Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
1 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
EXPERIMENTAL STUDY ON TRIBOLOGICAL BEHAVIOUR OF ALUMINIUM-
CENOSPHERE COMPOSITE MATERIAL
Kousik kumaar.R
Assistant Professor
Department of Aeronautical Engineering,
Nehru Institute of Engineering and Technology,
Coimbatore, Tamilnadu
Abstract—In recent research, composites are used because of low weight and high thermal performances. To reduce
weight and improve fuel efficiency, the aero industry has dramatically increased the use of aluminum composites in
recent years. Aluminum alloy based metal matrix composites (MMCs) with ceramic particulate reinforcement have
shown great usage for such applications. These materials having a lower density compared to the conventionally
used grey cast irons are expected to result in weight reduction of up to 50 – 60 %. In this study, attempt has been
made to analyze a new composite material called cenosphere reinforced aluminum alloy. The Aluminium-
Cenosphere composite material which has low thermal expansion and greater wear performance most extreme
conditions can be used in the places were wearing is a major problem.
Index Terms— MMC, Aluminium, Cenospheres, wear
2 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
INCREASE IN PERFORMANCE OF AIRCRAFT BY USING CO-FLOW JET AIRFOIL
Marimuthu.G,Rajesh.K,Sivakumaran.R,Gowthem.S
Department of Aeronautical Engineering,
Karpagam Institute of Technology,
Coimbatore, Tamilnadu, India.
Balaji.K(Guide )
Assistant Professor, Department of Aeronautical
Engineering
Karpagam Institute of Technology
Coimbatore, Tamilnadu, India.
Abstract
— This paper briefly discusses the new type of flow control method to increases the performance enhancement of aircraft. The purpose
of these research is to investigate the flow characteristics over an airfoil to control the flow separation control of co-flow jet (CFJ) airfoil by
Numerical Method. The concept of CFJ airfoil is to open an injection slot near leading edge and suction slot near trailing edge. This
mechanism that follows is that, high pressure air is injected tangentially along the span at the leading edge while a low pressure source
removes the same amount of air at the trailing edge. CFJ airfoil blows and sucks the same amount of mass flow, this creates so called Zero-
Net-Mass-Flux (ZNMF) flow control, the results obtained upon performing the experiments indicated co-flow jet airfoil with injection and
suction slot has better performance characteristics.
Keywords: Flow control, performance, CFJ, ZNMF,FC
3 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A SECURITY FRAMEWORK FOR BIGDATA IN G-HADOOP ARCHITECTURE USING
ENCRYPTION TECHNIQUE
Mr. K. ArunKumar,1R. Bhavani,2 A. Satheesh,3
Assistant Professor, Department of IT, R V S College of Engineering and Technology,coimbatore
U G Scholar,Department of IT, R V S College of Engineering and Technology,coimbatore
Abstract- MapReduce is a programming model which is an associated implementation for processing and generating large
datasets with a parallel, distributed algorithm on a cluster. A MapReduce cluster employs a master-slave architecture where one
master node manages a number of slave nodes. To implement the MapReduce tasks on cluster system, Hadoop framework is
used. It is a scalable, open source for data storage and processing. G-Hadoop is an extension of Hadoop that reuses the job
mechanisms of Hadoop and is designed for multiple clusters. The security framework based on security solutions such as public
key cryptography and SSL protocol simplifies the users authentication and job submission process. In addition the AES
algorithm is used to protect the proxy credential from the most common attacks.
Keywords -- AES, SSON
4 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
ADAPTIVE POSITION UPDATE FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC
NETWORKS
Indhurekha.S, Kala.I, Dr.Karthik.S
PG Scholar, Associate Professor, Dean
Department of Computer Science,
SNS College of Technology,
[email protected], [email protected], [email protected]
ABSTRACT
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data
among themselves without the reliance on a fixed base station or a wired backbone network. MANET nodes are typically
distinguished by their limited power, processing, and memory resources as well as high degree of mobility. In mobile ad hoc
network there are several routing algorithms, which utilize topology information to make routing decisions at each node. In
geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding
decisions. Periodic broadcasting of beacon packets that contain the geographic location coordinates of the nodes is a popular
method used by most geographic routing protocols to maintain neighbor positions. We contend and demonstrate that periodic
beaconing regardless of the node mobility and traffic patterns in the network is not attractive from both update cost and routing
performance points of view. We propose the Adaptive Position Update (APU) strategy for geographic routing, which
dynamically adjusts the frequency of position updates based on the mobility dynamics of the nodes and the forwarding patterns
in the network. APU is based on two simple principles: 1) nodes whose movements are harder to predict update their positions
more frequently (and vice versa), and (ii) nodes closer to forwarding paths update their positions more frequently (and vice
versa). Our theoretical analysis, which is validated by NS2 simulations of a well-known geographic routing protocol, Greedy
Perimeter Stateless Routing Protocol (GPSR), shows that APU can significantly reduce the update cost and improve the routing
performance in terms of packet delivery ratio and average end-to-end delay in comparison with periodic beaconing and other
recently proposed updating schemes. The benefits of APU are further confirmed by undertaking evaluations in realistic network
scenarios, which account for localization error, realistic radio propagation, and sparse network.
5 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
AN ENERGY EFFICIENT TREE-CLUSTERED PROTOCOL FOR WIRELESS SENSOR
NETWORKS
S.Gayathri1,S.Gokulavani2,S.Sahana3,K.Sureka4
Dept Of Electronics And Communication Engineering
Avinashilingam Institute For Homescience And Higher Education For Women,Coimbatore.
ABSTRACT: A Wireless sensor network(WSN) consists of large numbers of sensor nodes with data processing, sensing and
communication capabilities. The main constraint on sensor network is battery power utilization, which affects the
communication between nodes. Hence to increase the lifetime of sensor node, an efficient energy saving protocol are needed.
The multihop-routing protocol is well known for power saving in data gathering.Recently several researchers used cluster-
based (LEACH), chain-based (PEGASIS), and tree-based (TREEPSI) protocols to energy efficient protocol.In this paper, a
novel Tree-clustered protocol has been proposed that combines the features of tree-based and cluster-based architecture. The
tree-clustered protocol gives better performance than other methods.
KEY WORDS: Wireless sensor network (WSN),energy efficient, multihop routing protocol.
6 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
BIOMETRIC ADVANCE OF SCLERA VEIN AND FINGER VEIN FEATURES FUSION RECOGNITION
M.ELAKIYA, S.B.HAARINE DHEVY, V.PRADEEPA, A.SRIPRADHA
DEPARTMENT OF INFORMATION TECHNOLOGY.
GUIDED BY: MRS.THAMARAISELVI.R, ASSISTANT PROFESSOR..
ABSTRACT-Sclera and finger print vein is a new parallel vein recognition method using a two-stage parallel approach for
registration and matching. First, we designed a rotation- and scale-invariant Y shape descriptor based feature extraction method
to efficiently eliminate most unlikely matches. Second, we developed a weighted polar line sclera descriptor structure to
incorporate mask information to reduce GPU memory cost. Third, we designed a coarse-to-fine two-stage matching method.
Finally, we developed a mapping scheme to map the subtasks to GPU processing units. The experimental results show that our
proposed method can achieve dramatic processing speed improvement without compromising the recognition accuracy. We
examine the previously proposed finger-vein identification approaches and develop a new approach that illustrates its
superiority over prior published efforts. We develop and investigate two new score-level combinations i.e., holistic and
nonlinear fusion, and comparatively evaluate them. With more popular score-level fusion approaches to ascertain their
effectiveness in the proposed system. The project is a state-of-the-art advancement of multi biometrics, offering an original
viewpoint on features fusion. In greater detail, a frequency-based approach results in an identical biometric vector incorporate
sclera vein and fingerprint vein data. Consecutively a hamming-distance-based matching algorithm deals with the combined
homogenous biometric vector. The proposed multimodal system achieves interesting results with several commonly used
databases.
INDEX TERMS—Sclera and Finger Vein Recognition, Multi biometric, two new score level combination
7 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
COMPARISON OF DATA HIDING ALGORITHMS
E DIVYA, P RAJKUMAR
Dept. Of Electronics And Communication
Nehru College Of Engineering And Research Centre
Thrissur, India
Abstract- As the technology is advancing more and more we need efficient steganographic methods. This paper uses the
optimization technique to increase the efficiency of steganographic technique .Particle warm Optimization technique in spatial
and transform domain increase the efficiency.PSO algorithm gives the highest PSNR(peak signal to noise ratio) compared to
simple spatial domain technique.
Index Terms—PSNR, PSO, LSB, Global best, Personal best
8 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
CONFIDENTIALITY ON DATA SHARING WITH UNIDENTIFIED ID SECURITY
ASSIGNMENT ON WEB SERVICES
R.DHANUSREE, S.MOHANARANGAN
Dept of CSE, Arunai College of Engineering, Thiruvannamalai, Tamilnadu.
Abstract- Web injection attack exploits web application security by inserting malicious script into the web application. The
need for this kind of attack is to gain access to application data or database. Here the focus is on securing web application
against web injection attacks. To detect injection vulnerabilities in web services, we use combinatorial interaction testing the
main focus is on Cross-Site Scripting Attack (XSS). By analyzing the behavior of the Web service the model can detect the
presence of the injection vulnerabilities. This proposed work combines persuasive cued click points and password guessing
resistant protocol to reduce the guessing attacks as well as motivate users to select more random and difficult passwords to
guess. An algorithm for anonymous sharing of private data among parties is been developed. Assigning ID numbers to nodes
ranging from 1 to n, the identity received are unknown to the other member. Using serial number assigned the complex data can
be shared. The new algorithms are built on top of a secure sum Security operation using service discovery identities and id’s
vulnerability detection secured protocol.
Keywords- Cross-site Scripting Attack, Persuasive cued click point, Password guessing resistant protocol and Combinatorial
Interaction Testing.
9 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER
NON-LINEAR PROGRAMMING
Sowmiya Eswaran[1], Vanitha R[2],Vanmathi R[3] Vasuki Dhanabal[4]
Students (1, 2,3,4), Dept of Information Technology, V.S.B Engineering College, Karur.
ABSTRACT: Big data is a popular term used to describe the exponential growth and availability of data, both structured and
unstructured. The explosive growth of demands on big data processing imposes a heavy burden on computation, storage, and
communication in data centers, which hence incurs considerable operational expenditure to data center providers. Therefore,
cost minimization has become an emergent issue for the upcoming big data era. Different from conventional cloud services, one
of the main features of big data services is the tight coupling between data and computation as computation tasks can be
conducted only when the corresponding data is available. As a result, three factors, i.e., task assignment, data placement and
data movement, deeply influence the operational expenditure of data centers. In this paper, we are motivated to study the cost
minimization problem via a joint optimization of these three factors for big data services in geo-distributed data centers. To
describe the task completion time with the consideration of both data transmission and computation, we propose a two-
dimensional Markov chain and derive the average task completion time in closed-form. Furthermore, we model the problem as
a mixed-integer non-linear programming (MINLP) and propose an efficient solution to linearize it.
INDEX TERMS: Big data, data flow, Data placement, energy consumption, distributed data centers, cost minimization, task
assignment.
10 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGNING PARALLEL WORKLOAD USING REALISTIC CHARACTERISTICS
G.Vinoth, C.Karthick
Dept of CSE, Sembodai Rukmani Varatharajan Engineering College, Sembodai, Nagappattinam,, Tamil nadu,
ABSTRACT: The development of parallel and distributed systems has drawn the attention of the research community to study
their scheduling performance. Since workloads are required to serve as the input of scheduling evaluation, workload models are
essential for researchers to generate synthetic workloads. Two kinds of workloads: real workloads (traces) collected from real
systems, and synthetic workloads generated by statistical models. The main objective of a workload model is
representativeness, which depends on the modeling approach. We provide a realistic model that incorporates up to five
important workload properties at the same time. The scope of our model is for rigid jobs which do not change their requested
number of processors at runtime. A job consists of 3 attributes: the arrival time of the job, the runtime indicating how long the
job is executed, and the parallelism indicating how many processors the job requests. In practice, We validated our model by
comparing and fitting with real data, and by comparing simulation results of scheduling with real and synthetic workloads.
First, it helps to evaluate new scheduling algorithms. Second, it can be used to evaluate the impacts of individual workload
features on scheduling. Third, it is useful for evaluating the impacts of interactions of workload features on system
performance.
11 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DETECTION AND AVOIDANCE OF CONGESTION FOR MULTIPATH ROUTING USING
SENSOR NETWORKS
P.DAFNI #1, M.NANDHINII#2
1, 2 UG Students, Department of ECE, Coimbatore Institute of Engineering and Technology,
[email protected],[email protected]
ABSTRACT - Sensor networks come in a wide variety of forms, covering different geographical areas, being sparsely or
densely deployed, using devices with a variety of energy constraints and implementing an assortment of sensing applications.
Congestion in Wireless Sensor Network (WSN) can cause missing packets, low energy efficiency and long delay.Some
applications need to transmit large volumes of data concurrently from several sensors. These applications have different delay
and QoS requirements. Congestion problem is more urgent in such applications. To address this challenge, we propose a novel
which comprises three mechanisms:congestion detection using dual buffer thresholds and weighted buffer difference ;Flexible
Queue Scheduler for packets scheduling; Bottleneck-node-based source sending rate control scheme. Simulations show that
ECODA achieves efficient congestion control and flexible weighted fairness for different class of traffic. Therefore it leads to
higher energy efficiency and better QoS in terms of throughput, fairness, and delay.
Keywords: Wireless Sensor Network, Dual buffer thresholds, Weighted Buffer Difference, Flexible Queue scheduler,
Bottleneck-node
12 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
EFFECTIVE DENIAL-OF-SERVICE ATTACK DETECTION USING HYBRID DETECTION
MECHANISM
Ms. R. Suganya1, Dr. T. Manigandan2
1ME, Department of Computer Science and Engineering
2Professor/Principal
1,2P.A. College of Engineering and Technology, Pollachi, Tamilnadu, India
Abstract--- Denial-of-Service attack is an attempt to make a system, machine or network resources unavailable to its user by
blocking or denying the services. The affected computer may crash or disconnect from the internet either permanently or
temporarily. The challenge of attack is to quickly and effectively identify incoming traffic as malicious. Hybrid detection
mechanism is used to detect the attack more accurately. It is the combination of misuse based detection and anomaly based
detection for accurate network traffic characterization and that reduces the false alarm rate. The detection rate is improved by
considering various parameters are Time, Speed, Distance and Packet size for finding the normal traffic. Denial of service
attack detection system that uses Multivariate Correlation Analysis for accurate network traffic characterization by extracting
the geometrical correlations between network traffic features and enhance the speedup of the process using triangle area based
technique.
