abstract

Companies spend hundreds of millions of dollars annually on advertising to build and maintain awareness for their brands in competitive markets. However, awareness formation models in the marketing literature ignore the role of competition. Brand awareness is a much neglected construct and deserves considerably more attention due to its central importance in brand choice. From an empirical point of view, numerous researchers have shown that brand awareness measures are powerful predictors of consumer choice behaviour. This paper reports explores how brands come to mind in a variety of choice situations. A subsequent quantitative study shows that associates identified in the qualitative research act as cues, and that brand awareness varies significantly depending on the cues that are salient. The paper tries to reveal, on one hand, the importance of unaided brand awareness when it comes to consumersí buying decision and, on the other hand, the importance of aided brand awareness when assessing the perceived risk associated with the purchase. The analysis is conducted in a comparative manner, considering the case of durable versus non-durable products, and with focus on urban Romanian consumers.

Bridgeless PFC-Modified SEPIC Rectifier

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Theertha Raj | ]Ms.Eugene Peter, Mrs.Meera Rose Cherian

Abstract

To overcome the problems of power factor, a new single-phase ac dc PFC bridgeless rectifier at low input voltage is introduced. Only two semiconductor switches are used because of the absence of an input bridge rectifier in the proposed rectifier. Hence, the current flowing path during each switching cycle result in less conduction losses compared to the conventional full bridge topology. The proposed topology operates in discontinuous conduction mode (DCM). The DCM operation has advantage of simple control circuitry. The proposed topology is compared with bridged full-bridge SEPIC rectifier in terms of the power factor. MATLAB simulation has been done.

Broadband Beamformer Combined With Dcd Weighting

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Meenu Unnikrishnan | Jayaraj U Kidav

Abstract

Medical electronic technology has developed to a great extend in last few decades. Ultra sound imaging has been one of the greatest gift to medical science technology. In last few decades, ultrasound imaging technology has revolutionized the field of medical science. Adaptive beam-forming method has contributed much to the resolution and contrast of image. In this work, minimum variance (MV) beamforming for broadband data is proposed. We implement it in frequency domain and for each of these frequency sub band a set of complete, adapted apodization weight is provided. The simulation is done in FIELD ll environment. The simulation is done on point targets as well as on cyst phantoms. We aim at showing that the resolution and image clarity in the case of MV beam former is more when compared to the conventional DAS (delay and sum) beam former, even for fewer number of emission. Investigation on different methods for computation of inverse of the covariance matrix has been done. Also in this work we make use of DCD algorithm for computing the apodization weight and also we aim at showing that the DCD algorithm finds the best place compared to the other iterative algorithm for hardware implementation.

Burst Error Correction Using CRC

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Remya Maria Mathew | Shilpa Cherian, Shyno Mary Alexander, Surumy Salim, Agi Joseph George

Abstract

Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted during transmission. For secure communication, errors must be detected and corrected.CRC is an efficient method to detect and correct the errors. In this paper we have introduced a new approach for the burst error detection and correction using non-lookup table technique.

Byte Reconfigurable LDPC Codec Design for High Performance Error Correction

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Anumol Thomas | Abhila R Krishna

Abstract

Error correction provides reliable information free from errors. BCH codes are widely used to perform error correction. However, in order to improve the reliability of error correction BCH codes have been replaced by Low Density Parity Check (LDPC) codes. LDPC codes are special class of error correcting codes widely used in communication and memory systems, due to its Shannon limit approaching performance and favorable structure. A sub class of LDPC codes, called Quasi-Cyclic (QC) LDPC codes is used as the error correcting code due to their structured Parity Check Matrices (PCM). These codes are flexible in the sense of supporting wide range of code lengths and rates. This work deals with an efficient byte reconfigurable, high throughput QC-LDPC codec design. The codec is able to support multiple bits with the constraint that size of the sub-parity matrix be multiples of eight. Error detection is done using modified majority logic decoding. Majority logic decoding is preferred as they can correct large number of errors having even as well as odd number of bit flips. This method reduces the decoding time by detecting errors up to four bit-flips in first three iterations of decoding. If no error is detected decoding terminates without completing rest of the iterations, thereby reducing the average decoding time.

Calculation of the Temperature Distribution and Thermal Deflection in a Thin Clamped Circular Plate

International Journal of Science , Engineering and Management, Available online 31st May 2017

Nitin Chandel | Pallavi Zungare,Sapana P. Dubey

Abstract

This paper is concerned with the determination of unknown temperature, temperature distribution, and thermal deflection on upper plane surface of a thin clamped circular plate occupying the space D: 0 Ôā£ r Ôā£ a, 0 Ôā£ z Ôā£ h by applying finite Hankel transform and Laplace transform technique

Calculation of the Temperature Distribution and Thermal Deflection in aThin Clamped Circular Plate

International Journal of Science , Engineering and Management, Available online 31st May 2017

Nitin Chandel | Pallavi Zungare

Abstract

This paper is concerned with the determination of unknown temperature, temperature distribution, and thermal Hankel transform and Laplace transform techniques.

Capacitive Sensors: The Future of Level-Sensing Systems

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 17th August 2017

Vishal V | Sayantan Gangopadhyay, Vivek D, Supreeth Sakrepatna

Abstract

Level-sensors are basically used to detect the level of liquids and monitor their fill. These sensors can be used in overhead tanks or in laboratory equipment’s to monitor the rate of the chemical fill, and also give us an indication regarding the same. Capacitive Sensors are one of the best level-sensors since they can measure the level without being in contact with the container. Water -level management at homes will help in reducing the power consumption as well as the water overflow from the overhead tanks. Capacitive sensors are much used due to their accuracy and resolution of measurement. Since they are sensitive to external factors like environmental changes, the inclusion of an environmental-reference sensor eliminates the drawback. Capacitive sensors are thus replacing the conventional level-sensors due to their versatility, and their precision during measurement applications

Capsule Networks for Vision Intelligence Systems

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 17th November 2017

Anuroop Shannu | Pragnya Kondrakunta

Abstract

The Convolutional Neural Network is a powerful field of study that has been the go-to solution to analyze and classify visual imagery in the recent phase.However, the current state-of-the-art CNN's are facing a reliability crisis when the images are rotated or tilted. There is a drastic fall in their performance when an image isn’t close to the ones in the training data-set. A change in orientation and spatial positioning of features, also, has a negative impact on its working. In this paper, we seek answers to these problems by using Capsule Networks, a recent advancement in deep learning. Instead of adding layers, the Capsule Networks work on nesting the layers of a neural network. These nested layers are called capsules. This increases the internal structure of each neuron rather than the depth of the network. Such a structure helps to improve the learning process of machines and renders them close to human intuition. In our work, we explain Capsule networks for Image classification systems and throw light on their robustness.

Captcha as a Graphical Password Authentication System (CaRP)

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Archi Gaikwad | Bijal Parekh, Medha Kona , Shweta Bramhane

Abstract

We face many security breaching issues for our desktop applications and online services. Many internet applications commonly use text based passwords for authentication. Text based passwords are prone to many attacks such as online guessing attacks , relay attacks ,shoulder surfing and are usually hard to remember. Graphical password proves to be a much better alternative to overcome these attacks. This paper introduces the use of Captcha as Graphical Password- CaRP to enhance the security at the time of login. CaRP is the combination of both graphical password and captcha technology. This system allows the user to select different visual login schemes. CaRP is one of the reasonable solutions that provides added security

Car Ignition Control By recognition Using SIFT Algorithm

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 31st May 2017

Dantal S.A | Chougule S.B.,Patil P. C.

Abstract

Car theft is big problem create in our country. To avoid this problem we are doing this project. In our project when person enter in car then capture the image and then compare those image with author person. If image match then car will start otherwise will not start. If other person tries to start the second time then an SMS will be sent author person mobile number. In our project use the sift algorithm, matlab, camera, DC motor, GSM, GPS, ARM7. For image matching and recognition, SIFT (scale invariant feature transform) features are extracted from a set of reference image and stored in a database. DC motor is used for the car engine. ARM7 can be used for GSM and GPS. Suppose car will be theft then will be using GPS find the car location. This project can be used for security purpose for schools, collages

Cariogenic strains isolated and identified from dental plaque biofilm of caries active and caries free subjects

International Journal of Science , Engineering and Management, Available online 11th October 2017

Richa Sharma | Shailja Singh

Abstract

Total 500 sample of caries active and caries free mouth collected from dental unit and analysed for isolation of pathogenic strains. Isolates showed variation in their pattern of percentage recovery according to disease diagnose in each subject. 450 sample considered to be positive for complex communities of colonizing and acid producing bacteria. The sub gingival, supragingival, and different multiple site were selected to collect plaque sample of particular oral disease diagnosed in pateint. Streptococcus mutans bacteria was achieved higher in percentage of total positive cultures from plaque sample as compare to other streptoccoi group bacteria. The pattern of distribution of streptococci varied in different oral disease. Significant difference in pathogenic strain pattern recovered from male, Female and Children subject. Enterococci recovered more in female as compared to male subjects.

