Articles

  1. Preserving Against Wormhole Attacks by Malevolent Nodes in MANET – A SurveyDownload Article

    Mrs.R.Selvamatha, Mr.M.Ramu

    Abstract

    close

    MANET (Mobile Adhoc Network) refers to a set of mobile nodes that can communicate with each other with the help of intermediate nodes, without using any kind of fixed wired infrastructure. It is a self organizing and adaptive networks, without a central coordinator, and which frequently changes its topology. Security is the one of the major concern for protected communication between mobile nodes in an aggressive environment. The malevolent nodes may disrupt the routing process. In this paper, preventing or detecting malevolent nodes beginning wormhole attacks is a challenge. This paper referred to as the cooperative bait detection scheme (CBDS), that defending against wormhole attacks.

  2. Performance evaluation of high volume fly ash concreteDownload Article

    Dharavath Santhoshkumar, S.Swetha, P.Vijayanand

    Abstract

    close

    Now-a-days the deterioration of concrete is more prevalent due to various reasons like improper bonding, corrosion of steel, inferior quality of materials as well as improper workmanship. The deterioration of concrete leads to reduction in useful strength of concrete and thus necessitates the adoption of proper repairing methods. Surface treatments like wire-brushing, sandblasting, water jetting, chipping, etc., are usually adopted. In this context it is important to understand the bonding mechanism at the interface between the old (substrate) and new concrete surfaces. The Bond strength at the interface depends on roughness of the substrate which in turn depends on Cohesion and Friction at the interface. In the present study old concrete substrates each at 450 angle with vertical and the fly ash concrete as overlaid material were fabricated to measure the shear bond strength at the interface. The parameters of the investigation include 1) different grades of concrete substrate (M30 & M60) 2) Roughness condition at the interface (Smooth (as cast) & Rough (chipped indentations)) 3) The overlaid concrete with different percentages of cement replacement with fly ash (0%, 25% and 50%) 4) Different percentages of steel reinforcement resisting the shear at the interface (4 No’s of 4mm dia (0.502%) and 4 No’s of 6mm Dia. (1.13%) bars). The specimen adopted is a standard prism size of 400mm X 100mm X 100mm. The te conducted is ‘Slant Shear test’ as per BS 6319 Part 5. From shear tests it was found that the bond strength between the two interfaces was increased for 25% fly ash content in overlaid concrete and decreased for 50% fly ash content in overlaid concrete irrespective of the roughness of the substrate.

  3. Analysis and behavior of shear wall’s for high rise of buildingsDownload Article

    P.Raju, S.Swetha, P.Vijayanand

    Abstract

    close

    In high rise building or multi storey building, soft storey construction is a typical feature because of urbanization and the space occupancy considerations. Shear walls are specially designed structural walls which are incorporated in buildings to resist lateral forces that are produced in the plane of wall due to earthquake, wind and flexural members. This paper presents study the design and analysis of shear force for multi-storey building and its behavior of multi-storey building with shear wall is studying under zone-II condition and by using the linear static method has been adopting. In this investigationa3D model has been developed to study the behavior of multi storey frame using STAAD PRO Software. The analyses of frame are studied under wind and seismic loads. And compare the seismic and wind loads, the storey shear, column forces are with the shear wall. The final investigation is to comparison of the difference between them behavior whether the structure with shear wall is more preferable than that of structure without shear wall in seismic and wind prone areas.

  4. Design and seismic analysis of a steel building against earthquake loadsDownload Article

    P.Hanmandlu, S.Shwetha, P.Vijyanand

    Abstract

    close

    Steel is one of the most widely used material for building construction in the world In Modern construction, steel is playing vital role as a building material either with combination of concrete as RCC or alone. The inherent properties of steel like strength, toughness, high ductility and other compatible properties made steel the first choice for engineers and also made the characteristics that are ideal for seismic design. To utilize these advantages for seismic applications, the design engineer has to be familiar with the relevant steel design provision and their intent given in codes. The seismic design of building frame presented in this project is based on: IS 1893-2002 and IS 800- 2007 codal provisions are considered for the design and for analysis STAAD Pro is used. The aim of present work is to analyse and design of a multi-bay and multi storied (G+5) steel structure for earthquake forces following IS 1893-2002 and design as per IS 800-2007.The selection of arbitrary sections have been done following a standard procedure and corrections are done accordingly for earthquake loads. Finally, the design of connection of an interior joint and an exterior joint of the frame have been done and the cost efficiency of both the methods has been compared.

  5. Analysis and design of G+6 residential building using seismic designDownload Article

    B.Murali Manohar Rao, Ms S.Swetha, Mr. P.Vijayanand

    Abstract

    close

    The design process of structural planning and design requires not only imagination and conceptual thinking but also sound knowledge of science of structural engineering besides the knowledge of practical aspects, such as recent design codes, bye laws, backed up by ample experience, intuition and judgment. The purpose of standards is to ensure and enhance the safety, keeping careful balance between economy and safety. In the present study G+6 building at Kapra, Hyderabad, India is designed (Slabs, Beams, Columns and Footings) using seismic design IS 1893(part 1) 2002. In order to design them, it is important to first obtain the plan of the particular building that is, positioning of the particular rooms (Drawing room, bed room, kitchen toilet etc.) such that they serve their respective purpose and also suiting to the requirement and comfort of the inhabitants. Thereby depending on the suitability; plan layout of beams and the position of columns are fixed. Thereafter, the loads are calculated namely the dead loads, which depend on the unit weight of the materials used (concrete, brick) and the live loads, which according to the code IS:456-2000 and HYSD BARS FE415 as per IS:1786-1985. Safe bearing capacity of soil is adopted as 350KN/M2 at a depth of 6ft and same soil should extent 1.5 times the width of footing below the base of footing. Footings are designed based on the safe bearing capacity of soil. For designing of columns and beams, it is necessary to know the moments they are subjected to. For this purpose, frame analysis is done by limit state method. Designing of slabs depends upon whether it is a one - way or a two way slab, the end conditions and the loading. From the slabs, the loads are transferred to the beam. Thereafter, the loads (mainly shear) from the beams are taken by the columns. Finally, the sections must be checked for all the four components with regard to strength and serviceability.

  6. Reheater-tube failures and temperature analysis of 210 mwboiler using CFDDownload Article

    V. Sathishkumar, M. Sanjeevkumar, S.Selvakumar, M.Solaimuthu, M.K.Aravindan

    Abstract

    close

    The problem has been identified in 210 MW boiler of Mettur thermal power station that the failure in pressure parts such as super heater coils, reheater coils, economizer and water wall panels occur over a period of time. And reheater tube is a section where frequent failure occurs, the cause of reheater tube failure has been identified and its effects are analyzed. The major causes for the failure are scaling and starvation. Due to the scale formation on both inside and outside the tube, the tube gets overheated and when its temperature exceeds the design temperature, tube gets punctured. By using the CFD software package (FLUENT, NASTRAN) the flow distribution along the tube has been predicted. And by varying the scale thickness inside and outside the tube, the minimum scale thickness which is to be maintained in order to avoid over heating is predicted using (CAE) software.

  7. Decolourisation of reactive blue 28 from dye wastewater by advanced oxidation proces and optimized by rate constant analysisDownload Article

    Ganesh. B, Velmurugan. S

    Abstract

    close

    Reactive dyes are extensively used in dyeing processes of textile industry due to their superior performance and they are environmentally hazardous. In the present work, decolourization of Reactive Blue 28 was studied using advanced oxidation process such as Fenton (H2O2/Fe2+) and Photo Fenton process (UV/H2O2/ Fe2+). The absorbance of sample was measured by a UV-Vis Spectrometer. The effect of operating parameters such as solution pH (2-6), H2O2 dosage (5, 10, 20, 30, 40 mM), Fe2+ dosage (0.05, 0.1, 0.15, 0.2, 0.25 mM) and initial dye concentrations (100-500 mg/L) was studied on % decolourization. Photo-Fenton showed higher in treatment efficiency than that of Fenton process. The operating parameters were optimized using Rate constant analysis.

  8. Analysis of disc brake using MMCDownload Article

    M.K.Aravindan, Mugunthan.S, Manikandan.J, Karthikeyan.P, Mohan.S

    Abstract

    close

    An automotive brake disc or rotor is a device for slowing or stopping the motion of a wheel while it runs at a certain speed. The widely used brake rotor material is cast iron. The aim of this paper is to select the optimum material for the application of brake disc system emphasizing on the substitution of this cast iron by any other lightweight material. Aluminium alloys 6061 and 6063 are selected by screening lot of materials based on weight, inertia, heat dissipation, performance and heat durability. Material performance requirements were analyzed and alternative solutions were evaluated among cast iron and aluminium alloy in ANSYS.

  9. An investigation and improvement of pedal operated hydraulic lifterDownload Article

    Alexander.M, Gowri Shankar.M, Muthukumar.V, Prem Kumar.D, Mr.S.Kasiviswanathan

    Abstract

    close

    This work looks at the possibility of controlling a hydraulic jack using a foot operated linkage mechanism. This modification greatly reduces stress and allows for comfort during usage in an automobile workshop, and the effort required is also very minimal. The test results showed that this foot operated hydraulic lifter for automobile workshops performed much more efficiently than the hand operated hydraulic lifter. The effort was also greatly reduced from 2050.4N to 136.7N. It also incorporates compression springs which allows for flexing under load to transmit the effect of the load to the floor.

  10. OEE improvement in LA2413 RF induction hardening machineDownload Article

    Sathish.S, Sasikumar.K.S, Tamlarasan.P, Aswin.A

    Abstract

    close

    Induction hardening in a case hardening process in which we can harden selective portion of the component or material. Advantage of this process in it suitable for production of components of similar configuration or geometry hardened layer produced in this process is called as case depth. Hardness of this case depth varies depending upon the types of material used. The components are heated by using high frequency electric current which sets up & subsequently hardness Induced eddy current heat the surface of the steel very quickly and are quickly followed by jets of water to quench the component. A level layer of case depth is produced with soft core. (Inner position of the material). Case hardness is measured only in HRC machines or Vickers hardness testing machine. Induction hardening process is widely applied automobile component. Normally induction hardening machines are classified as low frequency medium frequency and High frequency based on the frequency output from the machines. Components hardened are flange coupling, shift shaft, idler shaft etc..., Method of induction hardening is enveloped for EN8, CK45, S48C, EN18, EN19, materials etc..., Objective To meet the increased demand of induction hardening components by 52% in LA2413 with one shift operation by studying & Optimising OEE.(Overall Equipment Equipments).

  11. Iris recognition based security systemDownload Article

    Rithanya.S, Rohini.R, Sandhiya.R, Sathishram.V, Rathanasabhapathy.G

    Abstract

    close

    The eye iris has been investigated as the most unique phenotype feature in the biometric literature. A promising strategy in this context employs a classification approach using multiple signature extraction. Representations are extracted from overlapping and different parts of the iris region. Aiming a robust and noisy invariant classification, an increasing set of acceptance thresholds (frontier) is required for dealing with multiple signatures for iris recognition in the iris matching process. Usually this frontier is estimated using brute force algorithms and a specific step resolution playing an important trade-off between runtime and accuracy of recognition in terms of false acceptance and false rejection rates, measured using half total error rate (HTER). In this sense, this work aims to use Genetic Algorithms (GA) and Principle component algorithm (PCA) for finding such frontier. Moreover, we also employ a robust feature extraction technique. The experiments showed that the use of these evolutionary algorithms provides better, effectiveness in very little runtime in a complex database. Furthermore, it is shown that the frontier obtained by PCA is more stable than the one obtained by GA.

  12. Biometric and Aadhar card based electronic voting machine using ARDUINODownload Article

    C.M.Devi, T.Ramprakash, K.Baladhandapani, A.Prabhu, V.Parameshwari

    Abstract

    close

    This project is to develop a secure Electronic voting machine using Finger print identification method. Because, everyone’s finger print is different from others. Now aadhar card is nationalized for authority of Indian citizen. This proposed method include AADHAR card data base to access the finger print of the voters. Everyone’s finger print is scanned and stored in database. At the time of voting in the elections, ARDUINO board is used to capture the finger print of every individual and also the voted data. Then voter’s details can be stored and sent to the nearbyDatabase Administration unit. This method is to avoid fraudulence in the voting system. This project gives solutions for the problem at the time of voting.

  13. Evolutionary analysis of compression approximations for high quality dataDownload Article

    Santhakumar.K, Karthick.P, Maheshwaran.N, Ranjithkumar.S, Vishnu.M5

    Abstract

    close

    Many scientific lines up make large amounts of floating-point information that are saved for afterward use. To diminish the storage necessity, it is valuable to compress such data as much as achievable. How paper, presented algorithms tend to compress floating-point information relatively weak. As a remedy, this paper have developed Floating Point (FP) crush, a device that robotically synthesizes an optimized compressor for each given key. The synthesized algorithms are lossless and parallelized using Open Multi Processing (MP). This paper describes how FP crush is able to carry out this synthesis in real-time, i.e., even when accounting for the synthesis visual paper, it compresses the 16 tested real-world single- and double-meticulousness data files more rapidly than parallel bzip2. Decompression is a sort of magnitude quicker and exceeds the throughput of multi-core execution of bzip2, gzip, and FPC. Above all but two of the tested documents, as this paper as on average, the personalized algorithms convey higher compression ratios than the other three tools.

  14. Adaptive cruise control with ultrasonic and alcohol sensorDownload Article

    Dr. P. Sukumar, C.M. Theepshika, B.Nathiya, Sharika Sasikumar, S. Vinothini

    Abstract

    close

    Adaptive cruise control is a technique which has been developed for safer driving. This technique helps in controlling the speed of the automobile as well as it maintains a safe distance between the vehicles in traffic. A warning is issued in order to avoid collision when an object or vehicle comes too close. Ultrasonic sensors are used for this purpose. An alcohol breath sensor is also implemented along with this system so that it is made sure the driver does not use the vehicle in drunken state, hence reducing possibilities of road accidents.

  15. Obstacle detection and object size monitor for autonomous mobile robotDownload Article

    Manikandaprabu.N, Bhuvanesh.R, Chandrasekaran.K, Gowtham.S, Vadivel.K

    Abstract

    close

    The goal of the project is to recognize moving object and monitor size of them throughout their life spans. Our algorithm uses a combination of motion detection and size monitoring. If the determined size has been varied, it has detected by the mobile robot and given the alert. Results show no false object recognition in all tested images, perfect tracking for the synthetic images and 98% tracked rate on the real images. The main aspects of this project are to reduce human error and reduce the process time. This process will improve overall quality of products and reduce the wastage.

  16. Advanced railway safety monitoring system based on embedded systemsDownload Article

    Punitha.R, Sridurga.S, Moogambika.M.R, Poonguzhali.M, Sehanass.F

    Abstract

    close

    Railways comprise a large infrastructure and are an important mode of transportation in many countries. Railways are the lifelines of a country. The railways have become a new means of transportation owing to their capacity, speed, and reliability, being closely associated with passenger and goods transportation; they have high risk associated with them in terms of human lives and cost of assets. The poor maintenance of the railways can lead to accidents. New technologies for railways and better safety measures are introduced time to time but still accidents do occur. Thus, a proper strategy is required for maintenance and inspection of tracks. Detection and maintenance of rail defects are major issues for the rail community all around the world. The defects mainly include weld problems, internal defects worn out rails, head checks, squats, palling and shelling, corrugations and rolling contact fatigue (RCF) initiated problems such as surface cracks. If these defects are not handled and corrected they can lead to rail breaks and accidents. There are numerous challenges to rail community and the infrastructure maintenance people such as to perform effective inspection and cost effective maintenance decisions. If these issues are taken care of properly, inspection and maintenance decisions can reduce potential risk of rail breaks and derailment. The detection of cracks in rails is a challenging problem, and much research effort has been spent in the development of reliable, repeatable crack detection methods for use on in service rails. While crack detection in the rail head and shear web is reliably achieved using ultrasonic and eddy current methods, neither technique is particularly effective for the detection of cracks in the rail foot. This project present a new crack detection method and accidents prevention method with the use of IR sensors, fire sensor, zigBee and other embedded systems. Index terms- Railway, detection of cracks, IR sensor, Fire sensor, Embedded Systems I. Introduction Railway is one of transition mode, which has an important role in moving passengers. However, railroad-related accidents are more dangerous than other transportation accidents. Therefore more efforts are necessary for improving its safety. This system is to manage the control system of railway gate, railway fire, track crack, and door lock using the embedded systems. The main purposes of this system are about railway gate control system and level crossing between railroads, fire detection in rail coaches, automatic door lock system on running train and bomb detection in rails. Railways preferred the cheapest mode of transportation over all the other means. This system is designed using Arduino Uno (ATmega328) to perform railway safety monitoring system. Embedded system performs the complete operation i.e., sensing, gate closing and opening, detection, door locking and opening. As a train approaches the railway crossing from either side, the sensors placed at a certain distance from the gate detects the approaching train and controls the operation of the gate. This system was operated after signal received from the sensors. This signal is used to trigger the microcontroller for operating the gate motor, alarm system and light indicators, bomb detector. The abstraction of this system is to provide the advanced control system available to everywhere.

  17. A cross layer design for adaptive antenna array based MANET in multicast environmentsDownload Article

    J.Nalinipriya, S.Sangeetha, K.Vaishma, S.N.Sethuraman

    Abstract

    close

    A medium access control (NULLHOC MAC) protocol for MANET based antenna is presented. The antenna array is used for transmit and receiving the signals by using Omni-directional antenna and for increasing spatial reuse by directing nulls at active transmitters and receivers in the neighborhood. In contrast to previous work with directional antennas, our approach is applicable to multipath channels, such as indoors or in other scattering environments. The MAC protocol is designed to support the control information exchange needed to direct nulls toward other users involved in other communication sessions. Knowledge of the channel coefficients between a transmitter or receiver and its neighbors is used to design transmit or receive beam former weights that to implement the requisite nulling. Simulations are used to demonstrate the improvements in throughput and transmit powers that are obtained in this approach we relative to the IEEE 802.11 NULLHOC MAC protocol. We also analyze the effects of channel estimation errors occur on our protocol and propose a simple modification of the basic NULLHOC MAC protocol to minimize their impact.

  18. A perspective pattern recognition scheme using finger vein for security applicationDownload Article

    A.Kiruthika, S.Priya, N.Priyanka, G.Pradeep Kumar,V.Parameshwari

    Abstract

    close

    In recent days, finger print and vein based personal identification system is used for security purpose. In this project infrared vein image is used and a self illuminance control algorithm is used to integrate the image. Gabor filter is used to detect the edges of image. It is basically used to detect length and width of the finger vein image. Gabor filters are inspired by multichannel processing and used to achieve maximum possible joint resolution. Gabor filter consits of two parts real and imaginary. The real part of filter is called an even symmetric gabor filter and used for ridge detection in an image ,where as imaginary part is called as odd symmetric gabor filter. The odd symmetric gabor filter is used for edge detection of image. A neural network algorithm is used for feature extraction and to identify the genuine(authorized) person or imposter(unauthorized) person. Receiver Operating Characteristic curve (or ROC curve) is a plot of the true positive rate against the false positive rate for the different possible cut points of a diagnostic test. This will identify the accuracy of the output.

  19. An enhanced hybrid cryptographic and video watermarking for secure transmission of medical dataDownload Article

    Menaka.S, Priya.K, Ramapriya.M, Thinakaran.N, Srinevasan.M

    Abstract

    close

    In this project cryptography and watermarking is used for secure transmission of medical data. Medical image security and privacy are two issues that are interrelated and highly sensitive in the earlier stage. Privacy and data integrity has to be protected at a same time without comprising on the structural integrity of the data is very difficult. To overcome this, a dual security loom is employed where watermarking and encryption is used to provide two layers of data security. The watermarking is proposed to be implemented using a hybrid approach which encompasses Inter pulse code modulation (IPCM) and Singular Value Decomposition (SVD) techniques. BitXOR Optimization is used for optimizing the watermarking parameters. The encryption is proposed to be effected using Data Encryption Standard (DES) and Transposition encryption algorithms. A Graphical User Interface (GUI) which enables the user to have ease of operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed. Finally, the robustness and the integrity of the watermark are tested by measuring different performance parameters and subjecting it to various attacks.

  20. Power generation using renewable resources and smart utilization based on embedded systemDownload Article

    R.Punitha, C.Mohana Priya, C.Mahalakshmi,N.Madhumitha, R.Muthupriyadharshan

    Abstract

    close

    Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources is takes place i.e. wind and solar energy And also there is a problem of using power lavishly. To save the electricity and also to reduce our conventional power generation by electricity board. We are proposing an idea to acquire electricity using renewable resources and a module to regulate the usage of electricity in efficient manner by using PIR and LDR sensorsThe project uses a high speed PIC microcontroller and it has a whole lot of advantages over other controllers. After acquire the electricity we use pre programmed PIC 16F877A micro controller to regulate the usage in domestic instruments like light,fan , water heater b etc., We use PIR sensors and LDR to detect the presence of humans in a room in order to consume power from renewable resources and adjust the electricity usage according to the need with the help of Embedded C and proteousSimultor.

  21. Real time monitoring of the loom section and thread counting using line de-coding techniqueDownload Article

    Prabhakaran.G, Baskar.M, Deepak.V, Anbarasu.T, Kalaiyazhagan.M

    Abstract

    close

    The main objective of the paper is to capture the thread through the bobbin in the loom section and to count the number of thread present in the loom. The main aspects of the paper is to reduce human error and also reduce the process time. This paper is reviews of the digital image processing in which to detect the thread in the poly ethylene loom section and to packing the material knifing to count the no of the thread by using line coding. This method is independent of thread size, therefore accuracy is high and detecting & counting. This process will improve overall quality of loom products and reduce the wastage. In this project a review of line coding studies and to count the number of thread are summarized and identified.

  22. Interactive smart automation system using raspberry PI and open CVDownload Article

    Ms.R.Priyadharsini, M.Mailerum Perumal, T.Madhuvanthi, P.Monisha, M.Chandrika, R.Nithya

    Abstract

    close

    An OpenCV is mainly aimed at real time computer vision and machine learning software library. Some of the applications of OpenCV are facial recognition system, gesture recognition, and human computer interaction. Such applications include gesture recognition in which hand gestures will be captured by camera module that interfaced with Raspberry Pi. The real time technical revolution includes smart environment, agricultural fields and health monitoring. Challenges in health monitoring from various places were implemented using IoT with the help of sensors. In Agricultural field, moisture of soil, humidity, temperature, climatic conditions, can be monitored using sensors, so that farmers effectively uses water, cost, asset sharing and productive management anywhere at any time. Algorithm for image processing, health and home monitoring was written and installed in Raspberry Pi.

