Articles

  1. Detection and neutralizing multiple spoofing attackers using PRR and IATDownload Article

    Dr.D.Thilagavathy, J.Janwhisrivastava, V.Kowzalya

    Abstract

    close

    In Network the drastic invention was brought up a big chances in wireless network. This Project has been evolved as one of the promising technology based on implementation of wireless network. Providing mobility, flexible infrastructure, fast and low cost deployment are the key features of EAACK. This is being most widely used wireless technology has limited security against network attacks. Dynamic configurability adds flexibility to Network but it makes it vulnerable to attacks like do’s, Wormhole, Man-In-Middle Attack, IP Spoofing Attacks. In this paper, an intrusion detection system was extended to Enhanced Adaptive ACKnowledgement (E-EAACK) and it will detect the localize and the intrusion of the attacker. This system consists of some security components like prevention, detection and reaction. Specially designed for NETWORK, E-EAACK serves in detection of malicious behavior without much affecting Network Performance. In order to detect and localize the multiple IP Spoofing Attacks. We propose, the use of digital signature for authentication of nodes and S-ACK scheme for detecting anomalous behavior in network. In implementation of GADE model for the detection of attacker and IDOL framework can be localized to the intruder and makes E-EAACK an effective security in solution for network.

  2. Design and implementation of arithmetic and logical block using QCA technologyDownload Article

    T. Ashok, M Chandrasekar

    Abstract

    close

    In this paper an eight bit arithmetic and logical block is designed using QCA technology. QCA cells does not conducts the information as current as used in conventional logic circuits. It operates based on the concept of Columbic Interaction of the states of electrons in QCA cells. So, designing of eight bit ALU block at low power can be achieved by using QCA technology.

  3. Design and analysis performance of kidney stone and cyst detection from ultrasound imagesDownload Article

    R.Janarthanan, G.Kalaiyarasi, M.Muthu Sowmya, M.Noor Ashma, S.Marlarkhodi

    Abstract

    close

    The research presents a system which is mainly pointing to the analysis of kidney and its abnormalities like stone and cyst. The main goal of research is the classification of ultrasound (US) kidney image as normal kidney or affected one. The system with trained template is developed and user’s sample tests are verified from it. Ultrasound images contain a noise called speckle noise. It is multiplicative noise and it is introduced due to signal modification at the time of capturing an image. US images also suffers by low contrast. These issues are sorted out using filter technique and histogram equalization method. The pre-processed image is segmented using Hierarchical k means clustering and from it region of interest is identified. 22 features of an image are extracted and these features are trained by feed forward Artificial Neural Network (ANN) to identify the class of kidney (i.e. normal or cyst). In order to analyse the systems functionality, it is tested on a dataset of ultrasound images of two classes. The analysis performance is based on two parameters first is accuracy and second is precision, which results in 87.5% and 100% respectively.

  4. Wireless scrolling led message display with zigbee communicationsDownload Article

    C.Oviya, M. Thilomathi, Anupama S. Kumar, Mr.T. Sasikumar

    Abstract

    close

    The project aims in designing a digital notice board with display on Scrolling LED display using a PC and Zigbee technology. We can implement this technology in schools, colleges, banks etc. After accessing every message it automatically resets and it displays the latest message on LED display. This project consists of an onboard computer, which consists of number of input and output ports. These onboard computers are commonly termed as micro controllers. The input and output port of the controller are interfaced with different input and output modules depending on the requirements. In other words micro controller acts as a communication medium for all the modules involved in the project. In this project we make use of a Zigbee Modem, Micro Controller and a Scrolling LED (6ft x 1ft.) display. User can send the messages to the Zigbee modem that is connected to the Microcontroller based control system. The microcontroller automatically reads the message and displays on Scrolling LED display.

