Accepted Papers

  • Design and Development of MCS-51 Microcontroller Based Industrial Automation and Control System using Controller Area Network (CAN) protocol
    A.Devi and G.Gnanavel, V.R.S. College of engineering, India

    When we consider an industry of large area the monitoring, controlling of each section involved in the industry is a big task. It involves a large amount of man power and time consumption. To overcome these above factors we developed this technology makes use of single person for monitoring and controlling the entire network. This can be achieved by the combination of a wired technology i.e. controller area network (CAN) bus network, and the MCS-51 microcontroller which are the main objectives of our paper. The MCS-51 and the CAN protocol are cost effective, and the CAN protocol is used in various applications like industries, automobiles and home. The software part is done in Keil IDE and Jet Flasher. Hardware is implemented and software porting is done.

  • 3-D Real-Time Image Matching Based on Kinect Skeleton
    Jingxuan Chen, Tianchu Guo and Xiaouyu Wu, Communication University of China, China

    We present a 3-D real-time image matching system based on the skeleton tracking module of Kinect Sensor. To determine an optimal correspondence between real-time and standard image data, we use a dimensional angular representation as a descriptor of the skeleton designed for recogintion robustness under noisy input. And we compute a distance metric to evaluate the difference in motion between the poser's body and the template. The grading formula for image matching is adaptively based on our experimental data, which makes our system stands a high accuracy under input noise from the real-time depth sensor.

  • Machine Vision Based Automatic Fruit Grading System using Fuzzy
    Chandra Sekhar Nandi1, Chiranjib Koley2 and Bipan Tudu3, 1The University of Burdwan, India, 2National Institute of Technology-Drugapur, India and 3Jadavpur University, India

    The present paper proposes a machine vision based scheme for automatic grading of fruits according to their maturity level and quality. The fruit used in the study is mango (Mangifera Indica L.). The manual grading by visual inspection poses problems in maintaining consistency and accuracy; this is also time consuming and labor intensive process. In this project a new prototype computer vision based automatic fruit grading systems is proposed. The automated system collect video image from the CCD camera placed on the top of a conveyer belt carrying mangoes, then it process the images in order to collects several relevant features which are sensitive to the maturity level and quality. Finally fuzzy rule based algorithm is used to sort the fruits into four grades.

  • RF-Based Smart Solution for Underground Mine Safety
    Shabina.S, K.Ramakrishnan College of Engineering, India

    The mining industry across the world is affected by disasters including fire hazards, emission of toxic gases like methane. The main objective of this paper is a cost effective RF based wireless supervising system. This scheme uses intelligent helmets as ultra-low-power nodes of wireless sensor network. The programmer adopted RF wireless technology to build wireless sensor network, realized real-time surveillance with early warning intelligence on methane, temperature, humidity in working area, and used programmed alarm sounds communication to reduce potential safety problems. IF based wireless networks and sensors are recently investigated due to their remote environment monitoring capabilities. Such a network can easily collect sensor data and transmit them by RF. Combining these advantages, a smart new helmet as a mobile node of RF wireless sensor networks, gathering parameters from working area timely and timely and quickly. It is convenient for centralized environment parameters, so potential safety problems can be avoided by early-warning intelligence. The wireless sensor networks and the RF technology are combined to provide Real-time sensing and Real-time Locating system, respectively. It has been presented the original design of the low power RF wireless sensor system with an extremely reduced cost. It is reliable system with quick and installation. The system might be easily extended with IR tag wireless positioning devices in it. The design provides three modules, namely helmet module, localizer module, and control room module. The helmet module contains various sensors, microcontroller, antennas, encoders, decoders, etc. The control room module includes antennas, PC, decoder, etc. The sensors are used to measure the variations in the temperature, humidity, pressure, fire and take decisions to take required actions based on the measured data to ensure the safety of the underground mine. The RF technology also ensures the localization of the mine workers. Thus the proposed system ensures safety and reliable wireless communication inside the underground mines.