  23. Implementation of smart menu system in refectoryDownload Article

    Indumathi.P, Priya.R, Karthick.P, Purusothaman.G, Prabhakaran.G

    Abstract

    close

    The smart phone menu ordering system used in the refectory is existing technique. In this project, menu ordering system is done by using touch screen and raspberry pi-3. The customer does not wait until the waiter arrives to order the items. On the customer section, the customer is provided with the touch screen at each table. The refectory is made smart by using touch screen. The items which are ordered by the customer is sent to the other section through HDMI cable. Another section consists of multi monitors at the chef side and the ordered items can be viewed by the chef. Bill is generated at the billing section. Based on the items ordered by the customer the service is provided. In this project, 5 inches Touch screen is used to order the items required by the customer. This project saves time to the customer and the chef. The service of providing items is based on priority and reduces the time delay in order reaching kitchen. This project satisfies the customer requirements and improves quality of service.

  24. Arduino based digital token system using GSMDownload Article

    Brindha.S, Kalai Bharathi.S, Kavitha.P, Kiruthika.N, Sathishkumar.M

    Abstract

    close

    In this project, innovative system has been introduced which can fruitfully reduce the waiting time of the customer in the bank. Token system is specially designed to provide efficiency and comfort in places such as banks, public utility offices, health care and other places where the people have to wait on a line to get the service. Initial concept of token system is to reduce a real and clear waiting time, speed up service delivery which improves service quality and increases customer satisfaction. This project is about GSM based token system. The GSM modem used to propel and attentive SMS to the particular token holder before his turn to come. In order to register for an appointment, the User has to call to the server number in a fixed format. If one call’s in the fixed format, person will be append to the line and an answer message with the token number will be propel to mobile and to check token status through SMS.

  25. Load sharing of transformers using communication protocolDownload Article

    R.Akshaikumar, N.Sabari Natesh, S.Sundarraj, S.Venkatesh, E.K.Arul Karthick

    Abstract

    close

    The transformer is a static device, which converts power from one level to another level. The aim of the project is to protect the Primary transformer under overload condition by load sharing. At the overload condition, the secondary current or load current will increases to abnormal value. Due to high current, the output voltage at transformer will drop down. Hence it will affect the efficiency of transformer. Due to overload current the efficiency drops and windings get heated. Finally it leads to damage. Overload can be prevented by sharing load to another transformer which is parallel to existing transformer. The arduino compares the load on the existing transformer with a reference value. When the load exceeds the reference value, the incoming transformer will share the extra load. Therefore, the two transformer works efficiently and damage is prevented. In this project three modules are used to control the load currents. The first module is a sensing unit, which is used to sense the load current and the second module is a driver unit. The last module is arduino unit and it will read the analogue signal and perform some calculation and finally gives control signal to a relay. A GSM modem is also used to inform the control station about switching between transformers. The advantages of the project are transformer protection, uninterrupted power supply.

  26. Coal feed monitor and control system using PLCDownload Article

    V.Logeswari, S.Sangeetha, R.Subashini, M.Thamizharasi, S.Irfan

    Abstract

    close

    This project outline the various of operation involved in the conversion of a manually operated conveyor and bunker towards a fully automated process by using plc. This project describes the coal level in the bunker is continuously monitoring and the speed of the coal conveyor is controlled according to the amount of coal present in to the bunker to maintain and fulfill the load demand. The DC motor is used to control the conveyor belt motor and changing the speed 0-100%. The parameter like the coal level in to the bunker can be measured and monitor in the ultrasonic sensor. Automation plays on increasing important role in the world economy and in daily experience.

  27. Wavelet based feature extraction in retinal images to detect GlaucomaDownload Article

    S.Vijayakumar, S.Nithiyanandham, S.Pavithra, M.Umamaheshwari

    Abstract

    close

    Glaucoma is the second leading cause of blindness and results in the neuro degeneration of the optic nerve and it is one of the most common causes of blindness. Because revitalization of the degenerated nerve fibers of the optic nerve is impossible early detection of the disease is essential. An early glaucoma diagnosis system is proposed using a combination of wavelet features. Wavelet based textural features specifically energy, entropy, skewness, kurtosis with first level decomposition method is extracted from retinal images. The extracted features are fed as input to SVM classifier. The proposed system achieves sensitivity of 90% and specificity of 92.2% in SVM. Furthermore, the impact of different features on the detection of retinal defects was compared and the performance was analyzed.

  28. Profile perception using central symmetric LBP and combined multi angle GaborDownload Article

    Kalyanasundaram.P, Baby.S, Jeevitha.S, Jensi karunya.S, Kavipriya.N

    Abstract

    close

    Profile perception system is a challenging area of research in the field of security surveillance. For recognition tasks the most common approach when using deep models is to learn object representations (or features) directly from raw image-input and then feed the learned features to a suitable classifier. The paper presents multi texture features based face recognition using Central Symmetric local binary pattern and Multi angle Gabor Face filter. The proposed system involves face detection, Features extraction and matching. A method which can extract multiple feature information from a single source and can give a satisfactory performance even with less number of training images is desirable. Thus combining face and particular data obtained from the same image may increase the performance of the recognition system.A detailed performance analysis of face recognition and particular biometric using Gabor and LBP features is carried out. The proposed features retain the contrast information of image patterns. It discriminates an object like the surface texture and the shape formed by its boundary. The boundary often shows much higher contrast between the object and the background than the surface texture. The Gabor filter bank is then used to extract the features from face regions to discriminate the illumination changes. These features are useful to distinguish the maximum number of samples accurately and it is matched with already stored image samples for similar category classification. The simulated results will be shown that used methodologies have better discriminatory power and recognition accuracy compared with prior approaches.

  29. Unmanned petrol pump station using PLCDownload Article

    M.Anugraha,J.Divya, T.Gowthami, S.Harini,P. Kokila

    Abstract

    close

    Fuel stations are operated manually and requires more man power and also takes more time to fill the fuel in the tank. In order to reduce the time consumption and manpower a smart petrol pump station is implemented. Human Machine Interface enable to control, management and visualization of device processes and it can range from simple inputs on a touch display to control panels for highly complex industrial automation systems. It is used to monitor the tank level and gives the warning if the level reaches the threshold value. It also helps to refill the tank automatically. All the blocks are controlled by plc controller using ladder diagram logic.

  30. Autonomous robot for roadside drainage cleaningDownload Article

    Sukumar.P, Gowtham.S, Kavin.R, Nagarjun.S, Prakash.S

    Abstract

    close

    Autonomous robot for roadside drainage cleaning is the advancement in the field of robotics. The existing cleaning system with robot is used only for cleaning pipelines. The pipeline systems are applicable only for developed countries but most of the countries prefer roadside drainage system for drainage and sanitary use. Many house hold sewage are transported through roadside drainages. These drainages are the main reason for several diseases. To avoid this, frequent cleaning of sewage is mandatory but cleaning of this sewage by human is a tedious and expensive process. To tackle these problems, we have developed an autonomous mobile robot which travels inside the drainage and cleans it. The robot is powered by using a rechargeable battery and contains proximity sensor to sense the sewage blocks. The proximity sensor is used to detect the sidewall to avoid collision.

  31. Industrial automation using pragmatic sensational screenDownload Article

    Jayachandran.T, Aishwarya.R, Gayathri.S, Iswarya.P, Vinoth Kumar.J

    Abstract

    close

    This paper presents a large interactive display with pragmatic sensational buttons and sliders on a pale-colored flat wall. It is easy-to-install system consists of a front projector and a single commodity camera. A button touch is recognised based on the place of the shadow cast by the operator’s hand; this shadow becomes small in size when the button is touched. The shadow field is segmented by a concise change of the button to a distinct color when large foreground (i.e., the hand and its shadow) covers the button region. Therefore, no time exhausting operations, such as morphing or shape analysis, are required. Background reduction is used to extract therefore ground region. The allusion image for the background is frequently adjusted to match the ambient light. This virtual slider is based on the above touch-button mechanism. When tested, The scheme verified potent to differences in illumination. This virtual slider has an immediate response and proved suitable as a regulator for a Breakout-style game.

  32. Steam drum’s water, temperature and pressure level measurement using GSM technologyDownload Article

    Premkumar.P, Jenitapriya.M.A, Deepika.R, Devika.M, Sowmiya.V

    Abstract

    close

    The Steam drum is very important parameter in Thermal Power Plant and it requires continuous inspection withspecific time interval. Earlier days this inspection and monitoring is done with human workers. There are number of possibilities of errors with human workers while measuring particular values in boiler operation process. As thermal power plant has to work for 24 hours and 365 days, it is quite difficult to monitor the parameters in site at each and every moment without any issues. So a reliable monitoring system is required.To overcome this issue we proposed Steam Drum’s water, temperature and pressure level measurement using GSM technology.This system mainly consists Temperature sensor, Pressure sensor and Water sensor. All the sensors data is processed using Arduino.In existing system the Steam drum’s temperature, pressure and water level are monitored by using different sensors to reduce the human error. This project presents the monitoring system with an integration of GSM module to alert the person-in-charge through Short Message Service (SMS) when there is a sudden increase or decrease in the level. The level is monitored and its data sent through SMS to the intended technician’s mobile phone upon reaching the critical level.

  33. Wireless gas leak detection and localizationDownload Article

    Manikam.T, Anupriya.P.M, Bagyalakshmi.A, Deepika.V, Mandra Madhumathi.R

    Abstract

    close

    Leakage of gas mostly in industries, hospitals etc., may cause economic losses and it is polluting our environment. Through wireless sensor network system it can be easily detected. The main aim of this system is to detect the harmful gas in the environment and finds the exact location from where the gas leaks. This gas leakage problem can be solved with the help of WSN based on ZIGBEE. Based on the low power ARDUINO and ZIGBEE techniques entire control system is working. A gas sensor is used in this system, it helps in collecting data regarding leakage of gas. It detects the location of gas leakage through GPS. The collected data is then sent to central processing unit to update the data. Data are continuously transmitted from ZIGBEE sensor node 2 to ZIGBEE coordinator. This system helps to detect the gas leakage location automatically. The overall design of the system is discussed in this paper.

  34. Novel forest fire detection using flame detectorDownload Article

    Balaji. K, Dineshkumar.T, Peranandhan. B, Naveenkumar.P ,Sowbakkiyam.S

    Abstract

    close

    Crown fires are enormously dangerous, and very difficult to fight against and control. Spread rate of crown fire is hundred times more than a surface fire. The forest fire detection is very important one because more amounts of forest areas and animals are destroyed. It is essential to determine the type of forest fire and the detection based on wireless sensor networks (WSNs) to adopt the proper strategy to fight the fire. In this method flame detectors are used to detect fire or flame. Whenever there is a presence of fire, flame detector detect and set to high value and the GSM passes the information to rangers, after that they can enable the Co2 cylinder to pump the gas on fire.

  35. Design of high speed low power vedic multiplier using ancient mathematicsDownload Article

    Bhuvaneswari.M,Raghupathi.P, Dr.C.N.Marimuthu

    Abstract

    close

    The would like of high speed number is increasing because the need of accelerating high speed processors. A number is one in every of the hardware blocks in quick process system. this can be not solely a high delay block however conjointly a serious supply of power consumption. a standard processor needs significantly additional hardware resources and additional time interval within the multiplication operation, instead of addition and subtraction. during this project, we have a tendency to implement a high speed number victimization algorithmic rule elaborate in Indian ancient sacred text arithmetic that is used for all case of multiplication. to enhance the performance of number. during this methodology, because the variety of number bits will increase it needs less variety of calculations compare to different existing multiplication algorithmic rule. during this propose, the sacred text number is compared with the prevailing methodology like Booth and array number. The sacred text number is intended victimization Urdhva and Nikhilam sutras. This algorithmic rule reduces the general delay of the number unit.

  36. Smart automated system for monitoring license test driveDownload Article

    P. Kokila, K.Nandhini, M.Nandhini , P.Aravind,S.Karthikeyan.

    Abstract

    close

    Driving license system is a very difficult task for the government to monitor. Normally, in license tests a candidate applied for license have to drive over a closed loop path like the number 8 in front of the authorities. The candidate has to drive over the path without any support over the land surface and if he fails to do he will be disqualified. For that, the authorities have to watch him/her manually. But in this project is about the automation of driving license test monitoring system.

  37. Microaneurysms detection using morphology for diabetic retinopathy screeningDownload Article

    Microaneurysms detection using morphology for diabetic retinopathy screening

    Abstract

    close

    The reliable detection of retinal lesions in fundus images helps in the development of an automatic telemedicine system for computer-aided screening of diabetic retinopathy. The main contribution is a new morphology technique that does not require precise segmentation of the regions to be classified. The method is validated per-lesion and per-image using some reliable databases, four of which are publicly available. It proves to be robust with respect to variability in image resolution, quality and acquisition system. On the whole, when detecting images with diabetic retinopathy, the proposed method achieves an area under the ROC curve of 0.899, comparable to the score of human experts.

  38. Underwater image super-resolution by garnering and federationDownload Article

    Dhaarani.T.G, Abirami.S.M, Akila.M.S, Janani.C.B, Gobinath.S

    Abstract

    close

    Getting luminous image in underwater is an important role in ocean engineering field. The quality of underwater images plays a crucial role in this scientific era. Underwater images are degraded due to scattering and absorption, which results in low contrast and objects cannot be viewed properly. Super resolution (SR) algorithm is used to expel the presence of noise in the underwater image. The main aim of super resolution is to set low resolution (LR) images to comprise high resolution (HR) images. By using self-similarity based SR algorithm, a high resolution (HR) image of scattered and descattered images are obtained. To recover the final high resolution (HR) image, next we apply the convex fusion rule. Denoised image gives a proper resolution.

  39. Efficient data aggregation and obstacle avoidance for WSN to elongate network lifetimeDownload Article

    Karthika.A, Jeevitha.R, Elackiya.L, Murugan.A.P, Pradeepkumar.G

    Abstract

    close

    Recent development in a wireless network is a Wireless Sensor Network (WSN). In general, the sensing field could contain various obstacles which cause loss of information transferring towards base station. As a remedy, this paper presents an energy-efficient routing mechanism based on cluster. According to the cluster-based method, all nodes act as a cluster member and some nodes are selected as a cluster head. Cluster heads are elected based on threshold formula which collects data from their corresponding cluster members and forwards it to the mobile sink. A mobile sink is a simple mobile node it starts data-gathering from starting site, then directly collects data from cluster heads in single-hop range and finally, it returns to the starting site. During the movement of the mobile sink if the obstacle exists in the sensing field it can be detected using Spanning graph and Grid based techniques. Grid based method proposed for regularize the shape of obstacle. The possible locations for the mobile sink movement can be reduced easily by Spanning graph. At last, Obstacle avoidance-shortest route was established for mobile sink using Dijkstra’s algorithm. The proposed method tries to prolong the lifetime of the network using NS and simulation results verify the effectiveness of the proposed method.

  40. Design and implementation of wireless Bell systemDownload Article

    Logeswari.V, Ramya.M, Rekha.M, Sandhiya.V, Yaswanth Narayanan. P

    Abstract

    close

    The world over the decades has made considerable progression in computerization and it is employed in every sector. The need for a habitual institution bell is now a necessity which has been evolved with the revolution in technology and enhances in the education system where time is a major factor affecting the educational system where the time has to be precise. A wireless bell system is constructed with one managing unit and also more than a few bells are dispersed throughout the institution. Depending upon the programmers need and the timing may be varied and programmed into the microcontroller. When the programmed time is equal to the real time, via a relay for a predetermined time, the bell is switched on and through wirelessly it energised the bell at another end. This project is used to ring the bell automatically at the time of examination with time display at the source.

  41. Exposure of bosom melanoma using mastographic screeningDownload Article

    D. Arul Priya, J. Christy2, C. Indumathi, R.R. Saranya Devi, R. Monica

    Abstract

    close

    In this project a potent segmentation is used for detection of bosom melanoma in the earlier stage. Sensing of X-ray images is very difficult in radiology. To overcome this, the radiologist found mastograms for any type of abnormalities. Lack of health care among the women leads to various diseases which results in operation and nervousness among patients. Adaptive Neuro Fuzzy Inference System (ANFIS) is the technique used to segment affected area from the mastographic images. This algorithm integrates both neural network and fuzzy logic principles. Neuro-adaptive learning techniques provide a system for the fuzzy modeling procedure to acquire information about a data set. This project involves the feature extraction for identifying the bosom tissues. Finally, using mastographic image features such as shape, density and margin, the affected region can be found.

  42. Revelation of glitches in polymer bags by using color image processingDownload Article

    Murugasami.R Indumathi.G Ariharan.T Arunkumar.R Deepan Raj.A.S

    Abstract

    close

    A novel approach is proposed to detect the defects in the polymer bags, using colour image processing technique. In this, during the production. The quality of polymer gets affected due to that hole, which leads to waste in the raw material and also increases the production cost. In the existing system, LED with Camera was used to find the defects. But this method is not efficient to minimize the problem due to the limited intensity and scattering effect in LED. This technique reduces only 20% of defects and production cost. In the proposed system, a camera with 720p and a line laser with 650nm (red) wavelength are used instead of LED to reduce the defects and also increases the production cost. The proposed technique diminishes the defects up to 60% and also improves the quality in production.

  43. Performance analysis of multilevel marking algorithm in different mobility modelDownload Article

    Monisha.N Arunadeepa.G Dhivya Bharathi.B.V Aravind Kumar.S Shreedhar.P

    Abstract

    close

    The growth of the wireless technologies is increased while compared to the last decade. In Multi-Hop Wireless Networks (MHWN), due to more number of users congestion occurs severely. An active queue management (AQM) is a proactive, effective congestion control mechanism extended at the intermediate gateway. The algorithms are RED, GRED, REM, RIO and BLUE. Lock out and Full Queue problems are the main drawbacks in the AQM. To overcome these drawbacks, a Proactive Queue Management algorithm is proposed that supports end-to-end transmission control protocol (TCP) congestion control through triple packet marking. In this paper the performance of the various mobility models such as Disaster area, Manhattan grid, RPGM and Chain model are analysed. From the simulation results we have proved that MLM has zero packet loss due to queue overflow and improves the queuing delay by 0.1% with that of existing standard AQM’s such as RED, DT, REM, and BLUE.

  44. Exploratory product image search with circle-to-search interactionDownload Article

    S.Nandhini, A.Monica, S.Nathiya, P.Nivedha, M.Raghul

    Abstract

    close

    In this thesis analysis the challenges of understanding users’ search interests from the product images being browsed and inferring their actual search intentions. In this thesis a novel based image search that allows users to interact between browse and search processes, and naturally complete visual-based exploratory search tasks in an effective and efficient method. This system allow users to specify their visual search interests in product images by circling any visual objects in web pages, and then the system automatically infers users’ underlying intent by analyzing the browsing context and the same or similar product images obtained by large-scale image search technology. This study demonstrates that the proposed system provides exact search results and fast response to search demands compared with the conventional image search methods, and also, provides users with related results. It is difficult for user to interpret their search result only by query keywords and this leads to ambiguous and noisy search results. It is important to use visual information in order to solve the ambiguity in text-based image retrieval. This thesis work proposes a novel Internet image search approach. It only requires the user to click on one query image retrieved from text-based search are re-ranked based on both visual and textual content.

  45. Instinctive vegetal mounting appliance using iot technologyDownload Article

    A. Sriharan, Uvarajan.M, Ramsheed.H, Vinay Viswam.K, Hakkem.B

    Abstract

    close

    In today’s developing technologies IoT (Internet of Things) plays a great role so using this technology in automatic plant growing process we could monitor and control the growth, temperature, humidity, water level, etc, anywhere from the world. In this mechanism using a microcontroller along with the temperature sensor, moisture sensor, humidity sensor, level sensor, etc. required data regarding the conditions are taken and they are updated every second and we could access through the information’s using internet. Along with this solenoid valves are present to provide required water to the plant depending upon the soil moisture and temperature and to remove the excess water in case of rain in the field through the rain fall sensor and save them in a separate tank. In this IR sensors are also provided to monitor the growth of plant at various levels. This mechanism can be used to grow a single plant and also suitable for farming purpose. In this technology microcontroller and IoT are used to control and monitor all the parameters without human’s direct involvement in process.

  46. Efficient error detection codes for multi code upset correction in SRAM based FPGADownload Article

    Sangavi S, Sathya Prabha R, Nandha Kumar A, Shiva shanmugam K M, Maheswari T

    Abstract

    close

    Multiple cell upsets (MCUs) are fetching major issues in the dependability of memories out in the open to radiation atmosphere. To stop MCUs from cause data corruption, more complex error correction codes (ECCs) are widely used to protect memory, but the main problem is higher delay overhead. In this paper, novel decimal matrix code (DMC) based on divide-symbol is projected to boost memory reliability with lower delay overhead. The proposed DMC utilizes decimal algorithm to obtain the maximum error detection capability. Moreover, the encoder-reuse technique (ERT) is proposed to minimize the area overhead of extra circuits. ERT uses DMC encoder itself to be part of the decoder. Occurrence of such errors in the configuration frames of a field-programmable gate array (FPGA) device permanently affects the functionality of the mapped design. In this paper, we present a low-cost error-detection code to detect MBUs in configuration frames as well as a generic scrubbing scheme to reconstruct the erroneous configuration frame based on the concept of erasure codes. The proposed scheme does not require any modification to the FPGA architecture. Implementation of the proposed scheme on a Xilinx Virtex-6 FPGA device shows that the proposed scheme can detect 100% of MCUs in the configuration frames with only 3.3% resource occupation, while the recovery time is comparable with the previous schemes.

  47. Recognizing the flaw in polymers by Image processingDownload Article

    Aarthie.T, Abinaya.S, Sadhan Raj.T, Sathish Kumar.S, Manikandaprabu.N

    Abstract

    close

    An innovative approach is proposed to sense the defect in the polymer bags by using the laser with alarm. In this method, a line laser is used to detect the fault in the polymer bags during the fabrication. The major problems faced by the polymer bags industries are, getting some defects due to inadequate flow of glue which produces a hole in the molded polymer during the production. The quality of polymer gets affected due to the hole, which leads to waste in the raw material and also increases the production cost. In the existing system, LED with Camera was used to find the defects. But this method is not sufficient to minimize the problem due to the limited intensity and scattering effect in LED. This technique reduces only 20% of defect and production cost. In the proposed system, a camera with 720p and a line laser with 650nm (red) wavelength are used instead of LED to reduce the defect and increase the construction cost. The proposed technique reduces up to 98% of shortcomings and also increases the quality of the production.