  5. Smart driving with automatic control mechanismDownload Article

    B.Mohana Birundha, S.Yuvasree, S.Shanmugasundari, Mr.V.P.Gokulan, Mrs.M.Jeyalakshmi

    Abstract

    close

    Every vehicle has its own emission of gases, but the problem occurs when the emission is beyond the standardized values. The primary reason for this breach of emission level being the incomplete combustion of fuel supplied to the engine which is due to the improper maintenance of vehicles. This emission from vehicles cannot be completely avoided, but it definitely can be controlled. The aim of the project is to monitor and control the pollutants in the vehicle by using the pollution control circuit. Internal Co Emission Check and Control for Clean Environment. Vehicle can be controlled by government authority by Server. Automatic Speed Control based on vehicle distance measurement. Fuel Theft detection using ultrasonic sensor and sending SMS to owner using GSM technology Automatic Air conditioner Functioning based on High precision temperature measurement and control.

  6. Face recognition using image processing with raspberry piDownload Article

    M.Janani, A.Jayasree, P.Kalai, Selvi, Mr. R. Carol Praveen, Dr.C. Sujatha

    Abstract

    close

    Face Recognition is concerned with finding whether or not there are any faces in a given image and, if Present, returns the image location and content of each face. Security and surveillance are the two important aspects of human being. In this paper we propose face detection and recognition system that will capable of processing images very fast while acquiring very high true positive face detection rate. Most face detection algorithms are designed in the software domain band have a high detection rate, but they often require several seconds to detect faces in a single image, a processing speed that is insufficient for real-time applications. This Paper describes a simple and easy hardware implementation of face detection system using Raspberry Pi, which itself is a minicomputer of a credit card and is of a very low price. The system is programmed using Python Programming language. Both real time face detection and face detection from specific images, i.e. Object Recognition, is carried out and the proposed system is to provide a high security system using face recognition on Raspberry Pi board and send an alert to the authorized person email, this will increase the security of our Project.

  7. Human health monitoring system using redtacton transceiverDownload Article

    S.Ranjith, A.S.Arunkumar, P.Karthikeyan, Mr.R.Pandiyan

    Abstract

    close

    RedTacton is a Human Area Networking technology that uses the surface of the human body for transmitting the information at a high speed. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body. A transmission path is created when human body comes in contact with a RedTacton transceiver. Communication is possible using any body surfaces, such as the hands, fingers, arms, feet, face, legs or torso. RedTacton works through shoes and clothing as well. When the human body is not in contact with the transceiver the communication will be terminated. Human body communication (HBC) provides a promising physical layer for wireless body area networks (BANs) in healthcare and medical applications because of its low propagation loss and high security characteristics. In this project, we propose to monitor the patients health monitoring in a hospital. No external devices like Bluetooth, LAN, RF, Zigbee, Wires are used for transmitting the data. Thus reducing the capital or investment cost.

  8. Microcontroller based score board with wireless communication using zigbee technologyDownload Article

    Mr.V.Balaji, M.E, V.Karuppusamy, V. Karthick, M.Sasikumar

    Abstract

    close

    This paper discusses implemented various sports and games scoreboard and timer (Game clock, short clock).The scoreboard of any sport shows the status of the on going match or game by displaying the significant data like timer and scores of teams. Scoreboard is used for various features. Scoreboards are specially used for displaying scores of a game played between two teams. Some games can be a timer based or an untimer. Players and viewers rely on the numerical figures that are shown on the scoreboard especially the scores of each team and the game clock to determine which team is winning. The scoreboard displaying data inform of seven 7-segment LEDs to implement a remotely controlled programmable clock and scoring board. In some scoreboard controlled clock ans scoreboard status wired as well wireless. This survey paper discusses about merits of various methods, technology and communication system used for scoreboard. This paper will also discuss the future scope for multi-sport scoreboard that is cost efficient, portable, and easy to use.

  9. Skin disease prognosis from dermascopic images with image processing and IoTDownload Article

    S.Vasanthi, V.Manisha, R.Madhumitha, A.Manikandan, C.Lingeshwari

    Abstract

    close

    Dermatology is one of the major fields of prescription which is worried about the analysis and treatment of skin disorders. Skin diseases are among the most widely recognized medical issues around the world. Regardless of being common, their determination is quite troublesome and requires broad knowledge and expertise in the area. Skin disease might cause severe health and monetary consequences for patients if not detected and controlled early. Early recognition can forestall the condition from worsening. The proposed work presents the development of an automated skin disease diagnosis system which takes images of a skin disease as an input by the user and predicts the type of skin disease. The system uses a dual stage approach for detection and displaying process which effectively uses image processing and IoT. In the 1st stage, the image of the skin condition is subject to numerous types of pre-processing techniques followed by feature extraction. The extracted features are fed to the SVM classifier to identify disease and predict accordingly. On training and testing for 5 diseases the system produces an overall prediction accuracy of 90%.