Keywords--- Denial-of-Service attack, Hybrid detection, Multivariate Correlation Analysis, Triangle area based technique.
13 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Energy-Efficient HYBRID Communication Scheme for Mobile Ad Hoc Networks
G.ABIRAMI,S.Sindhu P.Suvitha S.Kavya N.Shobajebarani
Abstract: In mobile ad hoc networks (MANETs), every node overhears every data transmission occurring in its vicinity and
thus, consumes energy unnecessarily. However, since in some modern MANET routing protocols such as load distribution
based approach is not sufficient for high energy saving due to consumption of energy during inactive mode. Thus, we propose a
Localized Energy Aware Routing (LEAR) protocol along with sleep/ power-down approach. It increases the energy
conservation for transmitting data. Here we used SPAN protocol for selecting the master slave node. In proposed scheme shows
the better results in energy conservation.
Key words-MANET, LEAR, SPAN, sleep/power down approach.
14 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
ERROR PERFORMANCE ANALYSIS OF PHYSICAL LAYER NETWORK CODING WITH
TRANSMIT DIVERSITY AT RELAY
P.Kavitha I yr M.E ,[CS] N.Sakthi Bavatharani I yr M.E,[CS] SNS College
of Technology,Coimbatore-35 SNS College of Technology,Coimbatore
Abstract---We analyze the error performance of the physical layer network coding (PNC) protocol with transmit diversity in
bidirectional relay networks for binary phase shift keying (BPSK) over Rayleigh fading channels. It is assumed that a
bidirectional relay network consists of two sources at transmitter and two sources at receiver and a relay consists of two
antennas, where each source node has a single antenna and operates in a half duplex mode, and the PNC over finite GF(2) is
employed. In this system, since the signal estimation of the multiple access channel (MAC) at the relay is given by the sum of
two exponential functions. Then relay transmit in the form of transmit diversity (alamouti) to the source. Then finally we derive
the capacity for system model. Finally we obtain outage probability, outage capacity for the end to end average bit error rate.
Index Terms — Bidirectional relay network, end-to-end biterror rate (BER), multiple access channel (MAC), physical-layer
network coding (PNC), outage capacity and probability.
15 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
INFER THE IDENTITY OF MALICIOUS NODES IN MANETS N.VELUTHAMBI(Assistant Prof. ECE Dept.)
1.R.BHUVANESHWARI , 2.JOSHI NEELAM ,3.S.KOWSALYA, 4.M.NAVEENA,
UG STUDENTS,NETWORK SECURITY, DEPTMENT OF [ECE],
VIVEKANANDHA COLLEGE OF TECHNOLOGY FOR WOMEN
Abstract- We consider a scenario where nodes in a MANET disseminate data chunks using rateless codes. Any node is able to
successfully decode any chunk by collecting enough coded blocks from several other nodes without any coordination. We
consider the problem of identifying malicious nodes that launch a pollution attack by deliberately modifying the payload of
coded blocks before transmitting. It follows that the original chunk can only be obtained if there are no malicious nodes among
the chunk providers. In this paper we propose SIEVE, a fully distributed technique to infer the identity of malicious nodes. A
node creates what we termed a check whenever a chunk is decoded; a check is a pair composed of the set of other nodes that
provided coded blocks used to decode the chunk (the chunk uploaders) and a flag indicating whether the chunk is corrupted or
not. SIEVE exploits rateless codes to detect chunk integrity and belief propagation to infer the identity of malicious nodes. it
periodically runs the belief propagation algorithm on its factor graph to infer the probability of other nodes being malicious. We
show by running detailed simulations using ns-3 that SIEVE is very accurate and robust under several attack scenarios and
deceiving actions. We discuss how the topological properties of the factor graph impacts SIEVE performance and show that
nodes speed in the MANET plays a role on the identification accuracy. Furthermore, an interesting trade-off between coding
efficiency and SIEVE accuracy, completeness, and reactivity is discovered. We also show that SIEVE is efficient requiring low
computational, memory, and communication resources.
Index Terms—MANET, rateless codes,belief propagation, pollution attack, malicious node identification, statistical inference
16 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
MULTIPURPOSE SMART CARD USING ADVANCED ENCRYPTION STANDARD
ALGORITHM
Nusrath A
Dept of EEE, Nehru Institute of Engineering and Technology, Coimbatore.
Abstract: Smart card is one of the greatest achievements in the world of information technology. Smart cards have many
applications such as health, ID verification and access control, electronic purse card, banking card, payphone card, passport
card and license card. Since, there are many kinds of smart cards, it is difficult to carry and protect them. Losing one card
means losing a lot of important information. As everyone knows, carrying and protecting one smart card is easier and more
comfortable than carrying two or more smart cards. Multipurpose smart card is a smart card with many different applications in
one smart card. Multipurpose smart card would be giving all services and making data processing and data transfer more
efficient and secure. We choose three most important cards such as health card, aadhaar cards and passport cards to be
combined in one smart card and find an encryption method to make it enough secure. It should also be efficient in transferring
information. The advanced encryption standard algorithm should be effective encryption system for these three applications in a
multipurpose smart card.
Keywords: AES, multipurpose smart card
17 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A STUDY ON WEB MINING AND PROPOSED A NEW APPROACH TO ELIMINATE THE
FLAWS IN WEB MINING
D.VINU PRIYA,
UG SCHLOR, COMPUTER SCIENCE AND ENGINEERING,SNS COLLEGE OF TECHNOLOGY, COIMBATORE
ABSTRACT: Web Mining is a Data Mining technique used to make the web more useful and more profitable and to increase
the efficiency of our interaction with the web .There are different classification of Web Mining .It has many advantages in web
mining and there are some flaws. To make the web mining even more effective we have come with a new proposed
technique in one of the serious flaw presents in this Web Mining.
Keywords – Content Mining, Structure Mining, HITS, Page Rank, Usage Mining
A Food Recognition System for Diabetic Patients Based on an
18 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Optimized Bag-of-Features Model
Divya.S , S.Ganeshmoorthy
1Final year, 2Assistant Professor,
Department of MCA,
Nehru Institute of Engineering & Technology,
Abstract--Computer vision-based food recognition could be used to estimate a meal’s carbohydrate content for diabetic
patients. It proposes a methodology for automatic food recognition, based on the bag-of-features model. An extensive technical
investigation was conducted for the identification and optimization of the best performing components involved in the Bag-of-
features architecture and also the estimation of the corresponding parameters. A visual dataset with nearly 5000 food images
was created and organized into eleven classes for the design and evaluation of the prototype system. The optimized system
computes dense local features by using the scale-invariant feature transform on the Hue Saturation Value color space, builds a
visual dictionary of 10000 visual words by using the hierarchical k-means clustering and finally classifies the food images with
a linear support vector machine classifier. The system achieves 78% of the classification accuracy, thus proving the feasibility
of the proposed approach in a very challenging image dataset.
KEYWORD:-Bag-Of-Feature(BOF) Model,Key point extraction,Local feature description,Learning the visual
dictionary,Descriptor quantization andSupport vector machine (SVM) classifier.
19 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
MANET SECURITY BY LOCATION HIDING AND GROUP SIGNATURE
G.Aiswarya1,.CM.Jasna2, S.Ganesh moorthy3
Department of MCA,
Nehru institute of engineering & technology
Coimbatore.
ABSTRACT: Protection and security are the important and relevant aspect in network especially in mobile Ad-hoc network. One of
the most important challenges in mobile Ad-hoc network is secure communication, there is no central authority for controlling the
network, to provide secure authentication. Asymmetric cryptographic methods are introduced, but in MANET there are some issues
occurred due to the design of ALERT. To solve this problem we introduce group signature and server management mechanism. We
construct a MANET map based on the location of nodes. According to this map the nodes will construct to each other. To provide
node authentication: (anonymity, integration) ALERT use advanced cryptographic mechanism and it also block some insider
attacking.
KEYWORDS: group signature, alert, key server management, Ad-Hoc
20 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
AN ADAPTIVE AND INTELLIGENT E-LEARNING ENVIRONMENT USING FUZZY LOGIC
Karthikeyan.D
Final year
Department of MCA,
Nehru Institute of Engineering & Technology,
Coimbatore
S.Ganeshmoorthy
Assistant Professor,
Department of MCA
Nehru Institute of Engineering & Technology,
Coimbatore
Abstract: A major issue of great concern in student modeling is the inherent uncertainty that exist due to
lack of sufficient information with high degree of certainty to build this model. The proposed system
presents a novel approach which is a web-based education system that performs individualized instruction
on the domain of programming languages is presented. This approach is fully implemented and evaluated
in an educational application module, called Fuzzy Knowledge and Preference Based E earning
(FuzKPBE). This also tracks the events and preferences of the users before finding the data. In particular,
FuzKPBE Performs user modeling by dynamically identifying and updating a student’s knowledge level of
all the concepts of the domain knowledge. The operation of FuzKPBE is based on Fuzzy clustering by
Local Approximation of MEmberships (FLAME ) that are used to represent the dependences among the
domain concepts. FuzKPBE uses fuzzy sets to represent a student’s knowledge level as a subset of the
domain knowledge. Thus, it combines fuzzy theory with the overlay model. Moreover, it employs a novel
inference mechanism that dynamically updates user stereotypes using fuzzy sets. It should be noted that the
overlay model and stereotypes constitute two widely used methods for user modeling.
Key words: Fuzzy Logic, FLAME Algorithm, Fuzzy Cognitive Maps (FCMs).
21 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A Control Strategy for Grid Connected Doubly Fed Induction Wind Generator
During The Grid Fault
R.Jayakumar1, N.lakshmipriya 2
1Scholar (PG), Jay Shri Ram Group of Institutions, Tirupur, Tamilnadu, India
2Assistant Professor, Jay Shri Ram Group of Institutions, Tirupur, Tamilnadu, India
ABSTRACT: The Neuro fuzzy logic control algorithm is an efficient control strategy to improve the
fault ride of a grid connected- doubly fed induction generator. Actual wind profile, grid code and generator
characteristics have been considered as inputs for the simulation in this study. The proposed control
strategy, find out the torque and current ripple without using any hardware and hence power loss is
drastically reduced. Previously Crowbar arrangement systems are used to protect the rotor side converter at
the grid fault occurrence. This arrangement of crowbar do not sufficient. The connection of crowbar causes
change in the behavior of DFIG. During the crow bar connection, DFIG acts as a squirrel cage machine
then it absorbs the reactive power from the grid. To overcome the drawback of existing system, we move to
Neuro-fuzzy control system .
Index terms-Doubly fed induction generator,fuzzy control,neuro fuzzy control algorithm,low voltage ride
through(LVRT),power systems faults,wind power generation.
22 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A new method for the detection of melanocytic skin lesions
Navya P.V1, Shiny P.K2
1,2Nehru College of Engineering and Research Centre,Thrissur, India
Abstract— Skin cancer is the cancer of the cells in the outermost layer of skin, called epidermis.
Melanoma is one of the aggressive type of skin cancer. Due to the advanced technology in skin imaging
and image processing techniques, computer aided diagnosis has been increased. Due to the costs for
dermatologists to screen every patient, there is a need for an automated system to assess a patient’s risk of
melanoma using images of their skin lesions captured using a standard digital camera. This paper presents a
novel approach for the accurate segmentation of melanocytic skin lesion. Accuracy, specificity and
sensitivity are also determined to evaluate the performance of this algorithm. Experimental results shows
that this method can perform well in all the three metrics.
Index Terms—Dermatoscopy, Melanoma, Skin cancer, Segmentation, Texture
23 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A SUPERVISEDCLASSIFICATION FOR RETINAL BLOOD VESSEL
SEGMENTATION
N.LAVANYA1, N.NANDINI2
BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM
[email protected], [email protected]
ABSTRACT--A supervised method is proposed for automated segmentation of vessels in fundus images of
retina. This method is used to detect the retinal diseases by extracting the retinal vasculature utilizing 9-D
feature vector based on orientation analysis of gradient vector field, morphological transformation, line
strength measures, and Gabor filter responses. The feature vector encodes information to handle the healthy
and pathological retinal image. Each pixel in the retinal image is characterized by a vector in 9-D feature
space and those pixels are classified using Artificial Neural Network classifiers like MLP, RBF, and SVM
the performance is evaluated in detail. In this study, we have analyzed the various methodologies for
detecting the abnormalities in retinal images automatically along with their merits and demerits and
proposed the new framework for detection of abnormalities.
Keywords: Gradient vector, Morphological operation, Gabor filter, Line strength, MLP, RBF, SVM
24 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
An Adjustable Speed Cascaded H-bridge Multilevel Inverter Fed BLDC Motor
Drive
Arunkumar1, Thangavel2
1PG Scholar, Dept of EEE, K.S.Rangasamy College of Technology,Tiruchengode, Tamil Nadu.
2HOD,Dept of EEE, K.S.Rangasamy College of Technology, Tiruchengode, Tamil Nadu.
Abstract— This paper presents an adjustable speed BLDC motor drive powered with the help of PI
controller based cascaded H-bridge multi-level inverter topology. In recent years BLDC motors are the
research hotspot in speed precision and household applications due to its high reliability, fast dynamic
response, compact size, low maintenance, etc., The performance of the motor drive system is evaluated
with the help of proportional integral (PI) controller. The five level cascaded H-bridge multilevel inverter
fed BLDC motor is designed in MATLAB/Simulink environment. The dynamic characteristics of the
brushless DC motor such as speed, torque, current and voltage of the inverter components are observed and
analyzed using the developed MATLAB model. The simulation results show that the PI based speed
controller eliminate torque ripples and provides fast speed response. The developed model has the ability to
learn instantaneously and adapt its own controller parameters based on disturbances with elimination of
steady state error, reduction of ripples in electromagnetic torque and minimum amount of harmonics in
stator current with low THD.