  48. An intelligent and highly secured walking stick for disabled peopleDownload Article

    A.MohammedJafferAli, U.Mylon, V.MariMuthu, L.Ranjith Kumar, P.Prem Kumar

    Abstract

    close

    The Blindness is frequently used to describe severe visual impairments with or without residual vision. The application of ultrasonic ranging scheme for producing electronic walking stick for the blind is a technological advancement. There is a great dependency for any type of movement or walking within area or out of the particular area, they use only their natural senses such as touch or sound for identification or walking .To overcome all these problems of blind people, need to develop a project by using simple available technologies. This walking stick for blind people which have multiple sensors, with the help of sensors it has possible to enhance more features to the walking stick. The features are to detect the obstacle for collision avoidance, it detects the object in directions up, down and front. The other sensor placed near bottom tip of the walking cane to find the pits on the ground. Integrate these sensors to the voice record and play chip. Voice record in the different tracks; respond for different sensors to give the audio message to the blind person by the speaker to alert. In this project, sensors plays key role to detect the objects in all directions to make free to walk for the blind people. A dedicated switch is to get the position of the device and send it others through global system for mobile communication (GSM).

  49. Pseudo-science mirror with IOT for real time application using raspberry piDownload Article

    Murugasami.R, Prakash.R, Salman Faris.M, Sathish Kumar.A, Vignesh.P

    Abstract

    close

    In This Proposed Pseudo Science Mirror Introduced For Real Time Application Such As Image Capturing, Emotion Speech Using 64 Bit Processor. The Existing System Contains Limited Application Like Calendar, Time, Weather, News Feed, Notifications, Greeting. In This Proposed System Some Important Features Are Added Such As Reminder Service By Mobile Synchronization And Through Social Media, Camera and Speech Activated Music Player, To Enhance The Performance Of System By Using Raspberry Pi, Pi Camera And Voice Control Board.

  50. Low convolution HEVC for video compressionDownload Article

    L.Vigneash, Manikandan.B, Nantha kumar.C,Prakash.N,Selvaganapathi.N

    Abstract

    close

    The main goal of the HEVC standardization effort is to enable significantly Improved compression performance relative to existing standards in the range of few reduction of bit rate for equal perceptual video quality, the HEVC standard is used to achieve multiple goals coding efficiency, transport system integration and data loss resilience, as well as adoptability using parallel processing architectures. Current video coding techniques provide good performance both in terms of compression ratio as well as image quality. In this project the design of high efficiency video codec with significantly low convolution is shown particularly suited and optimized for mobile environments. HEVC has been designed to address essentially all existing applications of H.264/MPEG4 AVC and to particularly focus on two key issues increased video resolution and increased use of parallel processing architectures. This project provides an overview of the technical features and characteristics of the HEVC standard used in mobile video conferencing.

  51. Wireless energy meter reading transmissionDownload Article

    Rathnasabapathy.P, Dhanalakshmi.V, Manikandan.M, Nesamani.T, Prashanth.S

    Abstract

    close

    Design and implementation of commercial as well as industrial systems based on wireless communication. This paper presents an implementation methodology for a wireless automatic meter reading transmission system incorporating the widely used GSM. In many countries GSM network is widely known. Using GSM as the medium for WAEMRTS provides a cost effective. It is wireless and also always connected. The WAEMRTS sense information of utility usage. In this paper we suggest a method where we utilize telecommunication systems for automated transmission of data to monitor total power usage of a small scale company.

  52. Automated ration shop monitoring and controlling system based on embedded technologyDownload Article

    N.Gunasekar, N.Dhivya Bharathi, J.Infant Jesintha, C.Nandha

    Abstract

    close

    Public Distribution System (PDS) introduces the Fair Price Shop (FPS) for distributing the grains to the poor peoples. In now a day’s this PDS involves corruption and proscribed smuggling of goods. So this thesis suggest an approach to mechanize all the manual jobs in ration shop and the whole thing from data entry to weighing to thrashing is prepared by machines and the people have no hand in that. This provides high reliability and there brings a sense of straightforwardness to the consumers, hence no possibility of mistakes and practically no manual work. This scheme used to reduce the workers burden and easily maintain the stock details. Before going to the ration shop, first users show the stock availability details based on GSM message. Here the continuously monitoring the distributer of the ration shop. After distributing the materials the card holder receives the delivery Report from the ration shop the help of GSM.

  53. Efficient routing protocol for MANET using STP and BRMDownload Article

    A.Muthumuniyandi, G.Prabhu, A.Navinkumar, C.Ranjitha, V.Selina, K.Mahendhrakan

    Abstract

    close

    Manet routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. aodv is a reactive manet routing protocol that is vulnerable to a dramatic collapse of network performance in the presence of black hole attack. the paper introduces a new concept of self-protocol trustiness (spt) in which detecting a malicious intruder is accomplished by complying with the normal protocol behavior and lures the malicious node to give an implicit avowal of its malicious behavior. we present a blackhole resisting mechanism (brm) to resist such attacks that can be incorporated into any reactive routing protocol. it does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and thresholds to classify nodes as malicious. no modifications to the packet formats are needed, so the overhead is a small amount of calculation at nodes, and no extra communication. using ns2 simulation, we compare the performance of networks using aodv under black hole attacks with and without our mechanism to saodv, showing that it significantly reduces the effect of a blackhole attack.

  54. Locale trailing and log maintaining system for transport using android OSDownload Article

    S.T. Sadish Kumar, K. Gunasekar, M.Swathi, V.Ramji, 5.M.Eniya, P. Krishna Devi

    Abstract

    close

    This is a digital world, where everything is possible to occur in Nano second. Here, man’s biggest task is to keep up their time with patience. No one wants to waste their time in peak hours especially in case of transportation. People often miss their buses due to the lack of awareness regarding bus timings. Hence, we proposed a system to solve the above problem which will be useful for the travelers. In this project we have developed an android application which will get the location of the bus by using the location service provided by the Global Positioning System enabled android hand set and send those details to the server. The additional feature is a Short Messaging System option, which helps the admin to send important information to the registered mobile numbers for assistance. Through this project user can view many details of the bus like timing details, latest location travelled by the bus along with time, stop details.

  55. A Smart Agricultural UnitDownload Article

    G.George fernandez, Y.Jancyrani, J.Ranjanidevi, N.Gunasekar

    Abstract

    close

    This paper deals with the exposition of how robotics can be applied to various fields of agriculture. One of the most important occupations in a developing country like India is agriculture. It is very important to improve the efficiency and productivity of agriculture by replacing laborers with intelligent machines like robots using latest technologies. The paper proposes a new strategy to replace humans in various agricultural operations like detection of presence of pests, spraying of pesticides, spraying of fertilizers, etc there by providing safety to the farmers and precision agriculture. The developed system involves designing a prototype which uses simple cost effective equipments like microprocessors, wireless camera, various motors and terminal equipments which is an aid to the farmers in various crop field activities.

  56. Naïve bayes classifier for predicting ventricular arrhythmia diseaseDownload Article

    R.Keerthana, Dr. C.N. Marimuthu

    Abstract

    close

    This paper proposes a classification algorithm for the classification of ventricular Arrhythmia disease associated with heart attack. Classification of this disease and its type is important in the prediction process so that the life of the people can be saved. Recently, numerous research and techniques have been developed for the analyzing the biomedical signal and helps in classification of dysrthymia. The proposed scheme were mainly based on naïve Bayes algorithm which is efficient compared with others. The proposed paper is implemented and simulated using ModelSim software and produce output of accuracy 90%.

  57. A novel approach to detect & prevent hardware trojan attacks for trusted integrated circuitsDownload Article

    Jeyachandran.M, Sukumar.P

    Abstract

    close

    Hardware trojan detection and prevention is paid more and more attention in recent years due to the great potential threat imposed by hardware trojan to the whole integrated circuit industry. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during system operation in the field. It can also prevent a wide variety of attacks during synthesis, place-and-route, and fabrication of ICs. It can be applied to any digital system. This project demonstrate its applicability for both application-specified integrated circuits and field-programmable gate arrays. Using fabricated test chips with Trojan emulation capabilities and also using simulations, we demonstrate: 1) our approach can prevent 99.98% of specific attacks (simulated) that utilize detailed knowledge of the design being attacked 2) our approach never produces any false positives, i.e., it does not report attacks when the IC operates correctly.

  58. Prediction of Betal Leaf Disease using image processing techniquesDownload Article

    T.Jayachandran, D.Ramya, T.Santhiya, P.Jagadheesh, V.Praveen Kumar

    Abstract

    close

    Agriculture plays a vital role to development of economy of India. Farmers have difficulty to select suitable fruit and vegetable crop. Disease management by manually is a challenging task. Most of the diseases are seen on the leaves or stems of the plant. Hence agriculturist needs to find out the efficient techniques. In this paper we have combined two techniques to predict the disease. The goal of proposed work to capture the leaf image from the camera. Apply preprocessing steps to remove noise from the image using Adaptive Median Filter Technique. K means segmentation is used to segment the affected part in the leaves. After segmentation Process extracts the features using color and Gabor and finally classify the disease based on Neural Network.

  59. Real time measurement of impurity level in the waterDownload Article

    V.Dhanalakshmi, N.V.Mohanbabu, D.Samrajkavin, S.Srinath, T.G. Dhaarani

    Abstract

    close

    The need of water have risen exponentially to an unprecedented scale in India. The demand for water supply is ever increasing and satisfying this requirement has been a major challenge for many countries around the world. Ensuring access to safe and clean water is another issue that requires attention. In earlier days, the quality of water is high, but over the last two decades it decreases in terms of physical, chemical and biological conditions. This study aims to detect and control the contamination in water. It will monitor the pollution level in water continuously and it will generate the database automatically. This helps us to view the information at any time from the control board. The pH, turbidity and temperature level can be viewed through real time android application, which works under IOT. In the case of pollution accident on a river, it will alert the nearby water control stations by sending them notification through (Internet of Things) IOT to the registered mobile numbers.

  60. A review on VLSI design techniques for power optimizationDownload Article

    S. Prema , B. Gopinath

    Abstract

    close

    This review paper gives the introduction of the various VLSI Design techniques. Low power has emerged as an important factor in today’s world of electronics industries. The reduction of logic circuit power consumption is a major priority of a designer attempting to meet implementation requirements. Power dissipation is a matter of concern as far as designing high performance systems are concerned. This makes clock signals a great source of power dissipation. High frequency systems use a large number of clock pulses. Whereas clock signals are only used for synchronization of the circuits the power dissipation due to clock pulses is significant making it important to study and area is one of the main objectives in all VLSI circuits. Power optimization is the use of electronic design automation tools to optimize (reduce) the power consumption of a digital design.

  61. Accumulative speed using context based adaptive binary arithmetic coding in real world video firmnessDownload Article

    Haridhash.K, Manoj kannan.K, Selvakannan.M, Udayakumar.M, Gopalakrishnasamy.A,

    Abstract

    close

    The ultimate goal of video source coding is bit-rate reduction for storage and transmission by exploring both statistical and subjective redundancies and to encode a “minimum set” of information using coding techniques. The performance of video compression techniques depends on the amount of reduction in complexity computation and efficiency contained in the image data as well as on the actual compression techniques used for M-coding. To achieve this, we combine the probability estimation based on the VP9 technique with approximation of Multiplication. Approximately that proposed algorithm is faster and better compression efficiency compared to the various coder in the CABAC entropy coding scheme.

  62. Design of 4 bit shift register using restructured d flip-flop topologyDownload Article

    N.Dhivya, R.Murugasami

    Abstract

    close

    Low power has emerged as a principal theme in today’s electronics industry. To achieve an optimized design, Flip-flops (FF) plays a vital role in low-power digital systems. In the existing method, clock gating with different voltage level signals were implemented such as ,low swing (LS) clock signal and conventional clock, throughout the entire clock network. Thus, power savings was maximized. But, the existing method had a drawback, such as area overhead, had not been quantified. In the proposed method, a restructured DFF is proposed by a pass transistor logic, instead of the inverter setup. A 4 bit serial in parallel out (SIPO) shift register is designed using the restructured DFF and the power and area is reduced by 59%, 12% respectively. The proposed system is implemented using Tanner 13.0 tool with 130 nm technology.

  63. Wireless sensor network for automotive fieldDownload Article

    V.Priya,M.Rajaraajeshwari, K.Thenmozhi,M.Vaishnudevi

    Abstract

    close

    Vehicular ad hoc network (VANET) ,is a technology that uses moves cars as nodes in a network to create a mobile network .VANET turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 metres of each other to connect and,in turn,create a network with a wide range As cars falls out of the signal range and drop out of the network ,other cars can join in,connecting vehicles to one another so that a WSN.In our project we create a VANET for vehicle accident identifying process.Here we have three units.We have both vehicle to vehicle communication and vehicle to road side communication.V2V is done for accident information is transfer to the ambulance from vehicle directly.V2R is done for ambulance to traffic light.Here we use ZIGBEE as a communication medium for VANET.Because it have low interference,at a time it can communicate with 255 devices.

  64. Hole detection and cluster based algorithm in wireless sensor networkDownload Article

    P.Kalyanasundaram, Dr. T. Gnanasekaren, C.Saranya

    Abstract

    close

    In industrial environments the uncoverage problem is the one of the major issues in wireless sensor network. The existing method they with four different energy efficient connected coverage algorithms: Communication Weighted Greedy Cover (CWGC), Optimized Connected Coverage Heuristic (OCCH), Overlapped Target and Connected Coverage (OCCH) and Adjustable Range Set Cover(ARSC).These algorithms only deals with sensor monitoring and the life time of network is poor. In the proposed method is to analysis the characteristic of two different algorithms like Tree-based coverage hole detection algorithm and Cluster Based Energy Efficient Power Saving Scheme (CBEEPSS) algorithm. These algorithms are used to detect the hole and dead nodes. The aim of the project is to provide IWSNs designers with useful insights to choose an appropriate coverage strategy and achieve expected performance indicators in different industrial applications.

  65. Orthogonal matching pursuit algorithm for roll bearings on eeg signals using stationary wavelet transformationDownload Article

    V.R Vinothini, P.Thangaraj

    Abstract

    close

    Signal processing requires the efficient representation and processing of data. In an emerging trend the compressed signals gives the collection of linear projections of a sparse signal and information for reconstruction. In this paper, we propose that an application of compressed sensing in the field of signal processing, particularly electroencephalogram (EEG) collection and storage. The proposed framework is based on the EEG signals are sparse in a Gabor frame. Gabor frames are commonly used in science and engineering to synthesize signals from, or to decompose signals into, building blocks which are localized in time and frequency. The sparsity of EEG signals in a Gabor frame is utilized for compressing the signals. The matching pursuit algorithm is shown to be effective in the recovery of the original EEG signals from a small number of projections. The OMP algorithm improves the efficiency of finding the frequency-time atoms and rapid noise rectification. The experiments results are investigated up to 100 iterations and reduction of noise in weak signals.

  66. A brain computer interface technique with seizure predictionDownload Article

    Vibeethakeertthana V.S, Sadish Kumar S.T

    Abstract

    close

    A Brain Computer Interface (BCI) with seizure prediction. A digital image processing method is to be used in. In machine learning, multiple kernel learning- support vector machines (MKL-SVMs, also support vector networks]) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis. The clustering algorithm which provides an improvement to the support vector machines is called support vector clustering and is often used in industrial applications either when data is not labeled or when only some data is labeled as a preprocessing for a classification pass. Epilepsy is characterized by a long-term risk of recurrent seizures. These seizures may present in several ways depending on the part of the brain involved and the person's age.

  67. Modeling and simulation of level control phenomena in a non-linear system Download Article

    S.Pooja, Dr.S.Vijayachitra

    Abstract

    close

    In recent years, model based controllers have proved a successful control strategy for analysing the performance of non-linear systems. The present study focuses on the conical tank system. If compared to the cylindrical tank system, the conical tank system has highly non-linear due to variation in cross sectional area with change in shape. In many process industries like Chemical industries, Petroleum industries, Paper industries, Water treatment plants, Fermentation industries etc.., it is preferred to have conical tank system because, it can offer more advantages than cylindrical tank system and spherical tank system such as minimum product losses, inexpensive etc... In the proposed work, modeling strategy is intended to provide a simple description of a peculiar structure of the non-interacting conical tank system. A model based controller of Internal Model Controller (IMC) is designed which can control the liquid level in the system at desired setpoint. Consequently, they can provide better output performance which can be measured in terms of overshoot, setpoint tracking and settling time when compared to conventional PID controller.

  68. Server room environment monitoring system using IOTDownload Article

    Udhayakumar.M, Shanmathy.S, Subashree.R, Navamalar.J, Deepika.M

    Abstract

    close

    This paper intends to provide information using wireless sensor technology which comprises of sensor interface device, wireless sensor network (WSN) and sensors. Realization of data gathered by sensors is displayed on mobile or window. A new method is proposed to design a reconfigurable smart sensor interface for industrial WSN in IoT environment, in which complex programmable logic device is adopted as the core controller. Then, challenging factors influencing the design and acceptance of M2Ms in the process control world are outlined, and the state-of-the-art research efforts world are outlined, and the state-of-the-art research efforts and design and acceptance of M2Ms in the adopted as the core controller. Performance of the proposed system is verified and good effects are achieved in practical application of IoT to server monitoring.

  69. Finger vein based advanced driving systemDownload Article

    Kannan.K.R,S.V.Ramya ,S.Sangeetha,N.Suganya, S.Santhosh Kumar

    Abstract

    close

    In our life surly everyone faced incident of vehicle theft. Because most of our vehicle have unreliable security system. This less secured system made easy way to steal vehicle. In this project, we used some security-based technology, which gives prevention methods from vehicle theft problems. One of our technologies is RFID based security system. RFID card has license details of person. In vehicle there is RFID reader module was placed. If any unknown person wants access that vehicle without proper RFID card, it does not allow starting the ignition of that vehicle. Another technology is Finger Vein based security system. This system requires finger vein image of person who wants to access that vehicle. That person must insert his finger into appropriate place on Finger Vein security system for accessing that vehicle. That system will detect that person is authorized or unauthorized. If he is unauthorized person, will not allow starting the ignition of vehicle. If that person has both appropriate details to access that vehicle. Both systems allow starting the ignition otherwise it does not allows starting the ignition.

  70. Secure cash dispenser system using gsm moduleDownload Article

    Gopalakrishnan S, Maheshwari P,Surega V,Naveenkumar P

    Abstract

    close

    The increased threat encountered by customers and ATM machines, have drifted the ATM center to a danger zone. The present day monitoring system is much vulnerable which in turn encourages the fraudulent activities and crimes in ATM centers. This is high-time for banking sector and government to join hands to weed out this crisis in security system. So it becomes indispensable to strictly monitor the do‟s and don‟ts inside the ATM centers, very specifically the facial recognition is considered to authenticate the entry of any individual inside the ATM center, it is achieved by employing classifier technique. As an additional feature, a combinational biometry system is used to access the ATM machine. The entire security module is incorporated with an easy access panic button and a sound sensor-cum-alarm, which alerts the cops as well as the bank‟s security wing, ensuring immediate rescue to the victims including physically challenged people. This overall system proves to be an autonomous, continuous and secured surveillance system.

  71. Cerebral microbleeds detection using convolutional neural network with maxpooling algorithmDownload Article

    Pradeepkumar.G, Kathirvel.R, Marimuthu.C, Mohamad sherief.M,Gowtham.S

    Abstract

    close

    Cerebral Microbleeds are the chronic Brain haemorrhages. They have been recognized as the important parameter for many cerebrovascular diseases. In the current situation, the cerebral Microbleeds are manually labelled by radiologists but this procedure is so difficult, time consuming and error may occur. In this paper we propose a Maxpooling method and Convolutional neural networks to detect the cerebral Microbleeds. Compared with the previous methods the detection is based upon the feature extraction process and they used the sliding window approach, and the detection of cerebral Microbleeds is only done. Our method is to segment the cerebral images by the Maxpooling, Rectifier Linear unit (ReLU), and fully connected layers. To extract the image features, HOG and the statistical features are used. Log Softmax function is used to predict the final Image. Disease classification is also done support vector machine. First we use a Maxpooling, ReLU, Fully connected layers method to segment the probabilities of cerebral micro bleeds and to apply an HOG and Statistical Features to extract the image. Compared to the previous methods, this can remove the massive redundant computations and increase the speed and detection of the process. In this proposed method sensitivity will be increased compared to the previous methods. Disease classification is also done due to cerebral Microbleeds by the support vector machine.

  72. Design of yagi microstrip slot antenna Download Article

    Sindhujaa.V, Rithanya.T,Chandraprasad.V, Singaram.M

    Abstract

    close

    In this paper we use a novel model of quasi yagi microstrip antenna with high gain and directivity. Slot is placed within the patch which helps to increase the front to back ratio and increase the gain of the antenna. Surface currents are more in the slot area that we have designed. The prototype of the antenna covers frequency range of 2-6 GHz with VSWR less than 1.2. The antenna has high gain between 5-7dBi and has high directional pattern. It is useful for Wi-MAX and other WLAN applications.

  73. Design of patch antenna using water dense dielectric materialDownload Article

    Vidhya.R,Swetha.T, ChandraPrasad.V, Singaram.M

    Abstract

    close

    The design of patch antenna using water dense dielectric material is proposed and designed. The mechanism of operation of the water dielectric patch antenna is observed to be similar with the conventional metallic patch antenna. The bandwidth performance of the proposed antenna can be improved by selecting a suitable thick dielectric substrate between the ground plane and the metallic patch. A maximum directivity of about 6.08dBi can be achieved using the proposed design.

  74. Detection of lung cancer from ct image using image processing Download Article

    S.Brindha, P.Priya, K.Sathya Bama, P.Selvapriya, S.Vijay Anand

    Abstract

    close

    Lung cancer is the leading cancer among both men and women. Detection of lung cancer is important inorder to improve the survival rate. Presence of lung cancer can be diagnosed with the help of a CT image of the lung. The proposed system is used to detect the lung cancer in three steps. The steps include preprocessing stage, feature extraction stage and lung cancer cell identification stage. First step is capturing the input image. Second step is preprocessing. Preprocessing includes two processes such as image enhancement and image segmentation. The Weibull segmentation is used to describe the texture contrast, shape, scale and texture. The output from the image segmentation goes to the feature extraction stage. These extracted features are used to identify the abnormalities in the lung.

  75. Finger print based vehicle starting systemDownload Article

    Dharani.M, Karthiga.S, Gnanasekar

    Abstract

    close

    Human identification is field very significant and which has undergone rap id changes with time. An important and very reliable human identification method is fingerprint identification. Fingerprint of every person is unique. So this helps in identifying a person or in improving security of a system. In this paper we use a fingerprint module to read once identity to start the vehicle. For this we use a microcontroller to enable the ignition system if the matching between scanned data and the already existing data is correct. Comparison is done inside the finger print module itself and its output is given to microcontroller. Result is displayed in a LCD display whether the user is authorised or not .If the Scanned data is not matched message will be send to authorised user through GSM module. In this project embedded system plays major role. It consist of Level converter, GSM, Finger Print sensor, Driver, Display and Power supply. Level converter is used to convert signal CMOSS to TTL and TTL to CMOSS. Fingerprint sensor is identifying the authorised user or not. It is connected to the Embedded system through Level converter. Vehicle connected to Embedded system through driver. Power supply is used to supply the system.

