Articles

  1. Reduction of setup time in CNC machine using SMED techniqueDownload Article

    R.Vinoth, D.Gokulraj, M.Rajagopal, B.Soundar, K.Vijay

    Abstract

    close

    Nowadays more manufacturing company facing the problem of loss of more time spend for the setup process. SMED is created by shigeo shingo. SMED is the one of the lean tool to reduce setup time in any machine less than the 10 minutes that’s why it is called as single minute exchange of die. And then this paper evaluate the organization and execution of SMED for reduce setup time in CNC machine when we reduce setup time in CNC machine Company profit and productivity also gradually increased.

  2. Modelling and design of unified power flow controller (UPFC) for power system network using PSCAD/EMTDC and MATLABDownload Article

    Chandra Gupta Mauryan K S, Subramanian R, Umamaheswari R, Puviyarasan R, Sheik Abdul Rahuman J, Sanjay S

    Abstract

    close

    Unified Power Flow Controller (UPFC) is the most widely used Flexible ac Transmission system ( FACTS ) device to control the power flow and to optimize the system stability in the transmission line. It should be installed to control the voltage, as well as to control the active and reactive power flow through the transmission line. This project is using PSCAD/EMTDC and MATLAB software to model and to verify the UPFC system in order to improve its performance in power system. MATPOWER in MATLAB software used to run the power flow of IEEE 9 bus power system network. Then, by using PSCAD/EMTDC software, IEEE 9 bus system was designed and the result of power flow 9 bus system using PSCAD/EMTDC was compared with the power flow in MATPOWER. The result of active power, P (MW), reactive power,Q (MVar) and power loss were compared to make sure that both software have the similar answer with only 1% difference. The power flow in both the software must be similar before injecting the UPFC system. Then, the active power and reactive power performance will be improved due to injecting the UPFC device. Stability and transient performance of active and reactive power was analyzed.

  3. Remote watt hour meter reading cum robbery identification frameworkDownload Article

    R.Kiruthika, R.Pavithra, S.Santhosh Kumar, M.Vijaysharangan

    Abstract

    close

    Electrical vitality is exceptionally basic for consistently life and a spine for the business. power is indiscipline to our day by day existence with expanding needs of power the power burglary is additionally expanding power robbery is an issue that keeps on plaguing power part over the entire nation the target of this venture is to outline a framework to maintain a strategic distance from the dismay for the clients from burglary charge independent of the utilization of power because of burglary utilizing GSM Module. The proposed framework is mimicked in the Proteus programming. This proposed framework is a simple approach to recognizes the robbery and charging framework.

  4. Embedded system based single phase to three phase Converter Download Article

    Ms.B.Guga priya, Ms.S.Menakambal

    Abstract

    close

    This paper proposes style of 3 part induction control mistreatment single part input and GSM. it's wireless speed management technique that is GSM based mostly. Wireless technique proves to be economical and reliable power is enhanced. In constant V/Hz methodology, it's necessary to keep up a relation between magnitude and frequency of the voltage applied to machine of a motor. This helps to keep up associate more or less constant level of magnitude of field within the mechanical device throughout operational vary. Thus, it's potential to keep up capability of manufacturing most constant torsion. switch power convertor provides energy to a motor. This energy is controlled by Pulse breadth Modulated, a symbol by applying it to the gates of the facility transistors. PWM signals square measure generated pulses with mounted frequency, magnitude and variable pulse breadth. activate and turns off intervals the junction transistor| electronic transistor |semiconductor device |semiconductor unit |semiconductor} occur once a PWM signal is applied to gate of an influence transistor.

  5. Design and implementation of purifying waste water and plant Irrigation system by using solar panel with GSMDownload Article

    M.Prabu, T.Jayakumar D.Nallasivam, D.Mohan Raj, K.Vignesh

    Abstract

    close

    In this paper, the Design of Embedded system for the Automation of Drip irrigation is presented. Drip irrigation was named in Israel in 1959. The green house based modern agriculture industries are the recent requirement in every part of agriculture in India. In this technology, the humidity and temperature of plants are precisely monitored and controlled. Water is very precious to all the humans and as well as to the plants, trees. The major amount of fresh water is utilized by the agricultural industry for irrigation. By using drip irrigation the water will be maintained at the constant level i.e the water will reach the roots by going drop by drop. This is very important because this can only ensure the survival of the plants. Water can be applied at a single point on the land surface through devices called emitters or as a line source from either closely spaced emitters or tubes with continuous or equally spaced openings that discharge water a drop at a time. If the field is irrigated heavily with water, there are chances that the plant may die because of excessive irrigation. The water could also wash them away during irrigation if very strong force of water is released at the same time. On the other hand, if there is insufficient water, then also there are chances that the plants may die due to lack of water. So, it is very important for the farmer to maintain the content on the field. In this paper the design of a Microcontroller based drip irrigation mechanism is proposed, which is a real time feedback control system for monitoring and controlling all the activities of drip irrigation system more efficiently. Irrigation system controls valves by using automated controller to turn ON & OFF. This allows the farmer to apply the right amount of water at the right time, regardless of the availability of the labor to turn valves or motor ON & OFF. This reduces runoff over watering saturated soils avoid irrigating at the wrong time of the day. It improves crop performances and help in time saving in all the aspects.

  6. Raspberry pi based global industrial process monitoring and controlling through iot Download Article

    Raagavi. G, G. Ramani.

    Abstract

    close

    In thisproject the main theme is to control the industrial parameters such as temperature, pressure, boiler control. Here Raspberry Pi a special board inbuilt with all components plays a vital role. Its use reduces the space required and also it acts as a computer itself. The sensor values are received through PIC microcontroller and processed in Raspberry pi. The Wi-Fi module of raspberry pi helps in controlling the parameters through internet from anywhere. IOT acts as a server in controlling side. The control process is maintained through Internet Protocol. Hence the operation is very fast. The process is controlled in wireless manner. The simulation result is obtained through PROTEUS 8.5 software.

  7. Speed and torque control of resonant inverter fed brushless dc motor drive using fuzzy logic controllerDownload Article

    Ms.A.Saranya, Mrs.R.Dheivanai, Dr.B.Karthik

    Abstract

    close

    This paper presents a comparative analysis of speed control of brushless DC motor (BLDC) drive fed with conventional two-level, three and five level diode clamped resonant inverter (DC-MLI). The performance of the drive system is successfully evaluated using Fuzzy Logic (FL) based speed controller. The control structure of the proposed drive system is described. The speed and torque characteristic of conventional two-level inverter is compared with the three and five-level resonant inverter (MLI) for various operating conditions. The three and five level diode clamped resonant inverters are simulated using IGBT’s and the mathematical model of BLDC motor has been developed in MATLAB/SIMULINK environment. The simulation results show that the Fuzzy based speed controller eliminate torque ripples and provides fast speed response. The developed Fuzzy Logic model has the ability to learn instantaneously and adapt its own controller parameters based on disturbances with minimum steady state error, overshoot and rise time of the output voltage.

  8. Design of auto adjusted DC-DC-AC PV grid-inverter suitable for universal applicationDownload Article

    P.Geetha, S.Ravi

    Abstract

    close

    In photovoltaic (PV) distributed generation system, the knee point is how to capture the energy generated by PV array and optimal conversion for achieve maximum productivity of the system. In this paper, re configurable high step up dc to dc converter and re configurable dc to ac inverter suitable for local utility interconnection is presented. Proposed dc to DC to AC hardware is tested under the conditions of different loads with variable standards also at different solar power input. The power fluctuation in the input or output is sensed with WCS 2705 hall sensor, and it’s fed to ultra-low power MSP 430 powerful microcontroller, 200 kHz sampling error signal is reconfigured according to memory setting. Thus, enhanced generated power absorb, optimized loss and higher stability are implemented. Specific real time 2 kilowatt hardware of the proposed feature full controller based dc to dc to ac inverter is presented. The real time hardware implementation results justify the stability and feasibility of the universal load analysis and the proposed hardware topology. Experimental Verification of a Module Integrated Isolated Coupled Inductor based DC-DC Boost Converter fed Micro-inverter.

  9. A review on hybrid renewable energy systemsDownload Article

    Gopalakrishnan.S, Gowtham Chandar.C.R, Ponnumani.G, Vaidya Jayanthan.G

    Abstract

    close

    Renewable energy sources are more suitable for off grid areas. It is very difficult to bring transmission lines to remote areas therefore a renewable energy system is preferred as a standalone system, so as to eradicate the need of fuel supply and transmission lines to remote areas. This paper focuses on different types of hybrid renewable energy systems available and their nature.

  10. A review of frequency control of hybrid renewable energy system with hybrid control model Download Article

    Mahendran K, S.U Prabha

    Abstract

    close

    This paper presents a review of a frequency control of hybrid renewable energy system (HRES) with hybrid control model. Stand alone and grid-connected hybrid renewable energy system (HRES) to supply AC masses. The configuration of the frequency control based HRESs and interfacing power converters for connecting the energy sources to the AC bus is lengthily elaborated. In this paper, the summary of the control concepts in an HRES and the application of the appropriate control schemes for system stabilization, effective injection of high-quality power and proper load sharing are discussed. The different approaches for HRES design and control strategies for power converters in the recently published literature are also briefly addressed. This paper specially addressed various control strategy in the hybrid renewable energy system.

  11. Harmonic reduction in converter by using selective harmonic elimination techniqueDownload Article

    Ajith.G Dinesh Chandar.G Gobinath.T Manoj Prabahar .M

    Abstract

    close

    This paper presents a technique to spot installation harmonics in period of time mistreatment signals obtained from grid connected power electronic converters. The projected harmonics estimation has potential applications in distributed energy systems; the theoretical and experimental analysis of the changed SEPIC device is given during this paper. The projected device operates in DCM. Because the device operates in DCM it acts as a voltage follower id est. the input current follows the input voltage. The voltage across the switch is reduced. Furthermore a digital management technique is employed to scale back the third harmonic input current distortion. Finally, 100W power issue correction circuit was developed with associate operational potency of ninety eight.

  12. Real time implementation of anti-lock breaking system for vehicle fault measuring and controlling using can protocolDownload Article

    Gokulnath M, Ravichandran V

    Abstract

    close

    Controller Area Network is a high level communication with good stability and reliability protocol. CAN is invented by ROBERT BOSCH. It is used to analysing and controlling the various digital data inside an automobile industry. CAN protocol mainly preferred for vehicle communication. This project is implementing to monitoring and controlling the vehicle communication with the controller of ATMEGA. It is used to monitoring and controlling the engine control unit (ECU), Antilock breaking system (ABS), and also temperature measuring, CO2 is measuring. The simulation of the project has been implemented using MATLAB with the help of Embedded C.

  13. Controlling of ph level in sugar manufactoring unitDownload Article

    .P Ms.Anurekha.K.G

    Abstract

    close

    Neutralizing pH value of sugar cane juice is the important craft in the control process in the clarifying process of sugar cane juice, which is the important factor to influence output and the quality of white sugar. On the one hand, it is an important content to control the neutralized pH value within a required range, which has the vital significance for acquiring high quality purified juice, reducing energy consumption and raising sucrose recovery. On the other hand, it is a complicated physical chemistry process, which has the characteristics of strong non linearity, time-varying, large time-delay, and multi- input. Therefore, there has not a very good solution to control the neutralized pH value. In this process we maintain PH value by adding lime with sugar juice. The flow of lime and sugar is controlled through variable frequency drive. This method is able to maintain PH quickly and accurate.

  14. Wireless digital circular systemDownload Article

    Mrs. Vijayalakshmi. R, Arul Selvan. C, Balakrishnan. K, Kavin Kumar. P, Mahabalaji. P

    Abstract

    close

    In this proposed system the idea of wireless Digital Circular System Using GSM Technology has been presented. So our main aim is to reduce paper work and time. In this paper we are trying to implement our system in such a way that it can display message from authorized user sends to GSM module which is located on the class rooms.So in short, the GSM module which is located at class room projectors receives the message from authorized user and displayed on screen. So spreading of important message or notice will be takes place within very short span of time.The transmitter side is the principal room, and he can send the messages whatever he wants to inform to this college staff or student using pc or mobile and the transmitted message is received through the GSM modem.Then the received message is displayed on the projector screen and also message receiver voice and buzzer alert is implemented in this system.

  15. Power quality improvement of self contained induction generatorDownload Article

    Mrs. Vijayalakshmi. R, Anbu Krithika. J, Darthi Edwina, Sowmiya.S

    Abstract

    close

    As a promising renewable alternative, the wind power is one of the significant sources of generation. Reactive power compensation and harmonic reduction in a low voltage distribution networks for integration of wind power to the grid are the main issues addressed in this paper. This paper proposes a control scheme based on instaneous Pq theory for compensating the reactive power requirement of a three phase grid connected wind driven induction generator as well as the harmonics produced by the non linear load connected to the PCC using STATCOM. The proposed control scheme is simulated using MATLAB/SIMULINK. The Simulation results are presented in this paper.

  16. High gain DC-DC converter with dual coupled inductor using microcontrollerDownload Article

    Mrs. Pratheeba.C, Dhivya.P, Jeevitha.A, Loganayaki.A, Maragathasree.P

    Abstract

    close

    High voltage gain dc–dc converters are required in many industrial applications such as photovoltaic and fuel cell energy systems, high-intensity discharge lamp (HID), dc back-up energy systems, and electric vehicles. This paper presents a novel input-parallel output-series boost converter with dual coupled inductors and a voltage multiplier module. On the one hand, the primary windings of two coupled inductors are connected in parallel to share the input current and reduce the current ripple at the input. On the other hand, the proposed converter inherits the merits of Dual coupled series-connected output capacitors for high voltage gain, low output voltage ripple, and low switch voltage stress. Moreover, the secondary sides of two coupled inductors are connected in series to a regenerative capacitor by a diode for extending the voltage gain and balancing the primary-parallel currents. In addition we implemented Fuzzy control to stabilize the output voltage for any fluctuating input voltage. And SPWM technique to reduce power loss

  17. Improve secure personal web search temporal behavior search over re-ranking with catch services modelDownload Article

    R.Navinkumar.,D.Uvarani

    Abstract

    close

    The web search engine has long become the most important portal for ordinary people looking for useful information on the web. However, users might experience failure when search engines return irrelevant results that do not meet their real intentions. Such irrelevance is largely due to the enormous variety of users’ contexts and backgrounds, as well as the ambiguity of texts. Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are tailored for individual user needs. As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query.Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. This research studies privacy protection in PWS applications that model user preferences as hierarchical user profiles. This project proposes a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user-specified privacy requirements. The proposed runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. The study presents two greedy algorithms, namely Greedy DP and Greedy IL, for runtime generalization. It also provides an online prediction mechanism for deciding whether personalizing a query is beneficial. In addition, research study to improve personalized web search model using re-ranking with catch services algorithm in web database.

  18. Load balancing and monitoring current level in power grid frequency over mobile platformsDownload Article

    K.K.Resma, S.Menakambal

    Abstract

    close

    Information about the frequency deviation is critical to reliable and stable operation of the power grid. Current wide-area power grid monitoring systems consist of Phasor Measure-ment Units (PMUs) at both high-voltage transmission level and low-voltage distribution level, but are generally unsatisfactory for large-scale deployment over highly distributed microgrids in individual households and local communities due to their high cost and low accessibility. In this paper, we present a practical system design which significantly improves the accessibility and reduces the cost of frequency monitoring by unleashing the capabilities of modern mobile platforms in computation, commu-nication, and storage. In our system, the Network Time Protocol (NTP) is exploited for time synchronization, replacing inflexible GPS receivers that are widely used in current PMUs. A small quantity of peripheral hardware components are used to build up an embedded sensing component for efficient and accurate frequency measurement. The experiment results compared to the traditional Frequency Disturbance Recorders (FDRs) show the effectiveness of the proposed frequency monitoring system.

  19. Agricuture paraeters monitor and control through ardunio yunDownload Article

    Dhayananthan. P, Sathyasree.K,

    Abstract

    close

    In real time, agricultures become as a part time work due to economics and environment effects. Ardunio yun provides easy control and maintenances the agricultures work as a part time. Farmer can control and maintained their farmland through ardunio yun. It provides to monitor sensor values into related user IP address and control the relay with respect to user. Ardunio can collect farmland video for preview monitoring to farmer. It provides to reduced the time and cost for farmland. like as a soil moisture, temperatures sensor, light intensity, air temperatures and tank water level. ardunio provides also control motor and light through relay connection. This action provides to avoid the number of labour for agricultures work and make the agriculture work as reliable. This embedded system provides higher reliable WiFi network. WiFi router increased distances of the network. There will be IP camera which is digital type that provides wireless transmission of video signal. Broad chip is used

  20. GSM based monitoring and controlling of motorDownload Article

    Mr.S.Prabhakaran, M.Nandhini, M.Nithya, A.Sharmila, S.Vinitha

    Abstract

    close

    In General, most of the mechanical systems are driven by motors. In several industry sectors, motor parameter measurements can identify equipment failure, which makes their monitoring essential in order to avoid disasters in critical production processes. Apart from monitoring, the controlling of the motors is also of great importance. There are various methods and tools for monitoring and controlling the mechanical devices like motors. But they are manual process. Our project aim is to reduce or replace the manual work and to control the motor automatically.

  21. Monitoring the agriculture in Remote areas using zigbeeDownload Article

    Tryphena J, Vivek M Nair, Ms. Ramani G, Mr.Jayakumar T

    Abstract

    close

    Precision agriculture could be a farming management conception supported perceptive, measure and responding to entomb and intra-field variability in crops. By assembling real time information on weather ,soil and air quality, crop maturity associate do their issues predictive analytics will be accustomed create higher selections for the longer term. This paper proposes a coffee power, low cost, sturdy information assortment system to come up with and gather information autonomously in isolated or remote areas. The device module collects soil wetness and temperature information and air temperature and wetness information that's then gathered sporadically by a line following golem that uploads the keep information from the device module via zigbee communication for further analysis

  22. Matrix converter based power quality enhancement using UPQCDownload Article

    Mr. M.R. Mohan Raj, M. Dharani, K.Nandhini, P.Pavithran, P. Rajesh mani

    Abstract

    close

    This paper presents a new control method to compensate the power quality problems through a three-phase unified power quality conditioner (UPQC) under non-ideal mains voltage and unbalanced load conditions. The proposed UPQC system can improve the power quality at the point of common coupling (PCC) on power distribution system A UPQC is a combination of shunt and series APFs, sharing a common dc link. It is a versatile device that can compensate almost all power quality problems such as voltage harmonics, voltage unbalance, voltage flickers, voltage sags & swells, current harmonics, current unbalance, reactive current, etc. In this proposed system the application of fuzzy logic in control of shunt and series active power filters for control of three-phase active power filter. The performance of proposed control system was analyzed using simulations with MATLAB/Simulink program, and experimental results with the hardware prototype.

  23. Burstiness of virtual machine resource reservation in Cling firefly optimizationoud usDownload Article

    JasminePersi T, Rajasekaran P

    Abstract

    close

    In computing clouds, burstiness of a virtual machine (VM) workload widely exists in real applications, where spikes usually occur aperiodically with low frequency and short duration. This could be effectively handled through dynamically scaling up/down in a virtualization-based computing cloud; however, to minimize energy consumption, VMs are often highly consolidated with the minimum number of physical machines (PMs) used. In this case, to meet the dynamic runtime resource demands of VMs in a PM, some VMs haveto be migrated to some other PMs, which may cause potential performance degradation. In this paper, we investigate the burstinessaware server consolidation problem from the perspective of resource reservation.

  24. Several component coupled inductor- based sepic converter for high-voltage wind energy systemsDownload Article

    K.Devaraj, S.Priyadharshini, J.Reva

    Abstract

    close

    A coupled inductor based high step-up dc–dc converter for high step-up applications is proposed. The concept is to utilize two capacitors and one coupled inductor. The two capacitors are charged in parallel during the switch-off period and are discharged in series during the switch-on period by the energy stored in the coupled inductor to achieve a high step-up voltage gain. In addition, the energy stored in the coupled inductor is recycled; the voltage stress of the main switch is reduced. The switch with low resistance RDS (ON) can be adopted to reduce the conduction loss and the reverse-recovery problem of the diodes is alleviated. Not only lower conduction losses but also higher power conversion efficiency is benefited from lower turns ratios. The operating principle and steady-state analyses. With the increasing integration of renewable energy generation into high-power grids, transmission at the dc level is becoming increasingly more useful than ac transmission. In this regard, emerging applications, such as offshore wind farms, require a high voltage gain dc/dc conversion system to interface with high-power transmission networks. This paper presents a new high-voltage gain coupled inductor based dc/dc converter for high-power offshore wind energy systems. The proposed dc/dc converter is characterized by the resonant switching transitions to achieve minimal switching losses and maximum system efficiency. Therefore, a higher switching frequency is conceivable to attain a higher power density. The double stage output voltage of the proposed converter operates at seven times as high as the input voltage with a small device count. The output capacitors are charged and discharged continuously by a 180◦ phase shift with respect to each other to eliminate the output voltage ripples with the low capacitance requirements.

  25. Iot based unified power management system with economic featuresDownload Article

    K.Sathyasree, S.Ajithkumar, D.Karthik, A.Murugasamy, R.Sudhakar

    Abstract

    close

    With the development of the social economy, more and more appliances have been presented in a house. It comes out a problem that how to manage and control these increasing various appliances efficiently and conveniently so as to achieve more comfortable, security and healthy space at home. In this paper, a smart control system based IOT (internet of things) has been proposed to solve the above problems. It will automatically manage and control all the appliance in the house.

  26. Enhanced quantifying political leaning from social mediaDownload Article

    Mr.M.H.Abuthakeer, P.Indhumathi, M.Keerthana, S.Dinesh

    Abstract

    close

    The widespread use of online social networks (OSNS) to disseminate information and exchange opinions, by the general public, news media and political actors alike, has enabled new avenues of research in computational political science. in this paper, we study the problem of quantifying and inferring the political leaning of twitter users. we formulate political leaning inference as a convex optimization problem that incorporates two ideas: (a) users are consistent in their actions of tweeting and retweeting about political issues, and (b) similar users tend to be retweeted by similar audience. we then apply our inference technique to 119 million election-related tweets collected in seven months during the 2012 u.s. presidential election campaign. on a set of frequently retweeted sources, our technique achieves 94% accuracy and high rank correlation as compared with manually created labels. by studying the political leaning of 1,000 frequently retweeted sources, 232,000 ordinary users who retweeted them, and the hashtags used by these sources, our quantitative study sheds light on the political demographics of the twitter population, and the temporal dynamics of political polarization as events unfold.

  27. Automatic solar powered college bell system using GSMDownload Article

    P.Arunthathi, R.Keerthana, R.Kiruthika, M.Vennkatesan,J Gobalakrishnan

    Abstract

    close

    Theworldoverthedecadeshasmadeconsiderableadvancementinautomation; automationis employedinevery sectorwhetheritishomeorindustry. Hereanewdesignisbeing presented.Thisdesignfindsatremendoususeatprimaryandsecondaryschoollevelsaswellasincolleges ItusesReal TimeClock(DS1307)whichtrackstherealtime. The bellautomaticallyrings atpreprogrammedtime intervalsand also displaysthetime by using LCD display. The lowpoweraspectisbrought aboutbyusing‘SLEEP’modeinPIC microcontrollerwhichkeepsthesystem inidlestatewhenitisnot inuse. Themajor advantageofthisimplementationisthatitgives ustheexacttimeandnomanualoperation isneededwhileusing verylesspower.Thesystemismadebyestablishing aserial interfacebetweenPICmicrocontroller(PIC16F877A) .It avoid the human help with accuracy as it is automatic.GSM has included in our project to control the devices wirelessly. Both Renewable and EB source are used in this project to provide the supply to bell to supply the power to the bell when the time of power cut also.

  28. Power theft identification using ZIGBEE based technologyDownload Article

    Mr.V.Ravichandran, A.Ananthraj, T.Sivakumar, S.Sivakarthik, K.Vijay

    Abstract

    close

    Wireless electricity theft detection system using ZIGBEE technology present an efficient and less costly way to adulterate the wireless technique used in this research paper. This wireless system is used to overcome the theft of electricity via bypassing the energy meter and hence it also controls the revenue losses and utility of the electricity authorized agency. There is always a contract between the consumer and the supplier that the consumer will pay for the electricity consumed by him. But in India near about 32 % of the electricity is consumed but not paid for it i.e. it is being stolen by the consumer hence the need of a system arises that would overcome this theft of electricity but mostly the electricity is being stolen via bypassing the energy meter hence this system recognizes such type of theft of electricity. Mainly this system consists of microcontroller, energy meter and a ZIGBEE module to check for the theft of electricity and then to send a message to the authorised agency which looks after the electricity consumed. The wireless technique used in this system provides the major advantages such as low power consumption and also the low cost of the ZIGBEE module. This system can also have the advantages that it can also be used to detect the theft of the gas, fuel and oil simply by changing the measurement meter used in this system and excellently the theft can be detected at tables by the authorised agencies.

  29. Design and performance analysis of HV AC machinesDownload Article

    Mrs. Ramani G, Prasanth E, Santhosh S, Jeevanandham G, Subash M

    Abstract

    close

    High voltage rotating machines are widely used in the power stations, sugar mills, steel mills, cement mills etc. Insulation is an essential component for proper operation of electrical machines without any fault and the condition of insulation of an electrical machine mainly determines its life period. The economic aspects of its periodic maintenance like the loss in production due to breakdown and the investment cost due to frequent replacement with a new machine is huge. The insulation condition of the machine can be assessed by measuring the various parameters like insulation resistance, polarization index, leakage current, capacitance, dissipation factor, partial discharge magnitude and surge voltage withstanding strength. To assess these parameters of the stator winding insulation used in high voltage rotating machines, a number of measurements have been made on actual stator coils of machines. For various test voltages, the leakage current, capacitance and dissipation factor are measured and correlated as a function of test voltages. By using artificial neural network algorithm we going to predict, status of the insulation of the AC machines.

