219
PROCEEDINGS INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN ENGINEERING & TECHNOLOGY 2015 SAE SE ICTACT * ovate.Eoaborate.. Cdtate. KINGS ENGINEERING COLLEGE Opposite to Hyundai Motor ST Chennai- Banglore Hichwa Irungatnkotai vilase Sriperumbudur Tauk Tamil Nadu-602 117

KINGS ENGINEERING COLLEGE

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: KINGS ENGINEERING COLLEGE

PROCEEDINGS

INTERNATIONAL CONFERENCE ONINNOVATION AND CHALLENGES

IN ENGINEERING & TECHNOLOGY

2015

SAE SE ICTACT *

ovate.Eoaborate.. Cdtate.

KINGS ENGINEERING COLLEGE

Opposite to Hyundai Motor

ST Chennai- Banglore Hichwa Irungatnkotai vilase Sriperumbudur Tauk

Tamil Nadu-602 117

Page 2: KINGS ENGINEERING COLLEGE

INTERNATIONAL CONFERENCE ON

INNOVATIONS AND CHALLENGES IN

ENGINEERING AND TECHNOLOGY-

ICICET ‘ 15

PROCEEDINGS

Organized by

Kings Engineering College

Irungattukottai, Chennai

In association with

CSL, ISTE,IETE,ISME,ISTE,ICT Academy

Page 3: KINGS ENGINEERING COLLEGE

PREFACE

The International Conference “International Conference on Innovations and

Challenges in Engineering and Technology(ICICET 2015)” provides an efficient knowledge

sharing platform to exchange ideas and views among experts, scientists, practitioners,

researchers and academicians. A viable solution to the problems faced by engineers may be

raised during the productive interaction among them. This volume of proceedings from the

conference provides an opportunity for readers to engage with a selection of referred papers that

were presented on 9th

April 2015 in ICICET conference. The conference proceeding is divided

into 3 sections named as Computer Science and Information Technology, Electronics and

Communication and mechanical Engineering.

One of the unique and valuable dimensions to the ICICET conference is, it brings

innovations in technology together from the entire world and discuss the challenges to serve

learners better. The reader of this proceeding will discover that both common challenges and

creative solutions emerge from very diverse settings. In the past few decades significant changes

in the technology, communication and manufacturing environment have been noticed that

expecting projects with higher quality at lower costs , highly customized and with short life

cycle. In these substances, the challenge is to develop effective systems with intelligence

capabilities, fast adaptation to the environment changes and more robustness against the

occurrence of disturbances.

For this international conference we have received a total of 250 full length manuscripts,

out of 185 manuscripts are short-listed by our highly qualified review committee members and

152 papers presented in the conference. The selected manuscripts are of high quality which

addresses the current challenges and research needs in engineering and technology. High

quality technical paper that proposes new ideas, procedures and techniques in all discipline of

engineering and technology are presented in this conference

Page 4: KINGS ENGINEERING COLLEGE

ADVISORY COMMITTEE

Dr. Singaravadivel, Avanade Inc, U.S.A.

Dr. U. Johnson Alengaram, University of Malaya, Malaysia.

Dr. Natarajan Meghanathan, Jackson State University, U.S.A.

Dr. Selvakumar nagalingam, Quest university, Malaysia.

Mr. S. Nagarajan, Houston, USA.

Mr. Dinesh Pannerselvam, TCS,UK.

Dr. S. Rajesh, M. S. university ,TN ,India.

Dr .S. Janakiraman, Pondicherry University, Pondicherry.

Dr. J. Raja Paul perinbam, KCG, Chennai, TN, India.

Dr. K. Muneeswaran, Mepco Eng. college , Sivakasi, TN, India.

Dr. J. Sheeba Rani, IISST, Kerala ,India.

Dr. Sivasankar, Noorul Islam University, Thuckalai , TN ,India .

Dr. P. Shalini punithavathy, GCE, Tirunelveli, TN ,India.

Dr. J. Shanthi, Avinashilingam University, Coimbatore, TN, India.

Dr. N. Venkateshwaran, REC, Chenai, TN, India.

Dr. D. C. Joy Winnie Wise, FX Engg. College, Tirunelveli, TN, India.

Dr.R.Kesavan, MIT, Anna University, Chennai, TN, India.

Dr. E.N. Ganesh, Saveetha Engineering College, TN, India.

Dr. V.Arumugam , MIT, Anna University, Chennai ,TN, India.

Dr. K. Elangovan, MIT, Anna University, Chennai , TN, India.

Dr. S. Poonkuzhali, REC, Chennai, TN, India.

Dr. R. Vijayarajan, St. Joseph’ s College of Engg ., Chennai, TN, India.

Dr. V. Sapthagirivasan, ITSC , Pune, India.

Dr. P. Chinnaiyah, St. Joseph College of Engg., Chennai, TN, India.

Page 5: KINGS ENGINEERING COLLEGE

KINGS ENGINEERING COLLEGE

ICICET’15

INDEX S.No PAPER

ID

TITLE AND AUTHOR PAGE

NO

1.

CS001

Grapheme Based Text-Independent Writer

Identification

ALLEN JEREM VINCENT, S. ANANTHA

PONRAJ

Mrs. S. Divya

3

2.

CS003

Knowledge Based Access Control In E-Learning Through Learner Activity

Analysis ASHA ALBERT, ANGEL KARUNYA.M,

Mrs.R.Lavanya

4

3.

CS004

Selfie Prevention And Accident Avoidance Android

System

A. ANANTH, K. BALAJI,

B. Mr.D.R.DenslinBrabin(A)

5

4.

CS005

Secret Questions: Phone Theft Detection And Prevention Of Important Apps

Access ASHA.M, J. BEULAH,

Mr.C.B.Chiranjeevi

6

5.

CS007

Brain Controlled Car For Disabled Using Artificial

Intelligence

K.ANANDHI, C. BAVITHRA KARTHI,

Mr K.G. Saravanan

7

6.

CS008

Integrated Verification Of Relay Generated Node Key & User Based Mutual

With Erasure Concepts R.D. BHAGYASHREE, S. DEEPIKA, N.L.ASWANI,

Mr.A.Gnanasekaran

8

7.

CS009

Identify Effective Self-Routing System In Wireless

Environment

ASIK.P, D. DELIN WINCIYA,

Mrs. D.Sterlin Rani

9

8.

CS011

Global Path Planning Using GA-PSO Algorithms

B. BENNETT RICHARD, GEORGE STEPHEN.A,

Mr K.G. Saravanan

10

Page 6: KINGS ENGINEERING COLLEGE

9.

CS013

Effective E- Learning Framework

J GRACY, I.JEBAMALAR,

Mrs.J.Jainee Sharmila

11

10.

CS015

A Case Study On Effective SCADA Systems For

Industrial Organizations

C.A. HUMSARUBINI, P. JERIN,

Mr.P.Gopi

12

11.

CS016

A Fastpicture Retrieval Method Designed For

Network Bigdata

A. INDUZA, JANANI.M,

Mrs. D.Sterlin Rani

13

12.

CS017

Attribute-Based Storage Supporting Secure Replication Of Encrypted Data In Cloud

D. GAUTHAM, S. GILBERT AUGUSTIN RAJ, Mrs. M.Vidhya

14

13.

CS018

Efficient Travel Route Recommender System Based On Tourist Personal

Interest P. JERIN, G.JENIFER SWEETY, Ms.D.Deepavathi

15

14.

CS019 Effective Review Mining And Rating

ASHA RAJA SELVI.A, G DEVI, DIVYA.D,

Ms.V.Sangeetha

16

15.

CS020

Improving The Efficiency Of Recommendation System Using Big Data Analytics Framework

K. GRACELINE JEBILA, Y.V. JENEETH LARA Mr.S.Vinoth

17

16.

CS021

Detection Of Moisture Content Using Sensors For

Smart Irrigation

M. KARTHIK, S MARIA PRAVEEN,

Mrs.V.BlessySelvapriya

18

17.

CS022

Inter-Provider ISP-To-ISP In MPLSVPN Network

Using MP-EBGP Method

S. JEYANTHKUMAR, JOSEPH MATHEW,

Mr.S.Vinoth

19

18.

CS024

License Plate Recognition For The Off-Angled Images Using Neural

Networks A KAVIPRIYAN, S.KEERTHANA, Mrs.M.Sujatha

20

19. CS025 Agricultural Monitoring Using Wireless Sensor

Network (Wsn) Based On Iot

21

Page 7: KINGS ENGINEERING COLLEGE

JOTHI PRIYA.K, M. KARTHIKA, Ms.C.Sumithra

20.

CS028 Energy Efficient Clone Detection In Wsn

PONNARASI,ILLAYAVANAN

M,Mrs. C.Annapoorani

22

21.

CS030

Achieving Deduplication across Different Domain of Big data in Cloud

Ensuring Efficiency & Privacy P. MUTHUMANIAN, MYTHILI, Mrs.V.Indhumathi

23

22.

CS031

An Effective Password Authentication System using Image with Smart Way

of Password Recovery in Support for Wise Banking Services

JUDSON ABRAHAM, MANI MANTHIRAM.S, Mrs.L.Jenitha Mary

24

23.

CS035

An Secure Cloud Based Web Application to Prevent Clone Attack Using

Discrete Wavelet Transform and Java Static Watermarking

M.NANDA GOPAL, P.NIRANCHANA, Dr.D.C.JullieJosephine(P)

25

24.

CS036

Biometric authentication for cloud service provider with multiple cloud storage system P MUGILAN, PHEBE ROSHAN,

Mr.ChristopherSamualRaj

26

25.

CS037

Building Robust Authentication Systems on Questions for Fallback

Authentication P. MUTHUMANIAN , NAVITHA VELVET,

Dr.D.C.JullieJosephine(P)

27

26.

CS039

Cloud Computing Adaptive Framework

M PADMAPRIYADARSINI, S. NITHILA,

ARAVAZHI CHEZHIAN,

Mrs.C.Annapoorani

28

27.

CS040

Cryptographic Implementation of Aggregate Key Encryption for Data Sharing

In Cloud Storage R.PONJANAKI, A.PREETHI DIVYA, Mrs.L.Jenitha

Mary

29

28.

CS042

CryptoImage: Efficient Cryptosystem for Data Hiding in High Dynamic

Range Images A PONVANNAN, J.PRADEEP, Mrs.V.Indhumathi

30

29.

CS043

Ddos Detection And Mitigation On Websites Using

Http Flood

K. POONGUZHALI, POWNRAJ.A,

Ms.D.Deepavathi

31

Page 8: KINGS ENGINEERING COLLEGE

30.

CS045

Deadline based resource provisioning and scheduling algorithm for scientific workflows on clouds

S. PREETHI, Y.PRIYA, Ms.V.Sangeetha

32

31.

CS047 Employee Performance Workflow Mining In Clouds

S.R. SAI SHRAVEN, B. SAIRAM,

Mr.ChristopherSamualRaj

33

32.

CS048

End-to-End Schedulability Tests for Multiprocessor to Design Patterns:

Building Effective Algorithms M.PRATHEEP KUMAR, S.RAJ KUMAR,

Mr K.G. Saravanan

34

33.

CS049

FlickFortune: Extensive Data Analysis and Probabilistic prediction using Data

mining Approach S RANISHREE, SANDEEP.S,

Mrs. S. Divya

35

34.

CS050

Food Ordering Application using Sentimental

Analysis

K. PRIYA, Y.PRIYA,V.RAHANA,

Mrs.V.BlessySelvapriya

36

35.

CS052

Identifying Fake Applications and Ranking in Google Play Store and

Optimization of Genuine Applications V. RAHANA, S.PREETHI,

Mrs.R.Lavanya

37

36.

CS054

Preserveloc: Preserving the Location and Seamless Data Distribution in Mobile Environment

C.RINNA, SAGAYA CHITHIRAI RANJITH, Mr.A.Gnanasekaran

38

37.

CS055

Prognosticating the Stress Values While Driving using

IoT

S.RAJKUMAR,S.RANISHREE

Ms.S.Deepika

39

38.

CS057

Provides Security in Cloud using Multi-Cloud and

Slicing Algorithm

E. SANGEETHA,K.POONGUZHALI,

Mr.P.Muthazhagan

40

39.

CS059

Providing Restrictions Against Attack and Congestion Control in Public

Infrastructure Cloud POWNRAJ A,J.PRADEEP,

Mrs. M.Vidhya

41

Page 9: KINGS ENGINEERING COLLEGE

40.

CS061

Real Time Junk Observation and Characteristic

Analysis in Twitter

M.PRADEEP KUMAR,A.PREETHI DIVYA,

Ms.V.Sangeetha

42

41.

CS063

Recommender System for Research Studies Using Graph Based Article Ranking

S.RAJKUMAR,S.RANISHREE,

Ms.S.Deepika

43

42.

CS065

The future technology of smart shopping cart using rfid

and zigbee

M.arumugakani,s.arunmozhi,mrs.v.sangeetha

44

43.

CS066

Evaluating Disease from Several Medical Data by using

HL7

M.CHITHRA DEVI,S.CHRISH

STEWART,Mrs.V.BlessySelvapriya

45

44.

CS068

Creating Secure Clouds By Continuous Auditing And

Providing Certificates

R.DAVID SAM PAUL,V.DEVI,Ms.C.Sumithra

46

45.

CS069

Pioneering Multiple Genomic and proteomic data

Using Mirna and Transcription factor for Gene Disease

Spotting

G.DHANA SUNDAR,S.EBENEZER,Mrs.M.Sujatha

47

46.

CS071

A SECURE CLOUD – BASED WEB APPLICATION

AGAINST POLLUTION ATTACK AND

CONVINCING FILE TECHNIQUES

48

47.

CS073

AN ANALYSIS OF SECURITY ISSUES AND

NATURE-INSPIRED ALGORITHMS ON

WIRELESS SENSOR NETWORKS INTEGRATED

WITH IOT E+++++++++++++++++NVIRONMENT

M. S. Vinmathi, Dr. M. S. Josephine, Dr. V.

49

Page 10: KINGS ENGINEERING COLLEGE

Jeyabalaraja

48.

CS074

A Bluetooth-based Architecture for Android

Communication with an Articulated Robot

[1]Dr.M.Deva Brinda, [2]Karthik.S,[3]Iyappan.S

50

49.

CS075

DISASTER MANAGEMENT SYSTEM USING

INTELLIGENT UNDERWATER ROBOT

Sasikala D, Rajalakshmi V, Jayabhaduri R

51

50.

CS077

DEVELOPMENT OF AUTOMATED RUBBER

TAPPING MACHINE TO IMPROVE THE SOCIO-

ECONOMIC STATUS OF RUBBER GROWERS IN

RURAL AREAS

1Aran Glenn .J, 2Adeline Sneha.J, 3Neenu .C

52

51.

CS079

HOME AUTOMATION SYSTEMS USING SPEECH

RECOGNITION

V. Lokesh, R. K. Padmashini

53

52.

IT001

Secure Data Dissemination and Management in

Mobile Cloud Computing

R.AISHWARYA,S.AJAY,

Mr.N.Venkateshwara Rao

56

53.

IT003 Security Based System using Mobile Application

P.AKILA SOWMIYA,M.ALLEN MANASSEH,

Mrs.Indumathi K

57

54.

IT004

Semantic Localization & Mapping for Unsupervised

Indoor Localization

S.ANGAYARKANI,S.S.ANGELIN GOLDA

MARY,Ms.J.Jinu sophia

58

55.

IT005

Service cloud communication using encryption

standards

A.ANISHA,S.ARUL,

Mrs.S.Gracia Nissi

59

56.

IT007

Trusted Cloud Authority Controlled by Federated

Clouds

ASHA DARLY,G.ASHISH SAM

Mr.S.Vinoth

60

57.

IT008

VANET Security Using New Greedy Behavior

Approach

D.BAGHYA,L.BALAJI

Mrs.M.Parameswari

61

Page 11: KINGS ENGINEERING COLLEGE

58.

IT009

Software Fault Prediction Models by Optimizing the

Rank Based Approach

Mr.P.Muthazhagan

V.ESTHER SOPHIA,N.EZHILARASI

62

59.

IT011

IOT SMART MIRROR WITH NEWS AND

TEMPERATURE

SOWBHAGIYA S,SREE DURGAREEMA

A,Mrs.E.Sujatha

63

60. IT013

ATM MACHINE WITH BIOMETRIC SECURITY

SRIDEVI M,SRIVIGNESH B,Mrs.T.C.Vidhya

64

61.

IT015

WELD POOL VISUAL TRACKING IN

AUTOMATIC ARC WELDING USING GRAPH CUT

SEGMENTATION

STEFFI M,SUBBAYA AYYANESH

SUDALAIMANI,Ms.T.Anitha Dorathy

65

62.

IT016

SMART GARBAGE SYSTEM USING IOT

SUBHASINI D,P.SURESH KRISHNAN,Ms.L.Leena

Jenifer

66

63.

IT017

ENERGY EFFICIENT MOBILE TOWER CONTROL

SYSTEM

– GREEN RADIO TECHNOLOGY

SURYA K,SUSITHRA NIRAIMATHI K,Mrs.Sheela

Lavanya

67

64.

IT018

THE NS2-BASED SIMULATION AND RESEARCH

ON WIRELESS SENSOR NETWORK ROUTE

PROTOCOL

THARIGA V,THASLIM S,Ms.S.Thangam

68

65. IT019

FINGERPRINT RECOGNITION TECHNIQUE

THEBORAL S,THULASI M S,Ms.Beulah Elizabeth E

69

66. IT020 VISIBILITY RESTORATION OF HAZY IMAGES 70

Page 12: KINGS ENGINEERING COLLEGE

USING COLOUR ANALYSIS AND DEPTH

ESTIMATION WITH ENHANCED REFINED

TRANSMISSION

TWINKLIN GRACIA V,UDAYAMMAL@ USHA

L,Ms.Enuice Freeda

67. IT021

SMART GARBAGE SYSTEM USING IOT

VICKEY,K.YOGESH,Ms.P.Nancy

71

68.

IT022

POWER EXALTING VERSATILE BOT

PAUL CHANDARAN.S,K.RAMKI,Mrs. G.

Priyadharshini Lovelin

72

69.

IT024

MACHINE LEIUTANANT FOR VISUALLY

IMPAIRED PEOPLE

ANUPRIYA M,AVINASH K, Mrs.V.Sharmila

73

70.

IT025

PERFORMANCE ANALYSIS OF COMPRESSED

SENSING BASED IMAGE SENSOR FOR SMART

SURVEILLANCE APPLICATIONS

Karthickmanoj.R; Balamurugan

74

71.

IT028

ENERGY AWARE LINK LIFETIME ROUTING IN

WSN

Dr.T.Sasilatha

75

72.

IT030

FULLY AUTOMATED SMART RESTAURANT

Naveenkumar.N.S, Mohamed Nizar.T,

,sheefa.I,vinitha.T

76

73.

IT031

A COMPREHENSIVE REVIEW ON COLOR

CONSTANCY TECHNIQUES

Samreen Kaur¹, Dr. V.K. Banga², Er. Gurjit Singh

77

74.

IT035

NOISE REDUCTION IN GRAYSCALE IMAGES

USING SEGMENTATION TECHNIQUES

Amudha K1, Beni Steena T2

78

75.

EC001

Digital Audio Watermarking – Using LSB Method

ABU HANIFA L,ALAN BENJAMIN P,

Dr.A.V.Mayakannan

81

76. EC003 Invisible Image Watermarking using Modified LSB

ALAN JOSEPH MOSSES.D,ANGEL A,

82

Page 13: KINGS ENGINEERING COLLEGE

Mr.S.Rajkumar

77.

EC004

Maximizing Throughput Of Cognitive Radio Networks Through SecondaryUser Power

Consumption In 5g Heterogeneous Networks ANGELINE A,ARAVINTHASAMY S,

Mrs.A.R.Venmathi

83

78.

EC005

Stateless Auto Configuration And Secured Data Transmission In Ipv6 Networks Through Ipsec

Tunneling ARUNA DEVI R,AVINASH K

Mrs.B.Anitha Vijayalakshmi

84

79.

EC007

Automatic Quality Assessment Of Potatoes Using

Labview

BARATH K,M.BARATH

Mrs.V.Kavitha

85

80.

EC008 Metal Segregation Using Labview

BLESSY P J,BLESSYTA JULIYA SARAH R,

Mr.A.N.Duraivel

86

81.

EC009 Smart Surveillance Robot Using Labview

BLESY REGULAS B,R.CHANDRASEKAR

Mrs.A.Sumathi

87

82.

EC011 Water Management System Using Labview

DANIEL MICHAEL,DENIYA N J

Mrs.A.Sarala

88

83.

EC013

Multifactor Authentication For Secure Electronic

Balloting Credentials

DINESH R,M.J.ELGIN SAM DURAI

Mrs.M.Vinu

89

84.

EC015

Neuro-Ocr Based Assistive System For Text

Recognition With Voiceoutput

ESTHER CHELIN S J,GOLD MERCY S,

Mrs.K.K.Uthira Ramya Bala

90

85.

EC016 Based On Tumor Classification By Using Pnn Method

GOMATHI C,HANNAH MERCY GEORGE

Mrs.A.Aruna

91

86.

EC017

REAL TIME MPC FOR NON LINEAR PROCESS

PARAMETERS

HARISH N,HEMALATHA

I,Mr.P.MuthuKumaraswamy

92

87. EC018 Detection Of Parkinson’s Disease In Early Stages

HEMALATHA R,INDRA PRIYADARSHINI

93

Page 14: KINGS ENGINEERING COLLEGE

Mrs.V.G.S.Archana

88.

EC019 Secret Knock Detecting Door Lock

IYANGKANI R,JANCY RANI A

Ms.M.Gomathi

94

89.

EC020 Classification Of Skin Lesion Using Neural Network

JANIVISHVA V,JEYA RANI E

Mr.S.Muthupandian

95

90.

EC021 Optical Character Recognition And Speechsynthesis

JEBEZSON G,E.JEEVA

Mrs.B.Gowripredeba

96

91.

EC022 Design Of Photonic Based Millimeter Wave Switch

JOYCE KAMALI D,KAMATCHI A

Mrs.S.Sharon Sweeti

97

92.

EC024

Water Quality Monitoring System

KASANKATHAPERUMAL

K.MAHENDRAKUMA G

Mrs.R.Rosemin Thanga Joy

98

93.

EC025

Seed Purity Testing With The Help Of Digital Image

Processing

MEENA T,MERLIN SWEETHA VINOLA

Ms.C.V.Umamaheshwari

99

94.

EC028

Joint Turbo Decoding For Overloaded Mimo-Ofdm

System

MONISHA R,NADAR MUTHUSELVAN

Mr.S.Suthagar

100

95.

EC030

Multiband Circularly Polarized Antenna For Wireless

Application

NADAR SREEJITH PRABU,NALINI K

Mrs.M.Parameswari

101

96.

EC031 Fault Tolerence Technique Using Cmos Vlsi Circuits

NARAYANA KUMERESAN Y,NARESH M

Mr.R.Nagaraj

102

97.

EC035

Transparent And Flexible Antennas For Wearable

Glasses And Applications

NARMATHA B,PAVITHRA S

Mrs.E.Vergin Sheeba

103

98.

EC036

Iot(Internet Of Things) Based Online Energy

Monitoring System And Control

PRAKASH J,PRAVEENRAJ J

Mr.S. Rajkumar

104

99. EC037 Green Radio Approach Towards Energy Efficient Radio Access networksFormobile Communication

105

Page 15: KINGS ENGINEERING COLLEGE

POONGUZHALI D,PRABAKARAN A

Mrs.L.Ajitha

100.

EC039

Compact Frequency Reconfigurable 4x4 Slot Antenna For Wireless Application

ARAVINDH K,ANUSHA T

Mr.P.Muthukumaraswamy

106

101.

EC040 Gsm Based Voice Data Through Bone Conduction

ARJUN S,PRIYA R

Mr.S.Rajkumar

107

102.

EC042

Detecting Driver Drowsiness Based On Single Eeg

Channel

SUNDAR R,SURYA S

Mr.A.N.Duraivel

108

103.

EC043 Novel Broadband Antenna Design For Rfid Tags

RAJA S,RAM K

Mrs.A.Sumathi

109

104.

EC045

Cost Efficient Iot Based Home Automation With

Security

ANITHA M,DANIYA T

Mrs.A.R.Venmathi

110

105.

EC047

Integration Of Automatic Street Light And Water Levelmonitoring For Smart City

RACHEL A,REVATHI M

Mrs.A.Aruna

111

106.

EC048

Motion Controlled Robot Using Multi Sensors

Powered By Ai Engine

RITHIKA J,RAVI KUMAR K

Ms.M.Gomathi

112

107.

EC049

Design Of A Quad Band-Notched Uwb

Reconfigurable Patch Antenna

DARANI M,KALAIMATHI P

Mrs.E.Vergin Sheeba

113

108.

EC050

Anti Theft Protection Of Vehicle By Gsm &Gps With Fingerprint verification Using Embedded System

AJITHA A,JUSTINA E

Mrs.A.Rublin Beulah

114

109.

EC052

Sensorless Control of interior Permanent Magnet

Synchronous Motor Drives With Cyclic Fluctuating

Load Based on MRAS Scheme

M.BARATH,R.THIRUMARAN,Mr.S.Muthupandian

115

110. EC054 Virtual Instruments Based Water Quality Measurement 116

Page 16: KINGS ENGINEERING COLLEGE

System Using Fuzzy Logic

V.NARAYANA VADIVU,K.JEEVA

RANI,Mr.R.Nagaraj

111.

EC055

Artificial neural network based intelligent flow

transmitter

MATHANA THAMARAI

P,A.RISHWANA,Mr.S.Suthagar

117

112.

EC057

CROSS CHANNEL HEARING AID USING BONE

CONDUCTION

J.BALA KARTHICK,S.SIVA,Mr.S.Rajkumar

118

113.

EC059

DETECTION AND DELETING THE MISUSE OF

MORPHED IMAGES IN SOCIAL NETWORKS

USING FSIB ALGORITHM

S.ANAND,M.SIVA SANGEETHA,Mrs.A.R.Venmathi

119

114.

EC061

SMART HELMET USING GPS AND GSM FOR

ACCIDENT DETECTION

P.SUGANTHI,M.ANITHA,Mrs.V.Kavitha

120

115. EC063

HIGH SECURITY LOCKER

AMRITHA K,ARJITH C,Mr.A.N.Duraivel

121

116.

EC065

Environmental monitoring using wireless sensor

networks (wsn) based on iot.

Dilmaya t,maya s,mrs.a.sarala

122

117.

EC066

IOT THEFT DETECTION USING RASPBERRY PI

WITH FACE RECOGNISATION CAMERA

JEYA MANI R,JOTHI S,Mr.S.Muthupandian

123

118.

EC068

SECURE IDENTITY BASED DIGITAL

SIGNATURE SCHEME FOR WIRELESS SENSOR

NETWORKS

ELANGO T,ANBU R,Mrs.E.Vergin Sheeba

124

119. EC069 PRECODER DESIGN FOR MIMO RELAY

125

Page 17: KINGS ENGINEERING COLLEGE

COMMUNICATION USING DF PROTOCOL

T.ARUN,CHIRSTY.S,Ms.C.V.Umamaheshwari

120.

EC071

CT AND PET MEDICAL IMAGE FUSION USING

WAVELET TRANSFORM RESTORED BY

ITERATIVE WIENER FILTER

THULASI T,RAMYA K,Mrs.S.Sharon Sweeti

126

121.

EC073

AN IOT APPLICATION FOR STOCK

MANAGEMENT AND GOODS ANALYSIS

JULIA K,SHERIN S,Mrs.R.Rosemin Thanga Joy

127

122.

EC074

IMPLEMENTATION OF IMAGE FEEDING AND

FACE RECOGNITION USING OPENCV IN

ROBOTICS

JESICA S,EDWART P,Mrs.L.Ajitha

128

123.

EC075

UNDERWATER IMAGE ENHANCEMENT USING

EMD

J GRACY,C.A. HUMSARUBINI,Mr.R.Devara

129

124.

EC077

REAL TIME OPERATING SYSTEM FOR THE

PREVENTION OF HUMAN HEALTH HAZARDS

DUE TO TOXIC GASES

A. INDUZA,JANANI.M,Mrs.R.Usha

130

125.

EC079

SENSOR BASED AUTOMATED IRRIGATION

SYSTEM

G.JENIFER SWEETY,P. JERIN,Mrs.T.Meena

131

126.

EC080

PERFORMANCE ANALYSIS OF SEPIC AND M-

SEPIC ON BLDC MOTOR

S. JEYANTHKUMAR,JOSEPH

MATHEW,Mr.R.Senthilnadhan

132

127.

EC083

SMART CURRENT THEFT DETECTION AND

POWER DISCONTINUITY MONITORING USING

LabVIEW

133

Page 18: KINGS ENGINEERING COLLEGE

JOTHI PRIYA.K,JUDSON

ABRAHAM,Mrs.S.Lekhasri

128.

EC085

A MODERN USER DESIRED DRONE

CONTROLLING SYSTEM

USING MOTION DETECTION SENSOR

M. Karthik,m. Karthika,mr.s.rajkumar

134

129.

EC086

EMERGENCY CAR DOOR LOCKING SYSTEM

USINGRASPBERRY PI

A.UDHUMAN SHARIFF,V. VARSHA,Mrs.S.Sharon

Sweeti

135

130.

EC087

Design and Fabrication of Multifuel Engine

THIRUNAVUKARASU.K,L TANYA,Mr.S.Suthagar

136

131.

EC089

INVESTIGATION ON WEAR AND MECHANICAL

ANALYSIS OF WOVEN SISAL, JUTE, FLAX /

REINFORCED WITH CALCIUM CARBONATE AS

FILLER EPOXY COMPOSITE

Suganya.N,Mstephen Raphel.Jrs.A.Rublin Beulah

137

132.

EC090

EVOLUTION OF MECHANICAL PROPERTY OF

WOVEN HEMP / FLAX REINFORCED WITH

BARIUM SULPHATE AS AN FILLER EPOXY

COMPOSITE

S. P. SRIRAM,SOWMYA DHARINI,Mr.R.Nagaraj

138

133.

EC092

DESIGN AND FABRICATION OF MANUALLY

OPERATED PESTICIDES SPRAYER.

P.s. Smruthi,k.sivasankari,mrs.l.ajitha

139

134.

EC094 Bi Directional Centrifugal Braking System

A.Anisha Priya,S.Anudev,Mr.A.L.Duraivel

140

135. EC095 ACCURATE CERVICAL CELL SEPERATION

141

Page 19: KINGS ENGINEERING COLLEGE

FROM OVERLAPPING CLUSTER IN PAP SMEAR

IMAGES

VEDHA PRIYA H,G.

VETRIVEL,Mr.Dr.A.V.Mayakannan

136.

EC096

RECENT DEVELOPMENTS IN COMPUTER

VISION-BASED GAIT BIOMETRICS SYSTEM

G Merlin Linda1, G Themozhi2

142

137.

EC098

A ROBOTIC MOTION CONTROL USING FINGER

GESTURE INTERACTION

Dr.M.Deva Brinda, Karthik.S, Mohankumar.S

143

138.

EC099

DESIGN AND IMPLEMENTATION OF SMART

BONE CONDUCTION HEARING AID USING ASP

Dr.M.Deva Brinda, Karthik.s

144

139.

EC110

ANALYSIS OF LEATHER TEXTURE AND

DETECTION OF SEVERITY OF DEFECTS USING

IMAGE PROCESSING AND DECISION TREE

BASED MACHINE LEARNING TECHNIQUES

Abdul Jaleel,Joy Mathew,Mohamed Feroz, Sabura

Banu

145

140. EC113

VERSATILE INSOLE MONITORING SYSTEM

Dr. Gnana Kousalya

146

141.

