The efficient localization complementing the services of wireless sensor networks holds promises of diverse application domains each with competing requirements. The resource constraints of WSN necessitate the efficient localization algorithm which optimizes the resource utilization at various network operation levels like data link layer, routing etc. Energy is scarcest reserve of low power sensing devices in WSNs. The existing localization algorithms might perform efficiently in smaller networks comprising of one or two hop networks but its performance degrades in multihop sensor networks. Towards improving the performance of WSN the localization algorithm is integrated with media access control (MAC) protocol of data link control of network operation. In this paper the localization algorithm is seamlessly combined with MAC protocol to optimize the performance of WSNs. The MAC scheme is basically targeted towards achieving load balancing, throughput and energy optimization. A detailed analysis of performances of a ranged based localization algorithm with various MAC standards was performed on the simulator tool NS-2 with varying application scenarios. With the observed data this is concluded that localization algorithm combined with MAC protocol performs more efficiently in terms of energy usage and positioning accuracy in comparison to localization algorithm without MAC. Thus a MAC protocol is instrumental to improve localization along with conserving the energy usage. The observed data further adds that the MAC protocol may also be utilized to enhance coverage and scalability of WSN localization.
- Page(s): 01-11
- Date of Publication: 20 May 2017
- Suman PandeyMember, IEEEKamla Nehru Institute of Technology, Sultanpur, Uttar Pradesh, India
References
[1]. T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzher,“Range-Free Localization Schemes for Large Scale Sensor Networks”, Proc. ACM MobiCom ’03, pp81-95, Sept. 2003. [2]. J.-P. Sheu, S.C. Tu, and C.-H. Yu, “A Distributed Query Protocol in Wireless Sensor Networks”, Wireless Personal Comm., vol. 41, no. 4, pp 449-464, June 2007. [3]. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, “Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet”, In Proceedings of ASPLOS, pp 96–107, 2002. [4]. S. Tilak, V. Kolar, N. B. Abu-Ghazaleh, and K. D. Kang, “Dynamic Localization Control for Mobile Sensor Networks” in 24th IEEE International Performance, Computing, and Communications Conference (IPCCC), pp 587–592, 2005. [5]. B. Karp and H. T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, in Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pp 243–254, 2000. [6]. B. Hofmann, H. Lichtenegger, andJ. Collins,“Global Positioning System, Theory andPractice” Springer-Verlag, 1993. [7]. J. Bachrach, C. Taylor and I. Stojmenovic, “ Handbook of Sensor Networks: Algorithms and Architectures, :Wiley”, 2005 [8]. A. Savvides, C.. Han, and M. B. Strivastava,“Dynamic Fine-Grained Localization in Ad-hoc Networks of Sensors”, in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom), pp 166–179, 2001. [9]. U. Bischoff, M. Strohbach, M. Hazas, and G. Kortuem,“Constraint-Based Distance Estimation in Ad-hoc Wireless Sensor Networks”, in Proceedings of theThird European Workshop on Wireless Sensor Networks (EWSN), pp54–68, 2006. [10]. P. Bahl and V. Padmanabhan, “RADAR: AnIn-Building RF-Based User Location and Tracking System” in Proceedings of INFOCOM, pp 775–784,2000. [11]. A. Ward, A. Jones, and A. Hopper, “A New Location Technique for the Active Office”, IEEE Personal Communications, 4(5):42–47, 1997. [12]. D. Niculescu and B. Nath, “Ad hoc Positioning System (APS) Using AoA”in Proceedings of INFOCOM, pp1734–1743, 2003. [13]. T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzher, “Range-Free Localization Schemes for Large Scale Sensor Networks,” Proc. ACM MobiCom ’03, pp 81-95, Sept. 2003. [14]. R. Nagpal, H. Shrobe, and J. Bachrach,“Organizing a Global Coordinate System from Local Information on An Ad hoc Sensor Network”, in Second International Workshop on Information Processing in Sensor Networks (IPSN), pp333–348, 2003. [15]. D. Niculescu, B. Nath,“Ad hoc Positioning System (APS)” in Proceedings of GLOBECOM, pp 2926–293, 2001. [16]. S. Guha, R. Murty, and E. Sirer, “Sextant: A Unified Node and Event Localization Framework Using Non-Convex Constraints”, In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp 205–216, 2005. [17]. A. Savvides, C. Han, and M. B. Strivastava, "Dynamic Fine-Grained Localization in an Ad-hoc Networks of Sensors", in Proceedings of ACM MobiCom, pp 166- 179, 2001. [18]. R. Nagpal, H. Shrobe, and J. Bachrach, “Organizing a Global Coordinate System from Local Information on an Adhoc Sensor Network”, Proc. of IPSN, LNCS 2634, Springer , pp 333-348, 2003. [19]. N. Patwari, A. O. Hero, M. Perkins, N. S. Correal, and J. Robert, “ Relative Location Estimation in Wireless Sensor Networks”, Signal Processing, IEEE Transactions, vol. 51 , no.8 , pp 2137-2148, 2003. [20]. D. Niculescu and B. Nath, "DV Based Positioning in Adhoc Networks", Journal of Telecommunication Systems, 22(1-4), pp 267-280, 2003. [21]. N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero III, R. L. Moses, and N. S. Correal, “Locating the Nodes: Cooperative Localization in Wireless Sensor Networks”, IEEE Signal Process.Mag., pp 54–69, 2005. [22]. A. A. Kannan, G. Mao and B.Vucetic, “Simulated Annealing Based Localization in WSN”, Journal of Computers, vol. 1, no. 2, pp 15-22, 2006. [23]. H. Chen, P. Huang, H.C. So, X. Luo, and P. Deng, “Mobility-Assisted Cooperative Localization Scheme for Wireless Sensor Networks”, In Proc. Military Communications Conference MILCOM’08, pp 1-7, 2008. [24]. H. Chen, K. Sezaki, P. Deng and H.C.So, "An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks", Proc. IEEE Conference on Industrial Electronics and Applications, pp 1557-1561, 2008. [25]. G. Zanca, F. Zorzi, A. Zanella and M. Zorzi, “RSSI Based Localization Algorithms for Indoor Wireless Sensor Networks”, REALWSN’08, pp 1-8, 2008. [26]. A. Moragrega, and C. Ibars, “Performance Analysis of Cooperative and Range Based Localization Algorithms for Zigbee and 802.15.4a Wireless Sensor Networks”, Proc. IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp 1996- 2001, 2010. [27]. M. A. Azim, Z. Aung, W. Xiao, and V. Khadkikar, "Localization in Wireless Sensor Networks by Cross Entropy Method", in Proc. International Conference on Adhoc Networks, pp 103-118, 2012. [28]. C.-T. Chang, C.-Y. Chang, and C.-Y. Lin, “Anchor-Guiding Mechanism for Beacon-Assisted Localization in Wireless Sensor Networks,” Sensors Journal, IEEE, vol. 12, no. 5, pp 1098–1111, 2012. [29]. F. Xia1, X. Yang, H. Liu, D. Zhang and W. Zhao, “ Energy-Efficient Opportunistic Localization with Indoor Wireless Sensor Networks” in ComSIS Vol. 8, No. 4, Special Issue, October 2011, DOI: 10.2298/CSIS110406063X. [30]. L. Karim, N. Nasser, Qusay, H. Mahmoud, A. Anpalagan,and T. Salti, “Range-free Localization Approach for M2M Communication System using Mobile Anchor Nodes” in Journal of Network and Computer Applications 47 • August 2014 [31]. H.T. Friis, “A Note on a Simple Transmission Formula”, Proc. IRE, vol. 34, no. 5, pp 254–256, 1946. [32]. A.Bachir, M.Dohler, T.Watteyne and K.K.Leung, “MAC Essentials for Wireless Sensor Networks” Vol.12 , Issue: 2,Communication and Survey Tutorials, IEEE pp 222 – 248, 2010 [33]. R.Yadav, S.Varma, and N. Malaviya, “A Survey OF MAC Protocols For Wireless Sensor Networks”, UbiCC Journal, Volume 4, Number 3, pp827-33, 2009. [34]. IEEE Standard 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999). [35]. W. Ye and J. Heidemann, “An Energy-Efficient MAC Protocol for Wireless Sensor Networks”, IEEE Infocom, pp 1567-1576,June 2002. [36]. Patrik Moravek, “NS2 Simulator Capabilities In Nodes Localization in Wireless Networks”, A research Work Was Supported by the Czech Science Foundation - Project No. 102/07/1012.