  • Automatic Depth Estimation for 2D-3D Conversion in 3D Display
    C.Pavithra, M.Kavitha and E.Kannan, Vel Tech University, India

    The 2D-3D conversion requires 2D content to convert into 3D display. The conversion process consists of depth map generation, it estimates the 3D geometry of the scene and also rendering, finally it produces output stereo images. In Existing system, the hybrid algorithm is used for 2Dto-3D conversion in 3D displays. It solves the problem of traditional 2D video contents which needs to generate 3D effects in 3D displays [1]. We propose automatic depth estimation, depth propagation and stereo generation; it uses adaptive decimation and guided interpolation to refine the depth map. This approach eliminates unnecessary textures and keeps an object boundary on the depth map. On the refined depth map an object which consisting the transition of depth values is smooth. In depth map the object boundaries are aligned on the input image, and the foreground scene can be clearly separated from the background scene. These characteristics on the depth map help to achieve improved 3D visual perception. While comparing with the traditional approach, our proposed algorithm will improve the taint present in the 2D Content and the computational complexities are low.

  • The Impact of Location Based Attacks on Geographical Routing Protocols
    Muthusenthil.B1 and S. Murugavalli2, 1Valliammai Engineering College, India and 2Panimalar Engineering College, India

    Several applications of mobile ad hoc network select geographical routing especially Greedy Perimeter Stateless Routing (GPSR) protocol due to its scalability, efficiency and ability to support location based applications. However, there are many security issues in protecting location information and this information can be easily abused by the attackers. Location based adversarial activities affect the operation and performance of geographical routing protocols. There are only few works on the literature that studied the impact of location based attacks in the geographical routing. This work analyzes the impact of malicious nodes on the GPSR performance associated with fake location. This proposal identifies a set of possible location based attacks and analyzes the local problems that arise from the location based adversarial activities. Finally, it demonstrates the overall impact on the routing performance through simulating the network with various attack scenarios. This study illustrates the effect of the adversarial activities with respect to packet delivery ratio, overhead, average end-to-end delay, routing loops, packet dropping probability, and location error rate. The simulation results concluded that the overall routing performance degrades, depending on the type and percentage of adversaries.

  • IRED Algorithm for Improvement in Performance of Mobile Ad Hoc Networks
    Sarita Simaiya, Anurag Shrivastava and Narayan Prasad Keer, NIRT Engineering College, India

    In Mobile Ad hoc networks (MANET) traditional congestion control mechanism such as RED encounters with new challenges such as high packet drop ratio, degradation of throughput and frequent link failures. Congestion in a network occurs when the demand on the network resources is greater than the available resources and due to increasing mismatch in link speeds caused by intermixing of heterogeneous network technologies. Queue management provides a mechanism for protecting individual flows from congestion. One of the technique which uses Active Queue Management technique is RED. The basic idea behind RED queue management is to detect incipient congestion early and to convey congestion notification to the end hosts. The basic philosophy behind RED is to prevent congestion. This paper presents dynamic weight parameter Dq with probability Pq to increase the performance of RED, also introduces a new range variable and improve priority queue with existing RED algorithm for improvement in performance of networks. Once the common queue length is close to the minimum threshold value with probability Pb, Improve RED automatically sets queue parameter according to queue conditions and handles queuing delay and improve throughput.

  • Analysing the effect of cluster strategies in multicast traffic using TAM protocol for Ad-hoc networks
    S. Deepakraj and R. Thamilselvan, Kongu Engineering College, India

    Ad-hoc networks generally play a vital role in emerging technologies. The limited communication and computation resources, the unguaranteed connectivity to trusted authorities make known security solutions for wired networks. A novel Tiered Authentication scheme for Multicast traffic (TAM) for large scale of ad-hoc networks. Nodes are grouped into the cluster. Cross-cluster multicast traffic includes a Message Authentication Codes (MAC) that is based on set of keys. Each cluster uses unique subset of keys. TAM is combination of secret information asymmetry and the time information asymmetry for inter and intra cluster networks. The topologies are flat, spanning tree, balanced tree used to reduce bandwidth overhead and delivery delay. These topologies are compared for numerical and analytical results demonstrate advantage of TAM.

  • An Adaptive Contrast Enhancement of Colored Foggy Images
    S. Mohanram and T. Joyce Selva Hephzibahm, Indus College of Engineering, India

    An Adaptive Contrast image enhancement is proposed for degraded color images. The fogs are removed in two concerns, at initial stage the foggy image information's are extracted which means that HIS components are obtained by converting RGB component from an input image. At second stage the Intensity (I) has been calculated by contrast enhancement and then adjusted with the value of atmospheric light. After completion of morphological operation the fog is slightly removed from an source image. It is observed that transmission ratio is not perfect for the output of calculated atmospheric light and morphological operation. Because the fog is still exist according to the distance of the object. Moreover the gamma adjustment is made for image which comes from fulfillment operation of transmission ratio and morphological operation. Finally the enhanced defogging image has been obtained as a required or goal output. The resultant image has increased efficiency and reduced system computation time. The proposed method overcomes the drawbacks of retinex method of theory approach.