Cascade PI Observer with Stabilization Lock

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Rekha.C.G | Rajeev.S.K

Abstract

This paper presents a new practical control structure to achieve the stable condition of electric motor drives. PI observers are incorporated with predesigned PI controllers in order to enhance the robust performance of current and speed controllers. The proposed method uses an adaptive final control by taking the magnitude of processed difference in error to accure faster steady state.

Case Study on Micro Drill Hole Inspection using PLC

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Harsh R. Vernekar, | Namrata R. Mone,Rohan R. Patil, S.A.Soundattikar

Abstract

With the advent of automation and to remain in the global competition, the industries are manufacturing the components at higher rates with customer demanding the best quality products. So, the inspection must be quickly, economically and accurately done for better customer satisfaction and providing him defect free products in right quantity and at right time. This calls for automated inspection which not only reduces the inspection and labour but also ensures accurate product delivery by introducing interlocks in the system where the system gives an alarm if any defective product is present in the system This paper includes the case study of automated micro drill inspection process using PLC for overall control and the advantages of automated inspection over conventional process

Case Study on PLC Operated Automatic Handling Systems in Mechanical Industry

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Shubham S. Mane | Pranav S. Anuje,S.A.Soundattikar

Abstract

To withstand the global competition, industries today are focusing on the automation. In present era, higher satisfaction of the customer is the main motto of the Industry, and this can be brought about by Automation. Material Handling System and in packaging industries, automation has played a vital role. Polymer industries face problems in the form of removing hot SPRUE from die cavity ,increased cycle time and safety of workers ,so introducing automated sprue picker machine controlled by PLC and comprising of pneumatic actuators, reed sensors and mechanical grippers, which replaces the labour invention , is a better plan for organizations stepping towards fully automated systems . The paper includes the current problems with the existing systems, and proposed system with its components used for drastically reducing the handling time ensuring safety and accuracy in the manufacturing environment.

Catalytic free technique for Synthesis of InN nanostructures

International Journal of Science , Engineering and Management, Available online 27th October 2017

Shyam Murli Manohar Dhar Dwivedi | Anupam Ghosh, Shubhro Chakrabartty, Aniruddha Mondal

Abstract

CBIR Based Crack Detection System for Surface Traffic

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Dr.Abraham Mathew | Dr.S. Saravanan, Dr. P. Mohanaiah

Abstract

Content-based image retrieval (CBIR), also known as Query by Image Content (QBIC) and Content-Based Visual Information Retrieval (CBVIR) is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching for digital images in large databases. The term 'content' in this context might refer to colors, shapes, textures, or any other information that can be derived from the image itself. To retrieve images, users provide the retrieval system with example images. Search results then can be sorted based on their distance to the queried image. The traditional approach of analyzing the condition of a road pavement surface is by manual method. Manual method is time consuming, unreliable, subjective, costly and less efficient. Hence instead of relying the traditional approach, this research proposes a cost effective video based technique which can overcome the drawbacks of the conventional method. Image and video processing have been revolutionized the fields of medicine, space exploration, surveillance, geology, oceanography and it is also a well sought after area, for active research. People will retain only 20% of what they hear and about 30% of what they see, but they remember 50% of what they see and hear, also they will be able to retain as much as 80% of what they see, hear and do simultaneously. This is why multimedia is a powerful tool for various fields. In this research , various hybrid technique is applied to a captured input video to detect the cracks in a road surface.

CBIR for MRI Brain Tumor Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Nischitha S | Dr. D.J.Ravi , Chethan K

Abstract

With world being digitized the CBIR has attracted many researchers. CBIR can make a major difference in the field of medicine. Several efforts is been made to minimize the human intervention in the system. The paper presents a CBIR system for the retrieval of the brain tumor images on the correct classification of the tumor by SVM classifier using the features extracted from the tumor images. The method is implemented using 200 MRI brain tumor images containing benign and malignant images

Cell Phone Based Fuel Consumption Tracking System

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Shrinivas Joshi | Laxmikant Bordekar, Mrunal Sawant, Alister Dísouza, Muriel Fernandes, Omkar Chari

Abstract

In todayís world, actual record of fuel consumption in vehicles is not maintained. To avoid this in this digitized world a system is created which will display the exact amount of fuel present in the fuel tank of a vehicle on to a cellphone. By keeping a track on the fuel consumption of the vehicle, the user will get an idea of the efficiency of the vehicle by incorporating embedded system into the existing system and creating a cellphone based application to display the data that has been transmitted wirelessly on to a cellphone.

Cfd Analysis of Mechanical Thrust Vectoring Control (TVC) of Missile

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 22nd August 2017

Umesh Kulkarni | A. K. Gangrade, Ravindra Shende

Abstract

This paper explains the amount of thrust vectoring obtained using jet type of Thrust Vectoring Control (TVC) system. A new thrust vectoring component is suggested and validated with available experimental data. The methodology entails the design of three dimensional nozzle using two input design parameters followed by descretisation of control volume and simulation through ZNPL PUNS solver. Grid independence test was carried out for basic nozzle case (nozzle with no TVC component). Taguchi design technique for design optimization was adopted. Nine cases were simulated for varying position of TVC component in a direction normal to nozzle axis i.e. nozzle exit blockage along with clearance between TVC component and nozzle exit plane along the axis downstream. The optimised cases were selected through post processing and analysing the solution in perspective of nozzle wall pressure forces and TVC efficiency parameters.

Chain Actuated Intermittent Work-Part Transport System

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 18th September 2017

SanthoshGaidhankar | SanjayCK, Vishwas SK, Subhashith KV, Mr.Shashank KS

Abstract

There has been a serious demand for intermittent movement of packages in the industries right from the start. Though the continuous movement is more or less important in the same field the sporadic motion has become essential .The objective of our project is to produce a mechanism that delivers this stop and move motion using simple four-bar mechanism. The advantage of our system over the conveyor system is that the system has a time delay between moving packages and this delay can be used to introduce any alterations in the package or move the package for any other purpose and likewise. While in conveyor system such actions cannot be performed unless programmed module is used to produce intermittent stopping of the belt which basically is costly. The prototype design requires electric motor, shafts and the frame of which the frame and platform on which the packages are moved is fabricated. All the links are being made of Aluminum which reduces the weight of the whole system including the head which has a direct contact with the boxes being moved. The system is expected to move as heavy packages as 2 ------3kgs approximately

Challenges and Issues in Big Data Era- A Survey

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Shony KM | Navaneeth Krishnan K,Daniel F Netto

Abstract

Big Data analytics have significant promises in this era of information explosion. Cloud computing, ecommerce , social networking etc. are enhancing importance of big data. However, there are a number of challenges that must be overcome to realize its true potential. Big Data analytic systems use cluster computing infrastructures that are more reliable and available as compare to traditional security analytics technologies. Big data absolutely has the potential to change the way governments, organizations, and academic institutions conduct business and make discoveries, and it is likely to change how everyone lives their day-to-day lives. This will constitute its future scope.

Channel Estimation Algorithm For Multi Input Multi Output System To Reduce The Mean Shift Error And Improve The Desired Signal Quality

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Ashish Agrawal | Neelesh Gupta, Chetan Barde

Abstract

The appropriate choice of the convergence factor in the Least Mean Square (LMS) and recursive least-squares (RLS) algorithm with the forgetting factor in the are key to assuring good performance for the adaptive filter. These choices are environment dependent and optimal ked values for these factors are difficult to determine especially in non stationary environments (High Noise). In this paper, 3 adaptive filtering algorithms with variable convergence factor are analyzed. We compare Least Mean Square algorithm (LMS), Recursive Means Square algorithm (RMS) and our proposed algorithm. The relations of these algorithms with the conventional LMS algorithm are first addressed. Their performance in stationary and non stationary environments is studied and then compare with one exiting and one proposed algorithm. Our Proposed algorithm reduces the noise effect and MSE on signal and gives better desired output as compare to existing algorithms. The paper concludes with experimental results analysis presented. Keywords: Static hand gesture, Fourier Descriptors, Support Vector Machine, Classification Accuracy.

