Articles

  1. A study on people awareness on e-wallet after demonetization with special reference to Tirupur districtDownload Article

    Mr.G.Rajesh, Mr.N.Santha Kumar & Mr.N.Thamil Chelvam

    Abstract

    close

    When we talk about the transaction in earlier times when there was no currency system, people used to work on barter system, later on people started transaction in terms of currency notes /coins. In the modern digital age people are using money in many forms to pay the bills like through credit card, debit card, using Internet and Mobile devices. In today’s era people are making transaction digitally over the internet. People are purchasing, making transactions through mobile devices, ATM, Credit cards, Bit coin, E-wallet, third party like PayPal etc. they feel convenience, easy to use design for transaction and perceived usefulness of the system. This paper is focusing upon the paperless e-currency transaction that is getting popular all over the world, India is a growing market for the world and many services and products are available online and they accept payments online, but how many people are actually relaying on it, how many people are using it for making payments moreover, the study is based on the questionnaire responded by respondents.

  2. A Study to identify the reasons behind Infertility with reference to ErodeDownload Article

    Mr.N.Devaraj, Ms.S.Keerthna & Mr.P.Sasi Kumar

    Abstract

    close

    Infertility is a common problem affecting one couple in six. It can be defined as the incapacity to fulfil pregnancy after reasonable time of sexual intercourse with no contraceptive measures taken. The evidence for changes in the prevalence of infertility is difficult to establish. This increase could be due to at least four factors: delayed childbearing, alterations in semen quality due to habits such as cigarette smoking and alcohol, changes in sexual behaviour and eliminations of most taboos.First, the introduction of assisted reproduction technologies has provided an opportunity to study basic reproductive processes. Second, societal changes have occurred such as the increase in the proportion of women over 35 years old seeking pregnancy. This fact is due to a later age for marriage and postponement of pregnancy. Third, the development of molecular biology and genetics has become very important for the study, diagnosis and assessment of couples, many of them considered until now as “unexplained infertile couples”. There are many causes of infertility, including some that medical intervention can treat. The most common cause of female infertility is ovulatory problems which generally manifest themselves by sparse or absent menstrual periods. Women who are fertile experience a natural period of fertility before and during ovulation, and they are naturally infertile for the rest of the menstrual cycle. Fertility awareness methods are used to discern when these changes occur by tracking changes in cervical mucus or basal body temperature.

  3. A study on men’s and women’s attitude and belief towards the Menstrual cycleDownload Article

    Ms.K.Nathiya, Ms.T.Priyanka & Mr.V.Udhaya Kumar

    Abstract

    close

    Men’s Knowledge and Perspectives on Menstruation Research show that men and women often do not converse freely about menstruation. Shame, taboos and myths associated with menstruation silence the conversation. Silencing conversations about menstruation have negative consequences on women, including: objectification of women’s bodies, stereotyping of women as physically, morally and emotionally inferior to men and to extreme cases women losing their uterus due to unhygienic means of menstrual management. On the one hand, not addressing menstruation openly has devastating consequences on women but on the other hand, most men seem oblivious about the impacts on women. Therefore, it is important to engage in open dialogues about menstruation because research have found that such acts empower women and for men, it helps them to understand the construction of societies at a deeper level. I argue that despite considerable development in Science improving understanding of human biology, men in general do not have enough knowledge about menstruation and its effects on women. It was found that most participants do not have adequate knowledge about biological process of menstruation. Menstruation was also supposed to be a women’s issue hence not important for men to understand it. This thesis will contribute to narrowing a gap in literature available on the topic.

  4. A study on the impact of Mobile phone usage on entrepreneurs with reference to TirupurDownload Article

    Mr.N.Devaraj, Ms.G.Aarthi & Mr.B.Bharath Kumar

    Abstract

    close

    Mobile phones communicate with base stations using radiofrequency radiation. Radio waves received and sent by mobile phones transmit in all directions including the human body. An exposure to the radiofrequency fields emitted by mobile phones is generally more than a 1000 time s higher than from base stations. This radiation is absorbed into body might cause a wide range of health problems. If radiofrequency radiation is high enough, it has a ‘thermal’ effect, which means it raises body temperature. There are concerns that the low levels of radiofrequency radiation emitted by mobile phones could cause health problems.

  5. A study on social media and its impact on consumer behaviorDownload Article

    Dr.B.Girimurugan, Mr.S.Kavin & Mr.K.Vinothkumar

    Abstract

    close

    Social media has revolutionaries the ways of communication and sharing information and interests. The rapid growth of social media and social networking sites, especially, in developing country like India is providing marketer a new avenue to contact customers. Though, organizations are increasing their spend in social media, it is difficult to measure a real return on investment. This paper attempts to assess the impact of usage of social media on purchase decision process. The paper examines the usage pattern and its influences the five stages of purchase process. The study finds that the social media is most widely used in information source for perceived convenience, effectiveness and perceived credibility. Also, the social media reviews and opinions affect the purchase decision process; however, tendency of share their experiences post purchase is surprisingly low.

  6. A study on factors leading to parents opting for private schools for their children special reference to TiruppurDownload Article

    Mr.N.Thamil Chelvam, Mr.G.Gokulraj & Ms.C.Akalya

    Abstract

    close

    Admission of a child is a stressful activity not only for the parents but also for the child itself.it creates a competition among small children right from the very beginning i.e., at Nursery level. Even right to education does not guarantee the admission, what guarantees is a donation, if parents are alumni famous person’s approach or sometime lottery method bring a charm. Every year during the month of February and March, parents standing in line for hours our side the various private schools to get an admission of their child is a common sight where in many seats in government schools goes vacant. So what is it attracts parents to private schools rather than government schools?

  7. A study on women’s preference towards two wheelers with special reference towards Tiruppur districtDownload Article

    Dr.B.Girimurugan, Mr.S.Aswinkumar & Mr.B.Ravikumar

    Abstract

    close

    Women now drive the world economy. Women are the world's most influential consumers, and their impact on the economy is rising every year. Customer Perception remains a research topic of strong interest. By keeping in view that future non-refundable income of average household people will increase, so in future their demand and need both increases. The study was carried out to assess the amount of women’s preference towards Two Wheeler Brands. The outcome of the study was based on 150 consumers selected from tiruppur city. The data required for the study have been collected through questionnaires and analysed by using statistical techniques as tools, such as Simple Percentage and Henry garrett ranking. The study pointed out that the women’s preference towards two wheeler brands.

  8. A study on factors influencing the consumers in selection of cab servicesDownload Article

    Ms.D.Shanthi, Mr.A.Venkatasalam & Mr.P.Muthudinesh

    Abstract

    close

    The purpose of this paper is to study the factors influencing the consumers while selecting cab services. The dependent variable is 'coupon redemption behavior' and independent variables are innovativeness and price consciousness. The relationship between dependent and independent variables are empirically verified through statistical methods. The statistical tools like correlation, regression and descriptive statistics are used for data analysis. It is found from the study that consumers are interested to redeem coupons while selecting cab services. It is also revealed from the study that consumers are comfortable to redeem coupons through mobile apps while booking cab services.

  9. A study on Impact of Mobile phone Addiction on Adolescent’s Life in Erode DistrictDownload Article

    Dr.V.Manimegalai, Mr.B.Panneerselvam

    Abstract

    close

    Mobile phone usage is so strongly integrated into young people‘s behaviour that symptoms of behavioral addiction, such as mobile phone usage interrupting their day –to-day activities. Main aim of this paper is there views investigate some aspects of the emerging literature on the impact of mobile phone on adolescent’s life. There are several reviews addressing the definition ,Mobile phone addiction symptoms, Assessment of Mobile phone addiction, Negative effect of Mobile phone addiction on adolescents and some reviews addressing the role of Mobile phone addiction on adolescent’s mental and physical health.

  10. A study on raise in incidence of cancer in Erode districtDownload Article

    Mr.N.Thamil Chelvam, Ms.C. Varshini & Mr.C.Manoj Kumar

    Abstract

    close

    Cancer is a collection of various diseases characterized by abnormal cell growth. Lung cancer is the top cancer killer and smoking remains the leading preventable cause of death. Furthermore, major disparities in smoking and lung cancer exist by education, income, and race/ethnicity. While tobacco control policies are the most effective strategies to prevent lung cancers, lung cancer computed tomography (CT) screening has also been shown to reduce lung cancer risk among heavy current and former smokers. The Cancer Intervention and Surveillance Modeling Network (CISNET) lung group develops and applies population models for lung cancer, quantifying the impact of tobacco control and CT screening on lung cancer and all-cause mortality. To date, this work has focused on the country as a whole and has yet to account for tobacco and lung cancer disparities by subgroup and region. The smoking and lung cancer models will incorporate other factors that reflect different smoking risks such as race/ethnicity, education, income, and geographic location. This will allow for analyses of the effects of tobacco control policies on smoking prevalence in relevant high-risk groups, and estimation of the impact of policies on health disparities in smoking and lung cancer outcomes.

  11. A study on job satisfaction of teachers working in the private school with reference to erode districtDownload Article

    Ms.K.Nathiya, Ms.N.Lavanya & Ms.P.Sandhiya

    Abstract

    close

    Job satisfaction refers to the general attitude of employees towards their present job. Job satisfaction probably is the most widely studied variable. When the attitude of an employee towards his or her job is positive, there exists job satisfaction. Dissatisfaction exists when the attitude is negative. Job satisfaction often is a collection of attitudes about specific factors of the job. In present study, the researcher investigated the present level of job satisfaction among the private school teachers in Erode district. The main aim was to explore the socio-economic status and to identify the satisfaction level of the teachers working in private school in Erode district. For this purpose, 160 Private teachers working in different private schools around Erode were collected using simple random sampling technique. The obtained data were analyzed based on the descriptive statistics using SPSS Version. The data collected was analysed using simple statistical tools like Percentage Analysis, Chi-Square Analysis and Weighted Average Method was used. The findings of the study are limited to only Erode district.

  12. A study on advertisement effectiveness of Airtel mobile service with special reference to erode districtDownload Article

    Ms.D.Shanthi, Mr.S. Arulprakash & Mr.V. Rajesh Kumar

    Abstract

    close

    The purpose of this paper is to study the factors influencing the consumers while selecting cab services. The dependent variable is ‘coupon redemption behaviour and independent variables are innovativeness and price consciousness. The relationship between dependent and independent variables are empirically verified through statistical methods. The statistical tools like correlation, regression and descriptive statistics are used for data analysis. It is found from the study that consumers are interested to redeem coupons while selecting cab services. It is also revealed from the study that consumers are comfortable to redeem coupons through mobile apps while booking cab services.

  13. A study on consumer preference and satisfaction towards Ayurvedic products with reference to erodeDownload Article

    Dr.V.Manimegalai, Ms.E.P.Aasamsha & Mr.P.Sathish

    Abstract

    close

    India is one of the most important countries in the world in term of floristic diversity. The Ministry of Environments and Forests, Government of India has established 8 biosphere reserves, 85 national parks and 448 sanctuaries for conservation of flora and fauna. India has a network of about 140 botanical gardens for ex-situ (outside natural habitat) conservation and demonstration of plants. Land based developmental activities provide means of livelihood, health and opportunity for employment. India has global position in the field of traditional medicines. There are about 45,000 plants species in India which are in abundant in the regions of eastern Himalaya, western Ghats and Andman and Nicobar Islands. The official documented plants with medicinal potential are 3,000 but traditional practitioner use about 8,000 vegetable drugs. India is the largest producer of medicinal herbs and approximately called the botanical garden of the world.

  14. A study on newspaper reading habit with special reference to erodeDownload Article

    Ms.S.Sudha, Mr. P.Praveen Kumar & Ms. C.Abinaya

    Abstract

    close

    Reading is primarily an intellectual activity of learning new things, developing new ideas and it provides a sense of completeness. Newspaper is a wonder of modern science it carries news and views of home and abroad to us. Newspaper reading is a habituated reading which influences readers to discover and enter the store house of knowledge in daily basis. The aim of present study is to investigate the level of newspaper reading habits of students. The target population of the study consist 1st year to postgraduate students of science commerce and arts faculties of World University of Bangladesh. On the basis of questionnaire survey the study made some possible recommendation to improve the newspaper reading habits of the respondents.

  15. A study on parents attitude towards schooling and education of children’s in erode districtDownload Article

    Ms.S. Sudha,Mr. A.Sheik Amjath Basha & Ms. K.Dharani

    Abstract

    close

    The present study was aimed at assessing attitude of parents towards the education and schooling of their children. The study analyzed the data from 150 parents, who had one or more than one school going children. The age range of the sample was 25-35 years, and these respondents all belonged to erode district consisting of huge population. A 30- item questionnaire was used for collecting data along with personal interview. The respondents were required to indicate their agree or disagreement with each of the statements about children’s education in a five-point Likert type scale, where 1 denotes strongly agree 2 denotes agree 3 denotes neutral 4 denotes disagree and 5 denotes strongly disagree. Mean scores were calculated for the male and female respondents. The findings showed that the overall attitude of the respondents was moderately favorable and positive towards schooling and education of their children’s. The study suggested that, although government endeavors at universalizing education has resulted in creating mass awareness and positive response towards schooling and education, there is a lot of scope for improvement in this regard. The study indicates the clear idea about parents attitude towards schooling and education for their children’s Future implications of the present study for policy formulation as well as for further research were pointed out.

  16. A study on factors influencing male on choosing beautification products with special reference in erodeDownload Article

    Mr.J.Tamil Arasu, Ms.T.Narmatha & Mr. M.Vijay Kumar

    Abstract

    close

    This paper focuses on the factors influencing male in choosing beautification products. The beautification product is one of the flourishing industries in erode. Like the women, now-a day, beautification is becoming a major concern for male also. The current study aims at exploring the customer groups, services and selection of beautification product in erode. Other purposes of this study are to understand the customers’ demographic profile, service consumption and spending pattern, assess the importance of different attributes that the customer consider while choosing beautification products and reveal the final factors that are important for selecting a beautification products. The cosmetics industry is dominated by the female products but there is a rapid growth in the cosmetic industry of males. I looked in to the effect of factors on males to choose beautification products. Results showed that only one factor "kind of product" has positive and significant influence on males. Finally, I have given my opinion about the findings, limitations and proposed a future research.

  17. Consumer perception on organic food products in Gobi ThalukDownload Article

    Ms.S.Sudha, Mr.G.Kumaresan & Ms.B.Sabaniya

    Abstract

    close

    Food is the means to our survival. Conversely, we are alert of the fact that the food we eat is adulterated and contaminated, the reason behind this being the use of chemicals, etc. to ripen the fruits and retain the freshness of vegetables. This can prove deadly to our health in the long run, rather than benefiting us. Ever since the environmentalists raised their apprehension regarding harmful effect of increasing use of chemicals in farming, the consumers are getting conscious and selective about edible products. This increasing awareness has caused shifts in consumers' tastes and preferences which have led to the domestic as well as global rise in demand for organic products. Awareness and knowledge has become a crucial factor in changing the attitude and behaviour of consumers towards organic foods, which in turn drives the growth in the organic food markets. This study attempted to gain knowledge about consumer awareness, perception towards organic food product consumption and how socioeconomic variables relate to consumer decision- making concerning the purchase of organic foods.

  18. A study on problems faced by farmers with special reference to Erode districtDownload Article

    Mr.K.Sivasubramani, Ms. K.Jeevapriya & Ms. V.Nandhini

    Abstract

    close

    Rural farmers account for the greater part of the population of any developing country such as Nigeria. Governments of developing countries have a major responsibility of ensuring that there is adequate rural development in their various communities and local governments which would lead to effective and efficient agricultural systems that will not only supply food and animal protein but also foster the utilization of natural resources in a sustainable manner, When the rural farmers lack access to knowledge and information that would help them achieve maximum agricultural yield, they are not only grope in the dark but are driven to the urban centres in search of formal employment, as the only option for survival (Munyua, 2000). Blait (1996) pointed out that the least expensive input for improved rural agricultural development is adequate access to knowledge and information in areas of new agricultural technologies, early warning systems (drought, pests, diseases etc), improved seedlings, fertilizer, credit, market prices etc. There have been short-comings of traditional print and library based methods (Van and Fortier, 2000) of providing such agricultural information to rural farmers who are generally illiterate and relatively remote from formal sources of information (e.g. extension stations, libraries). Aina (2007) also, was of the opinion that farmers would benefit from global information, if information centres, are cited in rural areas complete with all information and communication gadgets.

  19. A study on preference to wards online shopping among college students with reference to erode regionDownload Article

    Mr.K.Sivasubramani , Ms.V.P Shobiya & Ms. N.Kanimozhi

    Abstract

    close

    E-shopping (Electronic Shopping) is nothing but buying of purchasing goods or service online by giving online or offline payments. The specialty of E-shopping is that with a single click of computer mouse, you can order anything from the vast range of products and service. Trustworthiness of e-commerce websites makes these e-retailers more successful. Online shopping portal can attract more customers if it provides vast varieties of products, clear information, good feedback, secure online transactions, and privacy policy. Unlimited choices are made available to the customers by number of e-shops available online. E shopping made the people capable of purchasing anything through the internet. Now - a - days, not only the people who are reluctant to go to the market but also almost all people willing to buy goods and service online. Internet has made available all the things which are even not available in local market. And this is the specialty of e-commerce. There are more benefits of E-shopping rather than barriers. Because of such advantages for consumer the popularity of ‘online shopping’ is increasing day by day. And this is also main reason behind rapidly spreading online market.

  20. A study on foreign direct investment in IndiaDownload Article

    Dr.T.Vijayalakshmi , Mr.S.Sivaganesh, Mr. B.Ashok Kumar

    Abstract

    close

    Foreign direct investment plays an important role in the economic development of the country. It helps in transferring of financial resources, technology and innovative and improved management techniques along with raising productivity. An Indian company may receive Foreign Direct Investment either through automatic route or government route. The paper tries to study the need of FDI in India, to exhibit the sector-wise & year-wise analysis of FDI’s in India, to rank the sectors based upon highest FDI inflows. The results show that Mauritius is the country that has invested highly in India followed by Singapore, Japan, and USA and so on. It also shows that there has been a tremendous increase in FDI inflow in India during the year 2010 to 2015.

  21. A study of non-performing assets and its impact on banking sectorDownload Article

    Dr.N.S.Santhi, Ms.T.Padmasrimathi & Ms. G.Preethi

    Abstract

    close

    Banks plays an important role in the economic development of a country. Banks are growth-driver and the banking business is exposed to various risk, such as credit risk, liquidity risk, interest risk, market risk, operational risk and management risk. Apart from these risks the very important risk is loan recovery. The sound financial position of a bank depends upon the recovery of loans or its level of these assets. Reduced assets generally gives the impression that banks have strengthened their credit appraisal processes over the years and growth in this involves the necessity of provisions, which bring down the overall profitability of banks. The Indian banking sector is facing a serious problem of this sector. The magnitude is comparatively higher in public sectors banks. To improve the efficiency and profitability of banks need to be be reduced and controlled. Hence an attempt to be made to understand and analyze the guidelines given by RBI.

  22. Role of financing policies and financial institutions for micro, small and medium entrepreneursDownload Article

    Dr.T.Vijayalakshmi, Ms. P.Sivakavya & Ms. K.Ragini

    Abstract

    close

    The MSME sector is a significant contributor to the Indian Economy. It has emerged as a highly vibrant and dynamic sector of the Indian Economy over the decades. MSMEs not only play crucial role in providing large employment opportunities at comparatively lower capital cost than large industries but also help in industrialization of rural and backward areas, thereby, reducing regional imbalances, assuring more equitable distribution of National Income and wealth. MSME is a dynamic and highly contributing sector that nurtures entrepreneurial talent besides meeting social objectives including that of providing employment to millions of people across the country. A substantial body of research has established that the MSMEs face severe bank credit. MSMEs in the Indian economy, government has initiated various innovative financing policies for encouraging budding entrepreneurs to setup their units The researcher tries to analyze the contribution of SIDBI in the growth of MSME sector. It has been observed that in promotion and growth of MSMEs.The present research paper reveals that SIDBI is playing a very important role in promotion of MSME sector through this scheme.

  23. A study on consumer satisfaction of reliance fresh in Tamilnadu (with special reference to Salem district)Download Article

    Dr.N.S.Shanthi, Mr.S.Dhanushraj & Mr.N.Karthikeyan

    Abstract

    close

    This Research is done to get an idea of consumer satisfaction. The goal of this study is to find out the market’s customer level of satisfaction and how they satisfy the customers with the service of an enterprise. Customer satisfaction research identifies how well an organisation provide service to the customers from their point of view. And also another goal is to identify areas that still need to be improved so that those areas can be further developed. Here the data type of this study is primary data as well as secondary data. And the sample size is restricted to 120 Respondents. The data is collected by questionnaire method. And the simple average method is the statistical tool used here.

  24. A study on consumer satisfaction of reliance fresh in Tamilnadu (with special reference to Salem district)Download Article

    Dr.N.S.Shanthi, Mr.S.Dhanushraj & Mr.N.Karthikeyan

    Abstract

    close

    This Research is done to get an idea of consumer satisfaction. The goal of this study is to find out the market’s customer level of satisfaction and how they satisfy the customers with the service of an enterprise. Customer satisfaction research identifies how well an organisation provide service to the customers from their point of view. And also another goal is to identify areas that still need to be improved so that those areas can be further developed. Here the data type of this study is primary data as well as secondary data. And the sample size is restricted to 120 Respondents. The data is collected by questionnaire method. And the simple average method is the statistical tool used here.

  25. A research paper on study of human resource management systemDownload Article

    Dr.K.Jothilinga, Mr.M.Mahendran & Mr.R.Saravanan

    Abstract

    close

    The aim of this master thesis is to define human resource management system, employee performance and employee performance measurement, and also analyze the relationship between performance management system with employee performance.The purpose of this paper is to describe and analyze a unique and innovative appraisal and development system. Managing human resources in today's dynamic environment is becoming more and more complex as well as important. Recognition of people as a valuable resource in the organization has led to increases trends in Employee maintenance, job security, etc.

  26. An emprical study on fast foods and their impact on health with reference to ErodeDownload Article

    Dr.V.Manimegalai, Ms.S.Kokila Vani & Mr.K.Sabariswaran

    Abstract

    close

    Eat healthy and live healthy’ is one of the essential requirements for long life. Unfortunately, today’s world has been adapted to a system of consumption of foods which has several adverse effects on health. Lifestyle changes has compelled us so much that one has so little time to really think what we are eating is right! Globalisation and urbanisation have greatly affected ones eating habits and forced many people to consume fancy and high calorie fast foods, popularly known as ‘Junk foods’. Research into the possible health hazards on consumption of such high calorie foods has given an insight to avoid them, but unfortunately measures taken are not as effective as they need to be. Diseases like coronary artery disease and diabetes mellitus have seen a profound rise in developing countries and such unhealthy junk food consumption is one of the notable factors to its contribution. This global problem of consuming junk food on a large scale and its impact on health needs emphasis and health education which can greatly contribute to its limited consumption and switching over to healthy eating habits for the better living. Knowledge highlighting about the eating habits, nutritional aspects, quality of unhealthy foods, their health impact and preventive measures should be given to create awareness and render health education for a change towards good eating practices. Junk food and its impact on health have been reviewed from various resources and have been systematically presented, so as to emphasize its ill effects and measures to be adapted towards healthy living. Key Words: Diseases, Health, Junk food, Lifestyle

  27. Economic empowerment of women through self help groups: an empirical study from tiruvallur districtDownload Article

    Dr.S.Porkodi, Ms.P.Shalini & Dr.V.Rajeswari

    Abstract

    close

    The growing commercialisation of rural economy, increasing dependence of agriculture on external inputs, mobilizations of savings towards construction and the growing education have opened up new vistas for the micro-enterprise development in India. Self Help Groups (SHGs) have speeded up the process through credit availability and training. Many successful stories created demonstration effect among the participants. Improved fund availability and savings encouraged women micro entrepreneurs to take up new projects and to create more employment opportunities in rural areas. The SHG approach has considered to be one of the successful approach not only for economic empowerment but also social and political empowerment among rural women in India. Regular intervention by the promoters enhanced the skill formation and awareness among the participants. Economic empowerment involves access to resource, decision making and asset creation among beneficiary and community. Women being important labour force in agriculture, created ample opportunities to access rural resources and enhance the economic status of rural women. But effective resource mobilization and utilization with appropriate skill formation will be the challenge for rural women. Social and political hindrances managed by the peer learning and training among women. Though majority of research findings reveals positive impact of SHGs on rural women entrepreneurship, development of appropriate indicators for impact evaluation will be the concern. There are several quantitative and qualitative tools are developed to analyse the impact evaluation of women empowerment through micro finance. Present study will focus on measurement of financial intervention by the micro finance institution on rural women.

  28. A study on customer relationship management in restaurants with special reference to Tirupur districtDownload Article

    Mr.J.Tamil Arasu, Mr.G.Ranjithkumar & Mr.A.Arunprasad

    Abstract

    close

    The customer is the most important person for a restaurant business. The Customer relationship management is becoming one of the most fundamental aspects of restaurant business. By using CRM correctly, ensure that customer interactions efficient. CRM plays a large role in successful marketing campaigns and Restaurants can identify trends in customer habits. This study what are the factors influencing in determining customer relationship. When Restaurants are understood customer’s needs and customer expectation towards service quality, how can a restaurant decide which menu items to be brought, what specials to make, or what promotions to offer? With a strong understanding and usage of a CRM, restaurateurs can confidently make decisions about their business.

  29. A study on work life balance of working women with special reference to ErodeDownload Article

    Dr.B.Girimurugan, Ms.S.Sasikala, Mr.S.Naveenkumar

    Abstract

    close

    Work life balance is too tough to maintain for females as now there is no distinction between the rights of men and women and both have to equally share the responsibilities for better standard of living. So it becomes necessity for women to equalize professional and domestic life. In order to get views of working women a sample of 100 females were chosen. The main results of study shows that the married working women of all the sectors predominantly find it very hard to steal out time for their own hobbies or leisure activities and maintain friendships or extended relationships those women are earning more them are able to balance their life as compare to less earners. Because those are earning more, they can pay to get facilities which help them to manage their work life.

  30. A comparitive study on consumer preference towards nestle and cadbury chocolates with special reference to erode districtDownload Article

    Ms.D.Shanthi, Mr.S.Santhosh & Mr.B.Govindhasamy

    Abstract

    close

    Chocolate! Chocolate is liked and eaten by all age group of people. It may be in a form of hard, nutties, crunchy or chew. It is available in small, big and family pack. Chocolate has many shapes like as rectangle, sphere or a brick shape. It tastes like sweet and bitter. Some people have chocolate in a glass of cold coffee, or in the form of a toffee. Some people eat chocolate when they are sad; some relish them when they are happy. But I feel, to have chocolates we don't need a reason, because we can have it anytime, any season.

  31. A study on impact of celebrity endorsed advertisement on FMCG product at Tirupur districtDownload Article

    Mr.J.Tamil Arasu, Mr.M.Saran & Mr.B.Jayaprakash

    Abstract

    close

    The practice of celebrity endorsements has proliferated over time. In the past decade celebrity advertisement has been the most prevalent and successful form of advertising. Reason for this is that celebrities are considered to demonstrate a number of dynamic personality.Today one of the most prevalent forms of FMCG advertising is through the use of celebrity endorsement. In fact celebrity endorsers are being used extensively in almost all television advertisements for the promotion of different brands. Marketers invest huge amounts of money in contracts with celebrity endorsers each year, since they believe that celebrities affect the process of selling of their brands or products positively. Marketers use celebrity endorsement in order to help in easy brand recall especially during purchasing situations. Though there are many studies about celebrity endorsements, but it seems that there are limited researches about the relationship between celebrity endorsers and attitudes of the consumers. The purpose of this paper is to specify the impact of using celebrity endorsers in advertisements on purchase intensions of customers, particularly for FMCG products.

  32. A study on perception of police officials towards public in erodeDownload Article

    Mr.K.Naveen Chander, Mr.R.Deepak & Mr.K.Sethupathi

    Abstract

    close

    In this chapter we revisit and extend discussion about the perception of police officials towards public. Police efficiency includes perception of the police ability to product the public from crime and prevent from crime. The relationships have long occupied the attention of the police and the public. We survey the 21 police officials about what they think about the public.

  33. An Empirical Study on “Reasons for Tamilnadu People Facing Difficulties in Central Government Exams” With Special Reference to ErodeDownload Article

    Ms.V.Dhanalakshmi, Ms. S.Gokula Rathnam & Ms.P. Poornima Jothy

    Abstract

    close

    Directorate General of Employment & Training(D.G.E.&T.), Ministry of Labor& Employment, Government of India has been conducting the “Census of Central Government Employees” since 1960 to update the data series on Employment profiles of Central Government Employees working across the country. The report would be useful in perspective planning for framing of welfare schemes and other service facilities by the Central Government to its Employees. The statistics tells that Tamilnadu people are lagging in central government exams when compare to other states. The present study was carried out through the network of central government employees throughout the city with active support and encouragement.

  34. A study on problems faced by tribal peoples for their higher educations with special reference to MunnarDownload Article

    Mr.C.Dhaneesh, Mr.K.Marisamy & Mr.S.Vasanth

    Abstract

    close

    India is a home to a large variety of indigenous people. Education is one of the primary agents of transformation towards development. Education is in fact, an input not only for economic development of tribes but also for inner strength of the tribal communities which helps them in meeting the new challenges of life. This study describes about the problems that faced by the tribal peoples for their higher educations. The tribal are facing several serious problems. The major among these is poor economic conditions. As they have no regular source of earnings of living most of the tribal lead of poverty and a majority of them live below the poverty line. As they lead a nomadic life, their children do not get formal education.

  35. An empirical study on challenges and issues faced by the farmers in erode districtDownload Article

    D.Arul Murugavel, M.Kavin, B.Mynthan

    Abstract

    close

    Being part of the agrarian economy of India, the State of Tamil nadu has a large population dependent on the agriculture sector for their livelihood. In the agriculture sector, large population of agricultural workers (landless and small-marginal farmers) – target group of study- besides working as labourers in the agricultural fields of (big) farmers, does farming as the farmer for improving their household income. This large population being dependent on agriculture is trapped in poverty. These farming communities (landless and small farmers) had not adequately benefitted from the Green revolution and both the agriculture sector and its dependents were facing several problems and challenges caused by the Green revolution. The policy makers can take necessary measures for the well-being of the agricultural workers.

  36. An empirical study on impact of puberty among children in young age with special reference to TiruppurDownload Article

    Ms.D.Anitha, Ms.T.V.Vani & Ms.M.Sowmiya

    Abstract

    close

    Puberty is a dynamic period of physical growth, sexual maturation and psychosocial achievement that generally begins between age 8 and 14 years. The age of onset varies as a function of gender, ethnicity, health status, genetics, nutrition and activity level. Puberty is initiated by hormonal changes triggered by the hypothalamus. Dermatological problems of adolescence are mainly related to fluctuations in hormone levels mainly androgens. They include acne, hair problems and excessive sweating. The paper will teach about girl children’s proper eating habits and too prevent them from early puberty.

  37. A study on attitude and behaviour of the respondents towards public examination with reference to erodeDownload Article

    Mr.S.Arunkumar, Mr.V.Bala & Mr.K.Balaji

    Abstract

    close

    “The common reason given for introducing a public exam for Class 11 is that many schools were teaching Class 12 syllabus for students when they are still in Class 11. The failure of the School Education Department to monitor the schools cannot become an excuse for overloading a student,” opine retired headmaster and education expert.

  38. A study on factors causing relationship break-up and divorce with reference to erodeDownload Article

    Ms.B.Nivedha, Ms.M.Sowmiya & Mr.S.Udhaya Kumar

    Abstract

    close

    Divorces and Relationship Break-up have emerged as a very likely outcome of marriages and Relationship today, questioning the truth of the saying that marriages are ‘made in heaven’. The divorce rates among young couples are increasing progressively and have thus become an issue of major concern. Divorces were not so common in the past, but as time passed by, it began to be accepted as more of a common practice. Romantic relationships are a challenging endeavor that individuals seek as a primary goal to achieve in life, and when these relationships end, the termination can be detrimental and emotionally distressing. When taking a look at traditional romantic relationships, who, males or females, would handle this life-changing event worse? The stereotypical inclination would lead one to believe that women, who are more emotionally sensitive according to conventional wisdom, would handle this type of life event far worse than men because they are more relationally involved with others. Research has actually found that because men have more emotional and practical needs met in romantic relationships, they will suffer more from the ending of the relationship than do women Against conventional wisdom, men fall in love more quickly than women do, as well as actually taking relationship dissolution harder Ample evidence shows that gender differences heavily prevail within the dissolution of romantic relationships]. Men and women are socialized differently, therefore establishing a foundation in which gender differences become prevalent theoretically and socially.

  39. An empirical study on opinion of single parent culture with reference to ErodeDownload Article

    Mr.P.Giriram, Ms.V.Preethi & Ms.S.Saranya

    Abstract

    close

    A single parent is one living without a spouse and on whose shoulders lies the higher responsibility of looking after a child. The single parent is the primary caregiver with whom the children have most residency with. In most circumstances, it occurs after separation or divorce and the mother becomes the primary caregiver as the custodial parent, and the father becomes a secondary giver as the noncustodial parent. In some instances though, such roles may interchange between the parents. Single parenthood is a growing trend in today’s world; this can be attributed to increased rates of divorce, separation, mortality amongst parents and individual decisions to be single parents.

  40. An empirical study on opinion of parents towards girls educationDownload Article

    Mr.S.Anbazhakan, Ms.M.Madhumathi & Ms.S.Kiruthika

    Abstract

    close

    The present study was aimed at assessing opinion of parents towards education of girl children. Girl children educationhas a considerable influence on society, resulting in healthier and more empowered children.A 50 sample questionnaire is used for collecting data with personal interview. The paper attempts to make a through comprehensive and analytical study by exploring the educational background of the parents, different parental income, different occupation of the parents, lack of education and cultural lag of parents and effect it has on the education of girl

  41. An emprical study on reasons for infertility with reference to erodeDownload Article

    Ms.R.Dharanya & Ms.S.Nandhini

    Abstract

    close

    Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Infertility is a common problem affecting one couple in six. It can be defined as the incapacity to full fill pregnancy after reasonable time of sexual intercourse with no contraceptive measures taken. The evidence for changes in the prevalence of infertility is difficult to establish. This increase could be due to at least four factors: delayed childbearing, alterations in semen quality due to habits such as cigarette smoking and alcohol, changes in sexual behaviour and eliminations of most taboos.

  42. An emprical study on risk- factors of post- caesarean section on mothers and infants with special referance to erodeDownload Article

    Ms.K.Sivasankari, Ms.T.Malathi & Mr.C.R.Saravanakumar

    Abstract

    close

    In Today’s Scenario, approximately 30% of deliveries are performed by caesarean section. Wound infections and other post-operative complications represent a frequent morbidity which may be improved with an understanding of local risk factors. Understanding women’s perceptions towards modes of delivery in different cultures can pave the way for promoting programs and policies in support of vaginal delivery. Spinal anesthesia recently has gained popularity for caesarean section. The change in attitude that has taken place is related to an increased awareness that regional block methods are safer for mother and infant. This review has considered some complications: Nausea, headache, infections in wound , total spinal and back-ache, pain in abdomen, affecting future pregnancies, bleeding , adhesions(paining of internal organs) , breathing problems in infants , immature lungs in infants.