  30. Iot based underground wire fault detection using electronic current transformerDownload Article

    P. Nisanth, D. Mohanraj, M.Sakthivel, S. Suriyaprakash

    Abstract

    close

    This paper proposes fault location model for underground power cable using electronic current transformer and the thing which is based on the internet means the information will transfer through the internet access. The aim of this project is to determine the distance of underground cable fault from the base station in the kilometer and also find the exact location of that faulty place. This project uses the simple concept of ohm's law. When any fault like short circuit occurs, voltage drop will vary depending on length of fault in cable, since the current varies. A set of resistor are therefore used to represent the cable, since the current end and the fault is detected by detecting the change in the voltage using analog to voltage converter and a microcontroller is used to make the necessary calculation so that the fault distance is displayed on the LCD display. This fault details after send to any access point through the internet. Electronic current transformer is CT coil internet with IOT hardware circuit with molding.

  31. Fault detection and production of induction motorusing smart controllerDownload Article

    Sathyasree.K Aravind.R, Gobinath.P.K.P, Gunasekaran.T,Jawahar.L

    Abstract

    close

    This paper focuses on speed,flux and vibration sensor fault detection and control) for induction motor (IM) drives. A new, accurate and high-efficiency approach is proposed so that a system can continue operating with good performance even in the presence of speed sensor faults, current sensor faults or both. The proposed three paralleled adaptive observers are capable of coil flux sensor fault detection and localization. By using observers, the rotor flux and rotor speed can be estimated which allows the system to isolation under the fault condition. In order to detect vibration sensor faults, a threshold-based scheme is proposed. To verify the feasibility and effectiveness of the proposed FDI strategy, experiments are carried out under different conditions based on a embedded IOT platform. We can monitor these parameter through IOT from anywhere

  32. Solar photovoltaic array based brushless DC motor drive using DC-DC converter configurationDownload Article

    Swathika.M, Subathi.B, Navodhaya.A.A,Haritha.T,Sathish Kumar.S

    Abstract

    close

    A dual output buck-boost (DOBB) DC-DC converter is proposed for solar photovoltaic (SPV) array using permanent magnet brushless DC (BLDC) motor drive. To design a DOBB converter with suitable voltage control, DC-DC boost and buck converters are cascaded such that it accomplishes the purpose of maximum power point tracking (MPPT) and soft starting of BLDC motor. The DOBB converter exhibit the advantages about both the buck and boost converters and gives solution to the problem associated with these converters in SPV applications. The good switch utilization, high efficiency, non-inverting output voltage and low stress on power devices are the features of DOBB converter. In DOBB converter consists of balancing capacitor so steady state performances can be maintained under varying atmospheric conditions and examines the effectiveness of the BLDC motor from SPV array. Instead of B6 inverter B4 inverter are used so that switching losses can be reduced. The performance of projected drive is simulated in MATLAB/SIMULINK atmosphere.

  33. Priority based test case generation for Multi objectDownload Article

    Kavitha S, Rajasekaran P

    Abstract

    close

    While performing regression testing, an appropriate choice for test case ordering allows the tester to early discover faults in source code. To this end, test case prioritization techniques can be used. Several existing test case prioritization techniques leave out the execution cost of test cases and exploit a single objective function (e.g., code or requirements coverage). In this paper, we present a multi-objective test case prioritization technique that determines the ordering of test cases that maximize the number of discovered faults that are both technical and business critical. In other words, our new technique aims at both early discovering faults and reducing the execution cost of test cases. To this end, we automatically recover links among software artifacts (i.e., requirements specifications, test cases, and source code) and apply a metric-based approach to automatically identify critical and fault-prone portions of software artifacts, thus becoming able to importance during test case prioritization. We experimentally evaluated our technique on 21 Java applications. The obtained results support our hypotheses on efficiency and effectiveness of our new technique and on the use of automatic artifacts analysis and weighting in test case prioritization.

  34. Maximum power point tracking for PV array based on ant colony optimization under uniform and non-uniform irradianceDownload Article

    S.Gokula Brindha, R. Madhumitha, C. Aravind

    Abstract

    close

    Photovoltaic method of power generation is essentially important as they provide an alternative method of power generation. The solar array have a nonlinear voltage current characteristics where maximum power is reached .When the solar panel is partially shaded it is difficult to track the global maximum power from local peak. So there will be a need of maximum power point tracker to track maximum power. This project defines a simulation circuit in MATLAB/SIMULINK for tracking maximum power from solar panel under varying atmospheric condition and partially shaded conditions. A boost converter is used which will minimize the ripple content and it will provide duty cycle to the maximum power point tracker to track maximum power. The maximum power varies with respect to temperature and solar radiation. MPPT algorithm is used to track the maximum power and thereby improving the efficiency of the system. By manipulating the duty cycle of the boost converter the system implements Ant Colony optimization based MPPT algorithm. The Ant Colony optimization is a randomly searching algorithm which generates duty cycle randomly to reach maximum power in shortest way. The simulation was performed under various solar radiations and their waveforms are obtained for particle swarm optimization and ant colony optimization based maximum power point tracking algorithm.

  35. Prediction of student performanceDownload Article

    M.Mohammed Imran, R.Swaathi, K.Vasuki, A.Manimegalai, A.Tamil arasan

    Abstract

    close

    Data mining and machine learning depend on classification which is the most essential and important task. Many experiments are performed on Student datasets using multiple classifiers and feature selection techniques. Many of them show good classification accuracy. The existing work proposes to apply data mining techniques to predict Students dropout and failure. But this work d oesn’t support the huge amount of data. It also takes more time to complete the classification process. So the time complexity is high. To improve the accuracy and reduce the time complexity, the MapReduce concept is introduced. In this work, the deadline constraint is also introduced. Based on this, an extensional MapReduce Task Scheduling algorithm for Deadline constraints (MTSD) is proposed. It allows user to specify a job’s (classification process in data mining) deadline and tries to make the job to be finished before the deadline. Finally, the proposed system has higher classification accuracy even in the big data and it also reduced the time complexity.

  36. A securable data storage framework in cloud computingDownload Article

    C.Vasuki, V.Jamuna,, V.Kiruthiga, M.Princy Priscilla,, A.Tamil arasan, B.Kirubaharan

    Abstract

    close

    This project has been proposed for monitoring working process of internal and external clouds. Here, Public clouds provide Infrastructure as a Service (IaaS) to users who do not own sufficient compute resources. It faces the problem of the scheduling tasks to meet the peak demand while preserving Quality-of-Service (QoS). By using Standard PSO easily traps into local optima and also is not robust for difficult problem instances. In the Proposed work, resource allocation framework in which an IaaS provider can outsource its tasks to External Clouds (ECs) when its own resources are not sufficient to meet the demand. Each task has a strict deadline to meet, so that the resource allocation problem can be considered as a deadline constrained task scheduling (DCTS) one. An integer programming formulation of the DCTS problem is established, with the objective ofmaximizing the profit of the private cloud on the premise of guaranteeing QoS. while increases exponentially with the growth of the number of tasks, using the particle swarm optimization (PSO) based scheduling approach is proposed to solve this problem. PSO has the advantages of easily realizing and quickly converging, so that this scheduling approach is able to get an optimal or suboptimal solution in a shorter computational time than the large size problems. It will increase the profit and also increase the problems of nontrivial size.

  37. Intelligent plastic waste bottle disposal systemDownload Article

    R.Thamaraiselvi, D.Jeevitha, J.Indhumathi, R.Chandru, P.Kumaresan

    Abstract

    close

    The project described here is used to collect waste water and cool drink bottles in an intelligent way, such that it makes the consumer for disposal and brings awareness about the plastic recycling methods. The system designed here uses embedded technology and acts as a standalone unit. It comprises of a load cell which is used for measuring the weight of the plastic waste a user gives for recycling. A RFID reader reads the user information it acts like smart card, according to the weight of plastic bottle he gives, points will be credited to his account. The points he got will be sent as SMS to his mobile number. With this points he can discounts in shops which he purchase. This system is fully automatic and can be implemented where people deposit many plastic waste, like railway station, bus stands, Cinema Halls, Shopping malls etc., While implementing this system improper plastic waste deposited can be eliminated which is main cause for spreading of viral diseases in India. In future, the system will be extended to collect plastic carry bags, and also instant coin vending can be added.

  38. Auto sensor deployment and local coverage-aware recovery schemes for smart environmentsDownload Article

    Mr.S.JAGADEESAN, ILAMIA.C,

    Abstract

    close

    One critical issue, for a wireless sensor network (WSN) to operate successfully, is to provide sufficient sensing coverage. Define the smart sensing environment as a sensing system with the capability to sense the environment and respond properly in an automated manner. In this paper, we target on smart sensing environments and deal with heterogeneous sensors (here sensor heterogeneity is defined as sensors having different sensing ranges) equipped with actuation facilities to assist in the sensor self-deployment. A coverage-aware sensor automation (CASA) protocol is proposed to realize an automated smart monitoring network. Two centralized algorithms are included in the CASA protocol suite: enhanced virtual forces algorithm with boundary forces (EVFA-B) and sensor self-organizing algorithm (SSOA). Unlike most previous works that tackle the deployment problem only partially, we intend to address the problem from both global deployment (EVFA-B) and local repairing (SSOA) perspectives.

  39. Toward a statistical framework for source anonymity in sensor networksDownload Article

    N.ZahiraJahan K.Priyatharshini

    Abstract

    close

    In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of “interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.

  40. Efficient broadcasting in mobile ad HoC networksDownload Article

    R.Navinkumar R.Suganya

    Abstract

    close

    The project proposes an efficient sender-based broadcasting algorithm based on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to O (n Log n). In Liu et al.’s algorithm, n nodes are selected to forward the message in the worst case, whereas in our proposed algorithm, the number of forwarding nodes in the worst case is 11. a simple and highly efficient receiver-based broadcasting algorithm is proposed. When nodes are uniformly distributed, it proves that the probability of two neighbor nodes broadcasting the same message exponentially decreases when the distance between them decreases or when the node density increases.

  41. Secure distributed deduplication systems with improved reliabilityDownload Article

    N.Zahira Jahan, R.Saraswathi

    Abstract

    close

    Secure distributed Deduplication is a technique for removing duplicate copies of data with more reliability, extensively used in cloud storage to maintain the storage space as free and upload bandwidth. Here is only one copy for each file stored in cloud even if such a file is owned by more number of users. Progress storage utilization is takes place in deduplication system while reducing reliability. Privacy for sensitive data also takes place when they are outsourced by users to cloud. Planning to address the above security test, this paper constructs the first effort to celebrate the idea of scattered reliable deduplication system. This paper recommends a new distributed deduplication systems with upper dependability in which the data chunks are distributed from corner to cornering multiple cloud servers. Safety of the data is done by a secret sharing.

  42. Combination of land surface temperature with flooding area detection wireless systemDownload Article

    Mr.C.Mani, T.Jeeva

    Abstract

    close

    Flooding is a recurrent and dramatic natural disaster that affects several areas in the world, both in tropical and temperate regions, often causing great damages to lives and property, industrial settlements, infrastructures, artistic and historical sites, aside from dramatically affecting local ecosystems. It is expected that the frequency of these phenomena will increase in the next future, due to climate change and the occurrence of several extreme weather events. Accurate knowledge of flood extents is crucial to improve disaster management and to mitigate the impact of flood episodes, during both the emergency phase, when an overall view is needed in order to plan relief efforts, and the aftermath, for the assessment of damaged areas. The addition based on the SAR images collected at regular intervals and the comparison are made and analyzed. Using feature extraction process that creates meaningful sequential time series that can be analyzed and processed for change detection. In addition, the Enhanced Fuzzy C-Means (E-FCM) approach is used to cluster the various types of sub image details. The method was evaluated on real and simulated land cover change examples are and obtained according to more change detection accuracy.

  43. HP hardware manufacturing maintaining systemDownload Article

    Mr.C.Mani, D.Ambili Roja

    Abstract

    close

    HP is one of the leading hardware manufacturing company in the IT Industry. HP hardware manufacturing company is placed in various locations all over the world. There the hardware manufacturing details, buyer’s details, order details are maintained in the excel sheet and is maintained manually. To overcome this disadvantage this is a web based application for hardware manufacturing maintenance. In this application, the buyer’s details are registered. The buyer can be view the product list manufactured by the HP. The order given by the buyer

  44. HP all in one requirtDownload Article

    Mr.S.Jagadeesan G.Janani sri

    Abstract

    close

    This project is aimed at developing a web-based and central recruitment Process system for the HR Group for the HP Company. Some features of this system will be creating vacancies, storing application data, and Interview process initiation, Scheduling interviews, storing Interview results for the applicant and finally Hiring of the applicant. Reports may be required to be generated for the use of the HR group.This project ‘HP All In One Recruit’ is an online website in which jobseekers can register themselves by attending the registration exam in aptitude. So a jobseeker will register only after clearing the Aptitude Test. After the registration they can search and apply for the Jobs in HP. And this project will reduce the manual work on HR correcting the Test, Short-listing the candidates, Informing the candidates etc..

  45. Sign language to voice interpreter by feature extraction using leapmotion controllerDownload Article

    Saritha.S, Kesavan.S.P , Dhepak.S, Geetha Bharathi.S.B, Madhumathi.M, Aravind. B

    Abstract

    close

    A sign language to voice interpreter which recognize the hand behavior through the leapmotion controller. Proposed system used Artificial Neural Network (ANN) algorithm with Back Propagation (BP) algorithm to construct a classification model which takes feature as input.In this system, the input hand behavior is performed by verbally challenged persons and is then converted into natural audio. The various set of the hand behaviors can be converted into complete sentence and grammatically corrected using NLTK Library. In the next step mapping is done with the pre-recorded audio file which is stored in MP3 module and then the audio output which comprised of natural sentence is interpreted through Galileo board and the sequence of sentence is received as audio output.

  46. Computer hardware purchase And salesDownload Article

    N.Zahira Jahan R.Rangeswaran

    Abstract

    close

    A large number of web data repositories are hidden behind restrictive web interfaces, making it an important challenge to enable data analytics over these hidden web databases. Most existing techniques assume a form-like web interface which consists solely of categorical attributes (or numeric ones that can be discretized). Nonetheless, many real-world web interfaces (of hidden databases) also feature checkbox interfaces—e.g., the specification of a set of desired features, such as A/C, navigation, etc., for a car-search website like Yahoo! Autos. We find that, for the purpose of data analytics, such checkbox-represented attributes differ fundamentally from the categorical/numerical ones that were traditionally studied. In this paper, we address the problem of data analytics over hidden databases with checkbox interfaces. Extensive experiments on both synthetic and real datasets demonstrate the accuracy and efficiency of our proposed algorithms.

  47. Design of audio watermarking based on energy comparison technique implementation using internet of thingsDownload Article

    SathishKumar.U.K, Leo.F.P, Dinesh Kumar.R,DurgaDevi.B,

    Abstract

    close

    This paper introduces a new audio watermarking technique based on a perceptual kernel representation of audio signals (spikegram). Spikegram is a recent method to represent audio signals. It is combined with a dictionary of gammatones to construct a robust representation of sounds. In traditional phase embedding methods, the phase of coefficients of a given signal in a specific domain (such as Fourier domain) is modified. In the encoder of the proposed method (two-dictionary approach), signs and phases of gammatones in the spikegram are chosen adaptively to maximize the strength of the decoder. Moreover, the watermark is embedded only into kernels with high amplitudes where all masked gammatones have been already removed. The efficiency of the proposed spikegram watermarking is shown via several experimental results. First, robustness of the proposed method is shown against 32 kbps MP3 with an embedding rate of 56.5 bps. Second, we showed that the proposed method is robust against unified speech and audio codec (24 kbps USAC, linear predictive and Fourier domain modes) with an average payload of 5-15 bps. Third, it is robust against simulated small real room attacks with a payload of roughly 1 bps. Lastly, it is shown that the proposed method is robust against a variety of signal processing transforms while preserving quality.

  48. Red lesion detection in retinal fundus image for dynamic shape features using diabetic retinopathy gradingDownload Article

    Prof. R.Jayanthi, Mr.V.Balaji, Ms.R.Bairavi, Mr.S.Mahendran, Ms.S.Mayilkodi

    Abstract

    close

    The development of an automatic system for screening and grading of diabetic retinopathy depends on the detection of red lesions in retinal fundus images. In this paper, a novel method for automatic detection of both microa-neurysms and hemorrhages in color fundus images is described and validated. The main contribution is a new set of Dynamic Shape Features, that do not require precise segmentation of the regions to be classified. These features represent the evolution of the shape during image flooding and allow to dis-criminate between lesions and blood vessel segments. The method is validated per-lesion and per image using five databases, three of which are publicly available. It proves to be robust with respect to variability in image resolution, quality and acquisition system. On the Retinopathy Online Challenge's database, the method achieves a FROC score of 0.420 which ranks it fourth. On the Messidor data-base, when detecting images with diabetic retinopathy, the proposed method achieves an area under the ROC curve of 0.899, comparable to the score of human experts, and it outperforms state-of-the-art approaches.

  49. Monitoring and controlling the real intensive care unit applicances in health care systems by using iotDownload Article

    Parameswaran S, Arun Kumar P, Ganesh G S, Gokul Raj P, Naveen D

    Abstract

    close

    The recent advancements in technology and the availability of internet make it possible to connect various devices that can communicate with each other and share data. The internet of things (IoT) is a new concept that allows users to connect various sensors and smart devices to collect real-time data from the environment. However, it has been observed that a comprehensive platform is still missing in the e-health and m-health architectures to use smartphone sensors to sense and transmit important data related to patient’s health. In this paper, our contribution is twofold. Firstly, we critically evaluate the existing literature, which discusses the effective ways to deploy IoT in the field of medical and smart health care. Secondly, we propose a new semantic model for patient’s e-health.

  50. Review on multibeneficial applications using light fidelityDownload Article

    Sharmila R Aravind S, Mahendiran K, Nandhakumar S, Dinesh N

    Abstract

    close

    Now a days, wireless communications has become fundamental to our lives and we transmit a lot of data every day. The main way we transmit wireless data is by using electromagnetic waves, in particular radio waves. There is an emerging wireless communication with a promising future and which can be a complement of radio waves i.e. Li-Fi. This paper describes the importance of the Li-Fi technology and the areas where it can be advantageous. Li-Fi also called as Light Fidelity is a new technology that uses light source i.e. light emitting diodes that can be used for high speed communication. It is a better alternative as compared to Wi-Fi technology. It is a technology based on the principle of VLC technology. It is a safer, greener and cheaper technology as it does not have any radio waves or any other type of waves. This technology provides better capacity, security, and availability as compared to Wi-Fi.

  51. A wireless alert system with gas sensor for pre-alert respiratory diseasesDownload Article

    Kesavan S P, Saritha S, Aravinth K, Gokulnath S, Gowtham C, Nisha G

    Abstract

    close

    In our environment there are many harmful gases. These gases are affecting the asthma and to alert the asthma patient . In this paper sensors are used to detect the harmful gases(ie sulpur dioxide,co2 ,ozone).We intreface the sensor by using controller, if the sensor is above the threshold value, with the help of IOT(internet of things) we alert the person. The sensors enabling that allows the link of individual environmental exposures with physiological and following difficult health response.This system will permit a better understanding of the impact of increased ozone levels and other polluntants on chronic asthma condition. The arduino is used to combine the multiple sensors and also used in both transmitter and receiver. LCD module is used to display the level of the sensors. Mobile App is developed and installed in the android mobile to detect and alert the patient and also their kinships using IOT.

  52. Arm movement following robots using rotary sensorsleeveDownload Article

    Dhepak V,Balajii GP, Jothimeena P, Kiruba K, Monika S

    Abstract

    close

    Different types of robots help to fulfill simple work on their own like simple pick-and-place, handling and mounting tasks over long-lasting periods with no loss of accuracy and speed. However, regarding to products reduced n small numbers the programming of those robots can be very time- consuming and workers have to be trained in programming the movements and tasks. Also, in the medical field where robots can be used for assistance during surgery or cancer treatment in future the surgeon or doctor has to respond to each patient individually. To train hose medical specialists in programming robots would be very extensive. Therefore, the development of an intuitive robot control can help to facilitate tasks done by non-specialized workers or surgeons. Furthermore, suggestions of different future applications based on dielectric elastomer sensors for example as artificial skin of prostheses are discussed. In this contribution a concept of an intuitive control of robots via gesture control is shown. For the perception of gestures the different degrees of freedom of the worker’s arm are detected by the use of a wearable sensor system based on dielectric elastomer sensors, which are generally lightweight and flexible. This paper describes the whole system consisting of an arm sleeve with attached stretch sensors, an analysis circuit board, the used software for communication and data processing as well as the controlling of the robot and the robot itself. Experiments show promising results, which are also specified in this paper.

  53. Design of internet of things based smart energy meter using embedded technology and android applicationDownload Article

    Narmatha.P, DivyaBharathi.M, Anushalini.K, Jeeva.G, Mohanraj.V

    Abstract

    close

    With the advent of internet-of-things (IoT)-based home automation systems, time synchronization techniques for low power sensor modules are in high demand. The constrained application protocol (CoAP) was recently standardized for sensor networks by IETF and is becoming widely adopted for home automation systems by ETSI, OMA, and oneM2M. The network time protocol (NTP) is not applicable to home automation systems due to its limited computing resources. This paper proposes a lightweight time synchronization algorithm for CoAP-based home automation system networks. The CoAP option field and a shim header are used to include time-stamps in the home automation system. The proposed scheme can thus be applied to both IP-based and non-IP-based home automation systems. In experiments with several household devices having non-IP communication interfaces, experimental results show that the proposed technique gives an average error of 1 ms and a network overhead reduction of 17% when compared to the ideal NTP service1.

  54. Embedded based agriculture monitoring system for gatevalves using GSM And android application Download Article

    Baskaran.D , D.Anitha, S.Deepak kumar, R.Deepshika, T.Janani

    Abstract

    close

    Our project is to open and close the gate valves using android applications. As the name suggested that monitoring system is for controlling the valves from remote place. Our target is to operate the valves from different place by SMS while it is in ON or OFF condition. Mobile phones have almost become an integral part of us serving multiple needs of humans. GSM network is everywhere in our country that’s why we choose GSM network operate valves and also transfer information through it. We also use GSM network because, if we use it then we don’t need to establish extra equipment for networking. Therefore we present in this paper is best of our knowledge for the GSM based agriculture monitoring system for gate valves.

  55. Multivariate statistical model for change Detection in images with image classificationDownload Article

    Mr.R.Navinkumar, S.Mangaiyarkarasi

    Abstract

    close

    Satellite remote sensing imagery has been used to track changes on the Earth surface for applications including, plantation monitoring, and urban database updating. To achieve this, different sensors have been investigated including optical, synthetic aperture radars (SAR) or multi-spectral sensors. Optical sensors provide high resolution images due to the involved wavelengths. As a consequence, huge databases of optical images are currently available. On the other hand, SAR images can be acquired even at night or under bad weather conditions and thus are more rapidly available in emergency situations. Since remote sensing images are commonly used to monitor the earth surface evolution, this surveillance can be conducted by detecting changes between images acquired at different times and possibly by different kinds of sensors. A representative case is when an optical image of a given area is available and a new image is acquired in an emergency situation (resulting from a natural disaster for instance) by a radar satellite. In such a case, images with heterogeneous properties have to be compared for change detection.

  56. A bigdata approach for Student result using mapreduceDownload Article

    Ms.K.E.Eswari, Mr.C.Dineshkumar

    Abstract

    close

    This paper takes a novel perspective on the problem of clustering high-dimensional data. Instead of attempting to avoid the curse of dimensionality by observing a lower dimensional feature subspace, this project embraces dimensionality by taking advantage of inherently high-dimensional phenomena. More specifically, it is showed that hubness, i.e., the tendency of high-dimensional data to contain points (hubs) that frequently occur in k-nearest-neighbor lists of other points, can be successfully exploited in clustering. The proposed system demonstrates that hubness is a good measure of point centrality within a high-dimensional data cluster, and by proposing several hubness-based clustering algorithms, showing that major hubs can be used effectively as cluster prototypes or as guides during the search for centroid-based cluster configurations. The results demonstrate good performance of the algorithms in multiple settings, particularly in the presence of large quantities of noise. The proposed methods are tailored mostly for detecting approximately hyperspherical clusters and need to be extended to properly handle clusters of arbitrary shapes.

  57. A cooperative clustering protocol for energy saving of mobile devices with wlan and bluetooth interfacesDownload Article

    Mr S.Sambasivam, Mr T.Imthiyaj

    Abstract

    close

    One of the most widely used wireless communication standards is a Wireless Local Area Network (WLAN) (IEEE 802.11). However, WLAN has a serious power consumption problem. In this paper, we propose a novel energy saving approach that exploits the multiradio feature of recent mobile devices equipped with WLAN and Bluetooth interfaces. Unlike previous approaches, our work is based on clustering. In our work, a cluster is a Bluetooth Personal Area Network (PAN), which consists of one cluster head and several regular nodes. The cluster head acts as a gateway between the PAN and the WLAN, enabling the regular nodes to access the WLAN infrastructure via low-power Bluetooth.

