DE-NOISING RADIOGRAPHIC IMAGES USING BILATERAL EDGE PRESERVING FILTER |
Author : S.Hari Krishna, P.Sushendra, Dr.P.Chitra |
Abstract | Full Text |
Abstract :An improved radiographic image denoising using bilateral filtering and edge preserving by snake method. In digital radiographic input image contain noise and denoise by using bilateral filter. It is a non-linear, and noise reduction smoothening filter. Intensity value at each image pixel is replaced by average of intensity values from nearby pixels. For detecting edges in radiographic images, discontinuous contours can be obtained in traditional approach, due to attenuation of sound wave andspeckle noise. Developing snake edge detection.
|
|
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS |
Author : Dr.S.Gunasekaran, M.P.Lavanya |
Abstract | Full Text |
Abstract :Cloud computing is a new computational paradigm that offers an innovative business model for an organization to adopt IT without upfront investments. It provides enormous storage for data and computing to customers over the internet. Cloud Computing gained great responsiveness from the industry but still there are many issues that are hampering the growth of the cloud. Security of data in cloud is one of the major issue which is more complication in the implementation of cloud computing. These security issues are avoided by various encryption algorithms. This work presents a review on various encryption algorithms to enhance the data security in cloud computing. |
|
ACTIVE CONTOUR BASED LIVER IMAGE ANALYSIS |
Author : Sajith.A.G, Dr.Hariharan.S |
Abstract | Full Text |
Abstract :Accurate and fast image segmentation algorithm is of paramount importance for a wide range of medical imaging applications. The most widely used image segmentation algorithms are region based and typically rely on the homogeneity of the image intensities in the regions of interest, which often fail to provide accurate segmentation results. This paper addresses the application of active contours for robust tracking of contours. In this method motion estimation is embedded in the energy minimization process of the contours. This is possible using a dynamic programming approach for
this minimization problem. This method has been successfully applied to the analysis of liver images.
|
|
DESIGNING A CUSTOM OS FOR IOT USING YOCTO PROJECT AND CREATING IOT APPS USING IBM BLUEMIX |
Author : Subravelu.T, Ruhan Bevi.A |
Abstract | Full Text |
Abstract :Developers spend lot of time porting or making build systems which leaves less time and resources to develop value adding software features this can resolved by the Yocto Project. The Yocto Project combines the convenience of a ready-to-run Linux Distribution with the flexibility of a custom Linux operating system. The Yocto Project is not an Embedded Linux Distribution. It creates a custom one for us, it is an Ecosystem. The Yocto Project used to establish a custom Linux baseline across multiple hardware configurations. This allows software developers to write software for an embedded Internet
of Things (IoT) device. The IoT is expected to offer an unprecedented connectivity of all the things including but not limited to devices, systems and services. This interconnection can creates a platform to automate and connect for almost all the fields and industry. However, Low cost computing platforms
could be used which specialize in doing only one thing and also consume less power. Yocto project used to build a free custom OS which will support Internet of Things in Beaglebone black as low cost computing platform. |
|
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS |
Author : S.Naveen Kumar, A.Mohammed Arif, S.Naveen Kumar, Mr.S.VijayMurugan |
Abstract | Full Text |
Abstract :The growth in electronic transactions at ATM has been increasing and so there is demand for fast and accurate user identification and authentication. Generally user has to provide two means of identification, one of which is a physical token, such as card and other of which is something memorized
constant code. This work aims at improvising the security and authenticity of ATM. Instead of memorized code here in this work we generate random OTP (One Time Password) which is sent to mobile through GSM model and RF-ID reader to receive the user information. At the time of wrong input code (3 times)
we would transmit video to control station via camera, as there would be more monitors to display it is made as in this way that if the person is trying any defaulting it would switch on monitor which need authentication and also when ATM machine is disturbed.