Channel Estimation Analysis in MIMO OFDM System over Fading Channel

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Arpitha K K | T. P. Surekha , Sharath Kumar A J

Abstract

Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems play a vital role in the channel estimation. The wireless channel suffers from impairments like fading and interference. Technologies that achieved above requirements are Multiple Input Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM). Channel impairments must be mitigated at the receiver by using channel estimation techniques. In this paper, BER performance improvements of MIMO-OFDM systems using different techniques such as Least Square (LS), Minimum mean square error (MMSE) are implemented and compared. Work is carried out in Mat lab under fading channels.

Channel Estimation Techniques in MIMO-OFDM

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Salihath P | Nandakumar P

Abstract

This paper presents different channel estimation techniques in MIMO-OFDM. The combination of MIMO with OFDM increases the bit rate as well as capacity. This is a survey on channel estimation. A main challenge in MIMO-OFDM system is retrieval of channel state information (CSI) accurately and the synchronization between the transmitter and receiver. The CSI is retrieved with the help of different types of estimation algorithms such as training based, blind and semi blind channel estimation. This paper focuses the basic introduction of OFDM, MIMO-OFDM system and explain different channel estimation algorithms, optimization techniques and their utilization in MIMO systems for 4G wireless mobile communication systems.

Character Segmentation of Video Subtitles

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Satish S Hiremath | K V Suresh

Abstract

Subtitle extraction from video sequences finds numerous useful applications in video classification. The complex background, illumination and font size of text present in the video makes subtitles extraction extremely challenging. Text in the video are classified as scene text and graphics text. In this paper, character segmentation of graphics text is implemented using morphological operations. Compared to word segmentation in video subtitles, single character segmentation can achieve higher precision because of the simple background. In this paper, the English text present in subtitle of the video is considered for processing. All the character segmentation steps are implemented in Microsoft Visual Studio 2010.

Character Segmentation of Video Subtitles

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Satish S Hiremath | K V Suresh

Abstract

Subtitle extraction from video sequences finds numerous useful applications in video classification. The complex background, illumination and font size of text present in the video makes subtitles extraction extremely challenging. Text in the video are classified as scene text and graphics text. In this paper, character segmentation of graphics text is implemented using morphological operations. Compared to word segmentation in video subtitles, single character segmentation can achieve higher precision because of the simple background. In this paper, the English text present in subtitle of the video is considered for processing. All the character segmentation steps are implemented in Microsoft Visual Studio 2010.

Characterisation of Jute, Areca and Glass Reinforced Polymer Composite

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Muhsin M P | Abee Narayan , Arjun Vijaykumar P,Aboobacker Siddiq KV,Channakeshava R

Abstract

Composite material market is exponentially growing and finding its application in almost every walks of life. Here we prepared three composites of different stacking sequences and fibre reinforcement for our experiment. We have used areca, jute and glass fibres for making a composite with epoxy as resin. Our composites had ten layers of fibre of different stacking sequence for every specimen. Hand layup technique was used for preparing the material. Compression moulding was done on the stacked laminates and the final product was measured to be 30x30x3 mm. the composite then was converted different specimens as per ASTM standards. The tensile and flexural test was done for every combination of specimen and in three different combinations jute+glassfibre reinforced matrix was found to have more tensile and flexural properties. Graphical results were obtained for the tests and analysed and final result was drafted.

Characteristics Study of Inconel 718 Surface Generated By Extrusion Honing Process

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 26th August 2017

H P Raju | Shreeraj B N, Murali Krishna N L

Abstract

Extrusion honing (EH) process is employed to deburr, polish or radius surfaces and edges by flowing a silicone abrasive medium over the surface to be finished. Such finishing operations play a vital role in producing method of machine components. EH could be a time consuming process, even though EH is employed within the industries particularly in the case of finishing complicated internal and external shapes. In EH process, medium is the key elements that control the finishing process. Though, commercially available abrasive medium are very expensive and its affordability is an issue, especially for price sensitive industries. Inconel (718) material is widely used in aerospace industries, hence it has been chosen for the characteristics study through EH process. In the present study silicone and silicon carbide abrasive is chosen as the medium. Surface roughness parameters are used as a means of determining the performance of the EH process. The main experimental parameters are the abrasive concentration, number of passes and keeping constant hydraulic pressure. It is observed that the roughness parameters Ra, Rz, Rt and Rpk decreases after 15 passes and 25% of volume fraction of abrasive concentrations were used for the experimentation.

Chat Based Conversational Agent for Management

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th October 2017

Anah Veronica | I Jayesh Shukla, Ms.Chandralekha

Abstract

With automation making a revolutionary impact in various industries by improving the efficiency compared to the conventional ways and messaging apps like Messenger and WhatsApp being more popular among people that social media itself, it‚Äôs become crucial for businesses to improve their strategies in terms of the services they provide and to be where their potential customers are. Consider a business where their customer services are provided only via sales persons. He/she can handle maximum of one customer at a time and to scale efficiency even by 1% needs recruitment of new employees, which can be very expensive. Even after hiring new employees, it‚Äôs still a difficult task to provide the customer with the information they are looking for rapidly. Solving this problem is a new technology ‚Äď A chat based conversational agent aka chatbot. Chatbots can handle multiple customers at the same time, provided quick responses, be interactive and keep the customers engaged all while an economical option to set up. The objective is to create a chatbot using pattern matching technique that will aim to increase the efficiency of a hotel management system. With the help this chatbot, customers can view menu, get information about nearby touristic places, check weather etc, all by just chatting with the bot. This chatbot aims to be user-friendly¬¨¬¨ by eliminating conventional ways that would otherwise require making calls, shifting between web pages and sometimes even having to visit the agency to get the work done

Choice of Type of R C Slab Floors for Construction of Multi-Storied Buildings

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Sanjay B Borghate | Dr R. K. Ingle

Abstract

In construction of a multi-storey building while assessing the structural cost, it is evident that the bulk of the expenses is utilised for the floor slab construction. Hence the overall budget of a structure depends on the efficiency and expenditure of the floor slab system. Efficacy of the design and structural layout depends upon the quality of the material used, where as the actual cost of the structure may depends on factors such as speed of construction, availability of labour, competitive tendering, local market conditions, and equipment and cost of construction finance. Choice of the floor is very important for a building to meet the needs of major financial occupiers in today’s market. In this paper, the different types of RC slab floor systems and their advantages and disadvantages are discussed.

Circuit Breaker trip detection and intimation via WiFi using Raspberry Pi.

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 5th September 2017

S.Sivasubramanian | 

Abstract

The Circuit breaker status needs to be constantly monitored for proper functioning of the power system. This can be done with the help of Wifi which sends the notifications about the current position of the circuit breaker to a mobile phone. This is achieved by constant monitoring of the voltage level from the circuit breaker. There is no need of human to computer interaction for Data transfer. The system consists of sensor types like the voltage sensor. The Raspberry Pi tool is a prime component involved in determining the breaker position. We present a general -Raspberry Pi based sensing and transmitting network which reliably determines the voltage level from the breaker with good accuracy and transfers the corresponding to a mobile phone. The implementations and experiments were tested and it was better than the previous techniques since it can notify multiple mobile devices at the same instant. Finally the device was installed in a substation and the accurate results were obtained

Classification of Brain Tumors Using Fuzzy Neural Networks

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Venkatnaresh M | Saikrishna J, Naga Naveen kumar

Abstract

The vital system of a human being is brain, such important part may be affected by unwanted tissue growth i.e tumor. Which is a critical problem in medical science for both diagnosis and treatment. In this paper we are concern about the diagnosis of tumor by analyzing MRI Images. The composite view of MRI images such as high intensive, divergent nature and Improper boundaries is difficult task for physicianís interpretation. So, an automated tumor segmentation methodology is demanded. To confer a solution to this issue, tumor segmentation method by K means clustering and Fuzzy C means clustering is implemented in this paper. After segmentation The features are extracted to classify as tumorous or non-tumorous. The feature extraction form MRI Image are implemented by using Intensity, Intensity Histogram and GLCM Methods. GLCM (Gray Level Co-Occurrence) feature extracting method yields better results when compared with other methods. The Accuracy of the segmented data is evaluated by confusion matrix that is created from the extracted features. All the implementation are performed against BRATS dataset.