EC114

OFDM BASED COMB SOURCE FOR FUTURE

OPTICAL NETWORKS

M.SAMAYARAJ MURALI KISHANLAL,

DR.A.JAWAHAR

147

142.

ME001

SAFETY AND SECURITY DRIVING USING GSM

MODEM

BAVANI R,ESSAKI L,Mr.T.Kanagaraju

150

143.

ME003

EFFICIENT ALAMOUTI STBC ALGORITHM FOR

MIMO- MULTI CARRIER MODULATION

TECHNIQUES

CAMILA JOHN,SWETHA T,Mrs.K.Chinadurai 151

144. ME004

LANDMINE DETECTION ROBOT

RAMAYAVATHANA V,RANJITHA 152

Page 20: KINGS ENGINEERING COLLEGE

D,Mr.E.Artaralarasan

145.

ME005

IOT BASED FARMHAND BOT

SIVA

SUBRAMANIAN,K.VINOTHKUMAR,Mr.R.Jeremiah 153

146.

ME007

SECURE ROUTING AGAINST ACTIVE ATTACKS

IN WIRELESS SENSOR NETWORKS

NAVITHA

VELVET,P.NIRANCHANA,Mr.K.chinadurai 154

147.

ME008

PULSE WIDTH MODULATION BASED

ELECTROMAGNETIC INTERFERENCE

MITIGATION OF BIDIRECTIONAL GRID

CONNECTED FOR ELECTRICAL VEHICLES

A Kavipriyan,S.Keerthana,Mr.V.Ganesh 155

148.

ME009

SOLAR FED QUASI SWITCHED BUCK BOOST

SIWAKOTI-H INVERTER

K VIGNESH,K. VINEETHA,Mr.T.Kangaraju 156

149.

ME011

ARTIFICIAL NEURAL NETWORK FOR CONTROL

AND GRID INTEGRATION OF RESIDENTIAL

SOLAR PHOTOVOLTAIC SYSTEMS

Asha Imannuvel J,Raveena K,Mr.T.Ranjith Kumar 157

150.

ME013

SOLAR PV POWERED BLDC MOTOR DRIVE FOR

WATER PUMPING USING CUK CONVERTER

Camila John,Swetha T,Mrs.E.Artralarasan 158

151.

ME015

AUTOMATIC LOAD FREQUENCY CONTROL OF

MULTI- AREA POWER SYSTEM USING SOFT

COMPUTING TECHNIQUES.

I.Elizabeth,M.Janet Lisa,Mr.R.Jeremiah

159

152. ME016

POWER QUALITY IMPROVEMENT IN MICRO

GRID USING UPFC 160

Page 21: KINGS ENGINEERING COLLEGE

SAVITHA S,SANKKARI R,Mr.P.Manigandan

153.

ME017

A HYBRID RESONANT CONVERTER FOR

BETTER VOLTAGE REGULATION FOR

PHOTOVOLTAIC APPLICATIONS

SABEENA J,SHALINI R,Mr.V,Ganesh 161

154.

ME018

DESIGN AND ANALYSIS OF A HIGH VOLTAGE-

GAINSTEP- UP RESONANT DC-DC CONVERTER

FOR TRANSPORTATION APPLICATIONS

KAVITHA V S,KARAN J,Mr.J.Dinakaran

162

155.

ME019

MPPT IN DYNAMIC CONDITION OF PARTIALLY

SHADED PV SYSTEM BY USING WODE

TECHNIQUE

SELENA T,ANISH N,Mr.Santhoshkumar 163

156.

ME020

CONTROL OF GENERATION, STORAGE AND

ENERGY DEMAND MANAGEMENT IN

ISLANDED MICRO-GRIDS

P.UMA,K.ABINAYA,Mr.J.D.Srinivasan 164

157.

ME021

Power Line Fault Detection And Localization Using

High Frequency

M.Rinosha,S.Arulmani,Mr.S.HanishAnand 165

158.

ME022 AUTONOMOUS INTELLIGENT BOT-MOWER

Daniel Michael,Priya V,Mr.T.Ranjith Kumar 166

159.

ME024

ACCELEROMETER BASED WIRELESS HAND

GESTURE CONTROLLING ROBOT

Priyanga S,D.Rajkumar,Mr.Dr.Muniaraj 167

160.

ME025

SNIFFER FOR MOBILE PHONES

MANI MANTHIRAM.S,S MARIA

Praveen,Mr.J.Dhinakaran 168

Page 22: KINGS ENGINEERING COLLEGE

161. ME028

WIRELESS THREE TANK SYSTEM

P mugilan,p. Muthumanian ,Mr.P.Manikandan 169

162.

ME030

INTERNET OF THINGS BASED REAL TIME

TRANSFORMER PERFORMANCE MONITORING

SYSTEM

Mythili,M.Nanda Gopal,Mr.E.Artalarasan 170

163.

ME031

DESIGN AND ANALYSIS OF 400/110 KV

ELECTRICAL SUBSTATION BASED ON LOAD

FLOW ANALYSIS USING ETAP

S. Nithila,M Padmapriyadarsini,Mr.R.Jeremiahlleg

171

164.

ME035

A UNIFIED CONTROL AND POWER

MANAGEMENT SCHEME FOR PV-BATTERY-

BASED HYBRID MICROGRIDS FOR BOTH GRID-

CONNECTED AND ISLANDED MODES

P. Vinitha ramalakshmi,t. Vinothini,Mr.Hanish

172

165.

ME036

DESIGN AND EXPERIMENT OF ADVANCED

MULTI MODE PROPELLED VEHICLE TO

ENHANCE MAXIMUM EFFICIENCY

M.Anuratha,K.Srivashan,Dr.Muniaraj (P)

173

166.

ME037

EXPERIMENTAL ANALYSIS AND

INVESTIGATION ON POLYMER COMPOSITE

LEAF SPRING

M.Kavitha Roselin,Y.Lavanya,Ms.R.Bavani Sekar

174

167.

ME039

TRIBOLOGICAL AND MORPHOLOGICAL

STUDIES OF ALUMINIUM BASED NANO

COMPOSITES

W.Kanmani,P.Karthikeyan,Mr.P.Ravisasthiri

175

168.

ME040 DESIGN AND FABRICATION OF MILLING

ATTACHMENT IN LATHE

176

Page 23: KINGS ENGINEERING COLLEGE

R.Susan,K.Suhasini,Mr.J.Kokila

169.

ME042

DESIGN AND FABRICATION OF AUTOMATED

GUIDED VEHICLE SYSTEM

L.Susithra,N.Janes,Mr.A.Austin Segal

177`

170.

ME043

MECHANICAL PROPERTIES OF CONCRETE

WITH REPLACED C&D FINE AGGREGATE

USING SILICA FUME AS AN ADMIXTURE

M.Malaiappan Sindhu, B.Magesh

178

171.

ME045

DESIGN AND ANALYSIS OF TECH PARK (G+10)

BUILDING

Atulkumar Singh, Ankit Pandey, P.M.Rameshwaran

179

172.

ME047

USAGE OF MANUFACTURED SAND (M SAND)

AS FINE AGGREGATE FOR CONCRETE IN LIEU

OF RIVER SAND.

A.Shanmugam, P.M.Rameshwaran

180

173.

ME048

SIMPLE MODEL OF GRAPHITE AND ITS

APPLICATIONS IN SUPERLATTICE

K.Anand, P.M.Rameshwaran

181

174.

ME049

INTEGRATING BEM, BIM, VR FOR VISUALIZING

LIGHT IN A BUILDING AND ENERGY EFFICIENT

MODELLING

L.Divya

182

175.

ME050

REVIEW ON PARTIAL REPLACEMENT OF FINE

AGGREGATE BY COPPER SLAG, E-WASTE AND

M-SAND

183

Page 24: KINGS ENGINEERING COLLEGE

S.Yamini Roja, A.Anusuya, SP.Keerthana,

S.Lakshmanan & C.Prakash

176.

ME052

ONSITE VISUALISATION INTEGRATED WITH

BUILDING INFORMATION MODELLING IN

MIXED REALITY

S.Reji

184

177.

ME054

Dynamic analysis of a composite tall structure using

Etabs software

S.Ahmed Hussain and G.Nithyambigai

185

178.

ME055

Study on Design And Analysis Of Raft Foundation By

RCC And Pt Methods And The Optimizations

Achieved

A.Aswini

186

179.

ME057

ANALYSIS AND DESIGN OF MASS LIQUID

STORAGE TANK SUPPORTING STRUCTURE

G.Arumugam

187

180.

ME059

EFFECT OF EARLY CARBONATION ON

DURABILITY PERFORMANCE OF CONCRETE.

D Ravichandran

188

181.

ME061

ANALYSIS AND DESIGN OF QUENCHING

TOWER

N. Gopinath

189

182.

ME063

MICRO STRUCTURAL STUDY AND STRENGTH

CHARACTERISTIC OF ACCELERATED

CARBONATION CURING OF CEMENT MORTAR

M Kamalakannan

190

Page 25: KINGS ENGINEERING COLLEGE

183.

ME065

Analysis and Design of INTZE Type over Head

Circular Water Tank

S.Magesh

191

184.

ME066

DYNAMIC ANALYSIS AND DESIGN OF RCC

CUMS STEEL STRUCTURE IN INDUSTRIAL

BUILDING USING SRSS METHOD

S. Moses Vimal Raj

192

185.

ME068 Pushover analysis and design of RCC structures

R.Saravanan

193

Page 26: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 1

DEPARTMENT

OF

COMPUTER SCIENCE AND ENGINEERING

Page 27: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 2

Page 28: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 3

Grapheme Based Text-Independent Writer Identification

Allen Jerem Vincent, S. Anantha Ponraj, Mrs. S. Divya

KINGS ENGINEERING COLLEGE

Abstract—Writer identification as a biometric tool, which has become a successful

state of art in research. It is challengeable due to different writing styles and variances

of written content. The literature survey phase of this study has covered various

databases and dataset types used for writer identification approaches along with many

feature extraction and classification methodologies. Finally, it guides through a

proposed experimental approach for offline grapheme-based text independent

writeridentification.

Keywords— writer identification; probability distribution; feature extraction;

classification; graphemes; offline document.

Page 29: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 4

Knowledge Based Access Control in E-learning Through Learner Activity

Analysis

Asha Albert, Angel Karunya.M,Mrs.R.Lavanya

KINGS ENGINEERING COLLEGE

Abstract: Reshaping education with knowledge and skills is the major objective of

many of the developing organization to build competitive knowledge economy.

Electronic learning, also popularly known as e- learning is one of the most effective

applications of Information and Communication Technology (ICT), which refurbishes

the dimension in higher education. Existing E-learning system provides static content

to all learners irrespective of their learning needs. In this paper we propose to create

Dynamic Role based access control model based on information from learners needs,

audit logs and observations to support adaptive E-learning systems.

Keywords: E-Learning, Dynamic Role Based Access Control.

Page 30: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 5

Selfie Prevention and Accident Avoidance Android System

A. Ananth, K. Balaji,Mr.D.R.Denslinbrabin(A)

KINGS ENGINEERING COLLEGE

Abstract: In the recent years selfie culture has developed as a universal instrument for

self-portrayal. People to describe themselves differently and gorgeous to others,

individuals may risk their life as dangerous. However, over the past years clicking and

posting selfie in social media like Facebook and Twitter etc. has become more popular

tendency. Here we analysed that major accidents are occurring because of taking selfie

in dangerous places such as hill areas, during bike riding and railway stations. Here we

proposed the android applications that stop the initiation of front camera in dangerous

places. Still there is no application developed to stop the camera in dangerous places.

People approached some road bumps and were not able to handle them with just one

hand so riders crashed to ground. For trace out people location we proposed GPS

sensor.So,usageofmobilephonesduringriddingwillcausedangerous.DuringwalkingifVehi

cleHorniscaptured immediately Camera is initiated and background Vehicle photo is

captured & shown to the user to get alerted along with Headphone Alert. Here we using

microphone to capture the horn sound and converted into electrical signal. By

developing this application major accidents are avoided and provide the security to the

peoples.

Keywords: GPS, Android, Facebook and Twitter.

Page 31: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 6

Secret Questions: Phone Theft Detection and Prevention of Important Apps

Access

Asha.M, J. Beulah, Mr.C.B.Chiranjeevi

KINGS ENGINEERING COLLEGE

Abstract – The various methods are provided to secure or lock the mobile using user

authentication. User can add multiple apps into application for the secured access.

During registration period, application will frame a set of standard questions along with

the user runtime verifications. In general the phone is stolen, there is two options,

either to change the SIM card or to retain the same SIM card and try to access the apps.

If SIM Card is changed then automatically GPS, Voice recorder & Camera are

initiated, so that Location and Audio uplink are sent as SMS to the alternative number

of the user, and Photo is mailed. If he tries to access the secret apps then system will

query the user with 4 random questions (2 – from normal questions and 2 from user

runtime pattern. If not authorized then camera, GPS & Voice recorder is initiated and

sent to the original user fortracking.

Keywords: Authentication, SIM, GPS, GPRS, Location Tracking, Audio uplink, SMS,

Runtime pattern, Track.

Page 32: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 7

Brain Controlled Car for Disabled using Artificial Intelligence

K.Anandhi, C. Bavithra Karthi, Mr K.G. Saravanan

KINGS ENGINEERING COLLEGE

Abstract - This paper considers the advancement of a cerebrum driven cars, be of

incredible help to the physically handicapped individuals. Since these cars will depend

just on what the individual is supposing they will consequently not require any physical

development with respect to the person. The cars incorporates progress of innovation

which will make the crippled, abled. In the 50s, various specialists investigated the

association between neurology, data hypothesis, and computer science. Some of them

electronic systems to show simple knowledge, for example, W. Grey Walter's turtles

and the Johns Hopkins Beast. Most specialists trust that their work will in the end be

fused into a machine with general knowledge (known as solid AI), joining every one of

the aptitudes above and surpassing human capacities at most or every one of them. A

couple of them trust that human highlights like simulated cognizance or a counterfeit

cerebrum might be required for such a task. By this we should witness a progressive

change in the general public where the boundary between the abler and the impaired

vanishes. Along these lines the reconciliation of bioelectronics with car frameworks is

basic to create productive and cutting edge vehicles, which should be seen soon helping

the handicapped in each way in the field of transportation.

Keywords: knowledge, Bioelectronics, cerebrum.

Page 33: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 8

Integrated Verification of Relay Generated Node Key &User Based Mutual with

ErasureConcepts

R.D. Bhagyashree, S. Deepika, N.L.Aswani, Mr.A.Gnanasekaran

KINGS ENGINEERING COLLEGE

Abstract- The present protocols for creating pairwise secrets between nodes in a

wireless network, so that these secrets are secure from an eavesdropper, Eve, with

unbounded computational and memory capabilities, but with limited network presence.

The first present a basic secret-agreement protocol for single-hop networks, where

secrets are constructed using traffic exchanged between the nodes, and we show that

under standard theoretical assumptions, our protocol is information-theoretically

secure. Second, propose a secret- agreement protocol for arbitrary, multi-hop networks

that build on the basic protocol but also comprises design features for leveraging

additional sources, that multi-hop offers, for secrecy. Finally, evaluate our protocols,

and provide experimental evidence that it is feasible to create thousands of secret bits

per second, in realistic wireless setups, the security of which is independent of Eve‘s

computationalcapabilities.

Keywords- Secret key generation, packet erasures, multi-hop key agreement, wireless

networks.

Page 34: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 9

Identify Effective Self-Routing System in Wireless Environment

Asik.P, D. Delin Winciya, Mrs. D.Sterlin Rani

KINGS ENGINEERING COLLEGE

Abstract: The data can be transfer from source to destination to analyze best route in

any network. Source sends dummy packets to analyze the best available route that

connect the destination. It analyses Capacity, Cost, throughput, Battery level to transfer

the packets to the destination. We are implementing this project in Wireless Sensor

network, so the routes would dynamically in mobility pattern. So the system has to

analyze every node‘s Capacity, Cost, Throughput, and Battery level to transfer the

packets source to destination. Server will dynamically route the path so that the packets

are transferred to the destination dynamically. It is based on the nodes dynamic

behaviour Self Routing system is implemented. The data will be send from source to

destination by secured way in real timeprocess.

Keywords- Wireless Sensor network, mobility pattern.

Page 35: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 10

Global Path Planning using GA-PSO Algorithms

B. Bennett Richard, George Stephen.A, Mr K.G. Saravanan

KINGS ENGINEERING COLLEGE

Abstract: Robotic Process automation is the interesting and evolving research area.

The major challenge is finding an optimal path in the presence of real time obstacles.

This paper presents a GA (genetic algorithm)- PSO (particle swarm optimization)

algorithm for autonomous robot navigation to find an optimal path between a starting

and ending point in a grid environment. The routing nodes are represented as grid. GA

has been combined with PSO in evolving new solutions by applying crossover and

mutation operators on solutions constructed by particles. This hybrid algorithm avoids

the premature convergence and time complexity in conventional GA and PSO

algorithms. The initial feasible path generated from the hybrid GA- PSO planner is

then smoothed using the cubic B-spline technique, in order to construct a near-optimal

collision-free continuous path. Simulation results are conducted to show the merit of

the proposed hybrid GA-PSO path planner and smoother for global path planning of

autonomous robotnavigation.

Keywords-PSO,GA,B-spline.

Page 36: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 11

Effective E- Learning Framework

J GRACY, I.JEBAMALAR, Mrs.J.Jaineesharmila

KINGS ENGINEERING COLLEGE

Abstract- E-learning is breaking the barriers of traditional teaching methods by

providing educational content within fingers reach. With its numerous benefits like

flexibility and reduced costs, it is becoming popular as days pass by. But just like any

other classroom, it consists of limited slots and the success of e- learning depends upon

an individual‘s motivation to study effectively. In here many learners enroll in a course

but might not execute it successfully thereby leading to unnecessary registrations. By

understanding a learner’s pattern and using proper classification, we can suggest

suitable courses to a learner thereby suppressing drop rate and incrementing success

rate, all this with just a click. We apply a K- Means algorithm to analyze the different

types oflearners.

Keywords- E-learning, K-Means clustering, analyzing learner behavior, enhanced

learning.

Page 37: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 12

A Case Study on Effective SCADA Systems For Industrial Organizations

C.A. Humsarubini, P. Jerin, Mr.P.Gopi

KINGS ENGINEERING COLLEGE

Abstract – Abbreviation of Supervisory Control And Data Acquisition is SCADA.

From its name only we can say that it is not a complete control system but its focus on

the level of supervisory. The package of SCADA is a software package and is placed

on top of a hardware module and software package gets interfaced with hardware

module. If we explain this in general then it gets to interface with through PLCs i.e.

Programmable Logic Controllers or else it gets interface through any other modules of

hardware. Systems of SCADA are not only availed in the processes of industries like

chemistry, steel making, conventional power generation and distribution, nuclear

power generation and distribution but also used in experiments of nuclear fusion. A

size of these plants varies from few thousand input and output channels to several ten

thousand input and output channels. At present, an evolution of SCADA systems is at a

very high rate and it is also entering the market of plants with a huge number of input

and output channels. SCADA made high progress in expressions like openness,

performance, scalability, functionality. Systems of SCADA are availed to run on

UNIX, VMS, and DOS.

Keywords: Supervisory Control, Data Acquisition, Packages, Programmable Logic

Controllers, Industrial organization.

Page 38: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 13

A FastPicture Retrieval Method Designed for Network BigData

A. Induza, Janani.M, Mrs. D.Sterlin Rani

KINGS ENGINEERING COLLEGE

Abstract—In the field of bigdata applications, Picture in- formation is widely used.

The value density of information utilization in big data is very low, and how to extract

useful information quickly is very important. So we should transform the unstructured

Picture data source into a form that can be analyzed. In this paper, we proposed a fast

Picture retrieval method which designed for big data. First of all, the feature extraction

method is necessary and the feature vectors can be obtained for every Picture. Then, it

is the most important step for us to encode the Picture feature vectors and make them

into database, which can optimize the feature structure. Finally, the corresponding

similarity matching is used to determine the retrieval results. There are three main

contributions for Picture retrieval in this paper. New feature extraction method,

reasonable elements ranking and appropriate distance metric can improve the algorithm

performance. Experiments show that our method has a great improvement in the

effective performance of feature extraction and can also get better search

matchingresults.

Index Terms—Bigdata, Picture retrieval, feature ranking, distance learning.

Page 39: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 14

Attribute-Based Storage Supporting Secure Replication of Encrypted Data in

Cloud

D. Gautham, S. Gilbert Augustin Raj, Mrs. M.Vidhya

KINGS ENGINEERING COLLEGE

Abstract—Attribute-based encryption (ABE) has been broadly utilized as a part of

distributed computing where an information supplier outsources his/her encoded

information to a cloud specialist co-op, and can impart the information to clients

having particular qualifications (or properties). Nonetheless, the standard ABE

framework does not bolster secure Replication, which is pivotal for killing Duplicate

duplicates of indistinguishable information with a specific end goal to spare storage

room and system data transfer capacity. In this paper, we show a quality based

stockpiling framework with secure Replication in a mixture cloud setting, where a

private cloud is in charge of copy recognition and an open cloud deals with the

capacity. Contrasted and the earlier information Replication frameworks, our

framework has two focal points. Right off the bat, it can be utilized to secretly impart

information to clients by indicating access strategies as opposed to sharing

unscrambling keys. Also, it accomplishes the standard idea of semantic security for

information privacy while existing frameworks just accomplish it by characterizing a

weaker security thought. What's more, we set forth an approach to change a ciphertext

more than one access strategy into ciphertexts of the same plaintext however under

different access arrangements without uncovering the fundamentalplaintext.

Keywords: ciphertext, ABE, Cloud.

Page 40: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 15

Efficient Travel Route Recommender System Based on Tourist Personal Interest

P. Jerin, G.Jenifer Sweety, Ms.D.Deepavathi

KINGS ENGINEERING COLLEGE

Abstract—Popular Social Networking websites offer LOCATION-BASED Social

Network (LBSN) services which allows users to perform check-in and share their

check-in data with their friends. When a user is traveling, the check-in data are in fact a

travel route with some photos and tag information. As a result, a massive number of

routes are generated, which play an essential role in many well-established research

areas, such as mobility prediction, urban planning and traffic management. In this

paper, we focus on trip planning and intend to discover travel experiences one would

have. As such, we extend the input of trip planning by exploring possible keywords

issued by users. However, the query results of existing travel route recommendation

services usually rank the routes simply by the popularity or the number of uploads of

routes. For such ranking, the existing work, derive a scoring function, where each route

will have one score according to its features (e.g., the number of Places of Interest, the

popularity of places). Usually, the query results will have similar routes. We aim to

retrieve a greater diversity of routes based on the travel factors considered. As high

scoring routes are often too similar to each other, this work considers the diversity of

results by exploiting Skyline query. In this paper, we develop a Keyword-aware

Representative Travel Route (KRTR) framework to retrieve several recommended

routes where keyword means the personalized requirements that users have for the trip.

The route dataset could be built from the collection of low-sampling check-inrecords.

Keywords: LBSN, KRTR.

Page 41: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 16

Effective Review Mining and Rating

Asha Raja Selvi.A, G Devi, Divya.D, Ms.V.Sangeetha

KINGS ENGINEERING COLLEGE

Abstract- This paper proposes the problem of competitiveness paradigm which is

based on the following observation: the competitiveness between two items is based on

whether they compete for the attention and business of the same groups of customers

(i.e. the same market segments). For example, two restaurants that exist in different

countries are obviously not competitive, since there is no overlap between their target

groups. In order to overcome this, we describe a method for computing all the

segments in a given market based on mining large review datasets. This method allows

us to operationalize our definition of competitiveness and address the problem of

finding the top-k competitors of an item in any given market. As we show in our work,

this problem presents significant computational challenges, especially in the presence

of large datasets with hundreds or thousands of items, such as those that are often

found in mainstream domains. We address these challenges via a highly scalable

framework for top-k computation, including an efficient evaluation algorithm and an

appropriateindex.

Keywords – competitiveness, comparing top – k competitors, machine learning,

evaluation process, review ratings.

Page 42: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 17

Improving the Efficiency of Recommendation System Using Big Data Analytics

Framework

K. Graceline Jebila, Y.V. Jeneeth Laramr.S.Vinoth

KINGS ENGINEERING COLLEGE

Abstract: In the computerization era, the predominant part of Recommender Systems

(RS) focus on single domain, i.e. for films, books and shopping and so on. E-commerce

is the most excellent solution for them to save their time and making their job comfort

and ease. Many recommendation systems rely on data mining; that is, attempting to

discover useful patterns in large data sets. Since there are large number of users and

items, recommendation system undergoes scalability problem. To handle this Big Data

Analytics is used. Big data refers to datasets that are not only big with high volume, but

also high in variety and velocity, known as (3V) of big data, which makes them

difficult to handle using conventional tools and approaches. Hadoop is used to handle

this issue. The main objective is to provide better efficiency of the recommendation

system in a website that is used for shopping any kind of needs by the user. In this

paper, we examine the importance of providing recommendation in the domains where

no satisfactory data exist for measuring similarity between products or users. For the

efficiency of searching large databases in Big Data, the proposed system uses the

characterization and polarity checking. Once both are analyzed, they are then brought

together to give out the outstanding product from the list of suggestedproducts.

Keywords: Recommendation System, Hadoop, Polarity checking.

Page 43: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 18

DETECTION OF MOISTURE CONTENT USING SENSORS FOR SMART

IRRIGATION

M. Karthik, S Maria Praveen, Mrs.V.Blessyselvapriya

KINGS ENGINEERING COLLEGE

Abstract: Smart irrigation is a system which can automate the irrigation process

leading to higher production with lesser human intervention by analyzing the moisture

content of the soil and automating the irrigation process. Automation of irrigation

process can revolutionize agricultural domain from being in- efficient and labor

intensive process to intelligent, smart and dynamic process leading to higher

production with lesser human intervention. First major problem faced by plantation

industry is to maintain the soil with required natural nutrients. Second, excessive water

logging could damage plantation, similarly in sufficient water could lead to less

produce. To address this one has to undergo lot of complications like repeatedly

monitor the water level and climate changes on regular basis. In this paper, a method is

proposed to gather the live soil moisture content and compare it with user

preconfigured settings and take appropriate action. This makes optimal usage of scarce

water resource that leads to higheroutput.

Key Words: Smart irrigation, Sensors

Page 44: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 19

Inter-Provider ISP-to-ISP in MPLSVPN Network Using MP- EBGP Method

S. Jeyanthkumar, Joseph Mathew, Mr.S.Vinoth

KINGS ENGINEERING COLLEGE

Abstract:Being widely adopted by worldwide service providers, the MPLS technology

to connect geographically separated customer sites becomes important in reliability. It

is used to implement VPNs to connect the customer networks i.e., Inter-provider VPN

network. In this project we first briefly describe VPN switch are behind the scope of

secure private MPLS connections such as several VPN deployments emerged from the

sudden growth of requirements. We then discuss about the requirements of inter

connections from customer end to service provider in one's perspective. We then

propose and discuss the methods used for deployment options from service providers‘

point of view. In this project, we present an one method of communication among

branches or partner branches of an organization each of the distinct geographical area

with absence of the same ISP in every area. We came up with an idea of designing an

Inter-provider network i.e., connecting multiple ISP switch the private network

mechanism which provides global reach ability. Ideal switch the security issues

confidently and provides there placement of Internet in private / publicorganizations.

Index Terms — MPLS Technology, VPN, Inter-provider network, VPN deployments,

distinct geographical areas, absence of the same ISP, replacement of Internet, private /

public organizations.

Page 45: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 20

LICENSE PLATE RECOGNITION FOR THE OFF-ANGLED IMAGES USING

NEURAL NETWORKS

A Kavipriyan, S.Keerthana, Mrs.M.Sujatha

KINGS ENGINEERING COLLEGE

Abstract – License plate is one unique identification of each vehicle. Detection of

license plate plays an important role in identification of each vehicle in various

circumstances. The existing system of License plate detection used various methods

namely, Principal Component Analysis, Optical Character Recognition, Edge

Detection Algorithm. In addition to the above techniques, the proposed system in this

paper describes about recognition of different font styles of characters in the license

plate using Neural Networks. The observed plate images are usually in low resolution

and suffer severe loss of edge information, which cast great challenge to existing blind

deblurring methods. The images are checked for skew correction.

Keywords – Video Acquisition, Frame Conversion, Pre-processing, Segmentation,

Neural Networks, License Plate Recognition (LPR).

Page 46: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 21

AGRICULTURAL MONITORING USING WIRELESS SENSOR NETWORK

(WSN) BASED ON IOT

A Kavipriyan, S.Keerthana, Mrs.M.Sujatha

KINGS ENGINEERING COLLEGE

Abstract: In recent years, we have seen a new era of short range wireless sensors and

remote control technologies like whether sensor, software installing, car parking

sensor, etc in front of us. The project aim to monitoring the water level and to maintain

the water range. Water sensor is the real time humidity monitor. In our project it used

to capture and monitor the water level in a particular agricultural land. GSM module is

used to send the alert message to the user when the water level high or low. We use the

door setup when the water level is high by using remote control to reduce the water

level. By using the same remote control process for pouring the water when the water

level is low. The pouring motor is controlled by the remotecontrol.

Keywords: (sensor, pouring, remote control, humidity)

Page 47: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 22

ENERGY EFFICIENT CLONE DETECTION IN WSN

Ponnarasi, Illayavanan M, Mrs.C.Annapoorani

KINGS ENGINEERING COLLEGE

Abstract:—In this paper, we propose an energy-efficient location-aware clone

detection protocol in densely deployed WSNs, which can guarantee successful clone

attack detection and maintain satisfactory network lifetime. Specifically, we exploit the

location information of sensors and randomly select witnesses located in a ring area to

verify the legitimacy of sensors and to report detected clone attacks. The ring structure

facilitates energy-efficient data forwarding along the path towards the witnesses and

the sink. We theoretically prove that the proposed protocol can achieve 100% clone

detection probability with trustful witnesses. We further extend the work by studying

the clone detection performance with untrustful witnesses and show that the clone

detection probability still approaches 98% when 10% of witnesses are compromised.

Moreover, in most existing clone detection protocols with random witness selection

scheme, the required buffer storage of sensors is usually dependent on the node

density, i.e., O( √ n), while in our proposed protocol, the required buffer storage of

sensors is independent of n but a function of the hop length of the network radius h,

i.e., O(h). Extensive simulations demonstrate that our proposed protocol can achieve

long network lifetime by effectively distributing the traffic load across the network.

Keywords: wireless sensor networks, clone detection protocol, energy efficiency,

network lifetime

Page 48: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 23

Achieving Deduplication across Different Domain of Big data in Cloud Ensuring

Efficiency & Privacy

P. Muthumanian, Mythili, Mrs.V.Indhumathi

KINGS ENGINEERING COLLEGE

Abstract: Secure deduplication to reduce storage overheads in cloud storage is the

major concept achieved in our system. CSP provides storage for users to store their

data. Same data can be shared within the users and can store the same data in same

cloud in different names which can cause unnecessarily utilization of cloud storage for

same file existing in different names. Further the data is encrypted and stored in the

cloud along with the key and retrieved via decryption. In the existing system they are

only capable of managing either brute force attacks or ensure efficiency and

availability of data and not both. Also duplication is checked only within same domains

i.e., intra-duplication is checked by local manager. That too contents of the file are not

checked. Duplicates are checked only by checking for same file names. But in

proposed system we go in for deduplication by checking for duplicate copies of data

across different domains i.e., inter- duplication and also we resist both brute force

attacks and ensures efficiency &availability done by EPCDD concept.

Keywords: secure data deduplication, big data and data availability.