Suman Pandey "Performance Analysis of Wireless Sensor Network Using Localization Combined With MAC Protocol" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.01-11 2017
This paper displays a concise synopsis of steps required in appropriation of Information and correspondence innovation in instructive associations and its effect on both the instructors and understudies. The components impacting instructors to deject and acknowledge ICT are likewise talked about. The contextual investigations for the usage of ICT and reviews after the execution on the results as far as achieving instructive objectives are likewise highlighted.
- Page(s): 12-16
- Date of Publication: 20 May 2017
- Adarsha H Department of Mechanical Engineering, SET, Jain University, Bengaluru, Karnataka, India.
- S C Sharma Department of Mechanical Engineering, SET, Jain University, Bengaluru, Karnataka, India.
- Ramesh S Department of Mechanical Engineering, SET, Jain University, Bengaluru, Karnataka, India.
- Harishanand K S. Department of Mechanical Engineering, SET, Jain University, Bengaluru, Karnataka, India.
References
[1]. Jonathan E. Aliede, “Challenges and Prospects of Information and Communication Technologies Application Among Mass Communication Students of Tertiary Institutions in Lagos, Nigeria”, New Media and Mass Communication, Vol.39, 2015. [2]. Yvonne Buettner & Charles Duchâteau, Catherine Fulford, Pieter Hogenbirk, Mike Kendall, Raymond Morel, Tom van Weert, “Information and Communication Technology in Higher Education”,Volume 137 of the series IFIP The International Federation for Information Processing ,pp 217-241. [3]. Tomei, L. A. “Taxonomy for the technology domain”,USA: Information Science Publishing, 2011, 25(1): 57–58 [4]. Charles Buabeng-Andoh, “Factors influencing teachers’ adoption and integration of information and communication technology into teaching: A review of the literature”, International Journal of Education and Development using Information and Communication Technology, (IJEDICT), 2012, Vol. 8, Issue 1, pp. 136-155. [5]. Shazia Mumtaz, “Factors Affecting Teachers’ Use of Information and Communications Technology: a review of the literature, Journal of Information Technology for Teacher Education, Vol. 9, No. 3, 2000. [6]. Evans-Andris, M. Barrier to Computer Integration: micro-interaction among computer co-ordinators and classroom teachers in elementary schools, Journal of Research on Computing in Education, 28, (1995) pp. 29-45. [7]. Cox.M, Preston.C, Cox, K. What Factors Support or Prevent Teachers from Using ICT in their Classrooms? Paper presented at the British Educational Research Association Annual Conference, University of Sussex, Brighton. September 2-5 1999 [8]. Veen, W. How Teachers Use Computers in Instructional Practice: four case studies in a Dutch secondary school, Computers and Education, 21(1/2), (1993) pp. 1-8. [9]. Angrist, J. D, Lavy, V, “New Evidence on Classroom Computers and Pupil Learning”. Economic Journal. No. 112,(2002). pp. 735-765. [10]. Banerjee, A, Cole S, Duflo E, Linden, “Remedying Education: Evidence from Two Randomized Experiments in India” , " The Quarterly Journal of Economics, MIT Press, vol. 122(3), (2005)pp.1235-1264 [11]. Goolsbee, A, Guryan, J. (2002). “The Impact of Internet Subsidies in Public Schools”. NBER Working Paper.No. 9090. [12]. Chen-Lin C. Kulik , James A. Kulik, Effectivenessof Computer-Based Instruction: An Updated Analysis”,Computers in human Behaviour , Vol7, 1991pp. 75-94. [13]. Sosin, K.; Blecha, B J.; Agawal, R; Bartlett, R. L.; Daniel,J. “Efficiency in the Use of Technologyin Economic Education: Some Preliminary Results”. American Economic Review. May 2004 (Papers and Proceedings), pp. 253-258 [14]. Fuchs, T, Woessmann, “Computers and Student Learning: Bivariate and Multivariate Evidence on the Availability and Use of Computers at Home and at School”, Ideas, [15]. Coates, Humphreys, B. R. “’No Significant Distance’ between Face-to-face and OnlineInstruction: Evidence from Principles of Economics”.Economics of Education Review. Vol. 23, no. 6, 2004, pp 533-546 [16]. Anstine, Jeff, and Mark Skidmore. “A Small Sample Study of Traditional and Online Courses with Sample Selection Adjustment.” The Journal of Economic Education, vol. 36, no. 2, 2005, pp. 107–127. JSTOR, www.jstor.org/stable/30042641. [17]. Terry, N., J. Lewer, et al. (2003). "The Efficacy of Alternative Instruction Modes in [18]. Economics." Journal of Economics and Economic Education Review 4(1): 23-34. [19]. Leuven, E.; Lindahl, M.; Oosterbeek, H.; Webbink, D. “The Effect of Extra Funding for Disadvantaged Pupils on Achievement”. IZA Discussion Paper.No. 1122. (2004). Bonn: Institute for the Study of Labor. [20]. Tsai-Yun Chen, A meta-analysis of effectiveness of computer-based instruction in mathematics, Doctoral Dissertation, The University of Oklahoma ,1994. [21]. Kim Sosin, Betty J. Blecha, Rajshree Agarwal, Robin L. Bartlett and Joseph I. Daniel, “Efficiency in the Use of Technology in Economic Education: Some Preliminary Results”.American Economic Review. May 2004 (Papers and Proceedings), pp. 253-258. [22]. Attwell, P, Battle, J. “Home Computers andSchool Performance”. The Information Society. (1999). No. 15,pp. 1-10. [23]. Yusong Li,Eugene J. LeBoeuf, P. K. Basu,Louis , Hampton Turner ,“Development of a Web-Based Mass Transfer ProcessesLaboratory: System Development and Implementation”.Computer Applications in EngineeringEducation. Vol. 11, no. 1,2003, pp. 67-74.