  10. An optimized design of RCA using QCADownload Article

    M.Jeyalakshmi, K.Subarna, S.K.Sangeetha, B.Sangeetha

    Abstract

    close

    Quantum dot Cellular Automata (QCA) is a transistor less estimation model scrutinized as an alternative to Current CMOS designs. In the proposed work, a Novel QCA based Full adder is designed with minimum number of QCA cells. The main objective of proposed work is to decrease the area by reducing the number of QCA cells and thereby attaining low power consumption. This optimized Full adder is engaged as basic logic to construct an efficient 4-bit Ripple carry adder. The proposed work is simulated using QCA designer version 2.0.3which reduces the power consumption. The proposed efficient 4-bit Ripple carry adder circuit improves over 64.2% in QCA cell count when compared to existing work.

  11. Implementation of Rejecting Illegal Voting System using Biometric and Aadhar CardDownload Article

    G.Paranjothi, S.Akshaya, D.Rupavathi, A.Shameema, J.Sheeba

    Abstract

    close

    The objective of voting is to allow voters to exercise their right to express their choices regarding specific issues, pieces of legislation, citizen initiatives, constitutional amendments, recalls and/or to choose their government and political representatives. It has always been an onerous task for the election commission to conduct free and fair polls in our country. A lot of money has been spent on this to make sure that the elections are rampage free. But, now- a -days it has become very usual for some forces to indulge in rigging which may eventually lead to a result contrary to the actual verdict given by the people. In order to provide inexpensive solutions to the above, this paper will be implemented with biometric system i.e. finger print scanning. This is used to ensure the security to avoid fake, repeated voting etc. It also enhances the accuracy and speed of the process. The system uses thumb impression for voter identification as we know that the thumb impression of every human being has a unique pattern. In this, creation of a database consisting of the thumb impressions of all the eligible voters in a constituency is done as a pre-poll procedure. During elections, the thumb impression of a voter is entered as input to the system [1]. This is then compared with the available records in the database. If the particular pattern matches with anyone in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected. The result is instantaneous and counting is done. The overall cost for conducting elections gets reduced and so does the maintenance cost of the systems.We all know that illegal voting is a major drawback in the elections. The finger print should be same in both biometric and aadhar card for the person while polling the vote. When the vote will be illegal the machine will be used to avoid illegal voting. Then the system will give the information that whether the vote will be register or not register to the corresponding person mobile phone.

  12. Smart Grid Power Management and Load Sharing System using IOTDownload Article

    G.Paranjothi, D.Muhamadha Begam, M.Indumathi, R.Deepika, M.Akila

    Abstract

    close

    The main aim of our paper is the power management and load sharing of power system using IOT technologies, also known as demand side management (DSM).It is the process of balancing the generated power on the grid side with the electrical load by adjusting or controlling the load rather than the power station output. This can be achieved by direct intervention of the utility in real time, by the use of frequency sensitive relays triggering the circuit breakers (ripple control), by time clocks, or by using special tariffs to influence consumer behavior. Load management allows utilities to reduce demand for electricity during peak usage times (peak shaving), which can, in turn, reduce costs by eliminating the need for peaking power plants. In addition, some peaking power plants can take more than an hour to bring on-line which makes load management even more critical should a plant go off-line unexpectedly for example. Load management can also help reduce harmful emissions, since peaking plants or backup generators are often dirtier and less efficient than base load power plants. New load-management technologies are constantly under development both by hospital, private industry and public entities. Whenever there is an demand occurred on generating side the load is shared and providing the priority to the particular sector (Hospitality), at the same time providing the un-interrupted power supply to the other sector (Industrial and domestic) and we can monitor this process using IOT technology.