  58. A new countersign in graphical captcha based on hard AI problemsDownload Article

    Ms.C.Navamani, Ms. S.Ruba

    Abstract

    close

    Many security primitives are based on hard mathematical problems. The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. It is a novel family of graphical password systems built on top of captcha technology. It is a graphical password scheme as well as it addresses a number of security problems such as online guessing attacks, relay attacks, shoulder surfing attacks. A CaRP also offers a novel approach to address the image hotspot problem in popular graphical password systems such as passpoints, that lead to week password choices. CaRP is not a proper solution but it offers security and usability for some practical applications for improving online security.

  59. A new e-guide for recommending travel packageDownload Article

    Mrs C.Navamani, Mr C.Meenakshisundram

    Abstract

    close

    As the worlds of commerce, entertainment, travel, and Internet technology become more inextricably linked, new types of business data become available for creative use and formal analysis. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to address the unique characteristics of travel data, which distinguish travel packages from traditional items for recommendation. To this end, we first analyze the characteristics of the travel packages and develop a Tourist-Area-Season Topic (TAST) model, which can extract the topics conditioned on both the tourists and the intrinsic features (i.e. locations, travel seasons) of the landscapes. Based on this TAST model, we propose a cocktail approach on personalized travel package recommendation. Finally, we evaluate the TAST model and the cocktail approach on real-world travel package data. The experimental results show that the TAST model can effectively capture the unique characteristics of the travel data and the cocktail approach is thus much more effective than traditional recommendation methods for travel package recommendation.

  60. A novel feature selection technique for unstructured data analysisDownload Article

    Mr D.Vivek, V.Saranya, S.Sangavi, D.Smitha

    Abstract

    close

    Nowadays social networking has a rapid growth among the users. They post many events which makes difficult to search for a particular event. To avoid this the mining technique is being brought to split the events according to its domain. The summarized form is being changed to attributes. Here temporal database is being used for handling data time. Feature Selection is used for simplification of events. Therefore it could be easier to understand the evolutionary trends in the data set. To evaluate the upcoming proposed method, many experiments are done to produce in qualitative and quantitative manners in social media networking.

  61. Agricultural plant leaf disease detection and diagnosis using watershed segmentation and gray level co-occurrence matrix (GLCM)Download Article

    Ms.S.Kavitha Bharathi, Ms. V.Vinothini

    Abstract

    close

    Nowadays many of the farmers and agro help center use the different new technology to enhance the agriculture production. Plants have become important source of energy. There are several diseases that affect plants with the potential to cause economic and social losses. Many of disease are most popular where disease spots occur on the sugar cane plant leaves. If the disease are not detected at first stage than it is more harm full to production. To find out particular disease using Digital image processing helps to find disease and provide prevention for particular disease which types pesticide need to prevent disease. Firstly take Input image in RGB form then the green pixels are removed then the image is segmented useful segment used for extraction finally texture statistics is completed and according to analysis disease prevention is provided. The results suggested that, leaf width, length, perimeter and area related features can be used as factors for prediction, and that machine vision systems lead to successful prediction of targets when fed with appropriate information.

  62. An effective character multi role identification model using k-relation graph clustering in visual image datasets Download Article

    Mr.S.Jagadeesan, Mr. C.Gowthaman

    Abstract

    close

    In this paper proposes a global face-name graph matching based framework for robust movie character identification. The proposed system two schemes are considered. There are connections as well as differences between them. Regarding the connections, the proposed two schemes both belong to the global matching based category, where external script resources are utilized. This research study to improve the robustness, the ordinal graph is employed for face and name graph representation and a novel graph matching algorithm called Error Correcting Graph Matching (ECGM) is introduced. Regarding the differences, scheme 1 sets the number of clusters when performing face clustering .The face graph is restricted to have identical number of vertexes with the name graph. While, in scheme 2, no cluster number is required and face tracks are clustered based on their intrinsic data structure. Auto face identification of characters in films has drawn most research interests and led to many interesting applications. Since huge variation in the appearance of each character is found, it is a challenging problem. Existing methods evaluates promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. This study presents two schemes of global face-name matching based framework for robust character identification. In this paper main contributions of this study include the first noise insensitive character relationship representation is incorporate, next study introduces an edit operation based graph matching algorithm, next complex character changes are handled by simultaneously graph partition and graph matching and beyond existing character identification approaches. The proposed schemes demonstrate state-of-the-art performance on movie character identification in various movies.

  63. An enhanced hybrid cryptographic and video watermarking for secure transmission of medical dataDownload Article

    Mr. T.M.Saravanan, Ms. R.Kalaiselvi

    Abstract

    close

    Medical image security and privacy are two issues that are interrelated and highly sensitive. Protecting the privacy and data integrity has to be done without comprising on the structural integrity of the data. Watermarking and encryption have served the purpose of data security for long. In this research work, a dual security approach is employed where watermarking and encryption is used to provide two layers of security. The watermarking is proposed to be implemented using a hybrid approach which encompasses Inter pulse code modulation and Singular Value Decomposition (SVD) techniques. BitXOR Optimization is used for optimizing the watermarking parameters. The encryption is proposed to be effected using Data Encryption Standard (DES) and Transposition encryption algorithms. H.264 video codec is the most effective video compression standard developed in video industries. H.264 uses more accurate predication algorithms maintain same quality video at the low bit rate, without compromising the image quality. A Graphical User Interface (GUI) which enables the user to have ease of operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed. The robustness and the integrity of the watermark are tested by measuring different performance parameters and subjecting it to various attacks.

  64. Application offloading based On r-osgi in mobile cloud computingDownload Article

    Mr. S.Sambasivam, T.Manjula

    Abstract

    close

    In this project are advances of cloud computing and wireless communication technologies, Mobile Cloud Computing (MCC) has been focused on as a new paradigm to improve the processing and storage capability of mobile devices mobile application is composed of a number of modules that are eligible for offloading to be executed at a remote server on the Internet and executed at a mobile device. Compared to traditional Internet-centric Cloud service models, the complexity of mobile service management in a dynamic and distributed service environment is increased dramatically. To address this challenge, we propose to establish an R-OSGi-based mobile Cloud service model MCC-R-OSGi that uses R-OSGi Bundles as the basic mobile Cloud service building components We focused on the problem of how to transfer some modules of a mobile application to the server so as to minimize the total execution time of the whole mobile application.. Then, we formulated the offloading problem as a combinatorial optimization problem and proposed two algorithms to solve the offloading problem for a simple-chain application and also for a general application. The proposed algorithms were implemented and examined on the R-OSGi-based framework and the results show that the proposed algorithms are much more efficient than both the cases where no offloading is considered and where all the modules are offloaded to the server.

  65. Buffer dimensioning of dtn replication-based routing nodes with hierarchical routing schemeDownload Article

    Mr. C.Mani, Ms S.Kavitha

    Abstract

    close

    Delay-Tolerant Networks (DTNs) operate in environments that are generally attributed by severe limitations such as intermittent connectivity. The DTN architecture handles such limitations with the help of store, carry, and forward paradigm, wherein the nodes physically carry the messages until they meet the destination. Underlying this paradigm is the node’s buffer space that becomes a costly real estate. Unless this buffer space is properly quantified, the routing performance would severely degrade.The DTN routing protocols that embody this paradigm would also resort to replication based strategies, in which multiple nodes carry the replica of the message. This is done in order to increase the delivery probability. Moreover, it inherently reduces the buffer loss at the source nodes when compared with the no relay nodes scenario. It would be interesting to investigate a way to quantify the buffer size and also perceive the reduction in buffer size of the source node with an increase in the number of relay nodes.

  66. Byop bring your own picture for securing graphical passwordsDownload Article

    Mrs. J.Sakunthala, U.Pozhilan, K.Vinod Kumar, Sham Krishnan, P.Sruvith

    Abstract

    close

    BYOP is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, herein in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users present these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of BYOP examining its reliability, usability, and security against observation. The reliability study shows that image-feature based passwords are viable and suggests appropriate system thresholds—password items should contain a minimum of seven features, 40% of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures task completion times and error rates, revealing these to be 7.5 s and 9%, broadly comparable with prior graphical password systems that use static digital images. Finally, the security study highlights BYOP’s resistance to observation attack—three attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. These results indicate that pass-BYOP shows promise for security while maintaining the usability of current graphical password schemes.

  67. Cluster based certificate revocation For mobile ad hoc networksDownload Article

    C. Navamani, N. Aasifa

    Abstract

    close

    Mobile Ad hoc Networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important integral component to secure network communications. In this paper, we focus on the issue of certificate revocation to isolate attackers from further participating in network activities. For quick and accurate certificate revocation, we propose the Cluster-based Certificate Revocation with Justification Capability (CCRVC) scheme. In particular, to improve the reliability of the scheme, we recover the warned nodes to take part in the certificate revocation process; to enhance the accuracy, we propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate nodes or not, before recovering them. The performances of our scheme are evaluated by both numerical and simulation analysis. Extensive results demonstrate that the proposed certificate revocation scheme is effective and efficient to guarantee secure communications in mobile ad hoc networks.

  68. Coupling and cohesion enabled information transaction in cloud computinDownload Article

    K.E.Eswari, R.Malliga

    Abstract

    close

    Cloud computing delivers convenient, on-demand access to shared pools of data, applications and hardware over the internet. Cloud computing provides unlimited infrastructure to store and execute customer data and program. Due to this redundancy the data can be easily modified by unauthorized users which can be stored in the database. This leads to loss of data privacy and security to database. Extensive security and performance analysis shows that the proposed scheme ensures that cyclic redundancy check and time-tested practices and technologies for managing trust relationships in traditional enterprise IT environments can be extended to work effectively in both private and public clouds. Those practices include data encryption, strong authentication and fraud detection, etc. Property theft is prevented due to strong authentication mechanism, which includes stronger fraud detection methods.

  69. Defending against energy draining attacks in wireless sensor networks with secure synchronizationDownload Article

    S.Jagadeesan, T.Vinoth

    Abstract

    close

    Wireless ad-hoc sensor network are promise exciting new application and deployable and security communication for networking. Ad hoc wireless network is fixed frequency communication between sensor nodes, so low power consumption and high security provide in ad hoc network. Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. It is found that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. Carousel attack and Stretch attack are the possible scenarios occurred. To avoid such attacks attestation based forwarding scheme and loose source routing is proposed. In addition thesis, avoid carousel attack and stretch attack consider to multiple system, because attestation based forwarding and loose source routing process travel the packet one to many shortest path from the multiple node, so address energy efficiency problem the algorithms propose by synchronizing the transmission times of all the nodes in the system. The thesis proposes the concepts using Content and Presence Multicast Protocol (CPMP) using the FPD (Future Peak Detection) and RFPD (Randomized Future Peak Detection) algorithms which nodes use to send updates to their neighbors. The updates contain the relative time of their sender’s next transmission.

  70. Effectiveness of moving target defense using network address scufflingDownload Article

    K.S.Giriprasath, P. Kalaivani, A. Mekala, R. Viji

    Abstract

    close

    Moving Target Defense (MTD) has been proposed as a new innovative technology to change the unbalanced condition between attacks and defenses. Network address scuffling is an important branch of MTD technology. Adopting moving target defense (MTD) helps to prevent the cyber-attacks by continuously changing the attack outward. Here, we use the transmutation pattern for scuffling the network address. Virtual IP creation and IP address scuffling is the main concept in our project. In this project, we use a server similar to DNS server for mapping the virtual IP to real IP. Then, we summarize and analyze the supporting techniques and related features for each network address scuffling technique mentioned in this paper.

  71. Efficient steganography in encoded video streams using motion vector differenceDownload Article

    K.E.Eswari, A.Rinshad

    Abstract

    close

    Generally, digital video sometimes are stored and processed in an encrypted format to maintain privacy and security. For the purpose of content notation, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decryption followed by data hiding and re-encryption. This thesis proposes a novel scheme of data hiding directly in the encrypted version of AVI video stream, which includes the following three parts, i.e., AVI video encryption, data embedding, and data extraction. By analyzing the property of AVI codec and the code words of motion vector differences are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using codeword substitution technique, without knowing the original video content. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size is strictly preserved even after encryption and data embedding. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  72. Enhanced scalable and secure sharing of personal health records in cloud using Attribute-based encryption model Download Article

    K.E.Eswari, A.Shakila Banu

    Abstract

    close

    Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.

  73. Finding end to end communication for discovery system in manet using anonymous supernodeDownload Article

    Ms. K.E.Eswari, Ms. G.Kiruthika

    Abstract

    close

    Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of Mobile Ad Hoc Networks(MANETs). However, in this paper, MANETs are still vulnerable under passive statistical traffic analysis attacks. To demonstrate how to discover the communication patterns without decrypting the captured packets and present a novel Statistical Traffic Pattern Discovery System (STARS). STARS works passively to perform traffic analysis based on statistical characteristics of captured raw traffic. STARS is capable of discovering the sources, the destinations, and the end-to-end communication relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the hidden traffic patterns.

  74. Generative location sensitive recommendationsDownload Article

    Mrs. C.Navamani, Mr M.Hajmohammed

    Abstract

    close

    Social recommendation is popular and successful among various urban sustainable applications like products recommendation, online sharing and shopping services. Users make use of these applications to form several implicit social networks through their daily social interactions. The users in such social networks can rate some interesting items and give comments. The majority of the existing studies investigate the rating prediction and recommendation of items based on user-item bipartite graph and user-user social graph, so called social recommendation. However, the spatial factor was not considered in their recommendation mechanisms. With the rapid development of the service of location-based social networks, the spatial information gradually affects the quality and correlation of rating and recommendation of items. This project proposes spatial social union (SSU), an approach of similarity measurement between two users that integrates the interconnection among users, items and locations. The SSU-aware location-sensitive recommendation algorithm is then devised. This project evaluates and compares the proposed approach with the existing rating prediction and item recommendation algorithms. The results show that the proposed SSU-aware recommendation algorithm is more effective in recommending items with the better consideration of user’s preference and location. The project has been developed using ASP.NET as front end and SQL Server 2000 as back end. C# is used the coding language.

  75. Implementation of image processing in vehicle notification system and traffic managementDownload Article

    Mrs C. Navamani, Mr M. Dhatchana Moorthy

    Abstract

    close

    The problem of traffic congestion increases rapidly, due to the growing number of vehicles and the limited resources in our country. There is a high need for the introduction of new technology to improve the traffic control. In present scenario traffic control system uses timer for each phase and sensors to detect vehicles, and produce signals. In the previous study they don’t consider about the heavy vehicle and the ambulance like vehicles in the traffic and that is must to clear the signal the vehicle is waiting. And to alert the traffic police to clear the situation in the traffic is to be considering in the proposed system. The frequent traffic jams at major junctions call for an efficient traffic management system in place. The resulting wastage of time and increase in pollution levels can be eliminated on a city-wide scale by these systems. The paper proposes to implement an intelligent traffic controller using real time image processing. The image sequences from a camera are analyzed using various edge detection and object counting methods to obtain the most efficient technique. Subsequently, the number of vehicles at the intersection is evaluated and traffic is efficiently managed. The paper also proposes to implement a real-time emergency vehicle detection system. In case an emergency vehicle is detected, the lane is given priority over all the others.

  76. Implementation of increasing packet delivery ratio using lifi technologyDownload Article

    Ms N.Zahira Jahan, Mr R. Marimuthu

    Abstract

    close

    The fast growth in gadgets usage and application developments has prompted many researchers to look beyond Wi-Fi. The possibility of using visible light for short range communication is explored by many researchers [1]. An intuitive acronym Li-Fi is used by many in contemporary literature to describe this concept. Light reaches almost all over the place, so communication can be done through light easily. By utilizing visible light as a transmission means, Li-Fi provides wireless indoor communication. Since the switching speed of Light Emitting Diode is less than 1 μs, they can be turned on and off rapidly, so human eye cannot identify any flickering, thus the light source seems to be persistent. This imperceptible on-off action permits information transmission utilizing binary codes. Turning on LED is a binary '1', turning it off is a binary '0'. It is possible to get sequence of 1s and 0s by adjusting the LEDs flickering rate. A photo detector can be used to recover the original data. This method of wireless transmission of information using rapid pulses of light is cited as Visible Light Communication. Its ability to challenge conventional Wi-Fi has roused the interest in Li-Fi. A study to analyze the performance of visible light communication system in optical wireless communication has been made and achieved a data rate of 10 kbps over 40 cm distances.

  77. Improving word similarity by using ppmic with estimates of word polysemyDownload Article

    Mr C. Mani, Mrs S. Sakthi

    Abstract

    close

    Semantic similarity is a metric defined over a set of documents or terms, where the idea of distance between them is based on the likeness of their meaning or semantic content which can be estimated regarding their syntactical representation. Its applications are Biomedical informatics, GeoInformatics, Computational linguistics, Natural language processing. There are two approaches to compute word similarity, on either using of thesaurus (e.g., Word Net) or statistic from large corpus.PMI means point wise mutual information. It is used to measure semantic similarity. In the existing system PMI and PMImax is used to measure semantic similarity. PMImax is used to find out the maximum correlation between the words. PMImax only find siblings concept but it fails to find out cousin concept. So proposed system uses PPMIC to find and improve word similarity.

  78. Lifetime enhancement using apkf algorithm for large scale wsn Download Article

    Ms. Suguna Angamuthu, Ms. S. Kaviya, Ms. S. Suvitha, Ms. N. Saranya

    Abstract

    close

    This work combines an efficient prediction model with a Kalman filter (PKF) to reduce the communication cost in Wireless Sensor Networks (WSNs) with a guaranteed data quality. The hardware accelerator requires fewer resources than previous approaches, while achieving higher energy reductions. Exhaustive experimental results based on datasets from a real WSN application confirm the advantages of the proposed mechanism. Energy efficiency is a primary concern for wireless sensor networks (WSNs).This work uses a predictor combined with a Kalman filter (KF) to reduce the communication energy cost for cluster-based WSNs. The technique, called PKF, is suitable for typical WSN applications with adjustable data quality and tens of pico joule computation cost. However, it is challenging to precisely quantify its underlying process from a mathematical point of view.

  79. Lossless image compression based on data foldingDownload Article

    Ms.K.E.Eswari, Mr.S.Somasundaram

    Abstract

    close

    Image compression techniques reduce the number of bits required to represent an image by taking advantage of these redundancies. An inverse process called decompression (decoding) is applied to the compressed data to get there constructed image. The objective of compression is to reduce the number of bits as much as possible, while keeping the resolution and the visual quality of the reconstructed image as close to the original image as possible. Image compression systems are composed of two distinct structural blocks: an encoder and a decoder. The existing method Huffman encoding technique is used for loss less compression. It has the drawbacks of Images like they are often used in prepress are better handled by other compression algorithms. It always produces rounding errors, because its code length is restricted to multiples of a bit. This deviation from the theoretical optimum is much higher. In this research propose a novel method for encoding namely Arithmetic Coding to provide lossless image compression. The proposed arithmetic coding provides the better Compression Ratio (CR) and lesser Bits Per Pixel (BPP). Though none of the technique can be considered as completely lossless but using these techniques the loss has been expected to be minimal. The proposed arithmetic coding is a entropy coder for lossless compression. It encodes the entire input data using the real interval. It is very efficient than the Huffman coding. In addition, proposed system uses the fractal compression is a lossless compression method for digital images, based on fractals. The method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. Enhanced Fractal algorithms convert these parts into mathematical data called "fractal codes" which are used to recreate the encoded image.

  80. Measurement based roadside content delivery systemDownload Article

    Mrs.K.E.Eswari, Mr.M.V.Bibin

    Abstract

    close

    This paper presents two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based broadcasting algorithms, specifically the algorithm proposed by Liu et al. In their paper, Liu et al. proposed a sender-based broadcasting algorithm that can achieve local optimality by selecting the minimum number of forwarding nodes in the lowest computational time complexity O(n log n), where n is the number of neighbors. We show that this optimality only holds for a subclass of sender-based algorithms. We propose an efficient sender-based broadcasting algorithm based on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to O(n). In Liu et al.’s algorithm, n nodes are selected to forward the message in the worst case, whereas in our proposed algorithm, the number of forwarding nodes in the worst case is 11. In the second part of the paper, we propose a simple and highly efficient receiver-based broadcasting algorithm. When nodes are uniformly distributed, we prove that the probability of two neighbor nodes broadcasting the same message exponentially decreases when the distance between them decreases or when the node density increases. Using simulation, we confirm these results and show that the number of broadcasts in our proposed receiver-based broadcasting algorithm can be even less than one of the best known approximations for the minimum number of required broadcasts.

  81. Mining web graphs for recommendations identification for query suggestion with efficient search re-rankingDownload Article

    Mr R.Navinkumar, Ms A.Vijayalakshmi

    Abstract

    close

    As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommendations are made on the Web every day, including movies, music ,images, books recommendations, query suggestions, tags recommendations, etc. No matter what types of data sources are used for the recommendations, essentially these data sources can be modeled in the form of various types of graphs. In this paper, aiming at providing a general framework on mining Web graphs for recommendations, 1) we first propose a novel diffusion method which propagates similarities between different nodes and generates recommendations; 2) then we illustrate how to generalize differentiate commendation problems into our graph diffusion framework. The proposed framework can be utilized in many recommendation on the World Wide Web, including query suggestions, tag recommendations, expert finding, image recommendations, image annotations, etc. The experimental analysis on large data sets shows the promising future of our work.

  82. Mobile coordinated wireless sensor network Download Article

    Ms. C.Navamani, Ms. K.Rohini

    Abstract

    close

    This paper introduces the mobile access co-ordinated wireless sensor network (MC-WSN) — a novel energy efficient scheme for time-sensitive applications. In conventional sensor networks with mobile access points (SENMA), the mobile access points (MAs) traverse the network to collect information directly from individual sensors. While simplifying the routing process, a major limitation with SENMA is that data transmission is limited by the physical speed of the MAs and their trajectory length, resulting in low throughput and large delay. In an effort to resolve this problem, we introduce the MC-WSN architecture, for which a major feature is that: through active network deployment and topology design, the number of hops from any sensor to the MA can be limited to a pre-specified number. In this paper, we investigate the optimal topology design that minimizes the average number of hops from sensor to MA, and provide the throughput analysis under both single-path and multipath routing cases. Moreover, putting MC-WSN in the bigger picture of network design and development, we provide a unified framework for wireless network modeling and characterization. Under this general framework, it can be seen that MC-WSN reflects the integration of structure-ensured reliability/efficiency and ad-hoc enabled flexibility.

  83. Mobile crowd sensingDownload Article

    Mr C.Mani, Mr S.Sharma

    Abstract

    close

    With the development of mobile sensing and mobile social networking techniques, Mobile Crowd Sensing and Computing (MCSC), which leverages heterogeneous crowd sourced data for large- scale sensing, has become a leading paradigm. Built on top of the participatory sensing vision, MCSC has two characteristic features: it leverages heterogeneous crowd sourced data from two data sources: participatory sensing and participatory social media; and it presents the fusion of human and machine intelligence in both the sensing and computing processes. This article characterizes the unique features and challenges of MCSC. We further present early efforts on MCSC to demonstrate the benefits of aggregating heterogeneous crowd sourced data.

  84. Multimodal fusion for video search re rankingDownload Article

    Mr R.Navinkumar, Mr T.Sathishkumar

    Abstract

    close

    Most of the users pay large attention only in top ranked portion of returned search results .So it is very essential to achieve high accuracy on top ranked documents there are so many methods to boost video search performance, they either pay less attention to the above factor or encounter difficulties in practical applications. In order to develop retrieval effectiveness, We should present This paper the on a flexible and effective re ranking method, called CR-Re ranking. For the purpose of fusing multimodal cues CR-Re ranking employs a cross-reference (CR) it is used to offer high accuracy on top ranked results Specifically, multimodal features are first utilized separately to re rank the initial returned results at the cluster level, and then all the ranked clusters from different modalities are cooperatively used to infer the shots with high relevance. Experimental results show that the search quality, especially on the top-ranked results, is improved significantly

  85. On energy hole and coverage hole avoidance in underwater wireless sensor networkDownload Article

    Mr. S.Sambasivam, Ms N. Karthiga

    Abstract

    close

    Due to limited battery capacity of sensor nodes, minimization of energy consumption is a potential research area in Underwater Wireless Sensor Networks (UWSNs). However, energy hole and coverage hole creation leads performance degradation of UWSNs in terms of network lifetime and throughput. It address the energy hole creation issue in depth based routing techniques, and devise a technique to overcome the deficiencies in existing techniques. Besides addressing the energy hole issue, proposition of coverage hole repair technique is also part of this research work. In areas of dense deployment, sensing ranges of nodes redundantly overlap. Coverage-Aware Sensor Automation (CASA) protocol is proposed to realize an automated smart monitoring network. Two centralized algorithms are included in the CASA protocol suite: Enhanced Virtual Forces Algorithm with Boundary forces (EVFA-B) and Sensor Self-Organizing Algorithm (SSOA). Unlike most previous works that tackle the deployment problem only partially, we intend to address the problem from both global deployment (EVFA-B) and local repairing (SSOA) perspectives.