Index Terms—Brushless DC Motor (BLDC), Proportional Integral Control (PI), Multilevel Inverter
(MLI), Speed control.
25 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
AUTOSAR: Automotive Open System Architecture
Sunil Jacob1, Vinoj P.G2, Neethu .V3
1,2,3VLSI and Embedded System, MG University, Ernakulam, Kerala
Abstract—With the increased use of Electronic Control Units (ECUs) in the automotive industry, the system creation
and integration becomes progressively more complex. In order to manage this issue, the AUTomotive Open System
Architecture (AUTOSAR) was initiated by several of the larger automotive companies and suppliers. Their goal was
to create an architecture which will increase the reusability of software, integration of solutions from multiple
suppliers and improve scalability.
Keywords— OEM,ECCU,EA.
26 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGNING OF HYBRID MPPT FOR POLY CRYSTALLINE SILICON PANEL
FOR INDIAN CONDITION
Udhayavinodhini A1, Anbarasu P2, Suresh G3
1PG Student, Electrical and Electronics Dept, Sri Eshwar College Of Engineering, Coimbatore, India
2,3Assistant Professor, Electrical and Electronics Dept, Sri Eshwar College Of Engineering, Coimbatore,
India
Abstract— The energy demand is increasing nowadays and the non- renewable energies are producing high
environmental hazards and its reduced by the renewable energy resources. In solar energy converts
electrical energy which help of photo voltaic (PV) generation. The solar energy efficacy, reduced because
of climatic change, so need to track the maximum power point of PV. The maximum power point tracking
(MPPT) methods like perturb-and-observe (P&O) method is used to track only the first local maximum
point (LMP) the progress. MPPT methods based on Fire Fly Algorithm (FA) used to track the global
maximum point (GMP). But the problem associated with the FA algorithm is to produce long time for
searching the LMP. This paper reports a hybrid method, which combines P&O and FA methods. First, the
P&O method is used to find the local maximum point. Then, starting from that point on, the FA method is
used to search the GMP. The advantage of the proposed the time that is required for convergence improved.
Keywords— Photovoltaic (PV), Maximum Power Point Tracking (MPPT), Fire Fly (FA), Perturb &
Observe (P&O).
27 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DETECTION OF DRINKING WATER EXPLOITATION
B.Vijayamanjari1, K.Revathi2, M.Pushpa3, A.Abinaya4
1,2,3,4Avinashilingam Institute for Home Science and Higher Education for Women-University, Coimbatore.
Abstract— The fast growing of the broad urban residential areas influences the expansion as well as the
sophistication of the present water supply facilities. Along with this some problems are recognized in the
water supply channels such as leakages, tapping water illegally by making use of suction pumps of ½ HP to
1 HP pump to suck the water directly from the channel of their home street. This results in insufficient
water per person. Our proposed system consists of Electronic Sensor Unit (ESU) and Remote Terminal
Unit (RTU) including the components RF- module, serial convertor, Personal Computer (PC) system helps
us the best way to detect the water theft process. The theft of water can be best monitored by the flow
variations calculated by the flow sensors mounted on the pipeline channels. PC system is used to display
the theft detected areas. This system enables the user to get a high operation safety of the network and to
optimize the water distribution procedures.
Keywords— Microcontroller 16F887A, RF- module 2.4 GHz,CP2102 Usb to Serial Convertor, Water Flow
Sensor
28 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
EMBEDDED BASED SMART GAS CYLINDER USING GSM TECHNOLOGY
A.Chitra1, D.Durgadevi2, N.Keerthana3, R.Keerthana4, P.Arunkumar5
1,2,3,4 UG Student, Dept., of ECE, Vivekanandha College Of Technology for Women, Namakkal, India.
5Assistant Professor, Dept., of ECE, Vivekanandha College of Technology for Women, Namakkal, India.
ABSTRACT: The design of a wireless LPG leakage monitoring system is proposed for home safety. This
system detects the leakage of the LPG and the system will turn-off the power supply, while activating the
alarm. The additional advantage of the system is that it continuously monitors the level of the LPG present in
the cylinder using load sensor and if the gas level reaches below the threshold limit of gas around 2kg so that
the user can replace the old cylinder with new in time and automatically books the cylinder using a GSM
module .The device ensures safety and prevents suffocation and explosion due to gas leakage. This project is
implemented using PIC microcontroller and simulated using Keil software.
Keywords: LPG, gas cylinder monitoring, gas leakage detection and prevention, GSM.
29 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Energy Conservation and Generation by Solar-Mill
Manoj Prabakar Sundaram
B.E.Mechatronics, Hindusthan college of Engineering and Technology,Coimbatore.
Abstract- Nowadays, all the countries need to extend their industrial sector to a wider area. Whatever the
source as well as constructions are available, energy is necessary to give life for these industries. With the
advancement of technology, there is a lot of energy crisis. This crisis occurs due to transportation of power
supply, eddy current laws and their factors, etc.More power loss occurs due to power transmission. The
renewable energy resource gives a little support for electrical energy as a backbone to solve energy crisis.
It’s time to convert the renewable energy sources to hybrid energy sources which are nothing but the
combination of two or more renewable energy resources. This increases the efficiency of renewable energy
resources.
But there is still energy loss in renewable energy sources. Hence the solution for this only hybrid
technology which leads the way eco-friendly.
Index terms- Concept of hybrid technology, about energy crisis, present day use of renewable energy
resources, employment of renewable energy resources, working process, employment of renewable energy
resources, advantage.
30 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Energy Conservation and Generation by Solar-Mill
Manoj Prabakar Sundaram
B.E.Mechatronics, Hindusthan college of Engineering and Technology,Coimbatore.
Abstract- Nowadays, all the countries need to extend their industrial sector to a wider area. Whatever the
source as well as constructions are available, energy is necessary to give life for these industries. With the
advancement of technology, there is a lot of energy crisis. This crisis occurs due to transportation of power
supply, eddy current laws and their factors, etc.More power loss occurs due to power transmission. The
renewable energy resource gives a little support for electrical energy as a backbone to solve energy crisis.
It’s time to convert the renewable energy sources to hybrid energy sources which are nothing but the
combination of two or more renewable energy resources. This increases the efficiency of renewable energy
resources.
But there is still energy loss in renewable energy sources. Hence the solution for this only hybrid
technology which leads the way eco-friendly.
Index terms- Concept of hybrid technology, about energy crisis, present day use of renewable energy
resources, employment of renewable energy resources, working process, employment of renewable energy
resources, advantage.
31 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
GSM Based Automatic Street Light Controlling System
Prathap.S1,Archana.R #1,Deepa.R #2,Gomathi.A #3,Rajalaksmi.D#4
1Assistant Professor ,Department Of ECE , N.S College Of Engineering & Technology, Theni.
2,3,4Department Of ECE, N.S College Of Engineering & Technology, Theni.
Abstract: GSM based remote control automatic street light system is smart and provides a safe night time
environment for all road users including pedestrians. . The automatic street light system is mainly decided
on the combination of sensors and GSM technology. It also discusses an intelligent system that takes
automatic decisions for ON/OFF/ considering movement of vehicle or pedestrians and also surrounding
light intensity. An automatic streetlight system is designed with the help of GSM modules which can be
help in detection of fault pedestrian and also surrounding light intensity. An automatic streetlight system is
designed with the help of lights and control it.
Keywords—GSM, sensors, automatic, lighting system,control system.
32 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
HIGH IMPEDANCE FAULT DETECTION METHODOLOGY USING
DISCRETE WAVELET TRANSFORM
Veerapandiyan V1, Mary D2, Vignesh R3
1M.E – Power System, GCT, Coimbatore
2Professor, GCT,Coimbatore.
3M.E- PED, VIT, Chennai.
Abstract: This paper proposes a new technique, based on the application of discrete wavelet transform
(DWT) for detecting high impedance faults (HIF) in the electrical power system networks. The phase
current waveforms during normal and fault conditions are decomposed using DWT which converts time
domain current signals into time-frequency domain current signals. The features extracted using DWT
during high impedance fault conditions and other power system disturbances helps to discriminate the high
impedance faults in the power system networks. The proposed technique is implemented in a simple MV
network and in a feeder network to discriminate high impedance faults from other faults. The results are
validated using Simpower System in MATLAB.
Keywords: Discrete wavelet transform (DWT), High impedance fault (HIF).
33 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
HVDC Transmission Using Voltage Source Converters (VSC)
M.Karthika,V.Priyanga
K.S.Rangasamy College of Technology
ABSTRACT: Rapid developments in the field of power electronic devices with turn off capability like insulated
gate bipolar transistors (IGBT) and gate turn off transistors (GTO), makes the voltage source converters (VSC)
getting more and more attractive for High voltage direct current transmission (HVDC).This new innovative
technology provides substantial technical and economical advantages for direct applications compared to
conventional HVDC transmission systems based on thyristor technology. VSC Application for HVDC systems of
high power rating (up to 200MW) which are currently in discussion for several projects are mentioned. The
underlying technology of VSC based HVDC systems, its Characteristics and the working principle of VSC based
HVDC system are also presented. This paper concludes with a brief set of guidelines for choosing VSC based
HVDC systems in today’s electricity system development
34 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Implementation of Automatic Meter Reading Using GSM
Aswatha.R1 , Mohana.V2 , Santhiya.R3 , Hasini Sri.N4
Bachelor of Engineering, Department of ECE, Avinashilingam University, Coimbatore.
Abstract: This paper describes the study of automatic meter reading (AMR) using Global System for Mobile
communication (GSM). Automatic meter reading is used for remote collection of consumed units of electricity and
water. It replaces the traditional system in which a person needs to visit each and every consumer place and
calculate the consumption amount. The consumed units and the amount are send to each individual through GSM.
The proposed system also detects and stops the over consumption of water in addition to the supplied quantity which
is illegal. This system can be used to stop the supply if there is a delay in payment of bills. Greater accuracy and
stability can be maintained in this system. It is possible to access remote areas as it uses wireless technology.
Keywords: Global System for Mobile communication (GSM)
35 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
INTEGRATING RENEWABLE ENERGY BASED POWER BALANCING SYSTEM
FOR GRID TIED APPLICATIONS
1Mr.N.Rajesh,2Ms.B.Sajitha, 1PG Scholar, Dept of EEE, SNS College of Engineering, Coimbatore.
2Assistant Professor, Dept of EEE, SNS College of Engineering, Coimbatore.
Abstract—At present scenario, renewable energy sources are needed to meet the energy demand. They also mitigate
environment pollution problems. The shortage of electrical energy demand can be meeting with renewable energy
resources. A wind turbine (WT) and photovoltaic (PV) solar panels are primary energy sources. Grid connected
renewable energy source like wind energy and solar energy are used to connect the hybrid system. Power electronics
converters are used as interfacing device between hybrid system (WT & PV) and the utility grid. These converters
are commonly based on a voltage source inverter (VSI) connected to the supply network. Grid side current control
PWM technique is applied to the voltage source inverter which reduces THD value to less than 1%. Power balancing
under heavy loaded conditions is also evaluated. The power factor correction is also determined. The simulation of
power balancing conditions, total harmonic distortion (THD) and power factor correction (PFC) are studied with
MATLAB Simulink.
Keywords— Energy management system, energy, Storage system, hybrid system, renewable energies, power
balancing conditions.
36 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Modified Step-Up or Step-Down DC-AC Converter without Intermediate Power Stage
Sreelakshmy Nair1, K.Vinoth Kumar2,
Dept of Electrical & Electronics Engineering, Karunya University ,Coimbatore.
Abstract—This paper introduces a new dc–ac converter with the feature that it produces an output voltage higher
or lower than the input dc voltage without an intermediate power stage or transformers. This inverter is intended to
be used in UPS design whenever an AC voltage larger than DC link voltage is needed,with no need of second power
stage or transformers. The current ripple analysis is also done. In buck inverter the instantaneous average output
voltage is always lower than the input voltage. The main objective of this paper is to analyze the circuit to get the
output voltage lower or higher than the input voltage with corresponding duty cycle. By evaluating the simulation
results inverter produces higher or lower voltage depends on the duty cycle.
IndexTerms—DC-AC converter, switching cell
37 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Multilevel Inverter Design with Anti Islanding Protection
S.Deepika1, B.Hemananth2, R.Hariharan3 1PG Student, Sri Eshwar College of Engineering, Coimbatore.
2,3Assistant Professor, Sri Eshwar College of Engineering, Coimbatore.
Abstract— Recently, photovoltaic (PV) power plants have attracted great attention, where medium-voltage grid
connection (typically 6–36 kV) is essential for efficient power transmission and distribution. A power frequency
transformer operating at 50 or 60 Hz will generally be used to step up the traditional inverter’s low output voltage
(usually ≤400 V) to the medium-voltage level. For the effective use of solar power generated, it should be connected
to grid. The modular multilevel cascaded (MMC) inverter topology is considered as a possible solution for grid
connection of inverters. Because of the heavy weight and large size of the power frequency transformer, the PV
inverter system is expensive and complex for installation and maintenance. As a different approach to achieve a
compact and light weight direct grid connection, this paper proposes a three phase PV inverter system with
transformerless concept. A common magnetic link is employed to interconnect PV arrays to grid. The elimination of
the line filter and step-up transformer from the traditional system will enable large cost savings in terms of the
installation, running and maintenance of the PV power plants. One problem with Distributed Generators (DG) is an
unwanted islanding phenomenon. This condition can be dangerous to grid workers who may not realize that the load
is still powered even though there is no power from the grid. This paper proposes a new active islanding detection
method based on impedance measurement which is a cost effective, simple, and effective method to prevent
islanding of grid-connected inverters.
Keywords— Common magnetic link, Modular multilevel cascaded inverter, Medium voltage grid, Power frequency
transformer, PV inverter
38 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
AUTOMATED TOLLGATE PAYMENT WITH REMOTE VEHICLE MONITORING
AND RFID BASED SECURITY SYSTEM
Praveen Kumar S G1, Muniyasamy I 2, Suresh Kumar R3, Suresh K4 1,2,3,4 UG Scholar, Karpagam Institute of Technology,Coimbatore-641105
Abstract: Time and efficiency are a matter of priority in present day. There are several advancements in the field of
automobiles for safety and security purposes. This paper proposes few ideas regarding the same. The RFID enabled
vehicle ignition system starts the engine only when a proper license holder, having appropriate RFID tag gets
matched with the system. This paper provides an advanced and efficient method for remote monitoring of vehicle
parameters and enables blocking engines of the poor-conditioned vehicles so as to prevent accidents. An RFID tag is
used to pay at the toll booths which will automatically debit amount from the user account. Future scope of this
project is to enable finger print embedded driving licenses which will be acting as a security key to the vehicles and
monitoring of vehicles, their condition parameters and validation of proofs through ETHERNET.