  43. A study on causes behind accident with reference to erodeDownload Article

    Mr.P.Sathish, Mr.T.Arunachalam & Mr.C.Ramesh

    Abstract

    close

    The number of road accidents and the Level of accidents severity Have been Extensively applied as the indicators for Measuring the efficiency of service provision in Road network systems of each country. The Main aim of this paper is to analyze the road Accidents in India at national, state, and metropolitan city level. Analysis shows that the distribution of road accidental deaths and Injuries in India varies according to age, gender, month and time. Age group 30- 59 years is the most vulnerable population group, though males face higher level of fatalities and injuries than Their female counterparts. The statistic of Accidents at construction sites give us a picture That Malaysian construction industry is one of The critical sectors that need a huge and fast overhaul from the current site safety practices.

  44. A study on problems faced by new entrepreneurs with reference to erodeDownload Article

    Mr.A. Gulab John & Ms.N.V.Dharani

    Abstract

    close

    It is now generally agreed that small businesses are one of the key engines of growth in many developing countries by contributing to employment creation. In this paper, it is argued that micro and small businesses cannot grow or succeed unless they are entrepreneurial. It is with this view in mind that this paper proposed that effort must be placed on the development of entrepreneurial behaviour in small businesses Many studies have been undertaken and have identified numerous problems as being associated with small businesses, such as lack of finance and access to it, lack of market information, lack of managerial skills and many others. Little attention however has been paid to entrepreneurs which is the underlying factor to the development of any business. Entrepreneurship is the ability to seek out opportunities and turn them to profitable businesses.

  45. Analysing the causes for meterialism among younger generation than cultural and human values with special reference to erode and GobiDownload Article

    Mr.T.Ajithkumar, Ms.K.Karthika & Ms.S.R.Luvershni

    Abstract

    close

    Materialism among the younger generation has become a hot topic among parents, educators, marketers and policy makers. This study aims at developing a model using age, sex, social comparison of consumption with friends, attention to advertising, and self-esteem to predict young people’s materialistic values. Prior research shows parents and peers are an important influence. Researchers have viewed parents and peers as socialization agents that transmit consumption attitudes, goals, and motives to adolescents. We take a different approach, viewing parents and peers as important sources of emotional support and psychological well-being, which increase self-esteem in adolescents. The most consistent finding to date is that adolescent materialism is related to the interpersonal influences in their lives—notably, parents and peers.

  46. An empirical study on reason for unhappiness in human life with refrence to ErodeDownload Article

    Mr.A.G.Mugunthakumar, Ms.K.Nandhini & Ms.S.Nandhini

    Abstract

    close

    All of us want to be happy, that we try to achieve that goal in vastly different ways. Some people find unhappiness in academic, Health, Wealth.Based on the people’s attitude the way they brought up and their environmental surrounding plays a vital role in human’s unhappiness. There is perhaps,no single way to achieve happiness, but we can at least learn from the mistakes of the others and avoid the many pitfalls along as we strive to be happy.Despite economic and social development progress in present day society, there has been an increasing dissatisfaction among many countries. This paper empirically tests the dissatisfaction among human life. Finding suggests the significant negative association between human unhappiness levels at Erode District in 2018.

  47. A study on psychogical attitude of college students during class hoursDownload Article

    Mr.R.Surya, Mr.S.Saravanan & Mr.V.Yogeshwarn

    Abstract

    close

    Several factors may affect students academic performance . This study aims to measure and study these factors using theories on academic performance.The paper aims at discussing Romanian students’ ways of thinking about learning and the factors that influence them. It is based on experimental research conducted on a group of 200 subjects, all students from various faculties of “Dunărea de Jos” University of Galaţi, Romania. A questionnaire was prepared with the aim of determining the students’ ways of thinking about learning. Among the methods of statistical assessment used, the following could be mentioned: frequency analysis, to illustrate the composition of the group of subjects; the calculation of the median for students’ ways of thinking about learning as variables.

  48. An assessment of corporate finance strategies and practices by the business organizations in EthiopiaDownload Article

    Dr.S.M.Uvaneswaran & Mr.Naod Mekonnnen

    Abstract

    close

    In the globalized world, business organizations play a role in absorbing labor, penetrating new markets and generally enhancing an enabling environment for entrepreneurship (Padachi, 2006). Most economies in both developed and developing countries acknowledge the role and importance of business organizations in generating employment, stimulating growth and creating social cohesion (Gatt, 2012). In Ethiopia, there is no clear classification of businesses organizations as micro, small, medium and large. But, parameters such as the level of paid-up capital, the number of workers employed and the level of automation are used for the classification. According to the EMTI (1997), the classification is based on the level of capital investment of the firm, while the ECSA classifies business organizations into different categories based on the number of workers employed in the firm and the level of automation of the firm. As a result, the researcher depends on the Ethiopian Income tax proclamation. The Ethiopian Income tax proclamation No.286/2002 specifies that business organizations that earn annual turnover of more than Br. 100,000 are required to keep books of accounts.

  49. A review on experiential learningDownload Article

    Dr. A. Sasirekha & Mr. S. Jayaraj

    Abstract

    close

    Recent developments in theory and research thrown light on the significance of on Experiential Learning(EL) that enhance understanding among the students. Many studies had evaluated its impact in the learning process of the students. One of the studies supports the proposition that the process of learning fundamental improvisation capability can be improved through experimental learning to generate better decision-making in uncertainty (Christopoulos, Wilner, & Bestetti, 1994). There are few things that cannot be learnt through mere reading a book or watching someone doing, such as swimming, cycling, decision making, Crisis management and so on. All such kinds of activities may only be learnt, being on the field by experimenting situations. Such experimental learning is vital for gaining wisdom. Hence, this research is intended to study the following objective: To review and understand different types of experimental learning methods. Both primary and secondary data had been used for the analysis.

  50. E-Governance: Past, Present and Future In IndiaDownload Article

    Mr.K.Sivasubramani, Ms.T.S.Keerthana & Ms.R.Hemalatha

    Abstract

    close

    Governments worldwide are faced with the contest of change and the need to reinvent government systems in order to provide efficient and cost effective services, information and knowledge through information and communiqué tools. E-Governance is E-Commerce technology means online convenience of government services. Development of any country can be judge by the scope of E-Governance in that country. Moreover, today’s government has also full faith in E-Governance and its widespread network across the world proves it. Due to widespread demand of E-governance and exponentially increasing size of data, new technologies like Open source solutions and cloud computing need to be incorporated. We have also presented an exhaustive list of E-Governance projects which is currently being used in India and in universal situation. We have provided a machinery for improving E-Governance by including technologies such as Open Source and Cloud Computing.

  51. A novel approach for animal recognition by using various recognition methods based on enhanced hybrid classifier techniqueDownload Article

    Y.Keerthana, S. Purushothaman, S. Periyathambi, P. Vanchi

    Abstract

    close

    Crops are vulnerable to wild animals. Therefore, it is very important to monitor the nearby presence of animals. Then the actuation of various devices should follow to repel the hazardous animals. Traditional methods have been widely applied depending on the kinds of produce and imperiling animals. In this paper, we propose a method to protect farms from wild animals via ubiquitous wired network devices, which is applied to farm along with traditional methods to improve the protection performance. Operational amplifier circuits are utilized mainly for the detection of animal intrusion from the outside of farms. The proposed monitoring scheme is to provide an early warning about possible intrusion and damage by wild animals. The performances of image recognition methods such as Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Local Binary Patterns Histograms (LBPH) are tested and compared for the image recognition of the input animal images. The main idea of this paper is to present an independent, comparative study and some of the benefits and drawbacks of these most popular image recognition methods. Two sets of experiments are conducted for relative performance evaluations. In the first part of our experiments, the recognition accuracy of PCA, LDA, HoG and LBPH is demonstrated. Further, a method for combining the classifier into the Minimum Distance Classifier (i.e., Cascade classifier) is done which statistically guarantees the background extraction and pictures only the object of interest. The proposed system is tested with animal database and if the wild animals are detected, then the Alerted by Buzzer.

  52. The early diagnosis of alzheimer’s disease using deep learningDownload Article

    P.Sounthariya, Dr.A.Tamilarasi

    Abstract

    close

    The accurate diagnosis of Alzheimer’s disease (AD) is essential for patient care and will be increasingly important as disease modifying agents become available, early in the course of the disease Mild Cognitive Impairment (MCI), the early stage of Alzheimer’s (AD), is used for clinical trials. Different imaging techniques have been used to help diagnose the disease. A few of them are magnetic resonance imaging (MRI), computed tomography, positron emission tomography. These features from MRI and PET images are extracted for diagnosis. Fusion of these features can improve the accuracy of diagnosis. Due to some defects of original PCNN for data fusion, the dual channel PCNN is used to implement multimodal image fusion. This method gives additional features for better diagnosis of AD.

  53. Experimental investigation on high strength concrete by using GGBS and polycarboxylate etherDownload Article

    J.Navin, S.Santhiya, V.Susi, B.Yeswanth Kumar ,Mr.S.Gnana Venkatesh

    Abstract

    close

    Concrete is a mixture of cement, fine aggregate, coarse aggregate and water. Concrete plays a vital role in the development of infrastructure Viz., buildings, industrial structures, bridges and highways etc. leading to utilization of large quantity of concrete. On the other side, cost of concrete is attributed to the cost of its ingredients which is scarce and expensive, this leading to usage of economically alternative materials in its production. This requirement is drawn the attention of investigators to explore new replacements of ingredients of concrete. The present technical report focuses on investigating characteristics of concrete with partial replacement of cement with Ground Granulated Blast furnace Slag (GGBS) and fully replacement of R-sand with M-sand. The topic deals with the usage of GGBS and advantages as well as disadvantages in using it in concrete. Here polycarboxylate ether is used to reduce the water content. Tests are carried at 7days, 14days, 28days.

  54. Experimental Investigation on Foundry Sand Paver Block with addition of Polyethylene Terephthalate FibreDownload Article

    M.Suriya, V.Sabarinathan, S.Rajeshkumar, M.Sivakumar, M.Yeswanth

    Abstract

    close

    In this experimental investigation compressive strength and water absorption of paver block were evaluated by replacing portion of M-Sand with the Foundry Sand. Polyethylene Terephthalate fibers were also incorporated along with the Foundry Sand to further enhance the mechanical properties. The different proportions of Polyethylene Terephthalate fiber starting from 0.4% by weight of materials. 10% to 30% by weight of M-Sand was replaced with the Foundry Sand. From the test results obtained the optimum Polyethylene Terephthalate fiber and Foundry Sand content from test results was found to be 0.5% and 25% by weight respectively.

  55. Comparison between strength of concrete by using M sand and copper slagDownload Article

    T.Jagadeesh, P.Praveen Kumar, S.Mariappan, E.Srithar, Mr.S.Gnana Venkatesh

    Abstract

    close

    The paper reports the effect of concrete using copper slag and M-sand as fine aggregate replacement. In this project work, the concrete grade M60 was selected and IS method was used for mix design. The properties of materials for cement, fine aggregate, coarse aggregate, copper slag and M-sand were studied for mix design. The various strength of concrete like compressive , split tensile , flexural were studied for various replacement of fine aggregate using copper slag and M-sand that are 0%,10%,20%,30%,40%,50% and 60%. The maximum compressive strength of concrete attained at 40% replacement of fine aggregate at 7, 14 and 28 days. The split tensile strength and the flexural strength were also obtained higher strength at 40% of replacement level at 28 days.

  56. Experimental investigation on replacement of sand by quarry dust in fly ash bricksDownload Article

    Hari R, Karthick V, Kathiravan S, Lingeshwaran C

    Abstract

    close

    Although the use of fly ash has many advantages, its low hydration at early stage causes the strength to be low. In this study, the experimental investigation was carried out to find the optimum mix percentage of fly ash brick. However the brick specimen of size 235mm x 115mm x 65mm were cast for different mix percentage of Fly ash (15 to 50%), Gypsum (2%), Lime (5 to 30%) and Quarry dust (45 to 55%), compressive strength were studied for different mix proportions. The results shows the variation of compressive strength for different mix proportions of materials mentioned earlier at different curing ages. From the results it was inferred that, the maximum optimized compressive strength is obtained for optimal mix percentage of Flyash-25% Lime-20% Gypsum-2% Quarry dust-53%.

  57. Evaluation of ground water quality and its suitability for drinking and agriculture purposes in erode taluk, tamilnadu, indiaDownload Article

    M. Prabahar, S. Saravanaganesh, S. Dineshkumar, T. Vijayashankar

    Abstract

    close

    Groundwater quality of the Erode taluk was assessed to understand the contamination processes due to the presence of various contaminant sources and the suitability of groundwater for drinking and irrigation purposes. Ten groundwater samples have been collected from Erode taluk of Tamilnadu state of India. Their physicochemical parameters like colour, odour, turbidity, TDS, EC, pH, TA, TH, Ca2+, Mg2+, Na+, NH3+, NO2+, NO3-, Cl-, F-, SO42-, PO42- and DO were assessed. The results were compared with the drinking water guidelines of Indian Standard (IS) and World Health Organization (WHO). The important constituents that influence the water quality for irrigation such as Electrical Conductivity (EC), Total Dissolved Solids (TDS), Sodium Adsorption Ratio (SAR), Magnesium Adsorption Ratio (MAR), Kelly’s Ratio (KR) and Soluble Sodium Percentage (SSP) were assessed and compared with standard limits.

  58. Experimental investigation on glass fibre concrete with partial replacement of cement by fly ashDownload Article

    Kavin.G, Kaviraj.T.R, Mogesh.S, Mugesh.V, Yeswanth.M

    Abstract

    close

    Fly ash has been used as a mineral admixture in cement and concrete. Using it provides several advantages, such as improved strength and workability properties, and environmental benefits related to the disposal of waste materials and to reduced carbon dioxide emissions. Alkali Resistant glass fibres are used as additional reinforcement of concrete. Glass fibres acted as good crack arrester and increases split and flexural strength not increase in compressive strength. M30 grade of concrete is used for this study. The main objective of this work is to study the suitability of the fly ash as a mineral admixture for cement replacement and additional reinforcement of glass fibres in concrete. Fly ash as partial replacement of cement and glass fibres are used as additional reinforcement, which satisfies the various structural properties of concrete like compressive, split and flexural strength. From the entire study it is concluded that mix M3 (10%FA+0.15%GF) is the best combination among all mixes, which gives maximum, tensile strength, (10% FA + 0.15% GF) shows better flexure strength and mix M3 (5% FA + 0.10% GF) is shows good compressive strength at 28 days over normal concrete. There is no increased compressive strength at 7 days and split tensile strength in fly ash mixes.

  59. Experimental investigation on partial replacement of coarse aggregate by ceramic waste in concreteDownload Article

    Ashraf Ali.M, Jagadeesh.P, Jeevanantham.S, Ramesh.S, Tharanya.S

    Abstract

    close

    Use of hazardous industrial wastes in concrete-making will lead to greener environment. In ceramic industry about 30% production goes as waste, which is not recycled at present. In this study an attempt has been made to find the suitability of the ceramic industrial wastes as a possible substitute for conventional crushed stone coarse aggregates. The behaviour of ceramic waste aggregate is studied in two states, fresh state and hardened state. In fresh state, workability studies are studied with slump cone test and compaction factor test and in hardened state, strength of the CWA is studied with compression test, tensile strength and flexural strength are found for ceramic waste when adding in different percentage. The obtained results are compared with M25 grade conventional concrete.

  60. Experimental study on strength property of concrete by partial replacement of fine aggregate with dolomite powderDownload Article

    R. Dharsana, D. Logeshwari, M. Monisha, C. Manoj Kumar, P.Karthika

    Abstract

    close

    Concrete is a building material made from a mixture of broken stone, sand, cement and water which can be spread into moulds. M60 grade of concrete is used in the mix ratio of 1:1.2:1.58. Dolomite powder is replaced for fine aggregate in the ratio of 10%, 20%, 30%, 40%. The compressive, split tensile and flexural strengths of concrete with dolomite powder were compared with those of the conventional concrete. The results indicate that replacement of fine aggregate with dolomite powder at 30% increases the compressive split tensile & flexural strength of concrete.

  61. An experimental investigation on brick by partial replacement of red soil with copper slag and sculpture wasteDownload Article

    Amit Kumar Suman, Boopathi. A, Sathyaseelan.G, Somasundharam.S,P.Karthika

    Abstract

    close

    Since the large demand has been placed on building material industry especially in the last decade owing to the increasing population, increase in infrastructure and also increase in new infrastructural projects. which causes a chronic shortage of building material; the civil engineering has been challenged to convert waste to use full building and construction material like brick.Recycling of such waste as raw material alternative may contribute In the exhaustion of the natural resources which will help to create awareness toward clean environment.In the review of utilization of those waste, this paper reviewed recycling various waste like copper slag and sculpture waste with Red Soil in Brick. All mixtures are subjected to oven curing until the testing age. However the brick specimen size is 220mm x 100mmx 100mm. Compression strength, Soundness, hardness test, water absorption test were conducted at 7, 14 and 28 days.

  62. Optimal design of R.C beams using neural networkDownload Article

    Mrs.Karthiga.N, Mohanraj A

    Abstract

    close

    Beam elements are designed and the total cost of each of these has been estimated. The grade of concrete has been varied from M20 to M40 and grade of steel varied from Fe 250 to Fe 550. The singly reinforced beams have been designed for various values of live loads and adopting the ratio of b/D from 0.4 to 0.9. In this paper, it is shown that how the decision variables like b, D, Fck, Fy, Asprov, Mu, Vu etc contribute in the optimal design of structural elements, the Main Objective of this paper has been finalized Minimizing Beam Element Total Cost (BETC). Material and labor and formwork costs are also found out. This paper deals with designing a low cost of RCC beam in MATLAB. The results from the software and the results from manual design are compared and finally the optimal design of the beams is explained in detail from the various graphs obtained from both the sources.

  63. An experimental study on concrete with partial replacement of fine aggregate by vermiculite and silica fume as a mineral admixtureDownload Article

    L.Arun, K.Kowsalya, S.Madhumathi, K.Preethi, R.Pradheepa

    Abstract

    close

    Concrete is the single most widely used construction material in the world. Concrete is used in such large amounts because it is simply, a remarkably good building material. Aggregates generally occupy 60 to 80 percent of the volume of concrete and greatly influence its properties, mix proportions and economy. Use of vermiculite in concrete, enhances the shrinkage and crack resistance, fire resistance and reduces environmental impact and also reduces the cost. Important characteristics of a good quality aggregate include resistance to abrasion, resistance to freeze/thaw action, resistance to sulfates, correct shape and surface texture, proper gradation, density, and compressive and flexural strength. The main purpose of the research is to study the strength parameters such as compressive strength, split tensile & flexural strength of concrete using vermiculite as partial replacement with 10%, 20% and 30% by weight and silica fume (SF) as adding of 5%, 7.5% and 10% by weight of cement. The main aim of this study is to make economical and eco-friendly concrete.

  64. Replacement of cement using eggshell and fully replacement by red sandDownload Article

    T.Prasanth , B.Sasidharan ,M.R.Udhayakumar ,V.Yuvasakthi, A.Abdul Hameed

    Abstract

    close

    Due to rapid urbanization, construction materials in developing countries has necessary research to use of alternative materials in civil engineering field. Concrete produced by mixing cement, fine and coarse aggregate allowing that mix to hard. The use of waste or alternative components mixed potentially pozzolanic reactivity can improve strength and properties of concrete. Egg Shell Powder and red sand is used as a substitute or mixture in cement and sand. Therefore the entire egg shell and red sand product is used in an efficient and eco-friendly.

  65. Treatment of textile waste water by natural coagulantDownload Article

    A.Sangeetha, E.Tamilarasan, T.Tamilmani, M.Yuvasri4, Mr.P.Shankar

    Abstract

    close

    In this project, preliminary investigation was carried out for the possible use of natural coagulants for treatment of waste water. The industrial wastewater were treated by coagulation-flocculation and sedimentation using dyeing water extracts of Opuntia- Ficus Indica Gel as primary coagulant. The quality of the treated wastewater was analyzed and compared with Alum and gel. The experiments were conducted at various dosages of the dyeing water extract of Opuntia- Ficus Indica gel using jar-test experiment. The optimum dosage of the coagulant dosage was identified. Parameters of quality of the wastewaters were measured before and after the treatment to evaluate the removal efficiency on the major pollutants of concern in waste water treatment, such as BOD, pH, TDS, Turbidity, Hardness, Alkalinity, and Chloride. Result showed that the Opuntia- Ficus Indica gel were efficient as a primary coagulant in wastewater treatment and maintains pH. From the observed results, the Cactus is a suitable dyeing effluent. Compared to Alum, natural coagulants (Cactus Gel) gives better results.

  66. A Study of Value Engineering Practices in Wall Construction of a Residential BuildingDownload Article

    Sathiyapriya Venkidusamy, Dr.P.S.Kothai, S.Khaviya

    Abstract

    close

    Construction industry plays a vital role in an economical aspect all over the world as an integral part of the development of a nation. The most important factor which affects the people is shelter. Shelter is very essential to everyone. Due to over population and increasing occupants of migrated people, the necessity to occupy the constructional building seems to be gradually increased. To avail the economical residence and work place to all with good quality assurance at a low cost might be tedious. The increasing demand for cost effective and quality parameters of the construction of any type of building leads to develop the new advanced technologies to overcome the drawbacks in the construction fields. Construction is one of the significant sectors of an Indian economy with involving a complex process including Architectural planning, Engineering design and tedious execution. As by realization the quality and cost should be achieved in an acceptable manner depends upon the type of building to be construct. Hence this project involves detailed cost estimation and quality analysis for walls of a building such as by using brick wall, precast wall panels and by MIVAN formwork with the help of Value Engineering concept. This paper describes the comparative analysis of conventional wall construction, precast wall construction and MIVAN formwork on the basis of cost and quality parameter.

  67. Comparative analysis of grey water using vermifilter & non-vermifilterDownload Article

    Karmughil S, Karthika P

    Abstract

    close

    In this paper efforts are made to investigate the potential application of Vermifiltration for the treatment of grey water canteen & hostel of Nandha Engineering College,Erode.Water scarcity is one of the major problems faced by today’s world. Vermifiltration is a treatment method that combines the conventional filtration processes with the vermicomposting techniques. Vermifiltration was used for the treatment of domestic wastewater using earthworm species. The main aim of the project was to study the efficiency of the vermifilter & non vermifilter in the removal of various parameters such as COD (Chemical Oxygen Demand), BOD (Biochemical Oxygen Demand), TDS (Total Dissolved Solids), TSS (total suspended solids), Turbidity and Ph from the grey water.

  68. A comparision study on sandcrete blocks WTH partial replacement of fine aggregate using agro-wasteDownload Article

    I.Abarna, T.N.Gayathri, V.Iswarya, K.Keerthini

    Abstract

    close

    This paper presents the experimental study on sandcrete blocks prepared by partially replacing sand with saw dust, ash, rice husk ash. Influence on compressive strength, water absorption capacity and density characteristics are studied by partial replacement percentage of sand with sawdust, ash, rice husk ash. This project with of saw dust, ash, rice husk on solid block ratio of 1:3:8 cement: fine aggregate: coarse aggregate. The result of the various tests are sufficiently encouraging and author suggest to manufacture sandcrete block prepared in proportion of (80% sand+20% saw dust)since compressive strength for this ratio is found to be 4.5 N/MM2 under curing condition and provides optimum & desired result.It also resulted in reduction of heat transfer of sawdust concrete. In the designed concrete the sand was admixture with 20% of saw dust, ash, rice husk. The mechanical properties such as compressive strength were tested for conventional block.

  69. Comparitive study of pre engineered and conventional industrial buildings Download Article

    C.Mohanraj, V.Preetha

    Abstract

    close

    The structural Concept of Industrial Buildings is planned mostly as steel buildings. In that Pre-Engineered buildings are being desired over conventional buildings for industrial construction due to its economy and fast construction. Pre Engineered Buildings are engineered at a factory and assembled at site. The pre-engineered building system is one of the fastest mounting building systems in the world. Long Span, Column free structures are the most essential in any type of industrial structures and Pre Engineered Buildings (PEB) fulfils this requirement along with reduced time and cost as compared to conventional structures. After introducing the concept of pre-engineered building (PEB), the design helps in optimizing the materials involved in the design. The adoptability of PEB in the place of Conventional Steel Building (CSB) design concept resulted in many advantages, includes economy and easier fabrication. Possibilities of long span column free structures are more essential for industrial structures. PEB concept is versatile not only due to its quality pre-designing and prefabrication, but also due to its light weight and economical construction. The concept includes the technique of providing the best possible section according to the optimum requirement. This paper is a comparative study of PEB concept and CSB concept. The study is achieved by designing a typical frame of a proposed Industrial Warehouse building using both the concepts and analysing the designed frames using the structural analysis and design software Staad.Pro.

  70. Assesment of water quality in and around Perundurai town erode districtDownload Article

    Ajith.P, Gokul Giri.S, Jijendran.P.S, Karthika.P

    Abstract

    close

    In this project we are considering an area of around 5kms in radius from our college. From this we are collecting water samples throughout the routes of water network for conducting various tests. To enhance water quality monitoring in a drinking water network sampling stations are installed along the route of water network. Water sampling stations are connected to next water main and have a little sink. Water samples are analyzed for bacteria, chlorine level, pH organic and inorganic pollutants, turbidity, odour and many other water quality indicators.

  71. GIS technique for surface water contaminationDownload Article

    Sanjitha R and Arun M

    Abstract

    close

    The three-forth of the world is surrounded by water, out of which around 1% of water can only be able to use for the drinking purposes. Water is essential for life and access to clean drinking water is a necessity for good health. However, clean drinking water is not available everywhere, due to water scarcity and pollution of existing water resources. At present Capetown city of Southafrica is facing water scarcity problem. The pollution can be in the form of natural or anthropogenic activities. This study focuses on the Impact of anthropogenic activities on the water quality of 4 downstream water tanks in Coimbatore city and its contribution to the groundwater quality. Due to encroachment and other anthropogenic activities, the quality of water is being depleted rapidly. Disposal of municipal waste and waste from other various industries into the tank depletes the quality of water in the tank. This water along with the leechate may percolate through the pore spaces between the soil particles and interact with the groundwater. Because of this interaction the quality of groundwater will also be affected. The contaminants will be transported and contribute to the nearby well head and affect the quality of water in the well too. Therefore, in this study water quality parameters were tested for both tankwater and groundwater and was spatially interpolated using ArcGIS. The spatially interpolated water quality map was obtained as output from ArcGIS. This spatially interpolated water quality map was helpful in understanding the variation in quality of both tankwater and groundwater with respect to space.

  72. Sustainable organic biomass by using dying biological sludge and coir pithDownload Article

    C.Kamaleshan, A.Suriyaganesh, M.E.Ranjith, K.Selvi

    Abstract

    close

    Currently, fossil fuels such as oil, coal and natural gas represent the prime energy sources in the world. However ,it is anticipated that these sources of energy will deplete within the next 40-50 years. moreover, there are expected environmental damages such as the global warming, acid rain and urban smog due to the production greenhouse gases. The project focuses a fairly exhaustive review of contemporary literature on the subject into a comprehensive, polished definition of sustainable development. Terminology in the field of sustainable development is becoming progressively more important, because the number of terms continues to enhance along with the rapid increase in awareness of the importance of sustainability. The significance of this project is to concentrate on thermal application of biomass briquette at various industrial purposes. Reduction of green house gas emission , convert organic waste in to a product , residue-reused and minimize deforestation.

  73. A descriptive study on workers safety in construction industryDownload Article

    Kavitha.S, Manoj.S

    Abstract

    close

    The paper analyses and inquires about points to assess and find the record for safety execution in development of construction industry also discusses in detail about the number of accidents and injuries taking place in construction sites. The preliminary data for this research was collected through a literature review and the use of a questionnaire survey targeted at workers in some construction projects in India. The study highlights the importance of safety performance in the construction industry, and the main factors affecting workers safety in the construction industry are falling from high heights or scaffolding, getting caught in between objects or materials, electrocution accidents, overexertion. A questionnaire is designed based on safety factors which affect the worker's safety management in a construction firm. Based on the responses collected, the analysis will be done using SPSS software with the inference made from the responses suitable suggestions and recommendations on practical counter measures to improve workers safety management in construction site are proposed.

  74. Experimental investigation of rice husk ash brick using M-Sand and F2R cement with perma plast ACDownload Article

    Mathiyalagan.S, Mohanram.T, Naveenkumar.K, Sathyaprabhu.M, Gowtham.S.K

    Abstract

    close

    In this study of investigation of rice husk ash, it can be used in preparation of rice husk ash brick. Engineering properties like compressive strength ,water absorption ,size and shape have been studied. .F2R cement is special used for increasing the workability for M-sand. M-sand is used to satisfy the carsity of river sand. Since rice husk ash has more absorption of water, to minimize the water absorption Perma plaster AC is used .From the studies it is observed that optimum proportion for RHA + M-sand + F2R cement was observed as minimum 30% of RHA .when compared to all other possible proportions after 28 days curing period the rice hush ash brick achieve nominal strength compare to clay brick.

  75. A descriptive study on factors influencing ergonomics in construction labour productivityDownload Article

    P.Jagadeesh, P.Dinesh Kumar

    Abstract

    close

    Labor productivity has a significant impact on time, cost, and quality of a construction project. Especially the competitive environment of the construction industry forces construction companies to increase their labor productivity values in order to keep their positions in the industry. In this respect, identification and evaluation of factors that affect the labor productivity becomes issue for industrial practitioners. In the academic literature, there are many studies that investigated these factors and their relationships with the labor productivity. In these studies, the factors were divided in to different categories. In a workstation the labor productivity gets affected due to discomforts and several other factors such as forceful exertions, repetition duration, vibration in site, working environment, tools and materials, stress and pains, accommodation for labors. The factors are identified from literature study and using these factors a questionnaire survey is to be conducted among the labors in various construction projects and analysis is carried out by SPSS software.

  76. Experimental study on partial replacement of cement by hyposludge in concreteDownload Article

    M.Vetrivel, M.Ravindaran, P.Naveen Kumar, R.Raguram, K.C.Denesh

    Abstract

    close

    The global cement industry contributes about 9% of greenhouse gas emission to the earth’s atmosphere and industrial wastes are being produced by 420 million tonnes per annum by chemical process in India. In order to reduce cement manufacturing and disposal problem of paper waste, there is a need to develop alternative binders in construction field. Utilization of industrial waste products as Supplementary Cementitious Material(SCM) in concrete is very important aspect in view of economical, environmental and technical reasons. This work examines by using paper waste (hypo sludge) as partial replacement of cement & it is most essential to develop profitable building materials from hypo sludge. It is directed towards developing low cost concrete and light weight concrete from paper industry waste. The use of hypo sludge in concrete formulations as SCM was tested as an alternative traditional concrete. These tests were carried out to evaluate the mechanical properties like compressive strength and spilt tensile strength up to 7 days and 28 days. In this work,M30 grade concrete was developed by replacing cement via 10%,15%,20%,25% and 30% of hypo sludge. The strength on concrete made with hypo sludge are compared with normal concrete.

  77. Implementing stress management techniques among middle level managers in construction industriesDownload Article

    R.Praveen, N.Nandhini

    Abstract

    close

    A Site Engineer is exceptionally vital for a Construction venture. The duties of a Site Engineer are wide as he should give adequate guidance and supervision when they are any specialized issue, legitimate administration and furthermore readiness of day by day advances reports of Construction works. The site engineers must possess certain basic roles and responsibilities for the execution and completion of the project. Within this contexts, the site engineers in the construction project are highly stressful due to conflict of boundary condition, Inadequate room for innovation and bureaucracy purpose, Communication problem among project team members, Poor crisis management mechanisms, Shift works and Over workloads are involved during implementing the plan in Construction sites. The main Objectives of my project is to identify the major Stressors influencing the stress through Questionnaire survey conducted among Site Engineers at various construction sites and to analyzing those factors using Statistical Tools. Finally to implement some Stress Management Techniques to manage these stress and also recommended some personal characteristics to improve their leadership level in construction projects.

  78. Experimental investigation of pervious concreteDownload Article

    Divya.A, Gowthamraja.K.S, Hemalathaa.S, Jaiyanth.R.B, Pradheepa.R

    Abstract

    close

    Pervious concrete is one of the most promising sustainable materials. Nowadays, Pervious Concrete is a light-weight concrete produced by omitting the fines from conventional concrete also known as “No-fine Concrete” or “Porous Concrete” is a material comprised of narrowly graded coarse aggregates, cement materials, water and admixture are used. In this paper pervious concrete with admixture is used to analyze the property strength, durable, permeability of pervious concrete. The most important property of pervious concrete is its drainage facility through permeability. The use of titanium di oxide is found to enhance the permeability in pervious concrete by oxidizing the pollutants and helping in washing down the clogged particles from the pores during rainy season.

  79. Effective utilization of microorganisms in decomposal of soild wasteDownload Article

    Ajithkumar.T ,Arunprakash.S, Gopalakrishnan.T,Gowthamraja.K.S, R.Pradheepa

    Abstract

    close

    EM or Effective Microorganisms is a microbial inoculant containing many kinds of naturally occurring beneficial microbes. Maple EM-1(Expired and Non-Expired) is activated using ricewater and jaggery separately. Fruit and vegetable wastes were collected and inoculated with Activated Non expired Jaggery EM, Activated Non expired Rice water EM, Activated Expired Jaggery EM and Activated Expired Rice water EM respectively. The physical (Odour, Appearance and Colour) chemical (pH, Salinity, Conductivity, TDS, DO, BOD and Temperature) and biological (Population of Coliforms including E.coli, Lactobacillus population, Yeast population and Actinomyces population) parameters of leachate from each sample are examined at an interval of 7 days. There was a generation of alcohol and vinegar like smell in the due process other than non offensive smell. Chemical parameters such as pH, TDS (Total Dissolved Solids) and BOD shows a declining trend. An increase in Salinity, conductivity and Dissolved Oxygen (DO) was also observed. While analysing the biological parameters a steady decrease in Non EM organisms are seen. Lactobacillus, Actinomyces and yeast populations almost doubled within 14 days compared to control. It can be concluded that jaggery is the best activator of Maple EM-compost a method of waste disposal at a low cost.