  86. Opinion targets extraction using word allignment from online reviewsDownload Article

    Mr. S.Sambasivam, Ms K.Balamani

    Abstract

    close

    Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially-supervised alignment model, which regards identifying opinion relations as an alignment process. Then, a graph-based co-ranking algorithm is exploited to estimate the confidence of each candidate. Finally, candidates with higher confidence are extracted as opinion targets or opinion words. Compared to previous methods based on the nearest-neighbor rules, our model captures opinion relations more precisely, especially for long-span relations. Compared to syntax-based methods, our word alignment model effectively alleviates the negative effects of parsing errors when dealing with informal online texts. In particular, compared to the traditional unsupervised alignment model, the proposed model obtains better precision because of the usage of partial supervision. In addition, when estimating candidate confidence, we penalize higher-degree vertices in our graph-based co-ranking algorithm to decrease the probability of error generation. Our experimental results on three corpora with different sizes and languages show that our approach effectively outperforms state-of-the-art methods.

  87. Performance and cost evaluation of an adaptive encryption architecture for cloud databaseDownload Article

    Mr.S.Jagadeesan,Ms. P.Aarthi

    Abstract

    close

    Database as a service paradigm (DBaaS) poses several research challenges in terms of security and cost evaluation from a tenant’s point of view. The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. This thesis proposes a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the tradeoff between the required data confidentiality level and the flexibility of the cloud database structures at design time.

  88. Pickup and delivery schedule by kyc document verification using biomatric scanner Download Article

    Mr. R.Navinkumar, Ms. K.Dhivyabharathi

    Abstract

    close

    Logistic supply chain by KYC (Know Your Customer), which means Aadhar Card, Voter Id, etc. documents verification by biometric Scanner to prevent fraudulent activity. Over the last few years a new area of engineering science has been established whose products are likely to create large market in the future. It has been called biometrics. Biometric system is essentially a pattern recognition system which recognizes a user by determining the authenticity of specific physiological or behavioural characteristic passed by the user. First, a user must be enrolled in the system so that his biometric template (Finger print) can be captured. This template is securely stored in central database. The template is retrieved when user needs to be order and buying products by online. Depending on the context, a biometric system can operate their in a verification

  89. Preserving location privacy in geo social applicationsDownload Article

    Mr.S.Sambasivam, Mr.G.Vinothkumar

    Abstract

    close

    Using geosocial applications, such as FourSquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, for example, to track users or target them for home invasion. In this paper, we introduce LocX, a novel alternative that provides significantly improved location privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user share this user’s secrets so they can apply the same transformation. This allows all location queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access. We show that LocX provides privacy even against a powerful adversary model, and we use prototype measurements to show that it provides privacy with very little performance overhead, making it suitable for today’s mobile devices

  90. Privacy conserving statistics analytics for smart homesDownload Article

    Mr. R.Navin Kumar, Ms. L. Hemalatha

    Abstract

    close

    A framework for maintaining security & preserving privacy for analysis of sensor data from smart homes, without compromising on data utility is presented. Storing the personally identifiable data as hashed values withholds identifiable information from any computing nodes. However the very nature of smart home data analytics is establishing preventive care. Data processing results should be identifiable to certain users responsible for direct care. Through a separate encrypted identifier dictionary with hashed and actual values of all unique sets of identifiers, we suggest re-identification of any data processing results. However the level of re-identification needs to be controlled, depending on the type of user accessing the results. Generalization and suppression on identifiers from the identifier dictionary before re-introduction could achieve different levels of privacy preservation. In this paper we propose an approach to achieve data security & privacy throughout the complete data lifecycle: data generation/collection, transfer, storage, processing and sharing.

  91. Remote health care monitoring based on swarm intelligence for home care monitoring Download Article

    Mr. R.Navin Kumar, Mr. V.Karthikeyan

    Abstract

    close

    A swarm intelligence-based procedure to detect critical conditions of a patient, affected by a specific disease, at an early stage in absence of clinician, is proposed. The procedure is to be integrated inside a remote health care system for patients at home, where some physiological parameters related to a specific disease are being monitored. A significant variation in the monitored parameters can lead the patient to a critical state, thus the proposed method is aimed at predicting a possible future bad condition of the patient on the basis of past measurements. Moreover, different physiological parameters contribute to diverse degrees in dissimilar diseases; consequently, a swarm intelligence-based method is proposed for optimizing the weight of each parameter for a more accurate diagnosis. The proposed approach has been validated experimentally under the framework of the industrial re- search project Patient Diagnosis and Monitoring at Domicile (PA- DIAMOND: co-funded by EU and the company Filia srl, Caserta, Italy).

  92. Robust ad-hoc sensor routing (RASER) protocol for mobile wireless sensor networksDownload Article

    Mr.C.Mani, Ms. S. Gowsalya

    Abstract

    close

    Sensor networks are an important tool for monitoring physical phenomena in the modern world. The nodes ability to communicate wirelessly removes the need for long wires and enables them to be distributed in an ad-hoc manner wherever and whenever required. One of the main challenges in these Mobile WSNs (MWSNs) is the routing protocol, which aims to transport the data generated by the sensors to the sink. A constantly changing topology means that a fixed path from a sensor to the sink cannot be guaranteed. The more demanding applications also require the consistent delivery of real-time data in highly mobile scenarios. Robust Ad-hoc Sensor Routing (RASeR) protocol is designed to be a reliable solution, even with the high frequency topology changes of a mobile network. It uses a simple hop-count gradient to allow sensor nodes to blindly forward data towards a single sink. A key issue with this type of routing is in keeping the gradient metric up to date, for this reason RASeR uses a design that combines a Global Time Division Multiple Access (GTDMA) medium access control (MAC) scheme with the routing protocol. In proposed work, the communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. Our analysis shows significant improvement in packet delivery ratio of AODV in the presence of attacks, with marginal rise in control traffic Overhead.

  93. Robust execution of packet flow in routers to prevent ddos attack using trace back Download Article

    Ms. N. Zahira Jahan, Mr. Bhagesh B.T.

    Abstract

    close

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far. In this paper, we propose a novel trace back method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic, which is fundamentally different from commonly used packet marking techniques. In comparison to the existing DDoS trace back methods, the proposed strategy possesses a number of advantages it is memory non-intensive, efficiently scalable, robust against packet pollution, and independent of attack traffic patterns. The results of extensive experimental and simulation studies are presented to demonstrate the effectiveness and efficiency of the proposed method. Our experiments show that accurate trace back is possible within 20 seconds (approximately) in a large-scale attack network with thousands of zombies.

  94. Robust partial face recognition using hog feature points matching and minimum distance classifier Download Article

    Ms. S.Kavitha Bharathi, Ms. S.N.Kiruthika

    Abstract

    close

    The most successful applications of the image processing, face recognition has a vital role in technical field especially in the field of security purpose. Face Recognition is the technique to verify whether the entered image or input is exactly similar to the available images present in the databases. The technique comes under the Artificial Intelligence. Updating to the existing technique and also new technique is introduced day by day. Different types of facial recognition techniques are Finding faces in images with controlled background, Finding faces by color, Finding faces by motion, Finding faces in unconstrained scenes etc. Each and every approach has its different techniques. Subsequently various algorithms are also exist which gives us result based as per our expectation. We are implementing Partial face recognition approach by using Viola Jones method, Histogram Of Gradient features (HOG) and Minimum Distance Classifier. The advantage of this algorithm is that we can apply it on partial or incomplete faces also, even if the given input is partial, then also we can use this method. Facial recognition or face recognition as it is often referred to as, analyses characteristics of a person's face image input through a camera. It measures overall facial structure, distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. One of the strongest positive aspects of facial recognition is that it is non-intrusive. Verification or identification can be accomplished from two feet away or more, without requiring the user to wait for long periods of time or do anything more than look at the camera.

  95. Scene text recognition in images by character descriptor and structure configurationDownload Article

    Mr.S.Jagadeesan, Mr. R.Sethupathi

    Abstract

    close

    Camera-Based text information serves as effective tags or clues for many mobile applications associated with media analysis, content retrieval, scene understanding, and assistant navigation. In natural scene images, text characters and strings usually appear in nearby sign boards and provide significant knowledge of surrounding environment and objects. Text characters and strings in natural scene can provide valuable information for many applications. Extracting text directly from natural scene images is a challenging task because of diverse text patterns and variant background interferences. This project proposes a method of scene text recognition from detected text regions. In text detection, the previously proposed algorithms are applied to obtain text regions from scene image. The project designs a discriminative character descriptor by combining several state-of-the-art feature detectors and descriptors. Second, it models character structure at each character class by designing stroke configuration maps. The design is compatible with the application of scene text extraction in images. The project is developed to show the effectiveness of our proposed method on scene text information extraction from nearby objects. The demo system also provides us some insight into algorithm design and performance improvement of scene text extraction.

  96. Secure data transmission using visual cryptographyDownload Article

    Ms.N.Zahira Jahan, Mr.A.Gokulnath

    Abstract

    close

    When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the data and then encrypt it. In this paper, they investigated the novelty of reversing the order of these steps, i.e., first encrypting and then compressing, without compromising either the compression efficiency or the information-theoretic security. Although counterintuitive, they showed surprisingly that, through the use of coding with side information principles, this reversal of order is indeed possible in some settings of interest without loss of either optimal coding efficiency or perfect secrecy. They showed that in certain scenarios our scheme requires no more randomness in the encryption key than the conventional system where compression precedes encryption. In addition to proving the theoretical feasibility of this reversal of operations, they also described a system which implements compression of encrypted data. Consider the problem of transmitting redundant data over an insecure, bandwidth-constrained communications channel. It is desirable to both compress and encrypt the data. The traditional way to do this is to first compress the data to strip it of its redundancy followed by encryption of the compressed bit stream. The source is first compressed to its entropy rate using a standard source coder. Then, the compressed source is encrypted using one of the many widely available encryption technologies. At the receiver, decryption is performed first, followed by decompression.

  97. Security and privacy enhancing in multi cloudDownload Article

    Ms.K.E.Eswari, Mr. T.Mohansasundaram

    Abstract

    close

    Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public audit ability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. This project proposes a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. In addition, it articulates performance optimization mechanisms for this scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. It shows that the solution introduces lower computation and communication overheads in comparison with non-cooperative approaches.

  98. Self-servicing mesh router for mobile mesh networks with missed node detectionDownload Article

    Mr.S.Jagadeesan, Ms. R.Pavithra

    Abstract

    close

    Wireless technology has been one of the most transforming and empowering technologies in recent years. In particular, mobile ad hoc networks (MANETs) are among the most popularly studied network communication technologies. In such an environment, no communication infrastructure is required. The mobile nodes also play the role of the routers, helping to forward data packets to their destinations via multiple-hop relay. This type of network is suitable for situations where a fixed infrastructure is unavailable or infeasible. Mobile ad hoc networks (MANETs) are ideal for situations where a fixed infrastructure is unavailable or infeasible. Today’s MANETs, however, may suffer from network partitioning. This limitation makes MANETs unsuitable for applications such as crisis management and battlefield communications, in which team members might need to work in groups scattered in the application terrain. In such applications, intergroup communication is crucial to the team collaboration. To address this weakness, this project introduces a new class of ad-hoc network called Autonomous Mobile Mesh Network (AMMN). Unlike conventional mesh networks, the mobile mesh nodes of an AMMN are capable of following the mesh clients in the application terrain, and organizing themselves into a suitable network topology to ensure good connectivity for both intra- and intergroup communications.

  99. Session based low overhead privacy- preserving and secure communication protocol in adhoc networkDownload Article

    Ms N.Zahira Jahan, Ms M.Sri soundharyaa

    Abstract

    close

    We propose lightweight protocol for securing communication and preserving users’ anonymity and location privacy in hybrid adhoc networks. Symmetric-key-cryptography operations and payment system are used to secure route discovery and data transmission. To reduce the overhead, the payment can be secured without submitting or processing payment proofs (receipts). To preserve users’ anonymity with low overhead, we develop efficient pseudonym generation and trapdoor techniques that do not use the resource-consuming asymmetric-key cryptography. Pseudonyms do not require large storage area or frequently contacting a central unit for refilling. Our trapdoor technique uses only lightweight hashing operations. This is important because trapdoors may be processed by a large number of nodes. Developing low-overhead secure and privacy-preserving protocol is a real challenge due to the inherent contradictions: 1) securing the protocol requires each node to use one authenticated identity, but a permanent identity should not be used for privacy preservation; and 2) the low overhead requirement contradicts with the large overhead usually needed for preserving privacy and securing the communication. Our analysis and simulation results demonstrate that our protocol can preserve privacy and secure the communication with low overhead.

  100. An storage optimization using deduplication techniqueDownload Article

    Dr. A.Tamilarasi, Ms. N. Naveena

    Abstract

    close

    Data deduplication technology is to optimize the storage space. In cloud data storage, the deduplication technology plays a major role in the virtual machine framework, data sharing network, and structured and unstructured data handling by social media and, also, disaster recovery. In the deduplication technology, data are broken down into multiple pieces called “chunks” and every chunk is identified with a unique hash identifier. These identifiers are used to compare the chunks with previously stored chunks and verified for duplication. In the proposed system the files can be broken into multiple chunks of variable sizes by breaking them up based on the content rather than on the fixed size of the files. This method resolves the fixed chunk size issue. When working on a fixed chunking algorithm, fixed boundaries are defined on the data based on chunk size which do not alter even when the data are changed. However, in the case of a variable-size algorithm different boundaries are defined, which are based on multiple parameters that can shift when the content is changed or deleted. Hence, only less-chunk boundaries need to be altered.

  101. The odd-even turn model for adaptive routing with node failure scenarioDownload Article

    N.Zahira Jahan, Ms P.Umarani

    Abstract

    close

    The mesh topology has become a popular interconnection architecture for constructing massively parallel multi-processors. In particular, low-dimensional meshes have been used in several academic and commercial machines, such as the DASH multiprocessor.This project presents a model for designing adaptive wormhole routing algorithms for meshes. The model restricts the locations where some turns can be taken so that deadlock is avoided. In comparison with previous methods (xy routing method), the degree of routing adaptiveness provided by the model is more even for different source-destination pairs. The wireless mesh network may benefit from this feature in terms of communication efficiency. The odd-even turn model makes message routing very minimal. In addition, this property results in a smaller fluctuation of the network performance with respect to different traffic patterns.In addition, the node failure scenario is also considered so that if the path contains that node, then new alternate path from the failure node to the destination is recalculated or taken from cache if previous path information is stored.

  102. A Critical Review on Solar Drying MethodsDownload Article

    Venkateshan.T, Prasanna.R, Noorul Ameen.M, Kumar.P, Vinoth.R

    Abstract

    close

    The process of drying is an important process in agricultural products. By applying this method, we can increase the self-life of the products by removing the moisture content from it. By using conventional drying methods, the products may be contaminated due to direct or open drying. In order to overcome this defect, the drying is done in closed medium by using solar dryer. In this paper, we shall see several methods of solar drying based on the specific application. Also some idea can be extracted for future study.

  103. Mathematical Modeling of Half Car and Full Car Model to Study the Biodynamic Response of Tractor Occupant Subjected to Whole Body VibrationDownload Article

    N Saravanan, J Mubarak, Dr Syath Abuthakeer

    Abstract

    close

    Persistent exposure of humans to whole body vibration can be experienced in our daily work activities. These vibrations can result in motion sickness, discomfort and even severe health effects .This project work aims to study and analyze human vibration transmitted to a tractor driver by carrying out analytical work to measure Whole Body Vibration (WBV) and thus make them aware about the vibration limits within which their health will be safe. A half car model of tractor occupant system subjected to periodic excitation was modelled and its equations of motions were arrived. The model was then solved using Mathematica Systemmodler software and thereby the acceleration versus time plot for each mass is obtained. Also the half car model is modified with full car model considering pitch and roll vibration in addition to vertical vibration and thereby enhancing the accuracy of the result obtained from mathematical model. The optimum values of suspension parameters are to be found out using genetic algorithm technique.

  104. Design and Modification of Toe Cap for Safety Shoe in 3D PrintingDownload Article

    Mr.V.N.Loganathan, P.Arul Kumar, R.Asbin Kumar.R, S.Hari Prasath, S.I.Hariprakash,

    Abstract

    close

    An investigation about the latest technology in 3D printing, we have planned to do toe cap for safety shoe. Our paper is to modify the design of the toe cap in steel material, why we modify the design is to increase the strength, stiffness and reduced corrosion. From a finite element analysis and experimental test result of toe cap prototype is taken in software package using Ansys15.0.It was found that the significant influence is to modify the design of steel toe cap. The prototype is printed by ABS (Acrylonitrile Butadiene Styrene) material using advance 3D printing machine. By modify the design pattern die amount is decreased by using the advance 3D printing machine. Experimental result of toe cap is to improve the strength of toe cap modify design and reduce corrosion.

  105. Design and analysis of bagasse dryer for boilerDownload Article

    D. Ravichandran, V. Kavinkumar, K. Madhan kumar, M. Prasanth, T. Ramkumar,

    Abstract

    close

    The process of manufacturing crystal sugar requires steam. By installing co-generation systems, the sugar industry now produces Electricity far in excess of their captive requirement & sells the surplus power to the grid. Mill wet bagasse contains about 50% moisture. The calorific value of mill wet bagasse is 2280 kcal/kg. Use of driers to reduce the moisture content in bagasse before it is burnt, is regarded as a simple energy conservation measure. This bagasse drying system can also use the waste heat from the boiler flue gases for its partial heat requirement.

  106. Design of Diode Voltage Measurement and Tuning Screw Insertion by Using a Single FixtureDownload Article

    Mr.V.N.Loganathan, M.Meghanathan, S.B.Praveen, S.Rajapandi, M.Ramesh kumar

    Abstract

    close

    Nowadays, technology is well-developed, but in some of the industries still operated by manual effort, semi-automatic, and automatic. Industries main aim is to improve production rates by minimizing workstation in assembly line. Main aim of our project is to cut human resource by eliminating unwanted complications, simplifying the process to improve productivity and making it most efficient. Our project involves in designing a fixture and machine for horn assembly line by combination of two machines in assembly line and making it into a single machine thereby increase in productivity and reduces man power.

  107. Wear Behaviour Analysis of Aluminium Metal Matrix Composites Reinforced With Bore Sand ParticlesDownload Article

    Mr.B.Velliyangiri, JerinSaji, Gokulakrishnan.G, Govindaraj.R, Soundarajan.N

    Abstract

    close

    The present study deals with the investigation of dry sliding wear behavior of aluminium alloy (Al6063) based composites, reinforced with bore sand. Bore sand a waste material obtained while digging bore well. We are using this bore sand for the reinforcing with aluminium. Since the bore sand is waste during the bore well making process, we take this bore sand for reusing it. We take bore sand and tested the wear behaviour, hardness and did the microstructure analysis.The project mainly aims at the reusing of bore sand which a waste material is obtained while digging bore wells.

  108. Lubrication properties of bio based oils compared with mineral oil and determining the effect of wearDownload Article

    Mr.Manikandan, G.Magalingam, D.Murugavelan, R.Nirmal Kumar, T.Raghul

    Abstract

    close

    Lubrication is essential in increasing a mechanical device’s service duration and minimizing wear. Though synthetic and petrol-based oils are generally used in lubricants today, natural oils which are pollution-free, biologically decomposable, and whose waste does not give harm to the environment have also begun to be used as lubricants recently thanks to an increasing awareness of the environment. So, this study is investigated on wear performance of bio based oil. In this research bio based lubricant oil are compared with mineral lubricant oil of SAE20W40. Wear study involved with experiment of PIN ON DISC test apparatus at different speed of 150r.p.m, 300r.p.m, 450r.p.m, 600r.p.m and different load of 50N. Then the surface changes are inspected using optical microscope.

  109. Design of Automatic Slag Removal Machine for CNC Gas Cutting ProcessDownload Article

    Dr.Easwaramoorthi.M, Saravanan.C, Senthil Nathan.R, Siva Shankar.D, Vivek.G.P

    Abstract

    close

    In modern days CNC gas cutting is being employed in many industries and the slag removal process is not fully automatic in industries. There is a process called slag removal is till now done by manually in industries. Also slag removal and handling is not safety for human workers and it affects production and work time. This project is fully based on improving safety, time reduction, cost saving, and to avoid investment blockage can be done by “Design of Automatic slag removal for CNC gas cutting Process”. This slag removing process has long been left to the manual work, but now it can be automated by Roller slat chain drive design mechanism. To efficiently remove the slag continuously by means of Roller chain and for scrapper the design for CNC gas cutting machines through this project idea can be used to all thermal gas cutting slag removal purpose. This operates and removes slag and scrap while you cut, on-demand or with programmed intervals. The investment in this project is an automatic slag removal table is and easily justified because it increases production time reduces labor costs.

  110. Emission Characteristics of Variable Injection Pressure Engine with Pungai Oil and Methanol as additiveDownload Article

    Mr.Murthi M.K, Dr. Nithiyanadam.S, Vignesh.K, Sethupathi.R, Daniel Justine.R

    Abstract

    close

    Biodiesel is a well recognized choice for diesel and has an benefit over the later because of it is renewable, biodegradable, sulphur free and non-less poisonous in nature, better lubricity and can considerably reduce exhaust emissions from the engine. This study investigates the use of ethanol as an additive with 20% pungai oil diesel blend (B20). The transesterification process is used to reduce the viscosity of the pungai oil. The main aim of this paper is to examine the emission parameters of variable injection pressure diesel engine runes with pungai oil 20% (B20) and ethanol as a additive by adding 5% and 10% at steady speed of 1500 rpm with variable loads and changeable injection pressure (180,210&240). The outcomes of these blends are to be compared with normal diesel. The fitness of pungai oil with ethanol is established as a bio fuel in this study. The impact of pressure injection on exhaust gas emissions has been investigated and offered. The exhaust emissions Hydrocarbons, Carbon monoxide and carbon dioxide are are almost reduced compared to diesel.

  111. Design and Analysis of Heat Exchanger to Preheat the Boiler Feed Water by Blow Down WaterDownload Article

    Mr.S.Eswaran, R.Karthi, K.Nandhakumar, M.Nirmalraj, P.Prem

    Abstract

    close

    In present scenario, the energy crisis is the major problem faced by all the industries. The Cogeneration plant has two multi fuel boiler produces 170 Tons per hour of steam at a pressure of 86 kg/sq.cm at a temperature of 510˚C. The steam is used to produce electric power and the exhaust steam is being supplied to sugar plant to boil the sugarcane milk. Blow down water from the boiler has a temperature of 100 to 115 degree Celsius. This heat is transferred to the feed water by using shell and tube heat exchanger. In this project an attempt has been made to utilize the waste heat by a heat exchanger. By considering these design parameters namely outlet temperature of blow down, Inlet temperature of feed water, Mass flow rate of water, the shell and heat exchanger designed. Finally, the potential savings are presented by implement the newly designed heat exchanger. In heat exchanger, the cold water flows over the tube and the hot water flows inside the tube. In turns there is a scope for reduction in fuel consumption.

  112. Implementation of Value Stream Mapping for Redraw Machine in Pump IndustryDownload Article

    Mr.A.Karthy, D.Navaneetha krishnan, R.S.Navin, E.Panneerselvam, A.Tamilvanan

    Abstract

    close

    This paper deals the methods and techniques of lean concept used to reduce the time and make the production flow smooth. The lean tool and the 5S technique is applied in manufacturing plant. The problem in the manufacturing plant has lack of standardization during the machine setup, improper scheduling, irregular arrangements of components etc..,To reduce these problems the Value Stream Mapping tool isapplied to identified the waste in terms of non value added activities. Current state map is prepared to give detail about the existing position and identify various problem areas. Future state map is made to show the implementation action plan.

  113. An Experimental Investigation of Aluminium Alloy 8011 using Abrasive Water-Jet MachiningDownload Article

    M.Easwaramoorthi, C.E.Mohankumar, K.Mohanraj, M.Munusamy, S.P.Ramachandran

    Abstract

    close

    Abrasive water jet machining process is one among the non- conventional machining processes and extensively used to manufacture aerospace components. An attempt is made in this project to measure the material removal rate (MRR) and surface roughness of aluminum alloy 8011keeping work piece at different angles by abrasive water jet machining. The effect of the process parameters like water pressure, abrasive flow rate and standoff distance on material removal rate is investigated for different jet pressures. Index words – MRR, Surface Roughness, Abrasive water jet machining, Garnet abrasive.

  114. Productivity Improvement in Polypropylene Bag Manufacturing Using Value Stream MappingDownload Article

    Mr.S.Balakrishnan, K.Mohanraj, K.S Naveen, G.Pethanan, M.Rajaram

    Abstract

    close

    The project explains the scope of implementing lean practices in polypropylene bag manufacturing activities with an aim to eliminate wastes and to improve the productivity with the help of VSM. A value stream includes all the operations and processes to transform raw materials into finished goods or services, including non-value added activities. Using current state map we can find the non value added activities and we can provide solution to eliminate such non value added activities and improve productivity. Using current state map we can identify the non value added activity in stitching section. We apply some techniques to reduce the manual effort and improve the production rate.

  115. Experimental and Theoretical Analysis of Radiation in Industrial Radiography (IR-192) using Tenth and Half Value Layer Thickness in Concrete and SteelDownload Article

    M. Manikandan, V.Naveen Kumar

    Abstract

    close

    Radiography is used in wide range of application including medicine, engineering, forensic, security, etc. In NDT, radiography is one of the most wide used fields. Radiography Testing Method (RT) provides serious no. of advantages were used to find hidden flaws by the ability of short wavelength to penetrate materials. The Intensity of radiation is either captured by Film Radiography or in Real time Radiography. The radioactive sources Ir-192, Co-60 or in rare use of Cs-137. For Safety Shielding Concrete and Steel and Lead is used to reduce the intensity of radiation and Exposure to the Radiographer. The concept of Tenth and Half value layer thickness is widely used in shielding. In thisstudy, Experimental Reading is compared with Theoretical one using TVL and HVL thickness is calculated for steel and concrete. In which Radiation is used, were determined from measurements, using collimated beam of gamma rays from an Iridium-192.

