International Journal of Advanced Research Methodology in Engineering & Technology
ISBN 978-1-63535-324-2 EAN 52000
Special Issue, March 2017, Pages (1 – 194)
Development of aluminum based composite material for cylinder liner application
A.Deepankumar, K.Ganeshram, S.Kalyanasundaram, R.Saravanakumar
Thermal conductivity is the property of the material which is essential for the heat transfer applications. The thermal conductivity of the composite material will vary with varying composition. Now a days, aluminium based composites are widely used in many application because of light weight and low cost. The main objective of this work is to find suitable alternate material for the cylinder liners. The aluminium composites using alumina and graphite with various proportions (sample1: Gr1%, Al2O36%, sample2: Gr1%, Al2O312%, sample3:Al2O3 12%) were fabricated and tested for their suitability as cylinder liners. An experimental setup was fabricated to measure the thermal conductivity of samples. Thermal conductivity of the samples was determined and the values are compared. The results showed that the thermal conductivity of the material is decreasing with increase in graphite composition. The decrease in thermal conductivity results in less heat loss which is more suitable for cylinder liners.
Multipurpose Trash Collecting And Cleaning Robot
J.Senthil Kumar, V.Ramprabha, V.Pramoth kumar, V.Vishnuprasanth
Now a days, the collecting of waste and empties the bins has become a major problem in urban areas. There are different kinds of waste that affect our environment, for example metallic, plastic, food and Garden waste. Developing waste collecting robotic system is an immense challenge. This kind of robotic based automation is helpful to create smart environment around us. In this paper we mainly focused to collect trashes in autonomous path using robot. This robot is equipped with ultrasonic sensor, PIR sensor, motor control and power unit. The autonomous robots carry out obstacle detection and avoidance, amount of waste in bin.
An Efficient De-Duplication Mechanism In Multinode Hadoop Distributed File System Environment
Real-time exposure towards dealing with large volume of data is called Big data. Big data is one of the emerging technologies in the modern era. Handling huge volume of data in a real time environment is a hectic process. To handle this issue Hadoop Distributed File System (HDFS) came into existence. Hadoop Distributed File System support data duplication to attain high data reliability. However additional utilization of storage space is needed due to duplication strategy. HDFS Storage space can be handling efficiently by implementing De-duplication strategy. The motto of the research is to eliminate file duplication by implementing De-duplication strategy. A Novel De-duplication system using HDFS approach is introduced in this research work. To implement Deduplication strategy, hash values are computed for files using MD2, MD5, SHA-1, SHA-256 and SHA-512 algorithms. The generated hash value for the files is checked with the existing file to identify the presence of duplication. If the duplication exists, the system will not allow the user to upload the duplicate copy to the HDFS. Hence memory utilization is handled efficiently in HDFS environment.
Drip Irrigation Using IOT And Web Application
M.Santhanaraj, M.Roobini, K.Sivavalli, K.Dhivya
The main intention is to develop an automation to supply water for home gardening and irrigation system in farm fields. It is done with the help of soil moisture sensor and temperature sensor which are fixed at root area of the plants. The values detected by these sensors are transmitted to the base station. The key aim of base station is to collect data from field station and upload those values in internet by using Wi-Fi technology also notify user about any peculiar circumstances like low moisture and high temperature. Drip irrigation system has been approved under different climates with various levels of moisture contents. Home gardening is the hobby of many people and also same works for the irrigation system in the agricultural fields.
An Efficient Design Of Low Power Shift Register Using Pulsed Latches
V.Vikram, M.Maheshwaran, R.Renita Rexy, G.Mani Sankar
Now-a-days for each and every designing in VLSI era the power consumption plays a vital role. Low power has emerged as a principal theme in today’s electronics industry. The low power VLSI design has important role in designing of many electronic design systems. On designing any combinational or sequential circuits, the power consumption, implementation area, voltage leakage, and efficiency of the circuit are the important parameters to be considered initially. This paper proposes a low power and efficient area shift register by using pulsed latches. The power and area is reduced by replacing flip flop with pulsed latches. This is also solves the timing problem non overlap delayed signal instead of conventional signal. The shift register uses a less number of pulsed clock signals by grouping latches to several sub system and using additional temporary latches. A shift register using pulsed latches is reduced the area and power. The proposed shift register saves the power and area compared to conventional shift register with flip flop. Also the shift register uses a small number of the pulsed clock signals by grouping the latches to more than a few sub shifter registers and using supplementary temporary storage latches.