  76. Unguided bulletin board using digital cellular technologyDownload Article

    Ramya.K.V, Surya Devi.K, Prasanth.V, Tamil Prabhu.G, Monica.R

    Abstract

    close

    This project deals with displaying information’s in colleges on electronic notice board by sending SMS through mobile phones. It is a wireless transmission system which has very less errors and maintenance since, wireless transmission medium is used for data transmission in various areas. The hardware board contains Raspberry pi which is programmed by python. The Raspberry pi is interfaced with GSM Modem and a monitor. Any authorized user can send a message from mobile phone; this message will be received by GSM receiver Modem which is placed at the receiver side. GSM SIM900 sends the message to the raspberry pi and this message will be finally displayed in the notice board through monitor. This method is almost a fastest way to display the information instantly.

  77. Reuse of polluted waste water treatment for construction activitiesDownload Article

    Saravanakumar R, Surya S, Vikashini R, Vinodhkumar N G, Shankar P

    Abstract

    close

    Water scarcity is the major problem faced by our environment. Water is required for each and every construction activity. Generally it require huge quantity of water for construction purpose. In this project waste Sewage water from residencies is treated and then it is reused for construction activity Water used for construction as some basic properties that should not be disturbed in order to avoid cracks and to extend life time of building. Hard water is harmful for concrete as it contain magnesium chloride, sulphate and hydrogen carbonate. To remove chemicals the water is treated in three stages such as primary, secondary, tertiary stages and the harmful properties are removed during the treatment. The treated water is again tested and verified according to BIS standard of water. Then it is reused for construction activity.

  78. SRDD AD-Secured Routing Data Delivery by anonymous detection in wireless sensor networksDownload Article

    Ms.N.Pavethra, Ms.S.Ezhilarasi, Ms.V.Gunasundari, Ms.V.Kalaiyarasi, Ms.R.Sangeetha

    Abstract

    close

    In this paper, we investigate the Secured Routing and data delivery between the source–destination pairs in wireless sensor networks (WSN), where Anonymous node expose their selfish behaviors, i.e., forwarding or dropping data services. Manage the Anonymous node information in terms of its available resources, the employed incentive mechanism and the quality-of-service (QoS) requirements, and the other terms of their historical behaviors. In this framework, we used DSR Routing for Route Detection and Route Maintenance. Under the Anonymous Detection management, in this framework we used Random Key Pre-distribution (RKP) a security key management for secure path selection criterion is designed to select the most reliable and shortest path in terms of Routing available resources.

  79. Video compression using spiht and dwtDownload Article

    Vigneash, Anto Jeenia.X, Harsha Menon, Kavinilavu.A, Saranya.D

    Abstract

    close

    In our work, we present wavelet based video compression algorithms. The motion estimation and compensation, which is an essential part in compression, is based on segment movements. The proposed work based on wavelet transform algorithm like Set Partitioning In Hierarchical Trees (SPIHT) and Discrete Wavelet Transform (DWT). Results of average value of Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE) and comparison chart is obtained using MATLAB. The proposed SPIHT and SWT algorithm achieves very good PSNR values, and MSE which makes the techniques more efficient than the 2D Discrete Cosine Transform (DCT) in the H.264/AVC codec.

  80. Double-lens tracking-camera system using VLSI-designDownload Article

    Nanthini.N,SasiKumar.D,SelinFranciesca.S,Yogeswaran.E

    Abstract

    close

    We propose a double-lens tracking-camera system composed of two lens-modules. One module is to take a wide view while the other is to track and magnify the target with its pan-tilt mechanism, which mimics the eye’s function of tracking and watching an object without losing wide whole view. We have developed a prototype of the camera and applied it two real-worldapplications,i.e.,“fish-tracking”and “illegal-disposal-surveillance” and had excellent results fundamentally in theapplications.

  81. Rfid based gate entry control systemDownload Article

    Mr.R.Praveenkumar, S.Srivarshini,T.Manju,M.Jotheeswaran

    Abstract

    close

    In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems. RFID is an auto identification technology which uses Radio Frequency (between 30KHzand 2.5GHz) to identify object remotely. It have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. This paper deals with RFID based automatic gate entry control system (GECS) which is developed for the organisation to monitor and record the entry of the bus and driver with its timing related activities. Entire system is developed with low frequency RFID reader and passive tag at the one side and network based software application running at the other side. This RFID reader and Tag performs the operation to monitor which bus and driver entered or left the organisation with their timings. The entire information is stored in the computer by interfacing (serial interface RS232) with the reader. The updated information in PC is sent as an email to the higher authority which is used to monitor the information at anytime and anywhere.

  82. Robust channel coding for wireless communicationDownload Article

    C.Deebika, JishnuSubash, P.J.Shugashini

    Abstract

    close

    The reliability of wireless channel often makes us to use channel coding for error free transmission. The implementation of channel coding is exploited in various wireless communication standards in various dimensions. The deployment of error correction and detection coding schemes in several wireless communication standards depends on the severity of the channel and the prominence of the fidelity of the data. In this project work a robust channel coding is proposed which can work well in any type of wireless channel. The modulation techniques signify for data rate, hence a quadrature modulation is used. As an initial step the basic wireless channel model is used to test the strength of various error control schemes in terms of probability of error. The performance of error control schemes is further tested that for two other types of wireless channel models. Channel coding can be done dynamically by including channel estimation for better robustness.

  83. Deblurring license plate images with kernel estimationDownload Article

    Sinduja C, Manickam T

    Abstract

    close

    A vehicles license plate tracking with sparse representation. A digital image processing method is based on sparse representation to identify the blurred images from the license plate for fast moving vehicles. The detection of fast moving vehicle is an important part in Intelligent Transportation System. A new method for detecting vehicles, which violate rules in real time traffic scenario. The length of the motion kernel with Radon transform in Fourier domain which handles large motion blur even when the license plate is unrecognizable by human. It is used to identify the vehicles which crosses the speed limit and also it is useful in hit and run accidents. Experiment results show that this method can improve the efficiency of the moving vehicles license plate detection without blur greatly.

  84. Smart indications of explosive objects, obstacle &crack on track in railway systemDownload Article

    C.Thamilarasi, S.Divya, J.Kowshika, A.Sangeetha

    Abstract

    close

    Now a day’s human using over bridges for crossing the rail and manual controlling mechanism for the railway gates. But most of the passengers not utilizing this facility and they will cross the rail directly and leads to accidents. And the crack occurred in Rail also lead to cause an Accident. And the train could be exploded by some terrorist. In our project, it is introducing a new intelligent Train which reduces accidents, derailing & colliding and make an easy and Safe Travel for passengers from one place to another places. And then seat availability in each compartment should known by passengers through mobile phones. And also identify in which compartment the electronic device got problem.

  85. Voice controlled autonomous braking system and accident detection systemDownload Article

    B.Karthikprabu K.Bharathi S.Naveen P.Selvaganesh

    Abstract

    close

    We present a paper whereby the human voice may specify continuous control signals to drive the car. Individuals with motor impairments such as those with paraplegia, spinal cord injuries, war-time injuries, or amputations rely on others to assist them there in daily activities. Advances in assistive technologies have begun to provide an increase in independence for these individuals, but there is great potential for further technological developments to significantly improve their abilities, independence, and overall quality of life. One of the greatest challenges faced in assistive technology. However, control options are extremely limited when the target users have little or no use of their limbs.. The android meets robots application used for recognizing voice to control speed of the vehicle. Road vehicle accident take place frequently which cause huge loss of life and property to the country and people. Our goal is to move towards making accessible manipulation of everyday objects to individuals. Using our system, we develop voice control, automatic breaking system and accident sensing system .Voice controlling system is used to drive the vehicle by using android phone. Ultrasonic sensor senses the object in front of the vehicle then microcontroller activates the brake as it receives vibration from the sensors. The alert message is sent to the mobile of the user through GSM modem.

  86. Real time soldier health and geo position tracking system with toxic bomb detectionDownload Article

    P.SapthikaParthi,R.Arunkumar, N.Bhahathraj, A.NihaalAhmed, N.VenuKumar

    Abstract

    close

    Now a days, enemy warfare is an important factor in any nation’s security. One ofthe significant andvital role is been played by the army soldiers. There are many concerns regarding the safety of soldiers. So for their security purpose, many instruments are mounted on them to view their health status. Bio-sensor systems comprise various types of small physiological sensors like Gas sensor, Fire sensor, Heart beat sensor, Vibration sensor, transmission modules and processing capabilities, and can thus facilitate low-cost wearable unobtrusive solutions for health monitoring. GPS is used to log the longitude and latitude so that direction can also be known easily. These devices are being added to weapons and fire arms. By using these equipments this can be implemented in the basic life- guarding system for soldier in low cost and high reliability.The “Real time Soldier Health and Geo Position Tracking System With Toxic Bomb Detection” is an Effective Security and Safety System Which is made by Integrating the advancements in wireless technology. This System can be used in critical conditions. This strengthens the defense system.

  87. Auto tuning of three tank process for glucose level monitoringDownload Article

    Ganesh RM, Mythili.M, Nithyalakshmi.B, Sindhuja.P

    Abstract

    close

    Tuning of PID controller plays a major role in process control applications. Here we are going to control the level and flow of a three tank process. Three tank process is used in many industrial applications such as food processing industry, Concentration controlling etc., Controlling the level and flow is a difficult process since the non-linearity which exists in the process will not allow the parameters /system to be stable . Tuning of PID controller helps in achieving proper control of the process parameter and also ensures stable working of the system. Flow and level are directly interlinked with each other in process control application.

  88. Flood recovery system in agriculture using internet of things Download Article

    Karthikprabu. B, Dharanya. N, Nivetha. M, SudhaPriya. K

    Abstract

    close

    Thispaper deals with advanced Agriculture with IOT technology. Internet of Things (IoT)is a shared network of objectsor things which can interact with each other provided theinternet connection. IoT plays an important role in agricultureindustry which can feed 9.6 billion people on the Earth.In proposed system, the soil moisture level will be monitored and the motor is ON to irrigate the field but this system is totally different and user free technology to safeguard the farmland. This system has an IOT (Internet of Thinking) technology to control the world wide equipment. When the land is below moisture content the motor connected in that particular field will be activated to irrigate the field. If heavy forecast or flood surround the land, another motor will be used to remove the excess water and deliver it to well or water bed. The advanced technology used here in the project is IOT’s by which the user can control and monitor their irrigation methodology at any place by using the IOT techniques.

  89. Automated speed control for cane feeding in sugarcane crushing unitDownload Article

    G.Thenmozhi, A.Mythily, S.Swathi Priya ,P.Mohana Selvi, P.Monika

    Abstract

    close

    In sugar factory there are a number of processes involved out of which, the crushing mill process which extracts the juice from sugarcane fibers is the key process which is complex and nonlinear in nature. For maximum juice extraction, maintaining the cane level in the chute at an optimum level is essential. The manipulated variable for controlling cane level is the speed of cane carrier motor. In the present paper, we have used PIC microcontroller for the purpose of controlling conveyor motor speed and software support is given by LabVIEW.

  90. Identification and sorting of faulty printed circuit board using image processingDownload Article

    Praveen Santhoshkumar.G, Nithyapriya.E, Saranya.M

    Abstract

    close

    The objective of the project is to collect the desired items with help of image processing and dispose the unwanted items using rejection mechanism. The PCB’s are moved from one place to another with the help of Geneva conveyor. It is necessary to minimize the workers involved in it. We have designed a conveyor with Geneva drive which is useful in industries. So, here we have made a conveyor model which is used for transformation from one place to another. Our model consists of a Geneva conveyor model, collecting tray and dc gun.

  91. Automation of pesticide mixing and spray control technique for agriculture Download Article

    Ganesh.RM, Ajithkumar.M, Govarthanam.D, Gowtham.R, 5Gowtham.T

    Abstract

    close

    Automation plays a major role in the field of engineering. It helps in increasing the accuracy of work that is being carried out. The safety measure that has to be taken care in any application is ensured by employing proper automation technique. Pesticide control is a major issue in the field of agriculture. The mixing of pesticide and the spray process has to be handled with utmost care for the benefit of the farmers. The mixing of pesticide should be proper in order to maintain the crops till the cultivation. Hence we have proposed an automation technique for the proper mixing of the pesticide. At the same time, mixing process is done by using a stirrer since hand mixing results in improper output as well as it causes harm to the farmers.

  92. Iot based unified power management system with economic featureDownload Article

    G.Praveen Santhoshkumar, Boopathi Shankar.D, Elango V.S,Thisok karan.S Thilagar. S

    Abstract

    close

    The advancement in Automation technology, life is getting flexible and easier in everyaspect. In today’s world Automatic systems are being preferred over many manual operations. With the gradual increase in number of customers of internet over the recent decade had made Internet a part and parcel ofdaily life, and IOT is the latest and emerging technology. Internet of things is a increasing network of everyday object-from industrial machine to certain consumer goods that can share information and complete tasks while you are busy with othermanual activities. Wireless Home Automation system(WHAS) using IOT is a system that uses computers and mobile devices to control basic home functions and features automatically through internet from anywhere around the globe, an automated home is always called a smart home. It is meant to save the electricity and human interface.

  93. Deterrence of transaxle gearbox damage during transmission using lifting plateDownload Article

    Sasikumar S, Nivetha M V, Shanmuga vadivu G

    Abstract

    close

    This paper elaborates about solving the issue of the transaxle gear box damage during transmission. When transaxle gear box is placed directly on the conveyor palette for the transmission, it will get damaged due to the vibration occurs in conveyor. Due to the above mentioned problem, dimension of transaxle gear box get changes and shaft in the gear box will damage. In this paper we have suggested to implement lifting plate between palette and conveyor to avoid the above mentioned problems. Lifting plate is used to lift the palette from the conveyor during the transaxle gear box seating in the conveyor palette by gantry robotic system. Gantry robotic system is used to pick the transaxle gear box from assembly line and place it on the test line. Lifting plate is operated using pneumatic system, pneumatic cylinder is used to control the up and down movement of the lifting plate. Proximity sensor is used to sense the presence of palette on the lifting plate, when the palette presence is found on the lifting plate, then the lifting plate starts to lift the palette. After the seating of transaxle gear box in the palette, lifting plate starts to pull down the palette and place it conveyor. The conveyor starts to transmit the transaxle gear box through palette to next stage for further processing.

  94. Lab view based vision controlled wireless wheel chair for disabled and elderly peopleDownload Article

    Thenmozhi.G, Anguraj.R, Gowtham.R, Vinith,G, Kishore.K

    Abstract

    close

    The paper LabVIEW based Eye controlled wheel chair aims to help the physically challenged and blind person who moves on a wheel chair. Instead of moving the wheel chair by his hand, the chair can be automatically moved to a particular direction as the patient moves his eyes. The paper detects eye direction, with the help of eye ball sensor and moves the wheel chair accordingly. The chair also senses the obstacles in front of it and gives a beep sound.

  95. Smart gas assistant for a perfect kitchenDownload Article

    Siddharth SG, Rameswari R, Keerthana Gayathri A, Kavin Sanjaya L

    Abstract

    close

    Technology is developing at a faster phase influencing ourselves and our environment so as to make a comfort and an easy living. Nowadays Liquified Petroleum Gas (LPG) stored in cylinder is being used widely for the purpose of household cooking. People find it difficult to identify the amount of gas remaining and identify gas leakage. This paper proposes a smart way of measuring the amount of LPG available in the cylinder, Automatic booking of cylinder, Cylinder valve control, Automatic opening of emergency windows to provide ventilation and sending the house owner an alert notification through mobile application along with an alarm and buzzer to notify the neighbours so as to avoid major accidents and save our lives.

  96. Printed circuit board etching machine using vaccum generatorDownload Article

    Mohankumar.G.B, Kavisapareeswari.V, Swathi.T, Vidhya.P

    Abstract

    close

    The objective of this paper is to design the etching machine for manufacturing printed circuit board. It is used to reduce the man power. It also reduces the time to complete the etching process, saving cost without using an expensive machine. Even though we already have an etching machine, usually it is placed in an industry that construct electronic circuits and that will makes us difficult to use all the time. It can be done manually by shaking the PCB board in a container that dissolve with etching liquid which is costly.

  97. Resource pool android application for studentsDownload Article

    S.Rohini, G.Sowmiya,D. Arun Paranthaman, Mrs.C.Kotteswari

    Abstract

    close

    Android is a public, free, open source, Linux based operating system. Maximum number of Users can be detained by it when compared to all other platform. The abstract of our project is to display the details of the resources like books, placement materials, Notes and Question bank and other materials. Here, resource holder can register their details. Students can search for required resources and inter department materials can also be collected easily. Resource pool android application helps the patrons to view available resources without computers but through their android devices which performs multitasking and allows application to run concurrently. This Application retrieves the information about the resources from resource database for example checking whether the books and other materials are available or not.

  98. A review on performance evaluation of anisotropic diffusion filter for denoising the speckle noise in retinal imagesDownload Article

    C.R.Dhivyaa, B.Gopinath

    Abstract

    close

    The performance of various filtering techniques has been analyzed and presented in this paper by targeting speckle noise in retinal images. Most of the state-of-the-art filters are trying to reduce the speckle noise effect from the images without considering the relevant information of blood vessel of retinal images. They also filter the significant features in the targeted images needed for the diagnosis purpose. In order to overcome the limitation of over filtering, the anisotropic diffusion filter is proposed to remove the speckle noise from the retinal image. The performance of the exiting filters and the proposed filter to remove the speckle noise in retinal images is evaluated in terms of the signal-to-noise ratio (SNR), Root Mean Square Error (RMSE) and Standard Deviation (SD) and compared. The experimental results show that the anisotropic diffusion filter is best suitable for removing speckle noise present in the retinal images.

  99. Detection and recognition of the text in image using cloud computing clustering Download Article

    S. Lalitha1, Dr. N. Shanthi, R. Umamaheswari

    Abstract

    close

    In the new generation the artificial intelligence is going to control everything in the world. In the existing system, the character detection in the image is done by connected component (CC) based approach.CC based approach is computational complexity, based on the pixel difference between the text and background of the image text is detected. Text images usually suffer from photometric degradation as well as geometric distortions. The proposed system will extract and recognize the characters too. This process is going to do with the help of training the fonts of alphabets and numbers which are stored in database. Gabour filter is used for the reduction of noise. Here the number plates of the vehicles are logged with time and date can be used in the toll gate. For the process of performance evaluation the similarity factor is going to done and 95% accuracy is expected in the detection of the numbers. From the detected text it can converted to audio for visually impairing people. And it is useful in the toll gates for automatic number entry. The project can be simulated by using MATLAB software.

  100. Optimized selection decision maker usingDownload Article

    P.Prema, Dr. L.M.Palanivelu

    Abstract

    close

    Aim is to come up with a computer driven selection decision, especially to address the marriage selection process. Matrimonial match making is growing rapidly in India. Many researchers set the stable matching as their most important optimal objective. Purpose of this study is to enable users to explore their partners effectively and efficiently and restrict to the desired matches so that the probability of match making are maximized. Gale-Shapley stable matching algorithm is used to help customers to get the desired shortlist of profiles with an optional stable match. An integrated approach is proposed for matrimonial matchmaking using Fuzzy Analytic Hierarchy Process (FAHP), where multiple criteria are considered in the process. A compatibility index (matched metric), is developed that enhances the probability of matchmaking. In this model, the scale of data in the decision background is very huge or the useful information given is very less, they take little effect to determine the weight value. MATLAB already supports various implementations and different stages of the data processing as matrices, with various toolboxes created by experts in the field. It utilizes the advantage of AHP on forming pair wise comparison matrix and computing index weight. Final decision depends on the ranks derived for each alternative. The advantage of fuzzy comprehensive evaluation method is establishing quantitative indexes membership, qualitative indexes membership and classifying the level.

  101. Optimized virtual machine placement algorithm for both energy-awareness and SLA violation reduction in cloud data centersDownload Article

    S.Poovizhi, N.Jayanthi

    Abstract

    close

    The establishment of large-scale virtualized data centers has results in the high energy consumption ,resulting in the high operating cost and carbon-di-oxide emission. Virtual machine placement is a process of mapping virtual machines to physical machines .In order to reduce the energy consumption in cloud data centers many adaptive algorithms have been designed, which uses historical data from resource usage(such as CPU ) by VMs . In the proposed work a new parameter is introduced (RAM utilization) along with CPU utilization history in threshold calculation, in order to reduce the number of VM migrations, so that the SLA violation will be reduced. The heavily loaded and little loaded hosts are migrated and the moderately loaded and lightly loaded are kept unchanged in ATEA(adaptive three-threshold energy-aware algorithm).Based on ATEA, an adaptive threshold algorithm and VM selection policies are proposed. The proposed work is tested using cloudsim toolkit. The experimental results shows that our method reduces SLA violation and energy consumption more efficiently than the available methods.

  102. An efficient document clustering by using adaptive k-means clustering algorithm Download Article

    R. Umamaheswari, Dr.N. Shanthi,S.Lalitha

    Abstract

    close

    Now-a-days the web content increases day-by-day and searching relevant information from web increases lots of overhead. The text documents are in various formats like text, audio, video etc. The text documents are in the form of structured, unstructured and semi structured. The clustering is the process of grouping the text documents into meaningful clusters which gives better search results. To retrieve relevant useful documents the new technique is introduced for efficient clustering of unstructured documents.

  103. With an efficient time series datasets classification fast accuracy model for dynamic data sets using classical-k-nn algorithmDownload Article

    D. Thiyagarajan, N.G.Vaishnave, K.Yavanya, S.Kalaiyarasi

    Abstract

    close

    Recent years have seen significant progress in improving both the efficiency and effectiveness of time series classification. However, because of the best solution typically the Fuzzy Nearest Neighbour Algorithm with the relatively expensive Dynamic Time Warping as the distance measure, successful deployments on resource constrained devices remain elusive. Common technique to collect the benefits of Fuzzy Nearest Neighbor Algorithm is without inheriting its time complexity. However, because of the unique property (most) time series data and the centroid typically does not resemble any of the instances, an unintuitive and underappreciated fact. This project shows that it can exploit a recent result to allow meaningful averaging of “warped” times series and this result allows us to create ultra-efficient Nearest “Centroid” classifiers that are at least as accurate as their more lethargic Nearest Neighborcousins.