  116. Increasing The Efficiency Of The Heat Exchanger Using Aluminium Alloy 7075Download Article

    Mr.B.Sakthivel, S.Gowthaman, M.Karthik, K.Karthikraja, R.Vikkas

    Abstract

    close

    In present day fin and tube heat exchanger is the most common type heat exchanger widely use in sugar cane industry and other large chemical process. The process in solving simulation consists of modeling and meshing the basic geometry of fin and tube heat exchanger using CFD package in SOLID WORKS 14.0. The aim of the project is design of fin and tube heat exchanger with varying materials. The heat exchanger has 74 tubes,1300 mm length and diameter 45 mm. In simulation will expression how the heat varies in fin and tube with respect to material changes This results in a significant increase in heat transfer coefficient per unit area in the heat exchanger.

  117. Experimental Investigation of Pocket Milling on Aluminium 8011 using Abrasive Water-Jet MachiningDownload Article

    K.Ganesan, N.Sowndher, P.Vignesh, M.Arul, N.Gokul

    Abstract

    close

    Abrasive water jet machining is the most popular method in unconventional machining process. In current research in abrasive water jet machining(AWJM) process is focused on milling applications. In our experiments were carried out on Aluminium 8011 for the AWJM process for producing 3D features such as pockets of size 20mm x 10mm an input variables such as Water Jet Pressure(P), Abrasive Flow Rate(AFR), Step over, Traverse Speed(TS),Stand of Distance(SOD) as 2 mm, Orifice diameter as 0.35 mm and abrasive size 80# mesh and obtained output parameters like Material removal rate (MRR), Depth of cut (DOC) and Surface roughness (Ra). The results have known that the fixture angles and water jet pressure is affected the output parameters DOC, MRR and Ra.

  118. Performance Analysis of PEM Fuel Cell by Varying Flow Channel Design and Operating ParametersDownload Article

    Dr.M.Easwaramoorthi, J.Dinesh

    Abstract

    close

    The Proton Exchange Membrane (PEM) fuel cell performance is depending on many parameters like material properties, design parameters, operating parameters. The PEM fuel cell with serpentine flow field has been modeled using Solidworks software and analyzed using ANSYS 15.0 software. This PEM fuel cell is numerically analyzed for three different temperatures to study its effects on the performance. From the analysis, the optimum operating temperature of the PEM fuel cell has been found. PEM fuel cells are promising power generation sources for mobile and stationary applications. However, there are several technical problems to be solved in order to achieve practicability and popularization. Especially, water management inside a PEM fuel cell is essential for high performance operation. “Water flooding” and “Dry out” is a critical barrier for high efficiency and high power density. To alleviate these issues, it is necessary to analysis the Proton Exchange Membrane Fuel Cell for different gas flow parameters and serpentine, spiral model is chosen with the area of 25 cm2 by varying the temperature, pressure and various bend angles are analyses and the optimum temperature and pressure are chosen and compared with experimental validation and their performance are evaluated.

  119. Power Generation in Automobiles by using Regenerative Clutch with DynamoDownload Article

    Praveenkumar.S, Arun.A, Bharanitharan.VY, Jayanthan.P, Kavin.KS

    Abstract

    close

    The objective of this paper is to store the kinetic energy dissipated in the brakes to accelerate the vehicle. This project is based on prototype model of Regenerative braking system using electromagnetic clutch. The energy output is to be increased that was found in the result of the regenerative braking. While moving the vehicle the work done of the engine efficiency getting reduced, so some amount of propulsion is neeed to pull the vehicle. The energy storage unit must be compact, durable and capable of handling high power levels efficiently. The drive can be nonstop on condition that to dynamo itself to produce current and will be presented on the Ammeter installed in the set up. This set up also consists of an Infrared Sensor which helps to prevent the frequency of accidents increasing due to inefficient braking system and therefore can be considerably avoided using IR sensors. The vehicle instantly stops as any object appears in front of it where IR Sensors are installed.

  120. Supply Chain Management in Foundry and Machine ShopDownload Article

    N.Senniangiri, C.Earnest Kirubakaran, S.Karthikeyan,L. Kavi Bharathi,G.Kavin Kumar

    Abstract

    close

    In a Manufacturing Industry, the management of flow of goods and services, ie the transportation and storage of the raw materials, of work-in-process inventory, and of finished goods from original point to the point of consumption is called the Supply Cain Management (SCM). The Proper management in supply chain is mandatory for a mass production unit, So that the unwanted chaos within the processes can be neglected. This project is the implementation of the SCM as a Tool of Total Quality Management. In an industry there may be delays in production and delivery due to poor mode of transportation, improper storage facility and unplanned layout in locating the machineries. Hence implementing the various techniques and concepts on supply chain management such asmodification of the plant’s layout, 3C concept, advanced transportation systems for working materials can provide a constant and continuous flow of materials. This may lead to continuous production. Hereby, the benefits like increased production rate, elimination of delays due to various factors and the reduced time consumption for machining processes. And also the SCM provide a perfect guideline to the flow of work materials. And this project deals with the SCM as a tool of Total Quality Management.

  121. Fabrication of Desiccant Assisted Cooling systemDownload Article

    K. Ganesan, M. Hariharan, R.Dinesh kumar, V. Tony, S.S. Dhamotharan

    Abstract

    close

    Solid desiccant cooling (SDC) system is an alternative air conditioning system. Desiccant plays a vital role in overall performance of the whole system particularly in dehumidification and regeneration capacity. By this review we recapitulate that novel solid desiccant materials like zeolites, silica can be adopted in the SDC system. In order to resolve environmental and economic issues with the present space cooling system, the implementation of the SDC system will be the better answer to the problem. The Aim of the proposed system is to develop drying technology reduce the moisture content in air provider cooling in space and produce a good quality cold air. Zeolites are used as moisture adsorbents. When this system is build up we can achieve EEE i.e. Environmental friendly, good Energy efficiency low power consumption and more Economic cooling system. This system is used for industrial prevention fungus control and reduces many health affects like asthma.

  122. Design of Shaft Straightener withTravelling ramDownload Article

    Mr.Balakumaran M, Karthik K, Praveen M, Vengatesh M,Harish Kumar S

    Abstract

    close

    This paper deals with improvements in shaft straighteners .It is particularly for straightening the shafts used in the submersible pumps which become bent in service. It has been found that the shafts of submersible pumps become bent from various causes and however the shafts being bent from end to end. The method used before for correcting this condition usually involved hydraulic press, in that deflection is measured separately by using dial gauge and removed separately by using hydraulic press. Such a method however is objectionable as it is not only slow and laborious but also produces uncertain results. The present method of removing the deflection from a shafts by using experimental set up consists of hydraulic jack, travelling ram with bearings and dial gauge are being placed over the bed with guide rail. This method is most suitable and needs less time for removing the bends in the shafts.

  123. Overview of Aluminium Metal Matrix Composites Reinforced with Bore Sand ParticlesDownload Article

    G.Kannan,JerinSaji ,Govindaraj.R

    Abstract

    close

    In this investigation, Aluminium Metal Matrix Composite was prepared by reinforcing discarded waste particles like wet grinder stone dust particles and waste tonner, reinforced with bore sand. Bore sand a waste material obtained while digging bore well. We are using this bore sand for the reinforcing with aluminium. Since the bore sand is waste during the bore well making process, we take this bore sand for reusing it. We take bore sand and tested the wear behaviour, hardness and did the microstructure analysis. The project mainly aims at the reusing of bore sand which a waste material is obtained while digging bore wells.

  124. Optimum welding process parameters investigation for mechanical properties of mild steel welded by GMAWDownload Article

    S.Gejendhiran, R.Titus, S.Subash Arunkumar, P.Arunkumar, B.Subash

    Abstract

    close

    Gas Metal Arc Welding (GMAW) process is the most widely used welding process for structural fabrication industries, owing to its high productivity and ease. This research investigates on the optimum welding process parameters for achieving better mechanical properties of weldment. In order to meet the requirement in terms of both welding efficiency and effectiveness, the Taguchi parametric design methodology and regression analysis is used. Weld Process parameters considered for this research are welding current, welding voltage, shielding gas. The process output characteristics are ultimate tensile strength, hardness and toughness of the weldment. After collection of data from the experimental work, signal to noise ratio were calculated and the optimum level of every process parameters was obtained by using Taguchi method. Subsequently by using the analysis of variance, the significant co-efficient for each input factor on the mechanical properties was determined and regression analysis is carried out for predicting the mechanical properties.In this research, the mechanical properties were obtained by welding of 10 mm Mild Steel IS 2062 thick plates in Gas Metal Arc Welding using Ar+18% CO2, pure CO2 and Ar+5% O2 as the shielding gas mixtures. The optimum tensile strength was achieved in the shielding gas mixture Ar+18% CO2 and also it provides the optimum toughness value. Pure CO2 gives the superior hardness values when compared to other shielding gas compositions. The numerical results reveal that the shielding gas and welding current have significant effect on the mechanical properties of weldment.

  125. Heat Recovery from the Boiler Start Up Vent SteamDownload Article

    M.A.Omprakas, M. Kavin , V. Pavithran, A. K. Pradheep Raj , M. Ramajayam

    Abstract

    close

    This project deals Maximizing energy efficiency is an overriding priority in many sectors, no less so in the pulp and paper industry. In many cases, energy managers have exhausted conventional heat recovery measures making further efficiency gains more challenging to identify and implement within the mandated return on investment. A study was conducted and a proposed is given for using the Boiler vent steam by introduce a Pressure Reducing and DE super heating station (PRDS) in Tamil nadu newsprint and papers Limited at karur. Waste heat recovered from the exhaust steam was used to Process plant and also reduction in greenhouse gas and other emissions. So that we have designed a PRDS station to recover the Boiler vent from all the boilers running in TNPL. Due to the developing innovation we have researched new ideas and design in order to survive in this world. With an average heat recovery rate of the project delivers significant energy cost savings as well as the added benefit of an 85% reduction of heat addition into the atmosphere. In future this setup can be implemented the system as an actual functioning of the heat recovery system.

  126. Design of Induction Heating System for Rectification of Angular Welding DistortionDownload Article

    K.Pradeep Kumar, S.Mahendran, M.Pradeep, N.Shameer Ahamed, P.Vignesh

    Abstract

    close

    Angular distortion is the one of most challengeable distortion. Various methods are currently being used to control and decreases angular welding distortions because during and after welding is an important aspect of construction and quality. These experimental results have ability to reduce the angular distortion for 8 mm and 10mm thick AH36 steel plate and effectively. In this affects encountered in the use of thin plate ability to decrease distortion within greatest bending occurs. In this application, have been evaluated and its benefits in reducing the rework time have been established. This system models have used as a tool to decide the optimum speeds to decrease the resulting distortion of steel plate after being subjected to the both welding and induction heating processes.

  127. Evaluation and Implementation of Lean Manufacturing in Steering Knuckle Production LineDownload Article

    K.Pradeep Kumar, T.Vimal, R.Arvinth, C.Kannan, A.Sadham Hussian

    Abstract

    close

    To enhance the productivity and quality of products many firms are practicing the lean manufacturing concepts. Value Stream Mapping (VSM) is one of the lean tools to visualize the hidden waste and its sources. This paper describes the lead time reduction of steering knuckles. On observing the present system of steering knuckle production, the current lead time was calculated and found to be 19.44 minutes for producing one component simultaneously in CNC machines and their current production rate is 500 components per shift against the customer demand of 535 components per shift. A VSM is drawn to find out the value and non-value added activities involved in current production floor. Then, a Future Value Stream Map is developed to design a lean process flow through process improvements. This project uses the VSM technique thereby helps the management to reduce the production lead time of steering knuckle and to fulfill the customer demands.

  128. Evaluation and implementation of lean manufacturing in assembly sectionDownload Article

    M. Mohamed Ajmal Mahasin, S.Vijay, B.Sanjeev, A.Tamilvani

    Abstract

    close

    Every industry tends to find out the efficient way of mass production system to prove its superiority. This is decided by the ability to produce huge product varieties while the cost of the production remains low. So, as in manufacturing industries, the assembly sections are to be planned in much more flexible way to achieve this. To tackle this problem, conventional manufacturing can be replaced by lean manufacturing. Lean manufacturing is a systematic approach to identify and eliminate wastes (non-value added activities) through continuous improvement by flowing the product at the pull of the customer in pursuit of perfection. This project aims to implement the lean manufacturing technique in Sakthi Auto Components Ltd., A few wastages are identified in the assembly section of their main product steering knuckle by doing onsite research. By using value stream maps the company’s wastages (non- value added activities) in assembly section such as, assembly line cycle time, motion, waiting time and defects are identified. This affects the company’s productivity, product cycle time and cost. The project aims to eliminate these wastages and reduce the cycle time, improve productivity and reduce operation cost by modifying current assembly line layout with the help of value stream maps.

  129. Efficiency improvement in refrigeration system using sub-coolerDownload Article

    Mrs.A.D.Latha, R. Kavinkumar, A.Meezan, R.Naveenkumar, B. Raghuram

    Abstract

    close

    This work investigates the thermal performance of a thermal battery used in the domestic refrigerator as a sub cooler. A Thermal Energy battery is physical structure used for the purpose of storing and releasing thermal energy. In order to run the compressor without cut-off, the charging mode is used. In the charging mode, refrigeration effect is stored in the thermal battery. In the discharging mode, the refrigeration effect is used to sub cool the refrigerant after the condensation. This study also examines the thermal performance of the sub-cooled ice storage air conditioner under different cooling loads. In the ordinary refrigerator, when the required temperature is attained, the compressor is cut-off and vice versa. During the starting of the compressor the torque needed is high, so the power consumption is high. By using this thermal battery, the compressor need nor to be cut-off and hence the power consumption is also reduced. The system will give more cooling capacity and higher COP by the contribution of the thermal battery used as a sub cooler.

  130. Performance analysis of economiser, reheater and air preheater in 210mw boiler at mtps-1Download Article

    N.SenniangiriG.Aravind,Buvaneshwaran,K.Gobinath,G.Kumaresan

    Abstract

    close

    The main objective of the project is to study and understand the working and power production methods of MTPS-1. The boiler performance including its ability to meet full load, auxiliary power consumption, net plant heat rate, availability of the unit, operation and maintenance cost. Economizer and air pre-heater improves the economy of the steam boiler. Economizer increases the steam raising capacity of a boiler i.e., it shortens the time required to covert water into steam. It prevents formation of scale in boiler water tubes. There is about an average of 18% of coal saving. Since the feed water entering the boiler is hot, therefore strains due to unequal expansion are minimized Air heater is a heat transfer surface, in which inlet air temperature is raised by transferring heat from the fuel gas. Since the air preheater can be employed successfully to reclaim heat from the fuel gas to low temperature levels, than is possible with economizer, heat rejected to chimney can be reduced to higher extend. For every 20° C drop in flue gas exit temperature the boiler efficiency increases by about 1.0%.In addition to increase boiler efficiency. Electrostatic precipitator contains 24 fields are available in each boiler to separate almost 99% of ash and delivers in dry of wet from according to the requirement of the disposal. First age chimney height is around 130 meters and the second stage is above 220 meters. The field effective analysis is made in order to improve the efficiency of electrostatic precipitator

  131. Heat recovery from recovery boiler smelt dissolving tank ventDownload Article

    Mr.B.Sakthivel, T.Ragul, V.G.Prabhu, M.Prakash

    Abstract

    close

    Waste heat recovered from the exhaust was used to preheat boiler makeup water resulting in a reduction in the consumption of steam required to heat the boiler feed water and a reduction in greenhouse gas and other emission. It is designed that the Heat Recovery System from the smelt dissolving tank vent in the recovery boiler using spray condenser and heat exchanger. Due to the developing innovation, the proposed system specifies some new ideas and design in order to survive in this world. Due to the recent advances this system has been introduced.With an average heat recovery rate of 12 GJ/h, the project delivers significant energy cost savings as well as the added benefit of an 85% reduction produced by the smelt dissolving tank vent exhaust.

  132. To increase the efficiency of the boiler by optimizing the combustionDownload Article

    Mr. M.Sugumar, P.Gokul, S.Gokul, S.Hariprabhakaran, M.Prabhu

    Abstract

    close

    Increases in fuel costs, power demands, and emissions regulations, as well as the need to reduce power generation costs, have forced the electric utility industry to improve combustion efficiency. The Smart Process Combustion Optimization solution increases boiler efficiency while maintaining emissions, decreasing loss on ignition, and reducing a number of other plant operating costs. The Combustion Optimization solution is a quick, inexpensive way to properly distribute the fuel and air supply for control of NOx and manage the fine line between reduced flame temperature and efficient combustion.

  133. Design of hydraulic braking system to control the rotation of cooling drumDownload Article

    Mr.D.Shanmugasundaram, N.C.Saravana Balan, M. Soundarajan, S.Logeshwaran, R.Nandakumar

    Abstract

    close

    A dust collecting hood for use in conjunction with a sand cooling, blending, reclaiming of other rotary drum, within the casting industry, the hood incorporates an upper and lower section, either of unitary or separate construction, the upper section including a discharge opening which cooperates with a vacuum pump to draw air through the hood, and the proximate discharge end of the rotary drum, while the lower section of the hood provides a discharge opening for removal of the mold sand from the drum, the hood, at this collection location, while further incorporating ports through which air may pass for forming the air curtain across the associated hood and drum, for removal of said fines, dust, and other deleterious particles from the ambient air.

  134. Design of cover assembly in flywheel with the aid of semi automation systemDownload Article

    R.Vinoth ,G.Murugaprakasam,T.Santhosh, R.Niranjan, M.Gokulakrishnan, T.Karthikeyan

    Abstract

    close

    A Semi automation is defined as the system of work to be performed as the part of manual and part of automation. In most of the manufacturer attempted to automate everything and remove human element with the industries, but people are found on many assembly lines. Because humans are still the programmable, efficient, skills, etc. So, we are using semi automation system on flywheel assembly. A flywheel is used to store rotational energy in engines/machines. The disc type and arm type of flywheels are used in the small sized and larger sized engines/machines, that perform defends on the operations. In our group, has been detailed view on disc type of flywheel and becomes major part used in engines. There is various working process like Geneva mechanism, photo and proximity sensors, rotary actuator, bearings and plc programme etc., that can be performed during flywheel assembly with semi automation system. There is no fully automation, because multiple variations of a product are assembled on same line and requires more amount of flexibility is difficult to achieve on it. As a result, semi automation system is simpler way to assemble flywheel.

  135. Design and optimization of a cutting parameters for composite materials in drilling processDownload Article

    Sampath Kumar M, ArunKumar.J , Balasubramani.D , Gowtham.R , Arumugam.M

    Abstract

    close

    The cutting forces generated in metal cutting have a direct contact on heat generation, surface quality of work piece and accuracy of the work piece. A milling tool dynamometer that can measure static and dynamic cutting forces has been used for optimization. The orientation of octagonal rings and strain gauge locations has been determined to maximize sensitivity and to minimize cross sensitivity. The dynamometer is connected to a data acquisition system. Cutting force signals were captured and transformed into numerical form. It is processed using a data acquisition system consisting of necessary hardware and software running on a computer. The acquired results of machining tests performed at different cutting parameters represents that the dynamometer could be used to measure cutting forces. Though the dynamometer was developed primarily for drilling operations, it can be used to measure cutting forces in all machining operations such as turning, drilling, grinding, shaping etc.

  136. Over load indicator for motor assembly based on semi automationDownload Article

    G.Kannan, V.S.Sivaprakash, R.Senthilkumar, M.Arulmurugan, K.Karventhan

    Abstract

    close

    The Object of this project is to detect the over load of the motor casing machine and indicate. It is very useful to the all motor industries in order to measure the load of the motor casing machine and also used to avoid the motor casing damage. A load cell can detect objects without physical contact. This object detected in the load cell and given to the amplifier and converting to the small amount of energy convert to the ADC analog to digital converter for measuring overload. We identify the overload through weight scale takes place bottom of the machine. A mechanical arrangement in hydraulic pressing machine the applied force being sensed deforms a strain gauge. As a result, overload indicator can prevent motor from damage by using simpler method.

  137. Design and fabrication of gravity inertial deviceDownload Article

    S.Muruganantham, S.Ganesh kumar, S.Jagatheswaran, P.Karthikeyan, D.Praveen

    Abstract

    close

    This project is indented to develop a free energy device that works on gravity. A simple mechanism with new mechanical effects represents the source of clean energy. This gravity machine has only two main parts: a massive lever and a pendulum. The interaction of the two-stage lever multiplies input energy into output energy convenient for useful work. The effect of creating the free energy is defined in this study as the difference between the energy which is the machine transfers to the user system by the lever and the energy which is input from the environment in order to maintain the oscillation of the pendulum. Appearance of the free energy is not in accordance with the energy conservation law. The effect of creating the free energy results from the difference between the work of the orbital d damping forces of the lever and the work of the radial damping force of the pendulum motion. This effect enables increase of the input energy.

  138. Design and analysis of weightless bullet proof jacketDownload Article

    S.Eswaran, P.Sasitharan, A.Soundhar, R.Kavibharathi, R.T.PrabhuKumaran

    Abstract

    close

    Bullet proof jacket is protection equipment, such as a bullet proof vest is a soldier’s most important means of preserving life and health. The main aim of our project is to reduce the weight of the bullet proof jacket and improve the quality of a jacket. Our bullet proof jacket is looks like a normal bullet proof jacket but it was made some additional work for improve a weight reduction work in it. Bullet proof jacket must be a polymer coting in used for reduce the bullet force.

  139. Improvement of overall equipment effectiveness in cnc machine Download Article

    Mrs.Latha.A.D, Kalaiyappan.S, Kanagaraj.M, Karthick.P, Karthik.S

    Abstract

    close

    In an era of global manufacturing, a company must flexible to change its strategies when new markets are explored and when demand changes frequently. With the intense in market completion, manufacturing companies are accepting the customer orders even for small batch sizes. In order to achieve the target for varying customer needs with small batch quantities, it is becoming a great challenge to get optimal utilisation of the resources available within the company. In a job shop though the resources seem to be utilized completely within the available time, there are huge losses in terms of time which affect the overall productivity of the resources. The purpose of the project is to identify these losses by measuring the OEE in a job shop & improve the productivity time by using lean techniques such as SMED, TQM & 5S.

  140. Implementation of automation technology in ink jet printing machine using 5m methodologyDownload Article

    M. Shanmugam, N. Ananth, M. Jagadeeswaran, S. Arun Kumar, P. Pradeep

    Abstract

    close

    The advancement in technology has presented many modifications in ink jet printers and its method to print. The emerging technologies through the implementation of highly advanced printers consumes more energy, for this a new idea of spring mechanisms are to be promoted. The spring used in this mechanism is to be designed which includes properties like stiffness, deformation, stress, elasticity of the spring, time calculation and productivity. Digital models are used to analyze the existing method used for automation and to promote a new method for better management and improvement. Then this mechanism is analyzed and tested in popular horn manufacturing units, label printing machine with the help of 5M methodology. We compare our new spring technique with simulations software like solidworks, Ansys workbench and use the results to determine the practical range of validity of our analytical model.

  141. Improving the Performance of a Refrigeration System by Utilizing Waste Heat from CondenserDownload Article

    M. BalaKumaran, T.Sivasubramaniyan, T.Santhosh, C.Sudharsan, V.Sudharsan

    Abstract

    close

    To review the energy saving associated with the improved utilization of waste heat from domestic refrigerator. Domestic refrigerator may be an operating continuously to maintain the proper food storage condition. The continuous operation of the equipment account more in electrical energy consumption. So it is that a significant and concrete effort should be made for the conserving energy through waste heat recovery. A significant amount of the waste heat was rejected by the condensers of the refrigerator. So an attempt has been made to utilize the waste heat from an condenser of the refrigerator. Practical use of waste heat from the domestic refrigeratorsare the typically to space heating and water heating in the minimum constructional maintenance and running cost. A cabin was installed in a domestic refrigerator with the condenser coils of refrigerator serving as heating coils inside the cabin. Known quantity of the water was heated by the condenser in coils due to convection currents thereby increasing the overall Copof the refrigerator. Besides, the refrigerator may be used as a conventional refrigerator by keeping the cabin of the door open in case of the absence of heat sink.

  142. Design modification & analysis of two wheeler engine cooling fins and fabrication by using 3d printingDownload Article

    Velliyangiri.B, Shanmugasundram.M, Tharanitharan.S,Vadivelmurugan.R,Vengadesh.P

    Abstract

    close

    In the current world, I.C Engine has become the main prime mover, because of its availability and high power capability, but certain modification and innovation can save a lot of fuel and give high efficiency. Engine life and effectiveness can be improved with effective cooling. The heat transfer rate depends upon the fin geometry, fin thickness, air velocity. Insufficient removal of heat from the engine will lead to high thermal stresses and lower engine efficiency. The cooling fins allow the air to move the heat away from the engine. Low rate of heat transfer is the main problem of air cooling system. In this paper an attempt is made to simulate the heat transfer using CFD for different shape and geometry of Fins to analyze effects on rate of heat dissipation from fins surfaces. The geometry of engine fins are modeled in SOLIDWORKS and simulated in ANSYS CFD software.