Page 49: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 24

An Effective Password Authentication System using Image with Smart Way of

Password Recovery in Support for Wise Banking Services

JUDSON ABRAHAM, MANI MANTHIRAM.S, Mrs.L.Jenithamary

KINGS ENGINEERING COLLEGE

Abstract: Nowadays, the usage of Banking applications on mobiles phones are well-

known but the application and the data are secured in a proper manner. For that we

provide the application with password in order to secure the information. But these

password are easily hacked by the attackers either by shoulder surfers in public area or

other ways of hacking. To overcome, these kind of attacks, we used pictorial password

mechanism, for authenticating into banking services. To match with the original

password, we used a short-term indicator for login purpose. And we provided virtual

money concepts in banking services for money transfer. This idea protects the user

from attackers and gives a easy way for login and money transfer options. This

proposed system provides the user friendly and the interactive environment for the

user.

Keywords: Hacking, Short-Termindicator, Authenticating.

Page 50: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 25

An Secure Cloud Based Web Application to Prevent Clone Attack Using Discrete

Wavelet Transform and Java StaticWatermarking

M.Nanda Gopal, P.Niranchana, Dr.D.C.Julliejosephine(P)

KINGS ENGINEERING COLLEGE

Abstract- Social media provide a common platform for millions of users across the

Internet. The common problem addressed here is the misuse of data files by unknown

users. In this project we have used data hiding techniques to prevent clone attack. In

this proposed system, the unauthorized client has the privilege to access pictures shared

in the media. We have used Java static watermarking algorithms to prevent cloning of

picture files shared in the social network. Whenever a user uploads profile picture or

photos it would be watermarked and updated. This is done using java static

watermarking system. Any unauthorized users updating the same picture can be

detected and their respective IP would be blocked. Also we have used discrete wavelet

and cosine transforms for implementing stenographic techniques to share secure

images in the socialmedia.

Index Terms – Java Static watermarking, Discrete Wavelet algorithm, Discrete

Cosinealgorithm

Page 51: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 26

Biometric Authentication for Cloud Service Provider with Multiple Cloud Storage

System

P Mugilan, Phebe Roshan, Mr.Christophersamualraj

KINGS ENGINEERING COLLEGE

Abstract- Cloud storage services provides users to store large amount of files.

Distributed clients can also access the file storage. To provide integrity, controllable

outsourcing and auditing on outsourced file, we used a scheme called identity-based

data outsourcing (IBDO)which provide more advantageous when compared to existing

systems. In IBDO scheme, the users allows the designated entities to upload data on

behalf of the user. The entities are authorized and identified using their identities. The

IBDO also promotes comprehensive auditing which allows the user to check the

information based on type and consistence of outsourced files and also the MAC

address and IP address are checked. To provide more security we added biometric

authentication called fingerprint analysis and to overcome security threats, we proposes

multiple cloud storage system using split and merge technique, e.g., a file is divided

into multiple fragments and stored in multipleclouds.

Index Terms- Cloud storage, Data integrity, Data outsourcing, Identity-based

cryptography, Security.

Page 52: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 27

Building Robust Authentication Systems on Questions for Fallback

Authentication

P. Muthumanian , Navitha Velvet, Dr.D.C.Julliejosephine(P)

KINGS ENGINEERING COLLEGE

Abstract-ASecret-QuestionbasedAuthenticationsystem,called―Secret-

QA‖thatcreatesasetofsecret questions. We develop a prototype on windows. We

observe the questions‘ reliability by asking participants to answer their own questions.

The Secret-QA system consists of two major components, namely the user-event

extraction scheme and the challenge response protocol, the authentication is successful

if the user‘s response conforms to the correct answers; otherwise, a potential attack is

detected. We create a set of questions based on the data related to sensors and apps,

which reflect the users‘ short-term activities. We measure the reliability of these

questions by asking participants to answer these question, as well as launching the

acquaintance/stranger guessing attacks with and without help of online tools, and we

are considering establishing a probabilistic model based on a large scale of user data to

characterize the security of the secret questions. The recent prevalence of windows has

provided a rich source of the user‘s personal data related to the knowledge of his short-

term history, Is it feasible to use the knowledge of one‘s short-term personal history for

creating his secret question. Moreover, a user may forget her/his answers long after

creating the secret questions. We evaluate the usability of the system, and find that the

Secret-QA system is easier to use than those existing authentication system with secret

questions based on users‘ long-term historic data. In proposedsystem,wepresentaSecret-

QuestionbasedAuthenticationsystem,called―Secret-QA‖thatcreates a set of secret

questions. Enhancing Fallback Authentication by building a personal secret question

method. Personalized secret questions are used in secondary authentication instead of

predefined questions.

Index Terms—Secret questions, Authentication, Security Implementation.

Page 53: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 28

Cloud Computing Adaptive Framework

M Padmapriyadarsini, S. Nithila, Aravazhi Chezhian, Mrs.C.Annapoorani

KINGS ENGINEERING COLLEGE

Abstract:-We majorly offering real-time data security in cloud computing. Providing

security to petabytes of data is very important. A recent survey on cloud security States

that the security of users‘ data has the highest priority as well as concern. Therefore, to

provide secure cloud framework I have proposed a system named secure cloud

computing framework. SCCF multi-layered security can protect data in real-time and it

has three layers of security: Identity management, Intrusion detection and prevention,

Convergent encryption, Cloud Storage. To enhance security we proposed to add

automatic intrusion detection and prevention technique for Brute force and SQL

injection attacks. Finally the data owner files are encrypted using RC5 encryption

algorithm and stored in public cloud storage named cloudMe. PSO(Particle Swarm

Optimization) Algorithm is also used in our project for reducing the cost and also

transferring and executing the file with minimumcost.

Keywords:-Datastorage, encryption, decryption, Cloud Computing, Adaptive

Framework.

Page 54: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 29

Cryptographic Implementation of Aggregate Key Encryption for Data Sharing In

Cloud Storage

R.Ponjanaki, A.Preethi Divya, Mrs.L.Jenitha Mary

KINGS ENGINEERING COLLEGE

Abstract:-Here we propose Bastion, a novel and efficient procedure that assures data

confidentiality, even if the encryption key is leaked and the adversary has to access the

cipher text blocks. Though, if data is encrypted with existing schemes, an adversary is

provided with the encryption key, can compromise a single server and decrypt the

cipher text blocks stored there. In this paper, we study data confidentiality against an

adversary who knows the encryption key and has access to a large fraction of the

cipher text blocks. Once the encryption key is exposed, the only way to preserve data

confidentiality is to limit the number of attacker‘s accessing the cipher text. For

example, by distributing cipher text blocks across servers in multiple administrative

domains—thus assuming that the adversary cannot compromise all of them. Recent

updates brings out a powerful attacker which breaks data confidentiality by obtaining

cryptographic keys, by means of unauthorized users in cryptographic software. Our

judgement suggests that Bastion is well-suited for integration in existing systems since

it incurs less than 5% overhead compared to existing semantically secure encryption

modes. We examine the security of Bastion, and we evaluate its performance by means

of a prototype implementation. We also discuss practical insights with respect to the

integration of Bastion in commercial dispersed storagesystems.

Keywords:- Data Confidentiality ,cryptographic keys, cipher text blocks ,File level

deduplication

Page 55: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 30

CryptoImage: Efficient Cryptosystem for Data Hiding in High Dynamic Range

Images

A Ponvannan, J.Pradeep, Mrs.V.Indhumathi

KINGS ENGINEERING COLLEGE

Abstract- Data preserving is one of the key challenges in these days. There are many

network attacks, cyber attacks from which the sensitive data suffer from.

Steganography techniques support data hiding inside an image to certain extent. It also

falls short in maintaining the integrity when transmitted through the

internet.―CryptoImage‖solvesthisproblembyembeddingencrypteddataontoanHDR(High

Dynamic Range) image which is absolutely non-prone to attacks. We implement cipher

techniques to modify the RGB value of each pixel and store the sensitive data onto it,

thereby concealing the confidentiality of the message. Graphics Drawable Library (GD

library) of PHP module present in PHP engine performs the conversion of HDR images

into Base64 format in which the encrypted text is embedded and then stored onto the

server. AES(Advanced Encrypted Standard) encryption is used to encrypt the original

secret message into cipher text which is appended to the converted image file and then

stored onto the server thereby concealing the security and confidentiality of the

originalmessage.

Keywords: Cryptosystem, Advanced Encryption Standard, Steganography, HDR

images, Data hiding.

Page 56: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 31

Ddos Detection And Mitigation On Websites Using Http Flood

K. Poonguzhali, Pownraj.A, Ms.D.Deepavathi

KINGS ENGINEERING COLLEGE

Abstract:- A Distributed Denial-Of-Service (DDoS) attack is an attack in which

multiple compromised computer systems attack a target, such as a server, website or

other network resource, and cause a denial of service for users of the targeted resource.

We implement a technique to reduce the traffic in affected servers with the help of PHP

and Javascript by Session Handling and Timeout and to deter attackers and mitigate

vulnerabilities at various points, multiple security controls are implemented and co-

ordinated as part of a layered defense in depth strategy. There are four critical phases

where we test the vulnerability of a website from DDoS attack: EtherApe, ServiceTor,

ProxyChains, GoldenEye.

Keywords: PHP, DDoS, Javascript, EtherApe, ServiceTor, ProxyChains, GoldenEye.

Page 57: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 32

Deadline based resource provisioning and scheduling algorithm for scientific

workflows on clouds

S. Preethi, Y.Priya, Ms.V.Sangeetha

KINGS ENGINEERING COLLEGE

Abstract—As it has turned into the standard for cloud suppliers to have numerous

datacenters around the world, huge requests exist for between datacenter moves data in

substantial volumes, e.g., relocation of large data. A test emerges on the best way to

plan the mass information exchanges at various earnestness levels, keeping in mind the

end goal to completely use the accessible between datacenter transfer speeds. The

Software Defined Networking (SDN) worldview has risen as of late which decouples

the control plane from the multiple ways empowering potential worldwide streamlining

of information directing in a network. An ideal lump steering streamlining

demonstrates is detailed to settle for the best lump exchange plans over time. Deadline

based bulk data transfer using cloud data centers as gateway, an SDN architecture for

network reliability. Chunk routing for chunk the bulk data. The aim is to deliver data

within deadline. An optimal chunk routing optimization model is formulated to solve

for the best chunk transfer schedules over time. To derive the optimal schedules in an

online fashion, three algorithms are discussed, namely a bandwidth- reserving

algorithm, a dynamically-adjusting algorithm, and a future-demand-friendly algorithm,

targeting at different levels of optimality and scalability. We build an SDN system

based on the Beacon platform and Open Flow APIs, and carefully engineer our bulk

data transfer algorithms in the system. Extensive real- world experiments are carried

out to compare the three algorithms as well as those from the existing literature, in

terms of routing optimality, computational delay andoverhead.

IndexTerms—Bulk data transfer, Cloud Data Centers, Software Defined Network,

Dynamically Optimized Algorithm.

Page 58: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 33

Employee Performance Workflow Mining In Clouds

S.R. Sai Shraven, B. Sairam, Mr.Christophersamualraj

KINGS ENGINEERING COLLEGE

Abstract -We first present the experimental evaluation of our approach to both intra-

cloud and inter-cloud scientific work- flow mining. For inter-cloud scientific workflow

mining, we assume that different PMs belong to the same cloud federation such that

they could discover the corresponding sub-workflows in parallel. Scientific workflow

scheduling which needs to change work- flow models. In this paper, we address this

issue in both intra-cloud and inter-cloud environments. Scientific workflows in cloud

environments can be deployed and executed on a central cloud or multi-clouds and thus

activities in all sub-workflows can be recorded in a trace according to their timestamps.

Scientific workflow is used to discover actual workflows from the execution history in

order to reproduce experimental results and to establish provenance of particular work.

This Project We develop one concept for monitoring the system activities and display

the work flow result of employees. The day to day activities is used to analyze the

performance of employees.

Page 59: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 34

End-to-End Schedulability Tests for Multiprocessor to Design Patterns: Building

Effective Algorithms

M.Pratheep Kumar, S.Raj Kumar, Mr K.G. Saravanan

KINGS ENGINEERING COLLEGE

Abstract: Real time stream processing involves continual input and output processing

of large set of data in the existing system perform real time stream processing for larger

set of data like big data. Consider if users are searching for a very important event of a

day, in the existing system such data requested by the user are fetched from main

memory whenever requested, so this leads to bad performance and may lead to more

time consumption. Therefore this state more time for the user to get response, this is

the problem will be existing system. Thus in the proposed system we concentrate on

reducing the response time for the request placed by the user by using Trending topic

detection algorithm based on searchcount.

Keywords: Trending topic detection algorithm, stream processing, big data and search

count.

Page 60: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 35

FlickFortune: Extensive Data Analysis andProbabilistic prediction using Data

mining Approach

S Ranishree, Sandeep.S, Mrs. S. Divya

KINGS ENGINEERING COLLEGE

Abstract- Data Mining is one of the rapid growing areas in the development of

Industrial automation. Many researches are carried out in order to determine the future

result of any business such as stock market. The appropriate data mining technique

helps the decision makers to arrive upon a valid decision. Our proposed system is the

implementation of probabilistic prediction of data from the extensive analysis. We

coherently apply the proposed system onto the movie prediction such as Gross

collection, Rating, feedback and success ratio. We use web scrapper code with

TMDBAPI to fetch attributes of the movies such as actor name, director, musician,

producer and budget. We employ association rule mining to extract the probabilistic

prediction from the user query. We further use AJAX for efficient and optimistic data

traffic between the client and the server.

Index Terms – Association rule mining (ARM), data access, DataMining, TMDBAPI,

AJAX, Probability vector.

Page 61: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 36

Food Ordering Application using Sentimental Analysis

K. Priya, Y.Priya,V.Rahana,Mrs.V.Blessyselvapriya

KINGS ENGINEERING COLLEGE

Abstract:-The demand for the offers from the customers and the demand for the high

sales rate from the food selling vendors are growing massive these days. Sentiment

Analysis Algorithm (SAA) can be used for analyzing people‘s opinions about a

particular product to improve the quality of the product. Fidu is the business intelligent

application which uses SAA to collect the customer‘s reviews to sort the quality of

both the product and service. Food ordering application is an android app which

enables person to order food while person is watching sports in stadium. This utility is

very simple and consumer pleasant in order that even kids can also recognize and use

it. As a result of these reviews, a report will be generated and sent to the respective

restaurants so that each restaurant may improve their food quality to increase customer

satisfaction. If the customer is satisfied, the rating of the food which they purchased

will increase based on that review, the food will top the menu in this application. Fidu

also includes an interactive chat-bot which helps the customer in ordering their favorite

food. The main aim of the application is to increase the business of the restaurants and

provide more offers that they can cope up with the top rating, eventually satisfying

customers.

Keywords: Sentiment Analysis, Android, Business intelligence, Firebase,

Authentication.

Page 62: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 37

Identifying Fake Applications and Ranking in Google Play Store and

Optimization of Genuine Applications

V. Rahana, S.Preethi,Mrs.R.Lavanya

KINGS ENGINEERING COLLEGE

Abstract- Present state of generation, due to rapid development in the mobile

technology and devices, the mobile applications are very interesting and famous. As

there is large number of mobile Applications, ranking fraud is a very challenging factor

in the mobile Applications market. Ranking fraud is the term used for referring the

fraudulent or suspicious activities having the intention of boosting up the Apps in the

popularity list. In fact, Application developers are using tricky means frequently for

increasing their Apps sales. The main aim is to develop such system that find ranking,

rating and review behaviors for investigating three forms of evidences they are review

based evidences, rating based evidences and ranking based evidences and then

aggregation based on optimization to combine all the evidences for detection of the

fake apps and also optimization of the genuineapplications.

Keywords-Android market, Search rank fraud, Malware detection.

Page 63: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 38

Preserveloc: Preserving the Location and Seamless Data Distribution in Mobile

Environment

C.Rinna, Sagaya Chithirai Ranjith, Mr.A.Gnanasekaran

KINGS ENGINEERING COLLEGE

Abstract--Android smartphones have seen a steep growth in recent years. The

importance of android devices is gaining much importance in day to day life. There are

many pitfalls that the system of android goes through inspite of its vast capabilities.

Preserving the location of the device is a challenging task in

android.Theotherapplicationsinthedeviceshouldnotgetthelocationinformation.Todesigna

nefficientsystem that preserves the location of the mobile application user and shared

data to the intended user without losing data integrity and location privacy. The system

should be developed in Android for the mobile users. Our proposed system focus on

seamless data delivery with less latency in all network conditions and preserving the

location of the device.

Keywords: Preserve, Android,Privacy, location.

Page 64: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 39

Prognosticating the Stress Values While Driving using IoT

R.Ponjanaki,A.Ponvannan, Mr.D.R.Denslinbrabin(A)

KINGS ENGINEERING COLLEGE

Abstract- The stress levels of drivers have greater impact on driving. Driver‘s

performance is based on their stress level. It leads to many accidents. Hence, heart beat

sensor is used to prognosticate the driver stress values and behaviour while driving. In

this project, to overcome the challenge we have proposed real data collection, IoT

based sharing and data analytics. The driver data is collected from the sensor and

transmitted to the microcontroller and using RS232 cable the real and dynamic driver

data are transmitted to the system. The real time data from the COM port are obtained

using Net beans and saved in SQL database. . In R programming, clustering and

classification are performed for predicting the normal or abnormal conditions of the

driver. For clustering, we use k-means algorithm and for classification we use Naive

Bayes algorithm. The driver data are encrypted using AES encryption algorithm and

each driver data are stored in public cloud server namely CloudMe. The real time data

can be monitored by vehicle service centers, bus owners and nearby vehicle

boardingpoint.

Keywords: Advanced Encryption Standard (AES), Communication port (COM port),

Internet of Things (IoT), Structured Query Language (SQL)database.

Page 65: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 40

Provides Security in Cloud using Multi-Cloud and Slicing Algorithm

E. Sangeetha,K.Poonguzhali, Mrs.S.Divya

KINGS ENGINEERING COLLEGE

Abstract: Generally the cloud server act as a container which contains data or

information. Multi-cloud is the combination of public, private or managed clouds

including managed services or service providers. Multi- Cloud data systems have the

capacity to enhance data sharing and this aspect will be significantly of great help to

data users. Most business organizations share most of their data with either their clients

or suppliers and consider data sharing as a priority. In generally we are sent the file to

cloud in this project the proposed system we send the file with authentication by

encrypt and it can retrieve the data from multiple cloud before retrieve the file its

enhancing whole file then decrypt method were use to retrieve the file to view and ID-

DPDP protocol can realize private verification, delegated verification and public

verification. We propose a survey on the achievable security merits by making use of

multiple distinct clouds simultaneously. Various distinct architectures are introduced

and discussed according to their security and privacy capabilities and prospects. Also

we propose the splitting and merging concepts during storage in cloud environment.

Keywords: Multi-cloud, privacy preserving, data storage, encryption, decryption,

protocol.

Page 66: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 41

Providing Restrictions Against Attack and Congestion Control in Public

Infrastructure Cloud

Pownraj A,J.Pradeep,Mrs. M.Vidhya

KINGS ENGINEERING COLLEGE

Abstract: Cloud computing is current trend in market. It reduce the cost and

complexity of service providers by the means of capital and operational cost .It allows

users to access application remotely. This construct directs cloud service provider to

handle cost of servers, software updates, etc. If the session tokens are not properly

protected, an attacker can hijack an active session and assume the identity of a user. To

focusing on session hijacking and broken authentication OTP is generated it will send

user mail. Once the user is authenticated they will be split into virtual machine it is

initiate to the upload process into the cloud . The cloud user files are uploaded and

stored in domain based .Also in our proposed system encryption keys are maintained

outside of the IaaS domain .For encryption, we proposed RSA algorithm .For data

owner file encryption, we use camellia algorithm. Finally the files are stored in the

public cloud named CloudMe.

Keywords: Cloud computing, IaaS, CloudMe.

Page 67: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 42

Real Time Junk Observation and Characteristic Analysis in Twitter

M.Pradeep Kumar,A.Preethidivya,Ms.V.Sangeetha

KINGS ENGINEERING COLLEGE

Abstract-Spam on social media is a major problem in recent days. In this paper we

take in charge, to reduce a spam on twitter. So, we firstly carryout a deep analysis on

the statistical features between spam posts and non-spam posts. So that we maintain a

training datasets in mysql to differentiate spam and non-spam tweets which can be

monitored by admin. For classification, we use RF (Random forest) Algorithm and to

moderate a spam tweets into a non-spam tweets NLTK (Natural Language Tool kit) is

used. A spam tweet tried by a user for two times, the intimation message is sent to a

particular user as notification. For more than two times he/she tries to doing the same

job of posting spam tweets, the followers will be automatically removed from that

user‘s list. It creates a different mindset to a user where to realize his/hermistake.

Index Terms – Social network security, Twitter spam detection, RF (Random forest),

NLTK (NaturalLanguage Toolkit).

Page 68: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 43

Recommender System for Research Studies Using Graph Based Article Ranking

S.Rajkumar,S.Ranishree,Ms.S.Deepika

KINGS ENGINEERING COLLEGE

Abstract- Nowadays, the recommendation techniques are becoming more popular as a

result of expeditious growth in the information technology and the growing amount of

scholarly data. The ultimate

objectiveoftheproposedworkisrecommendingtheitemsofpotentialinterestautomaticallyto

theusers.Inmodern years, recommender systems are being employed in digital libraries

to help researchers in finding relevant articles. This search tool gives the list of relevant

articles based on the keywords in the query. It is difficult for a researcher to describe

his needs by a limited set of keywords. On the contrary, the results will be similar to all

researchers if the keywords are same. The existing recommender systems use the same

algorithm to generate recommendations for users without considering their situation.

To improve the recommendation, the proposed system incorporates common author

relation between articles. The system suggests the articles for users who are having

author based search pattern and also recommends conference venue for all researchers

to help them to gain more knowledge in their interested area. The principle notion of

the project is to determine the users having author based search pattern. To serve this

purpose, the system uses pairwise articles with common author relations and most

frequently appearedauthor.

Index terms-Common Author Relation, Frequently Appeared Author, Article

Recommendation, Recommends Conference Venue.

Page 69: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 44

The Future Technology of Smart Shopping Cart using RFID and ZIGBEE

M.Arumugakani,S.Arunmozhi,Mrs.V.Sangeetha

KINGS ENGINEERING COLLEGE

Abstract:-The Internet of Things (IOT) is changing human lives by interfacing regular

questions together. For instance, in a supermarket all things can be associated with

each other, shaping a savvy shopping framework. In such an IOT framework, a modest

RFID tag can be appended to every item which, at the point when set into a smart

shopping basket, can be naturally read by a cart outfitted with a RFID per user. Thus,

charging can be led from the shopping basket itself, averting clients from holding up in

a long line at checkout. Also, brilliant racking can be included into this smart billing

framework, an Zig-bee transmitter is used to transmit data from cart to focal server,

furnished with RFID per users, and can monitor stock, maybe additionally refreshing a

focal server. Another advantage of this sort of framework is that stock administration

turns out to be considerably less demanding, as all things can be consequently perused

by a RFID per user rather than physically examined by a worker. To approve the

possibility of such a framework, in this work we distinguish the plan prerequisites of a

savvy shopping framework, construct a model framework to test usefulness, and

outline a protected correspondence convention to make the framework reasonable. To

the best of our insight, this is the first run through a smart shopping framework is

proposed with security under thought.

Keywords:-Zig-bee, RFID Reader, RFID Tags, Smart Cart

Page 70: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 45

Evaluating Disease from Several Medical Data by using HL7

M.Chithra Devi,S.Chrishstewart,Mrs.V.Blessyselvapriya

KINGS ENGINEERING COLLEGE

Abstract- To provide a detailed analysis on the healthcare data in HL7(Health Level 7)

by utilizing Big data analytics and to create disease prediction system as the healthcare

sector is considered as one of the important industries in information technology. In the

past few years, healthcare data has become more complex with huge amount of data

related to ever growing and changing technologies, mobile applications and discovery

of new diseases. The belief of healthcare sectors is that healthcare data analytics tools

are important to manage a large amount of complex data, to improve healthcare

industries, efficiency and accuracy in medical practice. Information technology is a

boon for the healthcare sectors to upgrade their efficiency in healthcare performance

availing the provided data and information. The concept of big data though not new is

constantly changing with attempts of defining big data and inventing newer hardware

and software mechanisms to store, analyze and visualize the data in keeping with the

requirements of collection of data elements as per the requisite size, speed and type.

Velocity, variety and volume are the three innate aspects of the data produced.

Furthermore, each of these data repositories is isolated and inherently incapable of

providing a platform for global datatransparency.

Keywords: Health Level 7 (HL7), Healthcare, Hadoop Distributed File System

(HDFS), Deep Analysis

Page 71: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 46

Creating Secure Clouds By Continuous Auditing And Providing Certificates

R.David Sam Paul,V.Devi,Ms.C.Sumithra

KINGS ENGINEERING COLLEGE

Abstract:- Cloud service certifications (CSC) attempt to assure a high level of

security and compliance, considering that cloud services are part of an ever-

changing environment, multi-year validity periods may put in doubt reliability of

such certifications. We argue that continuous auditing (CA) of selected certification

criteria is required to assure continuously reliable and secure cloud services, and

increase trustworthiness of certifications. We conducted a thorough literature review,

interviews, and workshops with practitioners to conceptualize an architecture for

continuous cloud service auditing. Our study shows that various criteria should be

continuously audited. Cloud service customers do not longer possess their data

locally, assuring that their data is Being correctly stored and integrity is

maintained in cloud environments is of critical importance. Data integrity may be

threatened. major modules are server configuration ,data upload and block split, data

integrity checking, file recovery and certificate generation We propose a audit service

for verifying the integrity of an un- trusted and outsourced storage. File System has

proper Indexing and Metadata‘s for the different Chunks of the Cloud Storage.

Here the auditor agrees to inspect logs, which are routinely created during

monitoring operations by services providers to assess certification adherence. Cloud

provides random blocks to Verifier for Integrity Checking which is to protect user

privacy from Verifier (Third Party). File recovery is done by the Verifier

automatically if the datagets corrupted during checking. User can complaint cloud

for file recovery. Continuously auditing such cloud services can assure a high

level of security and reliability to (potential) cloud serviceadopters

Keywords: certification, cloud computing, continuous auditing, security.

Page 72: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 47

Pioneering Multiple Genomic and proteomic data Using Mirna and Transcription

factor for Gene Disease Spotting

G.Dhana Sundar,S.Ebenezer,Mrs.M.Sujatha

KINGS ENGINEERING COLLEGE

Abstract— Multiple genomic and proteomic semantic interpretation scattered in many

distributed and heterogeneous data sources; such heterogeneity and dispersion hamper

queriesandperformingglobalevaluations.Tooverwhemthisproblem,wedevelopedasoftwa

create and maintain a Genomic and Proteomic Knowledge Base (GPKB), which

integrates several of the most relevant sources .Gene Ontology (GO) is a structured

repository of concepts that are associated to one .Therearedifferentmethodofanalysisto

get bio information. One of the method is the use of Association Rules (AR) which

discovers biologically applicable associations between terms of GO. In existing work

we used GO-WAR (Gene Ontology-based Weighted Association Rules) for extracting

Weighted Association Rules from ontology-based annotated datasets.Based on cellular

component, molecular function and biological process values intrinsic and extrinsic

values would be calculated. For each proteomic analysis for every gene disease, we

analyze OMIM id, disease caused by, associated genes, medicine if available, and

images of that particular gene disorder. Thus a common man also would be able to

understand the membranes and enzymes associated for his / her gene disorder and able

to identify intrinsic and extrinsic factors. In this Paper, We done the Co-Regulatory

modules between miRNA (microRNA),, TF- gene interactions and gene-miRNA

interaction with the help of integration technique. These interaction could be taken the

genetic disease like breast cancer, etc..Iterative Multiplicative Updating Algorithm is

used in our paper to solve the optimization module function for the above interactions.

After that interactions, we compare the regulatory modules and protein value for gene

and generate Bayesian rose tree for efficiency of ourresult.

Index Terms— GO-WAR- Gene Ontology-based Weighted Association Rules,

MIRNA –Micro RNA, Transcriptionfactor

Page 73: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 48

A SECURE CLOUD – BASED WEB APPLICATION AGAINST POLLUTION

ATTACK AND CONVINCING FILE TECHNIQUES

J.Ebenezer,R.Esakiammbal,Mrs.V.Indhumathi

KINGS ENGINEERING COLLEGE

Abstract: Cloud is the collection of virtualized and interconnected networks that

consists of parallel and distributed system. Security and privacy of information is the

biggest challenge to cloud computing. This issues can be overcome by employing

encryption and security techniques. Pollution attacks are the abrasive threat to cloud

data in which the intruders inject malicious packets into the network. This paper

provides solution for the pollution attack which able to spot the presence of an attack

while fetching the data from cloud storage. Before uploading data to cloud it is

encrypted using RC5 algorithm. Hashing techniques are employed to detect polluted

contents. The content distribution network (CDN) servers transmits date along with

calculated hash value. The network peers applies the same hash algorithm to compute

hash code for the received data. These two hash values are compared to identify any

pollution during transmission. Though the cloud storage providers are safe in practice

some authorities may force them to reveal user secrets or confidential data on the

cloud. The proposed system also provides solution to preserve user data confidentiality

and integrity after outsourcing. In practice, some entities may intercept communication

between user and cloud storage providers and then storage providers to release user

secrets by using government power or by other means which results in data leakage. In

order to avoid data leakage and to increase trust level between the Cloud Service

Provider (CSP) and the user, we propose a solution of creating proxy file which will be

delivered to other entities.

Keywords: Cloud computing, Network security, Data integrity, Pollution attack

detection, Authentication, Proxy file creation.

Page 74: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 49

AN ANALYSIS OF SECURITY ISSUES AND NATURE-INSPIRED

ALGORITHMS ON WIRELESS SENSOR NETWORKS INTEGRATED WITH

IOT ENVIRONMENT

M. S. Vinmathi, Dr. M. S. Josephine, Dr. V. Jeyabalaraja,

Dr. M.G.R. Educational and Research Institute

Abstract: WSN has the ability of detecting impelling the natural information the real

time and positive data can be gathered utilizing sensor frameworks. These WSNs can

be joined with internet of things to enable affiliation and broad access to sensor

information. Wireless sensor networks are very inclined to security issues. The

significant utilizations of sensor systems affect some of the areas such as in military,

business, social insurance, retail, and transportations. These frameworks utilize wired

or adhoc systems. Wireless sensor systems, actuator systems, and vehicular systems

have been considered incredibly in the industry level. Perhaps, the Internet of Things

(IoT) has extensive research consideration recent years. The cutting-edge innovation

and the expanding figuring intensity of processors, the utilization of remote sensor

systems have turned out to be to a great extent dispersed over wide regions. As of late

the remote sensor systems is utilized in Agriculture, keen structures, ecological

wellbeing and numerous different applications. In this paper, an audit about joining of

WSN with IOT, challenges looked by WSNs when coordinating with IOT have been

discussed in a review manner and also showcased how they can be clarified from the

parts of security and protection. In addition to the challenges, characteristics of nature-

inspired algorithms are also analyzed for clustering the nodes in wireless sensor

networks.

Keywords: Challenges, Internet of Things, Nature-Inspired Algorithms, Wireless

Sensor Networks, Security issues.