39 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
MULTIPURPOSE OPERATION MACHINE FOR POULTRY
S.G.Sam Stalney1, A.Kesavan2, P.Ragunathan3, V.Ramachandran4, Atul Harikumar5
1Professor, Dept of Mechanical Engineering, Park College of Engineering and Technology
2,3,4,5 Final Year B.E, Dept of Mechanical Engineering, Park College of Engineering and Technology
ABSTRACT: In earlier days the excretory wastages of hens in the poultry farms was cleaned by employees. Due to
scientific and technological development, those wastages can be disposed by lot of cleaning vehicles. This cleaning
will be carried in the period of every month. But the wastes that are stockpiled over the layers of saw dust and sand
would get to be tightened and hence it needs to scrub every two days. By scrubbing the tightened thick layers into
spongy and squashed form, hygienic health for chickens can be maintained. But still today in India, scrubbing can be
done by employees only by means of manual work. This needs to include the labour cost also into the account of
poultry expenses. Cleaning the layers at every month and disposing those wastes is done by various high cost
equipments. To overcome these difficulties, a design in which the machine is to be automated for performing the
scrubbing operations, as well as cleaning and dispersing the wastes as manures to agricultural fields, with the help of
simple mechanisms and automata. Therefore the poultry waste management can be done.
40 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
PERFORMANCE ANALYSIS OF INTTELLIGENT ENERGY DISTRIBUTION
MANAGEMENT USING PHOTOVOLTAIC SYSTEM Sivakarthi.S, BCA I Year, Bishop Heber College, Trichy.
Abstract- As growing power expenditure is becoming a enormous trouble renewable energy has been highlighted
only just. rotten of fossil fuels and scarcity of electricity generating resources, alternate methods for generating
electricity are highlighted and these methods uses renewable sources like solar power, wind power, tidal energy and
so on. In case of solar panel, energy consumption is not in proper manner. Solar panel tracking system is used to
consume proper energy. Many companies and examine centers study this new sustainable energy, and various
products have appeared to the public. However, this kind of researches concentrates on the fundamental
technologies, and now a management system is needed to manage these technologies to maximize energy efficiency.
The system proposes the smart Energy Distribution Management (iEDM) with PIR sensors to monitor fast changing
environmental variables. Automatic load priority scheduling method has been enhanced.
41 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Performance of an Implantable Electrical Coupled Loop Antenna inside Human Body V.Divyabharathi1,S.Kanmanroja2,B.Mythily3,G.Esaiyarasi4,M.Manikandan5
1,2,3,4,5 Dept of Electronics Communication, Vivekanandha College of Technology for Women
ABSTRACT: Implanted antennas are widely used in hyperthermia and biomedical applications. The antenna needs
to be extremely small while maintaining a permissible Specific Absorption Rate (SAR)and being able to cope with
the detuning effects due to the dielectric properties of human body tissues. Most of the proposed antennas for
implanted application are electrical field antennas such as Planner Inverted-F Antennas (PIFA) and micro-strip patch
antennas. By minimizing the size of an electrical field antenna, the near zone electrical field will increase, resulting
in higher SAR. This work is devoted to design a miniaturized magnetic field antenna to overcome the above
limitations. The proposed electrically coupled loop antenna (ECLA) has high magnetic field and low electric field in
the near zone and therefore, has a small SAR and is less sensitive to detuning effects. ECLA is designed at the
Medical Implanted Communication Service(MICS) bandwidth dimensions of (5*5*3mm3). ECLA has been
simulated inside one-layer human body model, three-layer spherical human head model, human headandhuman
body. From the simulation results, ECLA inside the human body has a 5 MHz{3 dB bandwidth, -14 dB gain, and
radiation efficiency of 0.525%. The 1g average SAR inside the human body for 10mW input power is about 1W/kg
which is 7 times lower than the SAR for a patch antenna of the same size with the same accepted power.
42 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
PIEZOTRANSDUCER GENERATOR ENERGY HARVESTING BIKE VIBRATIONS
M.Arivalagan1, M.Lavanya 2,S.Deepa3 ,B.Suganya4 1 Asst Professor, Electronics and Communication, Nadar Saraswathi College Of Engineering And Technology.
2,3,4 students, Electronics and Communication, Nadar Saraswathi College Of Engineering And Technology.
ABSTRACT:- The process of acquiring the energy surrounds a system and converting it into usable electrical
energy is termed power harvesting. With piezoceramic materials, it is possible to harvest power from vibrating
structures. It has been proven that micro- to milliwatts of power can be generated from vibrating systems. This paper
express transformation of mechanical vibration into electrical energy using piezoelectric material. This paper
presents a model of a piezoelectric transducer, a mechanical vibration spectrum, the simulation of the model,
prototype of the power scavenging circuit, experimental results and its future perspectives.
KEY WORDS: Bike mechanical vibrations, energy harvesting, piezoelectric material, uninterrupted power supplies,
portable device.
43 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
QUASI-Z SOURCE INVERTER FOR PHOTOVOLTAIC POWER GENERATION
SYSTEMS USING VECTOR CONTROL TECHNIQUE V. Sathish kumar 1, N. Sadeesh 2
1Scholar (PG), Jay Shri Ram Group of Institutions, Tirupur, Tamilnadu, India
2Assistant Professor, Jay Shri Ram Group of Institutions, Tirupur, Tamilnadu, India
Abstract: Quasi-Z Source Inverter (QZSI) an enhancement to traditional Z Source Inverter (ZSI). The advantage
of QZSI includes different combinations of: lower component ratings, reduces switching ripples, reduced
component count and simplified control strategies. They can track the PhotoVoltaic (PV) panel maximum power,
control the inverter output power and manage the battery power. In a single stage inverter the voltage boost,
inversion and energy storage are integrated. From the PV panel, QZSI draws a constant current. The QZSI with
battery operation can balance the stochastic fluctuations of PV power injected to the grid/load. It controls the PV
panel output power to maximize energy production. EMI problems and source stress are reduced, compared to the
traditional ZSI. QZSI is suited, when implemented with the Space Vector Pulse Width Modulation (SVPWM)
control techniques for photovoltaic power generation systems and could prove to be highly efficient.
Index Terms: Maximum Power Point Tracking (MPPT), quasi-Z source inverter (qZSI), Space Vector Pulse Width
Modulation (SVPWM)
44 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
SAFETY CAP AND OBSTACLE DETECTION STICK FOR BLIND
M.VishnuPriya1, S.Kannan2, E.SarathRaj3, N.Venkatesh4
1Assistant Professor ,Department Of ECE , N.S College Of Engineering & Technology,Theni. 2,3,4 Department Of ECE, N.S College of Engineering & Technology, Theni.
Abstract- The paper presents a theoretical model and a system concept to provide a smart electronic aid for blind
people. The system is intended to provide overall measures – Artificial vision and object detection .The aim of
overall system provide a low cost and efficient navigation aid for blind with gives a sense of artificial vision by
providing information about the environmental scenario of static and dynamic objects around them. Ultrasonic
sensors are used to calculate distance of the obstacles around the blind person to guide the user towards the available
path. Output is in the form of sound which is near to them.
45 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Segmentationof Fetal Abnormalities using Hybrid Chan-Vese with Level Set Approach
A.T.Renuka1,P.Kiruthika2 1,2 PG student, Dept of ECE, Kongu Engineering College,Erode,Tamil Nadu.
ABSTRACT : Image segmentation is an important step used to obtain the region of interest in medical image processing. The
most widely used segmentation is the region based technique which uses the Active Contour Model(ACM). The normal ACM
which uses an approach of Chan-Vese(CV) and Level Set (LS) approach for detecting Fetal abnormalities. In the proposed work
CV method is modified with respect to the contour smoothening parameters and time step which further improves the algorithm
accuracy for the fetal abnormality detection. Based on the experimental results, the LS segmentation method with the modified
CV model is compared both subjectively and objectively. For objective analysis measures like Dice coefficients, Calculation time
and Hausdorff Distance are used.
Keywords:Chan-Vese model,Level Set method, Modified Chan-Vese model, Dice Coefficients, Hausdorff Distance.
46 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
SINGLE PHASE PV CELL FED H-BRIDGE MULTILEVEL INVERTER WITH
BATTERY BALANCING
B.Shilpa Shree1, R.PremKumar2, K.RajThilak3, 1PG student,Sri Eshwar college of Engineering, Coimbatore
2,3Assistant Professor, Sri Eshwar college of Engineering, Coimbatore
ABSTRACT: The Photo Voltaic (PV) energy system, used in this project, is a very new concept in use, which is
gaining immense popularity due to increasing importance to research on alternative sources of energy over depletion
of the conventional fossil fuels all around the world. The systems which are being developed extract energy from the
sun in the most efficient manner and suit them to the available loads without affecting their performance. In this
project presents a simulation of a single phase PV cell fed h-bridge multilevel inverter with battery balancing. The
input of each individual in-verter is directly connected to a battery. The combination of batteries can be controlled
according to the batteries voltages to implement the battery-balancing function and also harmonic elimination is
done to get minimum THD. Simulation of this single phase multilevel inverter with battery balancing and harmonic
elimination is done using MATLAB/ Simulink. Simulation results show that the battery-balancing discharge
function is achieved to get minimum THD.
47 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Smart Controller Design for Solar-Grid Hybrid System
P.Arulkumaran [1], A.Premkumar [2], P.Sandosh [3]
Sri Manakula Vinayagar Engineering College
Abstract- The integration of small sized standalone solar systems to the grid is technically complicated resulting into expensive operation which is not affordable to all. This paper presents a smart controller which uses Digital
Signal Processing (DSP) for cost effective operation of solar-grid system. The hybrid system is capable of reducing
the size and deploys the operation strategy so as to effectively use the solar power. The synchronization is not necessary as this method can be effectively altered by the use of load discretization. This gives cheap, efficient,
reliable and cost effective operation. The system has been tested for the 120 Watt solar panel with the battery backup storage and its effectiveness is observed. The battery backup is made to operate during the cutoff of Grid or
Grid and Solar supply. The performance of the system over the wide range of operation and transient states are
assured by practical observation and modification.
Keywords- Hybrid system, Smart Controller, Solar-Grid hybrid system, Discretization of energy, Digital Signal
Processing based power controller.
48 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Studyon Maximum Power Point Tracking Technique in PV System using ANN
S.DaisonStallon1,M.Mohammed kasim2 ,k.Nagarajan3 ,P.kumar4
1,2,3,4Asst professor, Dept of ECE, Nehru Institute of Engineering and Technology,Coimbator.
Abstract: Photovoltaic (PV) offers an environmental friendly source of electricity, which is however still relatively expensive
today. The maximum power point tracking (MPPT) of the PV output for all sunshine condition is a key to keep the output power
per unit cost low for successful PV condition.However, highinitial cost and low energy conversion efficiency are the two major
obstacles for the use of PV systems. To improve the energy efficiency, it is important to operate PV system always at its
maximum power point. So for, lot of research is carried out and many papers were published to propose various methods for
obtaining maximum power point.This paper presents the complete study of most popular algorithms used in PV System.
Keywords: Maximum power point tracking (MPPT), Photo-voltaic(PV).
49 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Ultrasonic and Pyroelectric Sensory Fusion System for Indoor Human/ Robot Localization
and Monitoring
Azhar K H,
Abstract- Indoor localization and monitoring system is a key factor in various emerging fields. Localization aware
computing has greater advantages in defence sectors. The technology is used all over in places where security
problems are a major issue. Localization and monitoring in a real time remote environment is a strenuous process.
Although there are several monitoring systems and approaches, issues and problem regarding their shortcomings
remains consistent. The most widely used system includes the use of a pyroelectric sensor. The pyroelectric sensory
system alone provides less accurate information of human localization and is restricted when there are multiple
targets. This system again posses limited accuracy. In this paper a fusion system module of both ultrasonic and
pyroelectric sensors are used. The system is experimentally demonstrated, this methods successfully tracked multiple
targets in a real-time environment. This fusion method possesses good accuracy and efficiency. With this accurate
localization mechanism for indoor environment, the provision of appropriate services for people can be realized,
including medical needs.
Index Terms- Ultrasonic sensor, Pyroelectric sensor, Real time system, Multiple targets.
50 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
AUTOMATIC RATION MATERIAL DISTRIBUTION USING RFID AND GSM
Ragapriya S,
EEE Dept,Karpagam Institute of Technology,Coimbatore
Mail ID: [email protected]
ABSTRACT: Now-a-days ration card is mandatory for every home and is used in various fields such as family
member’s details, to get gas connection, for address proof and for various purposes. We use ration card to buy
various materials (sugar, rice, oil, kerosene, etc.) from the ration shops. But this system has two draw backs, first
one is that the weight of the material may be inaccurate due to human mistakes and secondly, if not buying the
materials at the end of the month, they will sell to others without any intimation to the government and the
concerned customers. This paper, proposes an Automatic Ration Materials Distribution Based on GSM (Global
System for Mobile) and RFID (Radio Frequency Identification) technology instead of ration cards. To get the
materials in ration shops, we need to show the RFID tag into the RFID reader, and then the controller checks the
customer codes and details of amount in the card. After verification, these systems will show the amount details.
Then the customer have to enter the required materials by using keyboard, after receiving information about the
materials the controller will send the information to government office and to the customer through GSM
technology. This system provides the materials automatically without the help of humans.
51 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
32 BIT FUSED FLOATING POINT ADDITION AND DOT PRODUCT
UNIT
Tamil Selvi.T[1], Gomathi.A[2]
[1]Assistant professor, N.S.College Of Engineering And Technology,Theni,India.
[2]UG Scholor, N.S.College Of Engineering And Technology,Theni,India.