An Energy Efficient, High Speed Content Addressable Memory Using MSML Scheme
N.Ragavi, B.Vijayalakshmi, R.Renita Rexy, G.Mani Sankar
Content Addressable Memory is a storage unit built on hardware. It is majorly used in internet routers to access fast look up tables. This paper implemented the content addressable memory using Master-Slave Match Line architecture. In the Master–Slave configuration, the CAM word is divided into number of segments. Each segment is provided with an additional slave match lines along with one Master Match Line. Using MSML, the power consumption across the Match Line is reduced. Finally, 128×8 CAM memory is implemented. The CAM array is tested for different possible cases. When the data is given to the CAM array, it is searched simultaneously in the entire memory. The simulation results show that the MSML design with the best configuration can reduce the ML energy consumption by range 7%–57%, which increases with the word size. In addition, we further propose a modified CAM cell to facilitate the MSML match performance, i.e., MSML hp design, which can even result in 28% and 69% energy-delay product improvement compared with the original MSML and traditional CAM designs in the 128-bit word size case.
Way Finding And Currency Detection For Visually Impaired Persons
G.Valarmathi, M.Abirami, B.Nivetha, R.Priyadharshini, S.Vasuki
Our project opens up a world of possibilities for solving day to day problems for the visually impaired and sighted alike. The proposed system overcomes four major issues addressed by the prototype for visually impaired persons. Firstly, Identification of colors of the object present around the visually impaired people. Color variability is done through grayscale based vision algorithm that is difficult to work. So, in this paper we propose a color vision algorithm that consists of two methods namely 1.) An artificial color contrast as a pre-filter that aims at highlighting the target while suppressing its surroundings 2.) Statistically based fast bounded box (SFBB), that utilizes the component analysis technique to characterize the target features in color space which is obtained from a set of training data through which the color classification can be performed accurately and efficiently. Secondly, the currency along with the fake note detection is done by a component based recognition system which uses the speed up robust features (SURF) algorithm. The input image is converted to grey scale, the grey image is extracted and compared with an algorithm and then the voice output is produced through the earphone to visually impaired users. Thirdly, the optical character recognition algorithm is used to convert the given text into voice output with the help of the e-speak engine. Finally, the detection of the obstacle in front of visually impaired users is also been achieved by using Ada-Boost model to differentiate between human and vehicles and given as voice output.
IMC Based Speed Control of Steam Turbine
M.S.Murshitha Shajahan, Samsul Arif.K.M, Sunaid Kunhammed, Khalid Ammar.A
Thermal power plants are the back bone of our electricity system. Modernization of power plant is one of the most urgent needs of the millennium. In a thermal power station, steam is produced in a boiler and expanded in the turbine. The turbine shaft is coupled with generator which is producing electricity. For practical efficiency of the plant, whether small or large will depend on the manner in which it is controlled. Steam turbine control systems are being designed to operate a turbine in a safe and reliable manner. They extract energy from the steam and convert it in to torque. In this paper it is proposed to develop an IMC based speed control system to regulate the speed for any load variations. Using Matlab / Simulink software the behaviour of the shaft torque, depending of the reheater valve opening, with uncertain parameters of the process are tested for different load conditions. Analysis has been done with conventional controllers like PI & PID controller and proposed IMC controller. Merits of the proposed controller are highlighted through a simulation study.