Classification of Thyroid Nodules in Ultrasound Images Based On Texture Analysis

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Shruthi C V | Nanda S

Abstract

Thyroid is a butterfly-shaped gland in the front of the neck. It is found below the voice box. Thyroid nodule is one of the indicative of thyroid cancer. Nodule can be due to the growth of thyroid cells or a cyst in the thyroid gland. It is very important to differentiate between the thyroid nodule as benign or malignant. This paper presents characterization and classification of thyroid nodule using Ultrasonography. It includes extraction of set of features by using Gray Level Co-occurrence Matrix GLCM, Wavelet Transform and Local Ternary Pattern (LTP). These features are reduced to set of selected features by using PCA algorithm. The selected features are given to SVM classifier for the classification of thyroid nodule as benign or malignant. The performance of classifiers is evaluated with the accuracy, sensitivity and specificity.

Classification of Time Series Trajectories Based on Shape Features using SVM

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Gajanan S. Gawde | Jyoti D. Pawar

Abstract

Classification of time series trajectories is a non trivial problem and few researchers have contributed to this field. Time series trajectories such as Character trajectories, ECG trajectories, Stock Exchange Trajectories need to be classified accurately in order to improve the performance of system. The classification of time\ series trajectories is carried out using different techniques such as Neural networks, Support vector machines, Fourier Transforms and Bayesian Network. Most of the existing classification techniques work on simple features such as co-ordinates, distance, and velocity. These techniques are not able to consider shape features of trajectories and classify the test trajectories. Shape of the time series trajectory is an important feature and can be used in the classification method. A support vector machine is better classification technique compared to the existing techniques. In this paper, we have proposed our novel classification method to classify time series trajectories using SVM with shape as the feature vector for classification purpose. Thorough experimental study was carried out on proposed technique with different datasets. Experimental results shows that SVM technique is better compared to Neural Network, Fourier Transform, Bayesian Network. SVM with shape features is efficient compared to SVM without shape features. We have tested SVM with different kernel functions. Our experimental results show that RBF SVM with shape features method is efficient compared with Linear and Non Linear kernels.

Client Gender Prevision based on the E-commerce Information

International Journal of Engineering Research in Computer Science and Engineering, Available online 19th July 2017

Srinivasa R B.E | Deepika M

Abstract

The Demographic property of clients such as gender, age, and education gives important information for e-commerce service providers or specialists in merchandising and personalization of web applications. However, online clients often do not give this type of information due to privacy and security related reasons. In this we proposed a method for previsioning the gender of clients based o0n their catalogue viewing data on e-commerce systems, such as the date and time of access, list of categories and products viewed, etc. We use a machine learning techniques and investigate a number of characteristics derived from catalogue viewing information to prevision the gender of viewers. Experiments were carried out on the datasets. The results 81.2% on balanced accuracy shows that basic characteristics such as viewing time, products/categories characteristics used together with more advanced characteristics such as products/categories sequence and transfer characteristics effectively facilitate gender prevision of clients

Climate Responsive Smart Homes

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Ar.Rashmi Tijare | Ar.Nikhil Wasade

Abstract

Home Automation is a multidisciplinary. It involves almost all branches of science & engineering. While learning in the urban context of residential design it was realized that the standard of living in terms of quality has come down. Quality, not in terms of material and standard of living or technology, but in terms of the feature of space. Further exploring this topic lead to, the Automation of Building parts so as to suit climate of the region and act smartly according to climatic situation. The study further extends and develops a series of modifying and adaptive elements for residential spaces that are responsive to the climate, lifestyle and its effect.

Clock Power Optimizations in VLSI design at advanced technology nodes

International Journal of Engineering Research in Computer Science and Engineering, Available online 22nd August 2017

Penugonda Ravikumar | Devanga Ampabathini Susmitha

Abstract

Classification of time series data is one of the popular fields nowadays. Many algorithms exist to get accurate and faster result which speeds up the computation. Nowadays E-Commerce sites are providing many user convenient options like recommendations for the products that they are purchasing which are playing key role in attracting the users to visit their sites. All these are happening based on the classification of data. Home automation is one of the evolving technologies in which data storage is important. It will be convenient if we are able to compare test data with limited trained data by preserving accuracy. Some data such as national security, personal information, bank details must be very confidential which has to be stored very securely. These all comes under time series data and data such as images, weather reports, speeches, and satellites data can be converted into time series data. Classification of normal data can be done by normal methods like nearest neighbor but to classify Time Series data by taking all these above features into consideration is difficult because time series data has to convert into structured format and it has to be sort and compare according to time Some existing algorithms are quite good in classifying Time Series data by satisfying some of these features. There are many algorithms which can classify data of different types quite accurately. But all algorithms might not satisfy all factors. So based on type of data we have to choose appropriate algorithm.

Clock Power Optimizations in VLSI design at advanced technology nodes

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 22nd August 2017

Manjunath rao B M | Dr H V Ravish Aradhya

Abstract

Power reduction in VLSI designs are one of the key design constraints along with others, namely timing, area, quality constraints, noise, etc. Even though there has been a steady growth of devices that are able to be placed in a given area of a chip as per moore’s law, we cannot say the same for battery technologies as they have never been able to catch up. Since the advent of the deep sub-micron era, speed and higher frequency of operation have become the prime goals of any design as the hunger for faster and better optimized systems are never ending. But as a consequence of faster operating speeds which basically means higher clock frequencies, power becomes one of the main constraints to be considered as the most important component of power dissipation, namely the dynamic power dissipation has a proportional relationship with the clock frequency. Hence clock power optimization is taken up as the prime objective of this paper for technologies below 14 nm as at these technologies, other secondary power dissipation components start to become more prominent. Various design techniques have been discussed and applied at both the circuit design and the rtl levels in order to provide a complete review of most of the low power design techniques which can be used to reduce power at both these levels of abstraction. An improvement of 25% and 15.7% of power reduction is observed in clock power and overall power respectively. There is also a power reduction of 2-5% for each of the rtl level optimization techniques..

Closed Loop Power Control of Grid Connected Dg Units for Active Harmonic Flitering Using Current Control Method

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 12th October 2017

A.Varunkumar | B.Mothiram

Abstract

Increase in application of non-linear loads will cause power quality issues. In utilizing Distribution generation unit interfacing converters to actively compensate harmonics so paper enhanced a current control approach. The current controllers has two well coupled control branches to independently control the fundamental harmonics DG currents and local non-linear load harmonic current detection, so distribution system harmonic voltage detection are not necessary for proposed method. So closed loop power control scheme is employed to directly derive fundamental current reference without using PLL. The power control eliminates impact of steady state fundamental current tracking errors in DG unit. Harmonic compensation function is active which means accurate power control is realized. This paper is simulated and results are shown below.

Cloud Computing and Semantic web: An Interplay

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th September 2017

Chethan R | Divya D, Kavya H, Prashanth,Vani Saptasagar

Abstract

CLOUD computing is a subversive technology that is changing the way IT hardware and software are designed and purchased. Cloud computing provides abundant benefits including easy access, decreased costs, quick deployment and flexible resource management, etc. It has become highly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we propose Dynamic Secret key generation for multi user in cloud computing. To enable cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel additive order and privacy preserving function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data users submitting searches, we propose a novel dynamic secret key generation protocol and a new data user authentication protocol

Cloud Computing and Semantic web: An Interplay

International Journal of Engineering Research in Computer Science and Engineering, Available online 27th September 2017

Clara Kanmani A | Suma V, N Guruprasad

Abstract

Cloud Computing is internet based computing that provides shared computer processing resources and data to computers and other devices on demand. Semantic web is an extension of the current web in which information is given welldefined meaning, enabling computers and people to work in cooperation. This paper gives a brief picture of how Cloud computing and future web, semantic web technology evolved. However from the extensive literature survey, it is also observed that, these two technologies plays an interplay role with each other in solving complex problems. Furthermore an analysis of where semantic web technology meets cloud computing is carried out and briefly describes how Semantic web technology can be used to address the challenges of cloud computing.