  143. Design and Fabrication of Helmet using 3D Printing Technology by Considering Various ParametersDownload Article

    M.Shanmugam, V.Siranjeevi, S.Susindhar, E.Varun Kumar, K.Vishnu

    Abstract

    close

    3D printing is a form of additive manufacturing technology where a three dimensional object is created by laying down successive layers of material. It is also known as rapid prototyping. This is a mechanized method whereby 3D objects are quickly made on a reasonably sized machine connected to a computer containing blueprints for the object. The 3D printing concept of custom manufacturing is exciting to nearly everyone. This revolutionary method for creating 3D models with the use of inkjet technology saves time and cost by eliminating the need to design; print and glue together separate model parts. Now, you can create a complete model in a single process using 3D printing. Subsequently, the aim of this study was to assess the two wheeler driver safety helmet and to aid redesigning the improvements on the safety helmet based on several designing techniques of industrial engineering. Further designing of the improvements made on the safety helmet was carried out using the catia and solid works where else a 3D printer was used to print out the helmet.

  144. Performance, emission and combustion analysis on bio diesel mixture with diesel as an alternative fuel for ci engineDownload Article

    Mr.Sundaraeswaran.S.P, Karthik Sankar.D, Jeevanandham.K, Inbarasu.S, Kavin.B

    Abstract

    close

    This paper presents the performance and emission contours of a Bio diesel mixture with diesel fuelled compression ignition (CI) engine. The Researches regarding blend of diesel and many bio diesel has been done already with dual mixture, very few works have been done with the combination of five different bio diesel blends with diesel and left lot scope in this area. The present study bring out an experimental of five bio diesel from sesame oil, Neem oil, Groundnut oil, coconut oil and sunflower oil and they are blended with diesel at various mixing ratio. The effect of five bio diesel works in engine and exhaust emission were examined in a single cylinder, direct injection, air cooled and high speed diesel engine at various engine loads with constant engine speed of 1500 rpm. Among the blend 30% of bio diesel mixture shows good performance on par with diesel fuel operation with respect to brake thermal efficiency and heat releases rate at full load. The brake thermal efficiency of blend A was found higher than diesel. The emission of smoke, Hydrocarbon and nitrogen oxide of five bio diesel blend were lower than that of diesel and the exhaust gas temperature for five bio diesel blend was lower than diesel

  145. Design of Scrap Compressing MachineDownload Article

    Mr.Chandramohan.V, Samjoseph.R, Sasipriyan.N, Suresh.S, Vishnu.P

    Abstract

    close

    Our project aim is to achieve the criteria of proper disposal of scrap considering safety of the labors as a main point with Low Cost Automation, In which involvement of worker for the disposal of precarious scraps are highly minimized for their safety and to achieve different techniques like 5S, kaizen etc. is very difficult to dispose these scraps by human workers even though they work with any protective devices like gloves. For example scraps from sheet metal processes, punching operations are very harmful that they could cut workers hand and other part of the body by their sharp edges. Manual operations of these presses give fatigue to operator, since he has to exert physical energy. So there is no manual involvement for the scrap disposal. The press setup mainly uses the hydraulic power system because hydraulic systems can provide large amount of power and very precise movement and the setup also uses the pneumatic system. Any type of scrap can be made into cubes by bailing them using this press setup some limitation like cast iron scrap can’t be able to bill irrespective of any amount large load applied to bail it.

  146. Design and Fabrication of Fabric Folding MachineDownload Article

    Mr. M.Sugumar, A. Abdul Rahiman, R. Deepak, M.Harishkumar, T. Subramani

    Abstract

    close

    Control of the machine carriage at a steady speed is crucial when one wants to advance the state-of-the-art with higher productivity and efficiency for fabric folding machine systems. Three steps are necessary. First, a good design-based model of the plant needs to be developed. Second, a good, realizable actuator, sensor, and controller must exist. Third, the system output should be modified using knowledge of the system’s dynamic response. This project presents a complete control strategy for a fabric folding machine system. In Part I, we illustrate the system’s mathematical modeling, dynamic analysis, linearization, and controller design. A very realizable actuator and sensor, which uses a motor and an encoder, are applied to design the control system. The computer simulation results for linear and nonlinear system models indicate that the system’s steady-state errors for this designed controller can be eliminated and that a good tracking property can be achieved as well.

  147. Implementation of Proximity Sensor in CNC Machine for Mass ProductionDownload Article

    M Manikandan, A Subash, C Suresh, S Vignesh

    Abstract

    close

    In the recent times, each and every manufacturing company has upgraded its machines to automated ways to increase the productivity and quality of products. As a development, the lathe machines are replaced by CNC machines, which uses the computer numerical codes to perform the desired operation. In those CNC machines, particularly the machine that performs drilling operation must be upgraded to next level to ensure the safety and increase the product's standard. This project deals with such an aim to upgrade the CNC machine with hydraulic clamping that has been in practice in the renowned industry. The various problems arising in the drilling operations such as part rejection, tool breakage and part holding mechanisms are examined accurately with the proximity sensors, which is connected to a PLC circuit, which helps to make the operation automated. That this project deals with every problems in drilling operation and helps to neglect them and also to ensure the safety of the tool and the labour.

  148. Modeling and performance investigation of axial flow type propeller fanDownload Article

    Praveenkumar.S, Ragavan.G, Rithick.R.S, Sridhar.V, Sudalaisuresh.M

    Abstract

    close

    The current work agreements with axial flow fans that are mainly used for as extended as the mandatory airflow for heat and mass transfer courses popular the various industrial challenge and developments. It canister be recycled for freezing, aeration or for drying drives. These comprise cooling barbicans for air-conditioning and freshening, humidifiers in textile mills, air heat exchangers for several chemical processes, ventilation and exhaust as in removal business. In observation of all these application several efforts in the past need existed done to evaluate the performance of axial flow parties. In the existing work computational analysis of axial flow backer with Accelerative and Reversing Tilted blade profile carried out using ANSYS CFX software and the outcomes are linked with the untried results from poetry. The CFD examination is far-reaching by showing the axial fan in SOLIDWORKS 2013 and using Regular k-є model with the Normal wall purpose for showing turbulence. The search is carried out with blade stagger angle of 600 and 800, and at 1500rpm. The aim is to study fan with these two types of side view and equate the static pressure, flow rate, Velocity and weight feature shaped by fan. After resounding out computational autopsy it is found that computational results holds good treaty with the trial grades taken from the poetry.

  149. Mechanical behaviour of natural fibers composites from Sansevieria cylindrica and sisal fibersDownload Article

    Mr. Y.Dinesh, Govindaraj.M, Nithiyanandan.R, Prakash.E, Suresh.T

    Abstract

    close

    The natural fibers as used reinforcement in polymeric composites for technical applications have been a research subject of scientists during the last decade. In this paper discussed with sisal and sansevieria cylindrical andsisal fiber composite materials .They are used different type of natural fiber are taken from plant, animal, and mineral sours such as , jute, KENAF, hemp, ramie, seial, coconut, and cotton. This fiber are mixed with the reinforcement natural composite materials are epoxy-resin and epoxy-hardener material. The find out the experimental investigations and mechanical properties of the natural fiber .The synthetic fibers replace with natural fiber in automotive and industrial applications. To find the various strength of tensile, compression and hardness and also compared with jute and hop fiber.

  150. The effects of machining parameters during face milling of d2 hardened steelDownload Article

    S.Kishore, Dr.Turnad Lenggo Ginta, Dr.M. Easwaramoorthi

    Abstract

    close

    The report is going to discuss the experimental investigation of the parameters that effects the D2 Hardened steel during the Face Milling process. The parameters that are going to be discussed here are the Speed, Feed rate and Depth of Cut. In addition, Surface Roughness and Chips Morphology is also going to be studied and discussed in this report. D2 steels are particularly used in long run applications such as the forming dies or thread rolling dies so it becomes essential to study and optimise the parameters that are included in the Face Milling process. The properties of D2 steel is also been taken into concern before the machining process. The main focus of the modern machining industries are on achievement of high quality in terms of the Surface Roughness and to reduce the irregularities on the surface of the material. The Research problem is to find the optimum combination of the drilling variables in order to get the desired shape and surface. The Graphs are plotted from the derived experimental values of surface roughness after each trials. The optimization study has been successfully completed upon its objectives, where the main parameters that affect the mechanical properties of Face Milling operation were identified among the parameters chosen.

  151. Utilization of waste heat from condensate water by heat exchanger Download Article

    Mr.S.Balakrishnan, A.Chriswin Jones, N.Dileep Kumar, S.Kadhar Ibrahim, S.Prabhu

    Abstract

    close

    In present scenario, the energy crisis is the major problem faced by all the industries. The Cogeneration plant has two multi fuel boiler produces 170 Tonnes per hour of steam at a pressure of 86 kg/sq.cm at a temperature of 510˚C. The steam is used to produce electric power and the exhaust steam is being supplied to sugar plant to boil the sugarcane milk. The return condensate from sugar plant has temperature of 85˚C. It is being cooled by spray pond. In this project, the forced draught air is preheated by flue gas in air preheater. The preheated air is sent to boiler. In this project an attempt has been made to utilize the waste heat by a cross flow heat exchanger. By considering these design parameters namely outlet temperature of condensate, Inlet temperature of air, Mass flow rate of water & air. Finally, the potential savings are presented by implement the newly designed cross flow heat exchanger. In cross flow heat exchanger, the hot water flows inside the tube and the air flows over the tube. In turns there is a scope for reduction in fuel consumption.

  152. Wear testing on heat treated al6061 with reinforcementsDownload Article

    G.Gunalan, S.Mohit ,S.Dhatchinamoorthy, G.Karthik, N.Vinoth

    Abstract

    close

    Aluminium Metal matrix composites are gaining wide spread popularity in several technological fields and are finding extensive commercial applications in several sectors such as aerospace, space, automotive and structural applications. The development of aluminium metal matrix composites with discontinuous reinforcement represents a well-established method for improving the strength and stiffness of a material. Al 6061 alloy based composite is age-harden able and can be strengthened through heat treatment. The present work is aimed at investigating the wear behavior of heat treated Al 6061 hybrid metal matrix composites. Tungsten carbide (WC) and graphite particles have been used as the reinforcements. Composites have been fabricated by stir casting method. The quenched samples are then subjected to artificial ageing for durations of 2 hr at a temperature of 440K. Wear studies were performed using a pin-on-disc apparatus. Investigations show that heat treatment had a profound influence on the wear behavior of both the matrix alloy and its composites.

  153. Power generation by using magnetic repulsionDownload Article

    A.Kamalakkannan, A.Manimaran, G.Manikandan, M.Hariharan, M.Vignesh

    Abstract

    close

    The aim of our project is to generate current easily by using magnets. Our project is working by the repulsion of magnet. Fixing the magnet in the blades of a fan in same poles. By fixing the same pole of a magnet above the magnet which is fixed in the fan blades, repulsion force is created and then fan is rotating, by using generator with the gear setup we get more generation of current. The main advantage of this product is no need of man power to run. To control the magnetic attraction in outer side of our product insulation material is used.

  154. Experimental study of vibration exposure of tractor occupant subjected to whole body vibrationDownload Article

    S. Karthik Niranjan, Anish Prajivin N, Mubarak J, E.K. Srivishnu, R. Sathish Kumar, S. Syath Abuthakeer

    Abstract

    close

    Exposure to vibrations has become an indispensible part of daily life for the human beings. The daily commute of humans makes them prone to the vibrations experienced in the buses, trains, trucks and other heavy vehicles. Being continuously exposed to vibrations in one form or the other could cause a variety of health issues. Human vibrations can be pleasant or unpleasant depending on the situation where the exposure is observed. Health issues associated with the vibrations could be discomfort, fatigue and a number of physical and nervous disorders (low back pain as well as long term health degradation) due to regular and long-term vibration exposure. Degeneration of the lumbar spine with long-term exposure to whole-body vibration is also observed. The exposure of human body to the vibrations exceeding a certain limit that is given by the International Standard Organisation (ISO) for the prescribed duration may be hazardous to the health of the human body. The measurements of whole body vibration are commonly expressed in terms of the frequency weighted acceleration (measured on the vibrating surface which is in contact with the body) and is measured with the help of a Seat Pad Accelerometer. In the present study, the human response to the whole body vibration generated by tractors is studied by performing experiments under different road profiles and results are used to check with the standards set by the ISO to show whether the vibration exposure is within the safe limit or not.

  155. Experimental investigation on human hand arm vibration in a jack hammer operator – sand floorDownload Article

    S. SyathAbuthakeer, T. Pavithran, M.S.E. Vigneshraj, S. Vimalkumar

    Abstract

    close

    Labour forces are subjected to more intensive work conditions in India. It is necessary to determine the safe levels of harshness a human body should be exposed to. This paper focuses on human hand-arm vibration. An experimental investigation is made on Sand hammering workers by measuring the vibration transmission into their body. The measured values are compared with ISO 5349-1:2001 standards. The vibration levels are considerably high and risky. This encourages the use of alternative design for jackhammers.

  156. A review on the performance analysis of boilerDownload Article

    Venkateshan.T, Baladharunraj.B, Dhilipkumar.G, Karthik.E, Kavin.K

    Abstract

    close

    One of the most important components of the Power plant is the Boiler. The Boiler performance evaluation is necessary to find out variation of boiler efficiency related to its various operating parameters. Hence, it is necessary to do the performance analysis of boilers. When the production of steam is most important to the thermal efficiency, the efficiencies of the boilers are low. Nowadays, many of the boilers have efficiencies that are less than 60%. If the potential energy will improve, we get the more profits and cost savings. This paper presents the performance analysis of boilers for increasing the thermal efficiency of the boiler by means of reduction of losses.

  157. Thermal-stress analysis and gearbox testing of spur gear tooth with relief holesDownload Article

    Pradeep Kumar.M, Naveenkumar.M, Gunasekaran.D, Dr. Murali Manohar.R

    Abstract

    close

    This paper describes my attempt to investigate the effect of relief features of different size, location and number through stress and thermal analysis. The study is made through ANSYS using the finite element analysis (FEA) and Lewis Bending equation for calculation of forces involved in gear tooth. The result obtained from ANSYS is compared with the theoretical value of Lewis bending stress for the accuracy of the FEA model. Relief features are tried out with different positions and sizes in the involute spur gear tooth. Readings from ANSYS are tabulated and graphs are plotted. Comparison of graphs from stress and thermal analysis are then done to obtain the optimized result. The optimized position and size of the relief features for pinion is to be determined and its effects on stress and temperature distribution are tested in gearbox test rig.

  158. Design and fabrication of burr collector to increase the rotor’s lifeDownload Article

    V.Chandramohan, M.Arsathabdulla, S.Vengatesh, K.P.Arulraj, K.E.Srithar

    Abstract

    close

    The main aim of this project is to remove the dust materials in the rotor used in the machines like CNC’s turning centre and Lathe machines. By removing dust Particles in this area helps to reduce the damage of rotor during running and machining process. This will results in the improving the efficiency of the system by using storage tanks to collect the dust materials.

  159. Emission characteristics of variable injection pressure engine with pungai oil and ethanol as a additiveDownload Article

    Murthi M.K, Dr.Nithiyanandam. S Selvapathy.M, Venkatesh.S, Sathish manikandan.M, Dharmaraj.D

    Abstract

    close

    Biodiesel is a well recognized choice for diesel and has an benefit over the later because of it is renewable, biodegradable, sulphur free and non-less poisonous in nature, better lubricity and can considerably reduce exhaust emissions from the engine. This study investigates the use of ethanol as an additive with 20% pungai oil diesel blend (B20). The transesterification process is used to reduce the viscosity of the pungai oil. The main aim of this paper is to examine the emission parameters of variable injection pressure diesel engine runes with pungai oil 20% (B20) and ethanol as a additive by adding 5% and 10% at steady speed of 1500 rpm with variable loads and changeable injection pressure (180,210&240). The outcomes of these blends are to be compared with normal diesel. The fitness of pungai oil with ethanol is established as a bio fuel in this study. The impact of pressure injection on exhaust gas emissions has been investigated and offered. The exhaust emissions Hydrocarbons, Carbon monoxide and carbon dioxide are are almost reduced compared to diesel. Brake power, indicated power, brake thermal efficiency, mechanical efficiency, mechanical efficiency, brake mean effective pressure, are investigated on performance characteristics.

  160. Emission characteristics of variable injection pressure engine with pungai oil and diethyl ether as an additiveDownload Article

    Mr.Murthi M.K,Dr.Nithiyanandam.S Tamilarasu.M, Velusamy.S, Vijayakumar.M, Vinoth.D

    Abstract

    close

    Biodiesel is a well recognized choice for diesel and has an benefit over the later because of it is renewable, biodegradable, sulphur free and non-less poisonous in nature, better lubricity and can considerably reduce exhaust emissions from the engine. This study investigates the use of diethyl ether as an additive with 20% pungai oil diesel blend (B20). The transesterification process is used to reduce the viscosity of the pungai oil. The main aim of this paper is to examine the emission parameters of variable injection pressure diesel engine runes with pungai oil 20% (B20) and diethyl ether as a additive by adding 5% and 10% at steady speed of 1500 rpm with variable loads and changeable injection pressure (180,210&240). The outcomes of these blends are to be compared with normal diesel. The fitness of pungai oil with diethyl ether is established as a bio fuel in this study. The impact of pressure injection on exhaust gas emissions has been investigated and offered. The exhaust emissions Hydrocarbons, Carbon monoxide,carbon dioxide and Nitrous oxide are are almost reduced compared to diesel.

  161. Design of desiccant wheel dehumidification by compressed airDownload Article

    Mr.M. Sengottaiyan, M. Jeeva, A. Imraan, P. Kasiraj, R. Dhanasekaran

    Abstract

    close

    The design has been made on a solid desiccant wheel for cooling system. As this entire study portrays application of desiccant wheel technology dehumidification by compressor for the refrigeration system. The design of desiccant wheel for the refrigeration system is executed using the software called CATIA (Computer Aided Three Interactive Applications) . By using this desiccant wheel coupled with the refrigeration will increase the cooling effect of the system. In this system Zeolite is used as a absorption element in the desiccant wheel, which will absorb the moisture content from the air. The present refrigeration system consumes high power consumption, but this refrigeration coupled with the desiccant wheel technology will improve the cooling effect and reduce the power consumption. The material used in the desiccant wheel will have a hygroscopic property i.e, the material is zeolite. The solid desiccant wheel use dual column, packed-bed dehumidifier, i.e, the most appropriate dehumidifier configuration for air-conditioning application is rotary wheel. A range of materials are commonly used to remove moisture from a confined space or from an air stream. These are commonly known as desiccants.

  162. Condition monitoring by vibration analysis of rotary equipmentsDownload Article

    Mr.R.Arjunraj, P.Dinesh, M. Favaz, Stephen Jose

    Abstract

    close

    Condition monitoring of machines provide knowledge about the condition of machine. Any deterioration in machine condition can be detected and preventive measures taken at an appropriate time to avoid catastrophic failures. This is achieved by monitoring such parameter as vibration, wear debris in oil, acoustic emission etc. The changes in these parameters help in the detection of the development of faults, diagnosis of causes of problem and anticipation of failure. Maintenance/corrective actions can be planned accordingly. The applications of condition monitoring in plants result in savings in maintenance costs, and improved availability and safety.

  163. Design development for fixtureDownload Article

    Ravichandran. D, Aravind Kumar. S, Jayaprakash.P, Muthurasa. P, Perinban. C

    Abstract

    close

    A fixture design system of eccentric leaver for VMC machine. Fixture is required in various industries according to their application. Designer design fixture according to dimension required by industry to fulfill our production tar gate. The fixture is helpful for machining process performing operation on eccentric in leaver period. In traditional so holding a work piece in proper position during a machining operation fixture is very necessary and important. Because the leaver is eccentric so for this requirement of machining process Designer design proper fixture for eccentric leaver. Fixtures reduce operation time and increases productivity and high quality of operation is possible.

  164. Recital of automatic bottle filling system in food and preparation of beverages college/industry using plc and scadaDownload Article

    Mr.V.N.Loganathan P.V.Kavin Kumar, B.Kumaravel, B.Ponraj, C.Sathish Kumar

    Abstract

    close

    In this modern world, people are running behind two things, one is of nanotechnology and another is of automation. The reason is to move ease of our work and to improve the efficiency of the working by limiting (or) decreasing size. Here in this paper, we are about to develop a system which will govern the task of filling water into bottle being supplied to it. This operation is controlled by PLC, monitored by SCADA. In our traditional method, only one bottle can fill at a time. In this paper, our system is programmed by ladder programming. In this process, the proximity sensor is used to detect the position of the bottle that move along the belt conveyor. The reference signal is the input signal that has been sending from the sensor to the PLC. The output will be as per the user requirement. As it is a programmable controller the input is the program, therefore it reduces complexity and troubles when compared to mechanical working (conventional mechanism) advantages is high accuracy, deduction (or)reduction in wastage of products (water, cool drinks).It has a various application such as beverage industry, mineral water filling.To make automated bottle filling machine to achieve both accuracy and speed in the filling, is a requirement of the time.

  165. A study on mechanical behaviours of newly developed aluminium-based alloyDownload Article

    Mr.T Ramesh kumar, Mr.K L Senthil Kumar, Mr.A Anandha Moorthy, Mrs.A D Latha

    Abstract

    close

    This paper presents the study of different mechanical properties such as Hardness, Tensile strength, Impact strength, Flexural strength, Fatigue strength and Corrosion resistance of newly developed Aluminium- based alloys. The addition of Silicon and Copper will improve the property of the Aluminium alloy. The specimens were prepared with the help of Electric furnace using Stir casting method and the tests were conducted at atmospheric condition. The prepared specimen was subjected to special heat treatment T6 process of 5400 at 6 hours followed by quenching then cools the specimen for 3 hours in atmospheric condition. After that the annealing process is followed at a temperature of 1500 at 6 hours. The mechanical properties of Heat treated alloys were improved as compared to the as-cast condition. Also in this kind of alloys may be subjected to use in various applications like Engine bearings, cylinder liner, pistons etc.

  166. Processing / properties and applications of Magnesium based metal matrix composites: a reviewDownload Article

    Purusothaman M, Sasikumar M

    Abstract

    close

    The scope of present study to be focused a brief literature review on the processing route, mechanical and tribological behaviour of Magnesium based MMCs. Magnesium is the lightest material with the density of 1.74 g/cc which has numerous advantages such as high strength. These combined properties of the magnesium make it as a candidate material for replacing conventional hard materials in many applications. But the poor wear resistance of the magnesium hinders its applications in wear environments. Addition of reinforcements will overcome these disadvantages among the various group of reinforcements are attracted the interest due to their enhanced properties. Various MMMC are developed by adding additional reinforcing elements but some of them only we have to be focused, such as Al, Ti, SiC, Gr, WS2, Ni, CNT and cerium etc. Effect of these reinforcing elements on the mechanical and tribological behaviour of the MMMC is discussed in detail. In addition to that the various techniques used to produce these MMMCs and the potential applications are also discussed.

  167. Improving the Productivity by Lean Manufacturing PracticesDownload Article

    M.Muthukumar, S.Dineshkumar, K.Gughachalam, P.Karthikeyan, S.Karthikeyan

    Abstract

    close

    In the current trends of manufacturing industries, the Lean manufacturing is one of the most powerful manufacturing control systems. By using the lean manufacturing, the production time and cost can be reduced. In this Globalization world, the pump manufacturing companies need the techniques to reduce the waste in time and cost. So the lean manufacturing practices have been in this work. In this paper, the 5s process (Seiri, Seiton, Seiketsu, Seiso & Shitsuke), Muda and Kaizen were applied. The 5s process means sort, straighten, shine, standardise & sustain. Also the unnecessary movement of parts within the process have been reduced by the rearrangement of process layout in the machining line. By using Value Stream Mapping, the non-value added time was reduced and value added time was increased. The productivity of the machine shop has been increased.

  168. Increasing fuel efficiency by using oxy hydrogen in petrol enginesDownload Article

    Mr.Balakrishnan.G, Arulbabu.M, Baskaran.N, Gopalakrishnan.D, Kannan.S

    Abstract

    close

    The main objective of this project is to fabricate a model which will help to increase the engine efficiency by air pre heating method and also Oxygen hydrogen added in to the air intake manifold and injects into the cylinders (where HHO mixes) with the fuel, ignites results complete combustion of the Hydrocarbon fuel, lowering emission and increasing fuel efficiency. Internal combustion engine is a device, which converts the thermal heat energy from exhaust and converts it to air preheat. HHO generator is an efficient approach that used to increase the fuel efficiency in a combustion engine by increasing the energy produced per mole of fuel during the ignition process. As a result the amount of unburned fuel in a combustion engine was reduced. The proposed approach is based on an ordinary HHO generator.

  169. Automatic wiper system with variable frequencyDownload Article

    Vicknesh.C, Aakash.A.E, Dev.M, Dinesh.S, Lisanson.R

    Abstract

    close

    Automatic Wiper Control with variable frequency” is a system used to renew the old system from manual to automatic. When it rains, the wiper will wipe automatically. This system is fully controlled using microcontroller system. A windscreen wiper is a device used to wipe rain and dirt from the windscreen. The main function of ‘Automatic wiper with varying frequency’ uses sensor and controller system wipes and sweeps the water from the windscreen. The main idea is to construct an automatic wiper using a sensor as a component which is used to sense the raindrops. But the system has been upgraded by considering the existing new problem. Therefore, the second idea is to automatically vary the speed when the intensity of the rain increases.