Design of Low Power Pulse Triggered Flip-Flop Using DCPT
N.Nandhini, S.Karthigan, R.Renita Rexy, G.Mani Sankar
Flip-flops are critical timing elements in digital circuits which have a large impact on circuit speed and power consumption in VLSI circuits. In any integrated circuit flip–flop consumes large amount of power as they make maximum number of internal transitions. This paper presents a high performance, energy efficient implicit pulsed triggered flip flop based on direct coupled pass transistor (DCPT) approach. This approach directly couple input D to output Q of the flip flop to alleviate the worst case delay. It reduces input to output travelled path hence reduces D-to-Q delay and power consumption. It also includes an extra NMOS for latch designing to reduce the crossbar current. The simulation results presented are obtained by using Tanner EDA tool. By this technique it improves delay and power dissipation for the proposed implicit pulsed flip flop.
Performance And Emission Analysis of IC Engine By Using Electrolysis And Preheating Process
S.Veerakumar,R.Navin prasath, V.Shyam chander, S.Sathiyavathi
In recent researches, the petrol engine was modified in many ways like Supercharging, Turbo charging, Fuel ignition, Alternative fuels, etc.., and there were lot of changes in design of engine parts to control pollution and to increase the engine efficiency. It is very important to note that there were no changes made in inlet atmospheric air to be mix with hydrogen gas for efficient combustion process. In order to overcome the above statement we added hydrogen gas to the preheated atmospheric air for better combustion process. This will lead to increased efficiency of engine and also to control the amount of exhaust gases. In order to increase the efficiency of engine we use hydrogen gas along with the petroleum. We chose hydrogen as a fuel because H2 has the highest gravimetric energy densities when compared to all other available fuels. Also hydrogen has the highest energy content per unit mass(143MJ/kg) which was 40% more than other. In order to get the more efficient performance of engine we have to preheat the inlet air for decreasing the combustion temperature. By pre-heating the inlet air to the carburettor for a considerable amount, the vaporization can be increased and in turn complete combustion is achieved.
Digital Gate Pass System Using Hybrid Application
M.Santhanaraj, P.Umadevi, K.Selvanayaki, K.Shindhumathi
Authenticated exit and entry is a mandatory procedure in any organization. Particularly when it comes to an institution where there are number of exits and entries at random intervals, involved monitoring the same is vital.The proposed project involves a web application by which a student can apply for exit from an institute at a particular time of interval for a particular reason. The same will be approved by the HOD from a different application interface with a login. On approval the information will be sent to the application and the application interface can be viewed by a security personal at the gate. The user interface is designed using HTML, CSS and Java script and it uses PHP for server communication. The entire system is packaged into an app by means of using Cordova plugin. The user interface consist of a login page on which a user will be directed to a page where the relevant information regarding the user’s exit reasons and time intervals will be recorded and made available. The data will be stored in the database and it can be viewed by a login into the app or site from the institutional head’s login .On approval by the institution the approved names along with the register numbers will be sent back to an approval page where they will be displayed and can be viewed by the security personal at the gate.
Continuous Monitoring Of Human Health Using Internet Of Things
Ganesh Prabhu S, Rama N, Tharaa N
In the modern world maintaining a good health has become one of the major essential thing in everyone’s day-today life. Health issues are becoming higher and higher day by day. The improvement in Science and technologies has paved us a way to monitor the human health in the most efficient way. One such technology is the Internet of Things. Internet of Things is used in a variety of application devices. We have chosen Internet of Things applications in the medical field. Most of the newly invented medical devices are developed using Internet of Things. This paper describes the concept behind Internet of Things and how it works in remote monitoring of a patient along with its advantages and its other applications. Furthermore, this paper will present and discuss the technological solution for the best practice to adopt smart city in collaboration with the smart cities mission.
Image Denoising Techniques: A Review
Pramitha V T, Anil Kumar K R
Image processing is the technique of analyzing and manipulating a digitized image to improve the quality of the image. Removal of noise from original image is a major challenge in digital image processing. There are various techniques available for image denoising. The selection of denoising algorithm is based on the type of application used. This paper presents a review of various techniques used in image denoising. After a brief introduction on the types of noise, an overview of the various denoising algorithms is presented here.