  80. Cellular light weight concreteDownload Article

    Hariharan.D,Jayanth.G, Karthickvelmurugan.K,Prasanth.K

    Abstract

    close

    cellular light weight concrete (CLWC) is not a new Invention in concrete world. It has been known since ancient times. Cellular light weight concrete is a versatile material which is made up of cement, fly ash,MSandand foam basically it is new material which is currently using in India for walling purpose. Cellular light weight concrete gives better sound insulation, durable, lightweight, uniform size and safe, reducepermeability. The usage of cellular light weight concrete blocks gives a prospective solution to building construction industry along with environmental preservation. Cellular concrete is popular because of its light weight which reduces self-weight of a structure. Cellular light weight. Concrete blocks are casted with the proportion of Mix1, Mix2,Mix3 and Mix 4.To check properties of these cellular light weight concrete blocks test like compressive strength, flexural strength and split tensile strength is done in the laboratory

  81. Preparation of contouring, hill shade and slope map of erode district by using QGISDownload Article

    M.Rathipraba, K.Puhalzhenthi, K.Preethi, Mr.V.Sampath Kumar, Mr.S.Manoj

    Abstract

    close

    Digital terrain attributes derived from digital elevation model (DEM) such as elevation, slope, hill shade, contour and other aspect are widely used to determine the influence of topography on different environmental and human processes .Contour map is mainly used for locating suitable area for providing check dams and any other construction. The advent of publicly available DEM data has provided a cheaper, low-cost alternative to traditional field data collection and survey. Handling, processing, and visualization of such data on an open-source software will provide researchers and specialists a better and faster way of generating digital terrain maps and creating input data for other analyses. This paper demonstrates the methodology of combining the use DEM and other functionality of QGIS to develop terrain maps for Erode district.

  82. Experimental investigation on replacement of cement by waste paper sludge ash in concreteDownload Article

    P.Jaisurya, S.Yuvaraj, Mrs.S.Sarankokila

    Abstract

    close

    Waste Paper Sludge Ash (WPSA) is a waste material collected from the Paper Industry. WPSA is used as cement replacement in producing mortar and was investigated on its chemical, physical and mechanical properties. Construction material with natural resources now become limited and causes of air pollution and environmental problems,This work examines the possibility of using waste paper sludge ash as partial replacement of cement for new concrete .In this study waste paper sludge ash was partially replaced as 5%,10%,15%,20% and 25% in place of cement in concrete for M-40 mix tested for its compressive strength,tensile strength and water absorption up to 28 days of age and compared with conventional concrete.Form the result obtained ,it is found that Waste Paper Sludge Ash can be used as cement replacement up to 5% by weight and particle size less than 90μm to prevent decrease workability.

  83. A study on factors involved in equipment quality and management in ready mix concreteDownload Article

    R. Karthik Prabhu, K. Sampath Kumar, P. Kulanthaivel

    Abstract

    close

    In development ventures, quality, time and cost are the principle factor for its prosperity. Accomplishing great quality in scheduled time and planned cost is one of the harder errand. The utilization of ready mix concrete for the development activities will diminish the time with a little variation in cost. The part of ready mix concrete in huge ventures, high innovation structures, dams, and modern structures and so on keeps on developing quickly. Conforming to the laws ought to be on accomplishing ideal equipment quality and transportation in ready mix concrete. Thus, equipment quality management integrates and continuously interacts with human, technical, financial, and production system in order to achieve efficiency and quality in transportation. This task includes an investigation on factors associated with equipment quality administration and quality transportation which are impacting in ready mix concrete. It clarifies quickly about the question, nature, extent of study, devices utilized for consider, need of study and gathering information from settled ready mix concrete plants in India. This proposal depicts equipment arranging, determination, appropriateness, support administration, wellbeing administration, save part administration, user training, nature of materials, mix design, hardware condition, geography and climate conditions. The major prudent steps for support of equipment have considered for dealing with the upkeep capacity of equipment in the ready mix concrete plants.

  84. Mechanical and durability properties of concrete by partial replacement of fine aggregate by RFA and cement by silica fumeDownload Article

    K.Ragavi, D.Sudhakar, E.Jesuraj, V.Bhuvaneshwari, K.U.Mani Kandhan

    Abstract

    close

    In India, traditionally river sand is used as fine aggregate in concrete production. However, due to continuous exploitation of river sand, its availability has become scarce. Construction industry has started using alternate materials as fine aggregate. Out of which manufactured sand is one of the popularly used material as fine aggregate. Materials such as recycled concrete aggregate have issues of dumping and environmental pollution. These materials are viable alternatives for replacement of natural river sand. Recycled concrete, if used as coarse aggregate has problems of water absorption and reduction in strength. Hence, an attempt has been made in this research to use recycled concrete aggregate (RCA) as fine aggregate in concrete. Further, use of RCA as fine aggregate in concrete may reduce the compressive strength of concrete. Hence, it is proposed to use silica fume as a supplementary material in cement with Recycled Fine Aggregate (RFA) as fine aggregate. This study investigates the effect of silica fume and RFA on the mechanical characteristics of concrete mixtures. Mechanical properties and durability properties at 28 days are determined. Silica fume is added to cement in the range of 7.5% and 10% by weight of cement. Natural river sand is replaced with RFA (Recycled Fine Aggregate) in the range of 0%, 50%, 100% by weight of sand. From the study it is found that RFA could be used as alternative material for natural sand. However, as complete replacement of RFA reduces the strength of concrete, silica fume addition is mandatory. A minimum of 7.5% silica fume is required to prevent strength loss in concrete.

  85. Performance of concrete by partial replacement of cement by silica fume and fine aggregate by ground Granulated blast furnace slag Download Article

    P.Vinothini, V.Nithya Prabhu, R.Deepak, B.Parasuraman, K.U.Mani Kandhan

    Abstract

    close

    The Average of River sand for construction has various undesirable and ecological consequences. As a solution for this industrial waste such as Ground Granulated Blast Furnace Slag (GGBS) can be used to replace partially by sand and cement by Silica fume. This research aims to investigate possibility of replacing GGBS as a sand substitute in concrete. In this investigation, natural sand was replaced by GGBS in various percentage (10%, 20%, 30%, 40% and 50%), with water cement ratio of 0.4 and cement was partially replaced by 15% Silica Fume. Material Tests were done for fine aggregate and GGBS sample. Different mix proportions for different percentage replacement of fine aggregate was obtain for M30 grade of concrete as per IS 10262:1982. The Compressive strength test, split Tensile strength test, Flexural strength test and Non-destructive Test (NDT) were done for concrete with various % of GGBS and constant % of Silica Fume in concrete.

  86. Mechanical properties of concrete incorporating waste ceramic tiles and waste foundry sandDownload Article

    A.Shalini, R.Vignesh, M.Hariharan, M.Jawahar

    Abstract

    close

    From the last few years various researchers had done work in concreting and inventvarious techniques and methods to produce concrete which has the desired properties. Concrete is one of the most vital and common materials used in the construction field. The current area of research in the concrete was introducing waste foundry sand (WFS) and waste ceramic tiles in the ordinary concrete. Waste foundry sand is the byproduct of metal casting industries, which causes environmental problems because of its improper disposal. Construction industries requires huge amount of ceramic tiles and other ceramic for architectural appearance, the productions of which are drastically increased, due to this waste is also produce during handling and usage of ceramic tiles. Thus, its usage in building material, construction and in other fields is essential for reduction of environmental problems. This research was carried out to produce an eco-friendly concrete. This paper recommends the effective use of waste foundry sand as a partial replacement for fine aggregate and waste ceramic tiles as a partial replacement for course aggregate in concrete. Ingredients for concrete are cement, course aggregate, waste ceramic tiles, fine aggregate and waste foundry sand. An experimental investigation was carried out on concrete containing waste foundry sand (WFS) in the range of 0%,20%, 22%, and 24% and waste ceramic tiles (WCT) in the range of 0%, 20%, 22%, and 24% by weight for M-25 grade concrete Concrete was produced, tested and compared with conventional concrete in plastic state as well as in harden state for workability, compressive strength & split tensile strength. These tests were carried out on standard cube, cylinder for 28 days to determine the properties of concrete. The aim of this research was to knows the behavior and mechanical properties of concrete for its eco-friendly and economical use.

  87. An experimental investigation on splicing of reinforcement in reinforced concrete beam by bar couplerDownload Article

    G.Raju, Mrs. K. Selvi

    Abstract

    close

    Reinforced cement concrete is the concrete with certain percentage of steel reinforcement embedded in it. This reinforcement is provided mainly to take care of the tensile stresses developed in the member. Reinforcement also limits the size of cracks in concrete due to shrinkage and temperature variation. Splicing of reinforcement bars in R.C members since the manufacturing length of reinforcement bar is 12m only in the market does not suit always to the exact dimensions of the members. The common types of splices adopted are lap splice and welded splice. The lapped joints are not always an appropriate means of connecting reinforcing bars. The use of laps can be time consuming in terms of design and installation and can lead to greater congestion within the R.C member because of the increased amount of rebar used. The cost of reinforcement also increased. The cost of reinforcement can be reduced and increase the load carrying capacity of RCC beam by using coupler to join the end of reinforcement. The investigation reported in this paper was carried out the behavior of splicing of reinforcement by bar coupler in beam. Test the flexural strength of M25 grade coupler reinforced concrete beam. The mix proportions of M25 grade concrete are designed by using Indian standard method and Fe 415 grade steels are used. Two numbers of RC beams casted (conventional lap and coupler reinforcement) for flexural strength test. The results showed that comparison of the flexural strength of conventional lap RC beam and coupler reinforced beam and analysis of cost of reinforcement. Comparison between conventional RC beam and bar coupler used RC beam. Tensile strength of coupler used reinforcement bar. Ultimate load carrying capacity of conventional RC beam. Ultimate load carrying capacity of bar coupler used RC beam. Are analyzed in phase-II project work.

  88. Experimental investigation of partial replacement of nylon fiber in solid blockDownload Article

    M.Karthick, R.Mytheeswaran, S.Sethupathy, P.Balasubramaniyan, K.C.Denesh

    Abstract

    close

    This project deals with experimentally on study of nylon fiber on solid block ratio of 1.3:8(cement: sand: metal). Nylon was the first truly synthetic fiber to be commercialized. All nylon absorbs moisture depends on temperature, crystalline & humidity. It provides secondary reinforcement that is always positioned in compliance with building codes. Savings time and money be eliminating the purchase, storage handling, cutting & placing of wire mesh. Allows block to reach its designed strength and integrity without the used for welded wire .It inhibits plastic shrinkage. Compatible with all other admixtures, surface treatments and finally finishes like regular concrete. In the designed solid block the crusher sand was admixture with 12.5%, 15%, 17.5%, 20% of nylon fiber. The mechanical properties such as compressive strength were tested for conventional block.

  89. Influence of concrete behavior by partial replacement of cement with iron dust and addition of steel fiberDownload Article

    Naveenkumar D, Vignesh M, Vijayakumar C, Vinithkumar S, Selvi K

    Abstract

    close

    This paper deals with the influence of partial replacement of cement with iron dust and addition of steel fibers, Iron dust otherwise known as iron ore finds. Iron dust is an industrial by-products obtained from steel factories. It is a waste material. It is used as a pozzolanic material in concrete to improve the strength. It is important to maintain the particle size of iron dust. It is replaced with cement so the size of iron dust should be less than 0.75 micron. Steelfiber is produced from steel industries as a main product. The addition of steel fiber improves the mechanical properties of concrete. Steel fibers are used to reduce the initial cracks during shrinkage. Iron dust is partially replaced instead of as an alternate. Then the concrete is subjected to various tests in order to find the compressive strength, flexural strength and split tensile strength.

  90. Partial replacement of fine aggregate by granite powder in concreteDownload Article

    Divya.A, Gowthami.A, Dinesh.M, Gowtham.P

    Abstract

    close

    Experimental Investigation on locally available granite powder as a partial replacement of sand with admixtures in the production of concrete is presented in the paper. The concrete was made by using ordinary Portland cement. Granite is an igneous rock which is widely used as construction material in different forms. Nowadays many researches are going in to replacement of sand using many waste material like silica fume, fly ash, slag etc. Like this we are using granite powder is also used as a binder with partial replacement of sand. Now days the construction industry is in need of finding effective material for increasing the strength in concrete. The test results show clearly that granite powder of marginal quantity, as partial sand replacement has beneficial effect on the above properties. Concrete with replacement of fine aggregate by waste glass powder such as 15%, 20%, 25% and 30% were produced. Cube, cylinder, prism specimens of each one 9 numbers were cast, cured and tested for 7, 14, 28 days for strength.

  91. Planning, scheduling and tracking of service apartment building using MS projectDownload Article

    Nagarajan J, Premkumaran A, Rajavignesh R, Ravisankar K L

    Abstract

    close

    Construction industry is an integral component of a nation’s infrastructure and industrial growth. This industry is the second largest industry in India still it’s growth has been differential across the nation.The traditional project management system cannot meet the demands of today’s projects, as tremendous amount of information and data on a project are always changing. The main objectives of this study are to planning, scheduling and tracking of commercial project with the help of MS Project software. Elements of project planning, including the creation and use of work breakdown structures. This paper additionally discusses the rate analysis of the structural works of the Service apartment project.

  92. An experimental investigation on wet mix macadam roadDownload Article

    Nirmal Raj V, Prabhu N, Poomughelan N, Ravisankar K L

    Abstract

    close

    This Paper reveals the construction of Wet Mix Macadam Road. The study of design data based on a CBR value, Traffic data, Drainage conditions, Rainfall data, Topography of the area etc. It also includes design calculation based on Indian Road Congress (IRC) codes. Construction aspects include the use of various materials, machines and manpower. Also Quality Assurance (QA) and Quality Control (QC), aspects incorporated in the construction procedure have been studied and these are included in the project report. Testing of various materials is carried out from the laboratory. The construction of flexible pavement include site cleaning, surveying, excavation, sub-grade construction, granular sub-base, wet mix macadam, prime coat.

  93. Experimental study on partial replacement of course aggregate by steel slag in cement concreteDownload Article

    Nadish, Nirmal, Sathyamoorthy, Vinithkumar, Sarankokila

    Abstract

    close

    The paper reports the effect of concrete using steel slag and M-sand as coarse aggregate replacement, in this project work, the concrete grade M25 was selected and IS method was used for mix design, The properties of materials for cement, fine aggregate, coarse aggregate, steel slag and M-sand were studied for mix design, The various strength of concrete like compressive strength, split tensile strength, flexural strength were studied for various replacement of fine aggregate using copper slag and M-sand that are 0%, 5%, 10%, 15%, 20%, 25%, 30%, 35%, 40%, and 45%. The maximum compressive strength of concrete attained at 30% replacement of steel slag by partial replacement of coarse aggregate at 7, 14 and 28 days. The split tensile strength and the flexural strength were also obtained higher strength at 30% of replacement level at 28 days.

  94. Experimental investigation on fibre reinforced self compacting concrete using foundry sandDownload Article

    Gokul.S, Jeeva.P, Jeeva Nantham.R, Piraveen Kumar.T, Mr.S.K.Gowtham

    Abstract

    close

    The construction activities in the last few decades have increased many folds in almost all the developing countries of the world. Sand is becoming a scarce commodity globally because of its growing demand day by day. It is the need of time to search such alternative materials that would partially or fully replace sand used in concretes without affecting its quality, strength and other characteristics. In order to reduce time and improve the filling capacity of highly congested structural members by its own weight without any vibration self-compacting (SCC) is adopted. The primary aim of this study is to explore the feasibility of SCC using foundry sand and fibre. As the mix design was designed based on finding the optimum percentage of replacement of foundry sand and fibre based on literature review and development of a suitable mix for SCC using code requirements, that would satisfy the requirements of the plastic state. This offers a unique area of application of self-compacting concrete which can flow through every corner of extensively reinforced area without any vibration and more effective for seismic lo.

  95. Experimental investigation on self compacting concreteDownload Article

    M.Durai Murugan,S.Erfan, T. Gopi Sankar, G.Gopinathan, K.C.Denesh

    Abstract

    close

    Self-compacting concrete (SCC) is an innovative concrete that does not require vibration for placing and compaction. It is able to flow under its own weight, completely filling formwork and achieving full compaction, even in the presence of congested reinforcement. The concrete grade M40 was selected and IS method was used for mix design. The properties of materials for cement, fine aggregate, coarse aggregate, admixture(super plasticizer) and M-sand were studied for mix design. The various strength of concrete like compressive, split tensile, flexural were studied for various of using 10%,20%and,30%.The maximum compressive strength of concrete attained at 30% added of admixture at 7, and 28 days. The split tensile strength and the flexural strength were also obtained higher strength at 30% of replacement level at 28 days.

  96. Comparison of conventional building and mivan formwork building based on schedulingDownload Article

    M.Sandeep, S.Suriya Prakash, M.Vetrivel, R.Ranjani

    Abstract

    close

    Construction industry is having biggest role in economy of India. In recent times, the global economy and growth of population in India, land acquisition has become more difficult. To fulfill the need of shelter of this growing population and increasing industrialization, speedy construction is the necessity of time. Same time, due to inadequacy of land Vertical growth is preferable than Horizontal one. Formwork plays an important role in construction buildings. It constitutes 20% cost and 60% time of the total construction. This project does the comparison of the Conventional Formwork and Aluminum Formwork systems.

  97. Land information system using geospatial technology (Essential work flow QZGIS)Download Article

    T.Revand, V.Nandhini, V.Santha Rubini, Mr.V.Sampath Kumar, Ms.N.Jothi Lakshmi

    Abstract

    close

    Nowadays, if we want to know details about any particular land then we need to approach government office to get the details which will take more time to identify the documents about that particular land. And it also consumes more time to calculate the tax for that land. GIS can help us in this issue. If we use GIS in Land information there is no need to approach the government officers. We can get details about that land within few minutes. The data in GIS will be more accurate than other documents. It is very much user friendly to get the details. It helps to make better coastal management. GIS also include decision making, data sourcing, data quality management, etc. Increase in efficiency of work. The locations can be accurately marked. The illegal acquisitions can be identified. Ground water table can be easily found. It is very easy application. Details can be easily included. Maps made are accurate. The tax will become easy. The zones can be separated by using old data. In military, it is used to identify the locations of terrorist camp and other country military camp. The GIS which is used by military will have lesser errors when compared to which we are using. In future, all countries will practice with GIS to mark the boundaries.

  98. A comparitive analysis of exterior insulation and finishing system according to indian climatic conditionDownload Article

    Ashim Jerin S R, Mathan Rasu C, Muhammed Nisham K P, Ganesh Kumar M, Ranjani R

    Abstract

    close

    “EXTERIOR INSULATION and FINISHING SYSTEM’S” (EIFS) are a type of building material that is used as the exterior facing of a building’s exterior wall. EIFS is composed of a number of layers. EIFS is a type of wall surfacing system and needs to be thought of as such a system. EIFS is unique in that it is the only wall material that provides insulation, a finished exterior surface & weather proofing, in a single seamless product. This “single product does it all” attributes accounts for its popularity; EIFS is a good value. EIFS looks like stucco (Portland Cement Plaster), Stucco is a “natural” product, composed of sand, Portland cement & other materials. EIFS is a synthetic product, unlike Stucco, EIFS can be made in large areas without any joints and also with a wide variety of shapes, colors and textures. EIFS is also called as synthetic stucco. Here in this project incorporation of EIFS is directly done in the exterior finishing systems i.e. plastering by selecting few components of EIFS. So EXTERIOR INSULATION in FINISHING SYSTEM is a way of providing thermal insulation for the building. This system even concentrates on providing protection for building against moisture and also aims at crack proof finishing using sustainable green materials. The expression deep energy retrofit lacks precision but broadly suggests a program of existing building improvement that has as one its goals a dramatic improvement in the level of energy efficiency while providing a healthier living environment and improving durability and safety. Adding insulation to exterior walls is often a key piece of a deep energy retrofit. However, this measure is often cost prohibitive.

  99. An experimental investigation on concrete with partial replacement of cement by Groudnshell ASH (GSA) and sea shell powderDownload Article

    S. Shanmuga Vadivel, N.Venkadesh, R.Vishnuvarthan, T.Gowri Prasadh S.K.Gowtham

    Abstract

    close

    This study investigates the use of considerable volume of groundnut shell ash and sea shell powder as the partial replacement for cement in concrete production. A total of 100 specimens of the GSA/OPC concrete were cased in cubes of 150mm dimension for 7, 14, 28 days and the compressive strength and density determined.

  100. A study on silica fume impregnated hybrid fibre reinforced concreteDownload Article

    C.Naveen Kumar, P.Eswaramoorthi, D.Senthilkumar

    Abstract

    close

    Plain concrete has low tensile strength, less ductility, destructive and brittle failure. In order to improve these properties of plain concrete, an attempt has been made to study the effect of addition of polypropylene fibre, coir fibre in the weight of Ordinary Portland Cement and also replacement of silica fume in weight of Ordinary Portland Cement for concrete. In this experimental investigation polypropylene fibre, coir fibre in different percentage from 0 to 2% additional with weight of cement and also silica fume in different percentage from 0 to 20 % replacement with weight of cement will be studied for the effect on mechanical properties like compressive strength, split tensile strength and flexural strength for M40 grade of concrete at 3, 7, 28 days.

  101. An experimental investigation on autoclave aerated concreteDownload Article

    D.Manikandan, S.Gopalakrishnan , K.Cheran

    Abstract

    close

    Autoclaved aerated concrete (AAC) is a light weight, load bearing, high insulation and durable building product. Aerated Autoclave Concrete block is produced by mixing of cement, fly ash, water, lime, and aluminum powder.AAC block is a replacement for conventional red clay bricks, which we normally use for our building construction. The preliminary studies such as rate of water absorption, compressive strength, flexural strength, and the bond strength is studied. Bond strength between AAC and steel reinforcement is determined by performing pullout test.

  102. A study on fire safety systems in commercial buildingsDownload Article

    M.Kalaiarasi, S.Satheesh Kumar, K.Cheran

    Abstract

    close

    Fire accidents in commercial buildings is a threatening one now a days. These accidents create heavy lives and property losses. Therefore a proper attention must be paid to minimize fire loss. This project is a study of fire safety systems in commercial buildings (typically textile shops), the type of equipment and tools, also this study involves the cost estimation for implementation and maintenance of fire safety systems for a textile shop.

  103. A study on abrasion resistance in geopolymer concrete pavementDownload Article

    S.K.Salini, K.Thirumalai Raja, S.Satheesh Kumar

    Abstract

    close

    Cement is the world’s most reliable construction material. The rate of consumption and production of Ordinary Portland Cement (OPC) increases, which leads to environmental pollution by the emission of carbon dioxide (CO2 ).In this study cement is replaced by class F fly ash in concrete which will be activated by sodium hydroxide and sodium silicate solution, act as a binding material. This study is focus on abrasion resistant of geopolymer concrete in pavement application. On the other hand the comparison is made between the conventional concrete pavement and geopolymer concrete pavement.

  104. A study on cost and time comparison of conventional structure with prefabricated structure Download Article

    S. Kathireswaran, J. Kathirvel, E. Sasikumar, M. Senthil Kumar

    Abstract

    close

    Project management is the application of process, methods, knowledge, skills and experience to achieve the objectives of the project. The proper planning and scheduling is important in construction project for controlling the delay of project. The aim of the project is to compare the actual progress of the project ongoing with the actual planned project schedule with respect to the time and the cost by using MS Project and MS Excel software, then to find the factors that are affecting the time and the cost of the project. The difficulties have been analyzed, and suggested some possible improvement for the quicker and better completion of the construction project.

  105. Investigation on land accession for metro rail transit system implementation in Coimbatore cityDownload Article

    Arvind.K.R, Dr.S.Anandakumar

    Abstract

    close

    Metro Rail System is an alternative to the existing traffic in any urbanized areas of India. The infrastructural development through this Metro System would be quite difficulty due to land availability, making hindrance to the system. The difficulty for land is proved to be evident by two major factor variables, gender and locality of Coimbatore city, the Manchester of South India. A questionnaire survey was done among residents of the Coimbatore locality and studied using varied statistical technique for analyzing different perspectives of civilians residing in Coimbatore City on a statement measuring “The land availability in the city for metro rail system is a dispute”, using Statistical Package for Social Sciences (SPSS). The study was conducted for a period between October 2017 and January 2018. The result of the study falls on the percentile values obtained from the Chi-Square Test result. This study may help the planners to take decision on the land procurement for metro rail system in Coimbatore City.

  106. Analysis on factors influencing customer satisfaction in residential building constructionDownload Article

    S.Khaviya, S.Manoj, V.Saathiyapriya

    Abstract

    close

    In the last few years, customer satisfaction have gained significant attention in construction sector. Customer satisfaction is one of the key performance indicators in order to improve quality and performance in the construction industry. Factor analysis has been used to examine factors influencing customer satisfaction in construction of residential building. This study mainly focus on finding out the main factors which may affect customer expectations in residential building construction. Twelve main factors such as facilities, aesthetics, etc. has been included in the analysis. The response are collected from customers of Er.Kandswamy constrction, karur. This paper describes the most prominent factors which influences the satisfaction of customers in case of residential building construction. This paper helps the contractors and engineers to understand the aspects which are to be given more importance in case of fulfilling customer needs.

  107. Partial replacement of fine aggregate by glass powder in concreteDownload Article

    Narendran.P, Pavendhan .P, Thamilarsan.M, Vimalkanth .S, Abdul Hammed.A

    Abstract

    close

    The main aim of this investigation is to compare the influence of glass powder on the strength properties of cement concrete. The concrete was made by using ordinary Portland cement. Glass is used in many form in day to day life. nowadays many researches are going in to replacement of Portland cement using many waste material like sludge, flyash, steel fibre etc. Like this we are using glass powder is also used as a binder with partial replacement of cement. now a days the construction industry is in need of finding effective material for increasing the strength in concrete. Glass powder finer then600 micron pozzolanic behavior an attempt to made investigate on possible material as waste glass powder as the partial replacement of fine aggregate in concrete. Concrete with replacement of fine aggregate by waste glass powder such as 15%, 20% and 25% were produced. Cube, cylinder, prism specimens of each one 12 numbers were cast, cured and tested for 7, 14, 28 days for strength.

  108. A soft switching ZVS sepic inverter topologyDownload Article

    B.ShanjeevSurya, S.Thirumurugan, K.Anbuselvi, R.Janani, V.Dhinesh

    Abstract

    close

    A novel switching loss reduction technique for three-phase PWM rectifier-inverter topology (Fig. 2) for UPS applications is proposed in this paper. This hybrid topology uses only nine IGBT devices for AC/AC conversion through a quasi d.c. link circuit. this novel switching loss reduction technique will reduce the switching losses and improves the total harmonic distortion of the nine switch inverter. The operating principle of the converter is elaborated and a dedicated advanced space vector modulation scheme is presented. The performance of the proposed converter is verified by simulation on a 5 kVA prototyping UPS system.

  109. IOT based on water pumping system for agriculture using pic microcontroller Download Article

    G.Praveen Santhoshkumar, S.A.Saran, G.Magudeshwaran, E.Vignesh, P.Sabareeswaran

    Abstract

    close

    This project about day-to-day problems in agricultural surrounding. Wireless Sensing Technology is extensively used future and extensive in the current systematic globe. As Wireless sensing Network (WSN) helps to enhancement the knowledge. In the make inquiries field of wireless sensor networks the power resourceful time is a major issue. This problem can be overcome by using the IOT technology. The main idea of this is to recognize how data movements through a wireless medium transmission using wireless sensor network and monitoring system. This paper design an irrigation system which is computerized by using controllable constraint such as temperature, soil moisture and air humidity because they are the important factors to be restricted in exactness Agricultures.

  110. Three elements control of boiler drum using IOTDownload Article

    Karthikprabu.B, Ayswarya.M, Chitra.R, Sailendran.S.P

    Abstract

    close

    The most important unit in a process industry or power station is a boiler. In thermal power plant a three element control of boiler drum includes three process variables such as drum level, feed water flow and steam flow to control boiler drum. Water interface exist in boiler drum and the level of water in the boiler drum is very difficult to maintain. If the water level becomes too low the boiler can run dry, resulting in mechanical damage of the drum and boiler piping. If the level becomes too high, water can be carried over into steam pipe work and causes damage in downstream equipment. The data from entire plant is received and logged in DCS system for experimental analysis. The data logging system of the plant DCS monitors process variables and multi loop control in a plant and measures and record the process variable manipulated variable control signal etc., of a different control process. The data logging requires huge memory forrecording different variables of the plant. The measured variables stored in cloud and used in the process with the IOT technology and hence huge memory occupation in DCS is reduced. In this project IOT concept has been implemented in the boiler drum level control in thermal power plant and variables which are monitored, recorded and controlled by using IOT.

  111. Instinctive foam cutting machine using PLCDownload Article

    Sasikumar.S, Gowtham.R, Parvathikrishnan.J, Haribalaji.S, Vigneshwaran.A

    Abstract

    close

    To apprehend the solicitation and prominence of the participation of automation in conventional cutting machine in manufacturing. A cutting mechanism is available in various contours and sizes, with small hand-held power cutting systems and to bench mounted and finally floor-mounted models. This paper includes the categories of cutters, and shop formulas for setting up each operation. Human protection plays an acute part in any process involving power equipment. This paper also comprises techniques for maintaining, and proper setting up the work and methods of selecting various tools, and object holding devices to get a job done safely without causing damage to the equipment, human beings and surroundings.

  112. Automation of coal bunker using arduino controllerDownload Article

    Sapthika Parthi.P, Hemavigasini.T.R, Sarulatha.R

    Abstract

    close

    Coal bunkers are used for the purpose of storing coal in industries. Then the coal stored in the bunker sent to the furnace. In order to increase the life span of boiler and to maintain the accuracy automation is required. Automating the system also reduces the manpower and non-linearity in coal supply. Automation using Arduino controller instead of PID controller is presented. Real-time sensors are used for sensing main parameters like level, temperature, etc.

  113. Summarize and Discover Hidden Patterns for Decision Making using Big Data AnalyticsDownload Article

    Ms. N. Zahira Jahan, Mr. K. Kavin Kumar

    Abstract

    close

    In this project used to Actionable intelligence It means much more than simply finding or summarizing data; it stresses the discovery of hidden (unknown and hard to find)patterns that can be used to predict concepts, events, trends, opinions and so on to support decision makers.The expected use of actionable intelligence varies from system to system, with each variation increasing the complexity involved when engineering such systems. For this reason, it’s important to derive taxonomy for understanding actionable intelligence and for thinking about how it affects the complexity and development of big data software. The following three levels (L1, L2, L3) of actionable intelligence are proposed. (L1)Supervised actionable intelligence, (L2) Semi supervised actionable intelligence and (L3)Unsupervised actionable intelligence. The supervised system serves as decisionsupport for humans, so that humans supervise the intelligenceproduced by machines before takingaction. Semi supervised machines are relied upon to take actions based on self-produced intelligence; however, these actions can be reversed or corrected by humans. Unsupervised system machines are fully relied upon to take actions without requiring human intervention or correction.

  114. Website Security using Coates Algorithm Download Article

    Ms. N. ZahiraJahan, Ms. K. Lavanya

    Abstract

    close

    In this dissertation describe a specific type of summaries that Query facet the main topic of given text. Existing summarization algorithms are classified into different categories in terms of their summary construction methods (abstractive or extractive), the number of sources for the summary (single document or multiple documents), types of information in the summary (indicative or informative), and the relationship between summary and query (generic or query-based).QD Miner aims to offer the possibility of finding the main points of multiple documents and thus save users’ time on reading whole documents. The difference is that most existing summarization systems dedicate themselves to generating summaries using sentences extracted from documents. In addition, return multiple groups of semantically related items, while they return a flat list of sentences.In this dissertation, adding these lists may improve both accuracy and recall of query facets. Part-of-speech information can be used to check the homogeneity of lists and improve the quality of query facets. The side-information could not be incorporate into the mining process, because it can either improve the quality of the representation for the mining process, or can add noise to the process. Therefore, a principle way is required to perform the mining process, so as to maximize the advantages from using this side information. This dissertation proposes an algorithm which combines classical partitioning algorithms with probabilistic models in order to create an effective clustering approach.

  115. Multiple Integrity Verification and Auditing Protocol Model for Cloud ComputingDownload Article

    Ms. N. Zahira Jahan, Mr. S. Piravin

    Abstract

    close

    In this project verifiable outsourcing computation into the area of high-dimensional feature extraction and propose a secure verifiable outsourcing scheme of feature extraction based on co-occurrence matrix with single untrusted server. The original images are secret for the server by using a projection of one to many with trapdoor, and we propose a symmetric probabilistic encryption as its concrete construction. The analyzer can obtain true results of feature extraction and detect any failure with a probability of 1 if the server misbehaves. Finally, provide the simulations on extracting CCJRM features. The proposed outsourcing scheme could greatly decrease the computational cost of the analyzer without exposure of the original images and their extraction results.

  116. Preserving Privacy for User Shared Images with Discovering Friends in Social NetworksDownload Article

    Ms. N. ZahiraJahan, Mr.G.Pragadeeswaran

    Abstract

    close

    At present, billions of user shared images are generated by individuals in many social networks daily and this particular form of user data is indeed very accessible to others due to the nature of online image sharing. Some users also hide or limit the information of their connections from the public in social media platforms due to privacy concerns. Accessing these SGs is getting more difficult and costly in today’s online social networks, and novel applications using SGs become almost impossible to be offered independently by third-party practitioners and individuals.

  117. Exploratory Product Image Search with Cross Re-Ranking ModelDownload Article

    Ms.N.Zahira Jahan, Mr.S. Naveen

    Abstract

    close

    In this paper analysis the challenges of understanding users’ search interests from the product images being browsed and inferring their actual search intentions. In this paper a novel interactive image exploring system for allowing users to lightly switch between browse and search processes, and naturally complete visual-based exploratory search tasks in an effective and efficient way. This system enables users to specify their visual search interestsinproduct images by circling any visual objects in web pages, and then the system automatically infers users’ underlying intent by analyzing the browsing context and by analyzing the sameor similar product images obtained by large-scaleimage search technology.

  118. Machine Learning Credentials InventivenessDownload Article

    Mrs C. Navamani, Mr. A.Pandiyaraja, Mr.P.Parthipan, Mr.A.Angappan

    Abstract

    close

    The objective of this briefing is to present an overview of the machine learning techniques currently in use or in consideration at statistical agencies worldwide. Section I, outlines the main reason why statistical agencies should start exploring the use of machine learning techniques. Section II outlines what machine learning is, by comparing a well-known statistical technique (machine learning methods) with a (non-statistical) machine learning counterpart (support vector machines). Sections III discuss current research or applications of machine learning techniques within the field of list of Common Machine Learning Algorithms,editing and imputation, and K-means. A list of machine learning applications in official statistics outside of the three areas mentioned above.

  119. Detect Malware and Search Rank Fraud in Google PlayDownload Article

    Mr.S.Sambasivam, Ms. M.Viveka

    Abstract

    close

    Theprotection of vertex and community identities of individuals in a dynamic network. A simple approach for this problem is to anonymize each release to satisfy some privacy model before a network is published. Due to the lack of consideration in sequential releases, adversaries can have chances to launch attacks and get advantages by gathering victim’s information continuously and comparing the multiple releases.The privacy risks of identity disclosures in sequential releases of a dynamic network.It also presents a heuristic algorithm for generating releases satisfying S- Kw -structural diversity anonymity so that the adversary cannot utilize his knowledge to re-identify the victim and take advantages. The evaluations on both real and synthetic data sets show that the proposed algorithm can retain much of the characteristics of the networks while confirming the privacy protection.