  104. Cloud data redundancy check mechanism for secure integrated public cloudsDownload Article

    T. Dhanur Bavidhira, C. Selvi

    Abstract

    close

    Cloud computing is an evolving technology that has attracted more number of users in the past decade because of its striking features of data accessing from anywhere at any time, low data maintenance and pay per use. Also, it has brought the minds of IT giants and clients from different fields to keep their information in the cloud storage. Due to this cloud is experiencing huge amount of data which has led to the cropping of new issues in storage availability. To overcome the above problem the proposed system uses a novel mechanism called Data Redundancy Check (DRC) mechanism by which single-instance of data are stored without compromising on the security of data in the cloud. This system integrates the multiple public clouds as a single integrated system which gives an assurance in data storage integrity. The DRC mechanism is applied to the data before they are going to be stored in integrated multiple public clouds environment in order to avoid the redundant copies of data. This demonstrates that storing single instance of data based on the content can discard the redundant copies of data in the multiple public clouds efficiently. This proposed system gives nominal overhead on comparing to the existing operations.

  105. Group key agreement with local connectivity in multicloud environmentDownload Article

    D.Indhumathi, V.K.Manavalasundaram

    Abstract

    close

    Gradually more and more organization is opting for outsourcing data to isolated cloud service providers (CSPs). For secure sharing, verifiable Enhanced multi copy Identity Based Encryption (E-IBE) scheme is proposed.Main problem in mulicloud while provable dynamic data possession, there is no centralized initialization for users. In cloud computing system, group key agreement problem where a user is only conscious of neighbors while the connectivity graph is random. A group key agreement with these features is very fitting for social activities. In setting of multicloud environment, construct two capable protocols with passive security.Obtain lower bounds on the round complexity for this type of protocol, which demonstrates that our constructions are round efficient. Finally, construct an actively secure protocol from a passively secure one.

  106. Mobile mechanic using augmented reality detectionDownload Article

    N.Jayanthi, S.Keerthana, P.Gowdham, P.Geetha Devi

    Abstract

    close

    The Mobile Mechanic system focuses on helping the travelers and tourists while they prefer their own vehicles, inevitable situations like car breakdown and malfunctions of mechanical systems will make the journey humiliated by making peoples feel helpless and stressful. In this paper, we present a request identification system using android application that senses the location via Location Provider. An Augmented Reality will provide the information of nearby sheds depending upon the orientation of the mobile device. Upon selecting one of the mechanic shed, an automated call to that particular shed is made by the system (Consists of Location and distance information) of the area. This application will be developed in Android studio with SQLite database as backend. Uses Dijkstra’s algorithm to find nearer mechanic shop using current location identification as destination to the mechanic.

  107. Detection of fraud ranking in mobile applicationsDownload Article

    Bharranni.J , Muthuparuvatham.S, Vinothini.L ,A.P.Gopu

    Abstract

    close

    Ranking fraud in the mobile Application market refers to fraudulent or deceptive activities which have a purpose of bumping up the Applications in the popularity list. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. To this end, in this paper, providing a holistic view of ranking fraud and proposed a ranking fraud detection system for mobile applications. Specifically, in this proposed to accurately locate the ranking fraud by mining the active periods. Furthermore, investigating three types of evidences, i.e., ranking based evidences, rating based evidences, and review based evidences. In addition, we propose an optimization based aggregation system with real-world Application, we validate the effectiveness of the proposed system, and show the scalability of the detection algorithm as well as some regularity of ranking fraud activities.

  108. Farmers guideDownload Article

    R.Karthik, S.Lalithkumar, C.Madhankumar, K.Navaneethakrishnan R.Sathish

    Abstract

    close

    Farmers predict the local weather for the agriculture based on the observation and prediction on nature. In order to help them, by increasing the accuracy and the amount of data in predicting the weather, a tool called Farmer’s Guide is developed. Numerical Weather Prediction methodology is used to predict the rainfall. It uses surface temperature, 100 years of average rainfall report & humidity as its prediction parameters. The tool also predicts the success percentage of the vegetation and the details of the vegetation that can be made during certain period with the help of weather. Farmer’s Guide’s another aim is to provide Agricultural awareness to youth. This provides data about crop and harvesting details. With the help of the user input the app fetches and displays the details about the soil types that support, monsoon details, quantity of water that are available from the natural resources, percentage of success in production and its uses for the given crop. This guides the farmer to do an effective agriculture by predicting the outcome. This also provides the platform for trading by helping the farmers to find a wide retailer communication. So that the trading occurs soon and this gives an economical support.

  109. Implementation of laboratory managementDownload Article

    Pavithra.G, Sri Devi.D, Sowndarya.T, Nivedha.R, Aravindhan.K

    Abstract

    close

    The Laboratory management system is powerful, flexible, and easy to use and is designed and developed to deliver real believable benefits to hospitals. And more importantly it is backed by stable and dependable support. This system is made for multispecialty Laboratory, to cover a wide range of Laboratory administration and management processes. It is a combined end-to-end Lab System that provides relevant information across the Laboratory to support effective decision making for patient care, Laboratory administration, and provide medicine in a seamless flow. All the required modules and appearance have been particularly built to just placed in to your requirement. It covers all the needed modules right from Patient Registration, Lab staff, Admin and other required modules. To execute this project we use Asp.net and the Data base is SQL Server 2008. Because Asp.net is very powerful language to write, understand easily also user friendly to both Programmer and user compare to all other web technologies.

  110. A novel determiistic approach for aspect-based opinion miningDownload Article

    R.Vijay sai, S.Saranya, P.Sheeba Gracy, R.Sindhuja

    Abstract

    close

    This work proposes an extension of aspect-based opinion mining approach in order to apply itto the tourism domain. The extension concerns with the fact that users refer differently to different kinds of products when writing reviews on the Web.Through a detailed study of on-line tourism product reviews, we found these features and then model them in our extension, proposing the use of new and more complex NLP-based rules for the tasks of subjective and sentiment classification at the aspect-level. We also entail the task of opinion visualization and summarization and propose new methods to help users digest the vast availability of opinions in an easy manner.User review is collected ,pos tagging is applied,then NLP rules is used .Next to find the opinion words based on the user aspect ,sentiment analysis and orientation is extracted sentiwordNet dictionary is used to find the positive and negative words.In this process aspect is identified, extracted and sentiment analysis is applied and then orientation is found ,finally result is generated.

  111. Diabetes detection using segmentation of super pixel in slo images Download Article

    P.Pavithra, Dr.N.Shanthi

    Abstract

    close

    Diabetic Retinopathy (DR) is a disease which is caused by high blood sugar from diabetes. It is associated with damage to the tiny blood vessels in the retina. It causes blood vessels in the retina to leak fluid or hemorrhage, distorting vision. The retina detects light and sent to the brain as a signal through the optic nerve. The early stages of diabetic retinopathy have no symptoms. The disease is unnoticed until it finally affects the vision, even though it is often progressed. In its advanced stage, there are new abnormal blood vessels proliferate on the surface of the retina, which leads to scarring and cell loss in the retina. Floating spots appear because of bleeding from abnormal blood vessels. The spots may sometimes clear on their own, but without prompt treatment, Bleeding often recurs and increase the risk of permanent vision loss. Treatment interventions at early stages of diabetic retinopathy can reduce burden of blindness. During the imaging process, artefacts such as eyelashes and eyelids are also imaged along with the retinal area. This brings a big challenge on how to exclude these artefacts. Excluding the artefacts from true retinal area is important pre-processing step before detection of eye diseases. In computer vision applications Super pixels are becoming increasingly popular because distinguishing the artefacts from true retinal area in SLO images is challenging task. The SLO (Scanning Laser Ophthalmoscope) provides an image of width up to200 degree. In this Paper, a Simple Linear Iterative Clustering (SLIC) is used which is a super pixel generation method used to avoid data redundancy and it was proved to be efficient in terms of region compactness, computational time. Super pixels reduce the computing cost because it is used to represent different irregular regions in a compact way .A classifier has been built Based on selected features to extract out true retinal area. The experimental evaluation results have shown good performance with an overall accuracy of 93%.

  112. Efficient sequential pattern mining algorithm and improved MFWC scheme for discovering complex disease and type-2 diabetes mellitusDownload Article

    S.Ranjithkumar P.Haritha, S.jayaselvamathi, J.Kiruthika and S.Logeshwari

    Abstract

    close

    Diabetes mellitus is one among the complex diseases for which specific causes have not yet been identified. Nevertheless, many medical science researchers believe that complex diseases are caused by environmental, genetic and abnormal cholesterol and triglyceride levels. Detection of such diseases becomes an issue because it is not free from false presumptions and is accompanied by unpredictable effects. To solve this problem an existing system introduced multiple classifier approach base type-2 diabetes mellitus detection. In this system, we introduced a voting scheme which is dynamic called multiple factors weighted combination for classifiers’ decision combination. However, it does integrate the genetic information and cannot discover complex disease more accurately. To solve this problem the proposed system is introduced a sequential pattern mining approach which is called Frequent Pattern growth approach. The main objective of the sequential pattern algorithm is to check and mine data sets based on the sequential order. Based on the gene sequence structure the sequence pattern algorithm discovers the set of frequent sub sequences in the dataset. The minimum support count value is identified to produce interesting patterns which satisfy the conditions. Hence this algorithm is used to detect the complex disease more accurately. The experimental results show that the proposed system achieves high performance compared with the existing system in terms of accuracy, precision, recall and f-measure.

  113. Exploring rating of product using collaborative filtering approach Download Article

    Kavya.V, Arumugam.S

    Abstract

    close

    In this work, we tend to propose a user-service rating prediction model supported probabilistic matrix factorization by exploring rating behaviors. Usually, users are seemingly to participate in services within which they are interested and revel in sharing experiences with their friends by description and ratings. Social users with similar interests tend to possess similar behaviors. It's the idea for the cooperative filtering primarily based recommendation model. Social users’ rating behaviors may well be well-mined from the subsequent four factors: personal interest, social interest similarity, social rating behavior similarity, and social rating behavior diffusion. By considering these four factors, the rating behavior in recommender system may well be embodied in these aspects: once user rated the item, what the rating is, what the item is, what the user interest we tend to might dig from his/her rating records is, and the way user’s rating behavior diffuse among his/her social friends. During this paper, we tend to propose a user-service rating prediction approach by exploring social users’ rating behaviors in a very unified matrix factorisation framework. we tend to found that users high on Openness tend to rate a lot of things than needed, whereas low Conscientiousness could be a essential issue that provokes users to rate things in an explosive method. Our findings are helpful for researchers curious about user modeling, preference stimulant, recommender systems and on-line promoting.

  114. Automatic generation of presentation slides for academic papersDownload Article

    N.Yogapreethi, S.Maheswari

    Abstract

    close

    Generally to get the slides from begin, it takes plenty of your time. These slides contains information concerning base paper objective from abstract details of system i.e. introduction and to boot approach utilized, writing audit from connected work section, alpha results and conclusions from base paper. The generated slides will be used as rough plan for any preparation. This helps presenters in making ready their formal slides in quicker manner. Some rough structure for slide shows from papers capable to save lots of the author abundant time once organizing shows. during this paper we tend to investigate totally different perspective for educational papers slide generation. to put in writing the slides from scratch takes plenty of your time of presenter. they typically contain many sections like abstract, introduction, connected work, projected methodology, experiments and conclusions. to keep up individuation in making ready slides this concept is crucial and distinctive. every section from the tutorial paper is known and is aligned to 1 or a lot of slides. each bullet purpose are mapped with the slide heading purpose. Out of the many sentences below that within that heading sentences importance is calculated thus on keep those because it is within the slides.

  115. Multi-objective scheduling workflow applications in cloud computingDownload Article

    A.Sujitha, Dr.N.Shanthi

    Abstract

    close

    Cloud computing has emerged as a computing paradigm that supports computing services to remote clients with heterogeneous request. It is widely known that the scheduling in an exceedingly distributed computing platform may be a NP-hard problem. The matter turns out to be significantly more difficult once an outsized assortment of tasks on virtual machines under a cloud setting. This work aims for creating an efficient multi-objective optimization technique for dealing with a workflow scheduling drawback on an Infrastructure as a Service (IaaS) environment. Most importantly, it includes exploiting the domain information for the event of novel answer encoding scheme, population formatting methods, fitness assignment ways and genetic offspring generation operators. Besides, it includes the event of powerful strategies for taking care of issues with an outsized variety of goals.

  116. An efficient technique for prevention of denial of service attack Download Article

    E.P.Prakash, S.Anu Tharni,A.Archana Devi,R.Indhupriyaa,J.Kiruthiga Muthulakshmi

    Abstract

    close

    Denial of service (DOS) and distributed denial of service (DDOS) have become major threats in a computer network. The function of a DDOS attack is fundamental to make the system not to respond any requests or providing services. Detection and prevention of DOS/DDOS is a tedious process. In the earlier days, it can be prevented by using the puzzle-solving technique. In puzzle-solving technique first, the server generates some puzzles and it sends to the client. Then the client solves the puzzle and it sends it to the server then the server confirms that the client able to obtain the service from the server. In this type of puzzle-solving technique attackers can merely reply to the server it cannot be identified in this puzzle-solving technique and Graphics Processing Unit (GPU)-inflation DoS doesn’t work and it publish puzzle function in advance. It can be enhanced or overcome by using software puzzle-solving technique it dynamically generates puzzle function. This technique exploits the architectural difference between CPU and GPU. If an attacker tries to move a puzzle transition task into CPU either they want to translate into functionally equivalent GPU or it should do at dynamic puzzle generation. It is the time-consuming process to translate or rewriting a software puzzle. This software puzzle has some drawbacks it cannot carry out puzzle solving process on cloud environment and it doesn’t construct client side software puzzle. In order to overcome this problem here, we proposed a new client puzzle technique which is based on two puzzles between clients. Moreover, in order to improve the performance of Denial of Service attack brute force attack, command evaluation, and Kullback libeller divergence are utilized.

  117. An improved interior-exterior informative similarity measure for web document clusteringDownload Article

    Reka, M, Dr.N. Shanthi

    Abstract

    close

    The World Wide Web grows at each fraction with number of documents. Such growth introduces challenge in clustering the documents. There are number of clustering algorithms has been discussed earlier but suffers to achieve clustering efficiency. To overcome the deficiency, the proposed algorithm introducedan efficient clustering algorithm which consider the relevancy of documents to be measured with internal and external documents. The method first computes the informatic similarity measure with all clusters and selects a higher one. In the second stage, the method compute the internal informative similarity and external informative similarity to compute the Informative weight. Based on computed informative weight the method assigns the class label for the web document. This algorithm uses 5,00,000 web documents for evaluation and 70 percent as training set and 30 percent as testing set. The method produces higher classification accuracy with less time complexity.

  118. Ubiquitous smart home system using Iot applicationDownload Article

    S.Divya, Dr.S.Prabhadevi

    Abstract

    close

    In today’s world Automatic systems are being preferred over manual system. It is still hard to find a comprehensive solution. Therefore in this paper, an intelligent energy method, named the Home Automation Control (HAC) is proposed ,which is developed based on Microcontroller and Internet of Things (IoT). This project demonstrates the programming of the ESP8266- 01 with the Arduino IDE and interfacing with a LM35 temperature sensor. HAC using IoT is a system that uses computers or mobile devices to control basic home functions and features automatically through internet from anywhere around the world, an automated home is sometimes called a smart home. It is meant to save the electric power and human energy. The home automation system differs from other system by allowing the user to operate the system from anywhere around the world through internet connection . The integration of cloud networking, wireless communication, to provide the user with remote control of various lights, fans, and appliances within their home and storing the data in the cloud. The system will automatically change on the basis of sensors’ data. This system is designed to be low cost and expandable allowing a variety of devices to be controlled.

  119. Identifying alcohol and other drug usage among adolescents in India and suggesting a mechanism for rehabilitation using social media contentsDownload Article

    Dr.C.S.Kanimozhiselvi, S.P.Shangeetha, K.Shanmugapriya, G.Sivaram

    Abstract

    close

    Adolescent drug usage like tobacco, alcohol and other substances is a major public health problem that causes more annual deaths. Conventional methods for monitoring adolescent drug consumption are based on surveys, which have many limitations and are difficult to scale. With the growing popularity of social networking sites and the proliferation of mobile devices and camera phones, new opportunities and challenges emerge as people can now actively generate contents that provide a unique compilation of information that is more frequently updated and self-representative than traditional mode of data collection. Hence, a novel approach to monitoring underage drug use by analysing the content from social media networks in order to overcome many of the limitations of conventional approaches will be attempted in this proposal. This project aims to identify the conditions and behaviours of youth who use drugs from their social media activities and help them to come out of their problem by changing their mood with the appropriate content available from the social media. This project will also help the policy makers and health professionals to enter into the world of youth and addressing their problem and to guide them in an efficient way than the traditional means of counselling.

  120. Energy efficient scheduling and reduction of failure virtual machines with deadline constraintsDownload Article

    Ms.V.Sivaranjani,S.Varshini ,P.Vignesh,S.Subhasri

    Abstract

    close

    Cloud computing is a scale-based computing model, and requires more physical machines and consumes an extremely large amount of electricity, which will reduce the profit of the service providers and harm the environment. It is shown that the cost of energy consumed by a server during its lifetime will exceed the cost of server itself. Virtual machine scheduling is one of the most important and efficient technologies of reducing energy consumption in cloud. The main idea of scheduling VMs energy efficiently is placing them on only part of the physical machines and transforming the other ones into low power state (sleep or off). Existing energy efficient scheduling methods of virtual machines (VMs) in cloud cannot work well if the physical machines (PMs) are heterogeneous and their total power is considered, and typically do not use the energy saving technologies of hardware, such as dynamic voltage and frequency scaling (DVFS).Also, datacenters have to reduce the number of failed virtual machines (tasks) in order to achieve high quality service. To avoid these kinds of issues, this paper proposes an algorithm which reduces energy consumption in data centers and extends the deadline of virtual machines. The algorithm works as follows: There exists optimal frequency for a PM to process certain VMs, based on which the notion of optimal performance–power ratio is defined to weight the homogeneous PMs. The PM with higher optimal performance–power ratio will be assigned to VMs first to save energy. The process is divided into some equivalent schedule periods, in each of which VMs are allocated to proper PMs and each active core operates on the optimal frequency. After each period, the cloud should be reconfigured to consolidate the computation resources to further reduce the energy consumption and check for enough resources to complete the tasks within deadline. VMs having tasks which are not completed within the deadline can ask the user to extend th deadline.If yes, reconfigure the cloud and allocate the incomplete VMs to the appropriate PM. Our proposed work reduces energy consumption, number of failed virtua machines effectively.

  121. An enhanced hybrid DBN/HMM for Tamil language speech recognition systemDownload Article

    Sundarapandiyan S, Dr.Shanthi N

    Abstract

    close

    As the use of Recognition system for language has increased, so has the means and the incentive to create methods to formulate designs that incorporate Automatic speech recognition system for various languages that are widely used for communication. Accordingly, there is a great need in building a system that would help in understanding the language Tamil and a design that can automatically recognize the language. This paper presents a systematic new technique known as Hybrid DBN/HMM to improve the accuracy of automatic speech recognition system for the language Tamil. In this method, we use DBN as the posterior probability estimator. DBN is recently proved to be an effective classification technique for different machine learning problems. We apply the Hybrid DBN/HMM Technique on Tamil language speech corpus provided by LDC-IL and the results are compared with other techniques such as GMM/HMM and MLP/HMM. The Hybrid DBN/HMM appears to pay off better results than the other Techniques.

  122. Secure Data Aggregation Scrutiny (SDAS) through Orthogonal Set Verification (OSV) Method for Wireless Sensor NetworkDownload Article

    N.S.Kavitha, B.Gopinath

    Abstract

    close

    Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities for data transmission, security, energy efficient among the cluster of nodes and maximum lifetime within the transmission range to broadcasts the information. Data aggregation, key pre distribution, energy efficient mechanism, lifetime and security are various factors for sensor networks for transmitting the information to make the sophisticate communication. In this paper, orthogonal function is proposed to verify the path direction between the two nodes and it is always perpendicular to other points with angle degree and finds the direction of the data of the nodes sending as well as to find network path of the route travel for Security Data Aggregation Scrutiny (SDAS). The mathematical derivation to find the direction of the data path and how many data path direction are sending from a single cluster in angle of degree with support of Orthogonal Set Verification (OSV) method.

  123. Enrichment of security using feature Set and order sequence graphical authenticationDownload Article

    G.Guna Arasu, K.Gopalakrishnan

    Abstract

    close

    User authentication is one of the most important procedures required to access secure and confidential data. Authentication of users is usually achieved through text-based passwords. Attackers through social engineering techniques easily obtain the text based password of a user. Apart from being vulnerable to social engineering attacks, text based passwords are either weak-and-memorable or secure-but-difficult-to-remember. Researchers of modern days have thus gone for alternative methods wherein graphical pictures are used as passwords. Image based authentication allows user to create graphical password which has advantages over text-based passwords. Graphical passwords have been designed to make passwords more memorable and easier for people to use. In this project, an Image Based Authentication system with order evaluation approach that allows users choice password and simultaneously influences users to select stronger passwords is proposed. To add a layer of security, user is asked to input own digital picture and select sequence tokens from the picture used during registration phase. The user has to reproduce the same tokens by input the same image during his login phase. Also to enhance the security, verification is done by two phases 1) Token verification and 2) Token order evaluation in the server system. This proposed system offers reasonable security and usability and appears to fit well with some practical applications for improving online security.

  124. Cloud-based cyber–physical localization Framework for healthcare monitoring systemDownload Article

    G.Suganya,S.Vinitha,Dr.S.Arumugam,Dr.S.Prabhadevi,S.Prabhu

    Abstract

    close

    The prospects of cloud-based cyber–physical systems (CCPSs) has drawn a great deal of interest from academia and industry. CCPSs facilitate the continuous integration of devices in the physical world with cyberspace. This enables a range of emerging applications or systems such as patient or health monitoring, which require patient locations to be tracked. CCPSs for patient monitoring by using smart phones to obtain voice and electroencephalogram signals in a real-time and efficient manner.

  125. An Intelligent Livestock Habitant Monitoring System with Multi-Objective Inference using IoTDownload Article

    S. Surya, S. Sivakumari

    Abstract

    close

    Transforming and reorienting the development in agriculture based on the new realities of the environmental changes are applied by using the smart technologies. In order to achieve the best outcome in the pastoral agriculture, Management of farming is executed by including the observing the climatic situations, measuring and identifying the environmental changes and applying the modifications based on the observed knowledge. The previous systems possess the validation of environmental changes to identify the cultivation of land to raising the livestock. But the system failed to achieve the acceptable improvement in terms of reliability and accuracy. This paper proposes the IoT model based automated cattle shed monitoring system using the fuzzy logic, which increases the reliability of the system. The performance evaluation is conducted by validating the recognition parameters such as precision/iteration. The results outcome the proposed iterative system achieves the significant improvement compared to the non-iterative scheme.