Adarsha H, S C Sharma, Ramesh S, Harishanand K S. "Information and Communication Technology and its Brunt on Learning Objectives" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.12-16 2017
An ECG (Electrocardiogram) is a test used to determine the rhythmic activity of the heart. It checks for problems with the electrical activity of the patient’s heart. An ECG shows the heart’s electrical activity as line tracings on paper. To measure the electrical activity of the heart, electrodes are placed on the skin. Suspected myocardial infarction, seizures, etc. can be indicated by performing electrocardiography. Conventionally, 12-lead ECG is performed, where 10 electrodes are placed on the patient’s limbs and on the surface of the chest. The graph of voltage versus time produced by this noninvasive medical procedure is referred to as an electrocardiogram. The ECG signal is contaminated by various noises in various stages of ECG measurement. The presence of noise in an ECG trace complicates the identification analysis. The primary sources of noise in ECG are power line interface, electrode movement noise, motion artifacts, color noise, electromyography etc. Noise removal in ECG signal is vital as these noises alter the data carried by the signal. For proper diagnosis, a pure ECG signal is required. Hence, noise removal from an ECG signal plays a vital role in biomedical field. Once the noise sources are properly characterized and understood, different types of filter designs can be used to efficiently remove noise, while preserving as much of the underlying subject information as possible. Here, we use a combination of any discrete wavelet transform (DWT) and a thresholding method for denoising. Finally, SNR is calculated to find the efficiency of the algorithm used.
- Page(s): 17-22
- Date of Publication: 20 May 2017
- Madhukar B.NSenior Assistant Professor, New Horizon College of Engineering, Bengaluru, India
- Megha S.RUG Student, B.E (ECE), New Horizon College of Engineering, Bengaluru, India
- Sithara T.R UG Student, B.E (ECE), New Horizon College of Engineering, Bengaluru, India
References
[1]. Muris Mujagic, “Characterization of ECG Noise Sources”, 2005. [2]. Ingrid Daubechies, “Ten Lectures on Wavelets”, Volume 61 of CBMS-NSF Regional Conference Series in Applied Mathematics EngineeringPro collection, SIAM 1992, ISBN 1611970105. [3]. K.P.Soman, K.I Ramachandran, N.G.Resmi, “Insight into wavelets from theory to practice”, PHI learning, 3rd edition, ISBN 8120340531. [4]. Chun-Lin and Liu A (2010), Tutorial of the Wavelet Transform, February 23. [5]. S. Abbaspour, H. Gholamhosseini and M. Lindenm “Evaluation of Wavelet Based Methods in Removing Motion Artifact from ECG Signal”, 16th Nordic-Baltic Conference on Biomedical Engineering October 14-16, 2014, Gothenburg, Sweden. [6]. G.P. Nason, “Choice of the threshold parameter in wavelet function estimation”, Wavelet and statistics, 1995-Springer. [7]. P. Karthikeyan, M. Murugappan, and S.Yaacob, “ECG Signal Denoising Using Wavelet Thresholding Techniques in Human Stress Assessment”, International Journal on Electrical Engineering and Informatics ‐ Volume 4, Number 2, July 2012. [8]. Michael Frazier, “An Introduction to Wavelets through Linear Algebra,” 1st Edition, Springer India Private Limited, New Delhi, India, 2014. [9]. Resnikoff, “Wavelet Analysis,” 1st Edition, Springer India Private Limited, New Delhi, India, 2014. [10]. D. B. Geselowitz, “On the Theory of the Electrocardiogram,” Proceedings of the IEEE, 77, pp. 857-876, 1989. [11]. A. Pinsky, “Fourier and Wavelet Analysis,” Cengage Learning India Private Limited, India, 2015
Madhukar B.N, Megha S.R, Sithara T.R "Analysis of Noise Removal in ECG signal using Symlet Transform" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.17-22 2017
With the early 20th¬century, the existence of new technology named Internet of Things (IoT) was stated which deals with the interconnection of things. We adopted this technology for our work to automate and manually control the home appliances making home a better-automated place without human intervention called Smart home. Here, in our work, this technology is supported by an android application installed in Smart Phones and WebPage for User-Interface (UI), various sensors to let appliances to talk, Arduino Uno as a central unit and Wi-Fi for connectivity between central unit and UI.
- Page(s): 23-26
- Date of Publication: 20 May 2017
- Bijay Shrestha Department of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Suman Mali Department of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Asha Joseph Department of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- K. John Singh Department of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Kiran Raj P Department of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
References
Bijay Shrestha, Suman Mali, Asha Joseph, K. John Singh, Kiran Raj P "Web and Android based Automation using IoT" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.23-26 2017
Wireless Sensor Network (WSN) is a collection of small sensor nodes in a geo-graphically distributed area to keep track of physical or environmental conditions. If each node in the network transmits the sensed data to the Base Station (BS), the energy consumption is very high which directly affects the network lifetime. By using clustering techniques, network lifetime can be prolonged by making Cluster Head (CH) to communicate with BS on behalf of other cluster members. We have proposed a Mobile Sink (MS) scheme where the sink node has more energy and resources compared to other sensor nodes. The sink node moves near the clusters and gathers the sensed data from the CH. Clustering is done and CHs are selected based on the Residual Energy (RE) parameter. Simulation results and analysis show that there is an improvement in throughput, delay, packet delivery ratio with reduction in energy consumption compared to schemes that use static sink or BS, where all the CHs communicate the gathered data from the clusters members to the static sink node. Thus mobile sink scheme increases the network lifetime by reducing energy consumption.