  120. Aggregate Hidden Cloud Web Database Model Using Checkbox InterfaceDownload Article

    Mr. S.Sambasivam, Ms. J.Kaviya

    Abstract

    close

    Websites provide restrictive form-like interfaces which allow users to execute search queries on the underlying hidden databases. Hidden databases are widely prevalent on the web. This thesis considers the problem of estimating the size of a hidden database through its web interface. Due to limitations of a web interface, the number of returned tuples is usually restricted by a top-k constraint - when more than k tuples in the database match the specified condition, only k of them are preferentially selected by a ranking function and returned to the user. In this proposed system novel techniques which use a small number of queries to produce unbiased estimates with small variance. These techniques can also be used for approximate query processing over hidden databases.

  121. Scale-Free Wireless Sensor Networks for Robustness StrategyDownload Article

    Mr. S.Jagadeesan, Ms. N. Johncy

    Abstract

    close

    It is improving the robustness of the network topologies for WSNs. Itisdefine the terms of target selection for attacks, there are two types of attack: random and malicious. In random attacks, the attacker randomly chooses nodes in the network topology as the targets, whereas in malicious attacks, the attacker chooses the nodes with high node degrees as the targets. It is known that some types of network topologies are resistant to random attacks and some are resistant to malicious attacks. To use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. It is proposed to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the attacks.

  122. Accessing the Location Based DetailsDownload Article

    Mr. S. Jagadeesan, Ms. K. Nandhini

    Abstract

    close

    In this paper is solving the severe issues of current Internet architecture, such as complex usage, poor resource utilization, inefficient mapping, scalability, location dependency, for Named data wireless network. Communication in NDN is based on content names decoupling from their locations. In existing system on-demand protocol called OEFS for NDN-based mobile ad hoc networks is implementing. The OEFS results outperforms other conventional schemes in terms of average content download time, the number of Interest retransmissions, the duplication of Data packets, and the total number of sInterest propagations in the network. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. This project examines the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. This is termed as selfish replica allocation. In particular, a selfish node detection algorithm is developed that considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation.

  123. Workload Based Resource Provisioning and SchedulingDownload Article

    Mr. C. Mani, Mr. S. Duraishankar

    Abstract

    close

    In the cloud environment, the workflows have been frequently used to model large-scale problems in areas such as bioinformatics, astronomy, physics and arithmetic process. This project proposes a resource provisioning and scheduling strategy for scientific workflows on Infrastructure as a Service (IaaS) and Platform as services clouds (PaaS). This project presents an algorithm based on the Superior Element Multitude Optimization (SEMO), which aims to minimize the overall workflow execution cost while meeting deadline constraints. The main scope of the project is used to analyze best available resource in the cloud environment depend upon the total execution time and total execution cost which is compare between one process to another process. If the provider satisfies the time least time, then the process becomes to termination.

  124. Evaluation of mechanical properties in banana tree fiber reinforced compositeDownload Article

    Ade Nithin, K. Hariskrishna, M. Mahendar, M. Prashant, Mallesh Jakanur, Rohan

    Abstract

    close

    In the rapidly developing world, concern for environmental pollution and the prevention of non-renewable and non-biodegradable resources has attracted researchers seeking to develop new materials and ecological products based on sustainability principles. Fibers from natural sources provide indisputable advantages over synthetic reinforcement materials such as low cost, low density, non-toxicity, comparable strength and minimum problems of waste disposal. In this project, epoxy composite materials reinforced with banana fiber will be prepared and the mechanical properties of these composite materials will be evaluated. Composite samples with different fractions of fiber volume are prepared using the manual application process and applying pressure at room temperature. The samples were subjected to mechanical tests such as traction, hardness test and impact load.

  125. Enhanced Deployment Algorithms for Heterogeneous Directional Mobile Sensors in a Bounded Monitoring AreaDownload Article

    Mrs. C.Navamani, Mr. D.PaulDhinakaran

    Abstract

    close

    Image registration is the process of finding correspondence between all points in two images of a scene. The process spatially aligns the images, making it possible to detect changes in the scene over time, fuse information in the images. Analysis of multiple images of a scene often reduces to find the correspondence between points in the images. Voronoi diagram is a special kind of decomposition of a given space, e.g., a metric space, determined by distances to a specified family of objects (subsets) in the space. Voronoi diagrams that are used in geophysics and meteorology to analyse spatially distributed data (such as rainfall measurements). Voronoi diagram are also related to other geometric structures such as the medial axis which has found applications in image segmentation. While previous methods use the same block size and shape at a hierarchy, the proposed method adapts the block size and shape to the local image details and geometric difference between the images. This adaptation makes it possible to keep geometric difference between corresponding regions small and simplifies the correspondence process. The algorithm is named VorLag which is based on the calculation of the Voronoi-Laguerre diagram determined by the pixel locations over the AoI (Area of Interest) and their related pixels. Such a diagram partitions the AoI into disjoint polygons, each of them related to one generating pixel. Hence each pixel uses the information related to its Voronoi-Laguerre polygon to determine the edge.Ran sac algorithm has been used to find out inliers and eliminate outliers. After that those two images has been merged using link points.

  126. A Fair Routing Method for Cooperative Forwarding in Heterogeneous Wireless Sensor NetworksDownload Article

    Mrs.C.Navamani, Mr.C.Bharath

    Abstract

    close

    Wireless sensor network is a network composed of a large number of sensor nodes with limited radio capabilities and one or a few sinks that collect data from sensor nodes. Sensor nodes are powered by small batteries, hence, the energy consumption in operating a WSN should be as low as possible. Hence, the whole network lifetime can be prolonged by balancing the communication load at heavily loaded nodes around a sink. This problem is called the energy hole problem and is one of the most important issues for WSNs.It proposes to address the energy efficiency problem by synchronizing the transmission times of all the nodes in the system. Transmission synchronization presents energy saving opportunities through dynamic power management of the WSN network interface. That is, nodes can switch off their wireless interfaces between transmissions.

  127. Novel Sybil Attack Detection in VANETusing CP-ABE DelegationDownload Article

    Mr. C.Mani, Ms. P.Aarthi

    Abstract

    close

    In this paper, Ciphertext-policy attribute-based encryption (CP-ABE) delegation scheme is proposed, which allows road side units (RSUs) to perform most of the computation for the purpose of improving the decryption efficiency of the vehicles. In addition to that, proposed a novel Sybil attack detection mechanism, Footprint, using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU.

  128. Traffic Prevention Model for Sensor NetworkDownload Article

    Mrs. C.Navamani, Mr. K.Aravinthraj

    Abstract

    close

    The presence of high-end Internet-connected navigation and infotainment systems is becoming a reality that will easily lead to a dramatic growth in bandwidth demand by in-vehicle mobile users. This will induce vehicular users to resort to resource-intensive applications, to the same extent as today’s cellular customers.The research work considers a system where users aboard communication-enabled vehicles are interested in downloading different contents from Internet-based servers. This scenario captures many of the infotainment services that vehicular communication is envisioned to enable, including news reporting, navigation maps, and software updating, or multimedia file downloading. The project outlines the performance limits of such a vehicular content downloading system by modeling the downloading process as an optimization problem, and maximizing the overall system throughput. The research work investigates the impact of different factors, such as the roadside infrastructure deployment, the vehicle-to-vehicle relaying, and the penetration rate of the communication technology, even in presence of large instances of the problem. Results highlight the existence of two operational regimes at different penetration rates and the importance of an efficient, yet 2-hop constrained, vehicle-to-vehicle relaying.

  129. Trust-But-Verify: Verifying Result Correctness of Outsourced Frequent Item set MiningDownload Article

    Mrs.K.E.Eswari, Mr.G.Vignesh

    Abstract

    close

    Data Mining is popularizing the computing paradigm in which data is outsourced to a third-party service provider (server) for data mining. Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result. This project focuses on the specific task of frequent itemset mining. It also consider the server that is potentially untrusted and tries to escape from verification by using its prior knowledge of the outsourced data. It propose efficient probabilistic and deterministic verification approaches to check whether the server has returned correct and complete frequent itemsets. Our probabilistic approach can catch incorrect results with high probability, while our deterministic approach measures the result correctness with 100 percent certainty. It also design efficient verification methods for both cases that the data and the mining setup are updated. This project demonstrates the effectiveness and efficiency of our methods using an extensive set of empirical results on real datasets.

  130. Data Mining Techniques for Analyzing CrimeDownload Article

    Ms. N. ZahiraJahan, Ms. K. Lavanya

    Abstract

    close

    The data mining is data analyzing techniques that used to analyze crime data previously stored from various sources to find patterns and trends in crimes. To solve the problems previously mentioned, data mining techniques employ many learning algorithms to extract hidden knowledge from huge volume of data. Data mining is data analyzing techniques to find patterns and trends in crimes. It can help solve the crimes more speedily and also can help alert the criminal detection automaticallyThe previous system focus in mining the crime data from the crime database for that the KNN clustering is used for clustering the data. The values are classified by using the crime value. Crime values are taken from the crime database. To identify crime falls under category, each crime data is provided with its parametric value. Only clustering of crime data is made and the crime is not been split as per the crime ratio. The proposed system provides security for the crime data during outsourcing. Clustering and Classification is made on information. While classifying the data, the watermark content is used. The watermark content is used for verifying the classification data. Based on clustering and classification, the data can be classified and kept secure. Both Clustering and Classification is made on crime data. Data is secure by applying water mark content on data. The crime is been split as per the crime ratio.

  131. Enable Central Keyword Base Semantic Search using UserLevel Encryption Extension ModelDownload Article

    Ms. N. ZahiraJahan, Mr.M.Loganathan

    Abstract

    close

    A cloud system is difficult to synchronize login and authentication data between external clouds and internal systems without exposing internal security data. The cloud technologies are rapidly being adopted throughout the Information Technology (IT) due to their various attractive properties. In spite of their spread, they have raised a range of significant security and privacy concerns which interrupt their adoption in sensitive environments. In existing scheme makes a good tradeoff between the functionality and the efficiency. To better express the relevance between the query and files, we introduce the TF-IDF rule into our design.

  132. Exploring Application Level Semantic for Data CompressionDownload Article

    Mrs. C.Navamani, Mr. M.Jayavel

    Abstract

    close

    Current big sensing data processing on Cloud have adopted some data compression techniques. However, due to the high volume and velocity of big sensing data, traditional data compression techniques lack sufficient efficiency and scalability for data processing. Based on specific on-Cloud data compression requirements, propose a novel scalable data compression approach based on calculating similarity among the partitioned data chunks. Instead of compressing basic data units, the compression will be conducted over partitioned data chunks. Map Reduce is used for algorithm implementation to achieve extra scalability on Cloud.

  133. Effective Pre-Secure Communication Data Sharing Model for MANET using GECC AlgorithmDownload Article

    Mr. R. NavinKumar, Mr.R.Sudhakar

    Abstract

    close

    Mobile autonomous networked systems have seen increased usage by the military and commercial sectors for tasks deemed too monotonous or hazardous for humans. MANET communication is commonly wireless. Wireless communication can be trivially intercepted by any node in range of the transmitter. This can leave MANETs open to a range of attacks, such as the Sybil attack and route manipulation attacks that can compromise the integrity of the network.Autonomous systems require a significant amount of communication. Problem solving techniques, such as distributed task allocation are required to solve task planning problems without human intervention and these techniques are vulnerable to packet loss and false messages; partial data will lead to sub-optimal or failed task assignments.To protect these networks, security protocols have been developed to protect routing and application data. To address these problems, a classic secure framework is proposed. The framework is designed to allow existing network and routing protocols to perform their functions, even as providing node authentication, access control, and communication security mechanisms.The Security Using Pre-Existing Routing for Mobile Ad-hoc Networks (SUPERMAN). The protocol is designed to address node authentication, network access control and secure communication for MANETs at the network layer

  134. A Two-Stage Crawler for Efficiently Harvesting Deep-Web InterfacesDownload Article

    Ms. N. ZahiraJahan, Ms. M. Kalaipriya

    Abstract

    close

    These instructions give you guidelines for Smart crawler. As deep web grows, there has been increased interest in techniques that help efficiently locate deep-web interfaces. Due to the large volume of web resources, achieving wide coverage and high efficiency is a challenging issue. So This project proposes a two-stage framework, namely Smart Crawler, for efficient harvesting deep web interfaces. In the first stage, Smart Crawler performs site-based searching for center pages .In second stage, Smart Crawler ranks websites to prioritize highly relevant ones for a given topic. To eliminate bias on visiting some highly relevant links in hidden web directories, the project designs a link tree data structure to achieve wider coverage for a website. To eliminate bias on visiting some highly relevant links in hidden web directories, the project designs a link tree data structure to achieve wider coverage for a website. This project provides the experimental result on a set of representative domains show the agility and accuracy of proposed crawler framework, which efficiently retrieves deep-web interfaces from large-scale sites and achieves higher harvest rates than other crawlers. The deep (or hidden) web refers to the contents lie behind searchable web interfaces that cannot be indexed by searching engines. These data contain a vast amount of valuable information and entities such as Info mine may be interested in building an index of the deep web sources in a given domain (such as book).

  135. Monitoring and Prevention of Stealthy Denial of Service Strategy Download Article

    Mr. C. Mani, Mr. T. Ajith Kumar

    Abstract

    close

    Cloud Computing is an emerging paradigm that allows customers to obtain cloud resources and services according to their demand. Service level agreements (SLA) regulate the costs that the cloud customers have to pay for the provided quality of service (QoS).The success of the cloud computing paradigm is mainly due to its on-demand, pay-by-use and self-service nature. According to this standard, the effects of Denial of Service (DoS) attacks involve not only the quality of the delivered service, but also the service maintenance costs in terms of resource usage. Specifically, if the detection delay is longer, the cost will be more. Therefore, a particular attention has to be paid for stealthy Denial of Service attacks. They aim at minimizing their visibility, and at the same time, they can be as harmful as the brute-force attacks. They are sophisticated attacks tailored to leverage the worst-case performance of the target system through specific periodic, pulsing, and low-rate traffic patterns. In this study, a strategy is proposed to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer, while respecting the job size and the service arrival rate imposed by the detection mechanisms. Here both how to apply the proposed strategy, and its effects on the target system deployed in the cloud is described.

  136. Automatic Memory Control of Multiple VM using Real Time Task Oriented Task Scheduling AlgorithmDownload Article

    Mr. C. Mani, Mr. N. Gnanavel

    Abstract

    close

    In this paper, to devise a system for automatic memory control based on the balloon driver in VMs. Researchers can download our toolkit. The project aims to optimize the running times of applications in consolidated environments by overbooking and/or balancing the memory pages of VMs. Unlike traditional methods, such as MEB system is lightweight and can be completely integrated into user space without interfering with VMM operation. In this project design a global-scheduling algorithm based on the dynamic baseline to determine the optimal allocation of memory globally. In this existing system evaluate optimized solution to memory allocation using real workloads (DaCapo and PTS) that run across VMs. The virtualization technique enables multiple virtual machines (VMs) to be placed on the same physical hosts and supports the live migration of VMs between physical hosts based on the performance requirements.

  137. TPA Authentication Based Security and Verifying Setting in Multicloud EnvironmentDownload Article

    Mr. S. Sambasivam, Mr.J.Meighanam

    Abstract

    close

    Cloud computing is provide a dynamically scalable resources provisioned as a service over the webpage. The third-party, on-demand, self-service, pay-per-use, and seamlessly scalable computing resources and services offered by the cloud environment promise to reduce capital as well as operational expenditures for hardware and software. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. It provides four distinct models in form of abstracted multicloud architectures. These developed multi cloud architectures allow to categorize the available schemes and to analyze them according to their security benefits. To maintain a data in a scalable and security manner key storage goes high modularity. To reduce the key storage, in this dissertation mainly compromise to maintain data in a secure manner and provide with less key management cost and bandwidth of a cloud server. The process of convergent key management, original data copy is first encrypted with a convergent key derived by the data copy itself, and the convergent key is then encrypted by a master key that will be kept locally and securely by each user manner. The encrypted convergent keys are then stored, along with the parallel encrypted data records, in public cloud storage area. Likewise, session based de-duplication is considered. Here if the user provides the session duration, from date and to date, then only with the data range, proof of ownership can be allowed in server on those dates. This increases the security if the secure data storage needs to be safely accessed on the given duration.

  138. Enhanced LDDOS Aware Multipath Scheme using EE-SR Routing Protocol ModelDownload Article

    Mr. C. Mani, Mr. P.Arun

    Abstract

    close

    The multi-homed mobile devices in the mobile cloud computing (MCC) systems can improve their throughput by allocating the application data over several paths simultaneously, enabled by the promising Multipath TCP (MPTCP) technology. Meanwhile, network attacks against current Internet infrastructures are likely to increase, especially with the widely deployment of MCC systems. When a MPTCP connection is under network attacks and becomes a poor-performing path or a broken path, it can significantly affect other stable paths and in the absence of related schemes to handle this, MPTCP will undoubtedly suffer from serious performance degradation. Moreover, applying MPTCP to cloud data delivery may generally lead to higher energy consumption and is not favorable to a power-constrained mobile device. The proposed MPTCP-La/E2 has been evaluated with a wide range of performance metrics. The simulation results demonstrate how MPTCP-La/E2 outperforms the baseline MPTCP in terms of QoS and energy-savings. In this proposed system applying MPTCP to a MCC mobile device raises a new concern, namely, the high energy consumption for concurrent use of multiple network interfaces. In addition to muting the potentially broken network interfaces for application data delivery and energy saving using QOD Routing protocol model.

  139. Providing Data Security & Integrity in Cloud using CCAFDownload Article

    Mr. C.Mani, Mr. G.Gowri Shankar

    Abstract

    close

    This project mainly focus on providing data security to the cloud users. Security is essential factor in the cloud services. For this purpose, we need a clear framework which provides security to both cloud users and cloud providers. The Cloud Computing Adoption Framework (CCAF) is used for adopting and applying cloud security principles systematically. This framework has key features includes identification, data integrity, privacy and durability. The CCAF has three layers of security such as firewall and access control, identity management and intrusion prevention and convergent encryption. The Security Manager stores metadata which includes block signatures, encrypted key and process identity management check. In the convergent encryption layer, the data undergoes a security test which uses the hash of plain text to work out the encryption key. These three layers employs on providing security to the cloud data.

  140. Enhanced Multimedia Data Sharing for Privacy Preservation in Vehicular Ad Hoc Network using Authentication Group KeyDownload Article

    Ms. C. Navamani, Mr. P. Boopathi

    Abstract

    close

    Data sharing and low maintenance, provides a better computing, with the characteristics of intrinsic utilization of resources. In cloud computing, cloud service providers offer an abstraction of infinite storage space for clients to host data. It can help clients reduce their financial overhead of data managements by migrating the local managements system into cloud servers. propose a secure data sharing scheme, which can achieve secure key distribution and data sharing for dynamic group. In this project provide a secure way for key distribution without any secure communication channels. The users can securely obtain their private keys from group manager without any Certificate Authorities due to the verification for the public key of the user. The existing scheme can achieve fine-grained access control, with the help of the group user list, any user in the group can use the source in the cloud and revoked.

  141. Design and Implementation of a Secure Healthcare Social Cloud SystemDownload Article

    Mr. S.Sambasivam, Mr. M.Selvam

    Abstract

    close

    A patient-centric model of health information exchange is termed as personal health record (PHR). The service allows a patient to create, and control the personal health data in one place through the web, which has made the storage, retrieval, and sharing of the medical information efficiently. Each patient is promised the full control of the medical records and can share the health data with a wide range of users, including family members, friends or healthcare providers. It is also an emerging patient-centric method of health information exchange, which is often given to third parties, like cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties.

  142. Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular NetworksDownload Article

    Mrs.C.Navamani, Mr.A.Dhanasekar

    Abstract

    close

    Over the past two decades, vehicular networks have been emerging as a cornerstone of the next-generation Intelligent Transportation Systems (ITSs), contributing to safer and more efficient roads by providing timely information to drivers and concerned authorities. In vehicular networks, moving vehicles are enabled to communicate with each other via inter-vehicle communications as well as with road-side units (RSUs) in vicinity via roadside-to-vehicle communications. In urban vehicular networks where the privacy, especially the location privacy of vehicles should be guaranteed, vehicles need to be verified in an anonymous manner. In urban vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable.

  143. Event-Aware Backpressure Scheduling Scheme for Emergency Internet of ThingsDownload Article

    Mrs. C. Navamani, Mr.R.Jayakumar

    Abstract

    close

    In this project implement the backpressure scheduling scheme applied in Internet of Things, which can control the network congestion effectively and increase the network throughput. However, in large-scale Emergency Internet of Things (EIoT), emergency packets may exist because of the urgent events or situations. The traditional backpressure scheduling scheme will explore all the possible routes between the source and destination nodes that cause a superfluous long path for packets. Therefore, the end-to-end delay increases and the real-time performance of emergency packets cannot be guaranteed. In existing system, backpressure queue model with emergency packets is first devised based on the analysis of the arrival process of different packets. Meanwhile, EABS combines the shortest path with backpressure scheme in the process of next hop node selecting. The emergency packets are forwarded in the shortest path and avoid the network congestion according to the queue backlog difference. The extensive experiment results verify that EABS can reduce the average end-to-end delay and increase the average forwarding percentage. In proposed system, buffer dimensioning is therefore essential to design a practical and efficient hierarchical clustering algorithm Delay-Tolerant Network(DTN).This project addresses the problem of quantifying the buffer size of DTN source nodes, under replication based routing protocol, using large deviation techniques. The proposed dimensioned-buffer model is shodown to exhibit a routing performance of an equivalent infinite buffer model. In addition, the problem of routing in intermittently connected wireless networks comprising multiple classes of nodes is addressed. The proposed solution perform well in homogeneous scenarios, are not as competent in this setting.

  144. Home Automation System using IoTDownload Article

    Mr. R. Navin Kumar, Mr. Arjun Singh Athokpam, Mr. Abareesh Raj, Mr. D. Jayasurya

    Abstract

    close

    This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling the devices and appliances distantly using Android based Smart phone app. The proposed system does not require a devoted server PC with respect to similar systems and offers a novel communication protocol to monitor and manage the home environment with more than just the switching functionality. To reveal the possibility and effectiveness of this system, devices such as light switches, power plug, temperature sensor and current sensor have been incorporated with the proposed home control system.

  145. Big Data Analytics in HealthcareDownload Article

    Mrs. K E.Eswari, Mr. M.Mugilan, Ms. A.Praveena, Ms. G.Gowthini, Ms. S.Nivedhika

    Abstract

    close

    the rapidly expanding field of big data analytics has started to play a pivotal role in the evolution of healthcare practices and research. It has provided tools to accumulate, manage, analyze and assimilate large volumes of disparate, structured and unstructured data produced by current healthcare systems. Big data analytics has been recently applied towards aiding the process of care delivery and disease exploration. However, the adoption rate and research development in this space is still hindered by some fundamental problems inherent within the big data paradigm. In this paper, we discuss some of these major challenges with a focus on upcoming and promising areas of medical research; image, signal and genomics based analytics. Recent research which targets utilization of large volumes of medical data while combining multi modal data from disparate sources are discussed. Potential areas of research within this field which have ability to provide meaningful impact on healthcare delivery are also examined.

  146. Big Data Approach for Organization and Forecast of Student Consequence using MapReduceDownload Article

    Mrs.K.E.Eswari, Ms.R.Sharmila

    Abstract

    close

    This paper takes a novel perspective on the problem of clustering high-dimensional data. Instead of attempting to avoid the curse of dimensionality by observing a lower dimensional feature subspace, this project embraces dimensionality by taking advantage of inherently high-dimensional phenomena. More specifically, it is showed that hubness, i.e., the tendency of high-dimensional data to contain points (hubs) that frequently occur in k-nearest-neighbor lists of other points, can be successfully exploited in clustering. The proposed system demonstrates that hubness is a good measure of point centrality within a high-dimensional data cluster, and by proposing several hubness-based clustering algorithms, showing that major hubs can be used effectively as cluster prototypes or as guides during the search for centroid-based cluster configurations. The proposed methods are tailored mostly for detecting approximately hyper spherical clusters and need to be extended to properly handle clusters of arbitrary shapes.

  147. Crop Yield Prediction in Tamil Nadu using Baysian NetworkDownload Article

    Mrs. K. E. Eswari, Ms. L.Vinitha

    Abstract

    close

    Crop prediction is an important agricultural problem. To address this problem, clustering and classification techniques are used for crop yield prediction. It is the one of the most commonly used intelligent technique based on data analytics concepts to predict the crop yield for maximizing the crop productivity. Machine learning techniques can be used to improve prediction of crop yield under different climatic scenarios. The Baysian network Classification is a supervised learning model which means temperature and rainfall analyzes the crop data used for classification and probability values of Rice, Coconunt, Arecanut, Black pepper and Dry ginger crops. .The Baysian network Classification analysis technique is used for exploring the dataset.For the present study the mean absolute error (MAE), root mean squared error (RMSE), relative absolute error (RAE) and root relative squared error (RRSE) were calculated. The experimental results showed that the performance of other techniques on the same dataset was much better compared to SMO.

  148. Trustee-Base Social Authentication Process using Alert SystemDownload Article

    Mr. R. NavinKumar, Mr. C. Seenivasan

    Abstract

    close

    Web services present most commonly rely on passwords to authenticate users. Unfortunately, two serious issues in this paradigm are: users will inevitably forget their passwords, and their passwords could be compromised and changed by attackers, which result in the failures to access their own accounts. Therefore, web services often provide users with backup authentication mechanisms to help users regain access to their accounts. Unfortunately, current widely used backup authentication mechanisms such as security questions and alternate email addresses are insecure or unreliable or both. Recently, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to the user’s trustees. The user must obtain at least k (i.e., recovery threshold) verification codes from the trustees before being directed to reset his or her password. This project provides the first systematic study about the security of trustee-based social authentications. This project introduces a novel framework of attacks, which is called as forest fire attacks. In these attacks, an attacker initially obtains a small number of compromised users, and then the attacker iteratively attacks the rest of users by exploiting trustee-based social authentications. Then, a probabilistic model is constructed to formalize the threats of forest fire attacks and their costs for attackers. Finally, the framework is applied to extensively evaluate various concrete attack and defense strategies using three real-world social network datasets. The application used for simulation is designed using Microsoft Visual Studio .Net 2005 as front end. The coding language used is C#.Net. MS-SQL Server 2000 is used as back end database.

  149. Enhanced Diffie-Hellman Algorithm and its ApplicationsDownload Article

    Mr. R. NavinKumar, Mr. R. Saravanan

    Abstract

    close

    This thesis presents the overview of the Diffie-Hellman Key Exchange algorithm and reviews several common cryptographic techniques in use on the Internet today that incorporate Diffie-Hellman. DH is a method for securely exchanging a shared secret between two parties, in real-time, over an untrusted network. A shared secret is important between two parties who may not have ever communicated previously, so that they can encrypt their communications. As such, it is used by several protocols like Secure Sockets Layer (SSL). The goal of this thesis is for achieving communication between two users by agrees upon a shared secret that an eavesdropper will not be able to determine. This shared secret is used by two users to independently generate keys for symmetric encryption algorithms that will be used to encrypt the data stream between them. The “key” aspect is that neither the shared secret nor the encryption key does not ever travel over the network. In this thesis, along with these terms, study is also made such that different encryption concepts are applied based on the system’s hardware/ software capability. In this aspect, some of the data is split into two segments and first one is encrypted by 3DES and second one is encrypted by AES encryption mechanism. This reduces the processing and communication overhead based on the system’s capability. With the rapid development of Internet, more web based services are into our daily life, and thus security protection of those services, especially data privacy protection, becomes more important. However to perform privacy protection causes huge overhead. Thus it is a critical issue to perform the most suitable protection to decline performance consumption while provide privacy protection. Finally, the thesis shows that it not only fulfills the user-demand privacy but also maintains the system performance in network/ Internet environments. The application is designed using Microsoft Visual Studio .Net 2005 as front end. The coding language used is Visual C# .Net. MS-SQL Server 2000 is used as back end database.

  150. Measuring and Increasing the Security in Large-Scale Wireless Ad Hoc NetworksDownload Article

    Mr. R. NavinKumar, Mr. P. Vimal Raj

    Abstract

    close

    The growth of networks such as the Internet and wireless cellular systems, over the last decade has surpassed many expectations. Indeed, going back in time to the origins, it would have been hard to imagine the importance and scale to which these networks have developed. Now, projecting into the future, they strongly believed that this trend will continue, if not accelerate. Hence, the communication devices and protocols of today must be capable of operating with the same efficiency in the very large-scale networks of the future. This highlights the need for asymptotic analysis on a network and its corresponding protocol design, which characterizes the asymptotic behaviors of network performance as its size grows. This is especially the case for wireless ad hoc networks (WANETs).

  151. Securing SAP Invoices using Document Signer CertificatesDownload Article

    Mrs. K.E. Eswari, Ms. S. Priyadharshini

    Abstract

    close

    With the development of Internet, digital signature becomes more and more important for the electronic documents security because of its data integrity protection and privacy. Almost every reasonable scale organisation needs to issue invoices and many more documents. For medium to large businesses, there are substantial benefits in eliminating paper and the associated handling and postage costs. Typically core financial data is held electronically and invoices are archived in digital form to avoid the costs and retrieval issues when using paper-based archiving. Online information systems allow organisations to improve their efficiency, substantially reduce their costs, enhance their green credentials and comply with regulatory requirements. Having timely and reliable access to accurate, final, approved and archived information is today’s business imperative. The present paper focuses on a comparative study of existing algorithms of digital signature on the basis of many hard problems.

  152. Securing Digital Documents using X.509 Certificates on Cloud InfrastructureDownload Article

    Mr. S.Sambasivam, Ms. M. Ponni

    Abstract

    close

    This paper is intended to provide a cloud-based digital signature platform with enhanced security solution in the field of cryptography. We proposed a new schema of digital signature where signature generation and verifications are done on the cloud environment. Secure Long-Term Archival System (SLTAS) that protects, in a verifiable way, the validity of today's digital signatures in a distant future. Moreover, our protocol provides a proof, when a signature was created, without the possibility of backdating. We include a description of our scheme and an evaluation of its performance in terms of computing time and storage space. Finally, we discuss how to extend our system to achieve additional security properties. This paper does not focus on the long-term availability of archived information. nor on format migration problems.

  153. Performance and Cost Evaluation of an Distribution Adaptive Multilevel Encryption Architecture for CloudDownload Article

    Mr. C. Mani, Mr. P.Anbalagan

    Abstract

    close

    Database as a service paradigm (DBaaS) poses several research challenges in terms of security and cost evaluation from a tenant’s point of view. The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. This thesis proposes a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the tradeoff between the required data confidentiality level and the flexibility of the cloud database structures at design time. This research proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. The proposed system demonstrates the feasibility and performance of the proposed solution through a software prototype. The proposed architecture manages five types of information: plain data represent the tenant information, encrypted data are the encrypted version of the plain data, and are stored in the cloud database, plain metadata represent the additional information that is necessary to execute SQL operations on encrypted data; encrypted metadata are the encrypted version of the plain metadata, and are stored in the cloud database; master key is the encryption key of the encrypted metadata, and is known by legitimate clients. The propose a model and a methodology that allow a tenant to estimate the costs of plain and encrypted cloud database services even in the case of workload and cloud price variations in a medium-term horizon. By applying the model to actual cloud provider prices, we can determine the encryption and adaptive encryption costs for data confidentiality. Future research could evaluate the proposed or alternative architectures for multi-user key distribution schemes and under different threat model hypotheses.

  154. Privacy Protected Personalized Web Search using Cache ModelDownload Article

    Mrs. K.E.Eswari, Ms. S. VishwaPriya

    Abstract

    close

    The web search engine has long become the most important portal for ordinary people looking for useful information on the web. However, users might experience failure when search engines return irrelevant results that do not meet their real intentions. Such irrelevance is largely due to the enormous variety of users’ contexts and backgrounds, as well as the ambiguity of texts. Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are tailored for individual user needs. As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query. Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. This research studies privacy protection in PWS applications that model user preferences as hierarchical user profiles. This project proposes a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user-specified privacy requirements. The proposed runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. The study presents two greedy algorithms, namely Greedy DP and Greedy IL, for runtime generalization. It also provides an online prediction mechanism for deciding whether personalizing a query is beneficial.

  155. Securing Digitally Signed Documents on Cloud InfrastructureDownload Article

    Mr. C. Mani, Mr. P. DhineshRaaj

    Abstract

    close

    Cloud computing is the most demanded advanced technology throughout the digital world. One of the prominent services offered in cloud computing is the cloud storage.Cloud computing services need to address thesecurity during the transmission of sensitive data and critical documents between shared and public cloud environments. It essentially shifts the user data and application software to large data centres i.e. cloud, which is remotely located, at which user does not have any control and the management of data may not be completely secure. However, this sole feature of the cloud computing introduces many security challenges which need to be resolved and understood clearly.There is a concept for securing data with Digital Signatures in the cloud computing. In the serviceprovider’s data centre, protecting data privacy and managingcompliance are critical by using encrypting and managingencryption keys of data in transfer to the cloud. In this study, an attempt is made to review the research in this field. The results of review are categorized based on type of approach and the type of validation used to validate the approach.

  156. Smart Healthcare using IoTDownload Article

    Ms. N. ZahiraJahan, Ms. A.G. JananisriKamatchi, Ms. R. Pavithralakshmi, Ms. S. M. Mehala, Ms. S. Shanmugapriya

    Abstract

    close

    Internet of Things (IoT) allows for small devices with sensing, processing and communication ability to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to realize the environment. In this paper, a distributed framework based on the internet of things archetype is proposed for monitoring human biomedical signals in activities involving physical action. The main advantages of the proposed system are the flexibility in computing the health application by using resources from available devices inside the body area network of the user. This proposed framework can be applied to other mobile environments, especially those where intensive data possession and high processing needs take place. Finally, we present a case study in order to validate our proposal that consists in monitoring footballers’ heart rates during a football match. The real-time data acquired by these devices presents a clear social objective of being able to forecast not only situations of sudden death but also possible injuries.

  157. Parallel and Multiple E-Data Distributed Process with Progressive Duplicate Detection ModelDownload Article

    Mrs. K. E. Eswari, Mr. S.PraveenKumar

    Abstract

    close

    Duplicate detection is the process of identifying multiple representations of same real world entities. In present, duplicate detection methods need to process ever larger datasetsin ever shorter time: maintaining the quality of a dataset becomes increasingly difficult. This paper presents two novel, progressive duplicate detection algorithms that significantly increase the efficiency of finding duplicates if the execution time is limited: They maximize the gain of the overall process within the time available by reporting most results much earlier than traditional approaches. Comprehensive experiments show that progressive algorithms can double the efficiency over time of traditional duplicate detection and significantly improve upon related work. Data are among the most important assets of a company. But due to data changes and sloppy data entry, errors such as duplicate entries might occur, making data cleansing and in particular duplicate detection indispensable. Progressive duplicate detection identifies most duplicate pairs early in the detection process.