Cloud Storage Based on Key-Value Store

International Journal of Engineering Research in Computer Science and Engineering, Available online 14th July 2017

Abhishek Pandhare,  | Mayur Patil, AkshayPandure,Yogesh Pawar

Abstract

Nowadays, cloud-based storage services are rapidly growing and becoming an emerging trend in data storage field. There are many problems when designing an efficient storage engine for cloud-based systems with some requirements such as big-file processing, lightweight meta-data, low latency, parallel I/O, deduplication, distributed, high scalability. Keyvalue stores played an important role and showed many advantages when solving those problems. This paper presents about Big File Cloud (BFC) with its algorithms and architecture to handle most of problems in a big-file cloud storage system based on key value store. It is done by proposing low-complicated, fixed-size meta-data design, which supports fast and highly-concurrent, distributed file I/O, several algorithms for resumable upload, download and simple data deduplication method for static data. This research applied the advantages of ZDB - an in-house key value store which was optimized with auto-increment integer keys for solving big-file storage problems efficiently. The results can be used for building scalable distributed data cloud storage that support big-file with size up to several terabytes

Cluster Based Data Centric Trust Management in VANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

S.V.Saboji | Bhagyashree K.L

Abstract

Vehicular ad hoc networks (VANETs) require the potential to transform the way people travel through the construction, interoperable wireless communications network that comprises cars, buses, traffic indicators mobiles, and other devices. However, VANETs are susceptible to safety threats due to increasing requirement on communication computing and control technologies In this paper an challenges has been made for create new cluster model for efficient communication among the VANET nodes this paper emphases on data centric trust management system to provide consistent communication between the nodes prevents the malicious nodes, RSU aided scheme help to generate the trust values. Simulation shows the effectively analyze data provided in VANET and correctly establish trust on data.

Cluster Based Data Centric Trust Management in VANET

International Journal of Engineering Research in Computer Science and Engineering, Available online 11th August 2017

S.V.Saboji | Bhagyashree K.L

Abstract

Vehicular ad hoc networks (VANETs) require the potential to transform the way people travel through the construction, interoperable wireless communications network that comprises cars, buses, traffic indicators mobiles, and other devices. However, VANETs are susceptible to safety threats due to increasing requirement on communication computing and control technologies In this paper an challenges has been made for create new cluster model for efficient communication among the VANET nodes this paper emphases on data centric trust management system to provide consistent communication between the nodes prevents the malicious nodes, RSU aided scheme help to generate the trust values. Simulation shows the effectively analyze data provided in VANET and correctly establish trust on data.

Clustering of Labeled And Unlabeled Data By Integrating Pre And Post Clustering Approaches

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

Mr.Asadi Srinivasulu | Dr.Ch.D.V.Subbarao,I. Muralikrishna

Abstract

Clustering is the process of organizing objects into groups whose members are similar in some way or differ significantly from other objects. There are two approaches viz., pre-clustering and post-clustering. Pre-clustering is an unsupervised learning that assigns labels to objects in unlabeled data. The important pre-clustering approaches that we have considered are Dark Block Extraction (DBE), Cluster Count Extraction (CCE) and Co-VAT (Visual Assessment of Cluster Tendency). The present work focuses on pre-clustering approach. The limitations of these pre-clustering algorithms are i) DBE can’t handle the large data ii) CCE suffers because of perplexing iii) Co-VAT works with only rectangular data. Our work proposes Extended Dark Block Extraction (EDBE), Extended Cluster Count Extraction (ECCE) and Extended co-VAT to overcome the above said limitations. The following five steps results after integrating pre and post clustering approaches. They are 1) Extracting a VAT image of an input dissimilarity matrix. 2) Performing image segmentation on the VAT image to obtain a binary image, followed by directional morphological filtering. 3) Applying a distance transform to the filtered binary image and smoothing the pixel values on the main diagonal axis of the image to form a smoothening signal. 4) Applying first-order derivative and fast fourier transformation on smoothened signal for detecting major peaks and valleys. 5) Now post-clustering approach i.e. k-means algorithm is applied to the major peaks and valleys in-order to obtain refined clusters. The proposed algorithms viz., EDBE, ECCE and Extended Co-VAT uses VAT as well as the combination of several image processing techniques are applied on various real world data sets like IRIS, WINE and Image Data sets. These extended approaches use Reordered Dissimilarity Image (RDI) that highlights potential clusters as a set of 'Dark blocks' along the diagonal of the image. The simulation results show that EDBE, ECCE, Extended co-VAT outperform DBE, CCE and co-VAT in terms of time-complexity and accuracy of labeled and unlabeled data.

Co-axial Stub Resonator Technique for In-Line Fingerprinting of Fluids

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Mrs.D.M.Dharmadhikari | S.N.Helambe

Abstract

The co-axial stub resonator is a transmission line which can be used to detect fluid properties. For different inline process sensing applications, in the field of water quality detection, research has been done to provide an adequate theoretical description of transmission line based measurements This work described here gives details of use of coaxial stub resonator to measure the dielectric properties of fluids. . This radio frequency spectroscopy method is based on coaxial stub technique and comprises quarter wave length open ended resonators filled with a liquid sample as dielectric material between inner and outer conductor. The change in the dielectric properties of the liquid sample results in change resonance frequency and quality factor.

Co-Working of Solar Panel Ė Battery Ė Super capacitor for Electric Vehicle

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Vrinda Tibude | Vrinda Tibude

Abstract

This paper presents a highly reliable, extended range power supply for an Electric Vehicle (EV). The power supply consists of solar PV source, a battery and Ultra capacitor (UC). Battery is the main source of power, and is supported by the Ultra capacitor during the transient phase such as starting and braking. Solar PV cell works during the steady- state operation. The net effect of this arrangement is improve travel range, reduced battery size, enhanced battery life and excellent response during the dynamic condition. Improved dynamic performance results in smooth ride, optimal energy utilization and optimal sizing of energy sources. Most of the stand-alone photovoltaic systems require energy storage devices to supply continuous energy to the load when there is insufficient solar irradiation. Typically, Valve Regulated Lead Acid (VRLA) batteries are used for this application. However, providing a large burst of current, such as motor startup, degrades battery plates, resulting in devastation of the battery. An alternative way of supplying large bursts of current is to integrate VRLA batteries and super capacitors to form a hybrid storage system, where the battery can supply continuous energy and the ultra capacitor can supply the instant power to the load.

Coexistence of zigbee with 802. 11n

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 16th August 2017

Prerana Dhanaraj Mahajan | Shraddha Panbude

Abstract

Wireless technologies are essential and important part of today’s world. Zigbee technology is one of them and getting more popularity due to its advantages like low power and low-cost reliability. It is operated on 2.4 GHz industrial scientific and medical band. On the same band, there is another standard which is 802.11n wifi standard is also operated. When both the technologies coexist together then there is interference occurs. As data rate of zigbee is very less compared to the wifi impact of interference is more on zigbee technology. In this work new features of channel bonding, frame aggregation and multiple input multiple output (MIMO) is applied to the 802.11n and effect of 802.11n on zigbee technology is measured using different performance metrics packet delivery ratio(PDR), bit error rate (BER), control overhead and throughput

Collective Activity Recognition Using NaÔve Bayes Classifiers

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Salini. S | Prof.V.S. Mahalle

Abstract

Collective activity recognizing is the action of collecting the individual personís activity and it is distinguished as an atomic activity in isolation. In this paper, our work is based on the object detection and object recognition (ie) tracking is done for a given input video frame. The collective activity computes the class-specific person to person interaction patterns. The multiinteraction response proposed a activity Ė specific pattern for each interaction at the same time Naive bayes classifier is used to track the object and the tracked result is feed back into the recognition part to find category of an object and it is the final result.

Color and Texture Based Image Retrieval Based on Quadtree Segmentation Technique

International Journal of Engineering Research in Computer Science and Engineering, Available online 9th August 2017

Shradha Naik | Prof. Umesh A. Bapat

Abstract

With the increasing demand for need of retrieval of images based on different aspects, properties, characteristics there has been tremendous research going on in the field of Content-based image retrieval (CBIR), also known as query by image content (QBIC). Content here is referred to visual features ie colour, texture, shape, spatial layout of an image which needs to be extracted. This paper proposes a novel approach wherein content based image retrieval is based on color and texture primarily implementing color histogram for color based and gabor filter for texture based retrieval. Colour histogram comprises of two colour models(RGB and HSV). For texture based, Frequency and orientation representations of Gabor filters are similar to those of the human visual system, and they have been found to be particularly appropriate for representing and discriminating texture well . Main aim of this paper is to implement a new technique that is quadtree segmentation on query and database images and then apply feature extraction ie color histogram on all images and match the query and database images using similarity criteria. Similarity metric used in this paper is Euclidean distance. Quad tree is a segmentation technique which divides image into homogeneous blocks. Hence the name Quadhistogram is a new revised technique to implement colour based retrieval under local colour histogram which divides the images into homogeneous blocks and then compute histogram of each block

Colorectal Cancer Identification in CT Images based on Image Segmentation Techniques

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Sobiya Ambreen | Narayana Swamy G

Abstract

Colorectal cancer is a lethal disorder and a cancer, third most commonly found that will lead to death in both men and women. Computed Tomography (CT) imaging technique has become a primary method for detection and staging in those patients who are suffering from Colorectal cancer. In this paper CT images of the patients suffering from Colorectal cancer, who are in the beginning stages are used to detect the area and mean values of tumor area using Image segmentation techniques. This paper describes algorithms for preprocessing, clustering and post processing of CT images. The paper uses image enhancement techniques, clustering using adaptive k-means algorithm and it is implemented using MATLAB.