Page 75: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 50

A Bluetooth-based Architecture for Android Communication with an Articulated

Robot

[1]Dr.M.DevaBrinda, [2]Karthik.S,[3]Iyappan.S

Department of EEE, Ametuniversity

E-mail: [email protected], [email protected]

Abstract: In industrial robotic environments, there are many different robots

performing a variety of tasks. Each robot is controlled by its own teach pendant or via a

networked socket application. However, to monitor the status or make minor changes

to the programming of the robot, the user must obtain access to the teach pendant or

terminal. In an effort to eliminate this need, this paper introduces an android platform

that communicates with robots over a Bluetooth connection. Allows a malicious

service provider, who has successfully communicated with a legal user twice, to

recover the user’s credential and then to impersonate the user to access resources and

services offered by other service providers. Insecure against both impersonation attacks

and identity disclosure attacks Scheme suffers from Deniable of Service (DoS) attacks

and presented a new scheme.

Page 76: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 51

DISASTER MANAGEMENT SYSTEM USING INTELLIGENT

UNDERWATER ROBOT

Sasikala D, Rajalakshmi V, Jayabhaduri R

Sri Venkateswara College of Engineering Chennai, India

[email protected]

Abstract— Transportation of goods in marine vessels needs safe landing of goods to

their respective region. This transportation may be within national or international

region. Collision of vessels carrying goods becomes dangerous to the man-kind as well

as environment especially vessels carrying oil, hazardous chemicals etc. This paper

focuses on disaster management system for oil spillage during collision of oil-carrying

vessels. An underwater robot with GPU based system sends the images of the oil

spillage area and depth to the aerial system where it is processed using deep

convolution neural network. This information helps the respond team to take action

quickly.

Keywords—oil spill, deep convolution neural network.

Page 77: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 52

DEVELOPMENT OF AUTOMATED RUBBER TAPPING MACHINE TO

IMPROVE THE SOCIO-ECONOMIC STATUS OF RUBBER GROWERS IN

RURAL AREAS

1Aran Glenn .J, 2Adeline Sneha.J, 3Neenu .C

Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu,India.

E-mail id: [email protected]

ABSTRACT- Rubber tapping is the process of extraction of latex from rubber trees.

Rubber tree tapping is considered to be a skill oriented job. During the tapping process,

the taper has to make a downward half spiral incision on the tree bark to extract the

white milky liquid called latex. On a typical day, a rubber tapper has to tap about 500

to 800 rubber trees manually with a tapping tool within a specified time of the day.

Availability of skilled laborers who could accomplish this mammoth task is getting

scarce as days pass by. Even though cheap unskilled labor is available, without

appropriate time and training they would end up damaging the tree. The automated

rubber tapering machine designed here would replace the manual labor required for the

tapping process. Also with a clock feature to control the timing of the tapping process,

higher yield of rubber latex could be obtained.

Keywords— Rubber Tapping, Automatic Rubber machine, Rural development.

Page 78: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 53

HOME AUTOMATION SYSTEMS USING SPEECH RECOGNITION

V. Lokesh, R. K. Padmashini

Department of CSE

SreeSastha College of Engineering, Chennai-600 123

[email protected]

Abstract: The proposed project is an idea of controlling all electrical equipment in a

room using a single mobile application. The application will be installed in the user’s

smartphone which accepts voice as input and converts it to text and action. Action

produces a signal which is accepted by all the electrical devices in the room and

responds to it [off and on]. The control operation can be performed at anytime and

anywhere within the room and from outside. Speech recognition is included to control

appliances by giving commands via voice and controlling every device present in the

house. The overall aim of the implementing the system is to reduce every possible

complexity and making it a simple to use.

Keywords: Smartphone, Speech Recognition, Control, Action, Complexity.

Page 79: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 54

DEPARTMENT

OF

INFORMATION TECHNOLOGY

Page 80: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 55

Page 81: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 56

Secure Data Dissemination and Management in Mobile Cloud Computing

R.Aishwarya,S.Ajay,Mr.N.Venkateshvara Rao

KINGS ENGINEERING COLLEGE

Abstract:-Mobile computing is one of the wide spread research area in the domain of

computer science as it attracts the researchers for its property of computing on-the-go.

On the other hand, cloud computing deepens its application areas in almost all the

sectors. Mobile cloud computing (MCC) gains its importance by facilitating the cloud

services and computing facilities on the go. There have been a lot of survey and

experimental frameworks for the implementation of MCC. In this paper, we provide a

novel framework for developing an android application that provides data transmission

between the mobile phones. Firebase cloud is integrated with the application for data

storage. The aid of AJAX and JSON are yielded in order to provide efficient data

transmission and consumption between the mobilenodes.

Page 82: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 57

Security Based System using Mobile Application

P.Akila Sowmiya,M.Allenmanasseh,Mrs.Indumathi K

KINGS ENGINEERING COLLEGE

Abstract: We are going to deal with security problems due to camera. Have access to

sensitive data and resources on the user device. Misuse of camera by malicious

applications may result in privacy breaches and sensitive data leakage. An example

would be a malicious application surreptitiously recording a confidential business

conversation. This change in device privileges is automatically applied as soon as the

user device matches a pre-defined context of a user-defined policy. The problem arises

from the fact that Android users do not have control over the application capabilities

once the applications have been granted the requested privileges upon installation. In

this paper we propose such an access control mechanism.

Keywords: - Android, Security, Location, Context.

Page 83: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 58

Semantic Localization & Mapping for Unsupervised Indoor Localization

S.Angayarkani,S.S.Angelin Golda Mary,Ms.J.Jinusophia

KINGS ENGINEERING COLLEGE

Abstract:-Indoor localization using mobile sensors has gained momentum lately. Most

of the current systems rely on an extensive calibration step to achieve high accuracy.

We propose SemanticSLAM, a novel unsupervised indoor localization scheme that

bypasses the need for war-driving. SemanticSLAM leverages the idea that certain

locations in an indoor environment have a unique signature on one or more phone

sensors. Climbing stairs, for example, has a distinct pattern on the phone's

accelerometer; a specific spot may experience an unusual magnetic interference while

another may have a unique set of Wi-Fi access points covering it. SemanticSLAM uses

these unique points in the environment as landmarks and combines them with dead-

reckoning in a new Simultaneous Localization and Mapping (SLAM) framework to

reduce both the localization error and convergence time. In particular, the phone

inertial sensors are used to keep track of the user's path, while the observed landmarks

are used to compensate for the accumulation of error in a unified probabilistic

framework. Evaluation in two testbeds on Android phones shows that the system can

achieve 0.53 meters human median localization errors. In addition, the system can

detect the location of landmarks with 0.83 meters median error. This is 62 percent

better than a system that does not use SLAM. Moreover, SemanticSLAM has a 33

percent lower convergence time compared to the same systems. This highlights the

promise of SemanticSLAM as an unconventional approach for indoorlocalization.

Keywords:-Android, Indoor Tracking, Simultaneous Localization.

Page 84: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 59

Service cloud communication using encryption standards

A.ANISHA,S.ARUL,Mrs.S.Gracianissi

KINGS ENGINEERING COLLEGE

Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable

computing at the Internet of Things devices, residing in the edge of the network, for the

purpose of delivering services and applications more efficiently and effectively. Since

fog computing originates from and is a non-trivial extension of cloud computing, it

inherits many security and privacy challenges of cloud computing, causing the

extensive concerns in the research community. To enable authentic and confidential

communications among a group of fog nodes, in this paper, we propose an efficient key

exchange protocol based on cipher text-policy attribute-based encryption (CP-ABE) to

establish secure communications among the participants. To achieve confidentiality,

authentication, verifiability, and access control, we combine CP-ABE and digital

signature techniques. We analyse the efficiency of our protocol in terms of security and

performance. We also implement our protocol and compare it with the certificate-based

scheme to illustrate itsfeasibility.

Keywords:-Internet of Things, CP-ABE and digital signature.

Page 85: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 60

Trusted Cloud Authority Controlled by Federated Clouds

Asha Darly,G.Ashishsam,Mr.S.Vinoth

KINGS ENGINEERING COLLEGE

Abstract-Cloud computing provides the path to view the computing for the users and it

provides the previous methodologies for betterment of IT providers. To offer high QOS

to customers according SLA, cloud services broker or cloud service provider uses

individual cloud providers that work collaboratively to form a federation of clouds. It is

required in applications like Real-time online interactive applications, weather research

and forecasting etc., in which the data and applications are complex and distributed. In

these applications secret data should be shared, so secure data sharing mechanism is

required in Federated clouds to reduce the risk of data intrusion, the loss of service

availability and to ensure data integrity. In the proposed system, zero knowledge data

sharing scheme is used and federated clouds is controlled by Trusted Cloud Authority

(TCA) where the secret to be exchanged for computation is encrypted and retrieved by

individual cloud at the end. Our scheme is based on the difficulty of solving the

Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order

which is NP-Hard. So our proposed scheme provides data integrity in transit, data

availability when one of host providers is not available during thecomputation.

Index Terms- Mobile cloud computing, Data encryption, Access control.

Page 86: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 61

VANET Security Using New Greedy Behavior Approach

D.Baghya,L.Balaji, Mrs.M.Parameswari

KINGS ENGINEERING COLLEGE

Abstract- Vehicular Ad-hoc networks was mainly introduced for Road safety. For

instance a network is formed within the vehicles in a road and information is relayed

along the vehicles. The vehicles are considered as nodes. Whenever a node in the

network witnesses a problem or services (Gas stations, Hotels) along the path, it

notifies the other nodes in the network. But Selfish nodes in the network can cause

problems to the other nodes in the network. Which is not detected in existing system?

Thus to detect this we use GDVAN concept, where we detect Greedy nodes. For this,

we in proposed system go in for two phases

theyaresuspicionphase&decisionphase.Wherethefirstphaseisbasedonlinearregressionma

thematicalconcept & the other is based on fuzzy logic. Further in proposed system we

also check the correctness of the RTS/CTS frames of data using context –aware

inspection scheme to detect scrambling of data.

Keywords-Vehicular Ad-hoc Networks, Greedy Behavior, DoS attacks, Linear

regression, Fuzzy logic, IEEE 802.11p.

Page 87: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 62

Software Fault Prediction Models by Optimizing the Rank Based Approach

Mr.P.Muthazhagan V.Esther Sophia,N.Ezhilarasi,

KINGS ENGINEERING COLLEGE

Abstract: Software fault prediction plays a vital role in the software development

process for assuring high quality and reliability of the software product.Current

approaches for software fault prediction might not predict the exact number of

defectsin a software module due to noisy data which results in the less software

reliability. We build on our previous work, and further study whether the idea of

directly optimizing the model performance measure can benefit software defect

prediction model construction. For improving the software reliability, the rank-based

approaches are proposed for predicting the exact number of the software modules

against the software defects. This paper introduces a learning-to-rank approach to

construct software fault prediction models by directly optimizing the ranking

performance. In this paper comparison of the learning-to-rank method against other

algorithms that have been used for predicting the order of software modules according

to the predicted number ofdefects.

Keywords: Software fault prediction, Rank Based Approach, Optimizing, defects,

Modules

Page 88: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 63

IOT SMART MIRROR WITH NEWS AND TEMPERATURE

Sowbhagiya S,Sree Durgareema A,Mrs.E.Sujatha

KINGS ENGINEERING COLLEGE

Abstract: The Internet of Things (IoT) is the logical next step in thevolution of the

Internet. The roots of theIoT go back to severalexisting technologies including

machine-to-machine communication(M2M), RFID and sensors. IoT is known for its

advantage that canhelp simplify people's everyday routine.The proposed system is

aboutthe design and development of a smart mirror that used for glancinginformation

for the people in a home environment. Face-recognitionis used to detect the user. It

provides a webpage based interface toaccess data feeds and other services. The data

feeds use web servicebased communication to extract data packets available

throughvarious APIs offered by websites. The Internet transformed our livesby

connecting us more easily to information and other people in thevirtual world. Mobile

phones then became smartphones and sincethen this concept has erupted and morphed

into the Internet of Things,things which connect us to everyday objects. Our research

isexploring a new way to use technologies to be more informed.

Thestateofinnovationcurrentlyistoprovidemoreinformation,butlessinteractiontogetit.The

devicethat

hasbeenresearchedanddesignediscalled―SmartMirror‖.Thesystemusesaraspberrypi3,web

camforface detection and a LCD panel for display.

Page 89: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 64

ATM MACHINE WITH BIOMETRIC SECURITY

Sridevi M,Srivigneshb,Mrs.T.C.Vidhya

KINGS ENGINEERING COLLEGE

ABSTRACT: In the current scenario, the way banking and transaction system is

changing in the world, the validation, authentication and confirmation of a person is

very important and should be of more concern. There is a lot of risk to losing money

and identity if the ATM PIN is misused. If it is hacked by someone then entire money

may be lost. Biometrics plays a major role in Automated Teller Machine (ATM)

system, E- Commerce, Online banking, Passports to prevent from these frauds .The

growth in electronic transactions has been increased tremendously; there is a greater

demand for fast and accurate user identification and authentication. Fingerprint

matching has been successfully used by law enforcement for more than a century. The

technology is now finding many other applications such as identity management and

access control.

Page 90: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 65

WELD POOL VISUAL TRACKING IN AUTOMATIC ARC WELDING USING

GRAPH CUT SEGMENTATION

STEFFI M,SUBBAYA AYYANESH SUDALAIMANI,Ms.T.Anithadorathy

KINGS ENGINEERING COLLEGE

Abstract: Challenging task in the welding process is detecting the shape of the non-

rigid metalduring the welding process due to the strong interference of the high

intensity arc light. Using Adaboost algorithm we can detect the boundary of the metal

by selecting an set of features that captures the relevant information . The set of

features selected by the Adaboost is most suitablefor the Bayesian classifier to

differentiate the wanted boundary and unwanted boundary fromthe captured image of

the metal welding.

Keywords: Automatic welding, Adaboost, weld pool tracking, Bayesian classifier,

graph cutsegmentation .

Page 91: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 66

MART GARBAGE SYSTEM USING IOT

Subhasini D,P.Sureshkrishnan,Ms.L.Leena Jenifer

KINGS ENGINEERING COLLEGE

Abstract: The Internet of Things (IOT) shall be able to incorporate transparently and

seamlessly a largenumber of different and heterogeneous end systems, while providing

open access to selected of data for thedevelopment of a plethora of digital services.

Building a general architecture for the IOT is hence a very complextask, mainly

because of the extremely large variety of devices, link layer technologies and services

that may beinvolved in such a system. One of the main concerns with our environment

has been solid waste managementwhich in addition to disturbing the balance of the

environment also has adverse effects on the health of thesociety. The detection,

monitoring and management of wastes is one of the primary problems of the present

era.The traditional way of manually monitoring the wastes in waste bins is a complex,

cumbersome process andutilizes more human effort, time and cost which is not

compatible with the present day technologies in any way.This is an advanced method

in which waste management is automated. This project IOT Garbage

Monitoringsystem is a very innovative system which will help to keep the cities clean.

This system monitors the garbage binsand informs about the level of garbage collected

in the garbage bins via a webpage. This webpage also send allinformation to garbage

collectionvehicles.

Page 92: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 67

ENERGY EFFICIENT MOBILE TOWER CONTROL SYSTEM

– GREEN RADIO TECHNOLOGY

Surya K,Susithra Niraimathi K,Mrs.Sheelalavanya

KINGS ENGINEERING COLLEGE

Abstract: As part of the international efforts for energy conservation and CO2

reduction, migration to an energy-efficient mobile infrastructure is of high importance

to the mobile communications industry. The objective of the design is to, simulate and

assemble a microcontroller based energy saving unit so as to reduce the power

consumption in the existing mobile base stations. In the proposed system power

consumption rate is lowered by keeping only one mobile tower in working state to take

up all communications while the remaining towers stay in idle mode. When the

number of users of the current tower reaches a predetermined value the responder

frequency is sent to the nearby efficient tower to take up the remaining load by means

of wireless sensors networks. 1Thus by keeping all the towers in idle state and

bykeepingonlyoneinworkingstatethepowerconsumptionrateisconsiderablydecreased.1M

oreoverwith The help of ambient analyzer maximum power saving is achieved. Fuel

level monitoring unit is made available devoid of manpower. Thereby 1 KW power

saved=2 KW powergenerated.1

KEYWORD: Wireless sensor network, Ambient analyzer.

Page 93: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 68

THE NS2-BASED SIMULATION AND RESEARCH ON WIRELESS SENSOR

NETWORK ROUTE PROTOCOL

Thariga V,Thaslims,Ms.S.Thangam

KINGS ENGINEERING COLLEGE

Abstract: Precision agriculture is the frontier of international contemporary agriculture

in the twentieth century. The development of precision agriculture is a significant

strategic choice of agriculture and agricultural science development in the new stage in

China. As a novel technology of information acquisition and processing, WSN

possesses a great strategic meaning in overall improving the modernize level of

precision agriculture. Routing protocol is an indispensable part which ensures the

normal operation of wireless sensor network and the high efficient transmission of

information. The existing routing protocols for wireless sensor network are classified in

this paper, while comparison and analysis research are also given on route structure,

energy consumption, robustness, expansibility, node mobility, data fusion technology,

whether QoS is supported and maximizing the network lifecycle of all kinds of routing

protocols. At the end of this paper, a simulation research is made with NS2 network

simulation software on the dynamic clustering process of LEACH protocols, which is a

typical WSN routing protocol. The simulation results show that the random cluster-

head selecting method in LEACH protocol cannot ensure the number of cluster heads

completely equal to the anticipant optimal one during the dynamic clustering process,

and it also exists that the distances between cluster heads are too close or sensors of

some regions are too far from their cluster heads. All above these situations cause the

decreasing of LEACH protocol performance.

Page 94: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 69

FINGERPRINT RECOGNITION TECHNIQUE

Theboral S,Thulasi M S,Ms.Beulah Elizabeth E

KINGS ENGINEERING COLLEGE

Abstract - The study and implementation of a fingerprint recognition system based on

minute a based matching quite frequently used in various fingerprint algorithms and

techniques. human fingerprint verification. The goal of this project is to develop a

complete system for fingerprint verification through extracting and matching minutiae.

To achieve good minutiae extraction in fingerprint with varying quality. Pre-processing

in form of image enhancement, image binarization and image segmentation is first

applied on fingerprints before they are evaluated. Histogram equalization and

fouriertransform have been used for image enhancement. Then the fingerprint

imageisbinarized using the local adaptive threshold method. Minutiae Extraction

isdone by thinning and minutiae marking technique. A simple algorithmtechnique is

used for minutiae matching. By using match score method wedifferentiate the two

fingerprints are same or not.

Page 95: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 70

VISIBILITY RESTORATION OF HAZY IMAGES USING COLOUR

ANALYSIS AND DEPTH ESTIMATION WITH ENHANCED REFINED

TRANSMISSION

Twinklin Gracia V,Udayammal@ Usha L,Ms.Enuicefreeda

KINGS ENGINEERING COLLEGE

Abstract—During sandstorm conditions (haze, fog and smoke) the quality of the

captured images always has visually degradable and undesirable color cast effects. This

is due to the atmospheric particles which are absorbed and scatter light between the

digital camera and the captured object. Under this condition, traditional visibility

restoration approaches failed to get the restore images due to poor estimation of haze

thickness and the persistence of color cast problems. In general, haze removal approach

is classified into three types such as additional information approaches, multiple image

approaches and single- image approaches. The first two methods are expensive and

have high computational complexity. Recently single image approach is used for this

de-hazing process, because of its flexibility and low cost. The enhanced restoration

model is proposed with utilization of median filter and adaptive gamma correction

technique and dark channel prior method. These approaches can overcome the

problems such as color distortion, artifacts and insufficient depth information. The dark

channel prior technique is used to estimate the atmospheric light for haze free image.

That is, transmission map will be helpful to estimate the atmospheric light. Based on

this, at least, one color channel has low intensity pixels at non sky patches. The median

filter and adaptive gamma correction are used for enhancing transmission to avoid halo

effect problem. In addition to that, fast image visibility restoration module also applied

in which it utilizes average color difference values and enhanced transmission to

restore an image with better quality

Keywords— Haze Thickness Estimation (HTE) module, patchRetinex Technique,

Laplacian-based gamma Correction technique.

Page 96: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 71

SMART GARBAGE SYSTEM USING IOT

Vickey,K.Yogesh,Ms.P.Nancy

KINGS ENGINEERING COLLEGE

Abstract—one of the main concerns with our environmenthas been solid waste

management which as also adverseeffects on the health of the society. In most of the

cities theoverflowed garbage bins create an unhygienic environment.The detection

monitoring and management of wastes is one ofthe primary problems of the present

era. Nowadays certainactions are taken to improve the level of cleanliness in

ourcountry. People are getting more active in doing all the thingspossible to clean their

surroundings. Various movements arealso started by the government to increase

cleanliness. Thesystem makes use of advanced virtual reduced (AVR)instruction set

microcontroller, LCD screen , global system formobile communication (GSM) modem

for sending data and abuzzer . The system is powered by a solar cell and a battery.The

LCD screen is used to display the status of the level of thegarbage collected in the bins,

whereas a web page is built toshow the status to the user monitoring it .The web page

gives agraphical view of the garbage bins. The display shows thecondition of the trash

stage and the other information. Thesystem puts on the buzzer when the level of the

garbagecomposed crosses the set limit or if there is occurrence of toxicgases. Thus this

scheme helps to maintain the city sparkling byinforming about the trash levels of the

bins by providinggraphical representation of the bins viawebpage.

Page 97: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 72

POWER EXALTING VERSATILE BOT

Paul Chandaran.S,K.Ramki,Mrs. G. Priyadharshinilovelin

KINGS ENGINEERING COLLEGE

Abstract—We propose a new concept of an active phased array antenna (APAA)

system that realizes multi-frequency and multi-modulation beam forming

simultaneously in an array.The proposed APAA system consists of RF modules

including an RF singal generator .The RF module measures the output RFsignal of

itself to compensate errors of output timing, amplitude and phase of the RF signals

betweenmultiple RF modules configuring the antenna array. These features realize a

flexible and accurate APAA operation.The proposed RF module is fabricated with

various functions and high performance ICs in SiGetechnology.The proposed RF

module is evaluated by measurements. It is achieved that the measurement accuracy of

output timing error, amplitude error and phase error of RF signal are 56ps-rms,0.6Db-

rms and 0.6deg-rms respectively.

KEYWORDS:RF module ,Ultrasonicsensors,Transceivers,Arduino UNO, L29 3D

DRIVER CIRCUIT.

Page 98: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 73

MACHINE LEIUTANANT FOR VISUALLY IMPAIRED PEOPLE

Anupriya M,Avinash K, Mrs.V.Sharmila

KINGS ENGINEERING COLLEGE

Abstract - In today‘s world, emerging technology plays a vital role where gadgets and

software leads to sophisticated and comfortable lifestyle for human beings with

astonishing features and real time updates but only normal people can rejoice it, people

who are differentially able such as visually impaired lack the benefits of technology. In

our society more than 20% of the people are visually challenged but not all of them

gets proper guidance. In our day today, life they cannot rely on someone for help.

Leading an independent life is a right of every citizen, so our project is a small step

towards achieving this goal. MACHINE LIEUTENANT FOR VISUALLY

IMPARIED PEOPLE uses the pi camera, this pi camera acts as an eye to these people.

i.e. the camera detects the objects that approaches the person while they are moving.

As known the pi camera is supported by raspberry pi and the software used here is the

Caffe which detects the objects and speaks out through the softwarepyttsx.

Keywords -raspberry pi, pi camera, caffee, pyttsx.

Page 99: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 74

PERFORMANCE ANALYSIS OF COMPRESSED SENSING BASED IMAGE

SENSOR FOR SMART SURVEILLANCE APPLICATIONS

Karthickmanoj.R; Balamurugan

Research Scholar, AMET Deemed to be University, Chennai

Abstract: Internet of Things (IoT) is the interconnection of physical objects through

internet for improving quality of life and involves potential applications such as

healthcare, smart cities, manufacturing and automation etc. Compressive sensing is an

emerging technique to be incorporated in the design of IoT platforms as it reduces the

raw data transmission and achieve traffic load balancing throughout networks. Video

surveillance is one such significant applications of IoT and it deals with huge amount

of data. Compressed Sensing concept can be used to reduce the amount of data being

transmitted in the wireless link. The main contribution of the paper is to design and

implement an efficient IoT enabled compressed sensing-based imaging system video

surveillance applications. The performance of the proposed work will be evaluated in

terms of reduction in samples, reconstruction quality and energy.

Page 100: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 75

ENERGY AWARE LINK LIFETIME ROUTING IN WSN

Dr.T.Sasilatha

Dean, EEE (Marine), AMET University

Abstract: Routing algorithm for data distribution sensor network nodes play a crucial

role in deciding the QoS parameter of the overall network. Various routing protocols

have been introduced for finding the shortest paths. Among which the Djikstra’s

algorithm, commonly used is Open shortest path first (OSPF). In this paper work we

propose a modified approach of Link State Routing (LSR) algorithm, through which

the intermediate nodes are designated by the energy level of the nodes. The main

problem faced while transmitting data is latency and energy consumption among

nodes. By this modified approach, the problems can be dealt easily. This adjusted

vitality mindful, load adjusting directing calculation is explicitly plan for WSN

situations. The proposed vitality mindful connection life steering calculation uses

fractional OSPF if there should be an occurrence of equivalent vitality level for two

substitute ways. Proposed calculation builds the hub lifetime without influencing

throughput. The inactivity in bundle conveyance is shifted for various experiments. (a)

Completely depleted Node (b) Partially depleted hub. The idleness of the current

steering strategy is better in halfway depleted hub and most noticeably terrible in

totally depleted Node cases. The reenactment executions are actualized in Ns2 stage

with C++ and Tcl scripting are structure dialects.

Index Terms— Life time, Latency, Load balancing, Energy Aware.

Page 101: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 76

FULLY AUTOMATED SMART RESTAURANT

Naveenkumar.N.S, Mohamed Nizar.T, ,sheefa.I,vinitha.T,

Student , Department of Electrical and Electronics Engineering

B.S.Abdur Rahman Crescent Institute of Sciecne and Technolgy,

Vandalur,Chennai – 48.

ABSTRACT -The main aim of our project is to improve the scenario in the restaurants

and hotels in a technological manner and thereby providing a fresh and attracted

customer experience. This idea is very much useful for all kind of food place whether it

is a small restaurant or a big hotel. This system provides managed food delivery right

to the table without any confusion and in an automated manner. It also provides smart

food ordering and payment options for saving time. The automation is done by using

Arduino for color sensing, PLC for conveyor control and an android application for

ordering the food. Since everything in the restaurant is made automated, it attracts the

customer and also provides a decent way to food ordering and delivery system.

Page 102: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 77

A COMPREHENSIVE REVIEW ON COLOR CONSTANCY

TECHNIQUES

Samreen Kaur¹, Dr. V.K. Banga², Er. Gurjit Singh³

Electronics and Communication Engineering Department, Amritsar College of Engineering and

Technology, Amritsar. Punjab 143001 India. [email protected], Mob no. 9592731071

Abstract: Color constancy techniques deal with restoring the actual colors of an image.

It restores the colors of every image if it is affected from any other color light sources.

Many color constancy restoration techniques are designed and implemented so far to

achieve color constancy. In this paper, a comprehensive review is presented to study

the advancements in color constancy techniques. Thereafter, a comparative analyses

are drawn to evaluate the best techniques from the existing literature. Finally, the

research gaps are formulated so that readers can focus on overcoming these issues.

Keywords: Color Constancy, Gray World, Max-RGB, Retinex Method, Gamut

Mapping.

Page 103: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 78

NOISE REDUCTION IN GRAYSCALE IMAGES USING

SEGMENTATION TECHNIQUES

Amudha K1, BeniSteena T2

1Associate Professor, Kongunadu College of Engineering and Technology, Thottiam

Abstract: Clustering algorithm is widely used Segmentation method in image

processing. The goal of clustering is to determine the intrinsic grouping in a set of

unlabeled data. The occurrence of noise during image acquisition, this might affect the

processing result. Denoise based clustering algorithm has three variations namely,

denoise based K-means, denoise based Fuzzy C-means, and denoise based Moving K-

means. denoise based clustering algorithm to minimize the salt and pepper noise and

improve the image quality. The proposed DB-clustering algorithms are able to

minimize the effects of the Salt-and-Pepper noise during the segmentation process

without degrading the fine details of the images. The result obtained PSNR and SNR

have favored the proposed denoise clustering algorithms, which consistently

outperform the conventional clustering algorithms in segmenting the noisy images.

Keywords: Image segmentation, clustering, salt and pepper noise, Image processing.

Page 104: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 79

DEPARTMENT

OF

ELECTRONICS AND COMMUNICATION

ENGINEERING

Page 105: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 80

Page 106: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 81

Digital Audio Watermarking – Using LSB Method

Abu Hanifa L,Alan Benjamin P,Dr.A.V.Mayakannan

KINGS ENGINEERING COLLEGE

Abstract - Recent years we can see rapid growth of digital multimedia and their

expansion. Digital media traveling in various forms, through email, Facebook,

WhatsApp across the Internet all over the world. However, Protection of these digital

media is difficult in these days. articularly digital audio protecting from copyright and

ownership issues is almost impossible. There many approaches possible to protect the

digital audio from these issues, Digital audio watermarking is one of the best method

among those approaches which is the way of secretly embedding information in an

audio. Nowadays, there are number of LSB algorithms and methods are available to

construct the text watermark to the cover audio file and to reconstruct the watermark

from watermarked audio. However, there are some drawbacks in those existing

algorithms. They are reducing the Imperceptibility, Robustness and Fidelity. The

proposed technique and algorithm overcomes the problem. It remains the quality of

cover audio file against the watermark audio file. through this system large volume of

text file can be inserted to the particular audiofile.

Keywords – LSB, WAV file, Watermarking, SNR, MSE, Imperceptibility,

Robustness, Fidelity, Steganography

Page 107: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 82

Invisible Image Watermarking using Modified LSB

Alan Joseph Mosses.D,Angela,Mr.S.Rajkumar

KINGS ENGINEERING COLLEGE

Abstract: This paper presents a high secured and robust watermarking technique for

images. It consists invisibly embedding a secret data into the cover image without

degrading its quality. This watermarking algorithm uses third and fourth least

significant bits (LSB) technique. The result of this technique is much greater than

traditional first least significant bit technique in embedding data into the cover image.

Using the proposed algorithm, we will embed two bits in the third and fourth LSB. And

also there is an algorithm proposed for selecting a suitable watermark that best matches

the cover image and proof that it is invisible to the human naked eye. Experimental

results show that the quality of the watermarked image is higher. This method shows a

high fidelity of the reconstruction of images.

Keywords: Digital watermarking, fidelity, secret data, Least Significant Bit, Peak

Signal to Noise Ratio.

Page 108: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 83

MAXIMIZING THROUGHPUT OF COGNITIVE RADIO NETWORKS

THROUGH SECONDARY USER POWER CONSUMPTION IN 5G

HETEROGENEOUS NETWORKS

Angeline A,Aravinthasamys,Mrs.A.R.Venmathi

KINGS ENGINEERING COLLEGE

Abstract: A cognitive radio system requires the QoS of the primary user maintained

while the spectrum allocated to the primary user is used by the Secondary user. The

primary user in such cognitive radio systemmay use a queue to store packet during

transmission. In such a system the stability of the queue has to be ensured. This sharing

of available spectrum may happen through any of the modes of operation such as joint

interweaveunderlay mode or only-interweave mode. In joint interweave-underlay

mode, secondary user transmits when primary user is absent and transmits adaptively

when the primary user is present. In the Joint Interweaveunderlay mode, the role of the

interference constraint on the secondary user transmit power is of vital importance.

This technique of adaptive packet spreading in time to increase achievable packet

throughput along with interference constraints on secondary user transmitpower.