|
|
SECURE LOCATION SHARING IN PERVASIVE ENVIRONMENTS |
Author : S.Kumararaja, N.Sowriraja Pillai |
Abstract | Full Text |
Abstract :In a modern data sharing society most of the people depends some additional mechanisms to share their resources with the help of devices. The mobile phones play a vital role in it. These Mobile devices contains lot and lots of applications to provide services to users, location based services is including in the scenario. But the question arises to everybody’s mind that the sharing resource is how much secure? For answering
these questions each and everyone depends on the third party provider devices or regular service providers. But many of the people (may be individual or group) do not want to reveal their location based information to service providers or third party vendors, because of maintaining their privacy. A new technique is introduced to provide service between source and destination persons to share the optimal meeting point locations safely without any security issues, called PPFRVP (Privacy Preserving Fair Rendoz-Vous Point). The PPFVRP approach is used to show the possible set of meeting point locations (n-Locations) between source and destination and allow the user to fetch the favorable one. The Secure Hash Algorithm is used by
the source end for cipher process and shares the Meeting point locations to destination. For all the quoted rules of FVRP and SHA provides an efficient result to share the optimal meeting points between source and destination end.
|
|
DESIGN OF CONVOLUTIONAL ENCODER USING 16 BIT REVERSIBLE LOGIC VEDIC MULTIPLIER |
Author : Naveen K B., Yogananda C D., Dr. M B Anandaraju |
Abstract | Full Text |
Abstract :This paper is focuses the recognition of capable of logic design of crypto system, the convolution encoder
which leads to faster speed and improve delay the convolutional encoder the design are basically encoders
be very important for particularly low probability error used at high data rate the system is used to realized
using simulation and synthesized using modelsim6.3f and cadence for RTL Design |
|
POWER AND LATENCY ANALYSIS OF MASKED NOC ARCHITECTURE |
Author : Dayakar C. V., Janarthanan M |
Abstract | Full Text |
Abstract :A Network-on-chip (NoC) is a new paradigm in complex system-on-chip (SoC) designs that provide efficient
on chip communication networks. It allows scalable communication and allows decoupling of
communication and computation. The data is routed through the networks in terms of packets. The routing
of data is mainly done by routers. So the architecture of router must be an efficient one with a lower latency
and higher throughput. And Wormhole flow control, also called wormhole switching or wormhole routing is
a system of simple flow control in computer networking based on known fixed links. It is a subset of flow
control methods called Flit-Buffer Flow Control. In this project we designed, implemented and analyzed
crossbar router architectures for a network on chip communication in a FPGA. The routers have five ports,
four ports connected to other ports in four different directions and the fifth port connected to the processing
element through a network interface. Our Proposed architecture contains 4x4 crossbar switch, switch
allocator, path and channel request, data ram and 4 i/o ports. |
|
EFFECT OF ASPECT RATIO WITH ROLL MOMENT DERIVATIVE OF A DELTA WING IN SUPERSONIC FLOW |
Author : Asha Crasta, S.A.Khan |
Abstract | Full Text |
Abstract :In this paper attention is focussed on study of effect of Aspect ratio of the wing on roll moment derivatives at
various angle of attack and Mach number for a Supersonic flow. It is been observed that there is a linear
increment in rolling moment derivative with aspect ratio as well as with Angle of attack. The reason behind this
being rolling moment derivative is a linear function of aspect ratio and angle of attack. The requirement for the
validity of the present theory is the attachment of the shock at the leading edge of the wing. Whereas, in the case
of detached shock wave, this theory is not valid. |
|
USER BEHAVIOUR ANALYSIS OF IPTV CHANNELS USING MARKOV CHAIN MODEL |
Author : P L SRINIVASA MURTHY, Dr.T.VENU GOPAL |
Abstract | Full Text |
Abstract :Due to the emergence of innovative technologies over Internet, the traditional broadcasting of TV is
changed to use IPTV for next generation networks. IPTV is the delivery of multimedia content to
multiple subscribers through multicasting over well known IP. The IPTV depends on the Internet and
telecommunications. Therefore, the inherent issues are to be identified and resolved for the success of
IPTV. In this paper we proposed a Markov chain model that characterizes the user behaviour.
