Conference Proceedings

Conference Id
:
GRDCF002
Organized By
:
K. L. N. College of Engineering
Date
:
6h & 7th April, 2016
Venue
:
K.L.N. College of Engineering, Pottapalayam - 630 612, Sivagangai District, Tamilnadu, India
 
Title
:
POWER FACTOR IMPROVEMENT IN THE RUBBER INDUSTRY USING FUZZY LOGIC
Article Type
:
Conference Article
Author Name(s)
:
P.Loganthurai, K.L.N College of Engineering ; L.Jayamala ,
Country
:
India
Research Area
:
Electrical engineering

Indian industry is paying one of the highest power tariffs in the world due to the poor quality and lack of power generation, transmission and distribution management. Recent advancements for higher power generation, lesser transmission and distribution cost and saving of energy can benefit significantly by improving the power system through energy efficiency at all levels. The electric billing is a two part tariff, the first part is unit (kWh) cost and the second part is maximum demand (kVA) cost. The maximum demand cost can be reduced by improving power factor. The overall power factor of modern industrial plants is low because of induction motors absorbing more reactive power. When power factor is improved, the reactive power necessary to supply the useful (real) power is automatically reduced. This results in the reduction of maximum demand (kVA) of the entire industrial plant. All the H.T (High Tension) consumers should maintain the power factor above 0.95 in order to avoid the penalization in their electricity bill. In many industries, they are maintaining good power factor (PF) at the incoming terminal of power lines using automatic power factor corrector but measuring power factor at the load side, it is low. Thus, in this proposed work the distributed power factor correction method is used to maintain good power factor at the load side. To select the suitable size of capacitor for compensating the reactive power requirement of induction motors, the Fuzzy Logic (FL) has been used.

Keywords : DSM, Power factor improvement, Fuzzy logic

Recent

[1] P. Garg , ' Energy Scenario and Vision 2020 in India ' , Journal of Sustainable Energy & Environment, 2012,vol. 3, pp. 7-17. [2] Z. Qi, C. Jiu-ju, S. Jun and L. Wen-chao , ' Study on Energy Efficiency and Energy Management in Integrated Iron and Steel Works ',International Conference on Energy and Environment Technology,2009 vol. 88, pp.341-343. [3] K. Hoinka and A. Ziebik , ' Mathematical model for the choice of an energy management structure of complex buildings ' , Energy,2010, vol. 35, pp. 1146-1156 [4] J. Terry Cousins , ' Using Time Of Use (Tou) Tariffs In Industrial, Commercial And Residential Applications Effectively. [5] 'Assignment on Implementation & Impact Analysis of Time of Day (TOD) tariff in India ' , Price water house Coopers India Private Limited, Regulatory Economics Advisory. [6] P. Dabur, G. Singh and N. K. Yadav, ' Electricity Demand Side Management: Various Concept and Prospects ' , International Journal of Recent Technology and Engineering (IJRTE),2012, ISSN: 2277-3878,Volume-1, pp. 1-6. [7] Introduction to Rubber Industry ,(2013), Rubber Skill Development Council 2013. [8] S. Senthilkumar , ' Evaluation and growing prospectus of indian rubber industry ' , Asian journal of multidimensional research, 2012, vol.1, pp. 47-59. [9] M. G. Sathees Chandran Nair,' Rubber Statistical News ' , vol . 73, No . 12 [10] K . Sapna , G . Vijay Kumar , 'Power Factor Improvement of Induction Motor by Using Capacitors', International Journal of Engineering Trends and Technology (IJETT), 2013,vol. 4 , pp. 2960-2970.

Title
:
ENHANCING EGRC USING ANOVA BASED CLUSTERING IN UNDERWATER SENSOR NETWORKS
Article Type
:
Conference Article
Author Name(s)
:
M. Raghini, K.L.N. College of Engineering; S. Lavanya ,; G. Nivetha ,; R. Priya Dharshini ,
Country
:
India
Research Area
:
Computer science and engineering

As reliability and efficient data transmission is the challenging factor in underwater sensor network, the application such as monitoring abnormal submarine pipelines becomes complex. Thus in the existing EGRC, the whole network which can be viewed as big cube is divided into small cube (SC) where SC is a cluster. To enhance the selection of optimal cluster-heads, we propose a new methodology DUAC which combines EGRC with ANOVA based clustering. In DUAC the node generating identical data sets are identified and aggregated the sets before sending them to the sink. Analysis and implementation results of DUAC enhance EGRC in terms of energy efficiency, reliability, end-to-end delay and power consumption.