Design of Heart Rate Data Acquisition System With Mobile Alert on Emergent Data Using LABVIEW
Najumnissa D, Mohammed Khalid. S.J, Pushpa. B, Arun Kumar.S
Heart rate is one of the very important parameters of the cardiovascular system. Heart rate is the number of heartbeats per unit time, typically expressed as beats per minute (bpm). A heart rate measuring (HRM) device is a simple device that takes a sample of the heartbeat signal and computes the bpm so that the information can easily be used to track heart conditions. Heart beat sensor is designed to give digital output of heart beat when a finger is placed on it. It works on the principle of light modulation by blood flow through finger at each pulse. The output from the sensor is a pulse signal is sent to a programmed microcontroller 8051 which is used to transmit the received heartbeat data to the computer via Bluetooth. The DS18S20 is a digital thermometer that provides the temperature of the person which is an additional parameter. The Bluetooth device connected to 8051 is paired to a Bluetooth dongle which is connected to the computer through the USB port Once the devices are paired the data can be transmitted to the computer continuously. The program is developed in Lab VIEW platform with necessary conditions. Incase of an abnormal heart rate the program is designed such that it will give alert calls to 3 numbers with specified priority so that the doctor can respond to the emergency situation. A GSM modem connected to the serial port of the computer helps in giving alert calls.
Modeling And Analysis of Shell And Tube Heat Exchanger With Different Baffle Model Using CFD
M.B.Aravind Shankar Raj, B.Aadhiyan, P.Cinraj, S.Padmavathy
The target of the venture is to dissect the warmth exchange productivity of shell and tube warm exchanger with various baffles. This venture exhibits an outline philosophy to look at different parameters of warmth exchanger. Two distinctive astound models are investigation with the assistance of CFD and look at the outcomes. Baffles are utilized to build the warmth exchange rate by coordinating the stream way of the liquid inside the shell and tube warm exchanger. A shell and tube warm exchanger is a class of warmth exchanger plans. As its name suggests, this sort of warmth exchanger comprises of a shell (an extensive weight vessel) with a heap of tubes inside it. One liquid goes through the tubes, and another liquid streams over the tubes (through the shell) to exchange warm between the two liquids. Two liquids, of various beginning temperatures, course through the warmth exchanger. The liquids can be either fluids or gasses on either the shell or the tube side. There can be numerous minor departure from the shell and tube plan. Ordinarily, the finishes of each tube are associated with plenums (once in a while called water boxes) through openings in tubesheets. The tubes might be straight or twisted in the state of a U, called U-tubes.
Study of Attendance Monitoring System Using Gait Mechanism
Latha.P, Indhumathi.R,Janani Kamatchi.T, Keerthana.K, Revathi.S
In today’s world maintaining of attendance related data is very essential and vital in many sectors like educational institutions, co-operate companies, industries, hospitals and so on. The common method which is used nowadays for maintaining such data is inefficient and it can cause errors. The issues of conventional method are replaced with biometric authentication techniques. The significant role possessed by the technique is a person’s authentication is based on his/her own biometric features. Some of the biometric techniques are: iris, fingerprint, face, DNA recognition and in this paper, the study of gait phenomenon is considered. Gait deals with the walking mannerism in which the attitude of an individual’s walk is considered for authentication purpose. In order to avoid the manual work in data acquisition and managing the complete database of all the details up to date, different types of biometric measurements are utilized, in which the latest approach is gait phenomenon. Here the walking manner recognized from an object is compared with the image clipping stored in the database by which the attendance is monitored. Thus, by making fully automatic, manual work is reduced since there is no intervention of human work in maintaining the attendance details.