[1][email protected], [2][email protected]
Abstract:-This paper describes two fused floating-point operations and it’s applied to the fast Fourier transform
(FFT) processors. The fused operations are a two-term dot product and an add-subtract unit. It use “butterfly”
operations that consist of additions, subtractions and multiplication complex valued data. Both radix-2 and radix-4
butterflies are implemented efficiently with the two fused floating-point operations. It uses a high performance
standard cell technology. The numerical results of the fused implementations are slightly more accurate, since they
used fewer rounding operations.
Index Terms—Floating-point arithmetic, fused floating-point operations, fast Fourier transform, Radix-2 FFT
butterfly, Fused two term dot product
52 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
An Effective and Robust Technique for the Binarization of
Degraded Document Images
K.AJITHA ME COMMUNICATION SYSTEMS
PET ENGINEERING COLLEGE
Abstract-the method of segmentation in the image binarization technique is the major technique used for the
separation of pixel values into dual collections, black as foreground and white as background. The degraded images
of a document are segmented by using the image binarization technique in order to acquire the clear images exact to
that of the original images of documents. Thresholding process is the well-known technique used for the binarization
of the document images. Global and local thresholding technique are the two important types of the thresholding
process. Earlier many techniques have been proposed for this binary documentation process. Thus this work presents
a survey about the document image binarization techniques.
53 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
An MRI Brain Tumor Image Classification Based on
Neural Network
M.Queen B.E(M.E)
PG scholar
PET Engineering College
E-mail: [email protected]
T.M Babi Mol M.E
Assistant Professor
PET Engineering College
Abstract-Brain tumor classification is one of the major problems in diagnosing the tumor at early stage. Although
numerous tumor classification methods have been presented enhanced tumor classification is still challenging
because brain tumor MRI images exhibit high diversity in tumor appearance and boundaries. To address this
problem a novel brain tumor classification is proposed based on Neural Networks. Since misclassification occurs
due to high diversity in tumor boundaries. This method automatically classifies the tumor MRI images as benign,
grade1 grade 2 and malignant tumor. The classification of tumor is done mainly based on the knowledge of training
the network. Initially the network is trained with a set of MRI images using Back Propagation algorithm and later
they are tested with a testing image. This method mainly aims to improve the classification accuracy, reduce
computational time and to detect exact tumor location of low grade tumor. A classification accuracy of about 95% is
achieved using GLCM feature extraction technique and neural network.
Index terms: Brain Tumor, GLCM, Neural Network, Back Propagation, MRI.
54 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Optimal Battery Charging in a Solar Powered Rover
C.P.Penela, Mr.R.Nandha kumar.M.E.,(Ph.D)Associate Professor
Department of electronics and communication
Engineering(part time)
Department of electronics and communication
Engineering
Karpagam university Karpagam university
Coimbatore. Coimbatore.
[email protected] [email protected]
Abstract – This paper focus on design and construction of charging battery in rover i.e., optimal charging of
batteries. For charging the battery, the energy is observed from the sunlight as radiation it sensed by light sensor.
Here using two batteries, one battery for charging purpose and the other battery is supplying energy to the rover.
This energy is doing the activities like moving the rover, capturing the image, identifying the object, sensing
temperature and humidity level. If the energy is down in second battery then it switch over to the first battery i.e.,
fully charged and then the second battery is in charging process. For switching the battery, here using voltage
sensor.
Key words- Li–Po battery, mechatronic system, photovoltaic (PV), robotic vehicle, solar tracker
55 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Contact Opportunity Technique for Vehicular
Internet Access on the Go M.Shahina Thasneem S.Priyatharshini
2nd year M.E, Communication systems, Assistant Professor, ECE Department
PET Engineering College,Vallioor. PET Engineering College,Vallioor.
[email protected] [email protected] Abstract —The increasing usage of media enabled handhelds and their integration with the in-vehicle entertainment systems,
resulted in the need for high data-rate services for mobile users on the go. This ever-increasing demand of data is constantly
surpassing what cellular networks can economically support. Large-scale Wireless LANs (WLANs) can provide such a service,
but they are expensive to deploy and maintain. Open WLAN access-points, on the other hand, need no new deployments, but can
offer only opportunistic services, lacking any performance guarantees. In contrast, a carefully planned sparse deployment of
roadside WiFi provides an economically scalable infrastructure with quality of service assurance to mobile users. In this paper, a
new metric called Contact Opportunity, to closely model the quality of data service that a mobile user might experience when
driving through the system is introduced. Then efficient deployment algorithms for minimizing the cost for ensuring a required
level of contact opportunity is presented. We further extend this concept and the deployment techniques to a more intuitive metric
– the average throughput – by taking various dynamic elements into account. Simulations over a real road network and
experimental results show that our approach achieves significantly better cost vs. throughput tradeoff in both the worst case and
average case compared with some commonly used deployment algorithms.
56 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Coalition Formation in Hybrid Wireless
Networks
S.Lisha Selvi,B.E(M.E) T.Agnes Ramena M.E Department of communication system Assistant Professor of ECE
PET Engineering College PET Engineering College
[email protected] [email protected]
Abstract--- Hybrid wireless network (HWN) is an integrated infrastructure that provides seamless services over the
several networks. In Hybrid Wireless Networks where adhoc and infrastructure based networks are used. The objective is
to form a coalition structure by analyzing the behaviour of each node present in the network for improved cooperative
packet delivery. By applying Social Network Analysis (SNA) the computational complexity of coalition formation is
reduced. The markov chain model is formulated to allocate the delivery path for each node present in the network and
the coalition formation done by using voting mechanism. The packet delivery depends on the probability that each node
will help other nodes in the same coalition. Bargaining game method is used to predict the optimum helping probabilities.
For accurate certificate revocation Cluster-based Certificate Revocation with Vindication Capability (CCRVC) is used.
Index Terms-Hybrid wireless networks, cooperative packet delivery, ad hoc network, BS oriented networks
57 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Coalition Formation for Cooperative Packet
Delivery in Hybrid Wireless Networks
S.Muthu Lakshmi (ME), S.Manikandan ME
Department of Communication Systems,
PSN College of Engineering and Technology,
Tirunelveli,India [email protected]
Abstract— Hybrid wireless network (HWN) is an integrated infrastructure that provides seamless services over the
several networks. In Hybrid Wireless Networks where adhoc and infrastructure based networks are used. The
objective is to form a coalition structure by analyzing the behavior of each node present in the network for improved
cooperative packet delivery. By applying Social Network Analysis (SNA) the computational complexity of coalition
formation is reduced. The markov chain model is formulated to allocate the delivery path for each node present in
the network and the coalition formation done by using voting mechanism. The packet delivery depends on the
probability that each node will help other nodes in the same coalition. Bargaining game method is used to predict
the optimum helping probabilities. For accurate certificate revocation Cluster-based Certificate Revocation with
Vindication Capability (CCRVC) is used.
Keywords— Adhoc network, BS oriented networks, Cooperative packet delivery, Hybrid wireless networks, Social
network analysis.
58 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Clustering based Multi Flip flop merging using
Agglomerative Clustering Algorithm
V.Gopi1, R.Sankar2
1Professor, Department of ECE, PSN College of Engineering and Technology, Tirunelveli. 1Email:[email protected]
2M.E (Applied Electronics), PSN College of Engineering and Technology, Tirunelveli. 2Email:[email protected]
Abstract— Multi-bit flip-flop is an effective power-saving implementation methodology by merging single-bit flip-
flops in the design. Using multi-bit flip-flops can reduce clock dynamic power and the total flip-flop area
effectively. In our proposed work, we propose agglomerative clustering algorithm to find the nearest clustering of
flip flops for merging the flip flops According to the experimental results, our algorithm significantly reduces clock
power by 20–30% and the running time is very short. In the largest test case, which contains 1 700 000 flip-flops,
our algorithm only takes about 5 min to replace flip-flops and the power reduction can achieve 21%.
Keywords— Flip flops, Power Efficient, Clock power, merging
59 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DELAY CAPABILITY OF POWERFUL FIXED MOTE FLEXIBLE FILTER LOW
ADAPTATION DELAY C.Rahul Menon1, T.Gini M.E2
1II M.E (Applied Electronics), PSN College of Engineering and Technology, Tirunelveli.
2Email: [email protected]
2Asst. Professor, Department of ECE, PSN College of Engineering and Technology, Tirunelveli.
1Email: [email protected]
ABSTRACT : The filter process mainly used to DSP and DIP real world application. The filter process to remove the
noise in original signal or image. So the filter architecture optimized process, to reduce the filter processing time and
to increase the performance. Adaptive digital filters find wide application in several digital signal processing (DSP)
areas. This paper presents the modified delayed LMS adaptive filter consists of Weight update block with Partial
Product Generator (PPG) to achieve a lower adaptation delay and efficient area, power, delay. To achieve lower
adaptation delay, initially the transpose form LMS adaptive filter is designed but the output contains large delay due
to its inner product process. Here, the pipelining structure is proposed across the time consuming combinational
blocks of the structure to reduce the critical path. From the simulation results, we find that the proposed design n
offers large efficient output comprises the existing output with large complexities.. We use the digital architecture
based VLSI technology to modify the FIR filter architecture. In this architecture, For achieving lower adaptation-
delay and area-delay-power efficient implementation, we use a novel partial product generator and to modify the
efficient architecture for the implementation of a delayed least mean square adaptive filter using FAP algorithm.
And to modify the DFE section. Our proposed work is to modify the filter architecture using FAP Adaptive
algorithm and to reduce the delay unit in filter architecture. This algorithm to reduce the pattern count in the partial
protect generation architecture and adder operator carry selection process. So it consumes low power. This algorithm
used to reduce the path delay and improve the speed compare to proposed algorithm. This FAP algorithm mainly
used to modify the filter architecture block.
60 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DETECTION ON COLOR IMAGE CLASSIFICATION TECHNIQUES FOR
COMPUTING SKIN ULCERS USING KNN CLASSIFIER
C.DHANIYA BRISKILLAL.,B.E.,(M.E),
PG Scholar,
PET Engineering College.
Abstract – In the color image processing methods, the image of dermatological ulcers are analyzed in order to detect the affected
area of the skin. The detection of classification rate focus on the application of feature extraction method that segment, classify
and analyze the tissue composition of skin lesions or ulcers. Indexing of skin ulcer images was performed based on the statistical
texture features derived from the RGB color components. This literature assesses the high level methology for dermatological
ulcer image classifier. The classifiers analyzed here are used for labeling the images by the dermatologist used in training and
testing of the classifier. The classification performance rate, coverage area of the affected skin is analyzed based on the choice of
different algorithms. Classifier uses the algorithm to perform attribute or feature selection that generates the candidate subsets of
attributes and evaluate them by using the training and testing schemes, thus creating the computed values of corrected classified
image rate up to 90% and assessed coverage area of affected skin up to 0.82.
IndexTerms: Dermatological ulcers, Classification rate, Feature extraction, Classifiers. Texture features
61 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Efficeient Routing In Mobile Ad Hoc Networks Using
Proactive Source Routing Protocol
E.Nagarajan,
Dept. of Electronics and communication,
PET Engineering College,
Vallioor
Abstract—Opportunistic data forwarding has drawn much attention in the research community of multihop wireless net-working,
with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not
been widely utilized in mobile ad hoc networks (MANETs) is the lack of an efficient lightweight proactive routing scheme with
strong source routing capability. In this paper, we pro-pose a lightweight proactive source routing (PSR) protocol. PSR can
maintain more network topology information than distance vector (DV) routing to facilitate source routing, although it has much
smaller overhead than traditional DV-based protocols [e.g., destination-sequenced DV (DSDV)], link state (LS)-based routing
[e.g., optimized link state routing (OLSR)], and reactive source routing [e.g., dynamic source routing (DSR)]. Our tests using
computer simulation in Network Simulator 2 (ns-2) indicate that the overhead in PSR is only a fraction of the overhead of these
baseline protocols, and PSR yields similar or better data transportation performance than these baseline protocols. Index Terms—Differential update, mobile ad hoc networks (MANETs), opportunistic data forwarding, proactive routing, routing
overhead control, source routing, tree-based routing
62 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
ENERGY EFFICIENT POWER ALLOCATION IN
GREEN COGNITIVE MOBILE NETWORKS
POWERED BY THE SMART GRID
Suganya B.E(M.E)
2nd year ME,communication systems
PET Engineering College,Vallioor
C.Jaya suriya M.E
Assistant professor, ECE department
PET Engineering College, Vallioor
Abstract — The explosive growth of high data rate in wireless networks has resulted in a tremendous increase in energy
consumption. Energy efficiency in wireless networks has drawn increasing attention of the research communities. High energy
consumption has a significant impact on the environment due to the associated CO2 emission. Moreover energy costs can account
for as much as half of a mobile service provider’s annual operating expenses. Energy consumption of a cellular network is
becoming important interms of both operational costs and environmental impacts. However, most existing works do not consider
the power grid, which provides electricity to mobile networks. Currently, the power grid is experiencing a significant shift from
the traditional grid to the smart grid. In the smart grid environment, only considering energy efficiency may not be sufficient
since the dynamics of the smart grid will have significant impacts on mobile networks. In this paper, green cognitive mobile
networks with small in the smart grid environment is studied. The problems of electricity price decision, energy-efficient power
allocation, and interference management is formulated as a three-stage Stackelberg game. The proposed stackelberg game is
analyzed using a backward induction method.
Index Terms — Energy efficiency, smart grid, small cells, cognitive mobile network.
63 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
NETWORK ROUTING MODEL FOR DATA PERSISTENCE UNDER CONGESTION IN
WIRELESS SENSOR NETWORK P.DAFNI #1, M.NANDHINII#2, #3 G.GURU PRASATH
1, 2,3 UG Students, Department of ECE, Coimbatore Institute of Engineering and Technology,
email: [email protected],[email protected],[email protected]
ABSTRACT - Sensor networks come in a wide variety of forms, covering different geographical areas,
being sparsely or densely deployed, using devices with a variety of energy constraints and implementing
an assortment of sensing applications. Congestion in Wireless Sensor Network (WSN) can cause missing
packets, low energy efficiency and long delay.Some applications need to transmit large volumes of data
concurrently from several sensors. These applications have different delay and QoS requirements.
Congestion problem is more urgent in such applications. To address this challenge, we propose a novel
which comprises three mechanisms:congestion detection using dual buffer thresholds and weighted buffer
difference ;Flexible Queue Scheduler for packets scheduling; Bottleneck-node-based source sending rate
control scheme. Simulations show that ECODA achieves efficient congestion control and flexible
weighted fairness for different class of traffic. Therefore it leads to higher energy efficiency and better
QoS in terms of throughput, fairness, and delay.