Combating Mind Wandering in The Area of Academics

International Journal of Engineering Research in Computer Science and Engineering, Available online 29th June 2017

Tanu Varshney | Priyanka Chaudhary, Priyanka Tripathi , Neha Tyagi

Abstract

This paper presents how the wandering mind is linked to the field of academics. We are also going to talk about how can we interpolate memory test in reducing mind wandering. We also mention here the strategies to train our brain. Here we devise the measures to combat mind wandering during studies i.e. Learning Mental Self-Regulation for improved concentration and arranging factors that you can immediately control your mind. Also we will focus on two applications that can be built to study mind wandering.

Combined Economic Load and Emission Dispatch using Cuckoo Search Algorithm

International Journal of Engineering Research in Computer Science and Engineering, Available online 31st May 2017

MCV Suresh | Dr. Shaik Rafi Kiran

Abstract

This paper presents an application of cuckoo search algorithm for multi-objective optimization problem in power system. Considering the environmental impacts that grow from the emissions produced by fossil-fuelled power plant, the economic dispatch that minimizes only the total fuel cost can no longer be considered as single objective. Application of cuckoo Search algorithm in this paper is based on mathematical modelling to solve economic, emission and combined economic and emissions dispatch problems by a single equivalent objective function. cuckoo search algorithm has been applied to two realistic systems at different load condition. Results obtained with proposed method are compared with other techniques presented in literature. Cuckoo Search algorithm is easy to implement and much superior to other algorithms in terms of accuracy and efficiency.

Combustion and Propulsion Characteristics of Composite Solid Propellants under Elevated Conditions

International Journal of Science , Engineering and Management, Available online 12th October 2017

Pallavi Gajjar | Vinayak Malhotra

Abstract

Research efforts in Composite solid propellants are mostly carried out at standard operating static conditions and hence majority of the studies have taken place by considering lower values of supersonic area ratio and chamber pressure. The work addresses evaluation of the combustion and propulsion characteristics under elevated conditions. Composite solid propellant [AP/HTPB/Al] is selected and systematic parametric studies are carried out using NASA-CEA. The simulations were carried out for elevated chamber pressure, supersonic area ratio conditions along with varying fuel concentration and O/F ratio. The performance was analyzed in terms of change in specific impulse and characteristic velocity. The study comprises of investigating the optimized composition criterion under varying conditions. The simulation predictions were duly verified and validated with the benchmark experimental and theoretical works. The results were compared with the preceding static testing of the composite propellant under normal conditions. Results show that high values of controlling parameters and high energy materials do affect the composite propellant performance. Based on the results, an effort is made to reason out the trends obtained under elevated operating conditions for the necessary effects. Additionally, useful information regarding the inclinations of energetic materials under elevated conditions is explicated.

Combustion of Microalgae Oil and Ethanol Blended with Diesel Fuel

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Dr.K.Thirupathi Reddy | Dr.M.L.S Deva Kumar,Mr.Ch.Ravi Kiran

Abstract

Using renewable oxygenated fuels such as ethanol is a proposed method to reduce diesel engine emission. Ethanol has lower density, viscosity, cetane number and calorific value than petroleum diesel (PD). Microalgae oil is renewable, environmentally friendly and has the potential to replace petroleum diesel. In this paper, microalgae oil (10%) and ethanol (10%) have been mixed and added to (80%) diesel fuel as a renewable source of oxygenated fuel. The mixture of microalgae oil, ethanol and petroleum diesel (MOE20%) has been found to be homogenous and stable without using surfactant. The presence of microalgae oil improved the ethanol fuel demerits such as low density and viscosity. The transesterification process was not required for oil viscosity reduction due to the presence of ethanol. The MOE20% fuel has been tested in a Variable Compression Ratio Research Engine at different speed. The engine test results with MOE20% showed a very comparable engine performance of in-cylinder pressure, brake power, torque and brake specific fuel consumption (BSFC) to that of petroleum diesel. The NOx emission and HC have been improved while CO and CO2 were found to be lower than those from petroleum diesel at low engine speed.

Common Phase Estimation in Coherent OFDM System Using Image Processing Technique

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 21st August 2017

Lava Kishore Reddy N, | Sadyojatha K M

Abstract

OFDM is widely used as the modulation standard in all Wireless transceiver systems and recently optical transceiver systems due to its inherent advantage over other modulation standards. The main drawback of the OFDM system is it suffers from the phase noise errors. Common Phase Error (CPE) and Inter Carrier Interference are the two main errors that occur in OFDM systems as result of phase induced noise. Several techniques have been proposed to combat the CPE, such as RF pilot carrier based, Digital Pilot Aided (PA) based, MBB based etc. In this paper a framework for evaluating the performance of MBB and PA based method in estimating the CPE and correcting it is proposed. The framework is designed and implemented in MATLAB 15 Software and the BER is computed for both the methods to compare their performance.

Comparative Analysis of Bamboo Species as an Alternative to Steel Reinforcement

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Aniket Sahare | Dr.Debarati Datta, Pankaj Mali

Abstract

With the world embracing the concept of sustainability, the importance of bamboo as a sustainable material is gradually increasing in the construction sector. Since there are many species of bamboo available across the globe, region specific studies are important to understand the bamboo harnessing potential of that region. This study is focused on Vidarbha region as it is very rich in bamboo ( 90% of total state production of bamboo ) and involves comparative study between the two main bamboo species found in Vidarbha i.e. Bambusa arundinacea ( Locally known as Katang ) and Dendrocalamus strictus ( Locally known as Manvel ).In this paper, experimental investigation has been carried out to study the mechanical as well as physical properties of both the species, in order to check their suitability against conventional steel reinforcement. The bamboo species have been procured from Nagpur district. The samples were prepared and tested according to IS 6874:2008. To understand the physical nature of these species, tests were conducted to determine the physical properties that included Moisture content test, Density test and Shrinkage test. The tests carried out to determine mechanical properties were Bending strength test, Compressive test strength and Tensile strength test. The comparative test results are presented in the paper.

Comparative Analysis of Heart Disease Dataset using KNN and Decision Tree Classification

International Journal of Engineering Research in Computer Science and Engineering, Available online 12th August 2017

Bhavini Bhatia | Vamika Razdan

Abstract

There are huge amount of data in the medical industry which requires prediction and analysis so that right decisions can be made and help in proper analysis. As the data is large and the decision made by the doctor may not be accurate which may result in failure in some cases and can sometimes put someone's life at stake. Data mining in healthcare is an intelligent diagnostic tool. Heart disease is the leading cause of death in the world over the past 10 years.29.2% of deaths are due to Cardiovascular Diseases(CVD). Researchers have been using several data mining techniques to help healthcare professionals in the diagnosis of heart disease. Decision Tree is one of the successful data mining techniques used. However, most researchers have applied KNN . Number of experiments has been conducted to compare the performance of predictive data mining technique on the same dataset and the outcome reveals that Decision Tree outperforms other predictive methods like KNN, Neural Networks.This research paper intends to provide the knowledge that which data mining technique gives better accuracy and should be used in Heart Disease analysis.

Comparative Analysis of Natural Frequencies of Simply Supported Beams

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Sathvik Sripad | Siddharth Joshi,Priya Gupta,Simon Jayasingh

Abstract

In recent times, understanding the vibration patterns of structures has become very crucial :courtesy the various types of forces, both static and dynamic coming into play. Modal analysis helps to determine the vibrational characteristics of a structure explicitly during its design process. Behavioral tendencies of structures under time dependant loads can at times be tricky as the exact nature of dynamic loadings is difficult to comprehend. Modal analysis has proven to be helpful in our understanding towards many vibrational phenomena that were encountered in practice. In this work, focus has been laid on one structural entity- the beam. Finite elemental analysis was carried out for the beams using ANSYS WORKBENCH as a platform for the same. Simply supported beams made up of structural steel, Carbon Fiber Reinforced Polymer(CFRP) and Glass Fiber Reinforced Polymer(GFRP) with both fibers aligned at zero degree inclinations were fabricated under ANSYS Workbench platform simulated under modal analysis. Results were duly compared with respect to the natural frequencies and deflections produced in the three types of beams.