  • Link-Stability and Energy Aware Routing Protocol in Wireless Networks
    P. Yazhini and R.Rajadevi, Kongu Engineering College, India

    A mobile ad hoc network (MANET) is an autonomous collection of mobile nodes that communicate over relatively bandwidth constrained wireless links. Link changes occur frequently and there is a limited bandwidth that makes the communication challengeable. The existing routing protocol like DSR, AODV selects the shortest path between the source and destination. It won't check the stability of the link for flooding. So there is a chance of link failure. Recovering from the failure of the link in MANET leads to more energy consumption. The problem of link failure can be overcome by an approach called Link Stability and Energy aware routing. Link Stability and Energy aware routing algorithm is used. The Delivery Probability based Route Stability protocol describes the node mobility the energy efficiency in the network. Here the stability of the link is determined by the residual energy of the nodes in the network. So the chance of the link failure is reduced and the energy of the nodes is saved. The protocol performance has been evaluated in terms of Collision rate and Average energy consumption.

  • An Effective Cluster Score Job Scheduling Algorithm for Grid Computing
    Vinodhini.N and Kamalam.G.K, Kongu Engineering College, India

    Grid computing is the collection of computer resources from multiple locations to reach a common goal. Distributed computing supports resource sharing. Parallel computing supports computing power. Grid computing aims to harness the power of both distributed computing and parallel computing. Grid can achieve the same level of computing power as a supercomputer does, also with a lowest cost. Grid is also a heterogeneous system. Grid comprises a collection of clusters. Scheduling independent task is more complicated in grid environment. In order to utilize the power of grid computing efficiently, an Adaptive Scoring Job Scheduling Algorithm (ASJS) assigns job to the resources by calculating the cluster scores. Cluster score is defined as the weighted value of the Average Transmission Power and Average Computing Power of cluster. An ASJS Algorithm is used to reduce the completion time of the submitted job, which may compose of computing-intensive jobs and data-intensive jobs in a grid environment.

  • A Survey on Data Stream Mining
    Poonam Debnath, University of Pune, India

    Traditional databases store sets of relatively static records without the concept of time, unless timestamp attributes are explicitly added. Limitations of traditional DBMSs in supporting streaming applications have been understood, prompting research to supplement existing technologies and build new systems to manage streaming data. At present a growing number of applications that generate massive streams of data need intelligent data processing and online analysis. The impending need for turning such data into useful information and knowledge augments the development of algorithms and frameworks that address streaming challenges. The pre processing, storage, querying and mining of such data sets are highly computationally challenging tasks. Mining data streams implies extracting knowledge structures represented in models and patterns in non stopping streams of information. In this paper, I present the theoretical foundations of data stream analysis and identify potential stream mining techniques.

  • Detection of Data Leakage in Cloud Computing Environment
    Neeraj Kumar, Vijay Katta and Himanshu Mishra, Hindustan College of Science & Technology, India

    In the recent business year's, internet has become very popular for any organization and every organization maximizing the use of this facility for improving their services like transferring the computer resource files form one place to different place with fast and reduced cost. But it becomes problem when any employee working in the organization exposed the critical data of that organization. This problem is concerned as data leakage this paper we are focusing on the problem of data leakage. Critical data of the organization has a value for the organization if suppose any one leaks this data in the public place in unauthorized manner it will down the reputation of the organization. So, in this paper we are proposing a model which will cover the data leakage problem. We are using the watermarking technique in order to identify the client's, anyone who has leaked the data.

  • Underwater Remotely Operated Vehicle
    C.V. Dayakar, A.L. Hari Prasath, T.Kingston and K. Karthick, Velammal Engineering College, India

    The main focus is to design a low cost Underwater Robot that is capable of exploring underwater environment and save invaluable human lives. This robot helps to assist underwater rescue activities and underwater surveillances. The existences of such robots are a rare sight. It can help in the monitoring of remote and unprotected areas underwater. This robot overcomes the disadvantages of conventional ROVs by its unique electrical and mechanical design. It has been designed in such a way that it will be an excellent platform for further development.

AIRCC Library


Technically Sponsored by