  170. Design and Fabrication of Apparatus to Find Adulteration of petroleum FuelsDownload Article

    Aswin P

    Abstract

    close

    The importance of petrol and diesel in the present world is well known to everyone. Thus, their quality plays an important role in functioning of appliances viz; vehicles, airplanes etc. Hence it becomes necessary to check their adulteration as it may affect the performance and also may damage the appliances in the worst possible case. Petrol is generally adulterated with kerosene, as the price of kerosene, distributed through public distribution system is kept low due to social and economic considerations. Petroleum fuels are similar in structure but kinematic viscosity is different. In this method, a spring-mass system guided inside a container like a damped vibration system to find adulteration. Hence damping vibration index number will vary for different fuel samples with same set of oscillations.

  171. Employer’s retention measures on job hoppers among paramedical employees in private hospitalsDownload Article

    Ajith Kumar. V.V., Scholar, V.Rajeswari, S. Porkodi

    Abstract

    close

    The employee could job hop for career growth, better pay and even for reasons which could be trivial as change of location. In the paramedical industry, the manpower is becoming thinner and scarce as there is less qualified manpower coming into the industry. This makes employee retention an absolute necessity in this industry. There are many factors that influence employer’s retention measures on job hoppers. The author felt that in such a situation there was a strong case for carrying out the present research to investigate the factors influencing the employer’s retention measures on job hoppers in paramedical fields. To carry out the research, exploratory research design was used. The stratified probability sampling technique has been used to collect primary data from the target respondents. The respondents for this study were hospital administrators working in Private hospitals, Coimbatore. The primary data had been collected from 80 respondents for this study. The analysis of the data was subjected to factor analysis using Principal Component analysis with Varimax Rotation method. This study is evident that the most important factors to retain job hoppers in private hospital paramedical employees are competitive payment and convenient workload, Career development training programmes and employee empowerment are the second important factors to be considered. The third factor which influence to retain the job hoppers are rewards and benefits from the hospitals.

  172. An empirical study on financial performance of indian pharmaceutical industryDownload Article

    Dr.P.Ayyappan, Mrs.S.Sangeetha

    Abstract

    close

    Financial performance analysis is the process of identifying the financial strengths and weakness of the firm by properly establishing the relationship between the items of balance sheet and profit and loss account. It also helps in short-term and long term forecasting and growth can be identified with the help of financial performance analysis. The dictionary meaning of ‘analysis’ is to resolve or separate a thing into its element or components parts for tracing there relation to things as whole and to each other. The analysis of financial statement is a process of evaluating the relationship between the component parts of financial statement to obtain a better understanding of the firm’s position and performance. This analysis can be undertaken by management of the firm or by parties outside namely, Owners, Creditors and Investors; financial analysis determines a company’s health and stability. The data gives you an intuitive understanding of how the company conducts business. Stockholders can find out how management employs resources and whether they use them properly. Governments and regulatory authorities use financial statements to determine the legality of a company’s fiscal decisions and whether the firm is following correct accounting procedures. Finally, government agencies, such as the Internal Revenue Service, use financial statement analysis to decide the correct taxation for the company.

  173. Online shopping and issues of misleading advertisementsDownload Article

    Iswarya.J, Suba.A

    Abstract

    close

    The aim of the research reported is to investigate consumers’ reactions to advertisements containing misleading information on price. The underlying thesis is that such advertising generates negative consumer reactions in terms of attitude and intention and that these are heightened in the presence of suspicion. This study investigates the negative influence of consumer’s perceptions of online retailer’s deceptive practices (perceived deception) on consumer’s relational variables (satisfaction and loyalty intentions to the online retailer). Also, the moderating role of product type (goods versus services), consumer’s attitude toward the Internet, and consumer’s demographics in the deception-relational outcomes link is considered. Data from 398 online consumers revealed that satisfaction totally mediated the influence of deception on loyalty. Furthermore, the deception-satisfaction link was moderated by all the hypothesized variables. Interestingly, a direct effect of deception on loyalty was found among more educated consumers, consumers who had a more positive attitude toward the Internet and consumers who had purchased a physical product. Implications for theory and management are discussed.

  174. Awareness and ethical issues of rural consumersDownload Article

    Y.Christy Kiruba, Sasireka.S

    Abstract

    close

    Indian rural market is very large and diverse. It grows at the rate of four percent and introduces 1.2 million new consumers every year. In India 620 million rural populations, living in 6.25 lakhs villages use the services of 36.98 lakhs rural retail outlets. Consumer finance is that part of financing that provides the assistance to buy consumer electronics and durables. It is one of the potential areas of growth. It indirectly helps in the increase in sales of durables. Companies are increasingly using consumer financing as a marketing tool. It serves as an incentive to consumers to upgrade their products, go in for multiple product options etc. With payment being phased out over a few months, it is more manageable for a household compared with a one time payment. In addition to dealers offering their own installment schemes, several consumer financing institutions have come up, facilitating the purchase of consumer durables and thus leading to their demand growth.

  175. Consumerism and its effects on globalizationDownload Article

    Deepak Kumar

    Abstract

    close

    Globalization in its current instantiation is the fusion of capitalism and advanced technologies, also called “techno-capital”. It produces forces that both homogenize and differentiate identity. Contemporary globalization has impacted the social, cultural, economic, technological, and environmental realms; fostered transformations of identity; and, helped to new forms of subjectivity. While globalization is the dominant hegemony of the present age, consumerism has become the basis of its wealth. The current practice of consumerism fosters certain forms of identity (such asself at play, expressed in spectacles, games, and hedonistic lifestyles) where fantasies of the self can be articulated in virtual realms. The problematic of contemporary identity can be seen in various debates over hegemony, resistance social fragmentation, identity politics, or youth cultures. Moreover, insofar as consumer based identities are dependent on commodities and commoditized commodities to the realms of identity giving rise to new postmodern articulations of alienation. In this paper, we argue that those identity formation sustain contemporary hegemony do so at the cost of alienated subjectivities. It is posited that the various articulations of identity instantiate the problematic of alienation and identity in our current would seek to overcome this alienation through political action. While small minorities celebrate capitalist globalization, especially through consumerism, the new forms of wealth and power alienate the masses. In sum, the objective of this paper is to seek the relation between globalization, consumerism, and identity and how the interplay of these factors promotes unsustainable consumption practices.

  176. IVR communication systemDownload Article

    Kiruthika T, Sasireka S

    Abstract

    close

    The main theme of this project is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. The concept is based on IP PBX. An IPPBX is a complete telephony system that provides telephone calls over IP data network. The Raspberry Pi is a credit card –size single board computer that does not include a built-in hard disk or solid –state drive, but it uses an SD card for booting and persistent storage which is use for mounting Asterisk code. With the construction of 3G network, value -added services will usher in a new development height for mobile operators. The IVR (Interactive Voice Response) business is one of the great market potential business forms. It becomes particularly important to create a good IVR business market. However, this depends on whether the operator could provide welled-qualified quality control system and automatic dial-rest mechanism for service providers. Therefore, in consideration of the dial-test difficulties cost by IVR service flow complexities in current IVR systems and based on workflow engine implementing flow operations. This paper analysed and discussed the IVR work process design, as well as the main configuration files of OS-Workflow, then put forward a visual process designer idea. And finally the IVR automatic dial-test system is designed

  177. Financial performance of two vechler industries (Tvs motors company ltd and mahindra & mahindra ltd)Download Article

    Mr.V.K.Veerakumar, Ms. K.Priya

    Abstract

    close

    Firm performance is a relevant construct in strategic management research and frequently used as a dependent variable. Despite this relevance, there is hardly a consensus about its definition, dimensionality and measurement, what limits advances in research and understanding of the concept. An income statement is a financial statement that reports a company's financial performance over a specific accounting period.Financial performance is assessed by giving a summary of how the business incurs its revenues and expenses through both operating and non-operating activities.

  178. Customers’ awareness and satisfaction on new generation banking servicesDownload Article

    Dr.E.T.Loganathan, S.K.Poongodi

    Abstract

    close

    New generation banking has come a very long way from those modest beginnings in Florence. New generation banking today covers the entire range of finance from simple savings to credit cards and home loans. Banks today are connected electronically so that banking transactions can be made globally in a split second. The present study attempted to know the customers’ satisfaction and awareness towards new generation banking services. The present study is exploratory-cum-descriptive in nature. The sample size was 400 selected on the basis of simple random sampling from the Erode district of Tamilnadu. Technological innovation and application of modern technology in the new generation banking sector make a great revolution in Indian Banking operations through tech-savvy system. Through the introduction of information technology, the banks offer various services to the customers, like internet banking, electronic payments, security investments and information exchanges.

  179. Analysis of long-term financial strength of to select private sector paper industry in IndiaDownload Article

    D. Yuvaraaj, S. Sureshkumar

    Abstract

    close

    Paper industry is a diverse industry which produces a wide range of pulp, paper and paperboard products to meet specific end user requirements. Although paper has many uses, its most important contribution to modern civilization is its use as a medium to record knowledge. The Indian pulp and paper industry at present is very well developed and established. Now, the paper industry is categorized as forest-based, agro-based and others. The pulp and paper industries in India have been categorized into large-scale and small-scale. Those paper industries, which have the capacity of more than 24,000 tonnes per annum, are designated as large-scale paper industries. Objectives of the study, to analyze the long term financial strength of the selected private sector paper industry in India. Methodology of the study, Secondary data has been used in this study. Top ten paper industries have been selected for the study. The period for this study covered ten years from 2005-2006 to 2014-2015 and the essential data for this period have been collected.

  180. A study on impact of diabaties with special Reference to erode districtDownload Article

    K.Sivasubramani, Karthi P, Prakash M

    Abstract

    close

    Although physical activity (PA) is a key element in the prevention and management of diabetes, many with this chronic disease do not become or remain regularly active. High-quality studies establishing the importance of exercise and fitness in diabetes were lacking until recently, but it is now well established that participation in regular PA improves blood glucose control and can prevent or delay diabetes, along with positively affecting lipids, blood pressure, and quality of life. Structured interventions combining PA and modest weight loss have been shown to diabetes. Most benefits of PA on diabetes management are realized through acute and chronic improvements in insulin action, accomplished with both aerobic and resistance training. The benefits of physical training are discussed, along with recommendations for varying activities, PA-associated blood glucose management, diabetes prevention, gestational diabetes mellitus, and safe and effective practices for PA with diabetes-related complications. So the researcher focuses on the diabetes with reference to erode district.

  181. The impact of social media content marketing (SMCM) towards Brand healthDownload Article

    Karthik P, Tamilarasu P

    Abstract

    close

    The emergence of Web 2.0 has created the new phenomenon in business strategies as it allowed two-way communications between companies and the consumers. Nowadays, the business practitioners tend to use the social media marketing to create awareness and promote their brands to the customers. Nevertheless, the main point in sharing the information through the social media is about the content itself to attract more consumers engage with the brands. Social media content marketing (SMCM) also plays an important role in conveying effective information to the consumers thus attract them to keep engaging with the brands. Meanwhile, brand health is the evaluation from digital audiences about the brands and products. It measures the awareness of the brand for long-term period thus develop the brand equity. There are few indicators in measuring the brand health such as time on site, repeat visitors, social likes, subscriptions, and bounce rates. There are still limited studies on the impact of social media content marketing (SMCM) towards brand health. The purpose of this study is to investigate the role of SMCM in increasing the brand health score.

  182. A study on impact of mobile advertisement in consumer purchase decision Erode cityDownload Article

    Kokilavani.S, J.Selvakumar

    Abstract

    close

    Customer Satisfaction should be the main aim of a business. It is essential for businesses to effectively manage customer satisfaction. To be able do this, firms need reliable and representative measures of satisfaction. The importance of customer satisfaction diminishes when a firm has increased bargaining power. The researcher has conducted this study to find out the level of customer satisfaction towards Samsung smart phones. The target respondent includes those customers who are using the Samsung smart phones. The collected data was edited, coded and tabulated by using some statistical tools.

  183. An emprical study on the impact of demonetization in real estate business with reference to ErodeDownload Article

    Mr.N.Devaraj, M.M.Sabarish, P.Dheenadhayalan,L.Mohanraj

    Abstract

    close

    Demonetization is likely to have a minimum impact on the primary market because a large percentage of transactions are driven by home loans with minimal cash component. The sample size was limited up to 260 from real estate owners, bankers, brokers, creditors in Gobichettipalyam, sathiyamangalam, bhavani by using convenient sampling technique. Chi square test has been used. Findings have been given based on the problems faced by the real estate owners. Suggestions have been given based on the findings. Results has been given that most of the lands were not sold after the demonetization, real estate owners faces loses in the real estate industry.

  184. A study on factors which create pollution and its impact on society reference to erodeDownload Article

    Mr. J. Tamil Arasu, M.Divya

    Abstract

    close

    The study conducted on the pollution and its impact on human health in pechondampalayam panchayat, Erode is to measure the effectiveness on the level of satisfaction of various pollution problems. Questionnaire was used as a tool to find out the opinion of the respondent regarding preventive measures, pollution awareness, cleanliness and protecting themselves from health issues. Probably the first experience of the human beings from the impact of pollution might have taken place due to the surroundings in their routine life. Since then our planet Earth has suffered much from man-made pollution. The natural environmental contains everything required for the survival, growth, and development of the living beings on earth.

  185. A study on psychological effects of cosmetics on women in erode districtDownload Article

    Mr. N. Thamilchelvam, M.Sindhu, S.Aravinth, S.Sasikumar

    Abstract

    close

    Today the women feel uncomfortable leaving the home without makeup on, no matter the destination: movies, gym, school, work, or even the beach. Makeup has become a source of oppression amongst women because this population does not feel beautiful without it. The purpose of this research was to study how makeup influences the way third parties perceive particular personality and physical traits. Previous research has found that low self-esteem, low confidence, and high levels of anxiety lead to increased makeup usage; and increased makeup usage positively correlates to attractiveness, femininity, and sexiness and negatively correlates to likeability, morality, and competence. Third party observers’ perception of makeup is influenced by the following factors: situation, race, and time. The present research may inform women on how to tailor their makeup choices to influence particular perceptions. In addition, psychiatrists and other healthcare professionals may use this information when diagnosing or treating a patient. Businesses and corporations may use this knowledge to reduce bias.

  186. A comparative study on service quality of private and government hospitals with special reference to erodeDownload Article

    Mrs.K.Nathiya, P.Manickavasagam, S.Rajeshkumar, M.Yogaraj

    Abstract

    close

    Healthcare sector of a country needs special attentions from the government as quality of healthcare provides hope and relief to the patients and their dependents. It also helps to maintain a healthy human capital that contributes in the development of the country. Now quality has become an icon for customers while availing any services or buying a product and it is also a strategic advantage for the organizations to gain success and remain competitive in the market by delivering superior quality of services or products based on customer requirements. The objective of this study is to compare the quality of health care services delivered by the public and private hospitals to gain patient satisfaction in Tamilnadu. For this purpose ‘SERVQUAL’ instrument was used to measure the patient’s perception about service quality delivered by these hospitals. Five service quality dimensions; empathy, tangibles, assurance, timeliness and assurance were used in order to measure the patient’s perceptions about the service quality of public and private hospitals located in the city Erode. Due to the nature of this study only those respondents were included in the study having perceptions about both the hospitals. Therefore, 300questionnaires were selected for this study. Results showed that private hospitals are delivering better quality of services to their patients as compared to public hospitals.

  187. A study on consumers preference and satisfaction level towards various mobile network operators with special reference to erode districtDownload Article

    Mrs. D.Shanthi, K.Shrinarthana, S.Elsiya, M.Saravanan

    Abstract

    close

    A research study was conducted with an objective to understand the Erode consumer’s preference and satisfaction choice in selecting various cellular mobile network operators. Consumer’s satisfaction and preference is widely varied in accordance with the Communication quality, call service, facilities, price, customer care and service provider’s attributes. A structured questionnaire was developed to collect the required primary data from the consumers. Collected data were analysed, reliability and factor analysis were carried out. The outcome of this research shows a comprehensively integrated framework to understand the relationships among several dimensions. The study shows consumer’s preference and satisfaction were most influential and most preferential factors in selecting various cellular mobile network operators. However, networks quality and availability has a significant impact on consumer’s preference and satisfaction.

  188. A study on consumer expectation towards reliance supermarket in erode cityDownload Article

    A. Karthikeyan, D. Deepika, A. Uma

    Abstract

    close

    The purpose of this paper is to find out consumer Buying behavior towards Reliance Supermarket in Erode city. A total of 250 consumers of Supermarket were personally surveyed with a structured questionnaire. These consumers are spread out through Erode city. Descriptive research design is used and convenient sampling method has been used for the study. Garrett’s ranking technique is adopted to analyse the problems of the respondents. The study was restricted only to Erode city. So the results cannot be generalized. The results may help the management of supermarket to understand about the factors that influence the Buying behavior of consumers towards supermarket, so that they can implement the requirement of the consumers and be successful in the emerging retailing environment.

  189. An empirical study on satisfaction level of customers in shopping malls with special reference to coimbatore districtDownload Article

    .P.Thirumalai Samy, M.Rajkumar, N.Sathiyalakshmi

    Abstract

    close

    Today, supermalls are replacing ‘kirana’ stores all over India. India’s retail infrastructure is slowly undergoing a change with many hi-fi supermalls being constructed and operating in various cities. The mall concept has come to stay for good. The Indian customers seems to be undergoing a shift in terms of personality, buying motives, interests, attitudes, beliefs and values when he or she is making a shift from ‘kirana’ stores towards shopping malls. The scope of this research is to assess the overall customer’s satisfaction, response of customers with regard to the availability and quality of products and services offered at shopping malls and the comfort level of the respondents towards shopping in the shopping malls in Coimbatore. This study is restricted to 3 shopping malls in Coimbatore.

  190. An empirical study on the impact of alcoholism among the students performance with special reference to erode districtDownload Article

    Mr.J.Tamilarasu, G.Vijay, A.Kaviyazhagan, N.Sharmilee

    Abstract

    close

    This study examines the effects of alcohol use on college male category students. This study focuses only on teenage group people between the age of 18 -25.Indian government legislation framed a law of legal age for consuming alcohol. Despite the age limit has varied according state to state. As per Tamilnadu government law the person who are comply with the 18 age are eligible to consume alcohol. In this case its very favourable for teenage people to being start this habit and to addicted for it. Our Primary purpose of this study is to measure the academic and health performance along with their involvement over the social activities of the drinking students according to non-drinking students. In various aspects such as academic performance and their health conditions, hobbies and their involvement in social activities. This study is conducted in Tamilnadu state especially in Erode district students.

  191. A study on preference towards online shopping among college students with reference to erodeDownload Article

    M.Anoop, A.Praveenkumar, V.Santhoshkumar

    Abstract

    close

    E-shopping (electronic shopping) is nothing but buying of purchasing goods or service online by giving online or offline payments. The specialty of E-shopping is that with a single click of computer mouse, you can order anything from the vast range of products and service. Trustworthiness of e-commerce websites makes these e-retailers more successful. Online shopping portal can attract more customers if it provides vast varieties of products, clearinformation, good feedback, secure online transactions, and privacy policy. Unlimited choices are made available to the customers by number of e-shops available online. E shopping made the people capable of purchasing anything through the internet

  192. Examining the major problems faced by the self-help group revealed with henry garrett ranking techniqueDownload Article

    Dr.B.Girimurugan,S. Abinaya, A. Pavithra

    Abstract

    close

    Women empowerment is a process in which women challenge the existing norms and culture, to effectively promote their well-being.The purpose of this paper is to find out examining the major problems faced by the self-help group in Sathyamangalam. A total of 250 consumers of Self-help group were personally surveyed with a structured questionnaire. These consumers are spread out through SathyamangalamTaluk. The information required for the study has been collected from both the primary and secondary sources. Descriptive research design is used and convenient sampling method has been used for the study. Garret ranking technique was used to find the reasons for joining the Self-help group.The study was restricted only to SathyamangalamTaluk. So the results cannot be generalized. The results of the study revealed that the SHGs have had greater impact on both economic and social aspects of the beneficiaries.

  193. An empirical study on awareness and perception towards live organ donation with special to erode districtDownload Article

    S.Gomathi, P.Raghul, C.Loganathan,

    Abstract

    close

    New procedures for segmented organ transplantation of the lung and liver have again brought to public attention the issue of live organ donation. To provide a context for understanding the dilemmas faced by potential donors, the body of literature over the last 40 years regarding living-related organ donation with kidneys was reviewed. Results indicated that while psychological side effects have been reported including depression and family conflict these risks are generally under-emphasized. Risk factors for negative psychological consequences include high age, lack of social support, and organ rejection in the recipient. Instantaneous decision-making in favor of donation is generally described. However, researchers have neglected to consider social desirability factors when assessing donor motives. Furthermore, lack of awareness has been shown concerning the coercive processes involved in moral decision-making. Health professionals should be aware that merely raising the issue of live organ donation may instigate powerful psychological processes beyond the potential donor's voluntary control and leave little room for refusal without psychological cost. Implications for treatment are discussed with these circumstances in mind.

  194. Examining the major problems faced by the landline consumers and their complaining behaviour in bharat sanchar nigam limited revealed with henry garrett ranking techniqueDownload Article

    S. Santhoshkumar, R.Shanmugapriya, N. Vignesh

    Abstract

    close

    Telecom is one of the fastest-growing industries in India and as the second largest market in the world. The BSNL is one pioneer and the largest segment in the telecom industry. Consumer perception is the primary goal of every business organization. As the rapid changing business scenario for the entire transaction activities begins and ends with the consumer. This study aims to focus that to identify the perception level of the consumers on BSNL mobile service provider. So, it is very essential for the service provider to understand the influence of various Demographic variables that influence the perception and satisfaction level to win the hearts of the consumers. For the purpose, a survey based descriptive research design adopted to conduct for this study in Erode. The Simple Random Sampling Method is used to collect data and to be collected from 202 sample respondents through a structured questionnaire. The study find that demographic perception of the respondents were identified their choosing in the landline service provider. The demographic factor does not influence the perception of the respondents in the BSNL mobile service provider. The study concludes that the problems faced by the BSNL consumers and their complaining behaviour to the respondents with the help of Garret ranking calculation. BSNL should focus on the promotional measures competitive to the private sector service providers, to enhance their service activity for the satisfaction of the consumers.

  195. Exploring the major problems faced by the respondents in daily newspapers revealed through henry garrett ranking techniqueDownload Article

    B.Renuka, A.Selvakumar, S.Balamurugan

    Abstract

    close

    Newspapers are the most powerful tool to express ideas and information. It is a part and parcel of modern life. It plays vital role by providing information and creating awareness among the people. A newspaper acts an important medium to control corruption and scams. The chief topics of general interest in newspaper include politics, sports, economy, movies and share market. A wide coverage of information is obtained at low cost though newspaper. Newspaper provides us with information collected from around the globe. It also helps to develops new ideas, and at times guides the common man and it also influences the habit of thinking in men. Hence the research work is carried out to know the customer satisfaction towards Newspaper. The data were collected from 300 respondents those who actually reading the Newspaper. Further the data were analysed by using Henry Garrett Ranking technique.

  196. Examining the major problems faced by the college students in using social networking sites revealed through henry garrett ranking techniqueDownload Article

    Dr.V.Manimegalai, L.Kalpana, K.Mohamad Ali, R.Thiviyabharathi

    Abstract

    close

    As social media sites continue to grow in popularity, it is our premise that technology is a vital part in today’s students success equation. The sample size is limited to 300 collected from college students in Erode District by usingconvenient sampling technique.Garrett ranking technique has been used for analysis. Findings have been given based on the problems faced by the students on using social networking sites through.Suggestions have been given based on the findings. Results indicates that while most of the college students use social media and spend many hours checking social media sites, there was a negative aspect to college students` use of social media.

  197. Exploring the major problems faced by the respondents due to industrial pollution revealed with henry garrett ranking techniqueDownload Article

    Mrs. S Sudha, M.Manoj, S.Balakrishnan, Kadiyala Honey

    Abstract

    close

    Systematic assessment of the effect of industrial pollution on the health and survival of residents certainly goes a long way in monitoring the pollutants and bringing out meditative measures by the authorities. The present study was taken up with the objective of assessing the impact of industrial pollution on the growth and Human Health, data reveals a higher prevalence of respiratory, eye and skin problems in the industrial areas, as compared to those living in non-industrial areas. Long-term health studies are suggested for proper management of environment and health in these areas by the governmental authorities and the society at large.

  198. Examining the impact of alcoholism through media exposure towards youngsters revealed with henry garrett rankingDownload Article

    Mrs. K. Nathiya, S.Sruthi , M.Ashok

    Abstract

    close

    The study provides initial evidence that alcohol and the way in which alcohol is portrayed in movies contributes to how people evaluate and becometransported in movies. Participants were more transported into movie clips with negative alcohol portrayals compared to clips with positive alcohol portrayals. Stronger effects of negative events over positive events are found in various aspect of life. Glamorised drinking in movies can encourage young adults to consume more alcohol, a new study has warned. The study of the effects of alcohol portrayals in movies has found that positive and negative portrayals of alcohol can contribute to viewers’ emotional involvement or “transportation” attitude towards, and evaluation of the movie. Exposure to alcohol portrayals in the media – including movies, but also advertisements and digital media such as face book – can encourage drinking in young people. “Since movie characters can be regarded as role models by young people, the manner in which these characters portray alcohol use in a movie might have an impact on the beliefs and attitudes towards alcohol use by youngsters themselves. It is essential to test the extent to which alcohol portrayals affect engagement and transportation into a movie because emotional involvement in media content can be a significant requisite for being influenced by persuasive messages. In addition, participants were more transported into movie clips with negative alcohol portrayals compared to clips with positive alcohol portrayals. However, participants endorsed more positive attitudes towards clips with positive alcohol portrayals compared to clips with negative alcohol portrayals. Children who watch a lot of movies featuring alcohol are twice as likely to start drinking compared to other kids who watch relatively few of such films, according to new research. The study, published in the online journal BMJ Open, also reveals that these children are significantly more likely to progress to binge drinking.