  13. Smart defective energy meter for power theft control using IOTDownload Article

    Dr. E.Menaka, D.Soniya, S.Sankavi, J.Dhanalakshmi

    Abstract

    close

    IOT based smart energy meter is used for billing and helps to identify the power theft. It is highly desirable in the field of energy and consumer can do power management by knowing the usage of energy on time to time using PIC16F877A microcontroller, which also calculates the bill amount. The customer needs to pay the bill on schedule; if they couldn’t able to pay the bill the electric power connectivity can be turned off automatically from the distant host. The theft of the electricity increases the cost which is to be paid by customer. To overcome the problem, smart meter system is used to monitor the power theft and which sends the alert message to the consumer. Hence this system is used to detect the power usage and the power theft.

  14. Elegant helmet using IOTDownload Article

    Mrs.B.Ananthi, M.Bhuvaneswari, J.Jahnavi, K.Hemalatha, C.Gnana Durga

    Abstract

    close

    The foremost goal of our project is accident discovery, notification and expectation. This helmet makes rider to feel comfy as well as with high safeguard and security. A elegant helmet is a special idea which makes motorcycle driving safer than before. This is implemented using GSM and GPS technology. Vibration sensors are placed in different places of helmet where the prospect of thumping is more which are connected to microcontroller board. It sends information of the consequent location to family members, nearby police station and hospitals of the rider and emergency contact number. Alcohol sensors sense the alcoholic content in riders breath. If the rider is not wearing the helmet or if there is any alcohol content found in rider’s breath, the bike remains off. The bike will start until the rider wears the helmet and if there is no alcoholic content there.

  15. Comparison of feature selection method for chronic kidney data set using data mining classification analytical modelDownload Article

    A. Priyadharshini, A.Kowsalya, A.Nandhini, A.Poornima, R.Vasugi

    Abstract

    close

    Medical Data Analysis is one of the applications of data mining that plays a vital role in human's lives. Data mining has become famous in healthcare management to predict, to detect or to find the hidden patterns and information in health data. In the healthcare commerce different kind of data mining approaches are used to mine the interesting pattern of diseases using the statistical medical data with the help of different machine learning techniques. The conventional disease diagnosis system uses the observation and knowledge of doctor without using the complex clinical data. The planned system assists doctor to predict sickness properly and also the prediction makes patients and medical insurance suppliers benefited. This paper implemented a feature model construction and comparative analysis for improving prediction accuracy of chronic kidney disease dataset in four phases. In first phase, Z-Score normalization algorithm is applied on the original kidney datasets collected from UCI repository. In the second phase of kidney dataset prediction, by the use of Step wise Regression Classification (SRC) Model and Built around the Random Forest Classification algorithm (BRFC) feature selection, subset (data) of Kidney dataset from whole normalized Kidney patient dataset is obtained which comprises only significant attributes. Third phase, classification algorithms are applied on the kidney data set. In the fourth phase, the accuracy will be calculated using Mean Absolute error (MAE), Root Mean square Error (RMSE), Relative Absolute Error(RAE), Root Relative Square Error(RRSE) and kappa values. MLP(Multilayer Perceptron Model) and SVM (Support Vector Model) classification algorithm is considered as the better performance algorithm after applying BRFC and SRC feature selection. Finally, the assessment is done based on accuracy values

  16. E- Farming android applicationDownload Article

    Mrs.R.Logambal, S.Pavithra, N.Sathya, R.Shopika, M.Swathika

    Abstract

    close

    Farming is the Prime Occupation in India in spite of this, today the people involved in farming belongs to the lower class and is in deep poverty. The Advanced techniques and the Automated machines which are leading the world to new heights, is been lagging when it is concerned to Farming, either the lack of awareness of the advanced facilities or the unavailability leads to the poverty in Farming. Even after all the hard work and the production done by the farms, in today’s market the farmers are cheated by the Agents, leading to the poverty. Agro marketing would make all the things automatic which make easier serving as a best solution to all the problems. E-farming will serve as a way for the farmers to sell their products across the country just with some basic knowledge about how to use the website. Getting availed to the required information related to the markets and different products can be made possible through the SMS facility provided by the system. Keywords: Website, farm-marketing, market rate, bill, learning, SMS facility.