  126. Recurrent neural network based language model for large vocabulary continuous Tamil language speech recognition systemDownload Article

    Sundarapandiyan S, Dr.Shanthi N

    Abstract

    close

    Language processing make easier path to various speech recognition system to enhance the precision of various Language interaction systems. In this paper we project the work done on updating and improvement of the language model component of a continuous speech recognition system. This experiment proposes a recurrent neural network based language model for Tamil speech recognition system, which aims at reduction of perplexity, word error rate and generating more meaningful text. The RNN language model operates as a predictive model for the next word given in the previous schema. In our experiments, we show that the recurrent neural network language model outperforms the n-gram model and feed forward language model on various Tamil language datasets.

  127. Augmented reality based iot concept for smart environmentDownload Article

    B.Srimathi, E.Janani, Dr.N.Shanthi, Dr. P. Thirumoorthy

    Abstract

    close

    In this paper we have discussed about various applications based on ARIoT. Ultimately, an augmented reality based IoT system in the era of E-commerce .When making purchasing decisions at a retail location we will pick up the material and examine it closely, looking at the pictures. Through “augmented reality” customers can take their two-dimension experience with products to three-dimension. Deliveries can be tracked through IoT capabilities. By that they can obtain the efficient result through the real world entities.

  128. Enhanced aggregate estimation using left deep treeDownload Article

    Dr. P. Manimaran, S.Vinitha, V. Sruthi, M. Selva kumar

    Abstract

    close

    A large number of web data repositories are hidden behind restrictive web interfaces, making it an important challenge to enable data analytics over these hidden web databases. In this propose system novel techniques which use a small number of queries to produce unbiased estimates with small variance.This paper presents real datasets demonstrate the accuracy and efficiency algorithms. Left-deep-tree data structure which imposes an order of all queries. Based on the order, it is capable of mapping each tuple in the hidden database to exactly one query in the tree, which is referred as the designated query. In this propose system novel techniques which use a small number of queries to produce unbiased estimates with small variance. These techniques can also be used for approximate query processing over hidden databases. Present theoretical analysis and extensive experiments to illustrate the effectiveness of proposed approach. In this paper initiate a study of estimating, without bias, the size and other aggregates over a hidden database.

  129. Enhanced Real-Time Charging Station Recommendation System for Load Base Electric-Vehicle TaxisDownload Article

    P.Pavithra, B.Yeshwanth, M.Parvathi, E.Padma

    Abstract

    close

    Electric Vehicles (EV) have limited air pollution and are many environment friendly, and due to their addition to carbon dioxide reduction, EVs are enchancing increasingly popular nowadays. The government also encourage and supporting the procedure of electric vehicles for the social. The electric vehicle - taxis have been discovered into the common transportation systems to increase EV market distribution. Various from regular taxis that can refuel in minutes, EV taxis’ recharging cycles can be as lengthy as one hour. Due to the lengthy cycle, the poor decision on the charging station, i.e., choosing one without hollow charging piles, may lead to a lengthy waiting time of more than an hour in the bad case. Therefore, choosing the right charging station is very necessary to reduce the overall waiting time. Considering that the waiting time can be a non negligible portion to the mistken work hours, the decision will naturally distrub the revenue of individual EV taxis. The current practice of a taxi driver is to choose a station heuristically without a global knowledge. However the heuristically choice can be a wrong one that leads to more waiting time. The proposed system provides a real-time charging station recommendation system for EV taxis via large-scale GPS text mining. By combining each EV taxi’s historical recharging events and real-time GPS trajectories, the data operational state of each taxi is predicted. Based on this data, for an EV taxi requesting a recommendation, recommend a charging station that leads to the minimal total time previous its recharging starts.

  130. Virtual worldDownload Article

    Dr. E.Mohanraj, S.Vanmathi, G.Santhosh, M.Srivignesh

    Abstract

    close

    A virtual world is a computer-based simulated environment populated by many users who can create a personal avatar, and simultaneously and explore the virtual world, participate in its activities and communicate with others. The normal games like shoot, arcade and adventure are the older version video games. This game doesn’t like normal games. It provide games environment, online transaction. It also provides real-time environment stimulation such as basic knowledge for the user, fun. This virtual world game coding will done by unity software which is predefined editor and also provide different environment. The database activities is done by PHP and SQL which are controlled transactions. The action event like car parking, driving, ticket booking are done by C# script. All cities like banks, malls, cinema theatre, house, all places are available in unit assets which can deploy it. In this gameplay the amount should be paid by the user for unique id. After it provides unique id, there will be login page. In this login page, the unique id must be entered. Before the user enter into the virtual world, it ask for location which is for looking city places. So the user must give some places. In that place the game will provide car and vehicle to travel the cities and also do some online jobs. The user can drive by own car and purchase tickets of railway, airport, theatre and also pay mobile bill, electric bill. They can do any work for future purpose such as communication, online shopping, and travel anywhere by file sharing.

  131. Privacy preserving association rule mining in vertically partitioned dataDownload Article

    T.Nandhini, D. Vanathi, Dr.P.Sengottuvelan

    Abstract

    close

    Privacy concerns typically constrain data processing technique. This paper addresses the matter of association rule mining wherever transactions square measure distributed across sources. Every web site holds some attributes of every dealings and also the sites would like to collaborate to globally valid association rules. However, the sites should not reveal individual dealings knowledge. This paper addresses the matter of association rule mining wherever transactions are distributed across sources. This paper have a tendency to specialize in privacy-preserving mining on vertically divided knowledge.This paper addresses a replacement model is planned to seek out association rules by satisfying the privacy constraints for vertically divided databases at n range of web sites in conjunction with data laborer. This model adopts cryptography techniques like encryption, decoding techniques and real number technique to seek out association rules expeditiously and firmly for vertically divided databases.

  132. Privacy and Security Ensured Rule Mining under Partitioned DatabasesDownload Article

    Ms. K.Dhivyalakshmi, Ms. V.Kaviya, Mr. N.Kaviyarasu

    Abstract

    close

    The distributed database environment supports partitioned database management operations. The partitioned data values are stored and maintained in different databases. Horizontal and vertical partitions are managed under the data providers or parties. Two or more parties have their own private data under the distributed environment. The parties can collaborate to calculate any function on the union of their data. Association rule mining techniques are used to fetch frequent patterns. Centralized and distributed rule mining models are applied to discover the frequent patterns under the distributed environment. Trusted nodes are used to perform rule mining in centralized environment. Privacy preserved data mining techniques are adapted to perform the knowledge discovery process with sensitive attribute protection mechanism. Anonymization methods are applied to secure the sensitive attributes I the public data values. Privacy-preserved mining is performed on vertically partitioned databases under different data owners. The association rule mining process is carried out on collective data sets. Homomorphic encryption scheme and secure comparison scheme are adapted to ensure the data privacy. The rule mining operations are performed under the Cloud aided environment. Cloud aided framework is constructed to support data sharing and mining on outsourced data from multiple data owners. Horizontal and vertical partition based rule mining operations are supported in the system. All the partitioned data values are collected and integrated by the cloud server environment. The rule mining operations are carried out under the cloud server environment. Resource scheduling is integrated for the data and tasks under the Cloud Server. Data leakage control is improved with utility analysis mechanism. The sensitive attributes are protected with K-anonymity technique. Data communication security is ensured with the RSA algorithm.

  133. Attack Resistant Query Processing Framework for MANETDownload Article

    Ms. D. Janaranjani, Ms. Kasthuri, Ms. S. Malar, Mr. E. Kavin Kumar, Mrs. R. Maheswari

    Abstract

    close

    The mobile ad-hoc networks (MANET) are temporary wireless networks. Emergency and rescue operations are supported with MANET environment. Data values in a mobile node can be shared with all the nodes in the network. The query values are issued for the shared data access. The intermediate nodes retransmit the query and its response values to other nodes. Different routing schemes can be adapted to transfer the query and response values. All the MANET applications are designed with the consideration of the limited battery power and bandwidth levels. Data provider node maintains the data items for query process. The query-issuing node foods a query over the entire network. The K-data items are replied with highest score values with multiple routes. Data Replacement Attacks are initiated to change the data items in query reply. The query-issuing node tries to detect attacks from the information attached to the reply messages. The malicious nodes are identified with the message communication with other nodes. Multiple malicious nodes can not be identified using a single query value. Malicious node information are shared with other nodes. All the nodes are divided into groups. Malicious nodes are identified with the information collected from the groups. The attacks are discovered with reply route details. Local and global identification methods are adapted for the malicious node detection process. The MANET data sharing scheme is designed to access the shared data with security. The mobile ad-hoc network nodes are grouped as clusters with reference to its coverage and resource levels. Cluster based malicious node discovery process is performed in the system. Liar node and False Notification Attack (FNA) discovery mechanisms are integrated with the system. Message authentication methods are integrated to control malicious nodes. Data confidentiality and integrity verification schemes are combined in the message authentication mechanism.

  134. Privacy Protection for Wireless Medical Sensor DataDownload Article

    D.Thiyagarajan, M.Logambika, S.Nandhini, K.Manikandan

    Abstract

    close

    Wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical sensor networks are more vulnerable to eavesdropping, modification, impersonation and replaying attacks than the wired networks. A lot of work has been done to secure wireless medical sensor networks. The existing solutions can protect the patient data during transmission, but cannot stop the inside attack where the administrator of the patient database reveals the sensitive patient data. In this paper, we propose a practical approach to prevent the inside attack by using multiple data servers to store patient data. The main contribution of this paper is securely distributing the patient data in multiple data servers and employing the Paillier and ElGamal cryptosystems to perform statistic analysis on the patient data without compromising the patients’ privacy.

  135. Determining frequent data in social streams using link-anomaly detectionDownload Article

    Dr K.Chandraprabha, S.Santhosh Kumar, M.Srinivasan, V.Vanitha

    Abstract

    close

    Detection of frequent data is now receiving renewed interest motivated by the rapid growth of social networks.Conventional-term-frequency-based approaches may not be appropriate in this context, because the information exchanged in social network posts include not only text but also images, URLs, and videos. This system focus on frequent data signalled by social aspects of these networks. Specifically, this system focus on mentions of users links between users that are generated dynamically (intentionally orunintentionally) through replies, mentions, and retweets. Propose a probability model of the mentioning behaviour of a socialnetwork user, and propose to detect the frequent of a data from the anomalies measured through the model. Aggregatinganomaly scores from hundreds of users, shows that can detect frequent data only based on the Scalability of the proposed algorithm, in social-network posts. Demonstrate our technique in several real data sets that gathered from Twitter. The experiments show thatthe proposed mention-anomaly-based approaches can detect new topics at least as early as text-anomaly-based approaches, and insome cases much earlier when the topic is poorly identified by the textual contents in posts. Key terms-Topic detection, anomaly detection, social networks, sequentially normalized maximum likelihood coding, burst detection, Dynamic threshold optimization.

  136. Evaluation of mechanical properties of basalt fibre reinforced concreteDownload Article

    Gnanasundar.V.M, Dr.Palanisamy.T

    Abstract

    close

    Concrete is the most widely used building material in the construction industry. It consists of a rationally chosen mixture of binding material such as cement, well graded fine and coarse aggregates, water and admixtures. Conventional concrete is modified by random dispersion of short discrete fine fibres to improve its mechanical properties. The improvement in structural performance depends on the strength characteristics, volume, spacing, dispersion and orientation, shape and the aspect ratio of the fibres. For fibres to be more effective, each fibre needs to be fully embedded in the matrix, thus cement paste requirement is more. It is relatively strong in compression but weak in tension and tends to be brittle. These two weaknesses have limited its use. Another fundamental weakness of concrete is that cracks start to form as soon as concrete is placed and before it has properly hardened. Glass, fibre, carbon fibres are commonly used in manufacturing of reinforcing bars for concrete applications. This study present the art of knowledge of basalt fibre, it is relatively new material. Basalt is an igneous rock, It is a single material fibre manufactured by melting of basalt and extruding the molten basalt through small nozzles to produce continuous filaments of basalt fibre. It is a high performance non-metallic fibre made from basalt rock melted at high temperature. In the last decade, basalt has emerged as a contender in the fibre reinforcement of composites. In this report Evaluation of mechanical properties in basalt fibre reinforced concrete were investigated. The volume fractions of basalt fibre of (0.1, 0.2, 0.3, and 0.5% by total mix volume) were used. Properties such as compressive and splitting tensile strengths were examined. Results indicated that the strength increases with increase the fibre content till 0.3% then there is a slight reduction when 0.5% fibre used. The modulus of elasticity shows the trend of the strengths results. Many applications of basalt fibre are residential, industrial, highway and bridges etc.

  137. A study on assessment of impact resistance characteristics of modified ultra high strength concrete Download Article

    Raja P, Raja Sekar A

    Abstract

    close

    Concrete is a homogenous mixture of cement, fine aggregate, coarse aggregate and water. Whereas, in past decades several developments are made in concrete depend upon their applications. Using Ultra High Strength Concrete (UHSC), the durability and resistance capability were achieved in several areas. The impact resistance is essential for concrete where used in bridge, high rise building, marine structures, road sidewalls, etc. In the present study, a detailed review of literature was carried out to study the production of UHSC and properties of Ultra High Strength Concrete (UHSC). Also, basic material properties were evaluated to arrive the mix proportion based on packing density method. Suitable testing methods were identified from literature to assess the impact resistance of Ultra High Strength Concrete (UHSC).

  138. A Scientometric Mapping of Green Building Research Publications: A StudyDownload Article

    Abu K S

    Abstract

    close

    This study analyzed the growth of research publications in the field of Green Building. A total of 8287 records were downloaded from Web of science database for the period of twenty eight years. The findings revealed that USA has the maximum number of contribution with 2072 records, having a global citation score of 49655 and a local citation score of 2505. In the ranking of authors, Jim CY has published the highest number of publications with 35 records, having a global citation score of 728. Further Contribution of journals, preference of publication, etc were also analyzed in this paper. The study also applied histograph analysis using histicite based on Global Citation Scores (GCS).

  139. Experimental study on fly ash bricks with addition of cementDownload Article

    Benazir S M, Deepika S, Jenitaa M, Sowmiya R, Gnana Venkatesh S

    Abstract

    close

    In this paper, effort has been made to study the behavior of Fly ash brick by taking different proportions of Fly ash, Cement, Gypsum, Lime, Sand and Stone Dust. Ten different mixes of bricks have been designed. In five mix materials like: Fly ash, Lime, Gypsum, Sand and with different % of Cement, such as 2.5%, 5%, 7.5%, and 10%. In other mixes Stone dust has been replaced instead of Sand. Various tests such as Compressive Strength Test, Water Absorption Test were performed in order to have compression with conventional bricks. The result shows the variation of Compressive Strength for different mix proportions of materials mentioned earlier at different curing ages.

  140. Behaviour of fibre reinforced beam column joint under cyclic loadingDownload Article

    A.Anjana, K.S.Divya

    Abstract

    close

    In earthquake resistant design, it is important to ensure the ductility in the structure, i.e., the structure should be able to deform inelastically and dissipate energy without causing collapse. In frame structure, the bending moment and shear force are maximum in the junction area. So beam-column joint is one of failure zone. During earthquake large forces are applied on the Structure which leads to failure of the beam-column joint. Many researchers have done research on joints using different techniques, materials and introduced many repairing methods to enhance the resisting capacity of joints. From literature, it has been observed that glass fibres have enhanced many desirable properties of concrete. Hence, the fibrous material can be introduced in these joints to enhance joint property. The use of fibre reinforced polymer for structural strengthening and rehabilitation is becoming more popular due to its high strength to weight ratio, good fatigue life, good corrosion resistance and low maintenance cost. The fibre reinforced polymer laminates are introduced to enhance the flexural capacity and ductility. The addition of randomly distributed discrete fibres to the structural concrete increases its stiffness, ductility and load carrying capacity with reduced cracks. Fibres are effective in arresting both micro and macro cracks. In this study, we are going to prepare a glass fibre reinforced laminate and cure it for 18 hours, then it can be divided into small parts and added with concrete to increase the flexural capacity of beams. An experimental investigation is carried out on a concrete containing GFRP laminated parts in the certain range by weight of concrete. Material was produced, tested and compared with conventional concrete in terms of workability and strength. The present experimental investigation deals with the comparison study of fibre reinforced concrete with the conventional concrete. Here the cyclic loading is carried out to know about the load deformation characteristics of the specimen and also the other parameters such as ductility and energy absorption capacity are investigated.

  141. An experimental investigation on flexural behaviour of concrete beam with composite reinforcement using ms pipe infilled with crumb rubberDownload Article

    Shaheena Begum, D. Shakthi Priya, Sumitra Eliyas

    Abstract

    close

    In today developing construction field several alternates are being introduced for natural resources used in reinforced concrete. This project focuses on the alternate reinforcement for the structural members. The conventional reinforcement is replaced by the composite reinforcement. The composite reinforcement is in-filled with mild steel pipe which includes the cement slurry and sieved crumb rubber . This crumb rubber constitutes to the solid waste management. Hence these composite reinforcements will reduce weight of steel in reinforced concrete along with the reduction in cost of construction. The hollow steel pipe is madeup of mild steel and the local buckling of the steel pipe is delayed by the restraint of the concrete, and the strength of concrete is increased by the confining effect of the steel tube and crumb rubber.The rubber is collected from scrap tires. The scrap tires are made into crumb rubber and mixed with water – cement in a ratio to attain the colloidal consistency. The present experimental investigation is about the comparison of the flexural strength of concrete beam with conventional and composite reinforcement.

  142. Study on strength of innovative concrete with fly ash and quarry dustDownload Article

    A.Sandhiya Devi, Dinesh.V, Gokul.V, Nanthini .T

    Abstract

    close

    Generally, mortar is a uniform combination of fine aggregate and cement. In this study an innovative concepts adopts to synthesis a hybrid mortar with fly ash and quarry dust which are replacing the fine aggregate. The alternative materials are preferably waste products such as quarry dust and fly ash in order to moderate the cost of mortar. The main objective of this work is to study the compressive strength of mortar cubes by various combinations of fine aggregate replaced by fly ash, quarry dust at the age of 7,14,28 days. The results of mortar made with fine aggregate replaced by (50% QD- 50FA),(60% QD- 40%FA), and (70%QD- 30%FA) of quarry dust and fly ash were compared with conventional concrete. It is done the concrete grade of M30 and OPC 43 grade cement.

  143. Analysis and design of transmission pole – as an alternative to conventional lattice towerDownload Article

    K. Sathish Kumar, J. Selvanathan, P.Sarala

    Abstract

    close

    Conventionally for transmission line, lattice towers made of angles are used. For aesthetic reasons and to reduce space at the base, pole structures with polygonal shape, made out of steel plates are used. In this project it is proposed to analyse & design 132KV double circuit transmission pole structures. After designing & analysing the pole structure, the same configuration will be applied on lattice tower, inorder to compare the merits and demerits between lattice & pole. Industry popular PLS-POLE software is proposed to be used. ASCE 48-05 “Design of transmission pole structures” will be used to check the stress limits so as to design plate thickness of various segments of the pole. Base plate design & the connection of pole segments either by slip or flange joint also will be studied in this project. Foundations for transmission monopoles with anchor bolt arrangement or bottom segment inserted in block foundation also will be carried out. Finally limitations of transmission towers usage in terms of distance between poles, plate thickness, grade, plate length availability, fabrication and manufacturing are all will be discussed.

  144. An experimental investigation of broken tiles and nano silica as a partial replacement of coarse aggregate and cementDownload Article

    Mitali Kirtania, Ms. D.Shakthi Priya Alias Sumitra

    Abstract

    close

    Concrete has several appealing characteristics that have made it as a widely construction material. Due to the day by day innovations and developments in construction field, the global consumption of natural aggregates is very high at the same time production of solid wastes from the demolitions and manufacturing units are also very high increase in the industrial and urbanization, the use of buildings also increased which results in continuous usage of construction material leads to scarcity of the concrete materials. Therefore, utilization of waste materials in concrete production is very much helpful to reach the goal of the substantial construction. The tile wastes can be added in concrete preparation due to high price of coarse aggregate in the industry. The research focuses on tile waste as partial coarse aggregate replacement for concrete production but the partial replacement alone cannot give sufficient strength to the structure. Hence, partial replacement of Nano Silica is also done along with the Broken Tiles. Nano Silica has proven to be an excellent admixture for cement to improve strength and durability and decrease permeability. Nano Silica reduces the setting time and increases the strength (compressive, tensile) of resulting cement in relation with other silica components that were tested. Thus, the combination of Broken Tiles and Nano Silica as partial replacement of Coarse Aggregate and Cement improves the quality of concrete and reduces the environmental issues and also it reduces the production cost in construction projects.

  145. A study on mechanical properties of self compacting concrete (powder type)Download Article

    C.Aravindkannan, S.Pavithrasai, P.Jeevanandham , S.Dhineshkumar, R.Gnanasigamani

    Abstract

    close

    Self-compacting concrete was first developed in japan 1980’s .This concrete can flow through congested reinforcing bars with elimination of compaction. It enhances construction productivity, reduces overall cost and improves work environment. It helps in achieving better surface finish and improves workability. The admixtures such as super plasticizer and fly ash reduce heat of hydration. SCC is obtained by limiting the water/cement ratio incorporating an effective superplasticizer, high quality of fines increasing the sand / aggregate ratio.SCC is a material with good flow ability passing ability and resistance against seggregation.SCC is used in precast concrete construction due to its precast concrete construction due to its strength and filling ability. It improves construction of others engineering structures.

  146. Construction of building using 3D printers Download Article

    Mrs V.Jayanthi, K.Chandru, S.Mehala, D.Divya Dr. B. Soundara

    Abstract

    close

    3D printers' has grown rapidly and since 2005, the home use of 3D printers has become practical. Systems developed for the construction industry are referred to as Construction 3D printers(Construction3Dprinting).Researchers are experimenting with different types of 3D printers and a range of raw materials and fabrication techniques to advance the technology and expand the range of potential applications to include structural building components and even whole buildings. Current research includes experimentation with a variety of raw materials including recycled plastic, bio plastics, concrete and a synthetic “stone-like” material created from a combination of sand and chemicals. Advanced 3D printers capable of extruding multiple materials. One of the advantages of 3D printing building construction is that the fabrication of reinforced concrete beams either done at site or in factories.