  158. An Efficient DDOS TCP Flood Attack Detection and Prevention System in a Cloud EnvironmentDownload Article

    Mr. S. Sambasivam, Mr. P. Nandhagopal

    Abstract

    close

    Distributed Denial of Service (DDOS) attacks in cloud computing environments are growing due to the essential characteristics of cloud computing. software-based traffic analysis, centralized control, global view of the network, dynamic updating of forwarding rules, make it easier to detect and react to DDOS attacks. Distributed denial-of-service (DDOS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed bonnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infrastructure resources. In this thesis, we address the problem of DDOS attacks and present the theoretical foundation, architecture, and algorithms of Fiercely. The core of Fiercely is composed of intrusion prevention systems (IPSs) located at the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of Fiercely using extensive simulations and a real dataset is presented, showing Fiercely effectiveness and low overhead, as well as its support for incremental deployment in real networks. Load balancing is one of the main challenges, important technique, critical issue and play an important role which is required to distribute workload or task equally across the nodes or servers. and also this thesis address and provides a detailed summary of the load balancing optimization techniques of evolutionary and swarm based algorithms.

  159. Enhanced Ring Routing Protocol Model for Energy-Efficient Routing Protocol for WSN with Cluster Head and Mobile Sink NodeDownload Article

    Mr. R. NavinKumar, Mr. S. Sasidharan

    Abstract

    close

    In wireless sensor networks (WSNs), energy efficiency is considered to be a crucial issue due to the limited battery capacity of the sensor nodes. Due to the converge cast nature of traditional WSNpacket forwarding approaches resulting in the concentration of data traffic towards the sinks, the nodes in the vicinity of the static (immobile) sinks are more likely to deplete their batteries before other nodes, leading to the energy hole problem disruptions in the topologyand reduction in the sensing coverage. Load-balancing is implicitly provided by the sink mobility, shifting the hotspots around the sinks and spreading the increased energy drainage around the sink, which helps achieving uniform energy consumption that extends the network lifetime. Sink mobility also has security benefits where the mobility makes the sinks more difficult to compromise than static sinks. To ease the data collection efforts in such scenarios, thus making mobile sinks more applicable, heterogeneous architectures stemming from the marriage of WSNs with other types of networks are also possible.

  160. Scalable Learning for Identifying and Ranking Prevalent News Topics using Social Media FactorsDownload Article

    Mrs.K.E.Eswari, Mr. G. Sethupathi

    Abstract

    close

    In this paper describe a valuable information from online sources has become a prominent research area in information technology in recent years. In recent period, social media services provide a vast amount of user-generated data, which have great potential to contain informative news-related content. For these resources to be useful, must find a way to filter noise and only capture the content that, based on its similarity to the news media is considered valuable. In addition, the project includes a new concept called sentiment analysis. Since many automated prediction methods exist for extracting patterns from sample cases, these patterns can be used to classify new cases. The proposed system contains the method to transform these cases into a standard model of features and classes. As a result, the behavior of individuals is collected through their posts in a forum and then they are classified as positive/negative posts. The cases are encoded in terms of features in some numerical form, requiring a transformation from text to numbers and assign the positive and negative values to each word to classify the word in the document.

  161. Secure Deduplication with Efficient and Reliable Convergent Key ManagementDownload Article

    Mr. R. NavinKumar, Mr. N. Sridharan

    Abstract

    close

    Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. The project first introduces a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to dedicatedly protect the master keys. To this end, this project proposes Dekey, a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. In addition, the paper focuses on trade-offs between storage cost and rekeying cost for secure multicast based on hierarchical tree structure. Membership in secure multicast groups is dynamic and requires multiple updates in single time frame. The project presents a family of algorithms that provide a trade-off between the number of keys maintained by users and the time required for rekeying due to revocation of multiple users. It is shown that some well-known algorithms in the literature are members of this family. The project shows that algorithms in this family can be used to reduce the cost of rekeying when compared with previous solutions while keeping the number of keys manageable. It also describes a scheme to reduce the number of secrets further when revocations are periodic.

  162. Network Traffic Separation and Aggregation in Mapreduce for Bigdata ApplicationsDownload Article

    Mrs. K.E.Eswari, Ms.P.Sandhiya

    Abstract

    close

    The Map Reduce is a programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster. Although many efforts have been made to improve the performance of Map Reduce jobs, they ignore the network traffic generated in the shuffle phase, which plays a critical role in performance enhancement. Traditionally, a hash function is used to partition intermediate data among reduce tasks, which, however, is not traffic-efficient because network topology and data size associated with each key are not taken into consideration. In this paper, we study to reduce network traffic cost for a MapReduce job by designing a novel intermediate data partition scheme. Furthermore, we jointly consider the aggregator placement problem, where each aggregator can reduce merged traffic from multiple map tasks. A decomposition-based distributed algorithm is proposed to deal with the large-scale optimization problem for big data application.

  163. Design and development of solar hydroponics systemDownload Article

    M.Aruna, K.Ishwarya, A.Kalaiselvi, S.Sivasankari, M.G.Anand

    Abstract

    close

    Hydroponics is a subset of hydro culture, the method of growing plants without soil, using mineral nutrient solutions in a water solvent. Terrestrial plants may be grown with only their roots exposed to the mineral solution, or the roots may be supported by an inert medium, such as perlite or gravel. The nutrients in hydroponics can come from an array of different sources; these can include but are not limited to waste from fish waste, duck manure, or normal nutrients. Hydroponic approach to growing plants has many benefits over conventional approach, such as: plants grow faster on smaller area and require less water. Hydroponic system usage in industry is quite well established, however, these systems are usually very specialized and complex. Home users can therefore mostly choose between oversimplified suboptimal or overly demanding hydroponic systems. As a solution to this problem a hydroponic system was designed which has all the capabilities of the complex systems but is simple for managing since it comes with integrated logic that takes over most of the managing tasks

  164. A Survey on Network Lifetime Enhancement in Wireless Body Area NetworkDownload Article

    E.Janani, Mr. S. Karuppusamy

    Abstract

    close

    In Wireless Body Area Network (WBAN) is developing speedy advancement and it has such a large number of new techniques and calculations for finding the ideal way to propagate crisis messages. One of the primary social calculations is ACO (Ant Colony Optimization), which takes care of numerous difficult issues, for example, Traveling Salesman Problem (TSP). In the TSP an arrangement of territory (e.g. urban areas) and the separations between them are given. The issue comprises of finding a shut voyage through insignificant length that visits every city. To apply ACO and TSP strategies, we consider the diagram portrayed by a partner the arrangement of urban communities with the arrangement of vertices of the chart. This chart is called development diagram. We set the lengths of the edges between the vertices to be relative to the partitions between the urban areas spoke to by these vertices and we relate pheromone esteems and heuristic esteems with the edges of the diagram. Notwithstanding that, it could consider the healing center condition as one of the fundamental applications. In this work, the ACO approach which serves to Traveling Salesman issue for finding most brief way to send the crisis messages to the specialist by means of sensor hubs and furthermore it has utilized static Bayesian Game Formulation with blended technique which upgrade the system life time. At whatever point the patients require crisis treatment or medicinal care, the crisis messages will be made by the WBAN and sends to the goals of specialist. These interchanges should be possible utilizing ACO and Bayesian Game Formulation.

  165. A Survey on Energy Efficient Routing Protocols in WSNDownload Article

    B.Srimathi, Dr.P.Thirumoorthy

    Abstract

    close

    In these paper the computability of distinctive routing protocols for wireless sensor network and routing algorithms are expressed to obtain the efficient network construction and to perform the secure data communication. Wireless Sensor Networks(WSNs) are progressively being implemented in security-basic applications. Recently, there has been dramatic increase in the popularity of the WSN applications. The routing protocols are the hot areas to address quality-of-service (QoS) related issues, ring construction, packet passing, energy consumption, network lifetime, network scalability, and packet overhead. The key issue in WSN is that these systems experience the will effects of the packet overhead, which is the underlying driver of more vitality utilization and debase the QoS in sensor systems. In WSN, there are several routing protocols, which are used to enhance the performance of the network and energy consumption with minimum range. By that we can increase the routing probability. Simulation results shows that our design the existing algorithms in terms of energy consumption and network lifetime maximization.

  166. A Survey on Enhanced Data Deduplication in Cloud EnvironmentDownload Article

    S.Vinitha, Dr.S.Prabhadevi, S.Prabhu

    Abstract

    close

    Cloud computing is an information technology (IT), a model for enabling ubiquitous access to shared pools of configurable resources.Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Although convergent encryption has been extensively adopted for secure de duplication, A critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper provides the comprehensive study of cloud security issues , various algorithms and encryption and decryption techniques used to ensure the secure data dedpulication in cloud environment.

  167. A Survey: Content mining in information mining TechnologiesDownload Article

    P.Pavithra, M.Parvathi

    Abstract

    close

    Data mining, Likewise alluded should Similarly as content information mining, harshly equal will content analytics, may be those procedure for inferring high-quality majority of the data starting with content. High-quality majority of the data may be commonly determined through the contriving from claiming designs What's more patterns through intends for example, Factual example Taking in. In this project recognizing also extracting Different educational substances starting with insightful documents may be an dynamic region from claiming Examine. To algorithm disclosure over advanced documents, Furthermore depicted a system to programmed identification from claiming pseudo-codes to PC science publications.

  168. A Survey: Web Mining in Information TechnologiesDownload Article

    B.Yeshwanth, E.Padma

    Abstract

    close

    This venture displays an approach for measuring those semantic relatedness between ideas to information Graphs (KGs) for example, WordNet Furthermore DBpedia. Previous worth of effort around semantic similitude methodologies focused for whichever the structure of the semantic framework between plans (e. G. , way length What's more depth), or simply on the data substance (IC) of thoughts. A semantic comparability technique, will make particular wpath, should join these two methodologies, utilizing ic will weight the majority short route period between thoughts. Accepted corpus-based ic may be registered from the circulations of thoughts through text based corpus, which will be needed on set up. An space corpus holding clarified plans also need secondary computational cosset. Concerning illustration occurrences would presently removed starting with abstract corpus and elucidated toward thoughts On KGs, graph based ic is suggested with in perspective of the appropriations about thoughts again occasions.

  169. Vision based eye blink monitoring system for human computer interactionDownload Article

    M.Deepika P.Harish Kumar M.Ramya E.Padma

    Abstract

    close

    The main objective of our project is to compensate people who have hand disabilities that prevent them from using the mouse by designing an application that uses facial features (nose tip and eyes) to interact with the Computer. Eyes were used to simulate mouse clicks, so the user can fire their events as the person blinks. Eyes were used to simulate mouse clicks, so the user can fire their events as he blinks. While different devices were used in HCI (e.g. infrared cameras, sensors, microphones) we used an off-the-shelf webcam that affords a moderate resolution and frame rate as the capturing device in order to make the ability of using the program affordable for all individuals. Trying to present an algorithm that distinguishes true eye-blinks from the involuntary ones. It detects and tracks the facial features abruptly, thereby fast enough to be applied in real-time. The human face of different races that can be captured with the help of night vision camera that detects the facial features correctly and translates it in to some events which are further used to communicate with the computer.

  170. Improving the Performance of Adaptive Secured Backup Ad-hoc Routing protocol by Artificial Neural Networks in Wireless Ad-hoc NetworksDownload Article

    Vignesh.M, Deepak Kumar.T, Sakthivel.K, Mahalingam.R, Satheesh Kumar.S

    Abstract

    close

    The Proposed work is concerned with secured backup routing protocol, which is used to store secured backup routes from multiple routes available between the source and destination in Ad-hoc networks. Ad-hoc network users while on movement can use the network services efficiently and securely by using the proposed protocol. The Efficiency of the Secured Backup Routing Protocol can be improved by using Artificial Neural Networks. We simulate our protocol using NS2 and obtain the result that shows the packet drop ratio is very low and packets sent are high than the existing routing protocols.

  171. Skill Based Workflow Scheduling for Efficient Utilization of ResourcesDownload Article

    K.S. Sathya, P.Esakkiappan, S.Renugadevi, V.Samruthaa

    Abstract

    close

    Workflow applications are collections of several structured activities and computational tasks. Efficient workflow scheduling has become critical resulting in reduced scheduling overhead minimizes the cost and maximized resource utilization while meeting user specified overall deadline. The proposed system aims at deriving a system which maximizes the resource utilization, minimizing the financial cost and less scheduling overhead. The proposed approach splits the work flow into tasks and groups the tasks based on dependency of data and priority constraints. Thereafter optimizing the allocation and scheduling of resources in heterogeneous projects dynamically.

  172. Analysis of Student Learning Experience by Mining Social Media DataDownload Article

    P.Uma, Lavanya.V, Evangelin Blessy.T, Blessy.K

    Abstract

    close

    Many issues like depression, suicide, anger, are increasing among students. These issues are necessary to seek out and analyze, but students never discuss their issues with anyone. Today Social media is very popular medium where individuals share their feeling and opinion. Students also terribly active on social sites like Face book and Twitter. Their unceremonious discussion on social media (e.g. Twitter, Face book) illuminates light on their educational experiences—vote, sentiment, opinions, feelings, and concerns about the learning process. Data from such environments can supply valuable information which is helpful knowledge to understand student learning experiences. Analyzing such data can be challenging. The augmenting scale of data demands automatic data analysis techniques. This paper depicts a workflow to integrate both qualitative analysis and large-scale data mining techniques. This Paper emphasized on student’s twitter posts to learn problems in student life as well as positive things occurred in their educational life. First conducted a qualitative analysis on sample tweets related to student’s college life. Students face issues such as heavy work load of study, lack of social engagement, and sleep deprivation, employment issue, etc. In this paper “positive things” happen in student’s life is also taken in to consideration. To classify tweets reflecting student’s problem multilabel classification algorithms is implemented. Naïve Bayes and Linear Support Vector Machine Learning algorithms are used. The performance of these algorithms is compared in terms of accuracy, precision, recall and F1-Measure.

  173. Authentication Handover and Privacy Protection in 5G HETNETS Using Software Defined NetworkingDownload Article

    P. Uma, S.Gowtham, P.Sangavi, N.Santhiyabharathi

    Abstract

    close

    Recently, defined small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along with stringent latency requirements in 5G brings new challenges in security provisioning due to the potential frequent handovers and authentications in 5G small cells and HetNets. In this article, we review related studies and introduce SDN into 5G as a platform to enable efficient authentication hand - over and privacy protection. Our objective is to simplify authentication handover by global management of 5G HetNets through sharing of user dependent security context information among related access points. We demonstrate that SDN-enabled security solutions are highly efficient through its centralized control capability, which is essential for delay-constrained 5G communications.

  174. Finding Malicious Web Page in Mobile Download Article

    Dr.V.Vennila, Mr.G.SivaSelvan, M.S.Santhiya, G.Soundarya, I.Umamaheswari, M.Vaijayanthi

    Abstract

    close

    With the rapid improvement and boon in worldwide data, an accurate need has been raised to enhance and layout the search algorithms. That enable us to search the specific required facts efficiently from the big repository. In this paper, we use specific web crawlers for obtaining consequences efficiently. There are many net crawler that collects distinctive internet pages that commonly fulfill some particular property. A focused net crawler analyze its move slowly to find the hyperlinks that are maximum applicable for the fast move, and avoids beside the point areas of the web. This ends in good savings in hardware community sources, and helps to keep the crawl updated. The procedure of proposed I-Spider internet crawler is to nurture a set of web documents which can be centered on a few topical subspaces. It identifies the most important and relevant link to follow by counting on probabilistic models for predicting the relevancy of the file.

  175. Data security using device Identification in Cloud Platforms by APIDownload Article

    Praveen kumar A, Arjunan K, Pavithra M, Usharani M, Vimal R.Y, Vanathi D, Satheeshkumar S

    Abstract

    close

    Cloud computing is a new computing model that offers a number of advantages such as low cost, only pay for selected services, hardware and software on rent. Due to its increasing popularity in information technology market, many new service providers are trying to implement this new model to provide number of services to Small and Medium Enterprises (SMEs). Hence these models can be used in increasing the security towards the data transmission. This paper was presented from survey findings to overcome the security threads in the data transmission and device identification. This helps the developers to use it as Library or API to increase the security for the system.

  176. An Efficient path planning for Emergency Navigation with Distributed Wireless Sensor NetworksDownload Article

    R.Gayathri, S.Josiphus, V.Kalaivani, K.Kavitha

    Abstract

    close

    When emergencies happen, navigation services that guide people to exits keeping them away from emergencies are critical in saving lives. To achieve timely emergency navigation, early and automatic detection of potential dangers, and quick response with safe paths to exits are the core requirements, both of which rely on continuous environment monitoring and reliable data transmission. Wireless sensor networks (WSNs) are a natural choice of the infrastructure to support emergency navigation services, given their relatively easy deployment and affordable costs, and the ability of ubiquitous sensing and communication. In this project, a situation-aware emergency navigation algorithm named SEND, which takes the hazard levels of emergencies and the evacuation capabilities of exits into account and provides the mobile users the safest navigation paths accordingly is being proposed. The situation-aware emergency navigation problem is formally modelled and a hazard potential field in the network, which is theoretically free of local minima is established. By guiding users following descend gradient of the hazard potential field, SEND can thereby achieve guaranteed success of navigation and provide optimal safety. The effectiveness of SEND is validated by both experiments and extensive simulations in 2D and 3D scenarios.

  177. Location Aware Query Reorganisation using KNN Download Article

    Ms.P.Suganthi, Malarvizhi, Anusuyya. S, Deepika. A, 5Malarvizhi. C

    Abstract

    close

    Location-based services (LBS) enable mobile users to query points-of-interest (e.g., restaurants, cafes) on various features (e.g., price, quality). In addition, users require accurate query results with up-to-date travel times. Lacking the monitoring infrastructure for road traffic, the LBS may obtain live travel times of routes from online route APIs in order to offer accurate results. Our goal is to reduce the number of requests issued by the LBS significantly while preserving accurate query results. Our proposed work, the user has an access to router via an internet. Based on his present location he has to choose the destination point, and then LBS will communicate with server and shows you the nearest places of his choice. First, we propose K-NN Route analysis to exploit recent routes requested from route APIs to answer queries accurately. Then, we design effective lower/upper bounding techniques and ordering techniques to process queries efficiently. Also, we study parallel route requests to further reduce the query response time. Our experimental evaluation shows that our solution is three times more efficient than a competitor, and yet achieves high result accuracy (above 99 percent).Combine information across multiple routes in the log to derive lower/upper bounding travel times, which support efficient and accurate range and KNN search. Develop heuristics to parallelize route requests for reducing the query response time further. Evaluate our solutions on a real route API and also on a simulated route API for scalability tests.

  178. Human Computer Interaction for Visually impaired PeopleDownload Article

    R.Deepan S.Ramya S.Praveen Raj V.Manimaran

    Abstract

    close

    This project handles two core speech technologies "Speech Synthesis" and "Speech Recognition" that are supported through the Java Speech API. Our project requires a "Speech engine" designed to deal with either speech input or speech output. Speech synthesizer and speech recognizer are both speech engine instances. The Java Speech API defines a standard, easy-to-use, cross-platform software interface to state-of-the-art speech technology. Speech recognition provides computers with the ability to listen to spoken language and to determine what has been said. In other words, Speech synthesis provides the reverse process of producing synthetic speech from text generated by an application, an applet or a user. It is often referred to as text-to-speech technology. More time and effort has been given to increase user interactivity with computer using mouse and speech synthesis. Operation like media player, text reader, file search etc. have been implemented to give the application a look as of an O.S. for blinds. A GUI has been developed, that works same as windows GUI. Each window will have some buttons, each for a unique task. As mouse comes over the button, the synthesizer will speak that mouse is over this button, and what will happen if he performs some action with mouse.Full use of all the functionalities of mouse has been incorporated to make the application easier to use, just using one or two peripherals.

  179. Dual-server public-key encryption with keyword search for secure cloud storageDownload Article

    Sukumar P, 2Sharmila M, Swathi G,Ranjani C, Nandhini G

    Abstract

    close

    Searchable encryption is increasing interest for protecting the data privacy in secure searchable cloud storage. The security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). To show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of new framework, provide an efficient instantiation of the general framework from a Decision Diffie–Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.

  180. Optimum buildersDownload Article

    S.Venkatesan, M.Dhileep Kumar, M.Sathish Kumar, Mr.S.Prabhu

    Abstract

    close

    “OPTIMUM BULIDERS” is a system which is used to keep construction work details. The main aim of this project is to develop a system so as to reduce the amount time and effort required for keep the details of current construction work manually. The system is beneficial for both Engineers and construction companies with this system client can keep records of the daily work and view the current status of processing work. These systems mainly consist of four modules. The existing system take alert at a time and need more paper works current system required more manual work as more number of staff will be required if there are more of contracts or Project keeps the current detail will also requires more time. Identification of the drawbacks of the existing system leads to the design of the computerized system that will be compatible to the existing which is more use friendly and GUI oriented.

  181. Enhanced Selective Encryption Method for Big Data Sensing Stream Using Hash Chain Algorithm Download Article

    Savitha S, Logeswaran K, Abinaya N, Dhinakaran R, Mahalakshmi S, Dharamesh B

    Abstract

    close

    Resource constrained sensing devices are used to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems. A Data Stream Manager at the server collects the data streams often called big data to perform real time analysis and decision-making for these critical applications. A malicious adversary may access or tamper with the data in transit. One of the challenging tasks in such applications is to assure the trustworthiness of the collected data so that any decisions are made on the processing of correct data. Frequent pattern/itemset mining is a fundamental problem for many domains, thus has a number of applications. In this paper, we proposed a novel scheme to secure a multihop network programming protocol through the use of multiple one-way hash chains and an index-based algorithm that addresses the challenge and provides the exact answer. The one way hash chains scheme is shown to be lower in computational, power consumption and communication costs yet still able to secure multihop propagation of program images. The bigdata objects in these applications are often generated in a streaming fashion. The CP-Graph approach, a hybrid index of graph and inverted file structures. The CP-Graph computes the count of a given pattern and updates the answer while pruning unnecessary patterns.

  182. Online Texture Management for Fabric ProductsDownload Article

    S. Maheswari, Gowtham.S, Krishnendhu.K, Urmila Raj

    Abstract

    close

    Webpage is designed to allow the garment to keep track of all textile details, product details. This project aims to provide the advantages of online shopping to customers of a real shopping. Texture management system for garments, which is aimed to reducing the time consumption of the customer at various products and their ranges. It helps to buy the products in the garments anywhere through internet. We can place order easily through the webpage. It is also used to drop the selected items. The workload of the shopkeeper even reduces as it produces the bill automatically for the selected product including all the offers. Thus the customer will get the service of online shopping and home delivery from the garment. It makes the customer to feel free while shopping as it usually attract most of the customer. Product characteristic is another factor that will influence the consumer's intention to purchase in the internet.

  183. Mitigating Security Challenges for Insider Attacker on Fog DevicesDownload Article

    Sam Immanuvel.P, Shankara Perumal.A, Shiddharth.C, Parvathi.M

    Abstract

    close

    Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. In this article, we elaborate the motivation and advantages of Fog computing, and analyze its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. Security and privacy issues are further disclosed according to current Fog computing paradigm.. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.

  184. On The Security Of Data Access Control For Multi Authority Cloud Storage SystemsDownload Article

    Nivodhini M K, Vasuk.P, Kiruthika K, Lokesh P N, Sangeetha C, Suriya Kumar S

    Abstract

    close

    Data Access control has becoming a challenging issue in cloud storage systems. Some technique have been proposed to achieve the secure data access control in semi trusted cloud storage system. Recently, K. Yang et al. proposed a basic access control scheme for multi authority cloud storage system (DAC-MAC) and an extensive data access control scheme (EDAC-MACS). We claimed that the DAC-MACS cloud achieve efficient decryption and immediate revocation and the EDAC-MACS could achieve these goals even though no revoked users reveals their key Update keys to the revoked user. However, though our cryptanalysis, the revocation security of both schemes cannot be guaranteed.

  185. An Intelligent Smartphone Based Approach using IOT for Ensuring Safe DrivingDownload Article

    Dr.J.Santhosh, Mrs.V.Sharmila, S.Dhivya, B.Aravind Selvam, M.Prem Kumar, V.Ragavi

    Abstract

    close

    Road accident is wide spread problem all over the world. The number of vehicles is increasing rapidly. Therefore, the probability of an accident is also increasing. So in this paper, we propose an IoT-based system for providing safe driving it will collect data using smartphone and show the information about shortest path to the destination, condition of the road ,weather condition of the destination and nearby hospital, restaurants of their current location. If there is any inconvenience, the user can check for the another path to the destination. We have developed an android based application which will collect the data from the vehicle. The result will shown in Google map of driver’s smartphone. This information will be stored in the cloud for further use. We have tested our proposed system through statistical as well as experimental evaluations.

  186. Monitor Soil Moisture and Controlling Motors Using IoTDownload Article

    Sharmila V, Santhosh J, Meena S, Nikitha N, Pramoth P, Prasanth S

    Abstract

    close

    India’s population is increasing day by day then once 25-30 years there'll be significant issue of food, therefore the development of agriculture is important. Today, the farmers area unit full of the shortage of rains and inadequacy of water. The most objective of this paper is to produce AN automatic irrigation system thereby saving time, cash and power of the farmer. The standard farm-land irrigation techniques need manual intervention. With the machine-controlled technology of irrigation the human intervention will be reduced. Whenever there's a modification in temperature, humidity, wetness and pH level of the environment these sensors senses the changes and offers an interrupt signal to the monitor and management the irrigation from anyplace.

  187. Multimodel Document Summarization K-SVM AlgorithmDownload Article

    P. Agalya, T. E. Ramya, R. Vishnu Raaj, 4Mr. P. Manimaran

    Abstract

    close

    The fully integrated text mining system is designed to support the complex and highly literature-dependent task of mining datasets assessment. The task is critical because IT Keywords play an important role in everyday life and their potential risk to technical results must be evaluated. With thousands of IT Keywords introduced every year, many countries worldwide have established increasingly strict laws governing their production and use. The efficient processing of document streams plays an important role in many information filtering systems. Emerging applications, such as news update filtering and social network notifications, demand presenting end-users with the most relevant content to their preferences. The user preferences are indicated by a set of keywords. A central server monitors the document stream and continuously reports to each user the top-k documents that are most relevant to her keywords. The improvement on the effectiveness of using and updating discovered patterns for finding relevant and interesting information. Substantial experiments on K-SVM Mining data collection and TREC topics demonstrate that the proposed solution achieves encouraging performance. The project is to prove an RSS resource lies with the client. These statistics on refresh frequency and volatility illustrate the challenge faced by a proxy in satisfying user needs. As the number of users and servers grow, service personalization through targeted data delivery by a proxy can serve as a solution for better managing system resources. In addition, the use of profiles could lower the load on RSS servers by accessing them only to satisfy a user profile.

  188. Dengue Disease Prediction Using SMO ClassificationDownload Article

    M. Preetha, P. Santhosh, R. Saran kumaR, Ms. K. Poongodi,

    Abstract

    close

    The aim of this work is to examine the performance of different classification techniques. A dengue disease can cause severe damages to the society. Hence, it is critical to predict a dengue disease in advance to minimalize the damage and loss caused by the disease. The clinical documents maintained are a pool of information regarding the infected patients. By keeping this voluminous data we can predict the future occurrences of the disease earlier and safe guard the people. Dengue the global problem is common in more than 110 countries. Dengue infection has endangered 2.5 billion populations all around the world. Every year there are 50 million people who suffer from it globally. Dengue fever is a vector borne disease caused by the female Aedes Aegypti and Aedes Albopictus mosquitoes which adapt well to human environments. Data mining is a well-known technique used by health organizations for classification and prediction of diseases.

  189. Discovering Optimal Services with Multi Criteria based Analysis on Social Network ReviewsDownload Article

    Mr. K. Santhosh Kumar, Mr. G. Suganraj, Ms. V. Sumithra, Ms. R. Mekala

    Abstract

    close

    The social networks are build to share the user reviews, photos, videos and opinions on products and locations. The geographical location information are collected with smart phone based applications. The check in and user posting details are maintained under the Location Based Social Networks (LBSN). The huge volume of data values are processed with the big data environment. The big data values are processed with the support of the cloud resources. The user spatial parameters and review information are utilized in the service rating prediction operations. The Location Based Rating Prediction (LBRP) algorithm is applied for the service rating prediction process. The LBRP uses the three measurements for the prediction process. The user-item geographical connections, user-user geographical connections and interpersonal interest similarity measures are estimated for the rating prediction process. The user – item geographical connection indicates the distance between the user ratings and the user – item geographical locations. The user – user geographical connection indicates the user rating differences and the user – user geographical location distances. The optimal service discovery operations are carried out with user behavior discovery and service score index methods. The user behavior estimation process is carried out with multi activity centers. The service score estimation and index operations are performed with the attributes of the Point of Interests (POI). The user recommendation task is integrated with the system to suggest better services with reference to the user behavior and ratings. The user category, region and seasonal aspects are employed in the multi criteria based recommendation process.

  190. An Integrated Resource and Service Consolidation Approach using History Logs under Cloud EnvironmentDownload Article

    Mr. R. Vijayendren, Ms. J. Thanuja, Mr. P. Sathishkumar, Mr. S. Santhosh Kumar, Mr. S. Vadivel,

    Abstract

    close

    Cloud computing provides all types of resources as services. Hardware and software resources are shared with reference to the user demands. Service components are deployed to support the enterprise applications. Virtual Machines (VM) are provided for the service components based on the capacity levels. Service component consolidation or VM consolidation refers the process of mapping the Virtual Machines to the service components. The service components associated with the same application is denoted as Dependant Service Component. Intelligent service management models identify the service dependencies to achieve the low network latency. The service consolidation with low communication time reduces the communication cost for the network applications. Service components for enterprise applications are deployed in many hosts and network devices. Service components consolidation is carried out with the consideration of resource constraints, service dependency and network structure. CloudScout is a non-intrusive approach applied for automatically discovers dependent service components. The correlation among service components is analyzed with the time-series information from system monitoring logs. The log mining approach is used for the service dependency discovery with generality and privacy protection features. The iEntropy method is applied to dynamically determine the weight of each resource metric in the service distance calculation. The hierarchical and iterative k-means (HiKM) algorithm is adapted for the dependent service clustering process.The Queue network and network latency optimization are used in the VM consolidation process. The CloudScout scheme is enhanced to support optimal service dependency discovery and service consolidation process. The service dependency discovery process is improved with sequential dependencies and complimentary dependencies. The Multi Objective Service Consolidation (MOSC) scheme is build to allocate the Virtual Machines for the service components. The service consolidation process is upgraded with resource level constraints.

  191. Attack Resistant Distributed Scheduling and Virtual Machine Management Framework for CloudsDownload Article

    V. Sampath Kumar, S. Vismeya, M. Vivek, P. Kanmani

    Abstract

    close

    Cloud computing environment supports high scalable hardware and software resource sharing platform through the Internet. The cloud provider shares the hardware resources with the cloud customers through the Virtual Machines (VM). Virtual Machines (VM) running on the same physical server are denoted as Co-resident VMs. The Co-resident Virtual Machines are logically isolated from each other. The logical isolation is violated by the side channels of the malicious users. The sensitive information from the Co-resident Vms are accessed by the malicious users is defined as Co-resident attacks. The Cryptographic keys, workloads and web traffic rates are the sensitive information accessed by the malicious users. The Co-resident attack is also referred as co-location, co-residence or co-residency attacks. The Virtual Machine allocation policy is used to place the Virtual Machines in the physical server. The malicious user co-locates their VM to the target VM. The security, workload balance and power consumption parameters are considered in the Virtual Machine placement process. Secure metrics are defined to measure the safety of the VM allocation policy. The Balanced VM Allocation Policy is build to assign VMs in the physical servers. The Previous Selected Server First (PSSF) policy is used with security metrics. Least VM allocation policy, Most VM allocation policy and Random allocation policy are used with the workload balance parameter. The data centers are connected to the Virtual Machines with in the same environment. The attack resistant Virtual Machine Management framework is build with centralized and distributed scheduling schemes. The live VM migration is protected from the side channel attacks. The system is enhanced with multiple data center management mechanism. The Distributed VM Placement (DVMP) policy is build to allocate the virtual machines on the physical server.

  192. Public Service SystemDownload Article

    Saranyadevi.J, Shalinidevi.R, Sowmiya.R, Suganya.T, Vanitha.P

    Abstract

    close

    Public Service System is a web based application for the user to register their complaints online. The complaints include TNEB Complaints, Corporation Related Complaints and Police Complaints. Whenever a consumer has got any complaint related to the electricity board such as current cut, power failure or street light problem then they can make complaints through TNEB Complaints. Complaints related to corporation department such as water, road, drainage, garbage and traffic problems then they can make complaints through Corporation Complaints. Complaints related to police department such as security and theft issues then they can make complaints through Police Complaints. All the complaints are registered using any of the valid government proof such as Voter Id, Pan Card or any Citizenship Proof along with photo upload. Their complaints are being taken care by the Department authorities. The registered complaints of the consumer, gets forwarded to the Superior Authority, then after the correction of the fault/issue, they take the relevant action regarding the complaint and the consumer can view the taken action by logging into their panel using their username and password.

  193. A Scalable Approach for Data-Driven Taxi Ride SharingDownload Article

    R.Kavitha, B.Keerthana, N. Gokulpriya, R. Aravinthrajan

    Abstract

    close

    Traffic congestion is a main issue all over the world. For that a proposed system called carpool is introduced. This system that will increase the number of occupation seats by decreasing the number of empty seats. In carpooling, drivers share their vehicles with one or more additional riders whose destinations are similar. It is good to traffic congestion, but also an environmentally sound transportation method. The genetic Algorithm is used for matching of which seekers goes with which driver. A Genetic algorithm is used for large number of users, so it gives proper match. This algorithm can because of exit from local optimal and with high percent produce the problem’s optimal answer. The probability of results show that mooted algorithm has better performance regards as other clustering algorithms specially in two indices, the carefulness of clustering and the quality of clustering.

  194. A Hierarchical OLSR Social Norm Incentives for Network Coding In MANETSDownload Article

    Nancy P, Abirami D, Kiruthika N, C. Dharanya

    Abstract

    close

    The performance of mobile ad hoc network transmissions subject to disruption, interference, and jamming can be improved by using the concept of network coding.By focusing on the Optimized Link State Routing (OLSR) protocol, an IDS mechanism to accurately detect and isolate misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The collaboration of group of neighbor nodes is used to make accurate decisions. Creating and broadcasting attackers list to neighbor nodes enables other node to isolate misbehavior nodes. Eliminating misbehavior nodes allow the source to select another path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers while keeping low overhead in terms of network traffic. The conditions for the sustainability (or compliance) of the social norm are identified, and a sustainable social norm that maximizes the social utility is designed via selecting the optimal design parameters, including the social strategy, reputation threshold, reputation update frequency, and the generation size of network coding. Finally, practical issues, including distributed reputation dissemination and the existence of altruistic and malicious users, are discussed.

  195. Velocity based Tracking and Localization System using Smartphones with GPS and GPRS/3GDownload Article

    Aswathbabu.O.G, Gopinath.P, Rajkumar.S, S.Kavitha

    Abstract

    close

    Smartphones are advanced versions of cell phones which can provide multi functions tasks. Most Smartphones have the following facilities: E-mails, Cameras, Wi-Fi connectivity, and comprehensive user interface such as touch screen and built in GPS system and interface for installing new applications. Using outdoor location-based services associated with GPS/GPRS have widely out broken. This paper aims at developing a velocity based system for location tracking that will be more convenient for users and more reliable, putting into consideration the expenses for the network service and increasing the accuracy in Smartphones.