Page 109: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 84

Stateless Auto Configuration And Secured Data Transmission In Ipv6 Networks

Through Ipsec Tunneling

Aruna Devi R,Avinashk,Mrs.B.Anithavijayalakshmi

KINGS ENGINEERING COLLEGE

Abstract- IPV6 is the ultimate solution for the running out of ipv4 address and is the

one, having various advance features to meet varying demands of present and future

requirements. Concepts of stateless auto configuration and IPSec VPN make the

addressing easier and also help to overcome the security issues. Stateless auto

configuration helps in implementing plug and play services of automatic address

assignments in large area networks and the features of IPSec VPN tunnels provide,

remotely secure connection for transfer of information between peers. Stateless auto

configuration and IPSec VPN networks are implemented with security protocols for

key management and exchange to feature encryption, authenticity and integrity. These

all networks are designed using GNS3 network simulator. The testing and verification

of data packets is done using both VPCS tool and Wire Shark to ensure the encryption

of data exchanged between 2peers.

Keywords: Addressing, IPv6, Tunnelling, IPSec, VPN.

Page 110: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 85

AUTOMATIC QUALITY ASSESSMENT OF POTATOES USING LabVIEW

Barath K,M.Barath,Mrs.V.Kavitha

KINGS ENGINEERING COLLEGE

Absract- Ensuring the quality of the food products before they reach the consumers is

important task in the food industries. Potatoes are one of the major staple foods of the

world. Some potatoes contain green skin which indicates the presence of large amounts

of alkaloid content. This can cause various harmful health issues such as, headaches,

diarrhea cramps. Therefore the main objective of the project is to sort out such potatoes

from the normal ones using automatic and mechanized techniques with the help of Lab

VIEW and image processing. This would be a major breakthrough in leading food

industries that use potatoes as their major source. The technique can help the industries

in replacing the large amount of labour and the time caused by them. This also

eradicates the manual error caused by the labourers. The proposed method works on

the process of acquiring the image of the potatoes that are passed on the conveyor

using the concept of image processing. The potatoes with the green colour when

capture dare detected using Lab VIEW vision assistant technique and are pushed out of

the conveyor using an electric drive pusher that is driven by the hardware my RIO.

Thus the system is efficient in sorting out the defected potatoes from the goodones.

Page 111: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 86

METAL SEGREGATION USING LabVIEW

Blessy P J,Blessyta Juliya Sarah R,Mr.A.N.Duraivel

KINGS ENGINEERING COLLEGE

Abstract-Sorting systems remain essential in numerous areas with diverse applications

such as in manufacturing industry, factories, warehouses, etc. Segregation of products

in an industry is a tedious industrial process, which is generally carried out manually.

Continuous manual sorting creates quality consistency issues. Segregation based on

different characteristics like weight, colour, type required different equipment for

weighing and then separating. We have proposed an efficient method which uses

shapes for sorting the metals LabVIEW. By usingthis parameters and using image

processing & LabVIEW, the speed of the sorting process will be increased.

Growing technological awareness and skills of the machine users as well as increasing

the technical support by sorter manufacturers are the optimistic factors in growing the

acceptance of sorting machine. Conveyor system and the sorting hardware are also

controlled and monitored at the remote location using the LabVIEW Software. The

cameras ability to separate the noisy colours is a prime factor in this analysis.

Page 112: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 87

SMART SURVEILLANCE ROBOT USING LABVIEW

Blesy Regulas B,R.Chandrasekar,Mrs.A.Sumathi

KINGS ENGINEERING COLLEGE

Abstract- To build a cost effective and efficient robotic system, programmedto provide

a platform for surveillance purpose, thus acting as a substitutefor human in hazardous

activities like mining, exploration, patrollingsensitive areas and for various applications

that are at a safer distance.To impart intelligent control techniques for the robotic

platform, so thatit‘s dynamic performance, in varied applications of path and

dimensionstracking, can be further developed. To monitor the movement of therobot

through wireless mode ofcommunication.To establish completetransparency of data

over WIFI.The four wheeled robot mechanism , employs differential motorspeed

control. The concept of obstacle avoidance and autonomousmovement is

achievedbydesigningwiththreeIRproximitysensorstodetectobstaclesandmoveaccordingl

ybasedonthe―lefthandonwall‖technique.Wirelesstransmissiontechniquewouldbeincorpo

dfordatatransferand control from the main station. The monitoring dutieswould be

taken care by the camera mounted in the front and this wouldbe assisted by a head light

to provide proper lightning effects.The surveillance rover can be controlled in both

manual andautomatic control. The manual control can be done using both Laptopand

mobile using control buttons such as forward, reverse, left and right.Also acquiring the

video from the external environment by asurveillance process through Webcam.

Automatic control can be doneby two ways. One way is to automatically controlling a

rover based onObstacle detecting principle. While detecting obstacle it can turn

eitherleft or right direction using IR sensor and acquiring video automaticallyfrom the

external source. Another way of auto control of rover based oncolor detection

technique. Each color is assigned for each direction tothe rover and it follows particular

color and moves to the correspondingdirection.

Page 113: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 88

WATER MANAGEMENT SYSTEM USING LABVIEW

Daniel Michael,Deniya N J,Mrs.A.Sarala

KINGS ENGINEERING COLLEGE

Abstract -The local water supply is necessary in day-to- day life, but thewater is not

evenly distributed to all the people, also the children and old agepeople are affected by

drinking the impure water because of the water tank notbeing cleaned properly and in

correct time. In order to overcome these problems inlocal water supply, this project

(WATER MANAGEMNET SYSTEM usingLabVIEW) is designed. This project

includes even distribution of water in localarea along with tank level monitoring and

controlling and tank turbidity cleaningnotification and controlling. The hardware

includes flow sensor, solenoid valve,turbidity sensor, MyRIO, level sensor. The

software includes LabVIEW. Usingthis project, distribution of pure waterevenly to all

the people in local areas can beachieved. Uneven distribution of water to all the people

and in correct time, manychildren and old aged people get affected due to the existing

project.

Page 114: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 89

MULTIFACTOR AUTHENTICATION FOR SECURE ELECTRONIC

BALLOTING CREDENTIALS

Dinesh R,M.J.Elgin Sam Durai,Mrs.M.Vinu

KINGS ENGINEERING COLLEGE

Abstract- In recent times there has been a decline in the confidence of common

peopleover the Electronic Voting Machines (EVMs). Today‘s automated vote casting

methods havefaced immense controversy related to being vulnerable to hacking and

questions have beenraised about their transparency and security. In this project, it is

proposed to design anddevelop a novel tamper resistant electronic voting system that

aims to mitigate the recurringissues and flaws of existing voting machines of today.

Here, multiple layered verificationprocess is carried out on a potential voter by means

of fingerprint recognition in order toauthenticate his or her identity. Subsequently, the

person would cast the vote by pressing abutton corresponding to a particular candidate

which would be recorded in the systemproviding the vote caster a visual confirmation.

Then steganography technique is used to hidesecret messages into ordinary digital

media without drawing suspicion. This system not onlyprevents multiple vote casts, but

also eliminates the discrepancies that commonly arise with aperson claiming not to

have voted, whereas his or her name is present in the list of vote casters. The

experimental results show that the proposed method outperforms previous EVMs by

electronically transmitting their results back to the Election Commission from the

control unit, through a simple and unconditionally secure protocol

Page 115: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 90

NEURO-OCR BASED ASSISTIVE SYSTEM FOR TEXT RECOGNITION

WITH VOICEOUTPUT

Esther Chelin S J,Gold Mercy S,Mrs.K.K.Uthiraramyabala

KINGS ENGINEERING COLLEGE

Absract-Our proposed project automatically focus the text regions from the object, we

offer a novel text localization algorithm by learning gradient features of stroke

orientations and distributions of edge pixels using artificial neural network. Text

characters in the localized text regions are then binarized and recognized by off-the-

shelf optical character identification software. The renowned text codes are converted

into audio output to the blind users. Object distance measure using ultrasonic sensor.

Automatically focus the text regions from the object. Text extraction using neural

network based OCR. Text to voice conversion using phonematic concatenation for

visually impaired people.

Page 116: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 91

BASED ON TUMOR CLASSIFICATION BY USING PNN METHOD

Gomathi C,Hannah Mercy George,Mrs.A.Aruna

KINGS ENGINEERING COLLEGE

Abstract- Automatic defects detection in MR images is very important in many

diagnostic and therapeutic applications. Because of high quantity data in MR images

and blurred boundaries, tumour segmentation and classification is very hard. This work

has introduced one automatic brain tumour detection method to increase the accuracy

and yield and decrease the diagnosis time. The goal is classifying the tissues to three

classes of normal, begin and malignant. . In MR images, the amount of data is too

much for manual interpretation and analysis. During past few years, brain tumor

segmentation in magnetic resonance imaging (MRI) has become an emergent research

area in the field of medical imaging system. Accurate detection of size and location of

brain tumor plays a vital role in the diagnosis of tumor. The diagnosis method consists

of four stages, pre-processing of MR images, feature extraction, and classification.

After histogram equalization of image, the features are extracted based on Dual-Tree

Complex wavelet transformation (DTCWT). In the last stage, Back Propagation Neural

Network (BPN) are employed to classify the Normal and abnormal brain. An efficient

algorithm is proposed for tumor detection based on the Spatial Fuzzy C-Means

Clustering. Probabilistic Neural Network (PNN) also termed to be a learning machine

is preliminarily used with an extension of various image classifications based on

Training networks and Testing networks. The Probabilistic Neural Network (PNN) will

be employed to classify the various stages of Tumor cut levels such as Benign,

Malignant or Normal. Probabilistic Neural Network with Radial Basis Function will be

applied to implement tumor cells segmentation and classification. Decision should be

made to classify the input image as normal or abnormal cells. This can be performed

in two stages: Gray-Level Co-occurrence Matrix and the classification using Neural

Network based function. Probabilistic Neural Network with Discrete Cosine Transform

has been imparted for Brain Tumor Classification.

Page 117: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 92

REAL TIME MPC FOR NON LINEAR PROCESS PARAMETERS

Harish N,Hemalathai,Mr.P.Muthukumaraswamy

KINGS ENGINEERING COLLEGE

Abstract - The major part of process industry is to govern the process parameters in a

chemical industryat a desired rate by implementing a suitable control strategy. We

came across many controlstrategies, yet the conventional PID controller is the most

preferred .Many researchers havebeen proposed different methods for tuning the

controller parameters to control and fulfil theneeds of a process. Model Predictive

Control is one of the controller which can enhances theperformance of PID controller

in case if MIMO systems .This paper aims to control nonlinear process parameters such

as pressure, flow, level and temperature from a single-tanksetup using Non Linear

MIMO MPC controller. The mathematical modelling used here is astates space model.

The predictive control used here re-linearizes the output whenever the setpoint

changes. Here, we use LAB VIEW software to develop the mathematical modelling

forthe above stated process setup. We examine the set-point parameters by maintaining

integraltime, proportional gain, derivative time using PID controller along with MIMO

linear MPCto differentiate the performance of MPC over PIDcontroller.

Page 118: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 93

DETECTION OF PARKINSON’S DISEASE IN EARLY STAGES

Hemalatha R,Indrapriyadarshini,Mrs.V.G.S.Archana

KINGS ENGINEERING COLLEGE

Abstract- Parkinson‘s disease (PD) is a neurological disorder which is diagnosed

through clinical examinations and observations rated on Unified Parkinson‘s disease

Rating Scale (UPDRS). Parkinson‘s involves the malfunction and death of vital nerve

cells in the brain, called neurons. However, in the earliest stages of the disease, this

approach might be inconclusive and result in misdiagnosis. Therefore, expert systems

are needed to increase the detection accuracy of PD. In this paper, different methods of

diagnosis of Parkinson‘s disease through voice in early stages are examined. Different

voice parameters like pitch frequency, zero crossing detector, short time energy,

formant which shows significant variations between normal person and Parkinson‘s

patient are determined and analyzed using Support Vector Machine (SVM). These

voice parameters will be computed using MATLAB based coding.

Page 119: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 94

SECRET KNOCK DETECTING DOOR LOCK

Iyangkani R,Jancy Rani A,Ms.M.Gomathi

KINGS ENGINEERING COLLEGE

Abstract- Security is a major concern in our day to day life, and digital locks have

become an important part of these security systems. There are many types of security

systems available to secure our

place.SomeexamplesarePIRbasedSecuritySystem,RFIDbasedSecuritySystem,DigitalLo

ckSystem,bio-matrix systems, Electronics Code lock. In this, a Secret Knock Detecting

Door Lock using Arduino is build which can detect the pattern of your knocks at the

door and will only open the lock if the knocking pattern matches with the correct

pattern. But then this is just used as an additional security along with the main lock. In

order to make this more powerful a push button is added to the system. This push

button activates a field and the knock has to perform within that field. The paper

highlights the security system based on Morse codetechnology using a micro-controller

which uses a saved data and compares it with the new data entered. If both the data are

same, only then the door will get unlocked, otherwise an alarm will be raised by the

system.

Page 120: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 95

CLASSIFICATION OF SKIN LESION USING NEURAL NETWORK

Janivishva V,Jeya Rani E,Mr.S.Muthupandian

KINGS ENGINEERING COLLEGE

Abstract - Skin cancer is one of the dangerous diseases which affect the human being.

Generally when a tumour occurs in the skin, the people became panic whether it is

cancer or not. To recognize skin tumour at an early stage the dermatoscopic image is

break down through different methods named as segmentation and feature

extraction.The Feature extraction in digital image processing method includes

symmetry detection, Border Detection, colour, diameter detection, and elevation .We

utilized DRLBP and GLCM to extract the texture based features. The ABCDE rule is

to govern the dermoscopy innovation for harmful melanoma skin malignancy location.

Here we proposed the Back Propagation Neural Network to classify the normal and

benign or malignant stage.

Keywords: DRLBP, GLCM, ABCDE Rule, BPNN algorithm

Page 121: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 96

OPTICAL CHARACTER RECOGNITION AND SPEECHSYNTHESIS

Jebezson G,E.Jeeva,Mrs.B.Gowripredeba

KINGS ENGINEERING COLLEGE

Abstract- Knowledge extraction by just listening to sounds is a distinctive property.

Although text can be a medium of ommunication but speech signal is more effective

means of communication than text. This project is to serve the visually impaired

persons and facilitate them by recognizing characters in the form of sound. This

process contains two part optical character recognition and text to speech conversion.

The OCR software is developed with IMAQ Vision for LabVIEW software-

developing tool. It is a PC- based character recognition tool for use with IMAQ Vision

for LabVIEW. It is designed for high-speed, reliable reading performance and

effectively generates output, even with poor image quality resulting from varying

lighting conditions and print quality.

Page 122: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 97

DESIGN OF PHOTONIC BASED MILLIMETER WAVE SWITCH

Joyce Kamali D,Kamatchia,Mrs.S.Sharonsweeti

KINGS ENGINEERING COLLEGE

Abstract - The main concept of our paper is to generate the millimeter wave switched

signal. Four wave mixing(FWM) is done by launching the signal into SOA. The three

pump beams are launched into Semiconductor Optical Amplifier(SOA).SOA is used to

increase the power of particular selected signal, which is done by selecting the

particular signal in WDM DEMUX after multiplexing all the three signals in WDM

MUX. The wavelength of pump beams are 1551 nm,1552 nm,1553 nm. The power of

the each pump beams are 6 db respectively. The three pump beams which induces non

linear effects are combined linearly. The interaction between these pump beams results

in generation of new sidebands. Main power beams are suppressed and power is

switched to the right side band. The switched signal is generated by the concept of

FWM in SOA. Switched signal has the highest power. The important parameters taken

into account include wavelength spacing between probe and pump signals and injection

current. The minimum wavelength spacing between the signals should be 0.8 nm. The

minimum injection current should be 0.2A.The switched right side band has gain of

around 14db.This millimeter waves can be used for 5Gapplications.

Page 123: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 98

WATER QUALITY MONITORING SYSTEM

Kasankathaperumal K,Mahendrakumarg,Mrs.R.Roseminthanga Joy

KINGS ENGINEERING COLLEGE

Abstract - Water is the driving force of the nature. Still in many areas of our world,

people don‘t haveaccess to clean and safe domestic water. Monitoring the quality of

water will help us controlthe pollution level as well. Physical conditions such as

temperature, turbidity, pH value ofwater play important role in determining the quality

of water. The paper makes use of amicrocontroller with the help of various sensors to

start a quality check on the water. Each ofthese sensors has a separate parameter to

check. The temperature, pH, turbidity and waterlevel sensors are placed inside the

water tank with the help of probes to measure therespective parameters. Water level

sensor will be useful to avoid overflow and wastage ofwater. The LED screen will be

fixed with the model and whenever the water exceeds thepredefined level, the LED

screen will display the message as well as a buzzer will go off atthe same time. The

messages are sent to the authorized person by using a GSM module.Thisidea is very

useful specially for the remote areas which are cut off from getting clean waterand

don‘t have access to expensive water level monitors.

Page 124: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 99

SEED PURITY TESTING WITH THE HELP OF DIGITAL IMAGE

PROCESSING

Meena T,Merlin Sweetha Vinola,Ms.C.V.Umamaheshwari

KINGS ENGINEERING COLLEGE

Abstract- In this paper we used digital image processing techniques for purity test of

various seeds. Physical purity analysis tells us the proportion of pure seed component

in the seed lot. The computer software which can predict seed image for seed lot by

using digital image processing techniques is developed. Due to the advance of camera

technology, people can take digital pictures easily in any places and any time by a

camera or by a mobile phone device. Moreover, it is easy to transform and process by

using a computer system. Thus, this project employs a digital camera to capture the

image. This paper studies various digital image processing techniques which reduces

the labor input required to evaluate seedling growth rate and increases the accuracy of

thesemeasurements.

Keywords— Edge,Corner,Purity test, Digital Image, Processing, MATLAB

Page 125: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 100

JOINT TURBO DECODING FOR OVERLOADED MIMO-OFDM SYSTEM

Monisha R,Nadarmuthuselvan,Mr.S.Suthagar

KINGS ENGINEERING COLLEGE

Abstract- This abstract proposes to increase the data efficiency and avoid the

interference by using discrete wavelet transform (DWT). This system is working based

on wireless communication. While using joint turbo decoding scheme for the overload

MIMO-OFDM system, it will reduce the amount of performance degradation. In the

overloaded MIMO system, the number of receiver antenna element is less than that of

transmit antenna elements. The performance of joint turbo decoding over additive

white Gaussian noise channel is evaluated through simulation. This simulation shows

more SNR, less BER for the system due to the reduction of the noiseeffect.

Keywords- i) MIMO (Multiple Input Multiple Output) ii) OFDM

(OrthogonalFrequency Division Multiplexing) iii) BER, iv) SNR (Signal to Noise

Ratio) v)DWT ( Discrete wavelet transform).

Page 126: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 101

MULTIBAND CIRCULARLY POLARIZED ANTENNA FOR

WIRELESSAPPLICATION

Nadar Sreejith Prabu,Nalinik,Mrs.A.Rublin Beulah

KINGS ENGINEERING COLLEGE

Abstract- This chapter focuses on the design of multiband circularly polarized

antennafor existing wireless services and the procedure for designing a

microstrippatchantenna for multiband Antenna is explained. The objectives of this

chapter areas follow i) To design a multiband antenna for wireless communication

bandssuch as 2.4 GHz 5.3 GHz 5.8 GHz 3.5GHz etc. ii)To achieve VSWR less than2,

to obtain optimum return loss and radiation pattern .This can done by using 3shapes

namely L-shape I-shape andU-shape.

Keywords- Circularly Polarized Antenna , VSWR ,Microstrip patch

Page 127: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 102

FAULT TOLERENCE TECHNIQUE USING CMOS VLSI CIRCUITS

Narayana Kumeresan Y,Nareshm,Mr.R.Nagaraj

KINGS ENGINEERING COLLEGE

Abstract- In this we propose a new design of counter using 6:3 counter as a stacker as

basic modulealgorithm in the multiplier to replace the ripple carry adder to add the

partial products inefficiently designed stacker units used for modifiying the

conventional multiplicationapproach are presented in counter producing 6:3 circiuts

with no xor gates on the critical pathand induces a stuck at 0 fault and recovering the

stuck at 0 fault by fault tolerencetechnique.The avoidance of xor gates resuts in faster

designs with efficient power and areautilization.Here we are using fault tolerence

technique for stuck at 0 and stuck at 1. In VLSIexisting parallel counters and also

consume less power when compared to other higher ordercounters. Additionally, we

are using our proposed counters in the existing counter-basedmultiplier architectures

which reduces latency and power consumption for 8 bit multipliers.

Key words-Cmos, VLSI design, stacker, power consumption ,gates, stuck at 0, stuck at

1, fault tolerant, counters,stuck at faults.

Page 128: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 103

TRANSPARENT AND FLEXIBLE ANTENNAS FOR WEARABLE GLASSES

AND APPLICATIONS

Narmatha B,Pavithras,Mrs.E.Verginsheeba

KINGS ENGINEERING COLLEGE

Abstract - In recent times, both the transmitters and receivers involved

requireantennas, even if some are hidden like inside laptop computers equipped with

Wi-Fi,or inside radio. According to the IEEE standards definition of terms for

antennas,antenna is basically defined as the means of transmitting and receiving radio

waves. Itcan also be defined as the transitional structure between the free space and the

guidingspace. This study aims to design, fabricate, and analyze transparent and

flexiblemono-pole antennas for an application in wearable glasses. Transparent

conductingoxide (TCO) electrodes, is selected as conductors of antennas and ground

planes ofthe wearable glasses. The average transparency of the proposed antennas is

measuredto be 81.1% in the visible wavelength. The proposed antennas are fabricated

withphysical vapor deposition (PVD) process in high vacuum. To reduce

theelectromagnetic field absorption of the human head, we introduced and

analyzedmono-pole antennas having different directions of radiation patterns. The

averagetransparency of the proposed antennas in the visible wavelength and the

electricalconductivity will be greater than the existing system. The fabricated antennas

willshow average efficiency of approximately 40% and 4 dBi peak gain at 2.4–2.5

GHz.Furthermore, they have a specific absorption rate (SAR) lower complies with

theFederal Communications Commission (FCC) standard, when the input power

is15dBm.

Page 129: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 104

IoT(Internet Of Things) BASED ONLINE ENERGY MONITORING SYSTEM

AND CONTROL

Prakash J,Praveenraj J,Mr.S.Rajkumar

KINGS ENGINEERING COLLEGE

Abstract - The user can monitor the energy parameters of load using an

androidSmartphone which will also work as a data logger to store current , voltage and

powervalues.The goal of this project is to visualize and monitor the power

consumption onlineon a smart phone using mobile application by integrating smart

plugs, sensors, Internet ofThings (IoT) devices and GATEWAY which enables the

communication between thevarious smart plugs and the web server hosting the

monitoring system application,thereby facilitating the user to act accordingly to save

power or to provide the reliablepower supply by making maximum use of Renewable

EnergySources.

Page 130: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 105

GREEN RADIO APPROACH TOWARDS ENERGY EFFICIENT RADIO

ACCESSNETWORKS FORMOBILE COMMUNICATION

Poonguzhali D,Prabakarana,Mrs.L.Ajitha

KINGS ENGINEERING COLLEGE

ABSTRACT- Green radio technology prefers environment friendly approach towards

the mobilecommunication. This paper discusses about modification in mobile

infrastructure for energyconservation and CO2 reduction(carbon credit).The mobile

towers are increasing in anextraordinary manner. The source for towers are based on

the power requirement. Powerrequirement in developing countries are always greater

than the generated.A critical mobilenetwork consume ~40-50MW and a diesel

generator consume ~1MG of diesel per day.Ourobjective is to reduce the energy

consumption in base stations.

Key words-CO2 emission reduction,Green Radio Technology,Power saving in base

stations.

Page 131: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 106

COMPACT FREQUENCY RECONFIGURABLE 4X4 SLOT ANTENNA FOR

WIRELESS APPLICATION

Aravindh K,Anushat,Mr.P.Muthukumaraswamy

KINGS ENGINEERING COLLEGE

ABSTRACT- A reconfigurable antenna system is used to improve data

throughputlimitations in multiple input multiple output wireless

communicationsystems. By inserting varactor inside the

slot,easyreconfigurabilityofdifferent frequency .The radiation pattern is reconfigured

by using micro-controller .The 4x4 MIMO antenna is designed to operate

variousfrequency for WLAN,LTE,satellite and other technology.

Keywords- reconfigurable slot antenna , coaxial feed , stripline,port

Page 132: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 107

GSM BASED VOICE DATA THROUGH BONE CONDUCTION

Arjun S,Priyar,Mr.S.Rajkumar

KINGS ENGINEERING COLLEGE

Abstract - The GSM based SoundBite hearing system allows people with to hear the

sounds via boneconduction to wear an intraoral device and a small microphone in the

deaf ear to regain losthearing. This device consists of GSM modem PIC16F877A

controller and audio amplifierunit. GSM modem will receive incoming calls and

automatically answer the call via ATCommands. Then incoming voice signal is

converted into low frequency vibration signal thatfed through the teeth to cochlea.

Unlike implantable bone conduction hearing aids, SoundBiterequires no surgery.

Rather, it is the world‘s first removable and non- surgical hearingsolution to use the

well-established principle of bone conduction to imperceptibly transmitsound via the

teeth. Custom made for each person, SoundBite is simple, removable, andtotallynon-

invasive.

Page 133: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 108

DETECTING DRIVER DROWSINESS BASED ON SINGLE EEG CHANNEL

Sundar R,Suryas,Mr.A.N.Duraivel

KINGS ENGINEERING COLLEGE

Abstract -In the recent years, driver drowsiness has been considered one of the major

causes of road accidents, which can lead to severe physical injuries, deaths. As

aconsequence, a reliable driver drowsiness- detection- system is necessary to alert

thedriver before an accident happens. For this reason, an Electroencephalogram(EEG)

has recently drawn attention in the field of brain-computer interface andcognitive

neuroscience to control and predict the human drowsiness state. Tomeasure the drowsy

state we are going to fetch the data of the neurowaves by usingpatchelectrodes.The data

from the electrodes are amplified by using EEGamplifier. The data is sent to the

computer with the help of UART and softwarecalledLabVIEW is used for signal

filtration process. LabVIEW we can performvarious operations to process the data in

the form required by us. After the data hasreached the LabVIEW, we do a process

called feature extraction. This processcomprises of various filters that work upon

mathematically to get values of thevariables needed by us. These variable values are

useful in determining thecharacteristics of the wave shown above and hence we predict

the state of the mindby just knowing these characteristics. Operations such IIR Filters,

windowing,amplitude detection are carried out here with the help of the myDAQ . This

featurewill indicate the stage. This result could be displayed using an external

hardwareindicator. When the driver goes to drowsy state we have applied an alert

systemlike buzzer to wake up thedriver.

Page 134: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 109

NOVEL BROADBAND ANTENNA DESIGN FOR RFID TAGS

Raja S,Ramk,Mrs.A.Sumathi

KINGS ENGINEERING COLLEGE

Abstract— The UHF RFID system eliminates the need for manual processes, by

increasing inventory visibility and automating workflows but these RFID tags cannot

perform well in the presence of metallic objects. In this paper , a novel UHF RFID tag

antenna which can be suitable for metallic objects is proposed. The proposed

microstrip antenna consists of two substrates separated by an air layer the upper

substrates is implemented with a folded dipole and two slots inserted at the end of the

dipole. Second substrate is a double face with parallel bars on the top face and a metal

palne on the bottom. The printed parallel bars on the topface of the second substrate is

to increase the bandwidth of the antenna by creating multi resonant bands. The main

aim of the proposed antenna is to improve the gain of the antenna and to bring the

return loss better than -10dB.

Keywords—Antenna, UHF, RFID, Substrate, Metallic objects, gain

Page 135: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 110

COST EFFICIENT IOT BASED HOME AUTOMATION WITH SECURITY

Anitha M,Daniyat,Mrs.A.R.Venmathi

KINGS ENGINEERING COLLEGE

Abstract - Having witnessed a surge in the number of users of internet over the past

decade, technologyhas made Internet a part and parcel of life, and IoT is the latest and

emerging internettechnology. Internet of things is a growing network of everyday

object from industrial machine to consumer goods that can share information and

complete tasks while you are busywith other activities. Wireless Home Automation

system(WHAS) using IoT is a system thatmakes optimal use of computers or mobile

devices to control basic home functions andfeatures automatically through the internet

from anywhere around the world, an automatedhome is sometimes called a smart

home. It is meant to save the electric power and humanenergy. The home automation

system differs from other system by allowing the user tooperate the system from

anywhere around the world through internet connection. In thispaper, we present a

Home Automation system(HAS) using NodeMCU that employs theintegration of cloud

networking, wireless communication, to provide the user with remotecontrol of various

lights, fans, and appliances within their home and storing the data in thecloud. The

system will automatically change on the basis of data input by the user from themobile

application. This system is designed to be low cost, reduced space, power-efficientand

expandable allowing a variety of devices to be controlled. This wireless

Automationsystem is robust and the performance can be improved by in the days

tofollow.

Page 136: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 111

INTEGRATION OF AUTOMATIC STREET LIGHT AND WATER

LEVELMONITORING FOR SMART CITY

Rachel A,Revathim,Mrs.A.Aruna

KINGS ENGINEERING COLLEGE

Abstract - Street light have become a vitalaspect including road safety. A lot

ofelectricity is consumed by street lights andwater level. So it is imperative to save

thepower as much as we can. The cost ofelectricity continues to increase as wastageof

energy increases. It has become verycrucial for saving power. Street lightmonitoring

control is an automated systemdesigned to improve the efficiency byautomatically

controlling the switching ofstreet light. This system also monitors the waterlevel in a

tank and also controls watersupply to Panchayath, etc. If the water levelis higher than

threshold level, motor runs.Otherwise, water level is below thethreshold level, motor

does not run to avoidpower consumption. Using a USB camera,the water level is

monitored whether thewater is manually increasing or not. These are controlled

throughInternet of Things. The street lights andwater level are controlled by the base

serverby just sending a notification by using IoT. Itconsistsofaclient-

serverapplication.WecancontrolfromServersideaswellasfromClientside.Thissystem can

control frommonitor at Server side and at Client sidefromapplication.This system can

control from longdistance. The primary motive behindimplementing this project is to

save theenergy and to reduce man power. Thisproject describes a new solution for

street light and water level controlsystem.

Page 137: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 112

MOTION CONTROLLED ROBOT USING MULTI SENSORS POWERED BY

AI ENGINE

Rithika J,Ravi Kumar K,Ms.M.Gomathi

KINGS ENGINEERING COLLEGE

Abstract - Introducing speech recognition is a natural goal in robotics as it is one of

the most commonforms of communication for humans. In human language, this is

referred to as naturallanguage. This is very advanced as it depends on the context, the

person, the moment, etc.Although a great deal of progress has been made in robotics in

recent years, it has not yetmastered this. Leaving aside highly advanced robots in

laboratories such as ICub, or the veryimpressive progress made in the military sector,

the problems encountered in personal roboticsare more mundane. Speech recognition

with a mobile robot depends not only on the quality ofthe components but also on the

environment (as always with robotics), which can be noisy orcause an echo, or modify

the perception of the sound due to its shape (the robot could perceive a sound

differently if it is going along a wall for example). As you will see later, controlling

arobot using your voice is more complicated than sitting in front of your desk dictating

to yourcomputer using a microphone. Automatic speech recognition together with

speech synthesis ispart of what is known as speech processing. The aim of speech

recognition is to analyse a wordor phrase picked up by a microphone and transcribe it

in text form onto a computer (orequivalent) so that it can be used. The main uses of

speech recognition are automatic dictation or vocal applications over thetelephone.