Comparative Analysis of Segmentation Approaches for the Printed Documents

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Pruthvi B K | Pooja A P

Abstract

Segmentation is a vital procedure of any Optical Character Recognition (OCR) framework. It isolates the image content documents first into lines then to words lastly to characters. The accuracy of OCR framework for the most part relies on upon the segmentation algorithm being utilized. Segmentation of printed content of some Indian dialects like Kannada, Telugu and Assamese is troublesome when contrasted and Latin based dialects as a result of its auxiliary many-sided quality and expanded character set. It is be partitioned as vowels and consonants which can likewise contain subscripts and conjunct consonants. In spite of a few effective works in OCR everywhere throughout the world, advancement of OCR instruments in Indian dialects is still a progressing process. Character segmentation assumes a vital part in character acknowledgment in light of the fact that erroneously divided characters are unrealistic to be perceived accurately. In this paper, a segmentation plan for dividing printed Kannada scripts into lines and words utilizing Run Length Smoothing Algorithm (RLSA) and Variational Bayes (VB) strategies are proposed and their comparative analysis is carried out.

Comparative Performance Analysis of CMOS Full Adders Using Various Pass Transistor Logic

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Bore Gowda H B | 

Abstract

with the advancement in semiconductor technology, chip density and power consumption in VLSI circuits has become a major problem consideration. More area and power consumption increases the packaging cost and reduces the battery life of the devices. Hence itís necessary to design any VLSI circuits with less chip area and power consumption. In this paper an efficient full adder circuit is designed with various pass transistor logic families by using microwind simulating tool with CMOS 0.12?m processing technology. Microwind is truly integrated EDA software encompassing IC designs from concept to completion, enabling chip designers to design beyond their imagination. Microwind integrates traditionally separated front end and back end chip design into an integrated flow, accelerated the design cycle and reduced design complexity.

Comparative study of properties developed in microwave and conventional heating of EN-9 steel.

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Abhijeet AP | Manjit MK,Utkal SP,Sunil SJ,Ravindra IB

Abstract

Present work deals with the comparison of mechanical and metallurgical characteristics developed in EN-9 steel specimens subjected to heating at recrystallization temperature followed by subsequent cooling in oil, water and air. Heating of EN-9 steel specimens is carried out using microwave radiation as well as conventional heating technique. Characterization of post heat treated specimens is carried out using universal testing machine, hardness tester, optical microscope and scanning electron microscope. Microwave heated specimens exhibit better mechanical properties compared to that of conventionally heated specimens. Further, it is observed that recrystallization temperature in microwave heating was achieved in 15 minutes whereas in conventional heating the same was achieved in 136 minutes with higher power consumption. The work establishes the basis for potential of heating bulk materials, which is eco-friendly and significantly fast

Comparative Study of Properties Developed In Microwave And Conventional Heating of En-9 Steel.

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Abhijeet AP | Manjit MK , Utkal SP , Sunil SJ , Ravindra IB

Abstract

Present work deals with the comparison of mechanical and metallurgical characteristics developed in EN-9 steel specimens subjected to heating at recrystallization temperature followed by subsequent cooling in oil, water and air. Heating of EN-9 steel specimens is carried out using microwave radiation as well as conventional heating technique. Characterization of post heat treated specimens is carried out using universal testing machine, hardness tester, optical microscope and scanning electron microscope. Microwave heated specimens exhibit better mechanical properties compared to that of conventionally heated specimens. Further, it is observed that recrystallization temperature in microwave heating was achieved in 15 minutes whereas in conventional heating the same was achieved in 136 minutes with higher power consumption. The work establishes the basis for potential of heating bulk materials, which is eco-friendly and significantly fast.

Comparative Study of the Machinability Characteristics of Nimonic C-263 Super Alloy

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 7th November 2017

E. Sivakumari | S. Nishanthi

Abstract

Nickel base super alloy has the combined property of ‚Äúhigh mechanical strength‚ÄĚ and ‚ÄúHigh heat and corrosion resistance‚ÄĚ at elevated temperature. This is the reason for which Nickel based super alloy are extremely used in Aircraft, Aerospace, Submarine and chemical industries. Machining of Nimonic C-263 has always been a challenging task owing to its hot strength, low thermal conductivity, tendency to work harden and affinity towards tool materials. Although coated tools have been used to overcome some of these challenges, selection of coated tool with appropriate deposition technique is of immense significance. The current study attempts to comparatively evaluate various performance parameters in machining of Nimonic C- 263 such as surface roughness, cutting force, tool temperature and tool wear. The tool materials used for this study are cubic boron nitride(CBN), ceramic and PVD coated TiAlN. To determine the effects of parameters selection on machining using Design of Experiments (DOE), Taguchi. L9 / L27 orthogonal array design of experiments was adopted to optimize the parameters. By using Taguchi and Grey Relational Analysis / Analysis of Variance (ANOVA) etc., an optimum value or the best value of surface roughness, cutting force, tool temperature and tool wear is obtained.

Comparative Study of Various Digesters for a Rural Community Biogas Plant

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Rohan N. Khedekar | Prashant Jain

Abstract

Energy requirement is increasing and fossil fuels resources are limited, therefore we should consider renewable energy as solution to our problem; but till today renewable energy is economically not an attractive option. Biogas is renewable fuel which generates from decomposition of bio-degradable waste under anaerobic condition; such condition can be maintained by biogas digester, which is important part of biogas plant and having 60-70% cost of total plant cost. Biogas and slurry produced from digester are renewable fuel and organic fertilizer; which makes it economical option, by choosing right digester it can be more economical, therefore The objective of this paper is to discuss the performance of various types of digester and a comparison between different digester. This comparison gives idea of which digester is better option for community Biogas Plant. Also it can empower communities by providing them with tools they can maintain and use themselves.

Comparative Study on CBR Values of Expansive Soil Using Different Industrial Effluents

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

K. V. N. Laxma Naik | S. Bali Reddy

Abstract

In this paper the effect of industrial effluents on CBR behavior has been studied. The soil used in this investigation is classified as ‚ÄúSC‚ÄĚ as per Indian Standard Classification system. It is highly expansive nature as the differential free swell index (DFSI) is about 255%.The California bearing ratio tests are conducted on the soil treated with tannery and battery effluents at different percentages from 20 to 100% in increment of 20% Tests are also conducted on untreated soil for comparison. The results show that CBR values are increased for tannery effluent and CBR strength is decreased for battery effluent. These results helps for further study in different accepts.

Comparative Study on Different Energy Efficient Routing Protocols in Wireless Sensor Networks

International Journal of Engineering Research in Electrical and Electronic Engineering, Available online 29th June 2017

Sayamuddin Ahmed Jilani | Dr. Soumitra Kumar Mandal

Abstract

Wireless Sensor Network (WSN) is a special type of wireless network, consists of hundreds to thousands low power sensor nodes and one or may be more than one Base Station (BS). Each node is defined with limited energy. Since this is a wireless network that fully depends upon the batteries thus energy efficiency is a key design issue. It is very important to minimize the total energy consumed by the whole system, so that the life span of such network may be maximized. Lots of energy efficiency routing protocols have been proposed to maximize network life time. In this paper, a survey on various types of energy efficient routing protocol is discussed.

Comparing feasibility of long distance transmission and locally generated solar energy over a period of 25 years in remote locations of the Indian Himalayan Region

International Journal of Science , Engineering and Management, Available online 6th September 2017

Saakshi Chauhan | Subrat Sharma

Abstract

It has been widely observed, especially in the Indian scenario, that development projects (road construction, energy infrastructure, etc.) which require large investment are usually implemented without considering alternate scenarios/solutions while other technologies/mechanisms are available. This study incorporates the use of Cost Benefit Analysis in order to ascertain the importance of determining the feasibility and efficiency of an energy project in a remote location of the Himalayas. The focus is upon electrification of remote villages which are located in challenging environments and difficult mountain terrain. The village Khati (Bageshwar district, Uttarakhand, India) is 20 kilometres far from the electricity distribution sub-station (village Karmi) and inaccessible by road, till date, and is located above 2210amsl. Net benefits from utilization of transmitted energy from sub-station was compared with a hypothetical situation of net benefits generated from utilization of same amount of energy being supplied from a solar power plant located in the village. The net benefit for the two scenarios has been calculated for a period of 25 years with the help of Net Present Value method. Benefits were much greater (more than Rs 2300 thousand) while having a decentralized local solar plant than the regular supply of transmission from centralized electricity grid. This study demonstrates the importance of feasibility analysis in such alternate scenarios especially in executing developmental projects in remote locations having difficult terrain and unstable climatic and environmental conditions.