  196. Human Body Communication Using IoT with GSM Enabled Healthcare Monitoring SystemDownload Article

    D.Vanathi, K.Vignesh, S.Kavin, S.Ranjith, S.Mathan

    Abstract

    close

    Increasing market demand for high performance and portable computing devices requires energy efficient devices. When we considered the network of devices, as in the case of the Internet of Things (IoT), this is important to consider low power design at the sensor level as well as in the Human body communication (HBC) has proven to be an efficient mode of communication for the near-field body sensor network module. In this paper, we propose an architecture for an ambulatory health monitoring system using a body coupled communication channel and we added a new feature that is Global System Module (GSM). In GSM module will collect the emergency data when the human body has an abnormal condition. The proposed architecture can be used to do health monitoring using IoT and GSM. When we use human body communication power reduction was observed. The human body acts as a communication module for these sensors to receive the emergency data in the data acquisition module connected to the internet. By providing an efficient communication channel between the sensors, power dissipation of the human body communication system can be greatly reduced. The physician can have the surveillance of patient's health condition for 24 hours using this system. Using PIC microcontroller low-cost Human Body Communication system can be made.

  197. Smart Agriculture Based on Internet of Things (IoT)Download Article

    Dr. A.Chandrasekar, B.Manoj Kumar, T.Maruthi Kasi Shashank

    Abstract

    close

    In India agriculture provides employment to large population which lives in villages and fully dependent on it to fulfil their livelihood. In the last decade, an incredible growth has been occurred in the use of electronic infrastructure for agricultural processes and development in India. In the recent time, an impressive development in information technology and electronic infrastructure has brought its usage well in the capacity of common people. The affordability of electronic equipment’s and IT based applications resulted to a tremendous development in agriculture sector. Farming community at large have started to monitor and control various agricultural activities such as irrigation, foresee climate situation, check soil construction and variety of crop cultures through the various information technology-based systems and projects implemented by the Government of India and different State Governments in India. But these farmers are facing problems due to whether, humidity theft. This paper mainly focuses on how we can avoid theft of cultivated crops.

  198. Applying Data Mining Techniques in Cyber CrimesDownload Article

    Mr. G .Sivaselvan, Dr.V.Vennila, R.Senbagavalli, E.Shanmugapriya, K.Umadevi, S.Suganthi

    Abstract

    close

    Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user’s behaviour etc. There are several types of attacks occurring from the internet. Our focus of research in this paper is Denial of Service (DoS) attacks with the help of pattern recognition techniques in data mining. Through which the Denial of Service attack is identified. Denial of service is a very dangerous attack that jeopardizes the IT resources of an organization by overloading with imitation messages or multiple requests from unauthorized users.

  199. Security Ensured Data Gathering and Decision Support Framework for Remote Health ServicesDownload Article

    T. Revanth, K. Manimekalai, S. Ananda vignesh, Mr. P. Sathishkumar

    Abstract

    close

    The smart phones and sensor devices are used to build the mobile health services. The mobile health services provides remote health monitoring process. The sensor devices are adapted to observe and transmit the blood pressure, Oxygen level and body temperature information. The Wireless Body Area Network (WBAN) is constructed with the sensor devices. The radio frequeny is employed to support all the data transmission tasks. The device to device (D2D) data transmission process is protected with authentication, confidentiality and data integrity operations. The mobile health systems are secured with the support of the Light-weight and Robust Security-Aware (LRSA) D2D-assist data transmission protocol. The Certificateless Generalized Signcryption (CLGSC) technique is employed to provide the security for the D2D data communication. The CLGSC scheme integrates the signcryption, signature and encryption with in single channel. The mobile health system is build with three elements Network Manager (NM), WBAN Client and Medical Service Provider. All the key management operations are carried out under network manager (NM). The mobile health service security scheme is enhanced with optimal relay selection and data forwarding policies. The medical data aggregation based query processing is supported in the system. Event detection and decision support operations are integrated with the system. Priority level based data forwarding operations are initiated to control the data transmission overhead. Node anonymization and data privacy features are combined to improve the security process. The data cache and replica schemes are also integrated with the system to support efficient data communication tasks.

  200. Spatio temporal and aspect features based sentiment analysis on customer reviewsDownload Article

    Ms. Priyadharshni. V, Ms. Sarumathi. S, Ms. Suruthi .M, Dr. B. Mahalakshmi

    Abstract

    close

    Online reviews are used as a decision support model for the consumers and feedback channel for the business organizations. Sentiment analysis techniques are employed to investigate online reviews. The sentiment expressed in review document is called as overall sentiment. Attribute level like and dislike factors are not represented in the overall sentiment estimation methods. The aspect level sentiment analysis model discovers the unique semantic fact of individual entity. The Aspect based sentiment analysis consists of two major tasks. They are, detect hidden semantic aspect from review document and identify fine-grained sentiments for the aspect. Probabilistic topic models are used for aspect-based sentiment analysis. The review documents and rating measures are analyzed to discover the semantic aspect level sentiments and overall sentiments. The probabilistic supervised joint aspect and sentiment model (SJASM) is employed to analyze the review documents in an unified framework. SJASM represents each review document in the form of opinion pairs. The aspect terms and opinion words are modeled for hidden aspect and sentiment detection. The overall sentimental rating is estimated with aspect and aspect level sentiments. The collapsed Gibbs sampling-based inference method is used for parameter estimation of SJASM. The aspect distribution is used to select the parameters for the sentiment estimation. The review documents are classified into positive or negative sentiments. The collaborative sentiment assessment model (CSAM) integrates the aspect and spatio temporal features. The Bayesian nonparametric model is applied to automatically estimate the number of latent topics from review data. The hybrid indexing scheme combines the aspect and spatio temporal parameters to order the review documents. The recommendation process is build with aspect, location and time features.

  201. Detecting Accident and Parking AreaDownload Article

    Ms.C.Selvi, K.Mythili, T.Vaishnavi, S.SadhamHussain

    Abstract

    close

    Security in travelling is a primary concern for everyone. Rising demand for automobile has increased the traffic, thereby causing more accidents on the road. People often lose their lives because of poor emergency facilities in the case of unattended accidents. Pre-emption of the accidents taking place on the roads is not possible but at least the after effects can be minimized. The proposed system ensures making emergency facilities available to accident victims as early as possible by letting relatives, hospital or a rescue team know the accident spot with the help of this module embedded in the vehicle. Sensors are attached to the arduino. In case there is an accident, the sensor gets activated and the GSM system will send notifications to the nearest hospital, police station or kind of the victim with the location coordinates where the accident has occurred. With the help of space navigation system GPS locates the position of the vehicle where accident has occurred. It can detect nearby parking areas by GPS.

  202. Microarray using Advanced Regression for Fixing Lost DataDownload Article

    K.Shanmuga Priya , R. Deepak ,R.Manikandan, R. Shadhna

    Abstract

    close

    Data missing is the more complicated problem in now a day, especially in hospitals. Most of the hospitals are using client server technology for data transferring inside the hospital. While transferring huge database from one location to another location else in case of data migration data loss may occur. At the time some values from the table or from database may disappear. These problems are said to be as data missing. In order to find out the missing values, sometimes prediction may used to fill the data. Prediction should be more accurate. So here we are implementing a multidimensional array model with modified advanced regression.The modified advanced regression will compare the existing spatial database with the normal database from the input database. So the result will be obtained from the dataset. Whether the patient will affect from cancer or not, also their infection ration percentage can be find out, along with the missing values in the database during the time of data migration. An improved advanced regression was introduced, to find the missing values in the dataset. BPCA obtains the lowest normalized rootmean-square error on 82.14% of all missing rates. Here we are proposing for 95.79 % of accuracy in the improvised algorithm.

  203. Emerging Twitter Using Text Classification Based on Live StreamingDownload Article

    K.Mohana Priya, R.Bavithra, M.Kanimozhi, V.Meenatchi, D.Janani

    Abstract

    close

    Twitter is one of the communication channels for spreading breaking news. It is an interesting platform for dissemination of news. The nature and brevity of the tweets are conducive way to share information related to important events. But one of the greatest challenges is to find the number of tweets that characterized as breaking news in the ocean of tweets. A novel method is used for detecting and tracking breaking news from Twitter in real-time. Filtering the stream of incoming tweets and it removes junk tweets by using greedy and text classification algorithm. It Compares the performance of different task and clusters the similar tweets. Finally, dynamic scoring system is used to track the news over a period of time. This method is used to collect, group, track and update the breaking news automatically. This provides a convenient way for people to follow the breaking news and stay connected with real-time updates. The domain-specific Naive Bayes model can capture the specific sentiment expressions in each domain. Two kinds of domain similarity measures are explored, one based on textual content and the other one based on sentiment expressions. In this method an efficient way to accurately categorize trending topics without need of external data, enabling news organizations to discover breaking news in real-time, or to quickly identify viral memes that might enrich marketing decisions, among others.

  204. Multi Constrained Virtual Machine Allocation for Cloud ServicesDownload Article

    Lisha M., Bhavya K Bharathan

    Abstract

    close

    The cloud resource provisioning is carried out as services. The resources are provided with user requests. The enterprise applications are build with the support of the service components. The Virtual Machine (VM) allocation for the service components are carried out with resource capacity levels. The process of Virtual Machines to the service components is called as service consolidation or Virtual Machine consolidation process. The dependant service components are services that are used in the same application. The network delay and communication cost is reduced with the support of the intelligent service management models and service dependencies. The enterprise applications are build with services under many hosts and devices. The resource, services and network constraints are considered in the service consolidation process. The non intrusive dependant service component discovery is achieved with CloudScout model. The service component relationship is analyzed with the time series details collected from the historical data maintained under the logs. The privacy preserved service dependencies are identified with log mining models. The service distance estimation is carried out with the weight of resource metric derived from the iEntropy method. The dependant service clustering process is carried out with the hierarchical and iterative k-means (HiKM) algorithm. The virtual machine consolidation operations are performed with queue network and network latency optimization process. The optimal service dependency discovery and service consolidation operations are integrated with the CloudScout scheme. The sequential dependencies and complimentary dependencies are combined in the service dependency analysis. The service components are assigned to the virtual machines using the Multi Objective Service Consolidation (MOSC) scheme. The resource level constraints are also analyzed in the service consolidation process.

  205. Distributed Pattern Discovery using Load Management with Resource and Data Constraints under CloudsDownload Article

    Ninumol C.P, Bhavya K Bharathan

    Abstract

    close

    Huge volume of data values are collected and managed under the big data models. The big data mining operations are performed with the support of the storage and computational resources from the clouds. The big data analytics are carried out using the Hadoop environment with parallel and distributed computing support. The homogeneous and heterogeneous computing models are managed with the Hadoop environment. The data and tasks are partitioned and processed as small elements in the MapReduce framework. The mapreduce framework is adapted to manage the data and task as tiny elements. The association rule mining methods are applied to detect the frequent patterns in the data values. The data values are equally divided and processed under the parallel frequent pattern mining techniques. The rule mining with load management operations are carried out with the Data Partitioning in Frequent Itemset Mining on Hadoop Clusters (FiDoop-DP). The transaction relationships are analyzed in the Voronoi diagram based data partitioning scheme. The similarity metric and Locality Sensitive Hashing (LSH) technique are applied to manage the redundant data values. The Parallel Frequent Pattern Growth algorithm is employed to discover the rules using the cloud resources. The data pattern discovery operations are designed with resource and data constraints. The dynamic data partitioning and transmission over the Hadoop clusters is supported in the parallel rule mining process. The dynamic resource level based computational nodes are used to construct the heterogeneous Hadoop clusters. The load management in data partitioning operations are carried out with data and resource constraints. The FiDoop-DP scheme is enhanced to handle the data placement with load management under the Hadoop Distributed File System (HDFS) in heterogeneous nodes. The computational and communication loads are minimized with the parallel frequent pattern mining process.

  206. Cloud Resource based Data Origin Detection with Security FeaturesDownload Article

    Remya M. K, Nikhila A

    Abstract

    close

    The network data transmission operations are handled with the Internet Protocol (IP). Each node in the network is allocated with the static or dynamic IP address values. The web applications can be disrupted from various sources. The IP traceback operations are carried out to discover the origin of the received data elements. The Internet Service Provider (ISP) maintains the logs with user data transmission details. The data origin detection is carried out with traceback log analysis. The topology structure of the Internet Service Providers can be extracted by the intruders during the IP traceback operations. The cloud resources are utilized in the IP traceback operations. The authentication and security are provided for the IP trace analysis under the cloud environment. The cloud based traceback services are build with privilege control models. The Framework for Authentication in Cloud-based IP Traceback (FACT) supports the IP traceback operations with security. The FACT scheme performs the user authentication with temporal token details. The traffic flow details and temporal tokens are combined and transferred to the end host. The IP header marking is restricted with header size parameters. The Enhanced FACT model is build with cloud resource based data origin discovery and security features. The Framework for Authentication in Cloud-based IP Traceback (FACT) scheme is upgraded with optimal marking method. The resource provisioning level based incentive assignment model is adapted in the traceback process. The computational overhead is reduced I the temporal token integrity verification process. The cloud resources and traceback data values are protected under the Enhanced Framework for Cloud based IP Traceback (EFACT) scheme. The Distributed Denial of Service (DDoS) attacks are controlled with service request interval and frequency values.

  207. Content Aware User Data Sharing and Anonymous Authentication on Public CloudDownload Article

    Ms. Saranyaa T, Ms. Sangeetha S., Mr.Vivek. M, Mr. E. Mohanraj

    Abstract

    close

    Cloud computing provides all types of resources as services. Hardware and software resources are shared with reference to the user demands. Service components are deployed to support the enterprise applications. It define and solve the challenging problem of privacy-preserving multi-keyword ranked ontology keyword mapping and search over encrypted cloud data (EARM), and establish strict privacy requirements for a secure cloud data utilization system to become a reality. The loosely coupled content-based provides an expressive form of communication for large-scale distributed systems. To avoid third party deployment confidentiality plays a major role for challenge over multiple administrative domains. Reduction of misunderstands by the usage of bloom filter and Enhanced Association rule mining.Among various multi-keyword semantics, the user choose the efficient principle of “Enhanced Association Rule Mining”.

  208. Dimensionality Reduction and Data Partitioning with Feature Hybridization SchemeDownload Article

    Mrs. M.S. Vinu

    Abstract

    close

    Data mining and machine learning methods are applied to extract knowledge from large databases. Dimensionality is the key issue in the data mining and machine learning applications. The high dimensional data analysis requires huge computational resources and processing time. The performance and accuracy are reduced with reference to the irrelevant, noisy and redundant features. Dimensionality methods are applied for better visualization, data compression, noise removal, understandability and generalization factors. Text mining, web mining, image processing and bioinformatics applications are build with dimensionality reduction methods. Dimensionality reduction is carried out with two models Feature Selection (FS) and Feature Extraction (FE). Feature selection discovers the suitable features from the original set of features. The feature extraction method transforms the original set of features into required form. The compound feature generation (CFG) model integrates the feature selection and extraction methods to fetch the original and transformed features. The Minimum Projection error Minimum Redundancy (MPeMR) framework is build with Unified iterative algorithm to fetch features in supervised and unsupervised cases. The Compound Feature generation (CFG) method is build with pairs of features in minimum projection error and redundancy estimation process. The feature hybridization scheme is build to combine the original and transformed features with generalized matching criteria. The feature integration operation is improved with diverse feature count based models. The data partitioning process is carried out on the dimensionality reduced data with K-Means clustering algorithm.

  209. Mobile Multi-source High Quality Multimedia Delivery SchemeDownload Article

    Mr.V.Abishek, Ms.N.Ramya, Mr.C.Satheeshkumar, Mr.V.Vijayragavan, Mr. S. Sivaprakash, Mrs. M. Umamaheswari

    Abstract

    close

    Increasing amount of multimedia content is being delivered over heterogeneous networks to diverse user types, holding various devices, many of them mobile. Mobile devices such as Smartphone’s and tablets have already become both consumers and sources of multimedia content, but the delivery quality varies widely, especially due to their users' mobility. In order to support increasing the quality of the multimedia content delivered to a growing number of mobile users, this paper introduces a mobile multi-source high quality multimedia delivery scheme (M3QD). M3QD supports efficient high quality multimedia content delivery to mobile users from multiple sources. Both simulations and prototyping-based perceptual tests show how increased user perceived video quality and improved mobility support is achieved when using M3QD in comparison with the case when a single source classic approach is employed. M3QD can be used in various scenarios involving multimedia content distribution between mobile users in leisure parks or around tourist attractions, content exchange between vehicles on urban roads and even information delivery in industrial applications, where content has to be shared between large number or diverse mobile users.

  210. Efficient Steganography in Encoded Video Stream Using Motion Vector DifferenceDownload Article

    K.Kumaresan, G.S. Rizwana Banu , N. Divya, M. Jayabharathi , J. Karthikayani

    Abstract

    close

    Digital video sometimes are stored and processed in an encrypted format to maintain privacy and security. For the purpose of content notation, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decryption followed by data hiding and re-encryption. In this paper, a novel scheme of data hiding directly in the encrypted version of AVI video stream, which includes the following three parts, i.e., AVI video encryption, data embedding, and data extraction. By analyzing the property of AVI codec and the code word of motion vector differences are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using code word substitution technique, without knowing the original video content. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size is strictly preserved even after encryption and data embedding. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  211. Social Network Data Analysis for User Stress Discovery and RecoveryDownload Article

    R. Ragavi, G.Maheswari S.Geeitha

    Abstract

    close

    The social networks are build to exchange images, videos and reviews between the members. The members can connect from anywhere and anytime. The checkin locations and time information are maintained under the Location Based Social Networks (LBSN). Location-Based Social Networks (LBSNs) provides the facility to access people’s locations, profiles and online social connections. High scalable, high volume and high velocity data items are processed using big data mining models. The social network data values are analyzed to estimate the user behavior and stress levels. The correlations of user interactions and stress are analyzed for the stress detection process. The social network data values are parsed and three types of attributes are extracted for the stress detection process. Stress-related textual, visual and social attributes are extracted for the stress detection process. The hybrid model combines the Factor Graph and the Convolutional Neural Network (CNN) for stress detection. Tweet content and social interaction are analyzed in the hybrid model. The automated stress discovery process is build with hybrid model, context and connection information. The location and time information are represented in the context information. The stress detection process is improved with spatio temporal features. The hybrid model is enhanced to detect multi level stress categories. The sparse user connation parameters are integrated with the stress detection process. The hybrid model is enhanced to suggest treatment levels. Automated stress release messages and suggestions are provided by the system.

  212. Integration of Feature Generation Scheme and Boosters for Micro Array Data ClassificationDownload Article

    P. Deepa, P. Soundarya, S. SanthiPriya

    Abstract

    close

    The large scale data analysis operations are carried out with the support of the data mining or machine learning methods. Dimensionality is the key issue in the data mining and machine learning applications. The high dimensional data analysis requires huge computational resources and processing time. Dimensionality reduction methods are applied for better visualization, data compression, noise removal and understandability and generalization factors. The data size is controlled with the dimensionality reduction tasks. The feature selection models are applied to reduce the dimensionality in the high dimensional data environment. The subset selection with relevancy factor is considered in the future selection process. Statistical methods are applied in the feature selection process. The weakly relevant features are discovered using the T-test model. The irrelevant features are removed with F-test model. The Q-statistics measures are applied to evaluate the features. The booster algorithm is applied for the feature improvement process. Naïve Bayes algorithm is used for the classification process. The static features are discovered using the feature selection methods. The feature extraction methods are applied to fetch dynamic features in the micro array data values. The compound feature generation mechanism is applied to combine feature selection and extraction tasks. The feature integration operations are carried out with multiple ratio based feature relationships. Boosting method is integrated with the compound feature generation scheme. The classification process is carried out using the Naïve bayes algorithm with generated feature values.

  213. On Road Automobile Management SystemDownload Article

    S.Sujila, A.M.Reshma, T.K.Vishnu Manjari, M.Abishek

    Abstract

    close

    A path planning and tracking framework is presented in order to maintain a collision free path for autonomous vehicles. For path planning approaches, a 3D virtual dangerous potential field is constructed as a superposition of trigonometric functions of the road and the exponential function of obstacles, which can generate a desired trajectory for collision avoidance when a vehicle collision with obstacles is likely to happen. Next, in order to track the planned trajectory for collision avoidance maneuvers, the path tracking controller formulates the tracking task as a Multi-constrained Model Predictive Control (MMPC) problem, and calculated the front steering angle to prevent the vehicle from colliding with a moving obstacle vehicle. Simulink and Car Sim simulations are conducted in the case where moving obstacles exist. The simulation results show that the proposed path planning approach is effective for many driving scenarios and the MMPC-based path-tracking controller provides dynamic tracking performance and maintains good maneuverability.

  214. A Prospective Study on Distributed Accountability and Trusted Data Sharing in Cloud ComputingDownload Article

    G.S.Suriyakumar , K.Manoj kumar, J.Muruganth, E.Sivaraman

    Abstract

    close

    The key barrier to widespread uptake of cloud computing is the lack of faith in clouds by potential customers. While preventive controls for security and privacy measures are actively being researched, there is still little focus on detective controls related to cloud distributed accountability and audit ability. The complexity resulting from the sheer amount of virtualization and data distribution carried out in current clouds has also revealed an urgent need for research in cloud accountability, as has the shift in focus of customer concerns from server health and utilization to the integrity and safety of end-users’ data. This paper discusses key challenges in achieving a trusted cloud data sharing through the use of detective controls, and presents the trust cloud framework, which addresses accountability in cloud computing via technical and policy- based approaches.

  215. Deep-cascade: Cascading 3D Deep Neural Networks for Fast Anomaly Detection and Localization in Crowded ScenesDownload Article

    Y.Dhushara, P.Kaviranjani, S.S.Kovarrthina, V.Gokul brindha

    Abstract

    close

    The aim of the project is detecting abnormalities in the crowd behavior.In terms of crowd behavior, while people walks in slow place, if they suddenly started to run then the alarm rings.The propose system first detect the optical flow between frames by using two frame polynomial expansion co-efficients.The magnitude of the difference of two consecutive frames will give us the activity map. The activity map shows how much motion is estimated between consecutive frames. The second by using the differences between activity maps, we obtain Temporal Occupancy Variation (TOV) level and Entropy level.

  216. Earthquake Prediction System by LSTMDownload Article

    Parameswaran.S, Nandha Gopal.A, Revathi.D, Senthamarai.M

    Abstract

    close

    Earthquake prediction is a branch of the science of seismology concerned with the specification of the time, location, and magnitude of future earthquakes within stated limits and particularly the determination of parameters for the next strong earthquake to occur in a region.Prediction can be further distinguished from earthquake warning systems, which upon detection of an earthquake, provide a real-time warning of seconds to neighboring regions that might be affected.Early Response Warning System is currently responsible for alerting airports,trains, fire stations, etc. coal mine workers are exposed to alife-threatening danger in a form of seismic events. The existing earthquake prediction algorithm based on mathematical analysis, machine learningalgorithms like decision trees and support vector machines, and precursors signal. The existing system do not have very accuracy due to the seemingly dynamic and unpredictable nature of earthquakes. In this proposed systemdeep learning technique called long short-term memory with gradient descent optimization algorithms(LSTM-AdaGrad) networks predicting future earthquakes using data of past earthquakes using Long Short-Term Memory neural networks algorithm. The experimental result shows the better performance compare with existing algorithm like spatial temporal analysis.

  217. Robust and Low Rank Representation for Fast Face Identification with OcclusionsDownload Article

    K.Kavitha, R.Gowsalya, S.Kavinkumar, R.Kowsalya

    Abstract

    close

    In this paper, we address the problem of robust face recognition with undersampled training data. Given only one or few training images available per subject, we present a novel recognition approach, which not only handles test images with large intraclass variations such as illumination and expression. The proposed method is also to handle the corrupted ones due to occlusion or disguise, which is not present during training. This is achieved by the learning of a robust auxiliary dictionary from the subjects not of interest. Together with the undersampled training data, both intra and interclass variations can thus be successfully handled, while the unseen occlusions can be automatically disregarded for improved recognition. Our experiments on four face image datasets confirm the effectiveness and robustness of our approach, which is shown to outperform state-of-the-art sparse representation-based methods.

  218. Secure data deduplication of documents in cloud environmentDownload Article

    Priyanga.R, Monalisa.A , Mythili.G, Praveen.C

    Abstract

    close

    In cloud storage services, de-duplication technology is commonly used to reduce the space and bandwidth requirements of services by eliminating redundant data and storing only a single copy of them. De-duplication is most effective when multiple users outsource the same data to the cloud storage, but it raises issues relating to security and ownership. Proof of ownership schemes allow any owner of the same data to prove to the cloud storage server that he owns the data in a robust way. However, many users are likely to encrypt their data before outsourcing them to the cloud storage to preserve privacy, This hampers de-duplication because of the randomization property of encryption. Recently, several de-duplication schemes have been proposed to solve this problem by allowing each owner to share the same encryption key for the same data. However, most of the schemes suffer from security flaws, since they do not consider the dynamic changes in the ownership of outsourced data that occur frequently in a practical cloud storage service. In this paper, we propose a novel server-side de-duplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but-curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible.

  219. Analysis of instagrammer’s attitude through enhanced SVMDownload Article

    S.Anbukkarasi, A.Gayathri, A.Manikandan, J.Prathiba

    Abstract

    close

    Social media are influencing human beings preferences by shaping their attitudes and behaviors.Social media have received more attention nowadays.Public and Private opinion about a wide variety of subjects are expressed and spread continually via numerous social media.Instagram is one of the social media that is gaining popularity and logical marketing.Instagram dominates the digital marketing space,followed closely by Facebook.Sentiment analysis relates to the problem of mining the sentiments from online available data and categorizing the sentiment expressed by a particular entity into at most three preset categories:positive,negative and netural. This Paper emphasized on Instagram posts to learn emotions in Instagrammers life as well as positive things occurred in their life. First conducted a qualitative analysis on sample posts related to human emotions. Human beings have different types of emotions.we calculate only the four type of emotions like Happy, Sad, Anger, Fear, Surprise, Beauty and Excitement. To classify posts reflecting Instagrammers emotions through multilabel classification algorithms is implemented. N Linear Support Vector Machine Learning algorithms are used. The performance of these algorithms is compared in terms of accuracy, precision, recall and F1-Measure. Support Vector Machine learning algorithm have more accuracy than Naïve Bayes Algorithm.

  220. Secure enabled region based data sharing in manetDownload Article

    Guhan.E, Indhu.S Vanitha.M, Mrs.Kavitha.M

    Abstract

    close

    Mobile nodes in social environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text policy Anonymous Location Enabled Routing Encryption (CP-ALERT) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ALERT in decentralized OSN introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. The proposition of a secure data retrieval scheme using CP-ALERT for decentralized OSN where multiple key authorities manage their attributes independently is stated. The demonstration to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption tolerant military network.

  221. A Study on Virtualization and SOA Techniques in Cloud ComputingDownload Article

    R.Nalinraja, S.Ravikumar, K.Sugan, Mr.K.S.Giriprasath

    Abstract

    close

    Cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. There are many benefits to using cloud storage, most notable is file accessibility. Files stored in the cloud can be accessed at any time from any place so long as you have Internet access. Another benefit is that cloud storage provides organizations with off-site (remote) backups of data which reduces costs associated with disaster recovery. Unfortunately, the biggest disadvantage to cloud storage is that users are limited by bandwidth. If your Internet connection is slow or unstable, you might have problems accessing or sharing your files. Organizations that require a large amount of storage may also find costs increase significantly after the first few gigabytes of data stored. There are two key elements at the core of cloud computing technology, which are: SOA (Service Oriented Architecture) and cloud virtualization, which are described in this paper. SOA facilitates cloud computing by making software easier to distribute in the cloud. It can be an alternative to virtualization in server-sharing, or it can use virtualization to improve performance and reliability.

  222. Cluster Based Emergency Packet Scheduling For WSN Using Hierarchical Qos ClusteringDownload Article

    M.Shankar, M.Usha, M.Ranjitha

    Abstract

    close

    Generally, digital video sometimes are stored and processed in an encrypted format to maintain privacy and security. For the purpose of content notation, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decryption followed by data hiding and re-encryption. This project proposes a novel scheme of data hiding directly in the encrypted version of AVI video stream, which includes the following three parts, i.e.,AVI video encryption, data embedding, and data extraction. By analyzing the property of AVI codec and the codeword substitution of motion vector differences are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using codeword substitution technique, without knowing the original video content. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size is strictly preserved even after encryption and data embedding.

  223. Efficient Steganography in Encoded Video Streams Using Motion Vector DifferenceDownload Article

    M.Shankar, M.Usha, M.Ranjitha

    Abstract

    close

    Generally, digital video sometimes are stored and processed in an encrypted format to maintain privacy and security. For the purpose of content notation, it is necessary to perform data hiding in these encrypted videos. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decryption followed by data hiding and re-encryption. This project proposes a novel scheme of data hiding directly in the encrypted version of AVI video stream, which includes the following three parts, i.e.,AVI video encryption, data embedding, and data extraction. By analyzing the property of AVI codec and the codeword substitution of motion vector differences are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using codeword substitution technique, without knowing the original video content. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size is strictly preserved even after encryption and data embedding.

  224. Enhanced Efficient High Average Utility Pattern Mining For Shopping PackageDownload Article

    D.Lavanya, A.Pavithra,M.Abinaya, M.Nandhini, Ms.J.Sakunthala

    Abstract

    close

    High-utility itemset mining (HUIM) is a critical issue in recent years since it can be used to reveal the profitable products by considering both the quantity and profit factors instead of frequent itemset mining (FIM) or association-rule mining (ARM). Several algorithms have been presented to mine high-utility itemsets (HUIs) and most of the designed algorithms have to handle the exponential search space for discovering HUIs when the number of distinct items and the size of database are very large. The proposed algorithm first adopts the TWU model to find the number of high-transaction-weighted utilization 1-itemsets (1-HTWUIs) as the particle size, which can greatly reduce the combinational problem in the evolution process Frequent weighted itemsets represent correlations frequently holding in data in which items may weight differently.

  225. Bus identification system using RFIDDownload Article

    D.Harinipriya, M.Muniswari, R.Prathisha, R.Hemavathi, Dr.M.Anto Bennet

    Abstract

    close

    This system helps blind in travelling from one place to another. Generally journey in a bus is a safe and confort factor. But travelling in outdoor environment is difficult for those who have congenital blindness or blindness from young age. This work aims to develop a bus detection prototype using Radio Frequency Identification (RFID) for blind. RFID has the potential to be a useful aid with further standardisation of RFID tags and current RFID readers.

  226. An arduino based embedded system in car for road safetyDownload Article

    D.Haritha, K.Mahalakshmi, S.Vishalni, S.Kavya, Dr.M.Anto Bennet

    Abstract

    close

    Road safety accidents are one of the world’s major public health and injury prevention problems. According to the World Health Organisation (WHO), more than a million children are killed in road accidents each year ,all over the world . The motivation behind this work is an attempt to make an arduino based embedded system which makes the passenger’s journey even safer and more secure. This paper handles the road discipline such as speed control in different areas and horn control in horn prohibited zones. The features included in this work are vehicle speed control in school zone and also controlling the speed of the vehicle in different zones such as bridges, highways , cities and suburbs . It also includes horn control of vehicle in No horning zone-control horn disturbances in horn prohibited zones such as hospitals, public libraries, courts and schools.

  227. Season based traffic light using audrinoDownload Article

    T.Suriya, S.Purushoth, R.Jawahar, K.Rajesh Kumar Ahamed Meeran Mydeen

    Abstract

    close

    Due to rapid rise in automobiles & because of large time delays between traffic light. Controlling the traffic becomes a major task. This becomes a severe problem in many cities across the world. So in order to rectify this problem, we go for “Season Based Traffic Light”.Normally, a conventional traffic light works on a fixed time concept allotted to each side of the junction which can’t be varied & junction timings allotted are fixed. Higher traffic density occurs at one side of the junction which demands longer green time as compared to standard allocated time. This system is done using a ARDUINO UNO interfaced with sensor at the junctions. The IR sensors are used to detect the density at the traffic signal.

  228. Glucose level monitoring system using GSMDownload Article

    S.Nawin Chander, M.J.Lokesh, P.Joshuva Steve Allen, B.Vijay ,Ahamed Meeran Mydeen

    Abstract

    close

    Patient tracking structures is the time period for all the numerous gadgets that are used to supervise sufferers. One category of such devices is devices that indicators if the affected person gets right into a critical state. In our proposed method focuses on to monitor & initiate alert to doctors approximately the sufferers at some points of glucose journey injections. In our proposed device it will done four main duties, the flow of glucose will stopped, the float degree to be managed, while the liquid degree underneath the brink cost will upward push alarm and intimate to corresponding individual through wireless, then the any injections be applied means it is going to be automatically injected depends on the time based totally. All the actions are controlled through microcontrollers. And sensors are used to degree the price of liquid, and different feature primarily based motor.

  229. Data transfer using lifi technologyDownload Article

    B.Pavithra, P.Karthika, V.Rajeswari, E.Aarthi, Dr.M.Anto Bennet

    Abstract

    close

    Lifi stands for LIGHT FIDELITY. The technology is very new and was proposed by German physicist Harald Haas in 2011.Lifi is a wireless optical networking helps in the transmission of the data from on place to the other by using LED bulbs that varies in the intensity faster than the human eye can follow. The term Lifi refers to visible light communication (VLC) technology that uses as medium to deliver high speed communication. Lifi provides better bandwidth, efficiency, availability and security than the wifi technology has provided. The datas that are transmitted through the Lifi technology cannot be hacked that much easily as in wifi.

  230. Power Transmission Line Fissure Accident Control Using ArduinoDownload Article

    M.Thangavel V.Manikandan K.Dinakaran B.Saikiran I Ahamed Meeran Mydeen

    Abstract

    close

    In India, We read news that Humans and Animals die in rural areas or in agricultural areas as contact with broken & hanging live wires. Because of insufficient electronic equipment for safe power distribution and this leads to live hang wire accident. This work describes a modification to existing power distribution system with remote control unit for wire break or fissure detection. Circuit breaker with shunt trip mechanism breaks the supply and avoid damages from electrical accidents caused by overhead transmission lines conductor and breakage issues.

  231. Digital Drip Monitoring AlarmDownload Article

    S.Yacoop Rahman, V.Sathish Kumar, J.Albert Santhosh Raj, V.Shanmuga Priyan,

    Abstract

    close

    During recent years due to the technological advancements many sophisticated techniques has been evolved for assuring fast recovery of the patients in hospitals. For good patient care in hospitals, assessment and management of patient’s fluid and electrolyte need is the most fundamental thing required. All most in all hospital, an assist/nurse is responsible for monitoring the IV fluid level continuously. But unfortunately during most of the time, the observer may forget to change the saline bottle at correct time due to their busy schedule. This may leads to several problems to the patients such as backflow of blood, blood loss etc. To overcome this critical situation, a low cost IR based automatic alerting and indicating device is proposed where IR sensor is used as a level sensor. It is based on the principle that the IR sensor output voltage level changes when intravenous fluid level is below certain limit. A comparator is used to continuously compare the IR output with predefined threshold. When the transceiver output is negative then the PIC controller identifies the fluid level is too low and it alerts the observer by buzzer and LCD at the control room indicates the room number of the patient for quick recovery.