  147. Experimental study on eco-friendly tarDownload Article

    Mrs.Jayanthi.V, Mrs.M.Mahalakshmi, Meiyarasu.N, Abhirami.MR, Kiruba Shankar.M

    Abstract

    close

    The world has become increasingly concerned over the global climate change thought to be caused by greenhouse gases, chief among them anthropogenic carbon dioxide which is released into the atmosphere from burning carbon fuels. In order to reduce the carbon emission content, non toxic material added with the bitumen. Such a material is molasses, which is the residue in sugar manufacturing process. Non-petroleum based binders can be made light-coloured bitumen so that it reduces the urban heat island effect. Superplasticizers are an essential component of self compactness to provide necessary workability such as viscosity modifying agents (VMA) for stability. The carbon content and viscosity of the bitumen is reduced by adding these ingredients into the bitumen and thus will increase self compactness and eco friendly.

  148. Partial replacement of cement in concrete using cow dung ashDownload Article

    Mohan Raja S, Naveen Prabhu K Roman Thapa Kannan.S

    Abstract

    close

    In this study, an attempt was made to replace the cement using cow dung ash. Two sets of cubes of M25 grade were prepared separately by replacing cement with cow dung ash (CDA) upto 30% at 5% interval. Then the cubes were cured for the period of 7 and 28 days. The compressive strength of all the cubes was determined using the Universal Testing Machine. The study revealed that Cow Dung Ash can be used as a partial replacement of cement. Among the main conclusions, it should be highlighted that the initial and final setting time of cement increases as the percentage of cow dung ash is added, (CDA) has an advantage that offers lightness of weight and low thermal conductivity. Cow Dung Ash requires more quantity of water as the percentage increases in the concrete therefore it has a serious limitation that must be understood before it is put to use. Cow Dung Ash concrete is recommended for use only up to fifteen percentages (15%) of Cow Dung Ash is added.

  149. Experimental study on strength properties of concrete by partial replacement of fine aggregate with furnace slagDownload Article

    Bharath M, Karthikaraja S, Karthikeyan M,Mohan Raj M,Karthika P

    Abstract

    close

    Waste management is one of the most common and challenging problems in the world. The steel making industry has generated substantial solid waste. Furnace slag is a residue obtained in steel making operation. This paper deals with the implementation of furnace slag as an effective replacement for sand. Furnace slag, which is considered as the solid waste pollutant, can be used for road construction, clinker raw materials, filling materials, etc. This method can be implemented for producing hollow blocks, solid blocks, paver blocks, concrete structures, etc. Accordingly, advantages can be achieved by using Steel slag instead of natural aggregates. This will also encourage other researchers to find another field of using furnace slag.

  150. An experimental investigation of partial replacement steel slag in concrete as a fine aggregatesDownload Article

    K.Rajkumar & K.L.Ravisankar

    Abstract

    close

    The environment problems are very common in India due to generation of industrial by-products. Due to industrialization enormous by-products are produced and to utilize these by-products is the main challenge faced in India. Iron slag is one of the industrial by-product from the iron and steel making industries. In this paper, the compressive strength of the iron slag concrete was studied. The results confirm that the use of iron slag overcome the pollution problems in the environment. The results shows that the iron slag added to the concrete had greater strength than the plain concrete.

  151. Assessment of thermoshock effect on structural element by ansysDownload Article

    Priyanga M, Prasanth R, Siva Sankari K M,Vishnu V K,Karthika P

    Abstract

    close

    The behavior of structural components subjected to fire have received considerable attention in recent years due to different accidental or intentional event, related to important structures. Thus it is very much needed to study the Thermoshock effect on structural element for designing the fire resistance element. The description of the effect of fire on steel and concrete structural members is intended to improve understanding how the structural members respond to fire. The objective of this thesis is to evaluate the effect of Thermoshock at 800°C on slab and beam with different cover thickness by ANSYS 14.5. In this thesis three slab models of size 1m x 0.25m x 0.075m with varying cover thickness of 15mm, 20mm ,25mm and three beam models of size 5m x .3m x .45m have been created using ANSYS 14.5. From the analytical investigation, it is found that the temperature distribution over the reinforcement of slab with 25mm cover and temperature distribution over the reinforcement of beam with 35mm cover is sufficient than others.

  152. Comparative study on flat slab with and without column head using American code and is codeDownload Article

    Mr.B.Rajkumar, Dr.M.Arun

    Abstract

    close

    As per local conditions and availability of materials different countries have adopted different methods for design of flat slabs and given their guidelines in their respective codes. The aim of this analytical study is to try and illustrate the methods used for flat slab design with and without column head using ACI-318, NZ- 3101 part 1,Eurocode part 2 and IS: 456- 2000 design codes. For carrying out this study an interior panel of a flat slab with dimensions 6.6 x 5.6 m and super imposed load 7.75 KN/m2were adopted.

  153. Experimental investigation of coarse aggregate with steel slag in concrete Download Article

    Krishnapriya G, Aravindhan K, Govindaraj M, Ramesh P, Abdul Hameed A

    Abstract

    close

    This paper present the Experimental investigation carried out to evaluate the effects of concrete by replacing the normal coarse aggregate by steel slag on properties of concrete. Concrete is used more than any other material in the world so the use of concrete is unavoidable at the same time scarcity of aggregate is also increased nowadays. The industrial waste has been encouraged in construction industries because it contributes to reduce the usage of natural resources for many years by product such as fly ash, silica fume and steel slag were considered as waste materials. They have been successfully used in the construction industry for the partial and full substitution in concrete. In this study concrete of M30 grades were considered for a W/C ratio of 0.45 respectively for the replacement of coarse aggregate 50% 60%,and 70% by steel slag. This study revealed that there is aim provident in compressive strength 5 to 10% for all the grades of concrete. There is 4 to 8% increase in split tensile strength in all grades of concrete. The Flexural strength of concrete is increase about 2 to 6% for all the grades steel slag can be use up to 60%replacement in all grades of concrete. Full replacement by steel slag decreases the strength considerably.

  154. An experimental study on structural behaviours of treated bamboo reinforced concrete beamsDownload Article

    Gowthamraj. L, Selvi. K

    Abstract

    close

    Recently, in the attention in response to global warming issues and sustainable society, the manufacturing using natural materials has become actively. Bamboo, low cost, fast growing, and broad distribution of growth, is expected to contribute significantly to earthquake-resistant construction and seismic retrofit technology in the developing countries. This paper investigates the mechanical properties of bamboo reinforced concrete beams. It compares these experimental results of bamboo reinforced concrete beams with the experimental ones of reinforced concrete beams and the mechanical property of the bamboo reinforced concrete beams is studied. From these experimental works, the possibility of effective using of ‘Bamboo' is discussed.

  155. Pushover analysis on rc frames with and without shear wallDownload Article

    Parishith J, Mrs. V. Preetha

    Abstract

    close

    Large number of high rise buildings are coming up recently in all the places. As the height of the building increases, it becomes vulnerable to seismic loads since it is unpredictable and dynamic in nature. The structural safety is the most important factor that the structural engineer must keep in mind along with building serviceability.Therefore, the designers are in a necessity to provide adequate lateral strength and stability to the structure against seismic loads. Hence to satisfy the strength and stability aspect of the structure, shear walls are introduced into the high-rise RC frame buildings,since it is one of the easy and efficient way to resist the lateral loads. In this paper, pushover analysis is carried out on RC frame model with and without shear walls. The behaviour of the structure is observed and the performance point for different models with shear wall and without shear wall are determined and compared. The pushover analysis is done by using the software package ETABS 2016.

  156. Failure analysis of transmission line towersDownload Article

    P.Sethupathi, Dr.P.K.Umesha, P. Sarala

    Abstract

    close

    Transmission line towers forms an integral part in the transmission of electric power. Even though the transmission line towers are designed properly as per various codalprovision specified by various countries, they may collapse during even on moderate circumstances if they are poorly designed. Studies were made on various types of Failure cases, that were observed on the full-scale prototype testing of a transmission tower at Tower Testing and Research Station, Structural Engineering Research Centre (CSIR – SERC), Chennai, Tamilnadu, India. This paper summarizes the Full scale testing of a 400 kV DC Transmission line tower, which was abruptly failed under safer load itself. The sudden failure of the Leg member in the +0M body extension on the compression region causes sudden failure of the tested tower.

  157. The structural behaviour of scrap reinforced concrete using waste metal Download Article

    P. Dhilipkumar

    Abstract

    close

    Scrap which is a waste can be used as reinforcing material in concrete to enhance the various properties of concrete. Scrap from lathe machine act in a same way as steel fiber. In every lathe industry, wastes are available in form of steel scraps which are produced in different manufacturing processes of lathe machine works and dumping of these wastes in the barren land causes the contamination of soil and ground water which builds an unhealthy environment. In this paper, M40 concrete is used and lathe scrap fiber is added with different proportions (0.5%, 1.0%, 1.5%, and 1.75%) to check the strength variations in concrete. In this experiment, three different types of waste metal have been compared with commercial 40, 60 and 72 graded steel reinforcement bar. The fiber used is irregular in shape and with varying aspect ratio.The main idea of this research work is to use waste scrap steel fiber in concrete which provides cost-effective and eco-friendly sustainable development.

  158. Nanomaterials for smart buildingsDownload Article

    Karthiga Shenbagam N.Aravind S.SubashRagul T S

    Abstract

    close

    Duetoincreasingpopulationandtheupcomingproblemsintheworldhumanshavediscoverednewtechnologiesandnewmaterialsinordertoprogramdailylife.Oneofman’sseriousconcernshasbeenhowtobuildconstructionsandmanagebuildingssincethebeginningofthehumanhistory.Someoftheseproblemsareresourcelimitations,increasingpollutionandeconomicchallenges.Therefore,talkingaboutsmartbuildingwhicharedynamicandcapableofrepairingthemselvesisoneofthemostimportantsessionsbetweenarchitectsandenergyexperts.Architectureandbuildingtechnologyonthebasisofnanobuildingstructuresandnanomaterialsaregoingthroughsomesignificantchangesanddevelopments.Nanotechnologyisoneofthemostimportantoutcomesofthetwenty-firstcenturykeytechnologieswhileit’seconomicimpactsarealsorecognized.Newmaterialsarebeingdiscoveredanddevelopedeverydayasaresultofinvestigatingwaystoachievemolecularandatomicprecisioninengineeringofmaterial.Thesenewmaterialspresentnewopportunitiestosolveproblemslikeheatabsorbingwindows,energycoatingandetc...[1].Thususingnanotechnologycouldavoidwastingofenergyanditcouldbeseriouslyusefulforsavingresources.Thenitcoulddecreasepollution.Moreover,becauseofdynamicandsmartnatureofnanomaterials, theyareverygoodalternativesinordertosavemoney.Therefore,studyinghowtousenanomaterialsin construction stylesisincreasing by researchers all over the world daybyday.

  159. Impacts of road safety initiatives Download Article

    Dr. E. K. Mohanraj, A. Geetha, A. Jeevitha, M. Kokila

    Abstract

    close

    Road safety is a multi – sectored and multi -dimensional issue. Kerala is one of the leading states in high rate of road accidents and injuries. Road accidents are considered to be the third major cause of death in the state. The state has nearly 3% of the country’s population but it has recorded about 10% of the country’s road traffic accidents. The main problem existing is that the traffic is not homogeneous but mix mode type with a vast range of vehicles plying in it (i.e., bus, truck, car, rickshaw etc.). Growing business activities in major Central Business District (CBD) areas has attracted more population and bunched up without expansion. As a result, congestion is created. Every year the number of vehicles increases but the road length remains the same. Due to peculiar geographical condition, nature of human settlement and land use pattern, most of our roads remain narrow and congested. Thiruvananthapuram, also known as Trivandrum, is one of the major cities in Kerala State and derives its importance being the capital city of the State. The future prospects of Trivandrum are manifold. The city witnesses severe traffic congestion during major part of the day, resulting in low vehicle speed, air and noise pollution and high accident risk. In this regard, Kerala Government had implemented many road safety initiatives and city improvement plan in major part of the cities during 2013. This study attempts to evaluate, analyze the road safety initiatives up on the non-engineering and engineering aspect using the observation survey alone. This study gathered data like traffic volume, parking, pedestrian movement and accident data within the 1 km stretch at Thiruvananthapuram city (main CBD area). From the analysis it was observed that the number of accidents occurred in the said stretch has decreased by 1.2% when compared with the older data which indicates the effectiveness of the road safety initiatives implemented by the Kerala Government.

  160. Light weight components Onmultistory buildingDownload Article

    Sabarinathan.K , Tamilarasu.T , Thabaren Batcha.M

    Abstract

    close

    In this project we are introducing a light weight block and concrete in multi storied building. In case of the multi storied building partition wall construction is one of the major item which is required for the partition work and to create various internal units of block and concrete are more weight, so there is need to find the replacement of waste materials and adding of waste materials to reduce the weight. The conventional block walls and concrete are moreover lot of dead weight is imposed on the structure with respect to gravity. A light weight material is needed so as to reduce the dead load on the structure. So we can contribute the Mix Proportion is divided into two case. Case I: Replacement of Cement (75%) With Fly ash (25%) and fine aggregate (75%) with quarry dust (25%) and adding 20% of waste material like thermocol (10%) and coconut Husk (10%). Case II similarly the proportion is changed with 50% Replacement and Adding 40% Waste Materials. The best of the mix proportion of project is selected in the result of testing of specimen of these mix proportion better than other in strength and weight. The purpose of adding 20 % and 40 % coconut husk and thermocol is to reduce the weight of the block and concrete. coconut husk is also useful in creep in between concrete and thermocol. The waste materials are used to minimize the volume of conventional material of concrete and also reduce the weight of components on multistory building. it is ecofriendly. It is economic and maintenance is inexpensive.

  161. Experimental investigation on GGBS paver block with addition of polyester triangular fibreDownload Article

    M.Praveen Kumar, S.Ramesh Kumar, A.Ranjith Kumar, S.SaravanaKumar, M.Yeswanth

    Abstract

    close

    In this experimental investigationcompressive strength and water absorption of paver block were evaluated by replacing portion of cement with the GGBS (Ground Granulated Blast Furnace Slag). Polyester Triangular fibers were also incorporated along with the GGBS to further enhance the mechanical properties. Different proportions of Polyester Triangular fiber starting from 0.4% and 0.5% by weight of materials. 20% to 35% by weight of cement was replaced with the GGBS. By test testing the specimen optimum fibre and GGBS content find out.

  162. Investigation of polluted ground water in tirupur districtDownload Article

    Nivetha.A, karthikeyan.T, Madhankumar.P,Logeshwaran.C.B, Sankar.S

    Abstract

    close

    The extraction of natural resources has been rapidlyincreased due to industrialization and urbanization in and aroundTirupur, the capital city of Tamil Nadu, India. In present work, theMetrro waste handling private limited and Aquamate engineering pvt Ltd Industrial growth centers are selected to assess andevaluate the groundwater quality and water table status of thisregion. A number of Hazardous waste generating units result thesurface and groundwater pollution in concern region. Water used inthe manufacturing industry picks up high TDS, acidity or alkalinityand heavy metals. The physical and chemical characteristics of 10 groundwater samples collected from different locations in period ofpost monsoon, The traceelements i.e. EDTA, Starch, EBT, phenolphthalein inground water were analyzed by EPA’s technique. The totaldissolved solids (TDS), total hardness (TH), Ca, Mg, Na, Sr, and Znin groundwater.

  163. Case study on traffic congestion at erode(gh signal)Download Article

    R.Nandhini, S.Sahana, V.Vignesh, P.K.Vijayasankar, G.Amirthagadeshwaran

    Abstract

    close

    Traffic congestion has been one of the major issues that metropolises are facing in spite of measures being taken to mitigate and reduce it. This study aimed to analyze traffic congestion in urban road networks. In the recent past traffic congestion has emerged as one of the main challenge for engineers, planners and policy makes in urban areas. Modern social and economic structure shaped by car-oriented urban development and rapid growth in vehicle ownership have established congestion as an inescapable reality of urban life. The main focus of the study is aimed at understanding the recurring urban congestion, its measurement and mitigation. In this project we documented the studies on how to measure congestion and recommended for better solution. This include speed, travel time, volume and level of service etc. Subsequently data collection requirement and technologies for this metric becomes an important part of this study. The study is plan at the location of ERODE district government hospital signal to analysis the traffic congestion and its effects.

  164. Partial replacement of cement and fine aggregate by recyclable materials in paver blocksDownload Article

    Sanjith.S, Senthurvasen.K.E, Thrni.R, Vishnuprasad.K, Dhivya.B

    Abstract

    close

    Cement concrete paving blocks are precast hard products complete out of cement concrete. The product is made in various sizes and shapes like square, round, Zig Zag and rectangular blocks of different dimensions with designs for interlocking of adjacent tiles blocks. In our project industrial waste materials like quarry dust and foundry sand are used as partial replacement of fine aggregate and Fly ash with using coconut fibre for partial replacement of cement. Industrial waste materials and fly ash with coconut fibre will be replaced in various mix proportions and also asses the compressive strength of paving blocks over different time intervals. Finally we compare the quarry dust, foundry sand and fly ash and coconut fibre with normal mix of our paving blocks and cost analysis also will be done.

  165. Experimental investigation on partial replacement of coarse aggregate by ceramic waste in concreteDownload Article

    Keerthana.G, Jeyaseelan.S, Gnanaprakash.S, Hariprasad.J, Tharanya.S

    Abstract

    close

    Use of hazardous industrial wastes in concrete-making will lead to greener environment. In ceramic industry about 30% production goes as waste, which is not recycled at present. In this study an attempt has been made to find the suitability of the ceramic industrial wastes as a possible substitute for conventional crushed stone coarse aggregates. The behavior of ceramic waste aggregate is studied in two states, fresh state and hardened state. In fresh state, workability studies are studied with slump cone test and compaction factor test and in hardened state, strength of the CWA is studied with compression test, tensile strength and flexural strength are found for ceramic waste when adding in different percentage. The obtained results are compared with M25 grade conventional concrete.

  166. Analytical investigation on RCC and steel-concrete composite multistorey buildingDownload Article

    M.C.Arun Prasad, Mrs.V.Preetha

    Abstract

    close

    Steel-concrete composite systems for buildings are formed to act as a single unit by connecting the steel beam to the composite deck slab or profile deck sheet with the help of shear connectors. For the cases of high rise building RCC building is found no longer economical due to its larger dead load, lower stiffness and poor performance in Earthquake conditions. In this paper, G+9 multistorey building is modelled and analysed using ETABS-2016 under Seismic Zone 3 and Seismic Zone 4. Three different types of model is made in this research one for RCC, and remaining two for Steel Concrete Composite Structure with two different types of columns such as encased column and Concrete filled tubes. Comparison of parameters like Joint displacement, Story drifts and Story Shear is carried over and results are being compared.

  167. Experimental analysis of pervious concreteDownload Article

    V.Nandhini, K. Karthiga priya, K.V.Chandhiya ,Mr. S. Sankar

    Abstract

    close

    Conceptual Pervious cement is a zero-droop, open reviewed material comprising of pressure driven bond, coarse total, admixtures and water. Since pervious cement contains next to zero fine totals, for example, sand, it is now and then alluded to as "no-fines" concrete. It is an exceptional sort of cement having a high void substance of around 30%, which can give a water stream rate around 0.34 cm/second. Pervious cement has a huge open pore structure subsequently less warmth stockpiling and speedier. Pervious cement likewise locate its powerful application in low stacking force stopping asphalts, trails, walkways and expressways. The pervious cement is considered as an Environmental Protection Agency (EPA) for giving contamination control, storm administration and appropriate improvement.

  168. Analytical study on north light roof truss with and without solar panelDownload Article

    D. Sathesh Kumar, Jayaraman

    Abstract

    close

    For structural design to be satisfactory, generally four major constraints – utilities, safety, economic and elegance must be fulfilled. Industrial building are low rise structure characterized by their comparatively low height lack of interior floors, walls and partitions. A single storey or a single storey with mezzanine type of steel structure is most suitable. To enclosure of an industrial building may be brick masonry, concrete walls or G.I sheet covering, glazed roof covering.The walls are usually non bearing but these must be adequately strong to resist lateral forces due to wind or an earthquake.The present work is based on design of north light roof truss with and without solar panel with different intensity of wind speed are modelled and analysed using the software tool STAAD PRO V8i S55 and the load combination available in IS 800-2007 and steel table. The theoretical data are calculated using Indian Standard code IS 875-1975 (part III), using limit state method. The different bracings are provided and find out the effective bracing system for north light roof truss.

  169. Groundwater contamination and vulnerability assessment using gis techniqueDownload Article

    K.V.Chandiya, V.Nandhini, K.Karthiga Priya, Mr.P.Shankar

    Abstract

    close

    As most of the Earth’s liquid freshwater is found not in lakes and rivers, but is stored underground in aquifers. In India, Groundwater is playing the pivotal role in fulfilling the demands of domestic,indusrial and agricultural sectors. The suitability irrigation water remain in the soil as water evaporates or used by the crop. Therefore, it is to investigate and to create groundwater status capsule by means of groundwater quality mapping using the state of art GIS technique.

  170. Case study report on restrictions, and hindrance in public private partnership projectsDownload Article

    S.Sudhan, T.Pradeep

    Abstract

    close

    Public-Private Partnership is the most important sector in order to the world of economic development and growth across the country. The government has started a number of schemes with private sectors in order to give national economy an impulse and thus enhancing the pace of economic growth. PPPs aim is to combine the knowledge’s, ideas, experience and expertise of both the public and private sectors. This leads to provide a higher standard of services to the nation. In PPP, some challenges like transparency, time concern objects, lack of new technology and machinery, project appraisal committee, choice of best private firms and institutions, strategy formulation, capital investment and management, absence of skilled man power etc. This paper aims to find out the possibilities of PPP projects success in India and highlight various constraints and obstacles through some case studies which create difficulties to promote PPP.

  171. Traffic volume and signal synchronizations from overbridge to Attakulangara in Trivandrum, KeralaDownload Article

    S.Deepika, Joycy Joy, K.Pavithra, Dr.E.K.Mohanraj

    Abstract

    close

    The road transportation increases year by year, but the rate of road crashes also increases with it. India is one of the developing countries, where the rate of road crashes is more than the critical limit. According to manual count with 15-minute intervals could be used to obtain the traffic volume data. The collected data is converted into PCU units. The synchronization of traffic light systems is one of the best solutions in order to avoid problematic traffic jams. One of the common causes of traffic jams is because of non-synchronized traffic light systems. Once a light turns green, traffic begins to move, but by the time the moving traffic reaches the next light, the signal is still red. This will disrupt the continuity of the traffic flow, especially for large main roads. The smooth flow of traffic on main routes is important to clear dense traffic in a given time. Webster’s method is a rational approach for signal design. The design is simple and is totally based on formulae’s laid down by Webster. In this method, the total cycle of the signal is determined which forms a total least delay occurring at signal. The outcomes of this study support the hypothesis that retiming traffic lights to create a synchronized traffic light system for main roads will greatly improve traffic flow.