- Page(s): 27-32
- Date of Publication: 20 May 2017
- Rashmi G. MM. Tech Scholar, BNMIT, Bengaluru-70, Karnataka, India
- Mallanagouda PatilDepartment of CSE, BNMIT, Bengaluru-70, Karnataka, India
- Rajashekhar C. BiradarSchool of ECE, REVA University, Bengaluru-64, India
References
[1]. J.Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey in Computer Networks”, 2292–2330, 2008. [2]. M. Patil, R. C. Biradar, “A survey on routing protocols in wireless sensor networks”, IEEE, 86-91, Singapore, 2012. [3]. K. Akkaya, M. Younis, “A survey on routing protocols for wireless sensor networks, in Ad Hoc Networks”, 3 325–349, 2005. [4]. W. R. Heinzelman, A. Chandrakasan, and Hari Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proceedings of IEEE, HICSS, 2000. [5]. M. Patil, R. C. Biradar, ”Media Access Control in Wireless Sensor Networks using Priority Index”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 5, No. 2, 416-426, 2017. [6]. Mortaza F. K. Abad and Mohammad A. J. Jamali, “Modified LEACH Algorithm for Wireless Sensor Network”, IJCSI International Journal of Computer Science, Issues, Vol. 8, Issue 5, No 1, 2012. [7]. Gunjan Jain, S.R Biradar, “Enhanced Approach of Making Mobile Base Station in LEACH”, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 10, 2012. [8]. M. H. Khodashahi, F. Tashtarian, M. H. Y. Moghaddam, M. T. Honary, “Optimal Location for Mobile Sink in Wireless Sensor Networks”, 2010. [9]. V. Devaswaran, “Energy Efficient Protocol in Wireless Sensor Networks using Mobile Base Station”, IEEE 2nd International Symposium on Telecommunication Technologies (ISTT), Malaysia, 24-26 Nov 2014. [10]. N. A. A. Latiff, N. M. A. Latiff, R. B. Ahmad, “Prolonging Lifetime of Wireless Sensor Networks with Mobile Base Station using Particle Swarm Optimization”, 2011. [11]. R. J. Rani, C.Tharanidharan, “A Movement of Mobile Sink In Wireless Sensor Networks to Conserve Energy”, International Journal of Innovative Research in Science Engineering and Technology, Volume 4, Special Issue 2, 2015. [12]. X. Qin, Xiong Wang, Feng Ouyangy, T. Wang, X. Gan, X. Tian,“ A Dynamic Unequal Energy Efficient Clustering in Wireless Sensor Network”, National Mobile Communication Research Laboratory, Southeast University, China, 2016.
Rashmi G. M, Mallanagouda Patil, Rajashekhar C. Biradar "Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Networks" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.27-32 2017
This paper proposes the technique of fog detection under the given scenario of back-veil scattering technique. This paper presents the overall scenario of detecting and analyzing the given input video is acquired and processed for fast processing and the expected results are discussed in this paper. The system is efficient in understanding and analyzing the visibility intensity and obstacle detection.
- Page(s): 33-36
- Date of Publication: 20 May 2017
- Mutturaj B. NidagundiFinal year M. Tech, Department of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India
- Rajani V.AFinal year M. Tech, Department of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India
- Prof. V P. GejjiAssociate Professor, Department of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India
- Prof. S S. ShanbhagAssistant Professor, Department of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India
References
[1] “Statistiquesd’accidentalité Routière: Résultats Définitifs de l’année 2011,” Paris, France, Tech. Rep., Jan. 2012. [2] F. Friedrichs and B. Yang, “Camera-based drowsiness reference for driver state classification under real driving conditions,” in Proc. IEEE Intell. Veh. Symp., San Diego, CA, USA, Jun. 2010, pp. 101–106. [3] R. Gallen, N. Hautière, A. Cord, and S. Glaser, “Supporting drivers in keeping safe speed in adverse weather conditions by mitigating the risk level,” IEEE Trans. Intell. Transp. Syst., pp. 1558–1571, Dec. 2013. [4] S. Plainis, I. Murray, and I. Pallikaris, “Road traffic casualties: Understanding the night-time death toll,” Inj. Prev., vol. 12, no. 2, pp. 125–128, Apr. 2006. [5] M. Tideman and S. J. Janssen, “A simulation environment for developing intelligent headlight systems,” in Proc. IEEE Intell. Veh. Symp., San Diego, CA, USA, Jun. 2010, pp. 225–231. [6] United Nations Economic Commission for Europe, Type-Approval Requirements for the General Safety of Motor Vehicles, Add. 37, Rev. 2, Amend. 2, Rear Fog Lamps, 2007. [7] E. Dumont and V. Cavallo, “Extended photometric model of fog effects on road vision,” Transp. Res. Rec., no. 1862, pp. 77–81, Jan. 2004. [8] N. Hautière, J.-P. Tarel, J. Lavenant, and D. Aubert, “Automatic fog detection and estimation of visibility distance through use of an onboard camera,” Mach. Vis. Appl., vol. 17, no. 1, pp. 8–20, Apr. 2006. [9] S. Bronte, L. Bergasa, and P. Alcantarilla, “Fog detection system based on computer vision techniques,” in Proc. IEEE Conf. Intell. Transp. Syst., Saint-Louis, MO, USA, Oct. 2009, pp. 1–6. [10] S. Lenor, B. Jähne, S. Weber, and U. Stopper, “An improved model for estimating the meteorological visibility from a road surface luminance curve,” Lect. Notes Comput. Sci., vol. 8412, pp. 184–193, 2013
Mutturaj B. Nidagundi, Rajani V.A, Prof. V P. Gejji, Prof. S S. Shanbhag "Extraction of Data Image in the Presence of Dense Fog using Back-Scattered Veil Detection Technique" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.33-36 2017
MANET is infrastructure less and freelance network that consist varied nodes. MANET is mobile spontaneous network having ability to attach varied mobile nodes to every alternative. These nodes use wireless links to speak with one another. This temporary, low price network will connect little space folks, because it is temporary infrastructure less, having less variety of resources like low security live, low node life time and fewer authentication suggests that. The infrastructure less nature of painter makes it susceptible to varied attacks. Attacks square measure prone to occur if detective work and preventing algorithms fails to sight vulnerable threats and to seek out and take away malicious nodes. Thus, in MANET, attacks square measure significantly serious issue. during this paper, we've examined sure attacks in painter. Finally, we've compared some attacks exploitation some necessary parameters so self-addressed impact of attacks.