  232. Anti-collision and communication dеvicе for autonomous vеhiclеs basеd on Light-FidеlityDownload Article

    S.B.Yuvaraj, R.Androse, S.Yuvaraj, E.Karthikeyan A.Ahamed Meeran Mydeen

    Abstract

    close

    A new way of data transmission between two vehicles using light fidelity technology is proposed in this paper. A best way of avoiding accidents can be achieved by the communication between the vehicles. This system can be simplified by using LED bulbs for data transmission. The previously used data transmission technology can be overcome by the newly proposed LI-FI technology. The major objective of this system is to achieve reliable communication between the vehicle using a transmitter and a receiver. The communication methods and the operations are presented in detail.

  233. Study of UPFC and DPFC to less harmonic distortionDownload Article

    Mr. S.Natarajan

    Abstract

    close

    The technological advancements in power electronic devices and circuits lead to complete automation of both the power transmission/Distribution system as well as automatic control of industrial and domestic loads, which in turn increase nonlinear load currents drawn from the supply system. Additional heating losses, low power factor, low efficiency, higher temperature etc., are some of the results of these nonlinear currents. A new D-FACTS device is proposed to reduce the total harmonic distortion in the transmission system near load points. A comparative analysis will also be made with the existing FACTS device, UPFC.

  234. Voltage Stability Enhancement and Efficiency Improvement of Transmission System Using Unified Power Flow ControllerDownload Article

    S.Natarajan, P.Neeraj, A.R.G.Gagan Raj, P.Dharma Vignesh, A.Kishor

    Abstract

    close

    Consistent increase in the demand for electrical energy often leads to heavy loading of transmission lines. One of the consequences of this is that such transmission systems are subjected to imbalance in the reactive power and hence voltage instability and reduction in real power of the system. Conventional methods of enhancing voltage stability and improving efficiency have proven to be slow and difficult to control. A new approach, however, is the use of Flexible AC Transmission System (FACTS) controllers. This paper applied Unified Power Flow Controller (UPFC), a member of this class of devices to Nigeria’s 330kV transmission system using MATLAB. Obtained results showed an improvement in the voltage magnitude of bus 9 and bus 13 from 0.9896 and 0.9765 to 1.02 and 1.0199 respectively. Also, the active power loss was reduced by 2.53% from 85.177MW to 83.025MW when UPFC was applied. Incorporation of UPFC improved the system’s voltage stability and reduced active power losses. The UPFC could therefore be deployed to minimize prolonged and frequent voltage instability in transmission networks and enhance system efficiency.

  235. Design of Dual Axis Solar Tracking SystemDownload Article

    R.RajKamal Syed Abuthahir G.Prakash S.Dilip Kumar A.Ahamed Meeran Mydeen

    Abstract

    close

    Sun has been the most major source of energy since the beginning of humanity, its energy fuels life in our planet. Today world is facing energy and environmental crisis due to excessive use of fossil fuels. Hence many countries like South Korea, Germany etc. have switched to renewable sources of energy mostly solar energy. Since solar energy harnessing is difficult due to its dispersed nature so in our project we have taken small initiative to enhance the output of P.V cells by keeping it continuously aligned with sun. In this work a LDR sensor is used to track the solar intensity, a stepper motor is used to move to rotate the panels towards the sun in accordance with LDR sensor a microcontroller and drivers act as relays for the smooth operation of the system with LDR sensor a microcontroller and drivers act as relays for the smooth operation of the system.

  236. Implementation of Security Lock using RFTAG using ArduinoDownload Article

    K.Aishwarya, L.K.Divya, J.Lavanya, Keerthana, S.Sankaranarayanan

    Abstract

    close

    RFID is a method of using Radio waves to identify and communication the data to the RF reader. If uses to the RF reader Radio wave to communication with .Active Radio Frequency Reader. We have implemented a secure entry pass using RF Reader. The RF reader uses Radio waves to tags and tells information, The RF Reader is the unique tag emitted by the radio waves the waves are act as the power to the passive RF tag. This is requirement of the secure gate steams from the fact that usual keys and paper have authentication problem is that, they can easily tampered with and can duplicated. The RFID provides a means to provide a better authentication allowing only the RFID holders to pass the lock. The RFID lock provides radio waves and the passive electrode picks the RF waves from transmitting to send its unique ID.

  237. Design of An Automatic Fan Speed Controlling System Using Arduino UNO Download Article

    M.Kumaran, I.Vikram, S.Kishore Kumar, R.Rajesh Kumar S.Lokesh

    Abstract

    close

    As we all know that we are slowly moving toward automation and automation is one of the trending topics. So, basically in this project we will be controlling fan speed with respect to the temperature of room or that of surrounding. The system will get the temperature from the temperature Sensor (LM35) and it will control the speed, of the according to the temperature, set by the user (i.e. if a person wants the fan to run at a particular RPM for a particular surrounding temperature we can do this via this project ). In this project, microcontroller forms the processing part, which firstly senses the temperature and the controller then compares the data with the set temperature. If the current temperature is greater than the set temperature, the controller turns ON the fan and the set speed will be proportional to the difference between the set temperature & the current temperature. If the current temperature is less than the set temperature, the fan will be turned OFF .The fan’s speed will change according to the temperature of the room or surrounding.

  238. Alcohol Detection Sensor of Smart HelmetDownload Article

    R.Aishwarya, M.Kowsalya, S.Elamathy, A.Ahamed Meeran Mydeen

    Abstract

    close

    Nowadays, bike accidents are major threat in the city. We hear lots of news about accidents because of not wearing helmets and alcohol drinking we propose an innovative method where we will have 2 smart buttons placed in a helmet, only when the rider wears the helmet he can start the bike and we use alcohol detection sensor if the driver is drunk, then he will not be able to start the bike and we also use matrix keypad an innovative concept where in the driver need not carry any key using his pin number he could start the bike. This project will help us to save riders precious life.

  239. Design and development of Standalone Water Solid Waste Filter-Project KumbhakaranDownload Article

    J.Kishan, Sanjeet Kumar, B.Vasantha Kumar, S.Lokesh

    Abstract

    close

    The water bodies across the world are facing the existential crises. The plastic solid waste from a major inhabit or of natural flow of water. The human settlements are regularly dumping off the garbage and refuse to the water bodies. This is a major environmental hazard and causes a degradation of water bodies and affects the overall food chain. Out of the garbage plastic occupies a major chunk of solid waste dumped with by 2020. The plastic staying at ocean break down into smaller granule which circulate all over the water bodies goes into the gills of fishes and leading to death and also comes to water supply connection which comes directly to our kitchen affecting all of us. The granule of plastic causes cancer if it goes to fetus of pregnant women it can cause abnormality of child and much more.The bin situated at the water surface and pumped the water at the surface then to water again. The water get sucked into the bin and bringing all the floating debris into bin. Water pumped through the bottom of the bin living debris inside which get raped in jute filter. Due to the strategic positioning, the wind and the currents bring the debris directly to the bin.

  240. Power System Operation and Control Using Facts DevicesDownload Article

    S.Natarajan, G.Nishanth, T.Ananth Raj, A.Venkatesh M.Prabhu

    Abstract

    close

    In recent years, power demand has increased substantially while the expansion of power generation and transmission has been severely limited due to limited resources and environmental restrictions. As a consequence, some transmission lines are heavily loaded and the system stability becomes a power transfer-limiting factor. Flexible AC transmission systems (FACTS) controllers have been mainly used for solving various power system steady state control problems. However, recent studies reveal that FACTS controllers could be employed to enhance power system stability in addition to their main function of power flow control. The literature shows an increasing interest in this subject for the last two decades, where the enhancement of system stability using FACTS controllers has been extensively investigated. This paper presents a comprehensive review on the research and developments in the power system stability enhancement using FACTS damping controllers. Several technical issues related to FACTS installations have been highlighted and performance comparison of different FACTS controllers has been discussed.

  241. Optimal parameter setting of UPFC and real power generation using Cuckoo Search AlgorithmDownload Article

    S.Natarajan, R.Praveen Kumar, Saravanan, A.Dinesh Kumar T.Dinesh

    Abstract

    close

    In this piece of work, a new metaheuristic algorithm called Cuckoo Search Algorithm (CSA) has been implemented to solve the optimal power flow (OPF) problem for minimization of real power generation cost. An Unified Power Flow Controller (UPFC) has been integrated in the power system and henceforth the optimization of the generators has been performed to mitigate the generation cost. A UPFC is a combined shunt and series voltage converter type device used to reduce transmission line losses and to improve the voltage profile of the system. The CSA is one of the most efficient algorithms for solving single objective optimal power flow problems. The performance of the proposed method is tested on an IEEE 30 bus system and the results obtained have been compared to Genetic Algorithm (GA). CSA is found to give better results as compared to genetic algorithm (GA) in both without and with UPFC conditions.

  242. Authentication System using Master Finger PrintDownload Article

    Ashok Prabhu M, Aswin M, Devisri C S, Janani S.R

    Abstract

    close

    In the government forensic department, the need to crack the authentication system of the electronic gadgets or personal devices of criminals and victims has been tremendously increased in the recent years as biometrics plays a major role of authentication. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The MasterPrint is a technique where there is a possibility of generating a synthetic or real partial fingerprint that matches one or more template that is stored in the database for a significant number of users Thereby this methodology used by the government and forensic sector to break through the authentication of the device to retrieve the crucial data stored and to access the system. This methodology implied is used to more efficiently to launch indirect attack against fingerprint based authentication system. The algorithm thus used results in increase of efficient MasterPrints with maximum matching rate in comparison to the outcome of the present techniques.

  243. Identifying the Shortest Path during Data Transmission in Networks Using OSPF ProtocolDownload Article

    Karthikeyan.R, Madhusudhanan.M, Precila.A, Dr.Kavitha M

    Abstract

    close

    New study which contains the details related to the appropriate software and hardware products, IP address schema, required services and features, network diagram and explanation on the integration plan to achieve the solution. OSPF is a complex link-state routing protocol. Link-state routing protocols generate routing updates only when a change occurs in the network topology. OSPF supports complex networks with multiple routers, including backup routers. OSPF executes its own particular transport layer error location and amendment capacities. OSPF utilizes multicast tending to for disseminating course data inside a communicate area. For secure transmission we use SSH and PPP protocols. A secure channel is created for transmission of data in the shortest path in network using SSH protocol. Password authentication to log in is used as a way to implement SSH. To avoid data loss while transmission two routers are connected securely using PPP p OSPF is a complex link-state routing protocol. Link-state routing protocols generate routing updates only when a change occurs in the network topology. OSPF supports complex networks with multiple routers, including backup routers. OSPF executes its own particular transport layer error location and amendment capacities. OSPF utilizes multicast tending to for disseminating course data inside a communicate area. In our proposed system, we use SSH and PPP protocols for secure transmission of data packets. In SSH protocol, a secure channel is created for transmission of data in the shortest path in network which is implemented in the form of password authentication and PPP is used to avoid loss of data during transmission among the routers. We use Cisco Packet Tracer for creating a network topology and to obtain the better results.

  244. Secured application protocol for financial transactionsDownload Article

    B. Revathy, Asokan Ramathan

    Abstract

    close

    Since banks were using their own infrastructure and secured network lines to Payment systems the need for securing the messages over the network was not of prime importance. Due to the adaptation of cloud, MPLS, public networks securing the financial messages over the network is gaining a paramount importance in the banking system. For example NEFT transactions on Indian Banking system is done in the following way, the payment instructions submitted by the users are exported in a particular format and uploaded to the NEFT server on a particular directory using SFTP there is no guarantee that the files are accessed or modified during the transfer to the NEFT server. Similarly for IMPS the SFMS generated from the Payment instruction from the customer is placed on a queue on a MQ server, there is no guarantee that the message is tampered during the transit.

  245. Huddle based on web serverDownload Article

    K.Keerthika, A.Partheeban, S.Mathivathani, Ms.S.Sangeetha

    Abstract

    close

    Cutting edge group based server farms comprising of three levels are being utilized to have complex Web administrations. The high overhead corrupts the server execution extensively and, subsequently influences the server adaptability. It enhances the execution of SSL/TLS-empowered system servers for elite server farms. Here the server subtle elements are taken as insights and which is being utilized for additionally references. These server points of interest will be refreshed by administrator takes' identity all obligations about the server. This in sight additionally give the SSL/TLS Encryption, which gives an instrument to encoding and confirming information sent between forms running on a customer and server. We look at the effect on server measurements gave by administrator, and give certain benefit to client to see the insights about the server insights.

  246. Mature sustain in mobile applicationDownload Article

    Balavenkatasatyeswararao.P , Aravinth.M.D, Vaishnavi.S ,

    Abstract

    close

    Due to increase in life expectancy, the problems that accompanied aging, have become more acute. It is widely acceptable that elder people, except their limited reflexes due to their age, display symptoms of impaired balance, lack of orientation, whereas their health can be burdened by various kinds of diseases. Modern mobile phones provide a medium that incorporates latest generation technologies, are affordable, portable and feature a variety of sensors that are not present even in modern personal computers. We propose a solution, referring to prevention and treatment of incidents that might occur in elder people, and which is based on mobile phones. We designed an application with the ability of automatic fall detection, by using the mobile sensors, warning signal by pressing a button in cases of emergency, detection and warning if the elder moves away from the place of residence and automatic notification to supervisors as well as visual display to passerbies. Moreover, the application gives the possibility of providing useful instructions towards returning to place of residence through directions given on the map, in case where the elder has lost his orientation. The first three functions provide recording in a database, and also a text message is sent to the supervisor with latitude, longitude and other useful data. Afterwards, you can detect the elder person through google maps. Additionally, an application was implemented for the attending physician, which is connected with the database, through which s/he can obtain a complete picture of the patient 's status, to draw useful conclusions and proceed to possible change in medical treatment.

  247. Dormant Semantic Minimal Hashing For Image RecoveryDownload Article

    Elsi.M, S.Harivaran, Kalai Vani.A

    Abstract

    close

    Hashing-based comparability scan is an imperative procedure for substantial scale inquiry by-case picture recovery system, since it gives quick pursuit calculation and memory productivity. However it's a test work to configuration conservative codes to speak to unique highlights with great execution. As of late, a ton of unsupervised hashing techniques have been proposed to center around protecting geometric structure similitude of the information in the first element space, yet they have not yet completely refined picture includes and investigated the idle semantic element installing in the information at the same time. The idle semantic element is found out in light of lattice decomposition to refine unique element, along these lines it makes the educated component more discriminative. In addition, a base encoding misfortune is joined with inert semantic element learning process at the same time, in order to ensure the acquired paired codes are discriminative too. Broad analyses on a few surely understood huge databases show that the proposed technique beats most best in class hashing strategies.

  248. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy PreservingDownload Article

    K.Deepak Rajkumar, M.Arvinth, M.Balagangatharan, Suguna Angamuthu

    Abstract

    close

    Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. The main reason is that database is hosted and processed in cloud server, which is beyond the control of data owners. For the numerical range query (“>”, “<”, etc.), those schemes cannotprovide sufficient privacy protection against practical challenges,e.g., privacy leakage of statistical properties, access pattern.Furthermore, increased number of queries will inevitably leakmore information to the cloud server. In this paper, we proposea two-cloud architecture for secure database, with a seriesof intersection protocols that provide privacy preservation tovarious numeric-related range queries. Security analysis showsthat privacy of numerical information is strongly protectedagainst cloud providers in our proposed scheme.

  249. A novel battery and super capacitor using IoT to interface renewable energy sources with dual direction and its applicationDownload Article

    Mr.S.Sankarananth, Mr.K.Karthiga, R.Nandhini, A.Manju

    Abstract

    close

    A multi-input DC-DC help converter is proposed to get control from a few info sources and to supply the managed yield voltage to the heap from the sources. The information sources are the sustainable sources like sun based, wind, power module and vitality stockpiling frameworks like battery and super capacitor the IOT innovation was utilized as a part of this procedure to monitor and control. The battery used is bidirectional in its energy stream consequently the converter topology empowers the charging and releasing of the capacity component through information control sources .The task will be in the bidirectional route for the battery and the super capacitor .The control procedure proposed for this converter depends on stage move control and to manage the voltage to utilize PI controller. The proposed topology has the benefit of intrinsic bidirectional power stream, negligible number of transformation steps, high effectiveness and concentrated control can be executed.

  250. Speed synchronisation of multimotor drive via profibusDownload Article

    Dr.A.Satheesh, P. Abinaya, A.J.Ajitha, N.Komaladevi, N. Nandhini

    Abstract

    close

    Multi-motor systems has vast application industrial environment. Applications can be found in offset printing, paper machines, textiles industries and robotics also. Multi-motor techniques are required where synchronization speed during acceleration, deceleration and changes in load requires speed and angle synchronization between at least two axes. Several synchronization techniques have been developed in order to fulfill those necessities. Here the profibus Technique with common DC parallel grid is used so efficiency is high.

  251. Automatic Broke Feeding System for the Finishing House Pulper in Paper MachineDownload Article

    V. Ravichandran, Aravinth S.A.S, Dinesh M, Midhun Johny, Mohanasundaram K.S

    Abstract

    close

    Paper mills produce large quantities of paper daily. In overall production per day, almost 10% of papers are rejected considering quality standards or other reasons. These rejected papers are called as Broke. This rejection takes place at each and every level of the production unit. The final rejection is in the finishing house where all the broke are collected together and fed into pulper as a process of recycling it. This particular pulper machine is a manual sequence process. It involves manual paper loading, valve operation, Agitating, Pumping etc. The ultimate aim of this project is to automate and control the above process by designing a control system using Programmable Logic Controllers. Thus a Cost Effective design can be implemented wherein the expected consistency of Output Pulp, high Precision in Broke Loading and a perfect time cycle oriented process can be achieved.

  252. Automatic ream handling system for as/rs (automatic storage and retreival system)Download Article

    Bhuvaneshwaran S, Janarthanan K, Karthik S, Kumaresh R

    Abstract

    close

    Tamil Nadu Newsprint and Papers Limited (TNPL) produces sheet bundle which is called ream can be stored in ASRS (Automatic Storage and Retrieval System) of 7000 tons capacity. Reams which are stored in ASRS can be retrieved and ready for loading point at any time. AS/RS system process is controlled by PLC (Programmable Logic Controller using the PLC process can be controlled manually and automatically as well .In TNPL finishing house area, the reams are packed manually by using brown sheet and being sent to the shrink wrapping machine. In which reams are packed by polythene cover. A single ream bundle contains 500 sheets and 4 or 5 reams are sent for eight fans for reams packing operation. From shrink wrapping machine the packed reams are collected and fed in to the ASRS input conveyor manually. In our project the system eliminates manual handling and will be controlled by PLC with automation and manual control. By extending the output conveyor from shrink wrapping machine reams are pushed to the next perpendicular conveyor using hydraulic pusher and collected by input conveyor of AS/RS. The system also comprises storage conveyor to control the ream flow during maximum production. This system will produce the time consumption and manual efforts.

  253. Industrial powerload scheduler via iot and updaterDownload Article

    M.Sathishkumar(14ee071),N.Shankaranand, T.Vijaykumar, M.Vigneshwaran, Vijayalakshmi

    Abstract

    close

    The Internet of Things is a network of ever growing physical objects (such as connected devices and smart devices), embedded with electronics, software, sensors and network connectivity that enables these objects to collect and exchange data. IoT is commonly used for smart home, data acquisition, smart energy monitoring, industrial automation , and a variety of platforms. This project describes the architecture of an Internet of things based Industrial Power load Controlling & Monitoring System in the power system. The goal of this project is to visualize and monitor the power consumption Internet webpage by integrating smart plugs, sensors, Internet of Things (IoT) devices and GATEWAY which enables the communication between the various smart plugs and the web server hosting the monitoring system application, thereby facilitating the user to act accordingly to save power or to provide the reliable power supply by making maximum use of Load Efficiency.

  254. Multilevel Inverter Topology for Renewable Energy Grid IntegrationDownload Article

    Prabu.M, Deepika.L, Kaviya.S, Palkumarathi.S, Sindhu.P

    Abstract

    close

    In this paper, We use solar panel as photo voltaic because it converts heat energy to electrical energy as large amount.It is not only used for home appliance but it can also connected with grid.Mainly the power can also generated by renewable energy resources.

  255. Portable solar lighting systemDownload Article

    C.Pratheeba, K.Karthick, K.S.Rajesh Kumar, K.Rajkumar, S.Vivek

    Abstract

    close

    Current Solar Electric Vehicles have flat roofs, in an attempt to reduce irradiance mismatches within the strings of PV cells. As a result the aerodynamic performance and design freedom of such vehicles are limited. This paper presents a distributed maximum power point tracking methodology specifically aimed at Solar Electric Vehicles to overcome. As a starting point, the PV-to-isolated bus architecture is selected, since it processes a low amount of power and easily extends to an arbitrary number of groups per string. The collected electricity stored in a battery and used whenever need.

  256. Smart IOT Technology for Machine Condition MonitoringDownload Article

    Elango S , Durgaganeshmoorthi P , Jeeva E , Jeeva N.R , Jeganprakash N

    Abstract

    close

    This paper aims to describe the role of advanced sensing systems in the electric grid for machines in an Industry. In detail, the project, development, and experimental validation of a power consumed by a machine is described in the following. This paper provides an outline of the potentialities of the sensing systems and IoT to monitor efficiently the energy flow among nodes of an electric network. Information concerning the power consumption and power quality could allow the power grid to route efficiently the energy by means of more suitable decision criteria. The new scenario has changed the way to exchange energy in the machines. The explosive growth of the requirement of the communication for information between machines raised concerns, such as, the optimization of the human environment, the management of urban security, the improvement of living quality, and the effective management of production, the "Internet of Things" (loT) is in great demand. Our government has a high regard to the research and development of loT, as we are moving towards the "Internet of Things", millions of devices will be interconnected, providing and consuming information available on the network and cooperate. International Telecommunication Union (lTV) put forward "Internet of Things" in the report in 2005, but there is still not a generally accepted concept.

  257. Thermal power plant status monitoring using GPRSDownload Article

    P. Krishna Gandhi, M. Naveen, A. Praveen Kumar, K. Kings, Shine Ebison

    Abstract

    close

    Wireless communication is one of the most active areas of technology development of our time. General Packet Radio Service (GPRS) is a packet-based wireless data communication service designed to replace the current circuit-switched services available on GSM and TDMA networks. An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. Embedded technology is a part of a complete device often including hardware and software. The Thermal Power Station is a coal-fired electric power station. The main purpose of the power station is to generate electrical power. Here, we are using embedded technology with GPRS to automatically monitor the power plant status.

  258. Digital Relay Protection of Generator Transformer in Thermal Power Station Using MicrocontrollerDownload Article

    S.Elango, Dhinesh E, Santhosh kumar K, Sethupathi S, Vivek S

    Abstract

    close

    The main intention of this project is to design a microcontroller based system that can be used in power transformer protection. The system checks the operating parameters of the transformer i.e. current and reports the quantity that is flowing through the transformer. The system is designed such that it is able to detect currents above the normal operating level and isolate the power transformer from the distribution line. This isolation process is to ensure that the transformer is safe from any excess current levels that can make it to overheat thus get damaged. It gives a solution to the need to reduce cost of maintenance and ensure that supply of electricity to consumers is not interrupted for long periods taken while repairing or replacing destroyed transformers.

  259. Hybrid power management in paper millDownload Article

    K.Sathyasree, Johnclinton.C, Manikandan.M, Manikandan.S¸ Mohanraj.R

    Abstract

    close

    Solar energy is one of the most available renewable energy source, little research has been done on operating solar and thermal energy sources alongside one another in order to take advantage of their complementary characters. In this paper, we develop an optimal design for a hybrid power management in paper mill, where the variables that are optimized over include the number of photovoltaic modules, analysis reveal that the hybrid plant is able to exploit the complementary nature of the two energy sources, and deliver energy reliably throughout the year.

  260. Effluent Treatment PlantDownload Article

    S.Menakambal, Divakaran K, Haripraveen N, Jagatheesh P, Kanthavel S

    Abstract

    close

    All industrial operations produce some wastewaters which must be returned to the environment. Sugar industries produce wastewater, otherwise known as effluent, as a by-product of their production. Effluent from the sugar industry is a major source of environmental pollution, especially water pollution. Among the various stages of sugar production, the operations in the processing plant, which include pre-treatments and finishing, produce the most pollution. The processing wastes contain unused or partially used organic compounds, and high biochemical oxygen demand (BOD) and chemical oxygen demand (COD). The proposed system deals with the monitoring of the water and transmitting the data remotely.

  261. Line fault detection and load sharing using IOTDownload Article

    Ramraj.B, Pushpalatha.V, Rajalakshmi.N, Sobika.S, Swedha K.M

    Abstract

    close

    An important part of distribution is load sharing between two or more areas from the common load. Fault line can be detected through the sensors. In this paper the fault line and load demand are identified through IOT. IOT has the ability to transfer data over network without requiring human-to-human or human-to-computer interaction.

  262. Energy monitoring, controlling and common power distribution by using iot and microcontrollerDownload Article

    G.Jayasheelan, M.Loganath, T.Azhaguraja

    Abstract

    close

    This paper presents the development of Automatic Trip Control System for Energy Management using IoT(Internet of Things). The proposed system monitors the usage level of electricity of every consumer at all the time. By using the embedded C language, electricity board can desire the power level for power utilization in home. During excess of electrical energy more than desired level used by consumer, the system will give the alerts through an IoT to consumer. After the alerts, the consumer has to take an alternative solution to cut-off excess supply from the Electricity Board (EB) to stop alarming. Otherwise, the relay will come into OFF position and the supply will be tripping-off coming from EB. The information about the particular consumer will be sent to EB through IoT (Internet of Things). Then, the consumer has to click the restarting switch in the energy meter for making the system coming into normal with the help of PIC microcontroller, which is programmed to monitor the parameters of electrical energy. This system used to distribute power commonly in peak value time and helps for monitoring the energy, maintaining data on tariff. The implementation and demonstration of the system were made. The solar system is another power source used in peak value time and it is helps to energy meter in ON stage.

  263. Novel UPFC-based line overload control using Honeybee AlgorithmDownload Article

    R.Gobu, K.Aravind, S.Karthik, V.Agilandeeshwari, G.Gayathri

    Abstract

    close

    Unified Power Flow Controller(UPFC) is Shunt-Series type device that posses all capabilities to control real, reactive power, voltage and reactance of the connected line in the power system. Honey Bee algorithm is the new intelligent algorithm used for all complex engineering optimization problem power system has many complex optimization problems one of which is the Optimal Power Flow(OPF). Basically it is minimizing optimization problem and subjected to many complex objective functions and constraints. Hence Honey Bee Algorithm is used to solve Optimal Power Flow (OPF) and overload in transmission line in this paper.

  264. Smart generator monitoring and control system in industry using microcontroller and GSMDownload Article

    B.Ramraj, R.Ranjithkumar, D.Sharon, S.Thamaraikannan, S.V.Tharani Raja

    Abstract

    close

    The electrical power systems are highly non-linear, extremely huge and complex networks. On the other hand, all the developed countries have not sufficient supply of power. This paper focuses the detection of power failure and takesreflex action to solve the problem with help of GSM communication. The power failure will be detect by relay, and itcommunicates to Microcontroller to alerts the authorized person. In addition to that, parameters of Generator like Fuel level Oil level, Temperature, battery status, etc., are monitored and communicated to authorized person. The acquired parameters areprocessed and recorded in the system memory. If there is any abnormality in their process, according to some predefinedinstruction and policies that are stored on the embedded system EEPROM then GSM alerts to concerned person immediately

  265. Power Quality Improvement Using Direct Converter For An AC LoadDownload Article

    V. Arun Kumar, Gowtham S, Bragathishwaran P, Sathishkumar R, Sathrapathi R

    Abstract

    close

    Voltage sag disturbances are the most frequently occurring Power Quality problems in the distribution system. This paper explains simulation of a dynamic voltage restorer as a voltage sag and swell mitigation device in electrical power distribution networks. A Dynamic Voltage Restorer is proposed to handle deep voltage sags, swells and outages on a low voltage single phase residential distribution system. The dynamic voltage restorer with its excellent dynamic capabilities, when installed between the supply and a critical load can compensate for voltage sags/swells, restoring line voltage to its nominal value within a few milliseconds and hence avoiding any power disruption to the sensitive load. Otherwise, it will operate as an Uninterruptable Power Supply across the sensitive load when disturbance occurs on the supply voltage. It is also designed to reduce the usage of utility power. A series injection transformer is connected in series with the sensitive loads which restoring voltage sag and swell to a nominal voltage by protecting the sensitive load from damage.

  266. Solar panel based smart hybrid vehicle control system design and implementationDownload Article

    C.Gokul, D.Rajkumar, M.Chitra, P.Rajasekaran

    Abstract

    close

    In India, vehicles mostly operate on petroleum products and only very few number of vehicles operate on battery. When the vehicles are operated in fuel, it pollutes the atmosphere by emitting carbon monoxide in abundant. Air pollution is the major issue laid by all developing countries across the world. Automobiles have to find an alternate source of power for operation due to the shortage of fossil fuel producing diesel and petrol .Hybrid electric vehicle (HVE) is the new technology found since CO2 is emitted in large quantity by the vehicle. In this paper we introduced a new system vehicle whose motor is run by both battery as well as internal combustion engine run with fuel as petrol. In this system a solar panel and a generator attached to the wheel to charge the battery are used. This system can operate on the three mode and compared to present automobiles it is more efficient regenerating braking implemented in these system. Due to energy regeneration fuel combustion, charging time emission rate get reduced. Mechanical and electronic system both sector are combined in these paper which indicate the fuel economic growth. In this paper along with solar charging use of energy management in a smart way is made.

  267. Grid Frequency based 210MW generator load control by using PIC MicrocontrollerDownload Article

    Ramani.G, Guna.G, Karthi.R, Karthik Raja.K, Kamesh.D

    Abstract

    close

    In this project, for demonstration purpose we will store system power on readings of voltage and current across the load along with the real time clock. We have proposed to use the microcontroller, external memory and ADC for the respective data acquisition of load voltage and load current.

  268. Raspberry PI GUI kernel remote authentication multitasking & embedded web control Download Article

    B.Guga Priya, Mr. B. Prabhakaran

    Abstract

    close

    The system provide secured data transfer by remote method & each user can split the task an access and run the task by using OS which include IOT enable remote. The main features of the system includes Raspberry Pi Kernal Tasking & Control Network Remote Authentication Web Control By Master & Remote System. The software output is done with ARDUINO, ESP CORER 1.8 using embedded C. schematic is prepared using PROTEUS. Also the Software and hardware portion is done.

  269. High Gain Step-Up PWM DC-DC Converter with Coupled-Inductor and Fly back Network Download Article

    R.Chanrdu, S.Gowtham, M.Dineshkumar, M.Naveen kumar, K,Umadevi

    Abstract

    close

    In this paper, high gain step-up PWM DC-DC converter integrating coupled-inductor and fly back network techniques is presented. The proposed converter consists of a synchronous rectification Boost unit and multiple coupled-inductor (CL) units. Its structure can therefore be easily extended for ultra-high voltage gain. The diodes employed in the given converter can operate under soft-switching condition by utilizing leakage inductance of the coupled inductor to improve the efficiency as the voltage stress soft switching are proposed converter. The feasibility of the proposed converter is experimentally demonstrated by a 200w prototype converter.

  270. Security system using PIR sensor, Arduino along with android applicationDownload Article

    N. Hemala, D.Priyanka , N.Kanchanadevi, B.Arjanadevi, L.Dharshini

    Abstract

    close

    Safety deserves an important position in everyone’s life. Wireless Security Systems ensure the real time detection and signaling of the threat to the industry. In the present scenario, only the sophisticated technologies can detect the theft in time. So we made a simple project to detect the theft in time. Our project comprises of two modules. One module deals with hardware components of security system such as PIR (Passive Infrared) sensor. For detection of changes in the surrounding we made use of Web camera, Alarm etc. The other module deals with an Android app through which the user can interact with the security system even from a remote location. To announce intrusion to us, we use alarms, sms and an android application. The movement can be viewed through a web camera. The movement is first

  271. Comprehensive analysis of PV battery charging system with sepic boost converterDownload Article

    Vishnu.A, Dhivyaprabha.V, Abirami.A, Priyadharsini.V, Surya.M

    Abstract

    close

    This paper provides dual level dc output using Sepic converter with solar energy forcharging batteries. Two different levels of DC voltage batteries can be charged. Single Ended Primary Inductor Converter (SEPIC)Boosts the solar output and gives dual level DC output for loads. The stand-alone Photovoltaic (PV) system is used as a source for the Sepic converter. Maximum power point tracking (MPPT) technique is used to track maximum power and to provide continuous pulses to the converter.

  272. Automatic billing trolley in mega mallDownload Article

    J.Tryphena,Mrs.G.Ramani

    Abstract

    close

    Microcontroller based design, has acquired the status of most happening field in electronics. This is highly specialized field that has the power of integrating thousands of transistors on single silicon chip. Nowadays, in mall for purchasing variety of items it requires trolley. Every time customer has to pull the trolley from rack to rack for collecting items and at the same time customer has to do calculation of those items and need to compare it with his budget in pocket. After this procedure, customer has to wait in queue for billing. So, to avoid headache like pulling trolley, waiting in billing queue, thinking about budget, We are introducing new concept that is “AUTOMATIC BILLING TROLLEY IN MEGA MALL”. For the blind person the special headphones are provided to help them to know the product details. When the blind person takes the product from the track, they are instructed to take the product near to their headphone in which the RFID scanner is inserted in the both headphones. which scans the product and tell them what product it is and the total amount.

  273. Data acqusition system for testing of vertical axis wind turbineDownload Article

    Mr.R.Ramprakash, R.Nisha V.Tamizhselvan M.Nandhini P.Senthilkumar

    Abstract

    close

    Wind tunnel test bench is one of the important methods to research the characteristics of vertical axis wind turbine (VAWT). To improve the test performance, intelligent test equipment for VAWTs is developed. The whole equipment is divided into three sub system. support and adjustment, intelligent data-acquisition and analysis and loading system, each of them is analyzed and designed. An intelligent test bench is established, with which, the performance of a rotor is tested and analyzed. The results show that the test equipment is simple structured, convenient to manufactured, reliable to operate, and able to intelligently acquire the important data such as wind speed, rotor torque and power etc., which provides an effective way to study the performance of the wind turbines.

  274. Braille language converter for visually impaired peopleDownload Article

    A.Mathivani R.Karthika K.Manimekalai P.Rajesh Kumar

    Abstract

    close

    The Braille language is the system of language in which it can be used by visually impaired people for both reading as well as writing. This paper proposes only how the device going to help the visually impaired people for reading the printed English books. The Braille cells consist of six dots and all of them are segmented in structure. The text is first detected and it maps with an equivalent Braille letter and the converted letter is raised from the holes in the Braille pad so that the visually impaired people can easily understand. The Braille system has different representation of letter for different language. Each mapping of text is differs from language to language.