Keywords: Wireless Sensor Network, Dual buffer thresholds, Weighted Buffer Difference, Flexible
Queue scheduler, Bottleneck-node.
64 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
FPGA IMPLEMENTATION OF DATA HIDING IN IMAGE M.SATHYAGEETHA
1 P.G. Scholar, M.E. VLSI DESIGN, Francis Xavier Engineering College, Tirunelveli
L.R.PRIYA 2
2Assistant Professor, Department of ECE, Francis Xavier Engineering College, Tirunelveli
ABSTRACT In this paper proposes, a FPGA Implementation of data hiding in image. Due to the communication and network
development, it has become need to product our data from the unauthorized. Data hiding is a property to hide the
payload (data) in the original image. It is a excellent method to product the original cover image can be recovered
after the data is extract while protecting the image. All previous methods are having some error in image restoration
or data extraction. A selected co-efficient in the payload is embedded into image by replacing the Least Significant
Bit (LSB) of selected co-efficient in the image bit. The co-efficient are shifted left by on bit before replacing the
LSB’s. The image containing the secret data is called encrypted image. The steganography technique is used to get
the image has good embedding capacity and quality. The receiver extracts the image by decrypt the image and data.
Keywords- Field Programmable Gate Array (FPGA), Payload,
65 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Hybrid Technique for Image Inpainting by
Combination of Adaptive Search Region and
Examplar Based Approach
A.BREEZY JOY
M.E COMMUNICATION SYSTEMS
PET ENGINEERING COLLEGE
M. SELVALAKSHMI REVATHY
ASSISTANT PROFESSOR
PET ENGINEERING COLLEGE
Abstract—Inpainting is the process used for filling the missing portion or a damaged part in an image. The missing portion can
be filled by using Examplar based inpainting which looks for the best matching patch with highest priority of the target region.
The image is first downsampled by a factor of 2 or 4. Then examplar based inpainting method is employed. The image quality is
improved by using super resolution algorithm which uses a loopy belief propagation performing a number of iterations of
upsampling. Three methods of inpainting, TM, NLM, NMF are performed. The performance of these three methods are evaluated
using three parameters PSNR, Mean Square Error and Histogram error.
Index Terms—examplar based inpainting, super resolution, loopy belief propagation, highest priority.
66 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Power Optimization Technique Based On Multi-Bit Flip-Flop Design 1L.Lino,2 V.Kulandai Selvan ; 1ME Student, 2assistant professor; Francis college of
Engineering,Tirunelveli ; email: [email protected]
Abstract Reducing power plays a vital role in low power VLSI design. In the VLSI design circuits, clocking is the most
dominating power consuming element. To acquire the optimum power, it is essential to reduce the clocking power.
Hence this paper describes a method for reducing the power consumption by replacing some flip flops with fewer
multi-bit flip-flops. A combination table is used here to store the possible combination of flip-flops, for reducing the
search space and can be merged. This concept is implemented in a simple memory circuit. Our proposed work will
reduce the power by triple the time than that of the conventional system.
67 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Rapid Real Time Face Detection Using PFAD
R.S.Bavitra
PG scholar
PET Engineering College Vallioor
E-mail: [email protected]
Y.R.Packiadhas M.E
Associate Professor
PET Engineering College Vallioor
E-mail: [email protected]
Abstract-- Face detection on general embedded devices is fundamentally different from the conventional approach on personal
computer or consumer digital camera due to the limited computation and power capacity. Numerous applications have been
proposed and investigated on embedded smart cameras, such as intelligent surveillance, human computer interface, person
authentication, human activity analysis, and so on. Among these applications, which are usually involved with humans, face
detection has played a fundamental and first-step role. The resource-limited characteristic gives rise to new challenges for
implementing a real-time video surveillance system with smart cameras. It also has several applications in areas such as content-
based image retrieval, video conferencing, video coding, intelligent human–computer interfaces and crowd surveillance. In this
work, we present the design and implementation of Rapid Real Time Face Detection, is a real-time face detection system
constructed on general embedded devices. It is a hierarchical approach to shift the complex computation to the promising regions.
It consists of five layers: skin detection, AIMD based contour point detection, region formation, filtering and modified V-J
detector. Processing time of this algorithm is low and produced a high detection rate. This framework also strikes a balance
between the detection speed and accuracy. We have implemented this algorithm on notebook, Android phone and our embedded
smart camera platform.
Index terms-- crowd surveillance, human activity analysis, human computer interface, image retrieval, intelligent human–
computer interfaces, video coding and video conferencing.
68 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A COHERENT METHOD FOR WIRELESS SENSOR NETWORK USING
TRAFFIC LOAD CONSTRAINED ROUTING ALGORITHM
S.SATHYA-CIET
M.E-APPLIED ELECTRONICS
ABSTRACT
As the traffic load management is incredibly necessary for the task planning in wireless device networks, this paper
discusses a way to style a good routing rule for wireless device networks with traffic load unnatural.Firstly, internal
structure of a device node in wireless device networks is analyzed. Secondly, a way to style a good traffic load
unnatural routing rule for wireless device networks supported the hybrid multi-hop mode is mentioned. Within the
projected rule, the depth potential field and queue length field are outlined, so we tend to integrate them through
linear combination. Afterwards, we tend to utilize a structure that is created from real numbers to represent the
chromosomes, so succeed the traffic load unnatural routing call with supported the genetic rule. To avoid holdup,
the projected rule will distribute the focused traffic to the obtainable neighbor device nodes. Finally, simulations ar
conducted to form performance. Compared with different existing routing rule, the projected will effectively create
the routing call for wireless device networks while not holdup.
69 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Soil Analysis based on Embedded System
B.Vanitha1 1Department of Electronics and Communication Engineering,
Coimbatore Institute of Engineering and Technology, Narasipuram, Coimbatore, India 1 [email protected]
Abstract - By the application of engineering towards agricultural fields, a cost effective soil analyzing method can
be developed with quick and reliable embedded system which is used to analyze various soil nutrients. Agriculture
productivity mainly depends on soil quality which is dependent on plentiful factors such as soil texture, soil water
holding capacity, soil pH value, Electrical conductivity and soil mineral contents. Here the soil pH value,
temperature and the EC value are measured which gives a lot of information about the physical and chemical
properties of the soil. In this work a microcontroller based system is developed to measure these three parameters of
the soil. The signals from the sensors are conditioned with the help of signal conditioning cards and are interfaced to
microcontroller through inbuilt ADC. Digital readout is used to display the computed results in LCD and further
these results of the soil analysis are conveyed to farmers over mobile phones using GSM technology.
Keywords- Embedded system, pH value, Electrical conductivity, microcontroller, sensors, signal conditioning cards,
ADC, LCD, GSM technology.
70 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
CHANNEL AWARE RELAY AND STATIC NODE PLACEMENT FOR
RELIABLE COMMUNICATION IN WIRELESS SENSOR NETWORKS FOR
PIPELINE INSPECTION.
ADILA NAZIR N1, SHEELA T2
PG, Student, Project Guide, Dept of Electronics and Communication
Dhanalakshmi Srinivasan College of Engineering,
Coimbatore – 641 105
Abstract - Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info.
In this watching system can specially designed as a heterogeneous networks. Every high power relay nodes most
covers minimum 2 low power relay node. If any relay node is unsuccessful within the network, the constellation
can modification mechanically supported the heterogeneous network. The high power relay node is change the
unsuccessful node and sending the condition of pipeline. the benefits are thought-about to be extremely
distributed, improved packet delivery.
71 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
TRUSTWORTHY METHOD TO PREVENT ATTACKS IN MANET
AMRUTHA MOHAN1, K. SIVA KUMAR2
Student, Assistant Professor
Dept of Electronics and Communication Engineering
Dhanalakshmi Srinivasan College of Engineering, Coimbatore
Abstract- In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause
security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply
routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each
proactive and reactive defence design. In region attacks, a node transmits a malicious broadcast informing that it's
the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-
called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim
that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination.
In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a
later time, preventing a trust-based security resolution from detective work its presence within the network. It then
by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is
on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing
technique.
Page | 72
72 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
PREVENTION FROM NODE FAILURE BY SAVING ENERGY OF NODE IN
WIRELESS SENSOR NETOWRKS
ASWATHI S NAIR, E.RAMESH MARIVENDAN
PG, Student- Project Guide : Dept of Electronics and Communication
Dhanalakshmi Srinivasan College of Engineering,
Coimbatore – 641 105
ABSTRACT - The most necessary issue that has to be solved in coming up with an information transmission rule
for wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power-
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary.
Page | 73
73 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
LOW POWER PARADIGM FEATURING PARTIAL BUS SPECIFIC
CLOCK GATING WITH DPL BASED DDFF
Reshmachandran1 Mr.M.Tamilarasu2
1P.G Scholar, Department of Electronics and communication, Dhanalakshmi srinivasan college
of engineering,Coimbatore. 2Assistant Professor, Department of Electronics and communication, Dhanalakshmi srinivasan
college of engineering,Coimbatore. Abstract: - The clock gating enables the clock signals from the CDN (clock distribution network). This technique
activates the clock which is needed for the operation of the circuit. The unnecessary clock signals are not activated
during the clock gating. This saves the dynamic power of the circuit. The auto gated flip-flops which are using
clock gating technique provides only small power consumption. The circuit based on look ahead clock gating is
used to avoid tight timing constraints for each clock pulses. The enabling clock pulses for the derived timing signals
to the gated logic saves the power from the flip-flops. The look ahead technique can also be used for reducing the
delay and the distortions from the circuit for the achievement of the application level. The novel approach we are
going to design is PBSCG (Partial bus specific clock gating) implemented in parallel counter for application level
implementation. This can be adopted for the all sectional view from particular architecture implementation. This
process could be available for the structural level implementation for all the CMOS logic gates for the integrated
chip. This architecture can be designed and verified by using TANNER EDA tool.
Page | 74
74 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
TRUST MANAGEMENT AND EFFECTIVE ROUTING IN
MANETS 1KESIA SALIMON 2B.MATHIVANAN
1PG Student, Department of ECE, Dhanalakshmi Srinivasan College of Engineering, Tamilnadu, India
2Asstt., prof., Department of ECE, Dhanalakshmi Srinivasan College of Engineering, Tamilnadu, India
ABSTRACT - Among the modern wireless networks, wireless sensor network plays a prominent role. Bunch
reduces the general energy consumption. In this paper HEF (High Energy First) bunch protocol is employed. This
protocol provides improved network time period since the energy level of the nodes are considered while choosing
the cluster head. The cluster area is fashioned dynamically and sporadically. The cluster heads are usually having
more resources (generally energy) on comparison with other nodes in the cluster. We tend to propose a globally trust
management theme that enhance security in WSNs. In this trust management scheme, trust model takes 2
methodologies, trust from direct observation methodology and trust from indirect observation method. In direct
observation methodology observer node gets trust value by exploiting theorem reasoning. On the other hand, with
indirect observation trust value is obtained from neighbor nodes of the observer node. The trust value for this
methodology is based on Dempster-Shafer theory. Combining these 2 trust models, we tend to get a lot of correct
trust values that results the effectiveness of our methodology
Page | 75
75 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGN AND ANALYSIS OF NOVEL CURRENT MIRROR
CIRCUIT BASED LEVEL SHIFTER
Majida M A1 Ms J. Yamuna2
1P.G Scholar, Department of Electronics and communication, Dhanlakshmi college of
engineering,Coimbatore. 2Assitant Professor, Department of Electronics and communication, Dhanlakshmi college of
engineering,Coimbatore Abstract: - Demand of handheld device like cellular phones, multimedia devices etc. are increasing and we are
approaching towards portable device having small size which requires large battery life. But power dissipation has
become most important design concern for VLSI circuits and system in low power devices. Level shifter is an
interfacing circuit which can interface low core voltage to high input-output voltage. It can be either low voltage
level or high voltage level. The level shifter allows communication between different modules without adding up
any extra supply pin. This level shifter circuits are uses current mirror and the cross coupled based PMOS and N-
MOS circuits. Here we are going to design the Wilson current mirror circuit and buffer based level shifter. For the
further improvement of power and the delay we are going to design the novel current mirror circuits such as
regulated cascade, large output swing current mirror based level shifter. By the improvement of transistor size we
are going to design the pass transistor logic based Buffer circuit. These circuits are designed and verified by using
the TANNER EDA tools.
Page | 76
76 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
HIGH SPEED ENERGY EFFICIENT AT IDLE SLOTS MAC
LAYER PROTOCOL FOR WIRELESS SENSOR NETWORKS
1ANAGHA A S, 2SHEELA T
1PG STUDENT, Department of ECE, Dhanalakshmi Srinivasan College of Engineering, Tamilnadu, India
2ASSTT. PROF., Department of ECE, Dhanalakshmi Srinivasan College of Engineering, Tamilnadu, India
E-Mail: [email protected]@gmail.com
ABSTRACT - Recent years have witnessed the emergence of WSNs as a replacement information-gathering
paradigm. Among that AN oversize varies of sensors scatter over a police work field and extracts information of
interests by reading real-world phenomena from the physical setting to reduce the data packets unit of measurement
forwarded to the data sink via multi-hop relays among sensors. Routing could be a crucial issue in information
gathering device network, whereas on the alternative hand sleep-wake synchronization is that the key issues for
event detection device networks. To spice up the energy efficiency, sensors functioning supported duty cycle. the
essential mechanism for sleep programming is to select out a sub-set of nodes to be awake throughout a given epoch
whereas the remaining nodes unit of measurement among the sleep state that minimizes power consumption, that the
general energy consumption are reduced. This focuses on sleep programming for High Speed Energy Efficient at
Idle slots are want to speed up the transmission speed of the network.