  17. Exploiting the irregularity radio verify location in manet scatteredDownload Article

    A. Elavarasi, Dr.P.Ramya

    Abstract

    close

    Traditional distance-based Location Verification System (LVS) is ineffective for some attacks in sparse MANETs, e.g. the Similar Distance-based Malicious (SDM) attack. In this letter, we propose to exploit radio irregularity to build a novel LVS. Our system detects attack based on the estimated difference of radio irregularity coefficients, and the claimed locations of the malicious node and an assistant node. To the best of our knowledge, our system is the first-of-its-kind that can detect SDM attack and pollution attack with only the RSSI information transmitted by a detecting node to the suspicious malicious node and an assistant node. Simulation results demonstrate that our proposed system can detect the attacks that cannot be detected by traditional distance-based methods. This paper assesses the effects of high-power jamming attacks in SDM optical networks utilizing Multi-Core Fibers (MCFs), where the disruptive effect of the inserted jamming signals may spread among multiple cores due to increased Inter-Core CrossTalk (ICo-XT). We first assess the jamming-induced reduction of the signal reach for different bit rates and modulation formats. The obtained reach limitations are then used to derive the maximal traffic disruption at the network level. Results indicate that connections provisioned satisfying the normal operating conditions are highly vulnerable to these attacks, potentially leading to huge data losses at the network level.

  18. Utilizing the unbalanced radio verify location in manet spottedDownload Article

    A.Sinthiya, A.GopalaKrishnan

    Abstract

    close

    Future wireless networks will progressively displace service provisioning towards the edge to accommodate increasing growth in traffic. This paradigm shift calls for smart policies to efficiently share network resources and ensure service delivery. In this paper, we consider cognitive dynamic network architecture (CDNA) where primary users (PUs) are rewarded for sharing their connectivities and acting as access points for secondary users (SUs). CDNA creates opportunities for capacity increase by network-wide harvesting of unused data plans and spectrum from different operators. Different policies for data and spectrum trading are presented based on centralized, hybrid, and distributed schemes involving primary operator (PO), secondary operator (SO), and their respective end users. In these schemes, PO and SO progressively delegate trading to their end users and adopt more flexible cooperation agreements to reduce computational time and track available resources dynamically. A novel matching-with-pricing algorithm is presented to enable self-organized SU-PU associations, channel allocation and pricing for data and spectrum with low computational complexity. Since connectivity is provided by the actual users, the success of the underlying collaborative market relies on the trustworthiness of the connections. A behavioral-based access control mechanism is developed to incentivize/penalize honest/dishonest behavior and create a trusted collaborative network. Numerical results show that the computational time of the hybrid scheme is one order of magnitude faster than the benchmark centralized scheme and that the matching algorithm reconfigures the network up to three orders of magnitude faster than in the centralized scheme.

  19. Usns integrated hydroponic irrigation system and crops protection using image capturing techniqueDownload Article

    N.suresh, M.Prakash, G. Bharath, M. Gokulakannan, M. Saravanan

    Abstract

    close

    Agriculture is the heart of India's monetary action and our experience amid the most recent 70 years has shown the solid connection between rural development and financial riches. The present agricultural framework is a blend of extraordinary accomplishments and missed open doors in India. In the event that India need to wind up plainly capable monetarily on the planet, our agrarian efficiency ought to be equivalent to those nations, which are right now appraised as financial energy of the world. We require another and rising innovation which can enhance persistently the efficiency, productivity, nature of our significant cultivating frameworks. One such innovation utilized as a part of India is the nursery innovation. In spite of the fact that it is hundreds of years old, it is new to India. This project discusses about the development of hardware system which can be used to detect the birds from the video processing chase away from the farm using an image based embedded technology by high frequency ultrasound is generated. To increase the productivity of Agri-food, hydroponics irrigation system is used.Communication through the underground soil network will be used for agriculture. The final goal is the integration of the developed sensors and circuits into a full control greenhouse system for a simple, easy to use and low cost soilless culture platform.