  275. Design and implementation of RTC for Textile AutomationDownload Article

    M.Prabu, V.Arunesh, N.Thirumoorthi, I.Yabesh,K.Yuvaraj

    Abstract

    close

    In this paper,he method of automatic monitoring of weaving loom quality and time taken for as product. The density of the fabric made is set by the material structure. The vision system consists of an metal proximity and a micro-controller and permits to work out the geometric dimensions of the intervals between the essential yarns of the material. The management of those dimensions provides a chance to regulate the density of the factory-made material. The delineate system makes it doable to alter the standard management of the loom.

  276. Automatic irrigation system based on solar powerDownload Article

    T.Jayakumar, Balaji .B.P, Sathishkumar .M, Thamaraiselvan.C

    Abstract

    close

    Agriculture is the source of living of majority Indians and it also has a countless influence on economy of the country. The objective of our project is to reduce this manual involvement by the farmer by using an automated irrigation system which purpose is to enhance water use for agricultural crops. The inspiration for this project came from the countries where economy is based on agriculture and the climatic conditions prime to shortage of rains & scarcity of water. The farmers working in the farm lands are only dependent on the rains and bore wells for irrigation of the land. Even if the farm land has a water-pump, manual involvement by farmers is required to turn the pump on/off when needed. The project is intended to cultivate an automatic irrigation system which controls the pump motor ON/OFF on sensing the moisture content of the soil. In the field of agriculture, use of appropriate technique of irrigation is essential. The advantage of using this technique is to reduce human intervention and still certify proper irrigation. A software application was developed by predetermining the threshold values of soil moisture, temperature and water level that was programmed into an arm controller. This paper presents the controlling and monitoring the level of water and detecting the soil moisture content.

  277. Multiple transformer parameter protection and monitoring using microcontrollerDownload Article

    M. Priya Rani, P. Vallimayil, Mrs. G. Ramani

    Abstract

    close

    This work develops a Digital Relay for the protection of Generator Transformer in Mettur Thermal Power Plant. The Digital Relay, also called a numerical relay,refer to protective relay uses an advanced microcontroller to analyse power system voltages and currents for the purpose of detecting the faults in an electric power system. The main objective of this work is to give Digital Relay protection for Generator Transformer against over current of three phases, negative sequence (or) unbalanced currents of three phases and earth fault current. The present system with Electromagnetic Relay, existing there makes use of individual relays and monitoring equipments for identification and isolation of each fault. Thus the monitoring and control of the faults becomes very difficult and apart it is costlier as it involves lot of relays and control equipment’s. In addition the accurate values of monitored parameters cannot be obtained in these types of relays. These electromagnetic relays are replaced with a digital relay to give various advantages which includes advanced programmable functionality providing high performance level, flexibility as well as additional monitoring capabilities and they are able to communicate with other digital equipment while these functions are not quite possible in Electromagnetic relays.

  278. Harmonics Compensation In Industry HT line with Multi Voltage Source Inverter using PSODownload Article

    K.Sathyasree, M.Madhubalu, V.Muthumanivel, M.Rajamaideen, R.Rajkumar

    Abstract

    close

    This paper presents detailed modeling and hardware implementation of a harmonics Compensation based on a multilevel Voltage source inverter . This type of compensator, which is installed in parallel with the AC grid, is usually referred to as the shunt active power filters (APF). Nowadays use of high voltage non-linear loads are widely used in industrial and commercial applications and elimination of harmonics in HV system has become an important aspect. Implementation of multilevel inverter (MLI) as compensator in HV system eliminates use of bulky and high cost transformer.. The controller method successfully eliminates harmonics even the supply voltage is distorted. The Selective Harmonics Elimination PWM (SHEPWM) technique is used to generate firing angles to Voltage source inverter multilevel inverter switches which reduces the individual device switching frequency. The distribution network which supplies mixed linear and non-linear loads and employing MLI is implemented in hardware .

  279. Modified single phase grid tied inverter with MPPTDownload Article

    V. Arun kumar, K.Thirukumaran, M.Vinoth kumar, R.Srikanth, N.Rangasamy

    Abstract

    close

    In this paper, an improved single-phase single-stage modified grid-tied flying inductor inverter is presented. The main intention is to modify the design of existing grid tie inverter. In addition to the existing system a battery backup is added to the inverter circuit. Here the process of both power inverter and grid tie inverter is merged. The MPPT charge controller which is used to store the charge to battery from the PV module. The power obtained from the PV module is used to charge the battery and used by the loads. The remaining power is given to the grid. Traditional grid tie solar systems only operate when utility power is available. It shutdown during power outages. The battery backup inverter provide uninterrupted power for household during an outage.

  280. Battery and supercapacitor for photovoltaic energy storage: a fuzzy logic managementDownload Article

    Kanmani C, Santhiya R, Kubendhiran D, M.R.Mohanraj

    Abstract

    close

    This take a look at offers an approach of the voltage regulation of DC bus for the photovoltaic energy garage by way of the usage of amixture of batteries and supercapacitors (SCs). The batteries are used to fulfill the power requirements for a distinctlylong length, while the SCs are used to fulfill the immediately electricity demand. The power management strategy isdeveloped to control the power flows among the storage gadgets by means of selecting the finest working mode, thereby tomaking sure the continuous supply of the load by way of retaining the country-of-fee (SoC) of SCs (SoCsc) and the SoC of thebatteries (SoCbat) at applicable stages. This energy control method is executed by means of the usage of the bushy logic supervisor. Thevalidation outcomes show the effectiveness of the proposed method.

  281. Position tracking, health monitoring and communication system for soldierDownload Article

    Gopalakrishnan.J, Baskar M, Vijay P, Ajith K, Preethi P

    Abstract

    close

    At present growing of world, the security of a nation is the extreme important factor and hence the enemy warfare plays major role. The sanctuary of any nation depends on the military, army, air-force, navy and defense technique of the country and the backbone of all these forces are majorly soldiers. Without the involvement of soldiers it would be nearly impossible to protect a nation. But there are many concerns revolving around the security of these soldiers, especially the army and military soldiers. Even though the developing technology are available in various fields, but the military forces still using rudimentary technology especially in navigation, health monitoring and communication areas. While the soldiers in the warzone, monitoring the borders, it is essential to know the status of the soldier. This project helps to find out the status of the soldier and easy way of monitoring also. This technology helps to rescue and appropriate decision making process for base section. Here we designed a wearable technology to system for soldier, this consist of GPS and Bio-sensors for monitoring process. This wearable technology connected only to the corresponding warfare team, which also improves the communication process.

  282. Evaluation of the main MPPT technique for PV applicationsDownload Article

    S.Menakambal, Ashokkumar C, Pradeepraj K, Seenivasan V, Sudhakar V

    Abstract

    close

    Photovoltaic (PV) systems have been used for many decades.Today, with the focus on greener sources of power, PV has become an important source of power for a wide range of applications. Improvements in converting light energy into electrical energy as well as the cost reductions have helped create this growth. Even with higher efficiency and lower cost, the goal remains to maximize the power from the PV system under various lighting conditions.

  283. Industrial temperature monitoring on web cloudDownload Article

    T.Jayakumar, Parameshwaran.P, V.Poovarasan, Thirumurugan.C, Sridhar.S

    Abstract

    close

    The Internet of Things is a network of ever growing physical objects (such as connected devices and smart devices), embedded with electronics, software, sensors and network connectivity that enables these objects to collect and exchange data. IoT is commonly used for smart home, data acquisition, smart energy monitoring, industrial automation , and a variety of platforms. This project describes the architecture of an Internet of things based Industrial Power load Controlling & Monitoring System in the power system. The goal of this project is to visualize and monitor the power consumption Internet webpage by integrating smart plugs, sensors, Internet of Things (IoT) devices and GATEWAY which enables the communication between the various smart plugs and the web server hosting the monitoring system application, thereby facilitating the user to act accordingly to save power or to provide the reliable power supply by making maximum use of Load Efficiency.

  284. Implementation of water and street light management system for smart cityDownload Article

    S. Balaji, Krishnakumar. M. Logitha. S, Mahendran. A, Elangovan. S

    Abstract

    close

    This proposed automated water distribution system is used to distribute the municipal water to all street pipelines through PLC technology. Here PLC is used for time scheduling purpose. Consider a storage tank with a level sensor to measure the water level in the tank and flow sensor is placed at the main pipeline to check the flow rate of water, then set point is fixed for each pipeline in PLC through the program. Solenoid valves are kept for each sub-pipelines and they are operated by means of a relay. The output from the flow sensor and level sensor is given directly to PLC and then the output signal is given to ARDUINO. Now the control signal is sent from ARDUINO to transmitter side GSM module then it is followed by receiver side. In receiver side, another GSM module receives the control signal and gives to ARDUINO based on it relay operates solenoid valve according to the signal. This proposed system also includes accomplishment of street light control using PLC and relays. Here we are using LDR sensor to measure the light intensity for the particular time period since to increase the lifetime of the sensor we use it only for some time. Then PLC is directly connected to relay through wires and the street lights were get operated by means of relays.

  285. Intelligent hydroponics care using IoTHINGSDownload Article

    Vivek M Nair, Dr. A.Satheesh

    Abstract

    close

    Intelligent Plant Care Hydroponic Box(IPCH-Box) that exercises environment driven control methods through an Internet-of-Things (IoT) management tool called IoTtalk. IoTtalk provides a scalable and configurable software for users to easily and quickly add/remove/exchange the sensors and actuators, and program their interactions. From the experimental measurement results of IPCH-Box, the developed environment driven control methods include LED lighting, water spray and water pump which can effectively lower the CO2 concentration, the temperature and increase water level, respectively. Specifically, the time of CO2concentration reduction in IPCH-Box is faster than that with the plant system without our mechanism. To enrich the plant growth, nutrient in water solvent intake by the hydroponics plant we need to monitor the pH value periodically. The system initial need to set the pH value depends on the hydroponics plant fertilizer value.

  286. Wireless data monitoring and fault analysis using ZIGBEE and GSM in thermal power plantDownload Article

    Ravichandran.V, Naveenkumar.K, Praveen.M, Ramesh.S, Suryaprakesh.R

    Abstract

    close

    As the Thermal power plant has to work for 24 hours and 365 days, it is not possible to monitor the parameters in site at each and every moment. So remote monitoring is needed. This can be automated with the use of ARM processor. Using this system we can control the operation of Thermal power plant in automatic mode and monitor the parameters in work place. Also we can communicate the sensor data to other PCs in remote locations using GSM technology.

  287. Rapid charging stations for automobiles using biased power chopperDownload Article

    S.Sankarananth, Muthuraj.S, Yogalatha.M, Sachidhanandar.D, Deepalakshmi.K

    Abstract

    close

    This paper proposes an interleaved partial power converter (PPC) for the DC-DC conversion stage of Electric automobiles for rapid charging stations from the solar panel. The proposed conversion topology is mainly based on the dual H-Bridge converter. The main function of the PPC is to allow a fraction of power for the conversion purpose and the remaining is bye passed and directly supplied to the load so that the efficiency is increased in the converter. The dual H-Bridge converter is mainly used for the fast charging purpose. The MPPT is designed for using easy and effective of charge control by using MPPT (Maximum Power Point Track).It enhance the battery life by providing higher efficiency to it. The principle of operation of the proposed PPC is theoretically analyzed. Simulations are provided for the charging of EV battery.

  288. Smart condition monitoring in an industrial automation – Wireless performance evaluationDownload Article

    Krishnagandhi.P, Karthikeyan R, Gowtham V, Sampath kumar S, Vijayakumar M, Prem M

    Abstract

    close

    Smart sensing, devices, and monitoring are essential to localized motor condition monitoring and service applications. A unique approach to the smart device is the use of low-cost wireless sensors for machine condition measurement. Smartphones may be used as the computational platform that acquires motor parameters from wireless sensors using a compatible local communication. Considering the widespread use of Bluetooth Low Energy (BLE) in smartphones, a BLE enabled sensor network was selected for this study. An experimental setup was created to emulate the industrial environment and evaluate the performance of the communication infrastructure for successful deployment of intelligent condition monitoring. The network.performance measurements were carried out to assess the BLE performance with several AC and DC machines operated using different loads in a laboratory with many structural obstructions. Also, an optimal placement of a wireless gateway was explored.

  289. Valve leakage control and monitoring systemDownload Article

    Mr. S. Prabhakaran, P. Dinesh, S. Gowtham, R.S.N. Jagan

    Abstract

    close

    This systems control and monitoring the valve leakage from the chamber valve. Here presser sensor; flow sensor and float switch are used for controlling Zigbee is used for wireless communication for monitoring purpose. TEG used for free power.

  290. E-Voting Credentials Based On BiometricDownload Article

    Mrs.G.Vishnupraba, R.Abirami, T.M.Balakumar, S.Shobana, S.Tamilarasan

    Abstract

    close

    This project deals with the secure online electoral system. Voting is a method by which the electorates appoint their representatives. In current voting system the voter should show his voter ID card whenever he/she goes to the booth to poll one’s vote.The voting system must be managed in a easier way as all the users should make use of their Aadhar card number and password and click on his/her favourable candidates to cast the vote. This project results in a larger security withvoter high security password which is confirmed before the vote is accepted in the ECI main database. The additional feature in this project is the voter will be sure that his/her vote has reached to the correct candidate and sents a confirmation message to their mobile by using GSM module. This model reduces the time in casting a vote and also in declaring the results.

  291. Study of DC-DC Converter with Maximum Power Point Tracking Algorithm for Solar Energy SystemDownload Article

    B.Surya Prakash, S.Indumathi, V.Varshini, K.Mahendran

    Abstract

    close

    Now a days Most of the power producers is formed using fossil fuels, which release tons of carbon dioxide and other pollution every second. More importantly, fossil fuel will eventually run out. With the purpose of make the expansion of our cultivation sustainable and cause less harm to our environment, people are viewing for new source of substitute sanitary energy.This paper presents about introduction about solar technologies, recent developments and Future enhancements of Solar Energy Technologies and this help us avoid long term switching cost in the future and make the solar systems performance more competent, cost-effective and constant .Also Discussed about MPPT and IoT Applications of Solar Energy Conversion System. Most of DC-DC converters Employed With Solar Energy Conversion System. Key Words: Solar Energy, IoT, MPPT, DC-DC Converter. Charge Controller. I. INTRODUCTION The current need for electricity is going on increasing day by day and the production of electricity mostly depends on fossil fuels like petrol,diesel etc., and nuclear fuels, which are little in amount and become a great threat to our environment. Hence emerging energy models which involves renewable energy sources were necessary to ease the methods of electricity generation, which is needed to meet ourexpected demand. Theonly possible way is to migrate towards renewable energy resources like hydro power, geothermalenergy, solar energy, wind energy, tidal energy, fuel cell, biomass, etc.This process of converting to renewable energy resources is time elapsing andhigher is cost but it gives a longer life span than other power generation like thermal and nuclear power plants. From all the types of renewable energy sources solar energy plays a vital role in continuous production of electric energy. Hence tracking of that solar and utilizing it in a good way is very essential for our future generation.

  292. Wheel Therapy Chair: A smart system for disabled person with therapy facility Download Article

    M.Rekashri, D.Shinee, S.Vanmathi, N.Sasikumar

    Abstract

    close

    Each and every person in this world has a desire to live a normal human life but accidents, diseases, elder-ship make their desire into disability. Moreover, there are lots of handicaps and elders as well as the number of paralyzed people are increasing day by day. They always need another person in moving and have to go under some physical therapies under the guidance of a therapist to recuperate their strain back.This paper describes the design of smart, motorized, voice controlled wheelchair. This proposed system supports voice activation system for physically differently abled persons incorporating manual operation and this system helps them to move freely & safely and also takes the activities of a therapist in a cost effective manner. This system is a combination of different controlling features, has the ability to detect obstacle and provides few kinds of therapies. A smart wheelchair is developed by using voice recognition system to control the movement of wheelchair and also with Arduino. The aim of research is to compact many facilities in a single wheelchair at low cost.

  293. Automated medication dispensing machine (AMDM) using embedded technologyDownload Article

    Dinesh P, Gogulnath T, Indhuja T, Indumathi N, Mr. Rajaram K

    Abstract

    close

    This paper proposes a novel idea to provide the information automatically to patients to take their right dosages at appropriate time. Now a day, most of the patients may forget to take their medicines as per the prescription due to mental stress. Hence, it may cause prolong period to recover from the diseases. Sometimes, the aged patients are gulping tablets and their dosage level incorrectly causing a severe problem. Therefore, it is necessary to the patient to take proper medicines at precise quantity and time. To overcome these problems, a novel system is proposed.This system useskeypad,Microcontroller, LCD display and Real Time Clock (RTC) module, GSM module and an alarm system used to intimate the patients to take proper dosage according to the prescription at right time. This portable and economical AMDM system would help aged patients, especially to the illiterate patients.

  294. Modeling and Control of Four switch inverter fed Brushless Dc motor Drive Using Low cost controller and Enhanced Buck Boost converterDownload Article

    S.Sathish Kumar, K.Krishna Kumar, A.O Santhosh, S.Manikandan, S.Venkateshkumar, D.Maheswaran

    Abstract

    close

    The paper deals with the speed control of Brushless DC Motor drive by low cost controller and B4 In-verter with new converter design (Four Switch In-verter) rather than conventional inverter (Six Switch Inverter) is proposed. The conventional Six switch Inverter is modified into B4 Inverter in order to reduce the switch leg failure, and Total Harmonic Dis-tortion.This facilitates the operation of voltage source Inverter at fundamental frequency switching by using the Electronic commutation technique rather than Mechanical commutation.In addition we propose sin-gle phase Rectifier and Three phase voltage source Inverter, dsPIC controller to generate the multiple carrier PWM pulses for B4 Inverter which is fed to the Permanent Magnet Brushless DC Motor to obtain the desired motor speed. The proposed Research mainly focused on the new topology of Buck boost converter design for B4 inverter,By this new modified buck boost Enhancement converter design motor speed are controlled and voltage imbalance in the capacitors are avoided the capacitor voltage is similar voltage level is obtained during the buck and the boost mode operation of the converter side, So results with improved quality of Boosted up output DC Power is obtained.Simulation Modeling Results are carried out by Matlab/Simulink environment and Portable Experimental Hardware is developed. Results are carried out Sucessfully and Validated for various operating parameter conditions.

  295. Generation of wealth out of electronic wasteDownload Article

    D.Naveen Kumar, U.Manigandan, D.Subanitha, Dr.T.Gunasekar

    Abstract

    close

    The paper on e- waste management is completely based on ‘Wealth out of waste technique’. The idea of paper shows how electronic wastes are being taken to next era of recycling and how they can exist in this world in any other form. Firstly, e-wastes are considered most vulnerable and hazardous thing which must be done something to overcome their hazardousness. In this proposed paper, integrated chip’s(IC’s) are taken as electronic waste. IC’s are crushed into powder and its properties are analyzed. So the first step is to remove the hazardousness through any form and make the remaining material as raw material for a good deed. This might look simple but looking into this, is a very vast field. These techniques can be employed to overcome the poisonouness. Apt to the proverb, 'Energy can neither be created and nor be destroyed' as like any element on this earth can neither be destroyed, but it must exist, but not in its original form. It can be converted into any inferior forms and they do exist on this earth. In this modern world, electronics forms the basic foundation of all innovations; therefore it is a must to create a way for e waste recycling.

  296. A study on customer perception towards health insurance with special reference to Erode cityDownload Article

    N.Devaraj, S.Rubahasan, KT Naveen Kumar

    Abstract

    close

    Good Health confers on a person or groups’ freedom from illness - and the ability to realize one's potential. Health is therefore best understood as the indispensable basis for defining a person's sense of well-being. Health insurance is an insurance against the risk of incurring medical expenses among individuals. Health insurance remains vastly under-developed in India. Only 11% of population is presently covered with Health Insurance. Around 24% of all people hospitalized in India in a single year fall below the poverty line due to hospitalization (World Bank, 2002). An analysis of financing of hospitalization shows that large proportion of people borrows money or sells assets to pay for hospitalization (World Bank, 2002). Majority of Indians are more vulnerable to Major ailments. Marketing of Health insurance policies become paramount important to help people to meet out the untoward expenses arising out of unexpected ailments. It will be a win-win situation for Public and companies of increasing the penetration of health insurance products to its fullest potential. The benefit of health insurance has to be extended to the excluded population too. Clearly there is an urgent need to expand the health insurance net in India, in such a situation it is essential to understand the consumers how far they are interested in buying health insurance, consumers perception is to be recorded, it is essential to limit the out-of-pocket expenses of the consumers, and suggest and bring an awareness to the consumers how health insurance would help in reducing their financial burden during hospitalization

  297. A study on customer preference for selecting private hospitals with special reference to erodeDownload Article

    K. Nathiya, B.Abirami, P.Gokul

    Abstract

    close

    With the rapid expansion of population and shortages of healthcare facilities in governments’ hospitals, private hospitals in the society have been playing a vital role. The demand of health services in private hospitals is increasing because of the certain amenities and facilities that are provided by these institutions. Patients can choose a hospital according to what matters most to them, whether it’s location, cost consideration, infrastructure availability, suggestion from friends, referred by doctors, etc. The present paper intends to find out customers priority for the selection of private hospital for their treatment. The paper aims to test the proportion of patients willing to seek a particular hospital (medical provider) is same across all the attributes for treatment. It also explores the factors playing significant role in customer preference for a private hospital. Data have been collected through schedule in three biggest multi-specialty private hospitals of ERODE (India). Cochran’s Q test is used to test whether the proportion of patients willing to seek a particular hospital (medical provider) is same across all the attributes for treatment. The findings of the present study would be an important aid for hospital administrators.

  298. An investigation on the performance appraisal system in construction industryDownload Article

    R.Poovitha, Dr.D.Ambika

    Abstract

    close

    Projects in construction industries are formulated to accomplish complex tasks that cannot be handled by individuals but by multidisciplinary teams. Organizations are organized to achieve specific goals and objectives. These goals and objectives can be fulfilled when the tasks are assigned to the employees and they perform the tasks. The success of the project depends on the work effectiveness of the employee to achieve the objectives within cost, scope and quality constraints. Hence these companies have groomed in their performance and their employees performance concerning to the enterprises stable performance. Performance appraisal and performance management are the management measurement approaches for the assessment of employee in both qualitative and quantitative aspects of the work. This paper focuses on the performance management systems and performance management process pursued in the construction industries of all sectors to disclose the flaws of the prevailing system and to afford the construction industries with the opportunities to embellish the principles of performance management systems and construction application.

  299. Privacy Settings for Social Networksin Cloud ComputingDownload Article

    Mr. S.Sambasivam, Ms.S.Rajeshwari

    Abstract

    close

    Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. This project examines the role of social context, image content, and metadata as possible indicators of users’ privacy preferences. This project proposes a two-level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s content being uploaded. The solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features.

  300. Security Issues, Challenges and Techniques in Cloud Computing: A surveyDownload Article

    G.Suganya, Dr. S. Arumugam

    Abstract

    close

    Cloud computing is a prominent technology that enables the sharing of resources such as storage, network and applications through internet.In this security is an essential service to be offered exclusively in public and hybrid cloud environment where in the data can be easilycorrupted.Though cloud computing provides various benefits to users, it brings some security challenges.This survey paper aims to discuss, analyze security challenges and techniques in cloud computing.These techniques achieve the assurance of cloud data security.

  301. A beeline for making flexible pavements by means of discarded plastics and industrial sludgeDownload Article

    Mr.S.Elango, Mr.K.Selvakumar, Ms.S.Indhu

    Abstract

    close

    The plastic waste is non biodegradable waste material. It may cause many problems and also have more chances of creating water and land pollution due to its improper disposal. In this Work, we investigate the possibilities in using the waste plastics for pavement Construction and also reviewed the strength of bituminous mix made with plastic coated aggregate and textile sludge as bituminous filler. Plastic wastes include Low Density Polyethylene, polypropylene, polyethylene Terephthalate, Polystyrene are heated and used as coating over coarse aggregates. This Plastic coated one is checked for its stability and determine the possibilities to use in pavement Works. This polymer coated aggregate mix have shown higher strength. Softening point of bitumen vary between 110°c to 140°c and they do not produce any toxic gases during heating. Softened plastics have tendency to form a coating over aggregates (PCA), which is a better material for construction of the flexible pavements. PCA mixed with melted bitumen and those prepared mixes are tested. At the same time, the bitumen is heated and mixed with the textile sludge powder waste as a filler material up to 50% in the bituminous mix. In this paper, we have done a detailed study of using waste plastics and the textile waste sludge in aggregate bitumen mix and showed test results to be performed.

  302. Optimisation of mechanical properties of different printing mode in 3D printingDownload Article

    V.N.Loganathan, S.Arunkumar, J.Arun Prakash, M.Balasagayaeswaran, N.Hariharan

    Abstract

    close

    Additive manufacturing is a layer-wise fabricating technology. There is no need for a machining process for final product because of its accurate layer fabrication to one another. This allows the user to manufacture parts directly from design software. There are many types of the additive manufacturing like selective laser sintering (SLS), fused deposition modeling (FDM), stereo lithography, polyjet printing. Materials used for a 3d printing should have a low melting point. In the polyjet printing, there are many materials like ABS, Vero Blue, Vero White, Vero Clear and so on. In this Vero Blue is the cheapest among the mainly used 3D printing materials. But we should check for its values on each way of printing types to get verified about its tensile and flexural values with regards to other materials.

  303. Design and fabrication of helmet using 3D printing technology to increase the heat transferDownload Article

    Aravind.S, Sivasankar. P, Sozhapandiyan.P, R.Vinoth

    Abstract

    close

    3D printing is a form of additive manufacturing technology where a three Dimensional object is created by laying down successive layers of material. It is Also known as rapid prototyping. This is a mechanized method where by 3D objects are quickly made on areas on ably sized machine connected to a computer containing blue prints for the object. The 3D printing concept of custom manufacturing is exciting to nearly everyone. This revolutionary method for creating 3D models with the use of ink jet technology saves time and cost by eliminating the need to design , print and glue together separate model parts. Now, you can create a complete modeling a single process using 3D printing. Subsequently, the aim of this study was to assess that two wheeler driver safety helmet and to a ideal designing the improvements on the safety helmet based on several designing techniques of industrial engineering. Further designing of the improvements made on the safety helmet was carried out using catia where else a 3D printer was used to print out the helmet.

  304. Beeline for making flexible pavement by using discarded plastic and quartz stone powderDownload Article

    Mr.S.Elango M.E., K.Dineshkumar, V.Gowtham, M.Gowthami and R.Hariharan

    Abstract

    close

    Every day, the discard waste plastics and many other mineral wastes like quartz powder, stone dust, marble waste etc., are dumped in the earth surface. It may cause environmental pollution. Nowadays, many engineer and industries are investigating the possibilities of waste plastics and mineral waste in flexible pavement. An attempt has been made to use the plastic as aggregate coating in order to increase road performance and durability. Plastic wastes like low density polythene, polypropylene, polythene, Terephthalate are used. These waste plastics are cut into small pieces. Aggregate are heated to a certain temperature and the spread over the heated aggregate. Due to heating this plastic gets softened and forms a coating as layer over these aggregate. The result indicates that the 10% of plastic coated aggregate doesn’t disqualify the material and no negative influence on the quality asphalt mixture. Even-though quartz stone powder used as filler material in asphalt mixture because they fill voids and enhances the cohesive property. Quartz is a mineral, which composed of sio2 (silicon dioxide). It is the second most adopted mineral in earth continental crust. The durability of the asphalt pavement is related to the appropriate proposing of mineral materials. Quartz mineral materials are used to enhance the asphalt mix quality. Bituminous mixtures are basically composed of aggregate of different sizes, fillers and bitumen. Fillers consist of mineral grain most of which 2.75mm sieve. Quartz powder may be of naturally available materials when derived from the crushing if quartz rocks. Discard waste plastics, quartz stone powder and a type of asphalt binder on the properties of asphalt mixture were investigated in this project. The result indicates positive influence on the quality of asphalt mixture. We use discarded waste plastic and quartz stone powder in more innovative and contributing in order to reduce negative impact of waste on environmental.

  305. Secured online voting system using face detectionDownload Article

    Manjula J

    Abstract

    close

    This project is developed for the threat free and user oriented online voting system. The online voting system is made for the people of the country residing around the world and wants to vote for their representative. In the proposed system described how the web application are efficient and can be used for voting. Our system support simultaneous voting due to the distributed nature of the database. During election electronic device is used for voting process. The traditional approach there was a need to go to the voting booth and cast a vote. People from various locations who don’t have their voting cards are not able cast their votes. Also validation of the user was poor and not appropriate. There was a bundle of manual work in the traditional voting system which was very time consuming process. Therefore the new system is developed to eliminate the efforts needed in the existing voting process. The given new projected system has an application which is developed for browser via which the user can cast his or her vote from anywhere on the face of the globe The proposed system supposed to propose a new voting system which ensures voter confidentiality and voting accuracy, thus providing an important framework that based on face detection and unique identification aadhar id number. An online solution is very useful as the information about the voters and the election committee is also made available to the people in the system.

  306. Secure cloud data storage as a service with minimum cost in cloud environmentDownload Article

    S. Menaka, Mrs. N.Radha

    Abstract

    close

    Privacy-preserving High order Possibility c-Means Algorithm that allows support for all users to conveniently access data over the cloud and control and detect the inside threat attack. Data owner is not able to control all over their data and security issues. The new security issues of Insider Threat Attack Various techniques are available to support user privacy and secure data sharing and detect of control the Insider Threat attack. An insider threat was the misuse of information through malicious intent, accidents or malware. The study also examined four best practices companies could follow to implement a secure strategy, such as business partnerships, prioritizing initiatives, controlling access, and implementing technology. This paper focus on various schemes to deal with secure data sharing such as Data sharing with forward security, secure data sharing for dynamic groups, Attribute based data sharing, encrypted data sharing and Shared Authority Based Privacy-preserving High-order Possibilistic c-Means Algorithm for access control of outsourced data. In this paper improve the could security issue’s and inside threat attack.

  307. Data sharing mechanism in mobile cloud environmentDownload Article

    K.V.Priyadharshini, Mr.R.B.Ramesh

    Abstract

    close

    Though the electronic technologies have undergone fast developments in recent years, mobile devices such as smart phones are still comparatively weak in contrast to desktops in terms of computational capability, storage, etc., and are not able to meet the increasing demands from mobile users. By integrating mobile computing and cloud computing, mobile cloud computing (MCC) greatly extends the boundary of the mobile applications, but it also inherits many challenges in cloud computing, e.g., data privacy and data integrity. In this paper, we leverage several cryptographic primitives such as a new  Pay metric technology to improve the security, which provides data privacy, data integrity, data authentication, and flexible data distribution with access control. Compared to traditional cloud-based data storage systems, our system is a lightweight and easily deployable solution for mobile users since no trusted third parties are involved and each mobile user only has to keep short secret keys consisting of three group elements for all cryptographic operations. Finally, we present extensive performance analysis and empirical studies to demonstrate the security, scalability, and efficiency of our proposed system.

  308. Local flow packet marking for network coding in manetsDownload Article

    P. Vasanthakumar, Mrs. Umamaheswari A

    Abstract

    close

    As in the case of DDOS attacks the attacker sends a large volume of malicious packets which later prevent the legitimate user to access the services, therefore our prime concern is to find out the no of packets being malicious in the legitimate requests and then mitigates them by an appropriate mechanism. In this paper an Analytical approach based on a mathematical equation which will be used to find out the no of packets being malicious under legitimate data packets and an algorithm which is a refined method of traditional hoop count inspection mechanism to mitigate the malicious packets which are coming along with the legitimate data from the attacker side and can pose a threat to the network performance.

  309. BPEL based rule generator design and verification of secure serviceDownload Article

    Jeena. A.J, Dr.R.Vijaya Rajeswari

    Abstract

    close

    Ensuring the preservation of security is a key requirement and challenge for Service Based Systems due to the use of third party software services not operating under security perimeters. By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language or BPEL has gained tremendous interest. However, such process-based language does not assure a secure environment for Web services composition. The key solution cannot be seen as a simple embed of security properties in the source code of the business logic since the dynamism of the BPEL process will be affected when the security measures get updated. In this context, several approaches have emerged to tackle such issue by offering the ability to specify the security properties independently from the business logic based on policy languages. To mitigate these challenges, we present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. Where as much attention has been dedicated to security issues for Web Services. We propose a novel approach that provides the users with model-based capabilities to specify aspects that enforce the required security policies. On the other hand, it offers a high level of flexibility when enforcing security hardening solutions in the BPEL process. We present a prototype implementation for validating linear workflows and evaluate its performance based on the security aspects in a BPEL process.

  310. Using smart city data in 5G networkDownload Article

    C.Hariram

    Abstract

    close

    Smart Cities and self-organizing networking techniques for fifth-generation (5G) cellular systems has been one-sided: a Smart City relies on 5G to support massive machine-to-machine (M2M) communications, but the actual net-work is unaware of the information flowing through it. However, a greater synergy between the two would make the relation-ship mutual, since the insights provided by the massive amount of data gathered by sensors can be exploited to improve the communication performance. In this paper, we concentrate on self-organization techniques to improve handover efficiency using vehicular traffic data gathered in London. Our algorithms exploit mobility patterns between cell coverage areas and road traffic congestion levels to optimize the handover bias in heterogeneous networks and dynamically manage mobility management entity (MME) loads to reduce handover completion times.

  311. A Non Isolated Bidirectional DC-DC Converter for Zero Voltage Switching with Magnetic CouplingDownload Article

    Priyanka D, Hema P

    Abstract

    close

    This paper describes and performance an adaptive neuro-fuzzy inference system (ANFIS) based energy management system (EMS) of a grid-connected hybrid system for smart grid application. The hybrid system consists of wind turbine (WT) and solar photovoltaic (PV) panels as a primary energy sources. The rectified wind output and solar panel output is given to LUO converter for boost up the DC voltage in order to connect them to a central DC grid. Then, the power has taken from the DC grid and it is given to the AC smart grid system through H-bridge inverter. The smart grid system consists of new bidirectional intelligent converter, high frequency ac-dc rectifier and low voltage dc-dc converter hybrid switching dc-ac converter. The smart grid system satisfied the load requirement and in case if the demand is low it will return the excess power to the grid also. On the whole, this proposed system utilizes the best use of solar and wind energy system so that the power can be generated at any time and satisfied the load demand

  312. Design and Implementation of High Efficiency Asymmetric Forward-Flyback ConverterDownload Article

    Sathya Shree.K, Ayyappan.S

    Abstract

    close

    This paper presents an approach to efficiency optimization in digitally controlled flyback dc–dc converters over wide ranges of operating conditions. Efficiency is characterized and optimized based on power loss modeling and multivariable nonlinear constrained optimization over power-stage and controller parameters. A valley switching technique is adopted to reduce MOSFET turn-on switching loss in discontinuous conduction mode. An optimization procedure is formulated to minimize power loss weighted over a range of operating points, under a cost constraint. A lookup table-based digital controller is applied to achieve on-line efficiency optimization by programming switching frequencies and operating modes based on the efficiency optimization processes. The proposed on-line efficiency optimization approach is verified by experimental results on a low cost 65 W flyback dc–dc prototype.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"