Page | 77
77 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGN AND ANALYSIS OF HIGH SPEED 8-BIT ADDER CIRCUITS
WITH DYNAMIC AND STATIC POWER REDUCTION
A Neethu Narayanan1 Ms. Deepika V2
1P.G Scholar, Department of Electronics and communication, Dhanalakshmi College Of Engineering,
Coimbatore. 2Assistant Professor, Department of Electronics and communication, Dhanalakshmi college of
Engineering, Coimbatore. Abstract: - Dual Mode Logic (DML) is a logic family that can be switched between static and dynamic modes of
operation according to system requirements. The main DML design challenge is to reduce power consumption
associated with the dynamic mode without sacrificing speed and improve speed in static mode with reduced power
consumption. An ultra-low power consuming high speed 8-bit adder is designed in dual mode logic by incorporating
an efficient design logic called adiabatic logic. Further efforts are taken to reduce static power leakage and improve
speed. DML style is therefore replaced with leakage reduction techniques like Body biasing and Power Gating and
are compared for power and delay. These circuit simulations are done using TANNER EDA version 13 tool.
Page | 78
78 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Conceal Traffic Pattern Discovery through Multipath in
Manet
ABSTRACT- Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that\\\'s the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
RINI K R M THAMILARASU
Student
ME Communication Systems Engineering Anna
University
Assistant Professor
Dept of Electronics and Communication
Engineering
DSCE Coimbatore INDIA DSCE Coimbatore INDIA
Page | 79
79 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGN OF LOW POWER CMOS STARTUP CHARGE PUMP BASED
ON BODY BIASING TECHNIQUE
Juliet Abraham 1, Dr.B.Paulchamy 2
1. PG Scholar, hindusthan institute of technology, coimbtore-32,india.
2. Professor & Head, Dept. of ECE, Hindusthan Institute of Technology, Coimbatore-32,india.
Abstract: CMOS is used to construct the integrated circuits with low level of static leakage. With this low level
leakage we are designing all the transistor circuits in CMOS logic. To control this static leakage in the circuits the
supply voltage is a major concern. Here the step-up converters with charge pump and the level for maintaining its
threshold voltage (VT) is to be analyzed and proposed. Here we are going to propose the novel approach as body
bias effect and sub-threshold logic. This will be applied for the step-up converters for energy harvesting
applications. The backward control is to be processed for control the internal voltage when the charge transfer
switch could be in activation. When the supply voltage is to be raise from the fixed voltage level it will be turn OFF
the transistor. The maximum level of the converters circuits contain the branch A and branch B which could be
contains all p-MOS and n-MOS combinations. The oscillator circuit also to e designed and applied to the proposed
six stage charge pump circuit to reduce the power consumption. To reduce the standby mode leakage we are
designing the circuit by using power gating logic. These circuits are to be designed and verified by using the
TANNER T-SPICE TOOLS.
Page | 80
80 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
FPGA implementation of noise removal images using modified trimmed
median filter
1Tharani c, 2Mrs. K.Kalpana
1PG Scholar, Hindusthan Institute of Technology, Coimbatore-32, India. [email protected]
2 Asst. Professor, Dept. of ECE, Hindusthan Institute of Technology, Coimbatore-32, India.
Abstract - In several applications, image and video signals unit of measurement are corrupted by impulse noise
throughout acquisition or transmission. Therefore there's a necessity for tutorial degree economical and shopper
friendly impulse noise removal technique. Throughout this paper, award economical low value VLSI vogue for the
sting protective impulse noise removal technique has been planned. The trimmed median filter that is terribly well-
liked in removing the salt and pepper noise from the pictures has undergone several changes in recent past. To the
current changed trimmed median filter, the thought of median deviation is additional and used in estimating and
removing the noise. The planned technique is enforced by developing a Graphical interface in MATLAB and place
along enforced apply the small blaze throughout this paper proposes the High intensity blatant component values
are removed by MDBUT Filter.
Page | 81
81 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Performance Analysis in Cooperative MIMO Using Multiple Relay
Process on Beam forming
G.Pandeeswari M.Mohamed Ariff Dr.M.Suganthi
Assistant Professor/ECE Department ECE Department professor/ECE
K.L.N College of Information Technology K.L.N College of Information Technology TCE, Madurai
Madurai, Tamil Nadu, India. Madurai, Tamil Nadu, India. Tamil Nadu
[email protected] [email protected] India.
ABSTRACT - In Cooperative Communication, transmit multiple relay path design for multiple-input–multiple-
output (MIMO) decode-and-forward (DF) half-duplex two-hop relay channels with a direct source–destination link.
For the scenario where source and relay nodes are equipped with multiple antennas and the destination node is
deployed with single antenna, we formulate and solve the optimal beam forming vectors for source and relay nodes
jointly. The mobile users in each group amplify and forward their partner’s data stream using a frequency division
protocol. Based on the capacity contribution from the relaying terminal, a new parameter called cooperation
coefficient is introduced as a function of the relaying sub users. This parameter is used to modify the objective
parameter of the Fairness-oriented [Fading Channel] and throughput-oriented [Near End Channel] algorithms are
selected from the literature to test the proposed technique. Both algorithms are modified to employ the mean of
cooperation coefficient in the objective parameter of the subcarrier allocation procedure and shown to have a better
total throughput without any sacrifice. Using the mean of cooperation coefficient eliminates the need for the
feedback of the relaying channel to the base station. It is shown that by using the mean value of the cooperation
coefficient, instead of its instantaneous value, throughput of the system would still improve compared to the non-
cooperative case. Using the mean of cooperation coefficient leads to an implementable cooperative relay vectors for
some specific scenarios.
Page | 82
82 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Automatic Docking System for Recharging Defense Surveillance Robots Based on Wireless
Image Transmission
K.Revathi, M.E (Embedded system technologies) D.Antonypandirarajan. M.E A.P of ECE Fatima Michael College of Engineering and Technology, Fatima Michael College of Engineering and
Madurai. Technology, Madurai. Abstract:~This project is the development and characterization of a surveillance robot with automatic docking and recharging
capabilities for home security. In this system consists of two sections Warfield section and the control Area section, in the former
section consists of Passive PIR motion detectors are usually designed to provide an indication to an Buzzer panel in response to
detecting PIR that is indicative of motion of the Things. The Buzzer panel is responsive to receipt of the breach indication to cause
an Buzzer condition to Creat. When a person or motor vehicle enters a monitored area, PIR Action detectors are commonly used in
conjunction with different parts of the war field. Someone enters secured places, immediately it will send an indication to the
control area section through wireless communication and indicated to the control area through Emergency alarm. The people can
understood something happens in Server section. At the same time camera keep on capturing images at the Server place and saved
into the PC. When the security people in supervisory Area, they got an indication to the host section by Buzzer, they log into the
Server section computer through wireless Protocol, they can view all information of the war field section images by PC and they
operate the weapons if the entered people were opponent persons. The robot can return to the docking station for recharging
operations when the on-board battery is too low.
Page | 83
83 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
TACT: A Transfer Actor-Critic Learning Framework for Energy Saving in Cellular Radio Access
B.Gopi Sankar.M.E Applied Electronics, P.Francis Antony Selvi M.E (Ph.D) A.P ECE Dept RVS Ratnavel
Subramaniam College of Engg, Dindigul
Abstract:~I have the chance of increase the energy potency in radio access networks (RANs), done by dynamically turning on/off
some base stations (BSs). Initially a tendency to extend the analysis over Base Stations switching operations that ought to match up
with traffic load variations. Rather than looking on the dynamic traffic loads that are still quite difficult to exactly forecast, we have
a tendency to first of all formulate the traffic variations as a Markov Decision Process. Afterwards, so as to foresightedly minimize
the energy consumption of RANs, we have a tendency to design a reinforcement learning framework primarily based BSs switching
operation scheme. Finally to speed up the continued learning method, a transfer actor-critic algorithmic program
(TACT), that utilizes the transferred learning experience in neighboring regions, is planned and demonstrably converges. In the end,
have a tendency to assess and plan the theme by intensive simulations underneath varied sensible configurations and show that the
planned considerateness algorithmic program contributes to a performance jumpstart and demonstrates the feasibleness of great
energy potency improvement at the expense of tolerable delay performance.
Page | 84
84 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Design and Implementation of Intelligent Energy Distribution Management with Mesh Topology
J.VINOTHINI, D.ANTONYPANDIARAJAN, M.E.,
EMBEDDED SYSTEM TECHNOLOGIES, ASST.PROFESSOR DEPARTMENT OF ECE
Fatima Michael College of Engineering and Technology, Madurai
ABSTRACT:~The development of automatic Power management system is presented in this paper .The power management
system is consists of Zigbee Digital Power meters installed in every consumer unit and an Electricity e-Billing system at the energy
provider side. The Zigbee Digital Power meter (ZPM) is a single phase digital kWh power meter with embedded Zigbee modem
which utilize the Wireless sensor network to send its power usage reading using information back to the energy provider wirelessly.
In Power management system the priority will be given to the devices depends upon our requirement. Nowadays there is lack
of power generation as the result of this there will be Traditional meter reading for electricity consumption and billing is done by
human operator from houses to houses and building to building. This requires huge number of Labor operators and long working
hour to achieve complete area data reading and billing. Human operator billing or prone to reading error as sometime the houses
electric power meter is place in a location where it is not easily accessible. The concept of dynamic assignment of priorities to
interrupts is discussed which reduces the time delay for a lower priority task which under some circumstances becomes a higher
priority task. Slicing of interrupt timings is also discussed which can be used to improve the performance .the highest priority task is
serviced more number of times and with lesser time period. Hence it need not wait for the slack time of other previously higher
priority interrupts. If power will be less in grid, automatically power will be manage.
Page | 85
85 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
Improving Network Life Time Based On Energy Efficient Routing In Ad Hoc
Networks
Sujith Kumar. G
ME Communication System, ECE Department
Maharaja Prithvi Engineering College
Coimbatore, India
Suresh G Assistant Professor, ECE Department
Maharaja Prithvi Engineering College
Coimbatore, India
Abstract— In ad hoc network, the topology of network changes frequently due to the mobility of mobile nodes where the
communication is possible without any network infrastructure. Mobile nodes have limited energy resources so energy
efficient routing should be provided which increases the network life time. The existing routing mechanisms do not consider
energy of nodes for data transmission. In this paper data transfer from source to destination is based on the minimum hop
count and residual energy of mobile nodes. The analysis is carried out by using network simulator (ns2), the simulation
results shows that the proposed work provides an energy efficient routing in ad hoc networks.
Page | 86
86 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
NOVEL THREE PORT CONVERTER FOR STAND ALONE POWER
SYSTEM
Abdul Shukoor k .k, v.saravanakumar
Electrical and Electronics and Engineering
PPG IT, PPG IT
[email protected],[email protected]
ABSTRACT: In this paper, a novel three-port converter (TPC) with high-voltage gain for stand-alone renewable power system
applications is implemented. This converter uses only three switches to achieve the power flow controlling.the sources of two input
signal share the same inductor. Thus, the volume can be decreased.the conversion ratio of the converter is higher than other TPCs
technique. because of that, the degree of freedom of duty cycle is very long period of time. The converter can have a higher voltage
gain for both low-voltage ports with a lower turns ratio and a reasonable duty ratio slope. The voltage stress of switches is low; thus
conduction loss can be further improved by adopting low Rds (on) switches. so the high conversion ratio and high efficiency at the
same time in this converter can be acheived. The operation principles, steady-state analysis, converter's control method are
presented . A prototype of the proposed converter with a low input voltage 24 V for photovoltaic source, a secondary power port
voltage 48 V DC , and 400 V as output voltage is implemented to verify the theoretical analysis of the technique. The power flow
control of the converter is also built and tested with a digital signal processor.
Page | 87
87 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A HYBRID GSA-PSO MODEL OF MPPT CONTROL SCHEME FOR THE
PHOTOVOLTAIC SYSTEM
Akhila Ayppachan1, CL.Chinnadurrai3, V.Saravanakumar4
1,2PG Scholar, PPG Institute of Technology, Coimbatore 3,4Assistant Professor, PPG Institute of Technology, Coimbatore
[email protected],[email protected],[email protected], [email protected]
ABSTRACT: This paper presents a new method of tracking the maximum power from a solar panel at a given temperature and
solar irradiance. Inspired by the advantages of the Particle Swarm Optimization (PSO) method of MPPT and the Gravitational
Search Algorithm (GSA) method of MPPT a hybrid model of MPPT in a single solar power harnessing system have been devised.
This Project focus on modeling and simulation of Photovoltaic (PV) system by using improved mathematical model. GSA-PSO
algorithm is proposed for MPPT control. The proposed algorithm will find the suitable duty ratio in order to maximize the power
output of DC-DC converter. The proposed method can be verified with simulation in the MATLAB SIMULINK environment and
can be validated experimentally using a 100W/12V PV panel unit with a DC to DC converter.
Page | 88
88 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DC-DC BOOST CONVERTER INTEGRATED WITH VOLTAGE MULTIPLIER FOR
VOLTAGE GAIN
Anjugam.S1,G2,I.Rajarajeshwari3. 1PG Scholar, PPG Institute of Technology, Coimbatore 2PG Scholar, PPG Institute of Technology, Coimbatore
3Assistant Professor,PPG Institute of Technology, Coimbatore
[email protected],[email protected],[email protected]
ABSTRACT- This project aims at developing a dc-dc boost converter with high voltage step-up ratios. A novel high step-up
converter is proposed for a frontend photovoltaic system. Through a voltage multiplier module, an asymmetrical interleaved high
step-up converter obtains high step up gain. The voltage multiplier module is composed of a conventional boost converter and
coupled inductors. In boost converters, an LC-circuit with high quality factor (Q-factor) is employed to amplify the dc input voltage
to required high voltage level. For this, MOSFET power switch is employed to make and break a high current pulse through the
inductance. When current is made to flow through inductance, energy is stored in inductance and when this current is cut the stored
energy in inductance is transferred to capacitance, which results in a high voltage across capacitor and this high voltage is filtered
and fed to dc-bus.