- Page(s): 37-39
- Date of Publication: 20 May 2017
- Manpreet Kaur M.Tech Student, Department of Computer Engineering, YCOE, Punjabi University, Patiala Guru Kashi Campus, Talwandi Sabo, Punjab,India
- Er. Manoj KumarAssistant Professor, Department of Computer Engineering, YCOE, Punjabi University, Patiala Guru Kashi Campus, Talwandi Sabo, Punjab,India
References
[1]. S. Upadhyay and B. K. Chaurasia, “Impact of Wormhole Attacks on MANETs”, 2011, vol. 2, Issue 1. [2]. R. Garg, H. Sharma,“ Comparison between Sybil Attack Detection Techniques: Lightweight and Robust” in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2014, Vol. 3, Issue 2. [3]. M Parsons, P. Ebinger, “Performance Evaluation of the Impact of Attacks on Mobile Ad hoc Networ” in International Conference on Computer Science and Electronics Engineering, 2015, pp. 339-342. [4]. Z. Kasiran and J. Mohamad, “Throughput Performance Analysis of the Wormhole and Sybil Attack in AODV” . [5]. J. Gnanambigai, N. Rengarajan and K. Anbukkarasi, “Leach And Its Descendant Protocols: A Survey” International Journal of Communication And Computer Technologies, 2012, vol. 3, pp. 15-21. [6]. K. Patidar, V. Dubey, “A Comparative study of Collaborative Attacks on Mobile AdHoc Networks” International Journal of Emerging Technology and Advanced Engineering, 2014, vol. 4, Issue 8. [7]. K. Patidar, V. Dubey, “Modification in Routing Mechanism of AODV for Defending Blackhole and Wormhole Attacks” International Journal of Advanced Research In Computer And Communication Engineering, 2014, vol. 3, pp. 5683-5690. [8]. Y.-C. Hu, A. Perrig, D. B. Johnson, “Wormhole Attacks in Wireless Networks, Selected Areas of Communications,” in IEEE Journal on, vol. 24, no. 2, pp.370-380, 2006 [9]. A. Nadeem and M. P. Howarth,``A survey of MANET Intrusion Detection & Prevention Approaches for Network layer Attacks,'' IEEE Communication Surveys & Tutorials, 2012, pp.1-19. [10]. J,HeeCho,A. Swami,and Ing-Ray Chen,``A Survey on Trust Management for Mobile Ad Hoc Networks for Mobile Ad-Hoc Networks, 2011,''IEEE Communication Surveys & Tutorials, Vol.13, No.4, pp.562-583. [11]. B. Wu, J. Chen, J. Wu and M. Cardei, "A Survey on Attacks and Countenneasures in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Springer,2006. [12]. Y. F. Alem and Z. C. Xuan, "Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection", 2nd International Conference on Future Computer and Communication, IEEE, Vol. 3, pp 672-676, 2010. [13]. L. Qian, N. Song and X. Li, "Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path", IEEE Wireless Communications and Networking Conference, Vol. 4, pp 2106-2111,2005.
Manpreet Kaur, Er. Manoj Kumar Review Paper on Impact of Attacks on MANET" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.37-39 2017
Medicines play a crucial role in maintaining health, preventing illness, managing, chronic conditions and curing disease. All Time Medicine (ATM) is a machine which delivers the medicine in emergency cases and ensure availability of drugs 24x7 and hence the name “All Time Medicine”. ATM will be very useful in saving life in case of an accident on highways, remote areas, rural areas and places where medical stores are not within the reach in case of emergency. At least first aid can be made easily accessible with the help of this system. This project consists of Advanced RISC Machine PIC micro controller which controls the other sub systems such as RFID Reader, Global System for Mobile communication (GSM), medicine dispenser, inventory control. RFID tag identifies the specific user. GSM sends the message to the inventory control when the medicines needs to be refill. Medicine Dispenser is the storage part of the machine, which stores the medicine.
- Page(s): 40-41
- Date of Publication: 20 May 2017
- Malashree.G Assistance Professor, Dept of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- UbaidullaAssistance Professor, Dept of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- Shilpa R S HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- Divya U HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
References
[1]. Montaser N. Ramadan, Mohammad A. AI-Khedher and Sharaf A. Al-Kheder“Intelligent Anti-Theft and Tracking System for Automobiles”. International Journal ofMachine Learning and Computing, Vol. 2, No. 1. November 2012. [2]. NXP Semiconductors LPC2148 Single-chip 16-bit/32-bit microcontrollers data sheet. [3]. Survey paper on Radio Frequency Identification(RFID) Trends by Christoph Jechlitschek, (christoph.jechlitschek@gmx.de) [4]. An Electronic Devices and Circuit Theory, Robert L Boylestad and Louis Nashelsky, Ninth edition, Pearson Education, Inc.2006
Malashree.G, Ubaidulla, Shilpa R S, Divya U "ATM (All Time Medicine) Counter For Medicine Self-Dispensing" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.40-41 2017
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to observe physical or environmental conditions. The economical use of energy supply in a sensing element node is most fascinating criteria for prolong the life time of wireless sensing network. Thus planning economical routing for reducing energy consumption is the vital issue. Leach is one of the basic protocols in the clustering technique where hierarchical routing protocols will be used for minimizing the energy consumed in aggregation and diffusing. We have surveyed the state-of art of various hierarchical routing protocols that have been developed from the LEACH. This paper provide light on a number of the improve version of LEACH protocol. Finally this paper concludes with some comparison of descendents of LEACH with LEACH protocol.
- Page(s): 42-45
- Date of Publication: 20 May 2017
- Kiranjot M.Tech Student, Department of Computer Engineering, YCOE, Punjabi University, Patiala Guru Kashi Campus, Talwandi Sabo, Punjab, India.
- Er. Manoj Kumar Assistant Professor, Department of Computer Engineering, YCOE, Punjabi University, Patiala Guru Kashi Campus, Talwandi Sabo, Punjab, India.
References
[1]. S. E. L. Khediri, N. Nasri, A. Wei, and A. Kachouri, “A new approach for clustering in wireless sensors networks based on LEACH,” Procedia Comput. Sci., vol. 32, pp. 1180–1185, 2014. [2]. R. P. Mahapatra and R. K. Yadav, “Descendant of LEACH Based Routing Protocols in Wireless Sensor Networks,” Procedia Comput. Sci., vol. 57, pp. 1005–1014, 2015. [3]. N. Wang and H. Zhu, “An energy efficient algrithm based onLEACH protocol,” Proc. - 2012 Int. Conf. Comput. Sci. Electron. Eng. ICCSEE 2012, vol. 2, pp. 339–342, 2012. [4]. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., vol. 00, no. c, pp. 3005–3014, 2000. [5]. J. Gnanambigai, N. Rengarajan, and K. Anbukkarasi, “Leach and Its Descendant Protocols : A Survey,” Int. J. Commun. Comput. Technol., vol. 01, no. 3, pp. 15–21, 2012. [6]. A. Braman and G. R. Umapathi, “A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks : A survey,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 3, no. 2, pp. 5683–5690, 2014. [7]. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Trans. Wirel. Commun., vol. 1, no. 4, pp. 660–670, 2002. [8]. Dembla.D Shivam .H: Analysis and Implementation of Improved - LEACH protocol for Wireless Sensor Network (I-LEACH).In: IJCSC,IJ, Vol. 4,No. 2, pp.8-12, September, 2013. [9]. hu.D,Cai.D:Research and simulation of energy efficient protocol for wireless sensor network. In: Proc. 2nd International Conference on Computer Engineering and Technology, Quanzhou, China, 2010. [10]. Qian .L, Zhu.H: An Energy Balanced Clustering Algorithm Based on LEACH Protocol. In: Proceedings of the 2nd International Conference On Systems Engineering and Modeling (ICSEM-13), Paris, France, pp-72-73, 2013 [11]. Jiman .H and Joongjin .K: T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks,” published in springer Inf Syst Front, DOI 10.1007/s10796-008-9121-4
Kiranjot, Er. Manoj Kumar "Review Paper on LEACH and Its Descendant Protocols in Wireless Sensor Networks" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.42-45 2017
Nowadays the users of android mobile are increasing rapidly, the works done by PCs are being implemented in smart phones. So E-learning is enhanced by M-learning. However, managing the exam and providing the security in open environment where each student has his/her own android device connected to a Wi-Fi network through which it is further connected to the internet can be a most challenging task. In such environments, various vulnerabilities may occur which may violate the exam such as students can exchange information over the network during exam time. Hence this paper aims to identify such vulnerabilities and provide the appropriate security services to ensure exam security.