Development of An EEG Amplifier For A Brain-Computer-Interface
Najumnissa D, Salman Farci.K, Aadhirai.S, Mohamed Kasim.H
The work is to build a circuit capable of acquiring EEG signal and to analyze those signals for further BCI applications. A Brain-Computer Interface (BCI) is a system that acquires and analyzes neural signals with the goal of creating a communication channel directly between the brain and the computer. Such a channel potentially has multiple uses. For example: Bioengineering applications: assist devices for disabled people, Human subject monitoring: sleep disorders, neurological diseases, attention monitoring and/or overall “mental state”. An EEG amplifier circuit is designed in which there is a preamplifier circuit, filtering circuit and an amplifying circuit. Amplification of input signal took place at each stages of the circuit. Both instrumentation amplifier and band-pass filter play an important role in making sure that unwanted artifact are not amplified and output was only of pure EEG signal. In this work EEG signals for different subjects were acquired under different mental conditions like reading, doing math calculation and jogging. The output is obtained in the form of voltage using which the EEG signals are discriminated.
Hilbert Space Clustered Indexing Technique for Densely Populated High Dimensional Data Objects
R.Pushpalatha, Dr.K.Meenakshi Sundaram
Clustering is an essential and significant topic in both machine learning and data mining. Most of researches have been developed for clustering high dimensional data. However, there is a need for effective clustering model to cluster the densely populated high dimensional data objects with higher clustering accuracy. To overcome such limitation, Hilbert Space Clustered Indexing (HSCI) technique is proposed. HSCI technique work on the densely populated data objects in the Hilbert space dimensionality to easily identify symmetric objects and generates cluster with high accuracy level. Initially, HSCI technique is designed Hilbert Space Dimensional Clustering algorithm to efficiently cluster the densely populated high dimensional data objects.
Intelligent Car Parking Information Exploiting Using VLC
S.Deepika, N.Gopinath, Moumita sharma, D.Murugesan
In this modern world the number of vehicle increases by day-by-day. These lead to a major problem in parking their vehicle in various places like hospital, business place and sports place. To overcome this problem various parking slot consists of parking management system with number of sensors. These sensors are used to detect the available space in the parking slot. The proposed system consists of visible light communication (VLC) to data transmission. The sensors in the parking slot detect the available space and this information regarding empty parking slot is indicated to the driver and guide them to the corresponding parking slot. Since the data transaction is in the form of light it is applicable for indoor parking system. The light emitting diode (LED) is used to transmit the data about the available space.
Assessing and Mining Relevant Data on Online Java Forum Using Semantic Algorithm
Rajathi V, Sunanthini J, Dhanalakshmi.B
Online forum mainly helps the user to collect and share their experiences and gain knowledge by posting their content in the forum. The user can post the data which is relevant or irrelevant to the content in the forum. It does not give exact solution or content to the user post. Forum rankings are based on the user’s activity and the number of postings so it does not give best solution to the problem. The aim of the present work have the forum admin for uploading only the relevant data in the forum database. Using this forum database the user can upload and getting only the relevant data in the java forum using semantic algorithm. The semantic algorithm is used to represent interactions between the users in the forum based on the semantic content of the data. Which gives only the relevant content for the user posting. In this semantic algorithm similarity computation to be done for identifying the group of similar content of users’ posting. Using homogeneous function, classification of relevant and irrelevant data can be computed by using string comparison in the forum database. Using cognitive cue- Competition technique, the irrelevant content can be blocked by the admin in forum. This approach characterizes user interaction, helps to gain exact relevant knowledge from the users’ postings in the java forum.
Dust Motes for Border Surveillance
Aartthi V, Eswari T, Priyanka Janet M, Sumathi K
Prevention of enemy intrusion near the border is an important task. There are many areas that cannot be monitored keenly and continuously by border security forces and satellites. The current monitoring and surveillance systems are expensive in real time. This paper presents a low cost smart wireless network for tactical border surveillance system to detect, classify and track enemy intrusion using vision, acoustic, magnetic, thermal and vibration signatures. Each sensor mote has few on-board sensors, a processor and a wireless connection, to sense and communicate an enemy intrusion across borders and battlefields. These sensor motes are small in size and can be rapidly deployed by few men.