Page 138: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 113

DESIGN OF AQUAD BAND-NOTCHED UWB RECONFIGURABLE PATCH

ANTENNA

Darani M,Kalaimathip,Mrs.E.Verginsheeba

KINGS ENGINEERING COLLEGE

Abstract- The Ultra wide band(UWB) application is compactreconfigurable patch

antenna with quadband notched characteristics. The antennais constructed of a

conventionalrectangular micro-strip patch antennawith partial ground plane and T-

shapedstrip employed in the ground plane aswell as an inverted Ω and L- shaped

slotsincorporated within the radiated element. The notched functions are created by

theinverted Ω and L-shaped slots, which arerealized for Wi-MAX (2.382GHZ)

andWLAN (6.549GHZ). The T shapedparasitic strip generates the third notchfor the

band uplink satellitecommunication (9.589GHZ). The measured operating -30 dB

bandwidth ofthe proposed antenna ex-tends from 2.39to more than 18 GHz except at

thenotched band The prototype antenna hasa total area of 20×20×2 mm3 Theefficiency

acquired is 62% , gain is67db.

KEYWORDS- (i) Gain (ii) Directivity (iii) Bandwidth(iv) Efficiency (v) Polarization

(vi)VSWR (vii)Radiation pattern

Page 139: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 114

ANTI THEFT PROTECTION OF VEHICLE BY GSM &GPS WITH

FINGERPRINTVERIFICATION USING EMBEDDED SYSTEM

Ajitha A,Justinae,Mrs.A.Rublin Beulah

KINGS ENGINEERING COLLEGE

Abstract -In this current world where technology is growing up day by day

andscientific researchers are presenting new era of discoveries, the need forsecurity is

also increasing in all areas. At present, the vehicle usage isbasic necessity for everyone.

Simultaneously, protecting the vehicleagainst theft is also very important. Traditional

vehicle security systemdepends on many sensors and cost is also high.When the

vehicle is stolen, no more response or alternative could beavailable to help the owner

of the vehicle to find it back. The main goalof this paper is to protect the vehicle from

any unauthorized access, usingfast, easy-to- use, clear, reliable and economical

fingerprint recognitiontechnique. This vehicle security system intimates the status of

the vehicleto the authoritative person (owner) using Global System for Mobile (GSM)

communication technology. If the person is certified, vehicle access is allowed. Else

SMS will be sentto the owner and the engine will be immobilized. The prototype

modelfor the security system is built on the embedded platform using PIC

microcontroller which controls all the processes and cost is also very stumpy.On higher

end theft attempts like cutting battery power supply, protectionto the vehicle is

provided by Engine Control Unit (ECU) embedded onmicrocontroller.By using GPS

technology, vehicle can be identified very easily. Thus, thesystem provides security at

both levels, i.e. when battery supply isprovided or not. The main aim of this project is

to prevent the vehiclefrom probable theft. To achieve this we are incorporating security

byincluding bio metrics, i.e. a fingerprint.In the beginning the owner of the vehicle

must store his/her ownfingerprint in the finger print module. The GSM modem is used

to sendand receive messages to and from the owner. The owner‘s mobile numberhas to

be set fixed during the coding.To start the ignition of the four- wheeler one should

enter the authorizedfingerprint. If anyone enters an unregistered fingerprint, the owner

Page 140: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 115

Sensorless Control of interior Permanent Magnet Synchronous Motor Drives

With Cyclic Fluctuating Load Based on MRAS Scheme

M.Barath,R.Thirumaran,Mr.S.Muthupandian

KINGS ENGINEERING COLLEGE

Abstract: Model reference adaptive system (MRAS) is typically employed for rotor

position/ speed estimation in sensorless interior permanent magnet motor (IPMSM)

drives. In this paper , a new MRAS scheme based on fuzzy logic is proposed in order

to avoid the difficulties involved with manual tuning of the control parameters and also

fuzzy controller replaces the conventional PI regulator. This control scheme consists of

two models, namely current model of the IPMSM as the adjustable model, and the

motor itself as the reference model. The difference between the outputs of the two

models gives the estimated value of the rotor speed through a adaptive mechanism and

position can be obtained by integrating the speed. In order to lower the motor speed

ripple caused by the cyclic fluctuating load, a feed- forward compensation strategy

with the load-matching motor output torque pattern is developed. The proposed system

has to be implemented in MATLABsimulink.

Page 141: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 116

Virtual Instruments Based Water Quality Measurement System Using Fuzzy

Logic

V.Narayana Vadivu,K.Jeevarani,Mr.R.Nagaraj

KINGS ENGINEERING COLLEGE

Abstract— Water is vitally important to every aspect of our lives. Monitoring the

quality of the drinking water is essential as polluted water can cause deadly diseases. In

this paper different physical and chemical water quality parameter like pH, turbidity,

conductivity, total dissolved solids(TDS) and dissolved oxygen etc. are measured using

different sensors. The data obtained from these sensors will be sent to the PC

(LabVIEW) where this data is analysed, and the water quality indicators are compared

with the reference data provided by Indian Standards Institute (ISI) and Bureau of

Indian Standards(BIS) and results are displayed as per the requirement. This paper

proposes the technique to combine and infer the multi-sensor data to get the water

quality result, by which accurate results can be obtained. As the water quality is

subjective by nature and highly indeterminate, which causes uncertainties in the data.

To overcome data uncertainties problem, this paper proposes fuzzy logic model for

acquiring the accurate waterquality.

Page 142: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 117

Artificial neural network based intelligent flow transmitter

Mathana Thamarai P,A.Rishwana,Mr.S.Suthagar

KINGS ENGINEERING COLLEGE

Abstract— A variable area type flow meter called rotameter, a measuring instrument

in which position of the float in a transparent tube is taken as flow rate indicator which

is used for local indication . It is used as a primary sensor. For remote indication float

moment of rotameter is converted into electrical signal which helps in the process

industries. For non contact flow measurement a hall probe sensor should be placed

outside the rotameter which acts as secondary sensor. A circular permanent magnet is

placed on the float of the rotameter , as water flow through the rotameter the float

increases and the magnet varies its position and the hall sensor sense the change in

magnetic field created by the magnet. The hall voltage varies with different parameters

like temperature, liquid density, viscosity……etc affect the hall voltage measurement.

Temperature is non linear with respect to the hall voltage. The hall sensor output is

amplified by instrumentation amplifier and that is given as input to the ANN.

Implemenation of ANN is done in three steps which are sampling, training and testing

process. Training is the learning process. The difference between the network output

and desired output is the error signal to ANN. If the network output is not equal to the

desired output then by weight adjustment ANN tries to give the output which is close

to the the desired output. This output is converted again to flow throughprogramming.

Page 143: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 118

CROSS CHANNEL HEARING AID USING BONE CONDUCTION

J.Bala Karthick,S.Siva,Mr.S.Rajkumar

KINGS ENGINEERING COLLEGE

Abstract: Hearing aid was the only cure for people who have audibilityissues. But in

the case of people with ear drum damage, the hearingaid cannot be a possible solution.

So as to overcome this difficulty wehave to surpass the ear drum and send the signals

in the form ofvibration to the inner ear technically known as Cochela. This thuspasses

the sound signal to the brain receptors. We have come up withan idea where we use a

bone conductor to do the above process in therespective sequence to surpass the ear

drum and enhance the hearingcapability of people with less or no hearing capability.

This can be aviable technology that aids people who are deaf and dumb by birthdue to

genetic disorder to listen to their own voice and learn to speak.This could be a major

breakthrough in the hearing enhancement andcan change the way of life for various

people.

Page 144: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 119

DETECTION AND DELETING THE MISUSE OF MORPHED IMAGES IN

SOCIAL NETWORKS USING FSIB ALGORITHM

S.Anand,M.Sivasangeetha,Mrs.A.R.Venmathi

KINGS ENGINEERING COLLEGE

ABSTRACT :In recent times , the society has facing an impact of morphing their

snaps from social medias and internet. This paper presents a new technology to stop

misusing of unauthenticated images in social networks and internet , we propose an

application to secure all kinds of human images from being misused. Most of the

people use social networks and Internet sites for uploading misused human images.

Here, we propose an algorithm called FSIB algorithm (i.e.) Face Skin Image

Background analytical model. With the help of this algorithm we can easily predict

whether, the image is being misused or not. And our proposed system, detect and

delete such kinds of misused images permanently from the source.

keywords-Face Recognition, Skin Segmentation, Face Skin Image Background

analytical model (FSIB algorithm)

Page 145: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 120

SMART HELMET USING GPS AND GSM FOR ACCIDENT DETECTION

P.Suganthi,M.Anitha,Mrs.V.Kavitha

KINGS ENGINEERING COLLEGE

Abstract - In today‘s world the number of road traffic accidents due to motorcyclists

has drastically increased. In order to reduce death caused by road accidents, we have

been implementing an accident detection system inside the helmet, which is the first

and foremost precaution device used to avoid death and to protect head.

Keywords- Smart technology, Artificial Intelligence, User friendly, GSM, GPS

Page 146: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 121

HIGH SECURITY LOCKER

Amritha K,Arjithc,Mr.A.N.Duraivel

KINGS ENGINEERING COLLEGE

Abstract: Nowadays, SECURITY is a very big problem. Be it our House, phone or

other things. This project is to secure a locker using a stringent combination of iris

scanner and finger print scanner to avoid theft. Two different people can be the securer

of it. Hence to open the locker the permission of both is required. The above mentioned

security methods can be brought under an app to control it via IOT thusalerting the

owner of any intrusion. Finger print verification is a reliable personal identification

method. However, manual fingerprint verification is so tedious, time-consuming that it

is not suitable for the fast moving world. An automatic fingerprint identification system

(AFIS) is widely needed to bridge this gap. AN iris coding method for effective

recognition of an individual is also used in this project. Bringing them both together

enables us to be more secure and any intrusion is alerted through the app which can be

installed in the owner's phone. Thus, this becomes the ultimate security for us.

Page 147: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 122

ENVIRONMENTAL MONITORING USING WIRELESS SENSOR

NETWORKS (WSN) BASED ON IOT.

Dilmaya T,Mayas,Mrs.A.Sarala

KINGS ENGINEERING COLLEGE

Abstract - In recent years, we have seen a new era of shortrange wireless technologies

like Wi-Fi, Bluetooth [7], ZigBee[6], emerging in front of us. The project aims at

building asystem which can be used on universally at any scale tomonitor the

parameters in each environment. Raspberry-piand sensors collects all the real-time data

from environmentand this real-time data is fetched by the web server anddisplay it.

User can access this data from anywhere throughInternet. Raspberry Pi works as a base

station which connectsthe number of distributed sensor nodes via

zigbeeprotocol.Wireless Sensor Networks (WSN) has been employed to collectdata

about physical phenomenon in various applications suchas habitat monitoring. The

Internet of Things (IoTs) can bedescribed as connecting everyday objects like smart-

phones,Internet TVs, sensors and actuators to the Internet where thedevices are

intelligently linked together enabling new forms ofcommunication between things and

people, and betweenthings themselves. In wireless sensor network system, thesensor

node sense the data from the sensor and that datacollects the end tags, end tags send its

data to the router androuter to coordinator and supply multi-clients servicesincluding

data display, the whole data will be stored in basestation and the stored data will send

to the cloud (Ethernet)and the client can visit the base station remotely via

(website)Ethernet. Such a sensor are temperature, vibration, pressure,moisture, light,

andpollution.

Key Words: (Raspberry pi; Zigbee; Sensor node;Sensors)

Page 148: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 123

IOT THEFT DETECTION USING RASPBERRY PI WITH FACE

RECOGNISATION CAMERA

Jeya Mani R,Jothis,Mr.S.Muthupandian

KINGS ENGINEERING COLLEGE

Abstract: Here we propose IOT based theft detection project using Raspberry Pi where

we use image processing on live video to detect theft using motion and also highlight

the area where motion occurred. Along with this we are using face recognition camera

here to identify the thief face if he/she uses a mask. This system secures offices/homes

from theft by instantly detecting theft as well as allowing user to view the theft details

thereby highlighting the theft details and saving the video in a USB drive. In this

system we use acamera along with raspberry pi along with LCD display IR for night

vision and USB drive for storage. The system is powered by a12V power supply. As

soon as camera motion is detected in camera footage the system uses image processing

to detect exact area of motion occurrence and highlights it accordingly. The system

now transmits the images of the occurrences over IOT to be viewed by user offline. We

here use IOT Gecko to develop the online system. Also it stores footage in a USB drive

for further reference. The user can now decode the data sent online using IOT

GeckoIOT system to view the images of the motion occurrence live remotely over

internet. Thus the system provides an innovative approach to theft detection usingIOT.

Page 149: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 124

SECURE IDENTITY BASED DIGITAL SIGNATURE SCHEME FOR

WIRELESS SENSOR NETWORKS

ELANGO T,ANBUR,Mrs.E.Verginsheeba

KINGS ENGINEERING COLLEGE

Abstract: Wireless spoofing attacks are easy to launch, it plays a significant role in the

performance of wireless sensor networks. Although the identity of a node can be

verified through cryptographic authentication, conventional security approaches are not

always desirable because of their overhead requirements. The challenging tasks in

Wireless Sensor Network are identification of spoofing attackers, determination of

number of attackers, localization of multiple adversaries and eliminating them. The

clustering approach is used to detect the spoofing attackers and localize them. This

approach fails to predict the attackers accurately. To overcome this problem, this

project proposes Intrusion Detection System (IDS) to detect the spoofing attackers. The

cluster head act, as IDS to monitor the behavior of nodes in their cluster such as packet

transmission which helps to identify the misbehaving nodes in wireless sensor network.

The simulation result clearly shows that the proposed scheme detects the spoofing

attackers in Wireless Sensor Network efficiently and robustly.

Page 150: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 125

PRECODER DESIGN FOR MIMO RELAY COMMUNICATION USING DF

PROTOCOL

T.Arun,Chirsty.S,Ms.C.V.Umamaheshwari

KINGS ENGINEERING COLLEGE

Abstract: In the present world, due to rapid growth in communication there is a need

to improve transmission of the data over wireless media so as to achieve the demand of

fast and feasible communication. To meet the above, it is required to have better and

improved throughput, data rates, BER and quality of signals received at the receiving

end of the system in advanced wireless communication. These parameters mainly

depend on the antennas used in transmitting and receiving end of transmitter and also

on external disturbances introduced in the form of noise in the system. The antenna that

attains all the parameter value at optimum level is MIMO antenna. Multiple Input and

Multiple Output (MIMO) is a smart antenna technology which employs multiple -

antennas at both ends of the transmitter and receiver side in order to improve

communication performance Relays which receive signals from the base station and

forward to destination, thus destination is able to obtain another copy of the original

signal with directly transmitted signal from source which leads to Joint diversity

effects. With the use of MIMO communication techniques, multipath need not be a

hindrance and can be exploited to increase potential data rates and simultaneously

improve robustness of the wireless links. This paper provides a detailed explanation of

this MIMO technology using DF protocol and improves BER performance by precoder

design in transmitter side and to reduce the complexity in receiver by having an

efficient equalizer design.The major objective is to analyse the performance such as

sum rate capacity and bit error rate based on robust linear precodingtechniques.This

technique provides enhanced capacity even under conditions of interference, signal

fading, and multipath.

KEYWORDS: MIMO,relay,decode and forward,fading.ISI, precoding, diversity.

Page 151: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 126

CT AND PET MEDICAL IMAGE FUSION USING WAVELET TRANSFORM

RESTORED BY ITERATIVE WIENER FILTER

Thulasi T,Ramyak,Mrs.S.Sharonsweeti

KINGS ENGINEERING COLLEGE

Abstract-Image fusion provides easy access for physician to detect abnormalities and

provide early treatment. CT image gives information about anatomical structure of

organs whereas PET scanning gives us information about fluid flow and glucose

metabolism of tissues. Hence, fusing CT and PET images can get information

regarding both anatomical structure and fluid flow. Still, enhancement is required for

fused image. Additive kind of noises is added in the fused image. These degraded

images can affect the performance quality of systems such as Medical object

recognition system. It leads to misunderstanding or misguiding by doctors to the affects

person. The main objective of this project is to restore the detailed information about

abnormalities in PET and CT images Image fusion provides easy access for physician

to detect abnormalities and by applying 3-Level DWT, and enhance the quality of

fused image by using adaptive Weiner filter which removes the additive noises present

in the fusedimage

Page 152: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 127

AN IOT APPLICATION FOR STOCK MANAGEMENT AND GOODS

ANALYSIS

Julia K,Sherins,Mrs.R.Roseminthanga Joy

KINGS ENGINEERING COLLEGE

Abstract: People nowadays are busy running their routine life and they don‘t even

have time to check what‘s available in the kitchen. An IoT application for stock

management and goods analysis is an iotapplication.ThisIoT application is used for

automatically maintaining the kitchen stuffs and also update the availability of

remaining grocery items and food items at home. This application updates can be used

when a user goes for shopping in any marts. This makes the user to feel a kitchen

friendly environment.

Keywords: Kitchen friendly, IoT, automatic maintenance,Stock.

Page 153: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 128

IMPLEMENTATION OF IMAGE FEEDING AND FACE RECOGNITION

USING OPENCV IN ROBOTICS

Jesica S,Edwartp,Mrs.L.Ajitha

KINGS ENGINEERING COLLEGE

Abstract: This paper aims at picking Face Recognition to a spot where the system

replaces the use of identity cards or any other RF cards for security purpose. Face

Recognition is the most reliable and efficient technology that is being used currently. A

system of a kind can recognise the face which is an extreme invasion of privacy. The

technology used here allows to interact more easily with the environment. This

technology can be combined with an artificial intelligence for realistic interactions with

humans. The systemuses HASH function Algorithm for the recognition for the face.

This project uses a developer board as an implementation platform. With the use of this

technology we aim at the making the system cost effective, eco- friendly and easy to

maintain with future proof.

Keywords: Hash, Face Recognition.

Page 154: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 129

UNDERWATER IMAGE ENHANCEMENT USING EMD

J Gracy,C.A. Humsarubini,Mr.R.Devaraj

KINGS ENGINEERING COLLEGE

Abstract: Underwater images play a vital role in the research of historical monument.

Undersea has a large area for submerging these monuments. Natural disaster such as

tsunami, flood unearthed some of the treasures long hidden. Recent study of these

treasures, by March 6, 2018, an US aircraft has been discovered by the expedition view

of research places have submerged. An ancient continent called kumarikandam,

sandwiched between India and Madagascar now lies scattered on the bottom of Indian

Ocean. After decades, the monuments, pillars, steps and many scattered stone blocks

were discovered. Also, another incident occurred during 2004 have explored the

monument, temple structure of Mahabalipuram. The Tsunami which pulled the sea

back about 500m and rushed back the water to the land contained the objects include

large stone lion, half completed rock relief of an elephant. Several studies and

excavation have been made and are being made by the Archeological society of India

(ASI) with the help of the Navy. Archaeologists have been working at the site to

discover the submerged treasures and monuments. To discover and capture the

submerged objects many devices have been used called Underwater Remotely

Operated Vehicle. But the image capture by this device results in low resolution. So to

enhance the quality of underwater or acoustic image many techniques have been

employed, but the result obtained from the technique does not provide the clarity

enhanced image. In this paper, to improve the low-quality image, an enhancement

algorithm has developed Empirical Mode Decomposition ( EMD ) used to decompose

the signal. Initially, the image is separated into R, G, B channel. Then, Intrinsic Mode

Function(IMF) is obtained by finding the mean of upper envelope and lower envelope..

Keywords: Underwater, Enhancement, EMD.

Page 155: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 130

REAL TIME OPERATING SYSTEM FOR THE PREVENTION OF HUMAN

HEALTH HAZARDS DUE TO TOXIC GASES

A. Induza,Janani.M,Mrs.R.Usha

KINGS ENGINEERING COLLEGE

Abstract- Almost every process or activity leaves behind some kind of waste in the

environment. In our project we would like to emphasize upon the toxic gases cast out

as waste into our surrounding. While the recent technology has led to the production of

many gas detectors which can be used in order to prevent dangerous events in

industries, our work is mainly focused on bringing into limelight the use of

semiconductor sensors for the same. This gas detector is capable of detecting multiple

gases and after which consequently produces an alarm. This alarm not only alerts the

workers in charge but also produces immediate response to activate the gas purification

process carried out by the gas purifier. Thus the hazardous gas is eliminated without

causing any harm to the nearby life and property.

Page 156: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 131

SENSOR BASED AUTOMATED IRRIGATION SYSTEM

G.Jenifer Sweety,P. Jerin,Mrs.T.Meena

KINGS ENGINEERING COLLEGE

Abstract-India is an Agricultural country, wherein about 70% of the people depend on

agriculture. An irrigation system was developed to optimize water use for agricultural

crops. The main objective of the proposed system is to provide an automated irrigation

system thereby saving time, money and power of the farmer. During summers, most

people are too lazy to water the potted plants on their rooftop lands. A system that will

help a farmer to know his field status in his home. Currently the automation role is one

of the important roles in the human life. This proposed system uses Arduino board,

which consists of ATmega328 Microcontroller. Here the humidity is monitored by

moisture sensor that can be converted in to corresponding signals to the

microcontroller. The main features of this proposed system are to sense the moisture

content of the soil and automatically switch the pump when the power is on. A proper

usage of irrigation system very important because the main reason is the shortage of

land reserved water due to lack of rain, unplanned use of water as a result large amount

of water goes waste. For this reason, we use this

automaticirrigationsystem,andthissystemisveryusefulinallclimaticconditions.

Keywords-ATmega328 Microcontroller, Moisture sensor, GSM, LCD, Wind shield

washer pump.

Page 157: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 132

PERFORMANCE ANALYSIS OF SEPIC AND M-SEPIC ON BLDC MOTOR

S. Jeyanthkumar,Josephmathew,Mr.R.Senthilnadhan

KINGS ENGINEERING COLLEGE

Abstract-In the recent years, Brushless DC motors are being extensively used and

becoming a serious competitors to induction motors for servo applications. Hence, it is

suggested that they are implemented in the fly-by-wire system of a flight where now

servomotors and induction motors are being used. The BLDCmotors are durable and

high speed motors. They have precise speed control techniques and less noise emission

which makes them very applicable for driving systems. To get an optimized output

from the motor, a compatible converteris a need. So an extensive comparative study of

the conventional boost converter, cuk converter, SEPIC and MSEPIC is done for the

BLDC motor. Each converter was designed and simulated in MATLAB and the SEPIC

and M-SEPIC were chosen for detailed study as they are a combination of buck and

boost but with a non-inverted output. The converter is connected to the three phase

A.C. BLDC motor through an inverter. Sinusoidal output waves were generated by

using both PWM and SPWM pulses. A three phase six step inverter is used in the

simulation. It is seen from the simulation results that the MSEPIC hasahigh static gain

and hence produce high output voltage levels for small input values. This system of

driving the BLDC motor using the modified SEPIC topology can be implemented in

driving systems where high efficiency is demanded.

Page 158: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 133

SMART CURRENT THEFT DETECTION AND POWER DISCONTINUITY

MONITORING USING LabVIEW

Jothi Priya.K,Judsonabraham,Mrs.S.Lekhasri

KINGS ENGINEERING COLLEGE

Abstract-With emerging developments in all sectors and growing demands, electricity

has become priority for every individual and every organization. The basic procedure

for power supply includes power generation, power transmission and power

distribution to the destinations. When power reaches every house often there arises

issues like abrupt changes in voltage which can damage the home appliances. Similarly

another issue faced nowadays is the theft of current and discontinuity due to

atmospheric causes. Our project focuses on providing a detecting technique for these

cases and intimating the concerned person about the event. Labview tool is used to

design a program for detecting and intimating about the low voltage problem, power

discontinuity and current theft occurrence. A communication application, specially

designed for

LabVIEW,called―Dashboard‖isconnectedthroughwifiandusedforreceivingmessages.Aha

rdwarecircuit is designed for acquiring input and through myRIO kit the analog signal

is given into the labVIEW. The processing takes place in labview and the output

isgenerated.

Page 159: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 134

A MODERN USER DESIRED DRONECONTROLLING SYSTEM

USING MOTION DETECTION SENSOR

M. Karthik,M. Karthika,Mr.S.Rajkumar

KINGS ENGINEERING COLLEGE

Abstract-The technologies are increasing at a faster pace. It is known that the

utilization of technologies in various sectors are very low. So we propose a system

where we enable virtual load operating technique with the help of MOTION

DETECTION sensor. The MOTION DETECTION sensor technique is used to detect

the orientation of user‘s hand motion. Based on the hand motions the respective droneis

operated. The operation is executed using hand gestures.Abstract—Augmented and/or

virtual reality (AR/VR) are (5G) networks. To meet the requirements of lower latency

and massive data transmission in AR/VR applications, a solution with software-defined

networking (SDN) architecture is proposed for 5G small cell networks. On this basis, a

multi-path cooperative route (MCR) scheme is proposed to facilitate the AR/VR

wireless transmissions in 5G small cell networks, in which the delay of MCR scheme is

analytically studied. Furthermore, a Service Effective Energy optimization (SEEM)

algorithm is developed for AR/VR wireless transmission in 5G small cell networks.

Simulation results indicate that both the delay and service effective energy (SEE) of the

proposed MCR scheme outperform the delay and SEE of the conventional single path

route scheme in 5G small .

Page 160: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 135

EMERGENCY CAR DOOR LOCKING SYSTEM USINGRASPBERRY PI

A.Udhuman Shariff,V. Varsha,Mrs.S.Sharonsweeti

KINGS ENGINEERING COLLEGE

ABSTRACT-The safety locking system is designed to prevent accidents happening

while opening the car door and to provide safety to passengers and pedestrians. To

prevent accident due to passenger‘s carelessness, in this planned to control the car door

locking automatically using distance measuring system, child lock and Camera. Due to

this passenger can‘t open their car door from inside while object is moving towards the

car. The entire system is controlled with the help of Raspberry PI. In this proposed

system it will be fitted with a distance measuring Camera in car. This camera sends and

receives the signal near the outer surface of the car door. Due to this if any object

approaches the car, the signal gets reflect and received by the receiver by using camera.

Due to quick return of the signal, the Raspberry sends signal to the door lock and it get

activates according to the program performed on the Raspberry. Due to this the

passengers can‘t open the car from inside, so sudden opening can be prevented. But we

can open the car from outside. If the object/person moved then the signal passes long

distance and the receiving time get increased, so the controller sends the signal to the

lock and it comes back to its original position.

Page 161: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 136

Design and Fabrication of Multifuel Engine

Thirunavukarasu.K,Ltanya,Mr.S.Suthagar

KINGS ENGINEERING COLLEGE

Abstract: In this we have done the engine to run with the following fuel and gases:-

petrol, Lpg, Kerosene, HHO. We have studied the basic properties of fuel and gases.

From this gas generated throughout electrolysis of water and then this gas is used in

vehicle as a fuel with gasoline by mixing it with air. This results the increased mileage

of vehicle 30% to 60% and reduces the polluting contents from the exhaust gases.

Taking a prominent place in these strategic plans in hydrogen as a future energy

carrier. Hydrogen gas combined with the standard air/fuel mixture increases the

mileage. This forms of alternative fuel is provided by a hydrogen generator mounted in

the vehicle. Here in addition hydrogen generating unit is made to produce hydrogen. It

is actually an electrolysis unit having high grade stainless steel, graphite,

semiconductors as electrodes in a closed container and mixture of distilled water and

suitable ionic solution (KOH or NAOH) as electrolyte. Power for electrolysis is taken

from battery provided(12V). This battery can be reached from a dynamo/alternator

provided on the vehicle.

Keywords – KOH, NAOH,SI-Engine, Electrolysis of water, Hydrogen Cell.

Page 162: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 137

INVESTIGATION ON WEAR AND MECHANICAL ANALYSIS OF WOVEN

SISAL, JUTE, FLAX / REINFORCED WITH CALCIUM CARBONATE AS

FILLER EPOXY COMPOSITE

Suganya.N,Mstephenraphel.Jrs.A.Rublinbeulah

KINGS ENGINEERING COLLEGE

Abstract: Today, polymers are commonly used in various application from day to day

consumable to highly sophisticated equipment. This wide ranging application of

polymers makes it difficult to avoid its usage, even though it cause environmental

problem. Polymers have replaced by many conventional material. Natural plays an

important role in developing high performing fully biodegradable green composites,

which will be a key material to solve environmental problem in future. easily

decomposable and recycle polymeric material and their composite along with nature

fibres ignited from this investigation we found the good tensile flexural property of the

composite the natural fibre slowly replace the synthetic fibre from its environment

impact machining flexural property of the composite the natural fibre slowly replace

the synthetic fibre from its environment impact machining towards a revolution in

engineering material in this project work tensile, flexural, impact and hardness test is

made for the sisal, jute and flax reinforced with filler of barium sulphate and without

fillermaterial.

Key Words :Composite materials, Hybrid composites, Sisal fiber, Jute fiber, Flax

fiber, Epoxy

Page 163: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 138

EVOLUTION OF MECHANICAL PROPERTY OF WOVEN HEMP / FLAX

REINFORCED WITH BARIUM SULPHATE AS AN FILLER EPOXY

COMPOSITE

S. P. Sriram,Sowmyadharini,Mr.R.Nagaraj

KINGS ENGINEERING COLLEGE

ABSTRACT: Today, polymers are commonly used in various application from day to

day consumable to highly sophisticated equipment. This wide ranging application of

polymers makes it difficult to avoid its usage, even though it cause environmental

problem. Polymers have replaced by many conventional material. Natural plays an

important role in developing high performing fully biodegradable green composites,

which will be a key material to solve environmental problem in future. In this work, the

experiment of tensile, flexural, impact, and hardness test were carried out for woven

sisal, jute and flax fiber reinforced with barium sulphate as an filler material. The hand

layup method of fabrication was employed in preparing one composites. The surface

morphology of the composites was examined through scanning electron microscope.

Due the low density and high -specific properties of fiber composites, it offer cost

saving when compare with synthetic fiber, hence it has very good implication in the

automotive and transportation industry. The go green concept result in multipoint focus

towards material made from nature from its environment impact machining towards a

revolution in engineering material in this project work tensile, flexural, impact and

hardness test is made for the hemp and flax reinforced with filler of barium sulphate

and without filler material.

Key Words :Composite materials, Hybrid composites, Epoxy, Barium Sulphate as a

filler material.

Page 164: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 139

DESIGN AND FABRICATION OF MANUALLY OPERATED PESTICIDES

SPRAYER.

P.S. Smruthi,K.Sivasankari,Mrs.L.Ajitha

KINGS ENGINEERING COLLEGE

ABSTRACT: Indian is said to be an agricultural base country directly or indirectly

75% of the people are dependent on Farming. This wheel operated pesticide sprayer

equipment consumes less time and achieves uniform nozzle pressure crank mechanism

with piston pump which is driven by the wheel is also used. The main aim of the

project is to develop low cost mechanically operated sprayer for Indian middle scale

farmers.

Key words: Farming, Pesticides, sprayer equipment.

Page 165: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 140

Bi Directional Centrifugal Braking System

A.Anisha Priya,S.Anudev,Mr.A.L.Duraivel

KINGS ENGINEERING COLLEGE

Abstract: The Objective of this project is to stop a hoisted material from ground. The

brake acts as a failsafe device in case of emergency. When the winch unit fails to hold

the object and fails, the braking system will respond for the speed and stop the hoisted

material. This project is designed with centrifugal mechanism and fully works with

mechanical components. The electrical part is not added to the braking unit as

electricity is not always reliable. But limit switches and sensors can be added to the

brake unit in future based on the requirement so that the performance of the brake can

bemeasured.

Key word : Failsafe, centrifugal mechanisim.