Comparision of QoS Parameters for DSDV and DSR in Hybrid Scenario

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

T.K.Kalaiarasan | A.SureshBabu, A.Shailaja

Abstract

Mobile Multi-hop Ad Hoc Networks are collections of mobile nodes connected together over a wireless medium. These nodes can freely and dynamically self-organize into arbitrary and temporary, ďad-hocĒ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure. It is, however, possible to combine an infrastructure-less ad hoc network with a fixed one to form a hybrid network which can cover a wider area with the advantage of having less fixed infrastructure. Due to the hybrid nature of these networks, routing is considered a challenging task. Several routing protocols have been proposed and tested under various traffic conditions. However, the simulations of such routing protocols usually do not consider the hybrid network scenario. In this work we have carried out a systematic simulation based performance analysis of the two prominent routing protocols: Destination Sequenced Distance Vector Routing (DSDV) and Dynamic Source Routing (DSR) protocols in the hybrid networking environment using NS2. The performance of the DSDV is better than the performance of the DSR routing protocol. To compare the performance of DSDV and DSR routing protocol, the simulation results were analyzed by graphical manner and trace file based on Quality of Service (QOS) metrics: such as , packet delivery fraction, average end-to-end delay and normalized routing load under varying pause time with different number of sources.

Comparision of Various Codes to Evaluate Design Capacity for Water Retaining Structure

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Hari Haran. Vempati | R. K. Ingle

Abstract

Calculation of Crack Width and satisfying the serviceability criteria along with checking for Limiting Moment and Shear plays a crucial role especially in the design of Water tank Container. This paper aims at comparing Service , Ultimate Moments and Hoop Tension for given reinforcement and its spacing corresponding to Container thickness, Clear cover, Grade of Concrete and Grade of Steel based on Crack Width, between IS 3370 (Part 2): 2009, BS 8110: 1997, Eurocode 2 1992-1 (2001), ACI 318. Rather it also fulfill the need of standardization for finding the Reinforcement required based on given Service and Ultimate Moments which will take care of Crack Width

Comparison of Carbon Laminated Concrete with Conventional Concrete

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 29th June 2017

Mr. Shashiraj Chougule | Mr, Manoj Mota, Mr. Amit Chougule,Mr. Vishal Kamble,Mr. Kedar Kumbhojkar

Abstract

The shortage of conventional construction material is causing many problems in construction practices. One of the alternatives for conventional material is carbon lamination which is helpful for refurbishment as well as while for the construction of new structure. The study made is focussing on the comparison of carbon laminated concrete with conventional concrete on the parameters of compressive strength and tensile strength. The results in this aspect are encouraging.

Comparison of Different Roof trusses Under Wind Load

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

Prince Yadav | Debarati Datta

Abstract

Trusses are triangular frame works, consisting of essentially axially loaded member which are more efficient in resisting external loads since the cross section is nearly uniformly stressed.Trusses are used in roofs of single storey industrial buildings and multi storey industrial buildings. The loads on the roof truss are dead load, live load, wind load and earthquake load. Trusses are also used to support long span floors of multi storey building to resist gravity load. The axial forces in members are calculated by taking these loadings and their critical combinations.For design of trusses, effect of wind force is predominant to calculate the member forces. SP 38(S&T):1987-provides designing for structures with steel roof trusses and their weight comparison. It gives details of specific roof truss configuration. This Paper represents analysis and design of roof trusses whose configuration are other than that specified in SP 38(S&T):1987. However their span to depth ratio is same as the truss configuration given in SP 38(S&T):1987. The trusses which has been analyzed having span 12m, 18m and 24 m and angle section has been used for design purpose. The analysis has been done for three basic wind pressure 100 kg/m2, 150 kg/m2 and 200 kg/m2, So that we can compare the weight of these trusses with A-type roof truss of having same span which is specified in SP 38(S&T):1987.The purpose of this study is to suggest the most feasible truss section, when longer span roof sheets are used. Now a days roof sheets of longer span are available in market. So we can use the configuration which have less number of purlins or wider panel. The truss configurations are distinguished between three categories namely Pitched roof trusses, Parallel chord trusses and Trapezoidal trusses. The advantages and disadvantages of different truss configuration are discussed in detail

Comparison of Filters for Despeckle With Improved Speckle Reducing Antiscopic Diffusion Filter for Ultrasound Images

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

Stafford Michahial | Dr Bindu A Thomas

Abstract

Due to the presence of speckle noise leads to the poor quality of the US images. The presence of speckle noise makes it difficult to understand the information contain in the US image hence filtering of US image is required to improve the image quality. The paper gives us the comparison of different filters techniques (linear filter (lf),Anisotropic Diffusion(AD),Nonlinear filter kuwahara(Kuwa) ,median filter(med),hybrid median filter(hmed) , Lee Filter &kaun, frost filter, Wavelet based speckle reduction methods, speckle reducing anisotropic diffusion filter (srad),improved srad(Israd). 65 texture feature, image intensity normalization, 15 image quantitative metrics and image quality evaluation. It is observed that the Israd, improves the image quality of liver, kidney, uterus, live mass ultrasound images.

Comparison of Keyword Search and Ranked keyword Search in Cloud Computing

International Journal of Engineering Research in Computer Science and Engineering, Available online 8th August 2017

Kavya H | Prashanth Putta P, Chethan R, Divya D,Vani Saptasagar

Abstract

Cloud computing otherwise known as on demand computing. It provides the services over the internet. It has the provision of facilitating users to store and access their data in and from cloud server by sitting anywhere and on any device. Storing data in cloud server also opens up so many security threats as data is accessed over internet and client has no direct control over data once uploaded into cloud server. We first implement a basic idea for the Single Keyword Search Over Encrypted Data And then Multi-keyword Ranked. Search over Encrypted cloud data (MRSE) based on secure inner product computation and efficient similarity measure of coordinate matching, i.e., as many matches as possible, in order to capture the relevance of data documents to the search query, then we give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. Assignment of anonymous ID to the user to provide more security to the data on cloud server is done. To improve the search experience of the data search service, further extension of the two schemes to support more Search semantics is done.

Comparison Of Modelling Results On Si0.74ge0.26 And Ge Using HighĖK Dielectrics

International Journal of Engineering Research in Electronics and Communication Engineering, Available online 29th June 2017

VinayBudhraja | Himanshu Gautam, Nitten

Abstract

This work focusses on the use of Silicon Germanium (Si0.74Ge0.26) alloy and Germanium (Ge) as substrate materials for the simulation of MOS devices having a highĖK material. HfO2 was used as the dielectric material and Al as a metal gate. Two MOS devices on Si0.74Ge0.26 and Ge substrates have been simulated and their capacitance-voltage analysis has been done at different frequencies and compared. A comparative analysis of electrical characteristics of n-type MOSFETs made from Si0.74Ge0.26 and Ge substrate have been done in which channel length was varied to see the short-channel effects.

Comparison of Performance and Emission characteristics of biodiesel as a alternative fuel with Ceramic Coated Piston on 4-Stroke D.I diesel Engine

International Journal of Engineering Research in Mechanical and Civil Engineering, Available online 31st May 2017

S. Rajasekhar | R. Bhaskar reddy,Dr. B.Jayachandraiah,Dr. S. Sunilkumar Reddy

Abstract

Diesel engines are being used extensively for fuel economy but due to gradual depletion of Petroleum resources and increase in exhaust emissions, there is an urgent need for suitable alternative fuels for the diesel engines. As our country is an agricultural country, if the alternate fuels are produced by our farmers it will be beneficial for the country and the farmers also. In recent studies, researchers studied various vegetable oils like canola oil, aloveera oil, soya been oil, flaxseed oil and hone oil etc. Out of all flaxseed oil and hone oil play an important role as an alternative fuel. But the properties