Quality and Quantity Security Analysis for Ghost Based Wireless Networks
Manju Bhagavathy K, Vinod D
In Real world, wireless network is prone to Ghost based attack due to mobility of nodes and they are called as moving nodes. Due to its mobility nature, packet loss may occur during the transmission this will leads to data loss or partition of network. In this paper we are proposing a fine grained approach for network adjustment using Localizability aided Localization algorithm to provide information about the localized and non localized nodes in a network. In the proposed approach GPSR protocol a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet’s destination in order to make packet forwarding decisions. All the simulation done through the NS-2 module and the results show that Localizability aided Localization algorithm effectively guides the adjustment.
Self Detect Collision Avoidance in Aircraft Using RSSI
N.Sowmya, A.Rajasheethala, S.Shamini, S.Sornalaksmi
The idea of ‘ Sense and Avoid’ in unmanned aircraft is receiving considerable attention to avoid collision. One approach to reduce or avoid the aircraft collision can be obtained by using the concept of Received Signal Strength Indication (RSSI). This paper focuses on using the RSSI concept in aircraft, to implement a nearby Sense and avoid in the form of Self Detect Collision Avoidance (SDCA) module. The signals which are generally emitted by the aircrafts are recognized by the SDCA module and the signal strength is determined. The SDCA module after obtaining the strength of the signal calculates the distance from the intruder and the time remaining for collision using the RSSI concept. For different levels of signal strength different forms of warning are issued through look up display and audio form to pilot and decision regarding the change in the direction is made after consulting with the intruding aircraft. This is possible only if the two aircrafts have SDCA system installed on board. Communication between aircrafts is possible through SDCA modules without the involvement of the Air Traffic Control(ATC). In case the signal strength reaches the threshold level set, and there is a lack of pilot response then the SDCA module automatically deviates the aircraft from its scheduled path, by sending commands to the controller automatically to change the direction of actuators through the ‘Fly by Wire’ technology. Hence SDCA avoids collision due to pilot error also. When SDCA is installed only on one of the aircraft , then this aircraft alone is being deviated from its desired direction to avoid collision It is also equipped with a sensor to detect obstacle and avoids collision.
Solar Powered Platform Cleaning Robot
K.Swami Prabakaran, U.Vignesh, D.Vijay, S.Vijay, W.Newton David Raj
The significance of this ROBOTIC MODEL, is to clean the platform’s such as Railways, Airports, Hospitals, etc., by integrating the floor cleaning robot (vacuum cleaning) and pick and place robot (arm based). And also the further more significant of this model is solar power (natural energy). The whole model will be powered by the natural energy.
Global Industrial Process Monitoring
Karthickeyan.N, Praveen Kumar.K, Nivedita.R, Sakthivel.C, Dhanajeyan.R
Nowadays sensors play a vital role to develop many applications. This project aims to introduce the general structure of wireless sensor networks as well as different wireless standards and network components. The main tasks of sensors are controlling a variety of industrial equipment, monitoring of some processes, giving feedback and collecting different data for specific purposes. The continuous monitoring of temperature, gas and pH level of liquids is done through sensors. In this project we are developing a system which will automatically monitor the industrial applications and generate alerts/alarms or take intelligent decisions using concept of IOT. IOT has given us a promising way to build powerful industrial systems and applications by using wireless devices, android and sensors. A main contribution of this paper is that it summarizes the uses of IOT in industries with artificial intelligence to monitor and control the industry.
Operation and Control of Hybrid Train using Renewable Energy
G.Karthikeyan, R.Nandhagopal, S.Rajakumaran, G.Sowndhariyan, K.Vimalraj
The renewable energy plays vital role for today’s world as in near future the non-renewable energy sources that will get exhausted. All the conventional energy resources are depleting now a days. So we have to shift from non-renewable to renewable energy sources. In this the combination of two renewable energy is takes place that is wind and solar energy. This process play the sustainable energy resources without damaging the nature. We can give continuous power by using hybrid energy system. Basically our system involves the integration of two energy system that gives uninterrupted power. Solar panels are used for converting solar energy and turbines are used for converting wind energy into electricity. This electrical power can utilize for various purpose. Generation of electricity will be takes place economically. Our paper deals with running train with the generation of electricity by using two sources combine which leads to generate electricity with minimum cost without damaging our environment.