Page 166: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 141

ACCURATE CERVICAL CELL SEPERATION FROM OVERLAPPING

CLUSTER IN PAP SMEAR IMAGES

Vedha Priya H,G. Vetrivel,Mr.Dr.A.V.Mayakannan

KINGS ENGINEERING COLLEGE

ABSTRACT: Seperation of cervical cells in Pap smear images is an important step in

pre-cancer identification Overlapping of cytoplasm is more challenging . Segment

individual cell in Pap smear images will be helpful for early detection of cervical

cancer. To tackle the overlapping issue, in this project a learning-based method is

proposed. The labeling results are then fed into physical deformation model for further

boundary refinement. convolutional networks are adopted to learn the cell appearance

features. An evalution is carried out using One data set The proposed method was

evaluated by 8 images of conventional papsmear. Comparisons with other

segmentation methods indicate that our method produces more accurate separation of

overlapped cluster.

Keywords: Cervical cancer, overlapping cells splitting, convolutional networks,

physical deformation model, Pap smear images

Page 167: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 142

RECENT DEVELOPMENTS IN COMPUTER VISION-BASED GAIT

BIOMETRICS SYSTEM

G Merlin Linda1, G Themozhi2

Research Scholar, Faculty of Information and Communication Engineering, Anna

University, Chennai 600127, India

[email protected], [email protected]

Abstract: Gait biometrics has emerged as a lot of attention in computer vision

community due to its advantage of unobtrusiveness recognition at a relatively far

distance. Gait signifies verifying or identifying the individuals by their walking style.

The use of human walking movement plays an important role in identifying subjects

criminal activities, forensics and in surveillances applications. A vision-based gait

system for surveillance applications utilizes computer vision techniques to provide

intelligent support to police and government for common needs to sophisticated

technical assistance. Modeling the accessibility of vision-based gait recognition has

been considered as the huge challenging task for uncontrolled scenarios. This paper

provides a comprehensive survey of technical advancement in vision-based gait

biometric system. The survey emphasizes on six major issues involved in a general gait

biometric system, namely representation and history of gait, gait capturing methods,

approaches in gait, challenging factors that will affect gait recognition, framework of

gait biometric system, and gait applications

Keywords: Biometrics, Gait, Computer Vision, Human, Walking, Surveillances.

Page 168: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 143

A ROBOTIC MOTION CONTROL USING FINGER GESTURE

INTERACTION

Dr.M.DevaBrinda, Karthik.S,Mohankumar.S

Associate professor,Department of EEE, Amet university

E-mail: [email protected], [email protected]

Abstract:The use of hand gestures provides an attractive alternative to cumbersome

interface devices for human-computer interaction (HCI). However, the number of hand

gestures has not been fully explored for HCI application. It is necessary to achieve

more gestures as the command of interface like embedded system via wireless. This

paper proposed a method to recognize four different hand gestures. Using camera to get

images of hand actions without gloves and then current image transfer to the

microcontroller, control the interface of electrical appliances.

Page 169: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 144

DESIGN AND IMPLEMENTATION OF SMART BONE CONDUCTION

HEARING AID USING ASP

Dr.M.DevaBrinda, Karthik.s

Associate professor,Department of EEE, Amet university

E-mail: [email protected], [email protected]

Abstract: People with hearing loss problem, often use low quality analog hearing aids,

which are nothing but a simple ana- log audio amplifier or a passive audio

reinforcement system. They are generally less flexible and are simply designed

together sound energy and direct it into the ear canal at higher volumes. For persons

who are not compatible with Air Conduction system Bone conduction is used. At

present BAHA (Bone Anchored Hearing Aid) is used which needs surgery implant for

patients. The project aim is to design a smart earplug system integrated with non-

invasive bone conduction technique which is capable of doing some advanced audio

processing to provide voice enhancing, noise filtered audio for the hearing-impaired

people. The system is also designed to work as an embedded music player, a life

activity tracker and a Smartphone companion. It can even read the SMS that is just

received on your Smart phone into your ear

Index Terms—BAHA, Amplifier, MPEG, Audio Amplifier

Page 170: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 145

ANALYSIS OF LEATHER TEXTURE AND DETECTION OF SEVERITY OF

DEFECTS USING IMAGE PROCESSING AND DECISION TREE BASED

MACHINE LEARNING TECHNIQUES

Abdul Jaleel@,JoyMathew@,MohamedFeroz@, SaburaBanu#

UG Student@, Professor#

Department of Electronics and Instrumentation Engineering

B.S. Abdur Rahman Crescent Institute of Science and Technology

Vandalur, Chennai

[email protected], [email protected]

Abstract- This paper deals with identification of different types of defects encountered

in leather hides using image processing techniques. The various types of defects

occurring in leather hides are pin holes, scars, looseness in leather, scratches, etc. The

main aim is to identify the type of defect occurred in leather. Manual inspection for

surface defects has a number of drawbacks, including subjectivity, varying standards

and high costs. Automatic inspection systems using image processing can overcome

many of these disadvantages and offer manufacturers an opportunity to significantly

improve quality and reduce costs. The identification of defect area in leather hides is

achieved by applying pre-processing techniques (filtering and thresholding) to the

leather images. The classification of defects encountered in leather hides is done with

the help of statistical data (kurtosis and skewness) obtained from the histogram of the

leather images using decision tree based machine learning techniques.

Page 171: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 146

VERSATILE INSOLE MONITORING SYSTEM

Dr. GnanaKousalya

Department Electronics and Communication Engineering

St. Joseph’s Institute of Technology Chennai, India

[email protected]

Abstract — The electronics, sensing technologies, data transmission, and data

processing methodologies of wearable systems are all principally dependent on the

target application. Current foot care relies on measuring the patient’s applied pressure,

and these measurements play a crucial role during patient rehabilitation. The insole

monitor consists of sensor-laden shoe insoles that can provide a more nuanced picture

of activity than by using wrist-worn monitor. We develop a fully integrated and

wireless sensor insole which can be used in any shoe to measure the distribution and

motion parameters for patients and athletes. The project mainly aims to use electronics,

sensing technologies, data transmission, and data processing methodologies to perform

gait , physical activity monitoring and provide biofeedback especially for diabetics and

peripheral arterial disease. We use wireless data transmission method like bluetooth

low energy(BLE) to send the sensor readings to the application developed for

monitoring. We use pressure, temperature and heart rate sensor to measure the

biological parameters. Inappropriate plantar stress after injuries or orthopedic surgery

can be recorded with the sensor insole and the entire recovery process can be

significantly improved. The insole can be used for everyday patient monitoring,

rehabilitation measures, and for training analysis in sports.

Keywords—Bluetooth Low Energy (BLE), sensor laden network, biofeedback.

Page 172: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 147

OFDM BASED COMB SOURCE FOR FUTURE OPTICAL NETWORKS

M.SAMAYARAJ MURALI KISHANLALa,*, DR.A.JAWAHARb

Associate Professor, Department. of Electronics and Communication Engineering, St.

Joseph’s Institute of Technology, Anna University, Chennai-119, India

bProfessor, SSN College of Engineering, Chennai, India

ABSTRACT - In this study it is focused to design an architecture for the future optical

networks based on PON ( Passive Optical Network) called as FGON (Future

Generation Optical Network). The FGON improves the efficiency and reliability of

optical networks in providing a seamless data transmission network by integrating the

three core concepts namely WDM, PON and OFDM. The proposed network also

supports ROF (radio over fiber) for extended coverage of optical signals through

wireless in unfavorable domains. In the FGON the input signals are given using a

unique technique of creating a dense signals using WDM by creating a uniform comb

like structure by using a dual arm Mach Zender Modulator based circuit whose output

has nine flat comb structures and then the modulation technique of OFDM is used for

enabling the WDM-OFDM-PON We study the performance of the signals generated by

the comb structure in a ROF based OFDM-PON simulation network where out of the

nine generated signals seven are used for wired network and one for wireless network

and one for common uplink channel the various parameters such as the received signal

strength FGON network, BER (Bit Error Rate) are noted and analyzed, and the

received signals propagation characteristics of the FGON is noted which will be

suitable for next generation optical access.

Keywords: OFCS: Optical Flat comb source, PON: Passive Optical Network FGON:

Future Generation Optical Network, ROF: Radio Over Fiber WDM: Wavelength

Division Multiplexing, OFDM: Orthogonal Frequency Division Multiplexing.

Page 173: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 148

DEPARTMENT

OF

MECHANICAL ENGINEERING

Page 174: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 149

Page 175: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 150

SAFETY AND SECURITY DRIVING USING GSM MODEM

Bavani R,Essakil,Mr.T.Kanagaraju

KINGS ENGINEERING COLLEGE

Abstract: A micro controller based alcohol detection system is designed with

additional Features like,eyeblink sensor, Alcohol sensor, fire sensor. Initially when the

alcohol sensor senses the presence of -OH group,the engine turns off and a message

will be sent to the vehicle owner indicating thatthe driver is drunken .Further , it has the

eye blink sensor to ensure whether the driver isdrunken/sleepy and wakes him

upwithabuzzer.Firesensorisincludedforthepurposeofmeasuringhazardousgasesandalsoto

detect smoke and fire . This methodology can also usedfor automatic window

unlocking technology which can be implemented in future .

Page 176: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 151

EFFICIENT ALAMOUTI STBC ALGORITHM FOR MIMO- MULTI

CARRIER MODULATION TECHNIQUES

Camila John,Swethat,Mrs.K.Chinadurai

KINGS ENGINEERING COLLEGE

Abstract-In the present world, due to rapid growth in communication there is a need to

improve the transmission of the data over wireless media so as to achieve the demand

of fast and feasible communication. To meet the above it is required to have better and

improved throughput, data rates, BER, and quality of signals received at the receiving

end of the system in the end of the system in the wireless communication these

parameter mainly depends on the antennas used in transmitting and receiving end of

transmitter and also on the external disturbances introduced in the form of noise in the

system . The antenna that can attain all the parameter values at optimum level is MIMO

antenna .Apart from MIMO, we also have SISO,SIMO,MISO antennas available for

communication over radio channels. Among all the four methods of antennas,MIMO

gives the best diversity gain and it has got the ability to handle the external noise effect

in the most appropriate manner than the other so as to reconstruct the same signal at the

receiving end. In this paper,will analyze all the four methods of antenna by using Space

Time Block coding(STBC)algorithm. This gives the clear view regarding how the

signals are processed in all the four methods the four method of using the antennas and

what are the advantage and limitations of using each of them and what are limitations

in SISO,SIMO and MIMO which makes the MIMO technique the most suitable among

ofantennas.

KEYWORDS- SISO,SIMO,MISO,MIMO,OFDM,BER,SNR,Alamouti STBC,BPSK.

Page 177: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 152

LANDMINE DETECTION ROBOT

Ramayavathana V,Ranjithad,Mr.E.Artaralarasan

KINGS ENGINEERING COLLEGE

Abstract: The role of Robotic Applications in our day to day Life is just like food and

water. In reality it ranges from medical to military domain, many applications are

developed to ameliorate human life .Our Landmine detecting robot is a revolutionary

military advancement and a lifesaving invention that can benefit humanity as all. The

robot is guided by an android application that allows it to scan the infected area, while

a beat frequency oscillator is used as mine detection sensor placed on servo motor in

front of the vehicle. This paper proposes a design of a Landmine detecting sensor

vehicle and Implementing it into a Robot. The embedded proposed system is based on

ESP8266 technologies and guided by an Android Application.

Keywords: Robotics, Sensors, embedded system, Android Applications, ESP8266 wifi

module Technologies

Page 178: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 153

IOT BASED FARMHAND BOT

Siva Subramanian,K.Vinothkumar,Mr.R.Jeremiah

KINGS ENGINEERING COLLEGE

Abstract-Agriculture provides employment opportunities for many people on large

scale in many countries. But nowadays people hesitate to take farming as their

profession. To overcome this, we have proposed the model that does the work

including ploughing, seeding and irrigation. The control of all the operation can be

done through mobile from any part of the world. It also gives alert on temperature,

climate, soil and fertility of the given land. This bot is capable of working 24 hours a

day all year round in all weather conditions. Bot mainly aims at making smart

agriculture using two techniques namely smart cultivation and smart control.

Controlling of these operations will be through any remote smart device or computer

connected to Internet and the operations will be performed by interfacing sensor, Wi-

Fi, actuators with micro controller and arduino.

Key words - IOT, automation, Wi-Fi, PIC controller.

Page 179: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 154

SECURE ROUTING AGAINST ACTIVE ATTACKS IN WIRELESS SENSOR

NETWORKS

Navitha Velvet,P.Niranchana,Mr.K.Chinadurai

KINGS ENGINEERING COLLEGE

Abstract-Wireless sensor networks are comprised of sensor nodes. Responsibility of

the sensor nodes is to sense the cluster members id parameters and forward this data to

cluster head. As the nodes are densely deployed, there is a possibility that the data is

redundant. So, in order to remove the redundancy, cluster head performs aggregation of

the data and forward this data to base station. Sensor networks have a limitation that

they are limited in energy. As Information and Communication Technology grows,

further digital communication becomes an unavoidable part in a collaborative

computing environment and such technologies have become a part of any organization.

In this project, we propose how the collaborative computing for a project environment

is carried out and Increasing lifetime in wireless sensor networks is a major challenge

because the nodes are equipped with low power battery. For increasing the lifetime of

the sensor nodes energy efficient routing is one solution which minimizes maintenance

cost and maximizes the overall performance of the nodes. Here, fuzzy protocol in

wireless sensor networks is also discussed which are

developedtoincreasethelifetimeofthenodes.Inaddition,bymakinguseoftrust,clusterscanbe

formed. One way of achieving energy efficiency and finding malicious is to use

clustering technique. In clustering, clusters of sensor nodes are formed and every

cluster has one cluster head.

Page 180: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 155

PULSE WIDTH MODULATION BASED ELECTROMAGNETIC

INTERFERENCE MITIGATION OF BIDIRECTIONAL GRID CONNECTED

FOR ELECTRICAL VEHICLES

A Kavipriyan,S.Keerthana,Mr.V.Ganesh

KINGS ENGINEERING COLLEGE

Abstract- Grid-Connected power converter offers the electric vehicle (EV) the ability

of exchanging the energy with the power grid, which can alleviate the peak load in the

power system. However, the switch-mode electronic device inevitably brings about the

electromagnetic interference (EMI) issue, thereby significantly deteriorating not only

the electromagnetic environment of the EV but also the stability of the smart grid. In

this project proposes a new pulse width modulation (PWM) technique for

electromagnetic interference mitigation of bi-directional grid connected converter, it is

aiming to improve the power quality of power grids and the working environment of

electric vehicles (EV). Because of the frequent energy exchange in vehicle to grid, the

Electric Vehicle electromagnetic environment becomes more complex, it damages the

normal operation of various auxiliary electronic devices so reduce the stability of

Electric Vehicles.

Page 181: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 156 ISBN 978-93-5268-343-8

SOLAR FED QUASI SWITCHED BUCK BOOST SIWAKOTI-H INVERTER

K Vignesh,K. Vineetha,Mr.T.Kangaraju

KINGS ENGINEERING COLLEGE

Abstract-This project proposes a new single-phase H-Bridge transformer less inverter

with common ground for grid connected photovoltaic systems (here after it is called

‗Siwakoti-H‘ inverter). The inverter works on the principle of flying capacitor and

consist of only four power switches (two reverse blocking IGBT‘s (RB-IGBT) and two

MOSFET‘s), a capacitor and a small filter at the output stage. The proposed topology

shares a common ground with the grid and the PV source. A Unipolar Sinusoidal Pulse

Width Modulation (SPWM) technique is used to modulate the inverter to minimize

switching loss, output current ripple and filter requirements. The main advantages of

the new inverter topology are the elimination of the leakage current and ability to

provide reactive power to the grid. Further, the peak of output ac voltage is equal to

input dc voltage (unlike NPC and ANPC type which requires two times of the peak ac-

voltage magnitude). Simulations as well as experimental results from a 1 kW proto

type are presented at the end of the paper to prove the concept and also the theoretical

analysispresented.

Keywords- photovoltaic systems (PV), ‗Siwakoti-H‘ inverter, Sinusoidal Pulse Width

Modulation (SPWM).

Page 182: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 157 ISBN 978-93-5268-343-8

ARTIFICIAL NEURAL NETWORK FOR CONTROL AND GRID

INTEGRATION OF RESIDENTIAL SOLAR PHOTOVOLTAIC SYSTEMS

Asha Imannuvel J,Raveenak,Mr.T.Ranjith Kumar

KINGS ENGINEERING COLLEGE

Abstract-Residential solar photovoltaic (PV) energy is becoming an increasingly

important part of the world's renewable energy. A residential solar PV array is usually

connected to the distribution grid through a single-phase inverter. Control of the single-

phase PV system should maximize the power output from the PV array while ensuring

overall system performance, safety, reliability, and controllability for interface with the

electricity grid. This paper has two main objectives. The first objective is to develop an

Artificial Neural Network (ANN) vector control strategy for a LCL-filter based single-

phase solar inverter. The ANN controller is trained to implement optimal control, based

on approximate dynamic programming. The second objective is to evaluate the

performance of the ANN-based solar PV system by (a) Simulating the PV system

behaviour for grid integration and maximum power extraction from solar PV array in a

realistic residential PV application (b) Building an experimental solar PV system for

hardware validation. The results demonstrate that a residential PV system using the

ANN control outperforms the PV system using the conventional standard vector

control method and proportional resonant control method in both simulation and

hardware implementation. This is also true in the presence of noise, disturbance,

distortion, and non- idealconditions.

Keywords- Artificial Neural Network (ANN), photovoltaic (PV), LCL-filter, Grid

Integration (GI), Maximum Power Extraction.

Page 183: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 158 ISBN 978-93-5268-343-8

SOLAR PV POWERED BLDC MOTOR DRIVE FOR WATER PUMPING

USING CUK CONVERTER

Camila John,Swethat,Mrs.E.Artralarasan

KINGS ENGINEERING COLLEGE

Abstract-A solar photovoltaic (SPV) powered brushless DC (BLDC) motor drive for

water pumping is presented in this paper. The current sensors of BLDC motor and the

voltage sensor at the DC bus of voltage source inverter (VSI) are eliminated

completely. Instead, the speed is controlled by adjusting the DC bus voltage of VSI.

The fundamental frequency switching pulses are generated to operate the VSI in order

to minimize the switching losses and to enhance the efficiency of proposed system. A

DCDC Cuk converter is utilized to operate the SPV array at its maximum power. The

starting current of BLDC motor is bounded by an optimal initialization and selection of

the control parameters, perturbation size and frequency while tracking the peak power

of SPV array. The performance of proposed BLDC motor drive is thoroughly evaluated

and its potential is demonstrated under realistic operating conditions. The simulated

results and an experimental validation along with a comprehensive comparison with

the existing techniques demonstrate prominence of the proposed drive for SPV based

water pumping.

Keywords-solar photovoltaic (SPV), Brushless DC Motor (BLDC), voltage source

inverter (VSI), DCDC Cuk converter.

Page 184: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 159 ISBN 978-93-5268-343-8

AUTOMATIC LOAD FREQUENCY CONTROL OF MULTI- AREA POWER

SYSTEM USING SOFT COMPUTING TECHNIQUES.

I.Elizabeth,M.Janetlisa,Mr.R.Jeremiah

KINGS ENGINEERING COLLEGE

Abstract- Proportional integral (PI) is crucial for the operation and design of modern

electric power systems. Proportional integral (PI) and proportional integral derivative

(PID) controllers are used to control the various parameters of multi area power

system. Due to high peak overshoot and settling time, conventional PI and PID

controllers are not preferred for large power system. The main motivation of this

project is to control the output frequency response with minimum peak overshoot and

settling time. This project presents an ANFIS based intelligent load frequency control

approach for three area power system with three control areas. The merit of the

proposed controlling technique is that it is faster than the automatic conventional

control techniques and is able to handle the non linearities simultaneously. Also the

maximum overshoot and the settling time of ANFIS based controller are lesser when

compared to the conventional controllers, thereby reducing the oscillations locally and

of inter-area. This effectiveness of the proposed controller in improving the dynamic

response is shown and validated in three area inter-connected system. Comparison in

performances of PI, PID control technique and ANFIS control approach is carried out

in MATLAB/SIMULINK software. The results validates that the ANFIS based

intelligent controller is faster than the conventional controller and have improved

dynamicresponse.

Keywords-Proportional integral (PI), Proportional integral (PI), proportional integral

derivative (PID), ANFIScontroller.

Page 185: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 160 ISBN 978-93-5268-343-8

POWER QUALITY IMPROVEMENT IN MICRO GRID USING UPFC

Savitha S,Sankkarir,Mr.P.Manigandan

KINGS ENGINEERING COLLEGE

Abstract-This project investigates the enhancement in voltage stability margin as well

as the improvement in the power transfer capability in a micro-grid power system with

the incorporation of UPFC. Flexible AC transmission system (FACTS) devices uses

power electronics components to maintain controllability and capability of electrical

power system FACTS controller includes unified power flow controller (UPFC), Static

synchronous compensators (STATCOMs), Thyristor controlled series compensators

(TCCs), Static series synchronous compensators (SSSCs) and Static VAR

compensators (SVCs), are able to modify voltage, phase angle and impedance at

particular bus in a power system. The (UPFC) is the most versatile and complex power

electronic equipment that has emerged for the control and optimization of power flow

in electrical power transmission system. A simple transmission line system is modelled

in Matlab/Simulink environment. The load flow results are first obtained for an

uncompensated system, and the voltage and power (real and reactive power) profiles

are studied. The results so obtained are compared with the result obtained after

compensating the system using UPFC to show the voltage stability margin

enhancement. All the simulating for the above work has been carried out using

Matlab/Simulink software.

Keywords- Flexible AC Transmission System (FACTS), unified power flow controller

(UPFC), Static synchronous compensators (STATCOMs), Static series synchronous

compensators (SSSCs), voltage stability margin.

Page 186: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 161 ISBN 978-93-5268-343-8

A HYBRID RESONANT CONVERTER FOR BETTER VOLTAGE

REGULATION FOR PHOTOVOLTAIC APPLICATIONS

Sabeena J,Shalinir,Mr.V,Ganesh

KINGS ENGINEERING COLLEGE

Abstract-A micro-converter serves as a front-end dc–dc stage of a micro-inverter to

convert the power from a photovoltaic module to a dc bus. These front-end micro-

converters require isolation, high-boost ratio, wide- input voltage regulation, and high

efficiency. This paper introduces an isolated resonant converter with hybrid modes of

operation to achieve wide-input regulation while still maintaining high efficiency. The

proposed converter is designed as a series resonant converter with nominal-input

voltage and operates under two additional modes: a boost converter with low-input

voltage and a buck converter with high-input voltage. Unlike conventional resonant

converters, this converter operates at discontinues conduction mode with a fixed

frequency, simplifying the design and control. In addition, this converter can achieve

zero-voltage switching (ZVS) and/or zero-current switching (ZCS) of the primary-side

MOSFETs, ZVS and/or ZCS of the secondary-side MOSFETs, and ZCS of output

diodes under all operating conditions. Experimental results using a 300-W prototype

achieve a peak efficiency of 98.1% and a California Energy Commission efficiency of

97.6% including all auxiliary and control power at nominal input voltage.

Keywords-zero-voltage switching (ZVS), zero-current switching (ZCS), photovoltaic

module, micro- inverter.

Page 187: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 162 ISBN 978-93-5268-343-8

DESIGN AND ANALYSIS OF A HIGH VOLTAGE-GAINSTEP- UP

RESONANT DC-DC CONVERTER FOR TRANSPORTATION

APPLICATIONS

Kavitha V S,Karanj,Mr.J.Dinakaran

KINGS ENGINEERING COLLEGE

Abstract- Tthe internal combustion engine (ICE) shaft to drive vehicle accessories.

PTO system is widely used in the specialty vehicles, such as utility truck, tractors,

construction vehicles, etc. In these vehicles, there are many electric loads to be driven

by the PTO system so that the shaft of the ICE is usually connected to a generator, as

shown in Fig. 1a. Some of the key challenges of this PTO system include low

efficiency, high consumption of the fossil fuel in the ICE running at idle, mechanical

system maintenance and lifetime. Electrification in this PTO system is a good solution

to address these challenges. With the development of energy storage system and power

electronics technology, now it is possible to realize the electric power take- off (ePTO)

system in such vehicles and its application can be expanded to other types of vehicles

such as ambulance, long haul trucks, transit bus, etc. which have several electric

accessory loads. The purpose of ePTO system is using electric power source such as

battery and fuel cell to drive the vehicle electric accessories while the ICE only

provides propulsion to the wheel. It can greatly reduce the fuel consumption at the

work site. The ePTO system shown in Fig. 1b requires power converter that can

transfer the lower voltage power from battery or fuel cell to drive the high voltage

electric loads. High voltage gain step-up DC- DC converters have become an essential

part of such application. Typical requirements for such converters are high voltage

gain, high efficiency, low cost, high power density, etc. Special requirements such

aslow current ripple would be necessary for fuel cell application because the current

ripple may greatly affect the fuel cell lifetime

Keywords- Power take-off (PTO), internal combustion engine, (ICE) electric power

take-off (ePTO), step- up DC-DC converters.

Page 188: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 163 ISBN 978-93-5268-343-8

MPPT IN DYNAMIC CONDITION OF PARTIALLY SHADED PV SYSTEM

BY USING WODE TECHNIQUE

Selena T,Anishn,Mr.Santhoshkumar

KINGS ENGINEERING COLLEGE

Abstract-This paper introduces a humpback whale hunting behaviour inspired whale

optimization with differential evolution(WODE) technique based tracking algorithm

for the maximum power point tracking in the dynamic as well as the steady-state

conditions of a partially shaded solar photovoltaic (PV) system. This

‗WODE‘ technique is used for quick and oscillation-free tracking of the global best

peak position in a few steps. The unique advantage of this algorithm for maximum

power point tracking (MPPT) in partially shaded condition is as, it is free from

common and generalized problems of other evolutionary techniques, like longer

convergence duration, a large number of search particles, steady state oscillation, heavy

computational burden etc, which creates power loss and oscillations in output .This

hybrid algorithm is tested in MATLAB simulation and verified on a developed

hardware of the solar PV system, which consists of multiple peaks in voltage-power

curve. Moreover, the tracking ability is compared with the state of the art methods. The

satisfactory steady-state and dynamic performances of the new hybrid technique under

variable irradiance and temperature levels show the superiority over the state of the art

controlmethods.

Keywords-Whale Optimization with Differential Evolution (WODE), Maximum

Power Point Tracking, photovoltaic (PV).

Page 189: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 164 ISBN 978-93-5268-343-8

CONTROL OF GENERATION, STORAGE AND ENERGY DEMAND

MANAGEMENT IN ISLANDED MICRO-GRIDS

P.Uma,K.Abinaya,Mr.J.D.Srinivasan

KINGS ENGINEERING COLLEGE

Abstract-Microgrid is a localized group of electrical sources and sinks that normally A

micro-grid can connect and disconnect from the main grid to enable it to operate in

both ‗on‘ grid and ‗off‘ grid (Island mode) modes. These micro-grids are smaller

energy systems that include generation, storage and demand management. The existing

micro-grid can control the amount of energy generated, stored and distributed. They

can also use these data for communication between the central system and the loads.

This paper enumerates method of energy generation based on demand, storage of

energy, managing the energy demand and communication among various components

(micro-sources, control systems, smart meters, and loads) in the Islanded micro-grid.

The proposed micro-grid will be able to obtain real time data of energy demand of the

connected loads, based on which the amount of energy to be generated by the micro-

sources is determined. This helps in eliminating surplus energy generation. The

generated power is not directly connected to the loads but via storage devices. By this

method, the generated power quality is maintained even when the load fluctuates. The

load fluctuations are observed and those data are communicated with centralized

source. The use of these micro-grids can improve the power reliability and produce

secure, flexible and efficient energy systems. Also, this paper provides space for

enthusiasts to develop in the areas of controlled smart grids and contribute to the

development of the perfect powersystems.

Keywords- Island mode, Micro-grid, smart grids, generation and storage, demand

management, power reliability.

Page 190: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 165 ISBN 978-93-5268-343-8

Power Line Fault Detection And Localization Using High Frequency

M.Rinosha,S.Arulmani,Mr.S.Hanishanand

KINGS ENGINEERING COLLEGE

Abstract-The reliability and quantity of electrical power networks are affected by the

occurrence of electrical fault. In this paper we propose a novel method to identify the

occurrence of fault in distribution network, based on impedance measurement

performed at the central distribution of the office .the measurement can be performed

using PLC modems that belong to the energy metering infrastructure. The fault is

detected by means of continuous impedance monitoring and afterwards its distance

from the central office is estimated using the same measurement traces, without

requiring additional information. Different type of fault is tested, and the effect of

measurement bandwidth and the electrical noise on the measurement is alsoassessed.

Keywords-Fault Identification, Distribution Network (DN), PLC modems, Continuous

Impedance Monitoring (CIM).

Page 191: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 166 ISBN 978-93-5268-343-8

AUTONOMOUS INTELLIGENT BOT-MOWER

Daniel Michael,Priyav,Mr.T.Ranjith Kumar

KINGS ENGINEERING COLLEGE

Abstract: In the last two decades, various robotic lawn mowers are developed to cut

grasses, but all those mowers are handled manually to trim the grasses with help of

trimming model attached in the system. It has been controlled through remote which

has to be held in hand for long time. It is observed that manual handling takes more

time to complete the work. So, the control unit of the system has automated in which

improves the system performance much more efficient. In this paper, the mowing

operation is automated by giving control input from mobile application. Thereby,

enhancing mowing operation and also improved the overall performance of the

trimming system. In near future this will be an effective application inmowers.

Keywords- mowing, trimming, trimmer, automated

Page 192: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 167 ISBN 978-93-5268-343-8

ACCELEROMETER BASED WIRELESS HAND GESTURE CONTROLLING

ROBOT

Priyanga S,D.Rajkumar,Mr.Dr.Muniaraj

KINGS ENGINEERING COLLEGE

Abstract: Human life is precious Thus, we can use these robots to perform those tasks

that may be harmful for humans. This paper describes about the gesture control robot

with an arm which can be controlled by your normal hand gesture. It consists of mainly

two parts, one is transmitter part and another is receiver part. The transmitter will

transmit the signal according to the position of accelerometer and your hand gesture

and the receiver will receive the signal and make the robot move in respective

direction. Here, the program is designed by using Arduino IDE.

Keywords: Hand Gesture

Page 193: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 168 ISBN 978-93-5268-343-8

SNIFFER FOR MOBILE PHONES

Mani Manthiram.S,S Maria Praveen,Mr.J.Dhinakaran

KINGS ENGINEERING COLLEGE

Abstract-The sniffer is a small base station, it includes transceiver section. It should

operate at a frequency that is much different from the frequency of the current cell in

which the operation of detection is being carried out. Some of the main important

things are the frequency that has to be generated by the transceiver section is around

900MHz range which is a VHF range and it is necessarily to design the oscillator

circuit for that frequency range. Another important is the cooling that has to be

provided to the circuit while designing the circuit that is to be operated at 900MHz

range of frequency. Hence proper design of base station is an important thing in the

design of the sniffer. Mobile phones as well as the base station has low power

transmitter is also transmitting at low power. The transmitter of the sniffer has to be a

low power transmitter. This helps in the process of reducing the interference of the

device with the devices that are in the othercells.

Page 194: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 169 ISBN 978-93-5268-343-8

WIRELESS THREE TANK SYSTEM

P MUGILAN,P. MUTHUMANIAN ,Mr.P.Manikandan

KINGS ENGINEERING COLLEGE

Abstract-The important part of a process industry is the analysis of chemical process

and controlling process variables by applying various control strategies. In level

process control, three tanks are connected in different fashions like they are purely non-

interacting, purely interacting and some are combinations of interacting and non-

interacting system. Our project is purely non-interacting three tank system. Laboratory

Virtual Instrumentation Engineering Workbench (LABVIEW) is used for simulation of

above processes.