- Page(s): 46-49
- Date of Publication: 20 May 2017
- Ramesh NagalDepartment of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Prakash NemkulDepartment of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Dipesh Kr. MandalDepartment of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Naveen KumarDepartment of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
- Asha JosephDepartment of Computer Science & Engineering, Bangalore Technological Institute, 560035, India
References
[1]. Sanjay Kumar Singh, Arvind Kumar Tiwari, “Design and Implementation of Secure Computer Based Examination System Based on B/S Structure” International Journal of Applied Engineering Research ISSN, 2016 [2]. Deepankar Vishwas Kotwal1, Shubham Rajendra Bhadke “Online Examination System” International Research Journal of Engineering and Technology (IRJET), 2016 [3]. Yushuang Dong, Yingqun Liu,Beijing, “Design of Multi-Terminal Mobile Learning Platform” International Conference on Educational Innovation through Technology, 2016 [4]. N.Sendhil Kumar, Agarapu Raghavendra, “Secure Online Examination Management System Using Firewall Settings” SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) – volume 2 issue 5 May 2015 [5]. Hongmei Nie,” Design and Development of the Online Examination System Based on B/S Structure” 2nd International Conference on Teaching and Computational Science(ICTCS), 2014 [6]. Kaiiali M., Ozkaya A., Altun H., Haddad H., & Alier M. (2016).Designing a secure exam management system (SEMS) for M-learning environments. IEEE Transaction on learning Technologies, 9(3), 258-271 [7]. www.wikepedia.com
Ramesh Nagal, Prakash Nemkul, Dipesh Kr. Mandal, Naveen Kumar, Asha Joseph "Android based Secure Exam Management System to Prevent Impersonation" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.46-49 2017
In this paper we are proposing for smart inverter integrating with raspberry pi which makes smart home .In this work a bi-level (Supervisory-Local) PV based micro grid configuration is proposed for low power residential applications. In the supervisory level a long-term control scheme is assigned to define the set points for local controllers. The local level is mainly formed from a set of controllers which are basically responsible to control the power electronic interfaces and converters. Within the supervisory level a dynamic price scheduling framework with load and solar energy forecasting is implemented using time series-based regression technique. In the local level, adaptive double mode controllers are developed to realize intelligent inverters with smart grid-tied (GT) capabilities and smooth transition between GT and stand-alone modes.
- Page(s): 50-53
- Date of Publication: 20 May 2017
- Megha A JoshiDepartment of Electrical and Electronics Engineering, Dr.Sri Sri Sri Shivakumara Mahaswamy College of Engineering, Visvesvaraya Technological University, Karnataka, India
- Kavyashree SDepartment of Electrical and Electronics Engineering, Dr.Sri Sri Sri Shivakumara Mahaswamy College of Engineering, Visvesvaraya Technological University, Karnataka, India
References
[1]. Charles Severence, “Eben Upton: Raspberry Pi”, vol.46, NO.10, pp. 14-16, 2013. [2]. “ An IOT based Smart Inverter” IEEE International Conference On Recent Trends In Electronics Information Communication Technology [3]. Raspberry pi , https://en.wikipedia.org/wiki/Raspberry_Pi [4]. “https://www.solarpowerworldonline.com/2014/01/smart-solar-inverter/”, for solar smart inverter. [5]. Vamsikrishna Patchava, Hari Babu Kandala,, P Ravi Babu, “ A Smart Home Automation Technique with Rasp-berry Pi using IoT”. 2015 International Conference on Smart Sensors and Systems. [6]. “https://en.wikipedia.org/wiki/Buck%E2%80%93Boost_converter” Buck Boost conveter . [7]. Inverter ,“Power Electronics” from the text book of Mohammed Rashid
Megha A Joshi, Kavyashree S "IOT Based Smart Inverter Using Raspberry PI " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.50-53 2017
Most of the transportation and commercial activities are carried by railway network. Any trouble in this transportation increases crucial damage to the society also loss of human life. In general railway system to operate flawlessly constant monitoring of railway tracks, obstacle detection on the railway tracks and proper railway gate opening and closing without error is required. Currently railway track monitoring, obstacle detection and railway gate opening and closing is all done manually which is time consuming and not accurate, which involves high human errors. The monitoring process involves time and manpower for thousands of miles. Our proposed system is designed for continuous monitoring of railway track for crack detection and obstacles at the railway tracks using a combination of sensors. These sensors collect data and through computational false analysis the crack and obstacles are identified at the railway track. The collected data can help in finding the crack and obstacle at the railway track and avoid the major accidents of railway. In addition to it this prototype also provides an automated gate opening and closing system. This system saves time and is designed with low cost.
- Page(s): 54-56
- Date of Publication: 20 May 2017
- Chandra Shekar N BE in Electronic & Communication Engg, Bangalore Technological Institute, Bangalore, Karnataka, India
- Ashwin Santhosh BE in Electronic & Communication Engg, Bangalore Technological Institute, Bangalore, Karnataka, India
- Vidya D BE in Electronic & Communication Engg, Bangalore Technological Institute, Bangalore, Karnataka, India
- Punith H P BE in Electronic & Communication Engg, Bangalore Technological Institute, Bangalore, Karnataka, India
- Darshitha KS Assistant Professor, Department of Electronic & Communication Engg,Bangalore Technological Institute, Bangalore, Karnataka, India
References
[1]. G. Kohila Warnan and R. Balamurugan, “ Prevention of Train Accidents using Android supported Embedded Systems”, Indian Journal of Science and Technology 2016. [2]. Rajesh L V, Manjunath G Asuti and Mukunda Swamy M S, “Crack Detection and Collision Avoidance in Railway using ARM CORTEX”, IRF International conference 2016. [3]. Pranav Lad and Mansi Pawar, “Evolution of Railway Track Crack Detection System”, Robotics and Manufacturing Automation(ROMA), 2nd IEEE international symposium, 2016. [4]. Fatima Imdad, Muhammad Tabish Niaz and Hyung Seok Kim, “ Railway Track Structural Health Monitoring System”, 15th International Conference on Control, Automation and Systems 2015. [5]. Karthik Krishnamurthi, Monica Bobby, Vidya V and Edwin Baby, “Sensor based automatic control of railway gates” International Journal of Advanced Research in Computer Engineering & Technology 2015
Chandra Shekar N, Ashwin Santhosh, Vidya D, Punith H P, Darshitha KS "Railway Track Structural Health Analyzing System" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.54-56 2017
This paper presents the methodology for the selection of optimal conductors and reconductoring, in radial distribution systems by comparative study of the results obtained by conventional or incremental cost method and Genetic algorithm method (GA).The objective is to minimize the cost of distribution network and minimize the power losses in the system and to maximize the total saving in cost of conducting material while maintaining the acceptable voltage levels. The conductor and reconductoring, which is determined by genetic algorithm method will satisfy not only the maximum current carrying capacity and maintain acceptable voltage limits. It is observed that the Genetic Algorithm gives more optimised cost as compared to conventional method.