Integration of Big Data Technologies for Human Centric Wellness Data with Fingerprint Sensor
GowriShankar.M, Charan Raj.R, Gayathri.S
Big Data consists of large data sets that will be analyzed computationally to reveal patterns, trends, and associations, especially related to human behavior and interactions. The new technologies and their data generation at substantial rate gave birth to the Big Data and a robust platform is required to capture, retrieve, store, and process the data. Data generated by Health care services and applications such as sensors, human centric applications, social networks, and smart-phones need to be collected and processed to provide in-depth knowledge for advancement in the field. In this paper we create a personal health care monitoring platform for clinical, physical, social and mental health by collecting the clinical, personalized and feedback data along with Fingerprint Sensor for the users. We implement a Big Data service engine which provides storage services to health monitoring systems for analytics services to visualize and monitor clinical information with their finger print. Our prototype system successfully integrates various technology platforms and provides centralized health monitoring system.
Enhancing Data Security with System Performance and Fault Tolerant in Big Data
Aishwarya J, Ashwini N, Rajasekaran G
Big Data consists of extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions. The new technologies and their data generation at substantial rate gave birth to the Big Data and a robust platform is required to capture, retrieve, store, and process the data. . Data generated by Health care services and applications such as sensors, human centric applications, social networks, and smart-phones need to be collected and processed to provide in-depth knowledge for advancement in the field. In this paper we proposed secure re-encryption technique , it perform two level encryption before actual data store in remote server , for using this technique need two server one local server another remote server. Here we are using big data concept, so that, all patient data must be split into multipart then encrypt each part under privacy key. Main goal of the project is fast and securely store and retrieve data from big data for that we used storage level cache, that store uploaded data temporarily until move to actual location, from this way we can avoid data loss and also obtain fast response. We proposed two Encryption key index level, privacy level. Here we are also implementing distributed servers to avoid fault tolerance.
BLE Based Asset Location Identification Using IOT
J.Nadimuthu, S.Prabhakaran,E.Subbaiah, M.Vignesh Pandian, P.Geethabhai
During the last decades, location based services have become very popular and the developed indoor positioning systems have achieved an impressive accuracy. The problem though is that even if the only requirement is room-level localization, those systems are most of the times not cost-efficient and not easy to set-up, since they often require time-consuming calibration procedures. This paper presents a low-cost, threshold-based approach and introduces an algorithm that takes into account both the Received Signal Strength Indication (RSSI) of the Bluetooth Low Energy (BLE) beacons and the geometry of the rooms the beacons are placed in. Performance evaluation was done via measurements in an office environment composed of three rooms and in a house environment composed of six rooms. The experimental results show an improved accuracy in room detection when using the proposed algorithm, compared to when only considering the RSSI readings. This method was developed to provide context awareness to the international research project named SmartHeat. The projects aims to provide a system that efficiently heats a house, room by room, based on the habitants’ habits and preferences.
Neoteric System Design Using Histogram Sequence of Local Binary Pattern
Prabakaran Annamlai, Muralidharan M, Muruganantham S, Lakshmana Eswaran M, Subhashini N
This paper delivers an idea of alternate way of authentication of systems. Security now-a-days is an important and one of the serious issue. Door security plays a vital role at home and in various commercial applications. Now the conventional CCTV is used for monitoring with help of humans, it is tedious to monitor continuously for 24 hours and prone to errors. This paper provides a feature of automated door opening with existing camera is optimized in terms of cost, memory and power. Thus, the authentication of person is verified before allowing the person to access the secured area.
A Prototype of Child Monitoring System and Motion Detection RASPBERRY PI
Karthikraj.V, Eswar.A, Lenin.S, Preetha.N, Selvaraj.M
In United States, a survey conducted by the department of health and human services found that 3.6 million children are victims of child abuse. Not only in U.S child abuse also occurred all over the world especially in high children population. In the era, monitoring children became a popular and important. The use raspberry pi for monitoring the children using motion and authentication. It is used to deterrent to crime and prevent burglary. In order to monitor the children, we use evolutionary prototype using raspberry pi. This method can help parents to monitor the children easily by online with authentication feature. Parents can monitor their children with live video streaming and motion detection. If the motion is detected, this system will identify with red box. We also use PIR sensor for sensing Motion Detection. If motion is detected, SMS will send to your mobile.