Page | 89
89 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
NOVEL SWITCHING PWM THREE LEVEL DC-DC CONVERTER USING NOISE FILTER
RESONANT CONVERTER Arun kumar. A,Rajarajeshwari.I
Electrical and Electronics and Engineering
PPG IT,PPG IT
ABSTRACT : A novel zero-voltage and zero-current switching (ZVZCS) pulse width modulation (PWM) half-bridge (HB) three-
level (TL) dc/dc converter is implemented. It can achieve zero-voltage switching (ZVS) for the leading switches and approximate
ZCS for the lagging switches. The operation principle of the novel converter and the soft-switching implementation condition and a
new driving method for synchronous rectifier (SR) in LLC resonant converter is presented. a zero-crossing noise filter (ZCNF) to
the drain and source of the SRFET is added, the false triggering of the SR can be effectively rejected. and also the resistor and the
capacitor in the filter can be used as a compensator to solve the duty-cycle loss issue .in this method only three passive components
are needed that makes it reliable and easy to implement are analyzed according to equivalent circuits under different stages. A
prototype of 400 V to 12 V 600-W half bridge LLC resonant converter is built to verify the advantages of the ZCNF. An efficiency
improvement of 0.8% is achieved by the ZCNF
Page | 90
90 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
AN AUXILIARY SWITCHED CAPACITOR CELL HIGH FREQUENCY INVERTER FOR
INDUCTION HEATING APPLICATIONS JinuJose,I. Rajarajeswari
PG Scholar, Assistant Professor
PPG IT,PPG IT
ABSTRACT: This paper proposes a high-frequency high power density series load resonant inverter with an auxiliary switched
cell for induction heating appliances. The main objective is to achieve high power density by including a switched capacitor cell
with the capacitor-clamped half-bridge zero voltage switching high-frequency inverter circuit using the Pulse Density Modulation
control scheme. This control strategy allow inverter to work close to the resonance frequency for all output-power levels.At that
time , zero-voltage switching and zero-current switching conditions are performed and the switching losses are minimized. To
improve efficiency significantly in the low duty ranges, pulse density modulation (PDM) control can be used instead of PWM
because of the number of pulses control the output power. To highlight the proposed topology as a high-power-density inverter,
number of switches and output power have been taken into account as compared with regardless of efficiency. EMC filters are
added into the system which provides better output response. The problems related to existing systems like harmonics, noises,
flickers, high THD, reduced output power and failure of Zero Voltage Switching at low duty cycle can be minimised with the newly
designed topology.
Page | 91
91 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
High Step Up Soft Switching Isolated DC–DC Converter for Hybrid Energy
Systems
M.Nandhini 1, I.Rajarajeswari 2
1. PG Scholar, 2. Assistant Professor
Department of Electrical and Electronics Engineering,
PPG Institute of Technology, Coimbatore, Tamilnadu.
Abstract - A new high step up soft switching (ZVS) isolated dc– dc converter is proposed by combining a boost half-bridge (BHB)
cell and a full-bridge (FB) cell with two different type of power sources which can be employed for hybrid energy systems like
hybrid electric vehicles, Photovoltaic power generation systems and fuel cells. This paper presents a comparison between symmetric
and asymmetric control using pulse width modulation technique. The proposed modulation technique provides high voltage boost
with reduced switching losses. The entire circuit technique has been carried out in MATLAB/SIMULINK. A comparative study of
asymmetric and symmetric soft switching converter employing variable duty PWM has been presented.
Page | 92
92 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
PHOTO VOLTAIC BASED AC LINK BUCK BOOST INVERTER S. Naveen Kumar,V.Saravanakumar
PG Scholar, Assistant Professor
PPG IT,PPG IT
ABSTRACT: The soft-switching ac link universal power converters have received noticeable attention during the
last few years. These converters, which can configured as dc–dc, dc–ac, or ac–ac, are compact, reliable and offer
longer life time compared to the other types of converters technique and also they require more switches, which
make the control process more diffcult. In the proposed a modified configuration for the dc–ac power conversion
process, which reduces the number of switches without changing the operating principles. This converter which is
named sparse ac-link buck–boost inverter reduces the number of switches from18 to 12. Despite reducing the
number of switches using in the proposed system, the partial resonant time, no power is transferred during that time,
is as short as the original configuration. special feature of this inverter is that it can be fabricated by MOSFET
modules which are more compact and more cost-effective compared to the discrete devices. the principles of this
proposed system is the operation of this configuration,the efficiency will be compared, the failure rate, current rating
of the switches in the proposed and original inverters.The failure rates of the sparse configuration are lower than the
original configuration so they have longer lifetime. The sparse configuration is slightly lower than that of the
original configuration of the efficiency. However by using reverse blocking MOSFETs in the sparse configuration,
the proposed inverter efficiency will be improved
Page | 93
93 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
NEW DESIGN CONTROL OF PUSH–PULL CONVERTER WITHSTEP
UP/STEP-DOWNINVERTER MODULE Rahul Kumar. R,Yuvaraj .P
PG Scholar, Assistant Professor
[email protected],[email protected]
Electrical And Electronics Engineering
PPG IT,PPG IT,COIMBATORE
ABSTRACT: In this paper, a New Design Control Of Push Pull Converter With Step Up / Step Down. Inverter
Module is proposed. The proposed inverter module produces a higher output voltage without addition of
intermediate power stage or transformers. In addition the designed control of push pull converter work close to the
resonance frequency, at that time zero-voltage switching and zero-current switching conditions are performed and
the switching losses are minimized. By using voltage doubler on secondary side, the turn ratio of the transformer can
be reduced. The theoretical analysis of the proposed converter is verified by MATLAB/SIMULINK.
Page | 94
94 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGNING A HIGHER EFFICIENCY RESONANT CONVERTER FOR
LOW-OUTPUT-VOLTAGE DC–DC LED DRIVERS Udhayabarathi.G1, P.Yuvaraj3.
1PG Scholar, PPG Institute of Technology, Coimbatore 2PG Scholar, PPG Institute of Technology, Coimbatore
3Assistant Professor, PPG Institute of Technology, Coimbatore
[email protected], [email protected], [email protected],
Abstract- High Brightness Light Emitting Diodes (HBLEDs), however, have proven themselves to be a much better option. Like
incandescent bulbs, they reach full brightness immediately and do not contain any difficult to-dispose-of chemicals. They also
offer advantages over incandescents: they have incredibly long lifetimes and efficiency levels are continuously being increased. It
is being widely used in lighting applications, and therefore, their power supplies are required to have also high reliability and
efficiency. In general HBLED is performed without electrolytic capacitors, improving reliability but also increasing the low-
frequency ripple of the output voltage. This problem is solved using resonant converter is a perfect option for the second stage as
it has very high efficiency, it operates at constant switching frequency, and its output filter is small. But in the resonant converter
also more number of the switches is used which greatly increases the power consumption for AC-DC LED drivers ,this problems
is solved by using the diodes instead of switches in the AC-DC LED drivers. However, the standard configuration of the SD-SR
must be modified in this case in order to deal with the transformer voltage variations due to the input voltage ripple and, more
important, due to the LED dimming state. This modification is presented in this paper. Meeting this demand requires proper
testing and proper testing requires the proper test equipment. Experimental results with a 60-W prototype with an output voltage
of 12 V validate the proposed feed-forward technique and the proposed SD-SR circuit. No electrolytic capacitor is needed and the
efficiency in the resonant converter is as high as 94.5%.
Page | 95
95 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
FUZZY BASED THREE LEVEL COMMON-MODEINVERTER USING
FLYING CAPACITOR INVERTER AND CASCADED H-BRIDGE S.Vadhiraja1, J.Arokia Praveenraj2
1.PGScholor, 2.Assistant Professor
[email protected],[email protected]
Department Of Electrical And Electronics Engineering
PPG Institute of Technology, Coimbatore, Tamilnadu
ABSTRACT:This paper presents the three level common-inverter using flying capacitor and cascaded H-bridge.
The common mode voltage is eliminated using PWM switching strategies. An attempt is made to switch the device
using intelligent controller Fuzzy Logic Controller (FLC).The switching strategy of the inverter gives zero common
mode voltage. The input to the H-bridge is given through FLC.The electrostatic coupling of common mode voltage,
which produces bearing current and leakage current is eliminated. This inverter operates as a normal three level
inverter during failure of one device in H-bridge. This inverter has added advantages of reliability, back-to-back
grid-tied converter application, etc. The results are obtained through Mat lab /simulink.
Page | 96
96 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
DESIGN AND CONTROL OF A BIDIRECTIONAL RESONANT DC–DC CONVERTER FOR
AUTOMOTIVE ENGINE/BATTERY HYBRID POWER GENERATORS
Vinay K,P. Yuvaraj M.E
PG Scholar, Assistant Professor
PPG IT, PPG IT
ABSTRACT: This paper proposes a soft-switching which is not isolated two-way DC-DC convertor appropriate for
high increase and diminution applications. The planned convertor can do ZVS activate of all switches and ZCS put
off of some switches in each CCM boost and buck operations.An optimized switching strategy is given to attenuate
switch current rating and achieve soft-switching in wider vary. associate intermediate shift pattern is introduced to
hold out seamless mode amendment. Experimental results from a 5kW prototype unit are provided to validate the
planned conception. A typical application for this converter can be found in the auxiliary power supply of hybrid
electric vehicles. A two half-bridge circuit has been developed to implement the required power rating victimisation
by the minimum range of devices. Unified zero-voltage switching was achieved in either direction of power flow
with neither a voltage-clamping circuit nor additional. Switching devices and resonant elements. A two-way dc–dc
convertor is planned for the automotive engine/battery hybrid power generators. The two-stage two-way convertor
using a fixed-frequency series loaded resonant convertor is meant to be capable of operational beneath zero-current-
switching turn-on and turn-off not withstanding voltage and cargo variation, and thence its magnetic elements and
EMI filters is optimized. Also, a replacement autonomous and seamless two-way voltage control technique that
mixes 2 individual managementlers for low-tension aspect management and highvoltage side management by
introducing a variable current electric circuit is planned to supply uninterrupted power to vital ac masses and scale
back the scale of the dc bus capacitance and therefore the transition time. Also, a new autonomous and seamless
bidirectional voltage control method that combines two individual controllers for low-voltage side control and high
voltage side control by introducing a variable current limiter is proposed to provide uninterrupted power to critical
ac loads and reduce the size of the dc bus capacitor and the transition time.The proposed converter is a good
alternative to full-bridge isolated bidirectional dc–dc converter in medium-power applications.
Page | 97
97 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A LOOK AHEAD PARTIAL BUS SPECIFIC CLOCK GATING BASED ON
AUTOGATED FLIPFLOPS
Vidya K1 Mr R. Karthik2
1P.G Scholar, Department of Electronics and communication, Ranganathan engineering college,
Coimbatore. 2Assitant Professor, Department of Electronics and communication, Ranganathan engineering college,
Coimbatore.
Abstract: - The clock gating which could be enables the clock signals from the CDN (clock distribution network).
This technique could be activating the clock which is needed for the operation of the circuit. The unnecessary clock
signals are not activated during the clock gating. This saves the dynamic power of the circuit. The auto gated flip-
flops which are to be using clock gating technique for only small power consumption. The novel approach we are
going to design the circuit based on look ahead clock gating which is to be used for the timing constraints for each
clock pulses. The enabling clock pulses for the derived timing signals to the gated logic which is to be saves the
power from the flip-flops. The look ahead technique can also to be reducing the delay and the distortions from the
circuit for the achievement of the application level. This could be applied into the parallel bus specific clock gating
for application level implementation. This can be adopted for the all sectional view from particular architecture
implementation. This process could be available for the structural level implementation for all the CMOS logic gates
for the integrated chip. This architecture can be designed and verified by using TANNER EDA tool.
Page | 98
98 Proceeding of International Conference on Emerging Trends in Engineering and Technology (ICETET 2015)
A REVIEW OF UART ENABLING BIST ARCHITECTURE
USING VHDL
Suganya T. M1 Dr. M. Senthilkumar2
1P.G Scholar, Department of Electronics and communication, Ranganathan Engineering College,
Coimbatore. 2Associate Professor & Head, Department of Electronics and communication, Ranganathan Engineering
College, Coimbatore.
Abstract: - Testing of VLSI chips is changing into significantly complicated day by day as a result of increasing
exponential advancement of NANO technology. BIST may be a style technique that enables a system to check
mechanically itself with slightly larger system size. During this paper, the simulation result performance achieved by
BIST enabled UART design through VHDL programming is enough to compensate the additional hardware
required in BIST design. this system generate random check pattern exploitation the LFSR checks Pattern Generator
mechanically, therefore it will offer less check time compared to associate degree outwardly applied check pattern
and helps to attain rather more productivity at the top modules. This mechanism also to be used to check the design
chip itself. So the main advantage of this testing is that it reduces the complexness thereby will increase the
operational speed, potency in conjunction with relevant price reduction. Also in this method the conjunction with
operation, maintenance of the system may also be done.
99
IMPROVED MULTILEVEL INVERTER WITH NEUTRAL POINT
POTENTIAL BALANCING FOR HIGH POWER APPLICATION Logapriya.J Final M.E-PED
Sri Subramanya College Of Engg& Technology
Palani.Tamilnadu,India.
Mr.S.Mohamedyousuf,M.E.,(Ph.D)., Assistant professor,EEE Department.
Sri Subramanya College Of Engg& Technology
Palani.Tamilnadu,India. [email protected]
Abstract—This paper presents low harmonic distortion andneutral-point potential (NPP) balancing in multilevel
inverter using multicarrier pulse width modulation (PWM) for medium-voltage high-power industrial ac drives. This
method is applicable for five-level inverters or higher. A high performance of the machine is observed
experimentally at low switching frequency operation employing the proposed technique. In the past, low distortion
and optimal common-mode voltage at low-switching-frequency control have been reported using proposed
synchronous optimal PWM.
100
FPGA IMPLEMENTATION FOR SECURE TRANSMISSION IN
MOBILE JAMMER Sarup Chandran1, Sufaija.S1, Shanmuga Priya1, Rineetta Babu Thomas1, Ponneela Vignesh.R2. 1UG Student,
Tamil Nadu College of Engineering, Coimbatore, Tamil Nadu.
2Dept.of ECE, Tamil Nadu College of Engineering Coimbatore, Tamil Nadu
ABSTARCT: The Wireless jammer is an instrument used to prevent cellular phones from receiving signals from base
stations.The jammer effectively disables cellular phones. These devices can be used practically in any location, but are found
primarily in places where a phone call would be particularly disruptive because silence is expected.Then widespread usage of
tool is becoming irritating and dangerous .They are utilized in the places which may be very irritating and dangerous for the ill
people and those who have pace maker located in the heart. Mobile phones are more lately utilized by terrorists for organizing
explosions in several locations at a time. Therefore the cell phone jammers are utilized to stop all such situations.To remove these
hazards a new efficient type of mobile jammer is proposed using FPGA.