- Page(s): 57-60
- Date of Publication: 20 May 2017
- Ravi Ranjan KumarRadha Raman Engineering College, Bhopal, Madhya Pradesh, India
- Uttam KumarAssistant Professor, Department of Electrical Engineering, RCIT, Bishrampur, Kosiar, Jharkhand, India
- Ravi Kumar RajalwalAssistant Professor, Department of Electrical Engineering, Radha Raman Engineering College, Bhopal, Madhya Pradesh, India
References
[1]. Ponnavaikko M, Prakash Rao KS. Optimal distribution system planning. IEEE Trans PAS 1981;101(6):2969–77. [2]. Fawzi TH, Ali KF, EI-Sobki SM. A new planning model for distribution systems. IEEE Trans PAS 1983;102(9):3010–7. [3]. Gonen T, Ramirez-Rosado IJ. Optimal multi-stage planning of power distribution systems. IEEE Trans PWRD 1987;2(2): 512–9. [4]. Nara K, Satoh T, Aoki K, Kitagawa M. Multi-year expansion planning for distribution systems. IEEE Trans PWRS 1991;6(3):952–8. [5]. Nara K, Satoh T, Kuwabara H, Aoki K, Kitagawa M, Ishihara T. Distribution systems expansion planning by multi-stage branch exchange. IEEE Trans PAS 1992;7(1):208–14. [6]. Houser AWF, Huber RP. A method for determining economical ACSR conductor sizes for distribution systems. AIEE Trans PAS 1955;PAS-74:479–83. [7]. Ponnavaikko M, Prakash Rao KS. An approach to optimal distribution system planning through conductor gradation. IEEE Trans PAS 1982;101(6):1735–9. [8]. Nagendra Rao PS. An extremely simple method of determining optimal conductor selection for radial distribution feeders. IEEE Trans PAS 1985;104(6):1439–42. [9]. Tram HN, Wall DL. Optimal conductor selection in planning radial distribution systems. IEEE Trans PWRS 1988;3(1):200–6. [10]. Wang Z, Liu H, Yu DC, Wang X, Song H. A practical approach to the conductor size selection in planning radial distribution systems. IEEE Trans PWRD 2000;15(1):350–4. [11]. Pansisni AJ. Electrical distribution engineering book. New York: McGraw-Hill Press; 1983. [12]. Willis HL. Power distribution planning reference book. New York: Marcel Dekker Press; 1997 [13]. Kumar Ranjan Ravi,Rajalwal Kumar Ravi. Genetic Algorithm BasedScheduling Of Reconductoring For Multistage Power Distribution System Planning
Ravi Ranjan Kumar, Uttam Kumar, Ravi Kumar Rajalwal "Dynamic Programming (G.A) & Incremental Approach Comparison for Reconductoring of Radial Distribution System" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.57-60 2017
The mission of this project is to successfully apply this implementation in all sizes of educational organizations. Our corporate promises are; 1. Provide excellent human-machine relationship. 2. Provide the ability for robots to draw/write study related documents or figures. 3. Substantial growth in the field of e-learning. Our primary objective is to put forth vulnerable changes in educational environment by developing a new masterpiece that not only brings changes in mentioned field but also in the stream of ROBOTICS. Based on the user commands, the arm will be able to draw/write anything the user wishes to. This effort would definitely cause drastic change in e-learning .
- Page(s): 61-65
- Date of Publication: 20 May 2017
- Sharada PNAssistant Professor, Department of Electronics & Communication, KNS Institute of Technology, Karnataka, India
- Narasimha Muthy RMDepartment of Electronics & Communication, KNS Institute of Technology, Karnataka, India
References
[1]. [IEEE] DOVE: Drawing over video environment, School of Computer Science, Carnage Mellon University, Pittsburgh. [2]. [IEEE] ROBOT BY VOICE: experiment on commanding an industrial robot using the human voice, university of Coimbra Portugal. [3]. [URL]: www.Arduino.cc [4]. [URL]: circuitsonly.com [5]. [URL]:https://handhua.wordpress.com [6]. [URL]: www.VeeaR.eu [7]. [URL]: https://cslibrary.stanford.edu/101/ [8]. [BOOK] Robotics control, sensing, vision and intelligence, Authors: K.S Fu, R.C Gonzalez, C.S.G Lee [9]. Arduino programming notebook: Written and compiled by Brian W Evans
Sharada PN, Narasimha Muthy RM "Voice Recognised Freehand Drawing Robotic Arm" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.61-65 2017
QR codes, developed by a Japanese company, have been around for over fifteen years. With the advent of smart and Web capable mobile devices, we witness a steady growth of interesting commercial applications using QR codes. The main objective of our project is to provide people with a technology that can enable them to obtain information about anything by simply scanning the QR code. The scanning result in obtaining the text information of a particular specimen and this information is further converted into speech using specialized software.
- Page(s): 66-69
- Date of Publication: 20 May 2017
- Deepak MoortyElectronics and Communication Engineering, VVIET, Mysuru, Karnataka, India
- Munazza RumanElectronics and Communication Engineering, VVIET, Mysuru, Karnataka, India
- Nauman IrfanElectronics and Communication Engineering, VVIET, Mysuru, Karnataka, India
- Aishwarya K.RElectronics and Communication Engineering, VVIET, Mysuru, Karnataka, India
References
[1]. C. Law and S. So, “QR Codes in Education”, Journal Of Educational Technology Development and Exchange, Vol. 3, No. 1, PP. (85-100), (2010). [2]. “Recognition of QR code by Mobile phones”, Yue Liu, Ju Yang and Mingjun Liu 2008 Chinese Control and Decision Conference, 2008 [3]. “Design and Implementation of Text To Speech Conversion for Visually Impaired People”, Itunuoluwa Isewon, Jelili Oyelade and Olufunke Oladipupo. [4]. “QR Code Technologies in Museum Exhibitions”, Sandra Medić, Nataša Pavlović* Received: July 2014 |Accepted: September 2014 [5]. “Design and Generation of Speech Generation System Using Matlab” International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 6, December 2014 [6]. A Survey on QR Codes: in context of Research and Application Kinjal H. Pandya, Hiren J. Galiyawala, International Journal of merging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 3, March 2014) [7]. “Evaluating the Use of Quick Response (QR) Code at Sulaimani University Libraries”, Ako Muhammad Abdullah*, Roza Hikmat Hama Aziz [8]. Implementation of Text to Speech Conversion, Chaw Su Thu Thu, Theingi Zin, Department of Electronic Engineering, Mandalay Technological University, Mandalay, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 3, March - 2014 [9]. “QR code, Wikipedia”, https://en.wikipedia.org/wiki/QR_code [Online] [Retrieved 2102-02-09] [10]. H. Hanks, “Successful Scanning: A Guide to QR Code Best Practices”, (2012), The Agency Inside, PP. (1-18), [Online] Available: https://www.hartehanks.com/static/ base/ qr code- wp.pdf
Deepak Moorty, Munazza Ruman, Nauman Irfan, Aishwarya K.R "QR Code Based Text To Speech Conversion" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.66-69 2017
This paper presents research that investigates the effects of mental fatigue on brain activity using electroencephalogram (EEG) signals. Since EEG signals are considered to be non-stationary, time-frequency analysis has frequently been used for analysis. The S-transform is a time-frequency analysis method and is used in this paper to analyze EEG signals during fatigue state. The output is compared with the EEG signals that are stored already in the system, so as to give the alert to the user about the fatigue state.