Markov model a stochastic model that expresses a sequence of events. In the set of events, the
probability of each event is likely based on the state gained from previous event. We considered two
IPTV channels. Users may prefer any one. However, user switches to other channel if the channel
fails. The Markov chain model used for modelling user behaviour includes states and transition
probabilities. Quitting from a channel is the variation parameter over the popularity of channels. The
more of quitting behaviour pertaining to a channel reflects the deteriorated quality of services and
popularity of that channel. The results of the study reveal probable inter relationship between user
behaviour parameters and channel’s popularity in the market. |
|
DEVELOPMENT OF LEG WHEEL HYBRID HEXAPOD BOT |
Author : Sai Srinivas Nallamothu, Sai Preetham Sata, P. Sateesh Kumar Reddy, B. Jaswanth Babu |
Abstract | Full Text |
Abstract :The conventional mobile robotic platforms which either uses wheels or legs are quite familiar and each one
of them has its own advantages and disadvantages. The wheeled robot is suitable for only plain and smooth
terrain, whereas the legged robot can travel in any kind of terrain but is comparatively slower than the
wheeled robot. So, a hybrid of both wheeled and legged platform would be quite suitable for any kind of
terrain. The primary focus of this project is to design and develop a leg-wheel hybrid robotic platform with
a concurrent engineering and mechatronics approach to produce results with optimised design metrics at
each and every stage of its development. This paper details the Finite Element Analysis (FEA) of the C –
Legs which are used in the robot. |
|
POWER POINT SLIDE SHOW MOVEMENT USING HAND GESTURE RECOGNITION |
Author : Sampada Muley, Prof. A. M. Rawate |
Abstract | Full Text |
Abstract :In this paper, a real-time system that utilizes hand gestures to interactively control the presentation is
proposed.Computers are widely used in all fields. However, the interaction between human and machine is
done mainly through the traditional input devices like mouse, keyboard etc. To satisfy the requirements of
users, computers need other ways to interact more conveniently, such as using speech or body language (e.g.
gestures, posture). In this paper, we propose a new method supporting hand gesture recognition in the static
form, using artificial neural network. The proposed solution has been tested with high accuracy (98%) and is
promising.In this paper, project presentation or even in class rooms can be effective whenslideshow
presentation is used. There are various means to control slides which require devices like mouse, keyboard,
or laser pointer etc. The disadvantage is one must have prior knowledge about the devices in order to
operate them. This paper proposes the methods to control the slides during a presentation using bare hands
and compares their efficiencies. The proposed methods employ hand gestures given by the user as input. The
gestures are identified by counting the number of active fingers and then slides are controlled. |
|
LANE DEPARTURE WARNING SYSTEM FOR VEHICLE SAFETY |
Author : K. Sravanthi, Mrs. Ch. Padmashree |
Abstract | Full Text |
Abstract :In Malaysia, the rate of fatality due to accidents cases increases year by year. This problem becomes
more serious and need all concerns to immediately take the following urgent actions in order to save precious
human life. Therefore, this work attempts to present a technique based on video and image processing for lane
guidance warning system as an alternative way to reduce the accident rate due to lane departure. This system
is capable to identify two lane markings from the video captured through a webcam. Warning system will
automatically ‘switch on’ once lane departure occurs either to the right or to the left side of the road. The
input video will first undergo threshold process and binary conversion. Then, lane marking detection is done
using Hough transform, Hough line detection and local maxima finder. Finally, a decision-making algorithm
is applied in the system to detect lane departure. It is found that, this system is able to identify straight lane
markers, highlighting both markers with colour lines and able to give appropriate warning when lane
crossing happen. For future enhancement, distance measuring function should be applied in the system so that
the distance from one vehicle in front with another one at the back can be measured automatically. |
|
IMPACT OF THE VARIATION OF STORAGE VOLUMES IN CASCADING MULTI-TANK RAINWATER HARVESTING SYSTEMS |
Author : S. Sendanayake, K. J. C. Kumara |
Abstract | Full Text |
Abstract :Rainwater harvesting is perceived as an acceptable method of supplementing the reticulated service
water supply, particularly in water stressed locations. Mostly used as stand-alone types for the provision
of service water for secondary purposes such as laundry, the biggest drawback in Rain water Harvesting
(RWH) systems is its rainwater storage tank occupying a considerable space depending on the daily