  172. Experimental study on properties of pervious concreteDownload Article

    K. Karthiga priya, V. Nandhini, K.V. Chandiya, ,Mr. S. Gnana venkatesh

    Abstract

    close

    Pervious concrete (additionally called permeable concrete, penetrable cement, no fines concrete and permeable asphalt) is a unique kind of cement with a high porosity.The solid glue then coats the totals and permits water to go through the solid piece. Pervious cement is generally utilized as a part of stopping zones, zones with light movement, private boulevards, person on foot walkways, and green houses. It is a critical application for feasible development and is one of many low effect improvement procedures utilized by manufacturers to secure water quality. In this venture we made pervious cement in the proportion's of 1:6,1:8,1:10 and acquired the estimations of compressive quality, rigidity, and water ingestion for 7 and 28 days. This outcomes uncovers that this solid can be utilized as asphalt in streets. The blend has a water-to-bond proportion of 0.28 to 0.40 with a void substance of 15 to 25 percent. To counteract lessening in penetrability, pervious solid should be cleaned routinely. Cleaning can be refined through wetting the surface of the solid and vacuum clearing.

  173. An experimental study on utilization aspects of coir fibre in fly ash bricksDownload Article

    Kepsi K, Kokilaveni S, Vidya malar G, Gowtham S K

    Abstract

    close

    Fly ash is generated in large quantities especially by thermal power plants. The worldwide agricultural footprint is fast growing, with vast agricultural land cultivation and active expansion of the agro-based industry. The resulting large quantities of agricultural wastes, unfortunately, are not always well managed or utilised. These wastes can be recycled, such as by retrieving fibres from disposed leaves and fruit bunches, and then incorporated in brick-making. This way the fly ash bricks are made a 'greener' building material and the discarded natural wastes can be reutilised, avoiding otherwise wasteful landfill and harmful open incineration. The aim of the present study is to investigate the strength and water absorption of fly ash bricks made of fibre, and fly ash. This study examined the physical and mechanical properties of fly ash bricks made by adding natural fibre to a fly ash-water mixture. The fibre was sourced from coir fibre added within the range of 0.2-0.8 %. In the present study, 4 different mixes of fibre fly ash bricks are tested for parameters like: crushing strength, weight, water absorption and cost.

  174. Experimental investigation on properties of concrete with waterproofing compoundDownload Article

    S.Navaneetha, G.Arvindh, S.Dharanidharan, M.G.Girimurugan, R.Pradheepa

    Abstract

    close

    Concrete is a construction material, used in wide variety of situations. So it is very important to consider its durability as it has indirect effect on economy, serviceability and maintenance. In case of hydraulic and water retaining structures, concrete is directly exposed to water or humid environment. Hence, permeability of concrete becomes major concern for the durability of such structures. Water proofing compounds can be used to improve the pore structure of concrete and hence to reduce the water permeability of concrete. Nowadays, a number of waterproofing products are available in market which works on reduction of permeability of concrete. Few of them are required to be added while mixing the concrete ingredients and few others are applied on the concrete surface. The main aim of this project is to study the effect of waterproofing compounds added at ratio of 2%,6% &10% to the concrete and its durability and mechanical properties of concrete are determined.

  175. Experimental investigation on glass fibre reinforced concreteDownload Article

    Janani.S, Fahaal Roshan Khan.I, Gobu.C, Moorthi.M, Yeswanth.M

    Abstract

    close

    fibre reinforced concrete(GFRC) is a recent introduction in the field of concrete technology. It has been widely used in the construction industry for non-structural elements, like facade panels, piping and channels. GFRC is a material made of a cementations matrix composed of cement, sand, water in which short length glass fibers are added. The strength characteristics viz., compressive strength, split tensile strength, flexural strength are found for Glass Fibre when adding in different percentage viz.,0%,0.05%,0.1%,0.15%,0.2% respectively by volume of concrete. Then finding out the optimum percentage of fibre.

  176. Planning and scheduling of commercial building using primavera p6 -case studyDownload Article

    RanjithKumar.K, Sridhar.N, Sakthivelu.K, Saran.G,Monika.N.R

    Abstract

    close

    In the current corporate scenario, Project Management in not an option. It is a critical tool for one to stay on target and accomplish the goals. Project management is the process of achieving set goals within the constraints of time, budget and quality. Proper planning, scheduling, tracking and application administration are the major parameter in construction industry. The systematic flow of work is adopted by using techniques called Critical Path Method (CPM) and Programme Evaluation and Review technique (PERT). In this study, the project is to be scheduled using Primavera P6, project management software. All activities and their sequence of occurrence, duration, resources required and costs involved are to be studied.The complete process of using resources and to achieve quality in construction can be done by proper project management. The Oracle primavera p6 software includes all possible details to scale with multi-project planning control even for a wide range of projects, thus proper resource allocation and project portfolio management can be achieved by sitting on single system. Planning, scheduling, tracking and administration application in primavera is an advance technology in construction industry which requires the study of material, manpower, improved design and hence improves the construction management technique. The study deals with the project scheduling of a “Commercial building”, a four storied (G+4) building, whose construction is in progress at raja street, Coimbatore.

  177. Experimental investigation of pervious concrete with addition of fibreDownload Article

    Monisha.M, Gunasekaran.S, Jayashankar.B, Nandhakumar.P, Monika.N.R

    Abstract

    close

    Pervious concrete is one of the most promising sustainable materials. Nowadays, Pervious Concrete is a light-weight concrete produced by omitting the fines from conventional concrete also known as “No-fine Concrete” or “Porous Concrete” is a material comprised of narrowly graded coarse aggregates, cement materials, water and admixture and in some cases fibres are used. In this paper pervious concrete the fibres of sandwiched combination is used to analyze the property strength, durable, permeability of pervious concrete. The most important property of pervious concrete is its drainage facility through permeability. The use of titanium di oxide is found to enhance the permeability in pervious concrete by oxidizing the pollutants and helping in washing down the clogged particles from the pores during rainy season.

  178. An experimental investigation of steel slag by using partial replacement of fine aggregateDownload Article

    Ranjith G, Senthil kumar P,Vijaya kumar M,Sarankokila.S

    Abstract

    close

    a construction material, concrete is the largest production of all other materials. Aggregates are the important constituents in concrete. They give body to the concrete, reduce shrinkage and effect economy. The increase in demand for the ingredients of concrete is met by partial replacement of materials by the waste materials which is obtained by means of various industries. Slag is a byproduct of metal smelting and hundreds of tons of it are produced every year all over the world in the process of refining metals and making alloys. Like other industrial byproducts, slag actually has many uses, and rarely goes to waste. It appears in concrete, aggregate road materials, as ballast, and is sometimes used as a component of phosphate fertilizer. In appearance, slag looks like a loose collection of aggregate, with lumps of varying sizes. It is also sometimes referred to as cinder, in a reference to its sometimes dark and crumbly appearance. This substance is produced during the smelting process in several ways. Firstly, slag represents undesired impurities in the metals, which float to the top during the smelting process. Secondly, metals start to oxidize as they are smelted, and slag forms a protective crust of oxides on the top of the metal being smelted, protecting the liquid metal underneath. When the metal is smelted to satisfaction, the slag is skimmed from the top and disposed of in a slag heap to age. Aging material is an important part of the process, as it needs to be exposed to the weather and allowed to break down slightly before it can be used.

  179. Performance improvement in acoustic boards through natural fibers and wastage of tiersDownload Article

    S. Karthik Raja, R.Karthi

    Abstract

    close

    The use of wood-based composite panels as building construction material is usually to function both as structural and non-structural components. Natural fiber reinforced composite has emerged as a highly potential replacement for the synthetic fibers. Various natural waste fibers are used for various engineering application. This paper investigates the mechanical properties which were fabricated using recycled rubber and natural fibers. Emission of formaldehyde from wood-based composites is concern in research. Its bonding strength is very high compared to other resin, though it emits hazardless air when reacting with atmospheric air so that change of resin is needed to make the specimen as eco-friendly. For acoustic testing, sound absorption coefficient was evaluated using impedance tube method. For particle board with the density 0.5g cm-3, sound absorption was good at high frequencies the Medium density fiberboard was prepared using two different natural fibers and its bending properties were tested. The suitability of using recycled rubber and neem as raw material and ethyl vinyl acetate as a resin in the manufacturing of medium density fiberboard was also studied. The MDF was fabricated at the prescribed percentage of filler. The performance of composite was evaluated by its mechanical and physical properties. The Experimental investigation indicated that the mechanical strength of medium density fiberboards such as modulus of rupture and modulus of elasticity increased with increasing board harness.

  180. Comparative study of conventional concrete with glass fiber reinforced polymer concreteDownload Article

    N.Chandrasekaran, Dr.E.K.Mohanraj

    Abstract

    close

    Concrete has been used as a part of different structures everywhere all through the world since most recent two decades. As of late a couple foundation ventures have additionally observed particular use of concrete. The advancement of concrete has achieved the fundamental requirement for added substances both chemical and mineral to enhance the execution of concrete. The greater part of the advancements over the work has been upheld by nonstop change of these admixtures. Consequently assortment of admixtures, for example, fly ash, rice husk ash, stone dusts have been utilized so for. Likewise unique assortments of strands have underneath attempted as increments. Consequently, an endeavor has been made in the present examination to concentrate the conduct of Glass fibres in Concrete. To achieve the setout targets of the present examination, Glass fibres utilized as a part of Concrete. Glass fiber Reinforced Concrete (GFRC) is tried for Compression, split tension and flexural strengths. The results are very promising for utilization of Glass fibres in delivering Concrete. From the consequences of the examination did in the most recent years on fiber reinforced cement based materials, it can be brought up that, for the fiber substance normally utilized by and by, the post-peak tensile conduct is the most enhanced material trademark. In any case, troubles in completing legitimate direct tensile tests have restricted the examination in this field. The shortage of examination on the elastic conduct of glass fiber reinforced concrete (GFRC) is additionally presumably because of the maturing issues of GFRC frameworks. To add to a superior learning of the uniaxial tensile conduct of GFRC, deformation controlled uniaxial tensile tests were done at Stevin Laboratory (NL). Polymer-altered glass fiber reinforced cement (PGFRC) Samples produced by splash up and premix systems, and GFRC Samples are tried at 28 years old days. The test reaction of the tried examples is represented and the outcome.

  181. Topographical survey using total stationDownload Article

    P.Deepakkumar, K.Ramakrishnan, V.Ravendran, D.Vasanth, S.K.Gowtham

    Abstract

    close

    The topographic survey shall be performed on the ground to obtain the information required in this standard. The Surveyor shall select the equipment and procedures necessary to obtain the horizontal and vertical positional accuracy required by these standards.Map production – This will involve plotting of details picked on site to produce the survey plan / map. The plan / map will show all details and contour lines for the site. This will be done using AutoCAD.Utilities are services provided by governmental and private entities that provide the following: electric power, telephone, water, sanitary and storm sewer, gas, etc

  182. An experimental investigation on strength of polymer concreteDownload Article

    D.Gowtham, J.Kavin, J.Stephen, S.Vigneshbharathi ,K.Selvi

    Abstract

    close

    This experimental study is intended to identify the mix ratios for M20 grade of polymer Concrete. Compressive strength of polymer concrete and parameters that affect it are analyzed and proved experimentally. From the test results it was clear that polymer concrete possesses good compressive strength and offers good durability characteristics. Polymer concrete can be use deficiently in concrete industry especially in precast members. Based on an extensive experimental investigation it has been reported that in the polymer (Polyester resin) concrete gives greatly improved compressive strength and other properties, whole compare with ordinary cement concrete. It is also observed that by adding 9 to 14% of polyester resins, it is possible to obtain maximum efficiency. The quantity of polyester resins considered in this study is 10%, 11%, 12% and 13%.

  183. Experimental investigation of waste coconut shell as a partial replacement of coarse aggregate in concreteDownload Article

    Boopathi Raja V, Elavarasan T, Pasupathi T, Manikandan S, Abdul Hameed A

    Abstract

    close

    In construction industry the rising cost of construction material is the great factor. The prices of building materials are rising day by day. Therefore this is a most priority of all human being to encourage or research on sustainable material which will help to use such waste material as construction material with less cost and safety of structure. The course aggregate is the main constituent of concrete mix, hence in this paper we used coconut shell as a coarse aggregate has been discussed based on the results obtained from test results. The use of coconut shell can also help the prevention of the environment. The paper aims at analyzing compressive strength of concrete (M25) produced using coconut shell as substitute for conventional coarse aggregate with 0%,10%,20%,30%, 40%, 50% partial replacement. The sample cubes are prepared for M25 grade concrete mix for each case another aim of this paper is to spread awareness about use of coconut shell as construction material in civil engineering. Cubes, Cylinders, Prisms are casted, tested and their properties are determined in this paper.

  184. Experimental investigation of geopolymer concreteDownload Article

    Naveen kumar.P, Naveen.R, Mohan balaji.N, Gokulnath.M, Sankar.P

    Abstract

    close

    This experimental study is intended to identify the mix ratios for different grades of Geopolymer Concrete by trial and error method.Geopolymer cement concretes (GPCC) are Inorganic polymer composites, A new Design procedure was formulated for Geopolymer Concrete which was relevant to Indian standard (IS 10262-2009). The applicability of existing Mix Design was examined with the Geopolymer Concrete. Two kinds of systems were considered in this study using 100% replacement of cement by ASTM class F flyash and 100% replacement of sand by M-sand. It was analyzed from the test result that the Indian standard mix design itself can be used for the Geopolymer Concrete with somemodification.

  185. Flexible pavement design for rural roads by improving expansive soil Download Article

    S.Karthika, V.Jayaraman, T.Karthi, P.Murugesan, K.C.Denesh

    Abstract

    close

    The rural roads are the basic infrastructure required for the development of rural areas. Rural roads have been planned and constructed under various rural development programs of the Government of India. On the other hand many roads that are built in rural areas could not be sustained. Careful examination of these has revealed that most efforts have not been effective due to the fact that in those programmes, the roads were not understood to be engineering structures. Many of the technical aspects of road making were never given due importance in rural road; e.g., adequate compaction of subgrade, drainage, required cross drainage and host of others. Poor subgrade soil conditions can results in inadequate pavement support and reduce pavement life. Our projects aims are to designing an all-weather road for a chosen rural site which has weak soil strata. There are plenty of appropriate technologies for rural road construction and maintenance using locally available materials. We also aim at using all these to the optimum level.

  186. Experimental investigation of no fine concrete partially replaced with cement by silica fume as coarse aggregate by Ceramic tilesDownload Article

    Dhanaraj.B, Kuppusamy.S, Abdulrahuman.A, Aravind.S, Ravishankar.K.L

    Abstract

    close

    No-fine concrete is one of the most promising sustainable materials. Nowadays, No-fine Concrete is a light-weight concrete produced by omitting the fines from conventional concrete also known as “No-fine Concrete” or “Porous Concrete” is a material comprised of narrowly graded coarse aggregates, cement materials, water and admixture and in some cases Ceramic Wastes are used. In this paper No-fine concrete the No fines concrete mix is designed without sand and adding silica fume and ceramic tiles as an admixture using ACI 522R-06 code, and analyse the property strength, permeability of pervious concrete. The mechanical strength of the concrete is increased to an extent. The aim of this project is to lay the No fines concrete in platform and car parking thus transmitting the water to the underground surface very easily for maintaining the ground water table even in all the places.The use of titanium di oxide is found to enhance the permeability in No Fine concrete by oxidizing the pollutants and helping in ashing down the clogged particles from the pores during rainy season.

  187. An experimental investigation of replacement of cement by steel slag and glass powderDownload Article

    Vijayalakshmi.P, Ranjith.V,Sudhakar.K,Ashok.A.K,Tharanya.S

    Abstract

    close

    Steel slag and Glass powder is actually created from waste steel dust which is normally discarded from industrial processes and silica from ground up glass. The potential for Steel slag and Glass powder is as a widely used green, alternative building material that could be made from over 95% recycled material. Steel slag and Glass powder is the viable alternative to cement, which can be mixed and poured to make concrete with strength of concrete. In reality, Steel slag and Glass powder is actually quite a bit stronger than Portland cement, by far the leading type in use today. Steel slag and Glass powder’s hardness comes from the fact that as it dries, the material absorbs and irreversibly binds large amounts of atmospheric CO2. Thus we are casting a Steel slag and Glass powder concrete cube and compare the compressive strength with the normal Concrete cube.

  188. An experimental investigation of reinforced cement concrete beam by using polypropylene fiberDownload Article

    M.Praveena, S. Vennila, A.Yathavan, A. Sarathkumar, S. Sankar

    Abstract

    close

    The paper deals with the addition of various proportions of polypropylene fiber on the properties of High strength concrete (M25 mixes). An experimental program was carried out its effect of compressive, tensile, flexural strength. In this project the overall aim is to utilize and evaluate the performance of polypropylene fiber in the concrete. By the utilization of Polypropylene fiber in concrete not only optimum utilization of material is achieved but also the cost reduction is achieved. There also have been several advanced made in the development of fiber reinforced concrete to control cracking and to increase the overall ductility of the material. However, there are now many types of fibers with different materials and geometric properties, but the exact fracture behavior of fiber reinforced Concrete material is not clearly understood. Majorly, synthetic fiber has played a dominant role for a long time in a variety of applications for their high specific strength and modulus. The optimum percentage of polypropylene fiber in the concrete was found out with respect to cube compressive strength, flexural strength and spilt tensile strength at the age of 28days. The specimen was casted for different percentage such as 0.05%, 0.25%, 0.5%, and 0.75 (by volume fraction) by the mass of the concrete. The result of this present investigation indicates by adding 0.5% of polypropylene fiber show maximum compressive and tensile strength.

  189. Low temperature performance of polymer modified bitumenDownload Article

    Sathishkumar.N, Srihariharan.P, Sabareeshwaran.K.B, Pradeep.C, Denesh.K.C

    Abstract

    close

    The current interest in energy saving bitumen production techniques is great and several new predegreecelsiusesses have been developed to reduce the mixing and compaction temperatures for hot mix bitumen. In particular, Bitumen require high working temperatures, and harder requirements concerning fumes and carbon dioxide emissions have been introduced for such products. Consequently, the need of a new means of producing and placing of bitumen at lower temperatures is particularly large. One way of reducing bitumen mixture temperature is by using special flow improving additives like polymer(wax). This technique has successively been tried in several studies for polymer modified bitumen used for bridge decks and parking areas in Sweden. However, there are some negative impacts like crack susceptibility at lower temperatures due to the addition of wax. In this project, 4% montan waxwas used for one particular polymer modified bitumen. Type and amount of wax additive was selected based on results from earlier studies. The impact on binder, binder/filler mixtures and bitumen from production was tested in the laboratory, degree Celsius using on low temperature performance. As expected, the addition of wax to the polymer modified binder showed a viscosity reduction at higher temperatures, corresponding to a similar positive effect of more than 10 degree Celsius on production and laying temperature for the bitumen

  190. Implementation of ergonomics and improve construction work performanceDownload Article

    Manoj M, Prasanth R, Sankar M, Thangarasu T,Ranjani R

    Abstract

    close

    One of the uniqueness of human activity is the ability to transform the environment and create new structures. Even though all human activities are agreed not in a construction environment, only a few studies deal about a labor productivity based on an ergonomic approach. Construction project trends carry immense consequences for the economy as a whole. Labor productivity is one of the mainly significant factors affecting the overall performance of any association whether large or small organization. The studies assess the factors that affect labour productivity based on application of ergonomics. The chapter presents a preliminary survey of some principles driven by human ergonomics discipline, analyzing the role they play in the productivity process, in order to define a design methodology supporting the labor to create working and living area actually fitting the needs of inhabitants. The factors that affect the labour productivity are determined from literature study and using these factors conducting the questionnaire survey among the labours in various construction projects. The ranking of the factors will be done by Relative Important Index (RII) using the data’s the major factors completing the labour productivity comprise to be recognized from the results suitable suggestion will be given to the companies for improving their ergonomic techniques in worksite.

  191. An experimental investigation on concrete by partial replacement of fine aggregate by copper slag and coarse aggregate by ceramic waste tilesDownload Article

    Ranjith Raja C, Sabarish E, Sudharsun S, Ravichandran S, Ravisankar K L

    Abstract

    close

    The present study has investigated the properties of concrete with copper slag replacing fine aggregate and ceramic waste tiles replacing coarse aggregate. In this project control concrete is casted for M25 grade and partial replacement of fine aggregate by copper slag in range of 10%, 20%, 30% by weight of fine aggregate and the coarse aggregate by ceramic waste tiles replacement in 10% by weight of coarse aggregate. Totally 36-cubes, 24-Cylinders, 24-beams were casted and tested for compression, Flexural strength, Split tension, at 7, 14, 28 days curing of concrete. The obtained results are compared with M25 grade conventional concrete.

  192. The effects on properties of concrete using red iron oxide & ggbs as partial replacement for cementDownload Article

    T. Savitha, N.Dhivyabharathi, P.Radhika, K.Selvi

    Abstract

    close

    Study the effect of using commercial red iron oxides as concrete admixtures in percentage do not exceed 2.5% of each oxide from the amount of cement. This study tested the effect of every portion from the each oxide at different ages on the compressive strength as well as the workability represented as values of slump. We conclude that the optimum portion of RIO 2.5% is coloring material & mineral admixture, through the compressive strength increased as 5.5-12.8%. Iron oxide classified as coloring materials admixture in addition it improves some mechanical properties. Partial replacement of cement (up to 40%)with GGBS admixtures to improve high strength of concrete and 2.5% replacement of iron oxide to improve the workability and increase the slump & coloring of concrete. The river sand with full replacement (100%) of M-sand. The GGBS admixtures using different level of concrete is 25%,30%,35%,40%.The iron oxide admixtures using different level of concrete is 1%,1.5%,2%,2.5%. The maximum strength of concrete is by 40% of GGBS & 2.5% of iron oxide replacement of concrete.

  193. An empirical study on effect of demonetization among the respondents with special reference to erode and coimbatore districtDownload Article

    Aravindh Matheswaran.L, Pravin Kumar.D, Vinoth Kumar N.L

    Abstract

    close

    Declaration of 86 percent of currency notes as illegal tender in just a blink of time on eve of 8th November 2016 mandated the creation of immediate interruption in daily lives. The chaos was created in every strata of the society whether upper, middle or lower. Where some welcomed the move as it was seen for curbing black money, many are suffering by this movement. But the supreme sufferers of this move were the informal sector of Indian economy, where cashless transactions are minimal. Informal sectors of Indian Economy includes 106 activities like agriculture, workers in construction, local transport, community services and small workshops like shoe makes and garment makers(International Conference of Labour Statistics (2003), rural populations and the urban poor and middle class. This paper aimed at reviewing the general implications of demonetization on general public.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"