Snow Cover Monitoring Using Images
Manjulavani.M, Jubin Mithra.B.K, Keerthika.D, Kanimozhi.S, Thirilogasundari.V
Snow cover extension is one of the most important parameters for analyzing weather changes, availability of water resources and also providing guidelines for tourists. In this project, we study the problem of estimating snow cover in mountainous regions from user generated and outdoor webcam photographs. In the existing system, the SVM Classifier is used to estimate the only finite number of samples. In proposed system, Naive Bayes Classifier is used to identify mountain peaks, filtering out images taken in bad weather conditions, and handling varying illumination conditions using morphological processing, boundary detection and SIFT features. Images collected at regular intervals are used as input to observe the snow covered areas and human intrusion are monitored at the base station. The collected information’s are forwarded to the monitoring headquarters through IOT. We created a manually labeled data set to assess the accuracy of the image snow covered area estimation, achieving 95% precision.
Device Power Consumption Avoidance Using Image Processing
Kiruthika G, Meenatchi R, Mohan Raj V, Pradeepa.S, Seenivasan.M.A
Almost 70 percent of India’s electricity today comes from coal-fired plants. About 17 percent comes from hydropower, much of which is from large dams in the northeast. Around 3.5 percent is derived from the nuclear power plants and the rest is from the wind farms. A technology review called India’s Energy Crisis conducted by MIT as on October 7, 2015 says that about 300 million of India’s 1.25 billion people live without electricity. Another quarter billion or so get only spotty power which is as little as three or four hours a day, from the total generated power which was about 65.78 billion units. One of the major reason for this kind of power crisis is due to the fact that, large malls auditoriums, classrooms in urban areas have electrical equipment running unnecessarily in unmanned areas. There are many ways to avoid this problem, like installing IR sensors for detecting people and turning on the devices. But these methods are quite costlier and complex for larger areas. Hence a new method of controlling the power supply of auditoriums or classrooms is proposed using, Image Processing.
Adolescent peoples Digital Depression and Suicide Trails finding from Social Media using Two-Stage Smart Focused WebCrawler with Cognitive Process
R. Anjit raja, B. Nagarajan
An international analysis of over 2, 12,000 teenagers showed that almost 1 in 4 young adulthood met criteria for an anxiety disorder. Severe nervousness, including generalized anxiety disorder, post-traumatic strain disorder, panic disorders and phobias, afflicts 9.7% of all the adolescence. Teenagers throughout the world regularly use the internet, cell phones along with WhatsApp and other messenger’s service, and video games to congregative information and communicate with each other. This kind of ability to interact with others is the unique feature of social media which provides powerful new ways for adolescence to create and navigate their social environments. Teenager’s use of social media occurs concurrently with their developing identity, emerging sexuality, corporeal development and ethical consciousness. In this Paper, we examine how social media impacts the behavioral health of adolescents. In our work, we use Focused Crawlers such as Smart Form-Focused Web Crawler (SFFWC) and Adaptive Focused Crawler for Hidden Web Entries (AFCHE) can robotically search online databases on a Social network sites. SFFWC is designed with link, page, and form classifiers for focused crawling of web forms, and is extended by AFCHE with additional components for form filtering and adaptive link learner. In this paper, we propose an effectually deep social media communication harvesting framework, namely Smart Form-Focused Web Crawler, for achieving both wide coverage and high efficiency for a focused crawler. Based on the observation that deep social sites more often than not contain a few searchable forms and most of them are within a deepness of three our crawler is divided into two stages: Social sites locating and in-site exploring. The social sites locating stage helps achieve broad coverage of sites for a smart focused web crawler, and the in-site exploring stage can resourcefully perform searches for web forms and web pages within a site.