  20. Design and implementation of automated car parking system using RFIDDownload Article

    P. Gopalakrishnan, Rinse K.M

    Abstract

    close

    In this project a solutions has been provided to the problems encountered during parking a vehicle at commercial parking lots. This problems has been resolved using Parking Reservation System. The Parking Reservation System is an access control and automated Reservation system that provides ID based parking slot provision system. This system is designed for Multiple Dwelling Units (MDU), offices, schools, colleges, Malls, Cinema theaters, Airports, railway station and many more where there is a requirement of a systematic parking reservation of vehicles. The unique identification of the Vehicle entering using RFID tags permits tracking of vehicles entering and exiting the parking premises. It helps the system to know whether the vehicle or its owner is registered so as to prioritize allocation of parking spaces to incoming customers.

  21. Food computer using big data analysisDownload Article

    Asif Ahamed P T, Karthi T, Thamilarasi C

    Abstract

    close

    In this propelled universe of fluctuating atmosphere and temperamental atmosphere conditions, the outside cultivation part is confronting colossal issues. Requires more substance generation to meet the necessities of the expanding total populace. Likewise, the dry seasons, starling climate, surges and air contamination which all together remain against the nourishment creation. The time has come to consider present day methods for cultivation. This project food computer is a computer-controlled environment for horticulture. Hydroponic innovation is used to grow plants in this controlled domain. The atmosphere to grow the plants is controlled and monitored by Raspberry pi. All the environment parameters are sensed by various sensors which is controlled by Arduino. Raspberry talks with the Arduino and collects data and compare with predefined settings called climate recipe and gives the command to Arduino to actuate or de-actuate the devices.

  22. Implementation of service robot using OCR technique in raspberry PI for visually impaired personDownload Article

    Prabhakaran R, C Thamilarasi, Jimin C Jiji

    Abstract

    close

    Optical character recognition (OCR) is the identification of printed characters using photoelectric devices and computer software. It coverts images of typed, handwritten or printed text into machine encoded text from scanned document or from subtitle text superimposed on an image. In this project text images are converted into audio output. OCR is used in machine process such as cognitive computing, machine translation, text to speech, key data and text mining. It is mainly used in the field of research in Character recognition , Artificial intelligence and computer vision .In this project, as the recognition process is done using OCR the character code in text files are processed using Raspberry Pi device on which it recognizes character using tesseract algorithm and python programming and audio output is listened. To use OCR for pattern recognition to perform Document image analysis (DIA) we use information in grid format in virtual digital library’s design and construction. This work mainly focuses on the OCR based automatic book reader for the visually impaired using Raspberry PI.

  23. Automatic railway track fault detecting using wireless network systemsDownload Article

    Thalha NS, C Thamilarasi

    Abstract

    close

    Automatic crack detection on train tracks is highly crucial for safety and labor-cost efficiency. In India, most of the commercial transport is being carried out by the railway network and therefore, any problems in the same has the capacity to induce major damage to the economy-notwithstanding the societal impact of loss of life or limb. This paper proposes a cost effective yet robust solution to the problem of fire occurrence recognition and safety, detection of obstacle on the track, railway crack detection utilizing a method that is unique in the sense that while it is simple, the idea is completely novel. The paper discusses the technical and design aspects in detail and also provides the proposed robust train safety system. The paper also presents the details of the implementation of the system utilizing simple components inclusive of wireless detection of signals and crack detector assembly. The proposed scheme has been modeled for robust implementation in the Indian scenario.

  24. Design and implementation of vehicle tracking system using gps-gsm technologyDownload Article

    R.MaheshKumar M.Kanmaniraja, S.Suriaraj, S.Gowtham

    Abstract

    close

    This project presents a vehicle tracking system using GPS-GSM technology that can be remotely monitored by a GSM phone. It is designed to track the position of a vehicle at any period of time. It comprises of a GPS receiver, a microcontroller and a GSM module. The combination of these technologies produces a tracking system. The GPS continuously takes input data from the satellite and stores the latitude and longitude values in a Ardunio microcontroller's buffer. This basically means that if a person has to track a vehicle, a message has to be sent to a GSM device, by which it gets activated. The location of the vehicle is identified using global positioning system (GPS) and global system for mobile communication (GSM). These systems constantly watch a moving vehicle and report the status on demand. When theft is identified, the owner sends an SMS to the microcontroller and the microcontroller sends back a message containing the location of the vehicle in terms of latitude, longitude and time.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"