- Page(s): 70-72
- Date of Publication: 20 May 2017
- Madhukar B NECE Department, New Horizon College of Engineering, Bengaluru, Karnataka, India
- Aksharamurali NECE Department, New Horizon College of Engineering, Bengaluru, Karnataka, India
- Kevin GonsalvesECE Department, New Horizon College of Engineering, Bengaluru, Karnataka, India
- Akhila VenugopalECE Department, New Horizon College of Engineering, Bengaluru, Karnataka, India
References
[1]. "Analyzing neural time series data," by Mike X Cohen. [2]. "EEG signal processing," by Saeid Sanei and J.A. Chambers. [3]. "S transforms: time frequency analysis and filtering," by Nitin V George. [4]. A. Craig, Y.Tran, N.Wijesuria, & H. Nguyen, "Regional brain wave activity changes associated with fatigue," Psychophysiol. vol 49: 574-582, 2012. [5]. S.Ventosa, C.Simone, M.Schimmel, J.J.Danobeitia, & A.Manuel "The S-transform from a wavelet point of view," IEEE Trans Signal Processing, vol 56:2771-2780, 2008. [6]. S. M. Mallat, “A Wavelet Tour of Signal Processing,” 2nd Edition, Reed – Elsevier India Private Limited, New Delhi, India, 2007.
Madhukar B N, Aksharamurali N, Kevin Gonsalves, Akhila Venugopal "Measuring a Mental Fatigue State by Analysis of EEG Signal Using S-transforms" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.70-72 2017
Use of solar radiations is the major obstacle in the application of thermal energy. Solar energy is one of the cleaner forms of renewable energy assets which achieve the need of people in the field of thermal energy. The study shows the use of solar energy with the help of CFD Analysis involving evacuated tube heat pipe which transforming radiation energy into useful heat. Presently use of nanofluids in solar thermal technology for heat transfer improvement is focus of interest. Geometry consists of two heat pipes. The working fluid used for heat pipe is water and Al2O3 respectively. The analysis conducted in ANSYS FLUENT 17. Temperatures at the outlet measured for both the cases. The heat absorption rate was more in the unit consisting Al2O3 as a working fluid inside the heat pipe. Thermal performance of nanofluid contains evacuated tube heat pipe solar water heater is improved than conventional evacuated tube heat pipe solar water heater (SWH). Also the effect of mass flow rate over the condenser and inclination angle on performance of evacuated tube heat pipe is also studied.
- Page(s): 73-77
- Date of Publication: 20 May 2017
- Prof. V. Y. ChaudharyDepartment of Mechanical Engineering, TSSM’s PVPIT, Pune University, India
- Bharat KalamkarDepartment of Mechanical Engineering, TSSM’s PVPIT, Pune University, India
- Prashant PatelDepartment of Mechanical Engineering, TSSM’s PVPIT, Pune University, India
- Jignesh MaliDepartment of Mechanical Engineering, TSSM’s PVPIT, Pune University, India
- Pratik PatelDepartment of Mechanical Engineering, TSSM’s PVPIT, Pune University, India
References
[1] Dao Danh Tung, Shuichi Torii (2011), Heat transfer performance of a self-oscillating heat pipe using pure water and effect of inclination to this performance, Department of Mechanical System Engineering, Kumamoto University, 2-39-1 Kurokami, Kumamoto 860-8555, Japan. [2] Shubhro Sen (2013), Performance of heat pipes using nanofluids-a review, International Journal of Emerging Trends in Engineering and Development, Issue 3, Vol.6 (November 2013), ISSN 2249-6149. [3] Javad Ghaderian, Nor Azwadi Che Sidik (2017), An experimental investigation on the effect of Al2O3/distilled water nanofluid on the energy efficiency of evacuated tube solar collector, International Journal of heat and mass transfer, 108 (2017) 972–987. [4] Stephen U.S.Choi and Jeffrey A (1995), Enhancing Thermal Conductivity of Fluids with Nanoparticles. [5] R. Shanthi, R.Velraj (2014), Performance of Two Phase Gravity Assisted Thermosyphon using Nanofluids, Frotiers In Heat Pipes (FHP), ISSN: 2155-658X. [6] Vishal A. Barmate, Vishal A. Meshram, Hemant V. Darokar (2016), Performance Analysis of Evacuated Tube Heat Pipe Solar Water Heating System using Nanofluid coupled with parabolic Trough Concentrator, International Journal for Scientific Research & Development| Vol. 4, Issue 10, ISSN (online): 2321-0613. [7] M.A. Sabiha (2015), Theoretical model of an evacuated tube heat pipe solar collector integrated with phase change material, International Journal of Heat and Mass Transfer, Energy 91 (2015) 911-924. [8] Lin Lu, Zhen-Hua Liu, Hong-Sheng Xiao (2011), Thermal performance of an open thermosyphon using nanofluids for high-temperature evacuated tubular solar collectors Part 1: Indoor experiment, Solar Energy 85 (2011) 379–387. [9] Alireza Aghaei, Ganbar Ali Sheikhzadeh, Majid Dastmalchi, Hamed Forozande (2015), Numerical investigation of turbulent forced-convective heat transfer of Al2O3–water nanofluid with variable properties in tube, Ain Shams Engineering Journal (2015) 6, 577–585. [10] S. Suresh, K.P. Venkitaraj, P. Selvakumar, M. Chandrasekar (2012), A comparison of thermal characteristics of Al2O3/water and CuO/water nanofluids in transition flow through a straight circular duct fitted with helical screw tape inserts, Experimental Thermal and Fluid Science 39 (2012) 37–44. [11] Dharmendra kumar Saini, Ghanshayam Das Agarwal (2005), Thermo-Physical Properties of Nano Fluids, International Journal of Advances in Engineering Science and Technology, ISSN:2321-0613
Prof. V. Y. Chaudhary, Bharat Kalamkar, Prashant Patel, Jignesh Mali, Pratik Patel "CFD Analysis of Evacuated Tube Heat Pipe Solar Water Heater" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.6 issue 5S, pp.73-77 2017