demand for water, roof collection area and the average rainfall depth. Attempts have been made to
optimize the storage tank capacity for a desired Water Saving Efficiency (WSE) with the aim of reducing
the size of the tank which would also allow the tank to be placed just below the roof level to feed the
service points through gravity. Still the weight and volume of the tanks can be high particularly for high
demand, multi-storey situations. To address the problem, Cascading Multi Tank Rain Water Harvesting
(CMTRWH) systems have been introduced with the storage capacity distributed among floor levels where
the upper level feeder tank capacities can be restricted to as low as 1 m3
posing a minimum disturbance
to the building envelop, but the parent tank which collects only the excess roof runoff cascading down
from the feeder tanks still occupies a considerable space at the ground level. If the storage volume of the
parent tank can be further reduced while having a marginal effect on the overall water saving efficiency,
it could have a significant impact on minimizing the system cost. |
|
HYDRODYNAMIC MODELLING OF AN AUTONOMOUS SURFACE VESSEL FOR DYNAMIC CONTROLLING |
Author : K. J. C. Kumara , S. Sendanayake |
Abstract | Full Text |
Abstract :An Autonomous Surface Vessel (ASV) can be defined as a vehicle controlling its own steering and speed for
navigation, dynamic positioning, motion stabilization and obstacle detection and avoidance. This novel
vehicle mainly consists of two hulls (pontoons), a strut of hydrofoil cross section, a submerged body
(Gertler body) connected at the bottom end of the strut and two propellers. This study, kinematics and a
complete hydrodynamics analysis of a proposed model of an ASV which travels in the ocean is openly
discussed using first principles. The vessel moves in a hydrodynamic environment where many
uncertainties, non-linear and non-predictive behaviours always appear. The scope of this research paper is
defined by two main objectives; developing complete mathematical model of a surface vessel by analyzing
hydrodynamic forces and other main effects arising when manoeuvring in the ocean. It also addresses nonredundant system of speed controlling. Most of the related studies have not addressed angular speed and
torque of propellers actions which power the motion and control the vessel by contributing as force and
moment inputs and assumed that the residual resistance is independent of the Reynolds number but which
is not accurate and failed in many cases. Practically close model is crucial for researchers who develop
controllers for surface vessel, numerical simulations on vessel dynamics, and for further tuning as prior
testing of a physical model is quite expensive. |
|
REVIEW ON APPLICATIONS OF ROBOTS |
Author : S. Sharavanan, Dr. B. Vijaya Ramnath |
Abstract | Full Text |
Abstract :Robotics application has slowly increasing for the past 2 decades in various industries. This paper
reviews the robotics application in various industries to understand different robotics applications, to learn
the different design of robots, to outline the problems and adaptability improvements in the robotics
application. The design and control of robot should be such that it can be operated from any place and for
different surface environments from steel, glass, ceramic, wood, concrete etc. with low energy consumption
and cost. |
|
HANDLING PRIVACY PRESERVING OF DATA USING AES ALGORITHM |
Author : P.Suganthi, P. Thiruselvan, Dr. C. Balasubramanian |
Abstract | Full Text |
Abstract :The sensitive data are patient record details, organization record which are handled only administrative
member. Preservation of privacy is a major feature of data mining and individuals privacy without losing of
confidential data. The objective of privacy preserving data mining is to mine significant information from large
amounts of dataset. To prevent the misuse of sensitive information such as patient record by the system
administrator. The database administrator collects patient’s data which are maintained in secured manner. The
sensitive information has patients name, Address, Disease, Date of Visit. The privacy preservation mechanism
can be carried out through anonymization techniques. In order to preserve the sensitive data, the system
administrator modifying the patient details. Privacy preserving techniques used to handle the sensitive
information from unsanctioned users. The proposal system is original patient record should be transformed into
Anonymized table which is identified only by administrative. To keep anonymized table in cluster form using kmeans clustering algorithm. To keep anonymized table in cluster form using k-means clustering algorithm. To
partition anonymized table into cluster, and each cluster has similar data object which is based on anonymized
data attribute. After that the grouped similar data to be protected using AES encryption algorithm. The aim of
this paper is to provide more accuracy and better level of privacy of sensitive attribute. |
|