  199. Weakly Generalized Fuzzy Closed sets and Maps in Sostak’s Fuzzy Topoloical SpacesDownload Article

    R. V. M. Rangarajan, M. Chandrasekharan, A. Vadivel

    Abstract

    close

    In this paper, we introduce and study the concept of r - weakly generalized fuzzy closed sets in 5ˆ ostak’s fuzzy topological spaces. Fuzzy WG - connectedness is introduced and studied with help of weakly generalized fuzzy closed sets and fuzzy weakly generalized continuity (irresolute) mappings are introduced and the relationship between these mappings and other mappings introduced previously are investigated. Also, some separation axioms of r - weakly generalized fuzzy closed sets are introduced and studied. Keywords and phrases: r - weakly generalized fuzzy closed sets, r - generalized fuzzy weakly closed sets, Fuzzy WG - connected (Fuzzy GW - connected) sets, Fuzzy weakly generalized continuity, Generalized fuzzy weakly continuity, FWG - irresolute, GFW - irresolute, and r - FWG - regular ( r - FWG - normal) spaces.

  200. Users information seeking behaviour on digital resources of higher education- a studyDownload Article

    T.Prakash, Dr.M.Jayaprakash

    Abstract

    close

    This cardboard discuses online advice gluttonous behaviour of Digital resources of Higher Education acceptance for acceptable apprenticeship a part of acceptance of college acquirements institutions. Online advice gluttonous behaviour is a almost new phenomenon. However, it is the alive action of accepting abstracts from the Web. Libraries and Universities are continuously adapting and gluttonous able means to acknowledge to the axiological and committal missions of research, teaching and association service, and that is why some accept accepted the use of the Internet in account delivery. On the added hand, this abstraction is added anxious with maximizing acceptance of this ability by acceptance in accomplishing their primary aim of analysis and extensive out to these assets on the Internet application the requisite abyssal skills. The cardboard says the Internet offers boundless admission to cyber banking assets and as well has the advantages of interactivity, and advice tailoring. It as well agrees that admission is caitiff and use is hindered by abyssal challenges due to abundant factors e.g. disorganization, abstruse accent and abridgement of permanence. Meagre advice appraisal abilities add to students' vulnerability. The cardboard highlights some advice gluttonous models to abetment acceptance in their seek for advice on the Internet. As well it highlights the role of the library in the advice gluttonous action of students. The cardboard concludes that admitting Advice and advice technologies are getting put in abode for use by students, they have to acquire the requisite accomplishment to use them appropriately.

  201. Virtual touch screen based library book accessing systemDownload Article

    Mr R.S Kamalakannan, Buvaneswaran J,keerthana C, Jency P, Vidhya B

    Abstract

    close

    The use of embedded systems has a wide capabilities and features especially in smart home. Nowadays there is a demand for smart home automation access via virtual reality. This project mainly focuses the owner to accesthe system via virtual reality and controls the robot movement. In this project, the design and implementation of virtual reality at a low cost yet a flexible, feasible and secure virtual reality based robot movement control. This work also demonstrates the use of virtual reality in the context of the appliance control. Virtual reality can be used in a conventional manner to simulate the behavior of a system, but also in parallel with the real system to improve quality control. Experimental results show the effectiveness of the proposed architecture in a successful manner.

  202. Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETsDownload Article

    C.Mani, V.Kunalakshmi

    Abstract

    close

    In the past few years, personal mobile devices such as laptops, PDAs, and smartphones have been more and more popular. Indeed, the number of smartphone users increased by 118 million across the world in 2007 [1], and is expected to reach around 300 million by 2013 [2]. The incredibly rapid growth of mobile users is leading to a promising future, in which they can freely share files between each other whenever and wherever. The number of mobile searching users (through smartphones, feature phones, tablets, etc.) is estimated to reach 901.1 million in 2013 [3]. Currently, mobile users interact with each other and share files via an infrastructure formed by geographi-cally distributed base stations. However, users may find themselves in an area without wireless service (e.g., mountain areas and rural areas). Moreover, users may hope to reduce the cost on the expensive infrastructure network data.

  203. Study on compressive strength of bacterial concreteDownload Article

    Arvind S,Gandhimathi S,Karthik R,Madhumitha T S ,N.V.Manjunath

    Abstract

    close

    This paper says about the tests conducted to determine the compressive strength of concrete using a bacteria named bacillus subtilis . In this method of experiment , cement of OPC 43 grade , well graded aggregate and along with that 25Mm of CaCl2 , 100 Mm of disodium oxalate and 50 Mm of sodium bicarbonate is added . And also a bacterial culture of bacillus subtilis is added for about 1.5 ml . Three different types of water is prepared for mixing and curing . They include distilled water , water with the above mentioned salts and the other with salts and bacteria . Individual cubes are casted by using different water and checked out for strength . The compressive strength is tested and the strength of concrete cube is tested for different type of mix proportions of water.

  204. Fuzzy logic based comparative circuit topology for unified power quality conditioner without degrading the performanceDownload Article

    K.Ilambarathi, K.Shamsad, R.Sudharsan, A.Sathishkumar, T.Jaya Kumar

    Abstract

    close

    This paper proposes a new topological configuration for a unified power quality conditioner (UPQC). Generally, the power structure of three-phase-three-wire UPQC consists of two back-to-back connected six switch inverters. For this configuration, out of twelve switches, six of the series inverter switches will be under-utilized most of the time. To improve the semiconductor utilization and consequently to reduce the total switch count, this paper proposes a new reduced switch topology for UPQC. The proposed topology is realized using only ten switches and retains all the performance merits of the twelve-switch UPQC while minimizing its underutilization without increasing the switch VA rating. The paper provides a detailed analytical study and evaluation by comparing the proposed topology with the twelve and nine switches based UPQC system configurations. The feasibility of the proposed topology is validated through experimental investigation

  205. Astashine silver capsules: an excellent choice for eye fatique relievesDownload Article

    Govind Shukla, NagalakshmiYaparthy, NehaGiri, D.Sruthi Rao, G.Santosh C.J. Sampath Kumar

    Abstract

    close

    Scientists long ago discovered that a class of naturally-occurring pigments called carotenoids held powerful antioxidant properties that are crucial for eye health. This carotenoid is called astaxanthin. Astaxanthin is produced by the microalgaeHaematococcuspluvialis when its water supply dries up, forcing it to protect itself from ultraviolet radiation. Astaxanthin is leaps and bounds more powerful than beta-carotene, alpha-tocopherol, lycopene, and lutein-other members of its chemical family. Astaxanthin exhibits very strong free radical scavenging activity, and protects eyes from oxidative damage. Astaxanthin crosses the blood-brain barrier and the blood-retinal barrier which has huge implications for the health of eyes. Dry eye is a common disease of the ocular surface that is associated with corneal surface irregularity and blurred Vision. L-carnitinehas demonstrated rapid and consistent improvements in signs and symptoms in patients with dry eye.Several studies shown that Astaxanthin& L-Carnitine Combination in Astashine Silver Capsule is supportive of Eye health.

  206. Biological treatment of domestic waste water by sequential batch reactorDownload Article

    Ms.G.Sabarika Devi, Ms. Preethi John Evelin

    Abstract

    close

    The Domestic waste water was collected from the kgisl institute of technology hostel (from the outlet of grit chamber) and it is immediately used for the experiment conducted using SBR. The following experiments were conducted to determine the efficiency of the SBR system in treating the grey water. (I) Initial characteristics of the wastewater were determined (ii) Determination of COD removal efficiency (iii) Determination of BOD removal efficiency (IV) Determination of TSS removal efficiency. In these experiments the parameters like temperature, aeration rate, and reaction time were varied. The Initial characteristics of waste water were: TSS (230-450 mg/l), pH (7.5-8.25), BOD (267–340 mg/l), and COD (533-750 mg/l).The Following Parameters are varied (I) Temperature (II) Aeration rate

  207. Design and fabrication of AGV for KLIFT with RFID scannerDownload Article

    M.Arunkumar, M. Balamurugan, M. Karthick, G. Sibi Vengatesh, Palanisamy S

    Abstract

    close

    We describe the development of robotic forklift intended to operate alongside human personnel, handling palletized materials within existing, busy, semi-structured outdoor storage facilities. The robot operates in minimally-prepared, semi structured environments, in which the forklift handles variable palletized cargo using only local sensing, and transports it while interacting with other moving vehicles. The robot operates in close proximity to people, including its human supervisor, other pedestrians who may cross or block its path, and forklift operators who may climb inside the robot and operate it manually. This is made possible by novel interaction mechanisms that facilitate safe, effective operation around people. Using radio frequency identification (RFID) antennas with forklift to identify goods and stock shelves automatically will help to increase efficiency of logistic processes. This paper discusses different approaches to integrate RFID antennas into a forklift. The different influences to RFID systems are discussed by consideration of logistic environments.

  208. Parameter modifications for technological advancements and implied domain efficiency of connecting rodsDownload Article

    S.Palanisamy, M.Jayakumar, Dr.N.V. Dhandapani

    Abstract

    close

    In this paper discussed about various design of connecting rod with different approach. The design and optimization of connecting rod reduce the weight and it will leads to better fatigue performance for the heavy duty applications. Different design approach leads to find out effective design of particular area. Topology optimization approaches have an ability to reduce the weight of connecting rod. Use of different material for connecting rod shows the different results through finite element analysis. Based on the finite element analysis we can find suitable material and it will increase the life of connecting rod. Generally for analyzing purpose ANSYS/NASTRAN software can be used. According to various research papers studied it will be clearly indicate that the new design much lighter and has more strength than initial design of connecting rod.

  209. Agricultural land investigation and change detection in Coimbatore district by using advanced surveying technologyDownload Article

    S. Suganya, N.Sathishkumar, R.Vinitha1, S.Veeramani

    Abstract

    close

    The awareness of Landuse and Landcover assessment is very important to understanding natural resources, their utilization, conservation and management. In recent years remote sensing and Geographical Information System have gained importance as vital tools in the analysis of temporal data at the district and city level. The present study evaluates the effectiveness of high-resolution satellite data and computer aided GIS techniques in assessing Landuse and land cover change detection for the period 2003 to 2017 within the study area, Coimbatore District. This paper describes assessment of the land use and land cover changes in the Coimbatore District for fourteen years. LANDSAT 7 ETM, LANDSAT 8 OLI images were analyzed using ENVI software and ArcGIS. A total of five broad Landuse and land cover classes were identified. These were crop land, Barren land, forest, water bodies and built up land. This study identified population growth, built up land and lack of proper education as causes of the changes in land use and land cover in the Coimbatore area.

  210. An analytic report on design, cross section and material specification of protective structures for earth moving machineryDownload Article

    M.Jayakumar, Dr.N.V.Dhandapani, S.Palanisamy

    Abstract

    close

    Roll over protective structure (ROPS) are passive safety structures fixed on off-highway and highway earth moving machines. The structures provide a survival zone to safe guard the operator during an accidental roll over. Since decades in use of Off-Highway mining equipment, ROPS performance with respect to operator safety and reducing fatality has been consistently improved. Various research on simulating and testing the passive safety structures are carried out with respect to worldwide safety standards used for earth moving machines like wheeled loader, dozer, Dump truck, Motor Grader etc., ROPS design standards require full scale destructive testing to understand performance behaviour in post yield and energy absorption capacity. Destructive testing is very expensive and time consuming method, only very few reputed companies have been conducting these destructive experiments and the results are classified as confidential. The more economical and time saving test is the virtual test applying finite element analysis and simulation using CAE (Computer Aided Engineering). The main objective of this research work is to optimise the design concept, cross section and material specification to provide ROPS to off-highway mining equipment and carrying out virtual CAE simulation of roll over protective structure of an operator cabin with respect to energy absorption criteria and gross vehicle machine mass (GVMM). Evaluating the design of passive safety structure for its Deflection Limiting Volume and to generate more data for further research in designing of roll over protective structure (ROPS).

  211. A sensor controlled braking systemDownload Article

    Shashi Kumar Sour, Md Ramiz Akhtar, Ashish Kumar, Kumar Abhishek Ranjan, Avinash Kumar Sinha, G.Phaneendra Kumar, B.Naresh

    Abstract

    close

    This project presents “A sensors controlled braking system”. Driving is a compulsory activity for most of the people. People use their automobile to move from one place to another. The number of vehicle is increasing day by day. So, road accidents are a common problem in today’s scenario. Numbers of Accidents occurs everyday and causes worst damage, serious injury and death. These accidents are mostly caused due to loss of control, drunk and driving, rash driving etc. Our project is designed to develop a new system that can solve this problem where drivers may not apply brake manually but the vehicles can stop automatically by sensing the obstacles in front of it. This project is about a system that can control braking arrangement for safety of vehicle and driver. This braking arrangement is controlled by the system which consists of control unit with solenoid valve ,this system get activated when it receives ultrasonic wave signal from ultrasonic sensors, after detecting object in front of vehicle within a predetermined distance. This project demonstrates the possible use of an automatic braking mechanism in this system. Thus it provides an advance safety braking arrangement without applying manual brake

  212. Programmable depth control drilling machineDownload Article

    Kasthuri Rakesh Varma, Jatoth Sudhakar, Chepuri Harish, Basa Meghanath, G.Phaneendra Kumar, P.Ramya

    Abstract

    close

    Estimating the drilling depth while drilling manually through a conventional drilling machine is extremely impossible, often the job will be failed due to the over drilling. In many cases, after completing the drilling work, it is very difficult to measure the depth, especially thin holes depth cont be measured. Therefore an automatic drilling machine that performs the function of drilling according to the drilling depth data generated & forwarded to the control circuit is essential, hence this project work is taken up, which exposes the technology of special purpose drilling machines. The Electrical drilling machine designed here is quite useful for mechanical work shops. The machine is constructed with power feed technology is aimed to drill the job up to certain specified depth. For ex: if a particular piece of job is supposed to be drilled to a limited depth, doing it manually consumes lot of time, because every time depth has to be measured through a crude method, thus estimating the drilling depth is quite complicated. For this reason this machine is designed, & its mechanical movements are restricted by programming the drilling depth through a small key board interfaced with microcontroller. The mechanical transmission section is designed with smooth sliding channels. Machine perpendicular proceedings can be programmed through a keyboard interfaced with controller. Depending up on the data entered through keyboard, machine movement in vertical direction is restricted stepper motor. Since the stepper motor rotates pulse per step, number of pulses produced by the C unit is counted internally. The vertical moving mechanism proceeding is calculated as per step motion. The proceeding data entered through keyboard is displayed through LCD. Based on this data, the vertical movements of drilling motor is restricted to a limited span.

  213. P-wave estimation using DWTDownload Article

    Syeda Adiba Rehaman, P. Rajeswari

    Abstract

    close

    This paper focuses on estimation of the P-wave, based on 12 lead standards ECG, which will be applied to the detection of patients prone to diseases (atrial flutter, hyperkalaemia, hypokalaemia and atrial fibrillation). The noise is removed using Bandpass filter and P-wave is isolated and a set of parameters, which have the ability to detect patients prone to diseases, is calculated from it. The method has been validated using ECG-recordings of 250 patients with a wide variety of P-wave morphologies from JSS Database. The P-wave method detects the diseases that occur when the P-wave is abnormal.

  214. Study on the effect of sintering temperature on synthesize of LTA - ZeoliteDownload Article

    Velmurugan. S, Santhosh Kumar. S, Ganesh. B

    Abstract

    close

    The aim of this paper is to provide a review on the effect of temperature on synthesizing zeolites Lind Type- A. The zeolites are the adsorbent which can be effective in synthesized rather than naturally obtained because the synthesized one having more pore volumes and can retain the more ions which has to be separated. The objectives are to synthesize Lind Type-A (LTA) zeolite by aluminosilicate gel method at 100⁰C (drying time-24hr) and sinter the synthesized Lind Type-A (LTA) zeolite between 200⁰C, 300°C, 400°C,500°C, 600⁰C. The characteristics of synthesized LTA analysed by FTIR, XRD, SEM, and BET surface area.

  215. Physico-Chemical analysis of Groundwater Pollution in Cuddalore District, Tamilnadu, IndiaDownload Article

    G. Ganesh Kumar, Mohammed Ismudeen A.R, Varun Natarajan

    Abstract

    close

    As groundwater is the major component of water system and contamination of which results in pollution of various water bodies. In Cuddalore, at SIPCOT industrial area, it was reported to be highly contaminated groundwater. Cuddalore is a well-known place for the production of many chemical fertilizers. From this production, the effluent of the chemical industries is drained into the Gadilam River. This effluent will affect the quality of groundwater. This type of water is called polluted water. Mostly, the pollutants are industrial chemicals, effluents and other wastes. There are about five samples were taken from five different areas from bore water. From the statistical analysis; Total Dissolved Solid (TDS), Electrical Conductivity (EC), pH, Hardness, Chlorides test were carried out. All the values were found above the prescribed Bureau of Indian Standards (BIS). The district of groundwater pollution in Cuddalore is emerging. Therefore, we have to be aware of polluted groundwater in Cuddalore district and currently the groundwater is being polluted for cent percent but we cannot avoid the water to be polluted.

  216. A comparative study of biosorption potential of different indigenous waste materials for adsorption of nickel (ii) heavy metal - experiment and kineticsDownload Article

    R. Ramesh Kumar, Dr. Pappayee Nagappan

    Abstract

    close

    The ability of adsorbents to adsorb nickel, Ni2+, from aqueous solutions has been investigated through batch experiments. The Ni2+ adsorption was found to be depends on pH, adsorbent dosage, contact time, initial concentration and agitation speed. All batch experiments carried out at temperature of 30oC using rotary shaker that operated at 150 rpm. Eco friendly, cost effective, easily available indigenous wastes were activated using sodium hydroxide, ultra sound irradiation (US) and sodium hydroxide followed by US was used as an adsorbent. Better activation was obtained with sodium hydroxide followed by US treatment. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The experimental showed that highest Ni2+ removal rate was 79% for teakwood leaves under optimal conditions. The kinetic processes of Ni2+ adsorption onto various adsorbents were described by applying pseudo- first-order and pseudo-second-order rate equations. The kinetic data for the adsorption process obeyed pseudo-second-order rate equations.

  217. Colostramin capsules; helps to balance immune responseDownload Article

    Govind Shukla, Nagalakshmi Yaparthy, NehaGiri, G.Santosh, C.J. Sampath Kumar

    Abstract

    close

    Colostrum because of its versatile composition it can be used in variety of diseases. It has properties to stimulate immune system and also contains hormones, growth factors and other bioactive components required for the body to combat with various diseases. It has been used for various respiratory tract infections, gastrointestinal disorders and rheumatoid arthritis. The medical importance of Colostrum has been described in ancient ayurveda. In US Colostrum was in use for its antibacterial activity before the discovery of antibiotics5. Colostrum upon contact with stomach acid inhabits and killcampylobacter, candida, E.coli, colostridium, helicobacter pylori, rotavirus, salmonella, shigella andstreptococcus. Colostrum is effective in leaky gut, irritable bowel syndrome, colitis, ulcers, chronic fatigue, diabetes, autoimmunity, arthritis, lupus and cancers, improves intestinal assimilation ofnutrients, inhibits protein breakdown, shifts energy source from carbohydrate to fat, spurglucose transport in muscles. It is now well established fact that ingestion of Colostrum promotes nutritional, functional and biological activities. This article reviews the current available scientific literature regarding the effect of Colostramin capsules as an effective supplementation for daily energy needs in enhancing immune response.

  218. Study of mechanical properties of hybrid natural fiber compositeDownload Article

    Balamurugan.K, M.K.Aravindan

    Abstract

    close

    The present experimental study aims at learning the mechanical behaviour of hybrid natural fiber composites. Samples of several Jute-Bagasse-Epoxy & Jute-Lantana camara-Epoxy hybrids were manufactured using hand layup method where the stacking of plies was alternate and the weight fraction of fibre and matrix was kept at 40%-60%.Specimens were cut from the fabricated laminate according to the ASTM standards for different experiments. For Tensile test & flexural test samples were cut in Dog-bone shape and flat bar shape respectively. After that experiment is performed under Universal testing machine (UTM). ILSS (flexural strength) & Tensile strength were observed and compared to base values of epoxy polymer to perceive the change in strength. SEM analysis was done to ascertain the mode of failure.

  219. An investigation of mechanical properties of natural hybrid fiber composites based window doorDownload Article

    S.Anandhan, V.Saravanan

    Abstract

    close

    The composite materials are replacing the traditional materials, because of its superior properties such as high tensile strength, low thermal expansion, high strength to weight ratio. The developments of new materials are on the anvil and are growing day by day. In this work the effect of glass fibre hybridization with the randomly oriented natural fibers has been evaluated. The sisal(S), banana (B), E-glass synthetic fibers were chopped and reinforced with polyester matrix. Six layers were prepared in the following stacking sequence of S/B/G, S/G/B, G/S/B, G/S/B/G/S/B/G, S/G/B//S/G/B, B/G/S/B/G/S. The mechanical properties like impact strength, flexural strength and tensile strength were investigated and compared. It was observed that the addition of two and three layer of glass fiber can improve the mechanical properties like tensile, Flexural and impact strength

  220. Performance and characteristics analysis of four stroke single cylinder diesel engine using tung oil blends with dieselDownload Article

    M.Veeramani, Dr.K.Sundaramurthy

    Abstract

    close

    Due to recent energy crisis and dwindling reserves of crude oil, the demand for fuels particularly the diesel is increasing. Bio-fuels are being given serious considerations as potential sources of energy in the future, particularly in developing countries like India. Biodiesel (Fatty acid methyl esters) being renewable, biodegradable, non-toxic and eco-friendly is gaining importance. The tung oil and blends of tung biodiesel with diesel are used as fuels in Direct injection four stroke diesel engine. An attempt was made to determine the optimum static injection timing and also the best blend of tung oil that gives lower emission where exhaust gas recirculation is used. A matrix of experiments is conducted for observing the effect of different biodiesel blends of B0, B10, B20, B30 and B40. Performance analysis such as Brake specific fuel consumption (BSFC) and Brake Thermal Efficiency (BTE) are considered for experimental investigation.

  221. Performance and characteristics analysis of four stroke diesel engine with neem bio diesel and its blends with dieselDownload Article

    Mr.M.Sanjay, Dr.K.Sundaramurthy

    Abstract

    close

    The world is getting modernized and industrialized day by day. As a result vehicles and engines are increasing. But energy sources used in these engines are limited and decreasing gradually. The situation leads to seek an alternative fuel for diesel engine is biodiesel. Biodiesel is a non-toxic, biodegradable and renewable alternative fuel that can be used in diesel engines with little modification. Bio diesel is currently expensive. Therefore, the study on neem oil as fuel for CI engine was undertaken. The biodiesel has been prepared from the crude non edible oil from the neem seeds of the neem tree (azardirachtaindica) using Trans esterification process. The different blends of neem biodiesel in various proportions will be compared with diesel. The neem biodiesel and diesel are used as fuels in CI engine and their performance testing has been performed on 4-stroke, single cylinder, water cooled kirloskar CI engine for loading purpose, and emission characteristics are analyzed. When load is increased CO2, HC, CO nearly same and NOx slightly increased. Neem oil can be used in diesel engine without any modification.

  222. To improve the efficiency of solar panel by using solar tracker in air coolerDownload Article

    S.Nirmal Kumar, G.Arul Gandhi

    Abstract

    close

    Solar energy is very important means of expanding renewable energy resources. In this paper is described the design and construction of a micro controller based “solar panel tracking system for Air cooler”. Air Cooler is the widely used device in all the places like offices, Houses, Shopping Malls etc. The power consumption for the AC has higher, so it is used for the application of this project to alternate the electric power by solar power. Solar is a non conventional source of energy, considering this we have developed solar panels. So it will fulfill our electricity need. But due to revolution of the earth, solar source from sun. It face the panel continuously hence less electricity is produced. The energy panel should face the sun till it is present in a day. Usually, the heat from the sun has been utilized 5 hours per day for 11:00 am to 4:00 pm. By placing our tracking system to the panel will increase the electricity production nearly for 5 hours. The tracking system can tracks the heat from the sun when sun rise starts about 7:00 am in morning till 5 or 6:00 pm in evening sun sets. By this process the energy utilization of solar is increasing to 5 hours

  223. Parameters pridiction of tig and mig welding by tensile sterengthDownload Article

    Shashikant Rai, Dr. Lokesh Singh

    Abstract

    close

    Various welding process are present, among the various welding process, Tungsten inert gas (TIG) welding plays a major role in the welding of mild steel or thin sections of non-ferrous metals such as alloy steel and stainless steel. MIG input welding parameters are the most important factors affecting the quality of the welding and weld quality is strongly characterized by weld bead geometry. TIG and MIG welding has several advantage like joining of dissimilar metals, the absence of slag, low heat affected zone and etc. An Orthogonal array and analysis of variance (ANOVA) are employed to investigate the welding characteristics of alloy Steel material and predict the welding parameters also compare it in between the TIG and MIG welding tensile responses.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"