Page 195: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 170 ISBN 978-93-5268-343-8

INTERNET OF THINGS BASED REAL TIME TRANSFORMER

PERFORMANCE MONITORING SYSTEM

Mythili,M.Nandagopal,Mr.E.Artalarasan

KINGS ENGINEERING COLLEGE

Abstract-An emerging field in Machine to Machine communication is Internet of

Things (IOT), which allows the possibility for autonomous devices to use the Internet

for exchanging data. This work presents design and execution of real time monitoring

and fault detection in transformers by recording key operation indicators of a

distribution transformer like load current, voltage, transformer oil temperature and gas

composition, which is sent to an online server with the help of an IOT module.

Through this project, we aim to minimize working efforts and improve the transformer

fault detection capability across the distribution

system.

Keywords-Internet of Things (IOT), Real Time Monitoring, Transformer Oil

Temperature, Gas Composition.

Page 196: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 171 ISBN 978-93-5268-343-8

DESIGN AND ANALYSIS OF 400/110 KV ELECTRICAL SUBSTATION

BASED ON LOAD FLOW ANALYSIS USING ETAP

S. Nithila,Mpadmapriyadarsini,Mr.R.Jeremiahlleg

KINGS ENGINEERING COLLEGE

Abstract-Power is essentially required for the development of any country. To

maintain the generation of electric power at adequate level the power has to be

transmitted in proper form and quality to the consumer. This research paper deals with

the simulation of 400/110 kV substation in Electrical Transient Analyzer Program

(ETAP) with detailed load flow analysis, short circuit analysis, harmonic analysis and

also to overcome the problem of an under voltage by using SVC. The results are based

on actual data received from 400/110 kV substation.

Keywords- Electrical Transient Analyzer Program (ETAP), Load Flow Analysis

(LFA), Static VAR Compensator (SVC), Short Circuit Analysis (SCA).

Page 197: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 172 ISBN 978-93-5268-343-8

A UNIFIED CONTROL AND POWER MANAGEMENT SCHEME FOR PV-

BATTERY-BASED HYBRID MICROGRIDS FOR BOTH GRID-CONNECTED

AND ISLANDED MODES

P. Vinitha Ramalakshmi,T. Vinothini,Mr.Hanish

KINGS ENGINEERING COLLEGE

Abstract-Battery storage is usually employed in Photovoltaic (PV) system to mitigate

the power fluctuations due to the characteristics of PV panels and solar irradiance.

Control schemes for PV-battery systems must be able to stabilize the bus voltages as

well as to control the power flows flexibly. This paper proposes a comprehensive

control and power management system (CAPMS) for PV-battery-based hybrid micro

grids with both AC and DC buses, for both grid-connected and islanded modes. The

proposed CAPMS is successful in regulating the DC and AC bus voltages and

frequency stably, controlling the voltage and power of each unit flexibly, and balancing

the power flows in the systems automatically under different operating circumstances,

regardless of disturbances from switching operating modes, fluctuations of irradiance

and temperature, and change ofloads.

Keywords- Photovoltaic (PV), comprehensive control and power management system

(CAPMS), Island Mode (IM), Micro Grids (MG).

Page 198: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 173 ISBN 978-93-5268-343-8

DESIGN AND EXPERIMENT OF ADVANCED MULTI MODE PROPELLED

VEHICLE TO ENHANCE MAXIMUM EFFICIENCY

M.Anuratha,K.Srivashan,Dr.Muniaraj (P)

KINGS ENGINEERING COLLEGE

Abstract: An electric vehicle usually uses a battery which has been charged by

external electrical power supply. All recent electric vehicles present a drive on AC

power supplied motor. An inverter set is required to be connected with the battery

through which AC power is converted to DC power. During this conversion many

losses take place and also the maintenance cost of the AC System is very high. The

proposed topology has the most feasible solar/electric power generation system

mounted on the vehicle to charge the battery

duringalldurations.Withaviewofprovidingignitedustodevelopthis―Solar/ElectricPowered

Hybrid Vehicle‖ [SEPHV].This multi charging vehicle can charge itself from both solar

and electric power. When there is no presence of sun, electric power supply act as an

auxiliary energysource.

Keyword:electricvehicle,ACpowersuppliedmotor,―Solar/ElectricPoweredHybridVehicl

e‖[SEPHV].

Page 199: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 174 ISBN 978-93-5268-343-8

EXPERIMENTAL ANALYSIS AND INVESTIGATIONON POLYMER

COMPOSITE LEAFSPRING

M.Kavitha Roselin,Y.Lavanya,Ms.R.Bavanisekar

SAVEETHA ENGINEERING COLLEGE

Abstract: In this paper for reducing the weight of the TATA ACE vehicle is

considered. The middle spring of TATA ACE vehicle is used for modelling and

analysis. The composite materials used for modelling and analysis are Glass fiber

reinforced plastics (GFRP), and Carbon fiber reinforced plastics (CFRP).The

Composite leaf spring (GFRP) is fabricated by using the hand layup method. Testing of

GFRP leaf spring is done by using universal testing machine. Maximum load and

maximum deflection can be found out by using universal testing machine. From the

experiments it was observed that if a conventional leaf spring is replaced by a

composite leaf spring an appropriate amount of weight reduction and there by

improved vehicle performance with almost same amount of load bearing capacity was

observed.

Keyword: Glass fiber reinforced plastics (GFRP), universal testing machine.

Page 200: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 175 ISBN 978-93-5268-343-8

TRIBOLOGICAL AND MORPHOLOGICAL STUDIES OF ALUMINIUM

BASED NANO COMPOSITES

W.Kanmani,P.Karthikeyan,Mr.P.Ravisasthiri

JAWAHAR ENGINEERING COLLEGE

Abstract: It is important to take contact temperature into account when developing

friction and wear tests for potential tribo materials and when analyzing the results of

those tests. This paper presents some of the most important analytical and numerical

methods that can be used to predict surface temperature rises in dry or boundary

lubricated pin-on-disk turbo tests. The objective is the development of the relatively

simple,accurate and easy to use expressions that can be used to predict contact

temperatures in pin-on-disk sliding contacts. Results of the methods are to be compared

for Al+SiC(NANO) and Al+SiC(NANO) with MoS2 (NANO) composite.

Key words :wear tests, analytical and numerical methods , pin-on-disk turbo tests .

Page 201: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 176 ISBN 978-93-5268-343-8

DESIGN AND FABRICATION OF MILLING ATTACHMENT IN LATHE

R.Susan,K.Suhasini,Mr.J.Kokila

JAYA ENGINEERING COLLEGE

Abstract: The lathe with milling machine is to eliminate the need for an operator

owning both a milling machine and a lathe. It is designed to be mounted to the side of

the milling machine and to be used without disturbing a setup in the associated vise.

The details of manufacturing a Miniature Lathe are given in a clear manner. Different

types of components are essential for various purposes. These components include

several operations, initially the component to be machined as irregular shapes. This

shape is into regular form and to our required wish by performing various operations

on it. Therefore a machine is required to convert this irregular shape material into a

finished product. We have selected a Miniature Lathe for doing several small

components which is used for various purposes in variousfields.

Key word: milling machine, Miniature Lathe

Page 202: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 177 ISBN 978-93-5268-343-8

DESIGN AND FABRICATION OF AUTOMATED GUIDED VEHICLE

SYSTEM

L.Susithra,N.Janes,Mr.A.Austin Segal

EASWARI ENGINEERING COLLEGE

Abstract: Mankind has always strived to give life like qualities to its arti facts in an

attempt to find substitute for himself to carry out his order and also to work in an

hostile environment. The popular concept of a robot is of a machine that looks and

work like a human being. One type of robot commonly used in industry is a robotic

manipulator or simply a robotic arm. It is an open or closed kinematic chain of rigid

links interconnected by movable joints. In some configuration, links can be considered

to correspond to human anatomy as wrist, upper arm and forearm with joint at shoulder

and elbow .at end of arm a wrist joint connects end effectors which may be a tool and

its fixture or a gripper or any other device to work. Here

howapickandplaceLinefollowingrobotcanbedesignedforaworkstationwhereloadingandp

ackingoflead batteries is been presented. All the various problems and obstructions for

the loading process has been deeply analysed and been taken into consideration while

designing the pick and place line following robot.

Key word: Arti facts, hostile environment.

Page 203: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 178 ISBN 978-93-5268-343-8

MECHANICAL PROPERTIES OF CONCRETE WITH REPLACED C&D

FINE AGGREGATE USING SILICA FUME AS AN ADMIXTURE

M.Malaiappan Sindhu1, B.Magesh2

1CACE, Addis Ababa Science and Technology University,Ethiopia.

2PERI Institute of Technology, India

Abstract: Concrete is the most common construction material prepared using cement

natural aggregate and water. With fast industrialization, infrastructure development and

increase in the population leads to huge construction activities. Due to increase in the

various construction activities the natural resources are fast depleting within turned

result in escalating the cost of construction material and then the total cost of

construction. With rapid urbanization the quantum of construction & demolition waste

(C&D Waste) is constantly increasing. While it is estimated that the construction

industry in India generates about 10-12 million tons of Construction and Demolition

(C&D) waste annually, efforts to manage and utilize this waste is very little. This has

led to Private contractors utilizing unscientific dumping methods there-by putting

severe pressure on scarce urban land as well as reducing life spans of landfills The

study on the application of C&D fine aggregate for concrete preparation has been

going on over the last few decades. The properties like water absorption and specific

gravity of C&D fine aggregate are to be determined for the concrete mix design. It has

been observed that the C&D fine aggregate obtained from concrete waste is rough

texture, angular and has higher water absorption than the natural fine aggregate

affecting the concrete mix proportion. In this project the behavior of concrete under

replacements for natural aggregate (NA) fine with recycled aggregate (RA) is

examined for its structural property. To Increase the strength of C & D aggregate

concrete silica fume added as admixture. The specimens were made for

conventional,100 % replaced C&D waste and C& D waste with 20% silica fume as an

admixture. Properties of this concrete such as compressive strength, splitting tensile

Page 204: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 179 ISBN 978-93-5268-343-8

DESIGN AND ANALYSIS OF TECH PARK (G+10) BUILDING

Atulkumar Singh1, Ankit Pandey2, P.M.Rameshwaran31&2Students, 3Assistant

Professor, 1,2&3Department of Civil Engineering SRMIST, Ramapuram, India

Abstract – ETABS is the present day leading design software in the market. Many

designs Companies use this software for their project design purposes. So, this project

mainly deals with the comparative analysis of the results obtained from the design of a

regular and a plan multi storey building structure when designed using ETABS

Software separately. These results will also be compared with manual calculation of a

sample beam and column of the same structure designed as per IS 456. In this study we

are analyzing and designing a tall building G+10 storey using E-tabs and by

conventional manual method, finally comparing analyzed and design values. As in

demand such structure are built in R.C. framed structures these days. Our project

design one such building with due regard for all the components of the structure. Now

a day‘s many tall structures and high rise towers are being built all around the world

.Wind plays an important role in design of tall structures because of its dynamic nature.

Effect of wind is predominant on tall structures depending on location of the structure,

height of thestructure

Page 205: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 180 ISBN 978-93-5268-343-8

USAGE OF MANUFACTURED SAND (M SAND) AS FINE AGGREGATE

FOR CONCRETE IN LIEU OF RIVER SAND.

A.Shanmugam1, P.M.Rameshwaran2

1PG Student,2Assistant Professor, 1&2Department of Civil Engineering SRMIST,

Ramapuram, India

Abstract – Natural or River sand‘s resources are exhausting very rapidly; the existing

River sand crisis has brought all the site concrete and related activities to standstill.

Around 30 % of volume of concrete is Fine aggregate. A good quality of concrete can

be obtained by proper mix and proportion of cement, Fine aggregate, Coarse aggregate,

water and admixture. The fine aggregate used is usually obtained from natural sources

specially river beds, now a day due to constant sand mining the natural sand is

drastically decreasing in manner. Sand digging from river beds will led to severe

environmental issues and moreover Government has banned and restricting the digging

of river sand from rivers, if same scenario continues it will led to increase in cost of

river sand and environmental issue. Natural river sand takes millions of years to form

and is not replenish. Manufactured sand is a substitute of river sand for construction

purpose produce from hard granite stone by crushing. The crushed sand is of cubical

shape with grounded edges, washed and graded to as a construction material. Hence

Manufacture Sand is best alternative solution of river sand. The only long term

replacement of river sand is manufactured sand.

Keywords:Fine aggregates (Manufactured sand & Natural / river sand), Compressive

strength, Workability

Page 206: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 181 ISBN 978-93-5268-343-8

SIMPLE MODEL OF GRAPHITE AND ITS APPLICATIONS IN

SUPERLATTICE

K.Anand1, P.M.Rameshwaran2

1PG Student,2Assistant Professor, 1&2Department of Civil Engineering SRMIST,

Ramapuram, India

Abstract – Scanning probe microscopy investigations have extensively used graphite

as a substrate due to its chemical inertness and ease of cleaving. The atomically flat

surface of graphite has provided an ideal platform for surface scientists to deposit

various kinds of materials of interest for imaging and examining. The natural graphite

surface is also worthy of further understanding as it consists of a variety of defects

among which superlattice structure is reported to be found on graphite surfaces, and its

origin is not yet completely understood. It is of general interest and wide applicability

to have a simplistic model for theoretical interpretation of scanning tunnelling

microscope (STM) images of graphite, and even molecular dynamic simulations on

graphite. Here we describe a model of graphite which is easy to comprehend and

simple to implement. This model simulates the atomic density of graphite layers, which

in turn correlates with the local density of states. The mechanism and construction of

such a model is explained with all the necessary details which are not explicitly

reported before. This model is applied in investigating the corrugation conservation

phenomenon and rippling fringes of the superlattice which we observed on

graphite.The―odd-

even‖transitionalongtheatomicrowsofasuperlatticeissimulatedandthisresultis discussed

with reference to other reports in the literature. A comparison is made with the result of

Cee about the validity of the moiré rotation patternassumption.

Page 207: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 182 ISBN 978-93-5268-343-8

INTEGRATING BEM, BIM, VR FOR VISUALIZING LIGHT IN A BUILDING

AND ENERGY EFFICIENT MODELLING

L.Divya

PG Scholar, VPDM, PSG College of Technology, Coimbatore

Abstract – Lighting options in a building cannot be seen with the naked eye by the

user and constructor before construction. Virtual reality(VR) gives the customers the

ability to tour the home before and after it‘s built and view all of it‘s tech possibilities.

For builders looking to install green technology (lighting), virtual reality is a great way

to get the home buyer engaged. With virtual reality engineers, architectures can use

various designing and range of colours to see where sunlight lands naturally. While it

could be used for decorative purpose, this also helps the engineer to assess how much

natural light the property will receive, by reducing their dependence on artificial light

sources. VR design allows users to try multiple light cycles, on seeing their design

during different hours of the day. By experiencing the orientation of the building, the

architect can adjust to reduce heating and cooling costs for the property or to optimize

the building‘s solar energy system. BIM(Building Information Modelling) and

BEM(Building Energy Modelling) tools (such as REVIT ARCHITECTURE

,ECOTECT) enables analysing and visualizing environmental factors based on the

design properties and can be used to improve the building design for better

performance. However, these tools have limitations in providing interactivity with

users for creating multiple visualization results to be used for analysing design options.

So that integrating design tool which consists of BIM,BEM and VR technologies

enables visualizing information in relationship with the actual architectural design,

space configuration and thermal environment, and provides efficient designfeedbacks.

Page 208: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 183 ISBN 978-93-5268-343-8

REVIEW ON PARTIAL REPLACEMENT OF FINE AGGREGATE BY

COPPER SLAG, E-WASTE AND M-SAND

S.Yamini Roja1, A.Anusuya2, SP.Keerthana3, S.Lakshmanan4& C.Prakash5

1Assistant Professor, 2,3,4&5Students , 1,2,3,4&5Department of Civil Engineering Sri

Ramakrishna Institute of Technology, Coimbatore.

Abstract – In India, there is a great demand for aggregate mainly in civil engineering

field for road and concrete constructions. Generally, concrete is a combination of

cement, fine aggregate, coarse aggregate and water. About 35% of concrete is

comprised of fine aggregate. River sand is extracted from river bed and it has

represented an awesome threat to environment. This has led government to ban the

dragging of sand. So, it is necessary to find an alternate for river sand. It is found that

M-sand will be the most promising alternate material. Also, utilization of waste

material and by-products is a partial solution to rectify environmental and ecological

problem. E-waste and copper slag are the waste material from the waste electronic

products and extracted waste from copper respectively. They cause serious effects on

environment and human health. In order to reduce these effects, it can be used in

concrete. Use of these materials, not only helps in getting them utilized in concrete and

other construction material, but also helps in reducing the cost of concrete

manufacturing. It has numerous indirect benefits such as reduction in landfill cost,

saving in energy and protecting the environment from pollution effects. In this paper,

various literatures have been discussed about the usage of these waste materials which

will bring multifarious benefits on environmentaleffects.

Page 209: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 184 ISBN 978-93-5268-343-8

ONSITE VISUALISATION INTEGRATED WITH BUILDING

INFORMATION MODELLING IN MIXED REALITY

S.Reji

PG Scholar, Virtual Prototyping and Digital Manufacturing Department of

Production Engineering

PSG College of Technology, Coimbatore

Abstract – People have a very hard time visualizing architectural concepts. It‘s nearly

impossible for most people to fully understand what an architectural space will be like

by viewing 2D floor plans, illustrations, animations or scale models. These are all

ultimately abstract and distorted ways of visualizing a design, and not at all

representative of how we experience architecture in the real world. With Mixed reality,

we can gain a very holistic understanding of what the building will feel like before

investing the massive amount of resources it takes to make it a reality. It‘s a lot easier

to change a pixel than it is to move a brick wall after it‘s built. MR helps people

understand architecture in a way nothing else comes close to, which we believe will

ultimately lead to the creation of better, more efficient built environment. Through this

project BIM can be integrated with Mixed Reality for intelligent visualization of

building onsite.

Page 210: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 185 ISBN 978-93-5268-343-8

Dynamic analysis of a composite tall structure using Etabs software

S.Ahmed Hussain1 and G.Nithyambigai2

21Department of Civil Engineering SRM Institute of Technology Chennai, India

2Assistant Professor (Sr.G)

[email protected], [email protected]

Abstract – Buildings with height more than 150m are categorized as Tall buildings (IS

875 part 3 -2015). Tall buildings are susceptible to Dynamic forces. The Engineer can

adopt any number lateral load resisting systems to stabilize the structure. Some of the

systems are Rigid Frame system, Braced Frame system, Outrigger System, Core wall

system etc. The Dynamic effects in a Tall Building are caused by either Wind or

Seismic activity. The composite construction is opted to speed up the construction

process. Structural Steel and Concrete together gives the composite action. The lighter

the structure, lesser will be the Seismic activity. Vertical city concept is the

advantageous part in the tall building structure. More residents in a small area of land.

The cons of a tall building are that it gives nauseating feeling to the residents due to the

constant oscillations. The paper presents a tall structure with core wall system which

has Steel Encased Concrete columns and Composite deck slabs. Dynamic effects of

wind will be calculated using Gust factor method of IS 875 part 3 2015. Both Along

and Across wind study is done. Seismic Design is based on the latest IS 1893- 2016

codal provisions. Response spectrum will be studied based on the structural and site

conditions. The typical span of the structure is 10.6m x 11.2m. The structure G+25

floors of commercial activities. The floor to floor height is 4.0m. The analysis and

design are done in ETABS V16. Composite beam and column design will be adhering

to ASCI 360-10 codal provisions. Composite beams will be check for Floor vibrations

as per Design guide 10 of ASCI. The main objective of the project is to study the

dynamic behavior of the tall composite structure due to seismic and wind forces.

Comparison with conventional concrete structure is done to check whether the

composite structure is economical than the conventional RCstructure.

Page 211: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 186 ISBN 978-93-5268-343-8

Study on Design And Analysis Of Raft Foundation By RCC And Pt Methods And

The Optimizations Achieved

A.Aswini1

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Raft foundation is a large slab supporting a number of columns and walls

under the entire structure or a large part of the structure to lower the contact pressure

compared to spread footing. Foundations are generally designed by Reinforced

Concrete Method. However, with the advancement in Post tensioning systems in

building construction, Raft foundations are designed in PT over the recent years. This

Project aims to establish a detailed comparative study on the design of the foundation

system, Raft by prevalent IS Codes in Reinforced Concrete system using Finite

Element Method softwares such as ETABS (Extended Three-Dimensional Analysis of

Building system), SAFE (Slab Analysis by Finite Element Method) and Post

Tensioned System by using a time tested 2 D Software, RAPT (Reinforced and Post

Tensioned). The Foundation will be suitably designed as per the prescribed standards

by the methods listed

above.Anelaboratecomparisononthesystemswithrespecttodesignperformanceintermsofs

tresses, Capacity and deflection shall be overviewed. Also, the Quantities of Steel,

Concrete and Pre-stressing steel shall be compared and the most optimal solution for

the available grid shall be suggested. The various enhancements in the design of Raft

Foundation by different softwares shall be studied. Also, the evolution in the design

through softwares and the nuances it brings in the design compared to conventional

method shall be elaborated.

Page 212: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 187 ISBN 978-93-5268-343-8

ANALYSIS AND DESIGN OF MASS LIQUID STORAGE TANK

SUPPORTING STRUCTURE

G.Arumugam1

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Liquid storage tanks constitute an important component of life line systems

such as water distribution system, petroleum plants etc. The response of liquid storage

tanks isolated by the sliding systems is investigated under two horizontal components

of real earthquake ground motion. The continuous liquid mass is lumped as convective

mass, impulsive mass and rigid mass. The corresponding stiffness associated with these

lumped masses is calculated depending upon the properties of the tank wall and liquid

mass. The governing equations of motion of the tank with a sliding system are derived

and solved by Newmark‘sstep- by-step method with iterations. The frictional forces

mobilized at the interface of the sliding system are assumed to be velocity dependent

and their interaction in two horizontal directions is duly considered.. The various

parameters considered are (i) the period of isolation (ii) the damping of isolation

bearings and (iii) the coefficient of friction of sliding bearings. It has been found that

the bi-directional interaction of frictional forces has noticeable effects and if these

effects are ignored then the sliding base displacements will be underestimated which

can be crucial from the design point of view. In the design codes, mechanical analogs

of tank-fluid system are commonly used to obtain the sloshing frequency,

hydrodynamic pressure and design seismic forces.. The experimental study is done on

laboratory models of tanks, which are excited using an Electro-Magnetic Shake Table.

The numerical study is done with the help of finite element model of tank- fluid system

using software using StaadPro.Tank supporting structure is designed according to IS:

456-2008 and earthquake loading is applied as per IS: 1893-2002 and mild steel

cylindrical welded oil storage tank IS 803-1976.

Page 213: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 188 ISBN 978-93-5268-343-8

EFFECT OF EARLY CARBONATION ON DURABILITY PERFORMANCE

OF CONCRETE.

D Ravichandran1

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Natural Carbonation is the major problem in all RCC Structures such as

Corrosion of Steel Rebar‘s. Principal Green House Gas, Carbon dioxide so far utilized

far Carbonation to study / design of cover depth of the RCC Component. Accelerated

Carbonation Technology will be helpful in minimize the effect of natural carbonation

in the PCC construction materials. Early Carbonation will resist the weathering

carbonation. Emission of carbon dioxide in to the Atmosphere will cause natural

disaster like unexpected storms or cyclone cloud burst, landslide, forest fire, flooding

of low lying residential area, water borne diseases in flooded area, and desert

formation. The acceleration carbonation will be carried out with the various pressure

condition of pure carbon di oxide for various environmental conditions. To find out the

optimum environmental condition for maximum carbon uptake in OPC, PPC and

Portland Slag cement based in plain cement concrete. To find out the grade of concrete

which is favourable for maximum carbon- dioxide uptake. To study the strength

characteristic compressive and durability properties of plain cement concrete.

Page 214: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 189 ISBN 978-93-5268-343-8

ANALYSIS AND DESIGN OF QUENCHING TOWER

N. Gopinath1

Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Ethylene quench oil and quench water towers may have the highest failure

rates in fractional distillation due to the rigorous service that these tower perform.

Almost all o the challenge areas of distillation are concentrated into one column

system; high temperature, solids, fouling potential, oxygenates, polymerization

potential, heat removal by pump arounds, and a mixture of Hydrogen, Steam, and C1 to

C20s. Given this combination, the guidelines for designing this column have to be

flexible yet sturdy to handle each of the challenges. One of the most reliable designs

has been the one developed in 1998 (1). These designs have run continually for eight

years, with previous designs in these revamped columns having less than one year run

length. The authors will examine the history of quench oil and quench water tower‘s

successful and not successful case studies and lessons than can be learned from each of

thecases.

Page 215: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 190 ISBN 978-93-5268-343-8

MICRO STRUCTURAL STUDY AND STRENGTH CHARACTERISTIC OF

ACCELERATED CARBONATION CURING OF CEMENT MORTAR

M Kamalakannan1

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Natural Carbonation is the major problem in all RCC Structures such as

Corrosion of Steel Rebar‘s. Principal Green House Gas, Carbon dioxide so far utilized

far Carbonation to study / design of cover depth of the RCC Component. Accelerated

Carbonation Technology will be helpful in minimize the effect of natural carbonation

in the PCC construction materials. Early Carbonation will resist the weathering

carbonation. Emission of carbon dioxide in to the Atmosphere will cause natural

disaster like unexpected storms or cyclone cloud burst, landslide, forest fire, flooding

of low lying residential area, water borne diseases in flooded area, and desert

formation. The acceleration carbonation will be carried out with the various pressure

condition of pure carbon di oxide for various environmental conditions. The

accelerated carbon technology can be utilized to enhance the early strength of plain

cement concrete and to improve the durability of properties like chloride ingression,

reduce the permeability, acid attack, sulphate attack, freezing and thawing effect.

Microstructure study due to accelerated carbonation in various grade of concrete

according to various environmental conditions (Temperature,Pressure)

Page 216: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 191 ISBN 978-93-5268-343-8

Analysis and Design of INTZE Type over Head Circular Water Tank

S.Magesh1

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Storage reservoirs and overhead tanks are used to store water. All tanks are

designed as crack free structures to eliminate any leakage. In this project, working

stress method is used to design an INTZE tank and Elements of the INTZE tank are

designed by limit state method. In general, for a given capacity, circular shape is

preferred because stresses are uniform and lower compared to other shapes. Lesser

stresses imply, lower quantities of material required for construction which brings

down the construction cost of water tanks. This project gives in brief, theory, design

and analysis of the INTZE type water tank. Any design of Water Tanks is subjected to

Dead Load + Live Load and Wind Load or Seismic Load as per IS codes of Practices.

Most of the times tanks are designed for Wind Forces and not even checked for

Earthquake Load

assumingthatthetankswillbesafeunderseismicforcesoncedesignedforwindforces.Inthisst

udyWind Forces and Seismic Forces acting on an Intze Type Water tank for Indian

conditions are studied. Most of the designers consider the wind effect and neglect the

seismic effect on the structure. The Indian Standard Code IS 875(Part-3) 2003 and IS

1893-2000 for Wind & Seismic effect is used in this study and the same is cross

checked with different Seismic Zones i.e. Zone-II, Zone-III, Zone-IV, & Zone-V by

‗Response Spectrum Method‘ and the maximum governing condition from both the

forces is further used for design & analysis of staging.

Page 217: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 192 ISBN 978-93-5268-343-8

DYNAMIC ANALYSIS AND DESIGN OF RCC CUMS STEEL STRUCTURE

IN INDUSTRIAL BUILDING USING SRSS METHOD

S. Moses Vimal Raj1

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – A method to include earthquake directional effects on the seismic analysis

of building is presented. A comparative study to examine the accuracy of the method is

performed. Three linear buildings with different structural characteristics were

analyzed considering actual earth quake acceleration response spectra and acceleration

design spectra. Various techniques for combining modal response were considered. It

was concluded that the proposed method estimates very well the structural response

when the square root of sum of squares (SRSS) technique is applied. The man

advantage of the proposed method is that it avoids the use of arbitrary two orthogonal

directions on seismic analysis of buildings. The method also evades the need for the

standard combination procedure of the earthquake orthogonal effects to obtain the

design stresses. The SRSS (Square Root Sum of Squares) technique has traditionally

been used in the modal response combination for the response spectrum method of

seismic analysis. Over the years, the SRSS techniques has been found not desirable in

several occasions, for example, when modes are closely spaced to each other.

Analytically it can easily be demonstrated that the maximum responses between tow

sufficiently closely spaced modes must be algebraicallycombined.

Page 218: KINGS ENGINEERING COLLEGE

International Conference On Innovations And Challenges In Engineering And Technology- ICICET ’15

ISBN 978-93-5268-343-8 193 ISBN 978-93-5268-343-8

Pushover analysis and design of RCC structures

R.Saravanan

1Student PG scholar, SRMIST, Ramapuram, Chennai, Tamil Nadu – 600089

Abstract – Recent earthquakes, in which most of concrete structures have been

severely damaged or collapsed, have indicated the need for evaluating the seismic

adequacy of existing buildings. About 60% of the land area of our country is

susceptible to damaging levels of seismic hazard. We can‘t avoid future earthquakes,

but preparedness and the safe building construction practices can certainly reduce the

extent of damage and loss. In order to strengthen and resist the buildings for future

earthquakes, some procedures have to be adopted. One of the most familiar procedures

is the nonlinear static pushover analysis which is becoming a popular tool for seismic

performance evaluation of existing and new structures. This analysis of the nonlinear

response of RC structures to be carried out in a routine fashion. It helps in the

investigation of the behavior of the structure under different loading conditions, its load

deflection behavior and the cracks pattern. The accuracy of the predictions was

observed to depend on the approximations involved in the theory of the procedures,

structural properties and ground Motion characteristics. By conducting this push over

analysis, we can know the weak zones in the structure and then we will decide whether

the particular part is to be retrofitted or rehabilitated according to the requirement. In

push over analysis is performed on multistoried frame structures by using most

common software SAP2000 to achieve this objective, RCC framed buildings with 10

stories analyzed. The results obtained from this study show that properly designed

frames will perform well under seismicloads.

Page 219: KINGS ENGINEERING COLLEGE

CHIEF PATRON

Dr.Naliniselveraj, M.Com.,M.Phil.,

Chairperson, Kings Engineering College.

PATRON

Mr.S.Amirtharaj, B.Tech.,M.B.A. (UK), Director,Kings Engineering College.

CONFERENCE CHAIR

Dr.A.V.Mayakkannan, M.E., Ph.D., Principal, Kings Engineering College.

ORGANIZING CHAIR

Mr.B.Muthazhagan, HOD/IT

Mr.S.Raj Kumar, HOD/ECE Dr.Muniaraj, HOD/MECH

CONVENOR CO-cONVENOR Dr.D.C.Jullie Josephine, Mr.D.R.Denslin Brabin,

HODICSE Asso. Prof./CSE

EVENT CoORDINATORS

Mrs.V.Indhumathi,Asst. Prof. ICSE Mrs.M.Parameswari, Asso.Prof./IT Mr.K.G.Saravanan,Asst. Prof./CSE Mrs.E.Sujatha, Asso. Prof./IT Mr.A.N.Duraival, Asso.Prof./ECE Mr.R.Jeremiah, Asso. Prof/MECH Mr.S.Suthagar,Asst. Prof./ECE Mr.S.HanishAnand, Asso.Prof/MECH

Designed and Published by

RINGS ENGINEERING COLLEGE