Keywords : Energy efficient Grid Routing protocol based on 3D Cubes (EGRC), Analysis Of Variance (ANOVA), Data transmission Using ANOVA Clustering (DUAC)

Recent

[1] Kun Wang, Hui Gao, Xialing Xu, Jinfang Jiang, Dong Yue. “An Energy-efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Sensor Networks”. [2] Hassan Harb, Abdallah Makhoul, and Raphael Couturier. ” An Enhanced K-Means and ANOVA-Based Clustering Approach for Similarity Aggregation in Underwater Wireless Sensor Networks,” IEEE sensors journal, vol. 15, no. 10, oct 2015. [3] Han G J, Jiang J F, Shu L, et al.” An Attack-Resistant Trust Model based on Multidimensional trust Metrics in Underwater Acoustic Sensor Networks [J]”, IEEE Trans. Mobile Comput., 2015, 14(2): 1-14. [4] Lin H, H L, Lin H, et al. Exact and Heuristic Algorithms for Data-Gathering Cluster-Based Wireless Sensor Network Design Problem [J].IEEE/ACM Trans. Networking, 2014, 22(3):903 - 916. [5] Ovaliadis K, Savage N, and Tsiantos V. A new approach for a better recovery of cluster-head nodes in underwater sensor networks [C].Proceedings of the 2014 IEEE international Conference on Telecommunications and Multimedia (TEMU), 2014: 167-172. [6] Han Y, Tang J, Zhou Z B, et al. Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution [J].Pers. Ubiquit. Comput., 2014, 18(8): 1989-2001. [7] Goyal N, Dave M, and Verma A K. Fuzzy based clustering and aggregation technique for Under Water Wireless Sensor Networks [C]. Proceedings of the 2014 IEEE International Conference on Electronics and Communication Systems (ICECS), 2014: 1-5. [8] Ayaz M, Baig I, Abdullah A, et al. A survey on routing techniques in underwater wireless sensor networks [J].J. Nerv. Ment. Dis., 2011, 34(6):1908-1927. [9] Hu T and Fei Y. QELAR: a machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks [J].IEEE Trans. Mobile Comput., 2010, 9(6): 796-809. [10] Yuan F, Zhan Y, and Wang Y. Data Density Correlation Degree Clustering Method for Data Aggregation in WSN [J].IEEE Sensors J, 2014, 4(14):1089-1098. [11] Wang K and Guo H. An improved routing algorithm based on social link awareness in delay tolerant networks [J]. Wireless pers. commun.,2014, 75(1): 397-414. [12] Zhang S, Li D, and Chen J. A link-state based adaptive feedback routing for underwater acoustic sensor networks [J]. IEEE Sensors J,2013, 13(11): 4402-4412. [13] Han g, Zhang c, Shu l. Impacts of deployment strategies on localization performances in underwater acoustic sensor networks[J]. IEEE transactions on industrial electronics, 2015,62(3):1725-1733. [14] Ayaz M, Abdullah A, and Jung L T. Temporary cluster based routing for Underwater Wireless Sensor Networks [C]. Proceedings of the 2010.IEEE International Symposium in Information Technology (ITSim), 2010,2: 1009-1014. [15] Chi Y P and Chang H P. An energy-aware grid-based routing scheme for wireless sensor networks [J]. Telecommun. Syst., 2013, 54(4): 405-415. [16] Ren Y, Yu N, Guo X, et al. Cube-scan-based three dimensional localization for large-scale underwater wireless sensor networks [C]. Proceedings of the 2012 IEEE International Systems Conference (SysCon), 2012: 1-6. [17] lloret j, Garcia m, bri d, diaz j r, a cluster-based architecture to structure the topology of parallel wireless sensor networks, sensors, vol. 9, no. 12, pp. 10513-10544, 2009. [18] P. K. Gakare, A. M. Patel, J. R. Vaghela, and R. N. Awale, “Real time feature extraction of ECG signal on Android platform,” in Proc. IEEE Int. Conf. Commun., Inf., Comput. Technol. , Oct. 2012, pp. 1–5. [19] A. D Bakhshi, M. A. Maud, K. M. Aamir, and A. Loan, “Aggregate spectrogram based classification of Holter ECG signals for wireless sensor networks,” in Proc. IEEE ICET, Oct. 2012, pp. 1–6. [20] G. Liu and H. Yang, “Multiscale adaptive basis function modeling of spatiotemporal vector cardiogram signals,” IEEE J. Biomed. Health Informat. , vol. 17, no. 2, pp. 484–492, Mar. 2013. [21] D. He, C. Chen, S. Chan, J. Bu, and P. Zhang, “Secure and light-weight network admission and transmission protocol for body sensor networks,” IEEE J. Biomed. Health Informat., vol. 17, no. 3, pp. 664–674, May 2013.

Title
:
Tracking Coordinated and Adaptive Information using Security from Target Wireless sensor network
Article Type
:
Conference Article
Author Name(s)
:
P.Ramya, K.L.N College of Engineering; M.Satheesh Kumar ,; M.Kaveri ,
Country
:
India
Research Area
:
Computer science and engineering

Wireless sensor network (WSNs) consist of sensor node with sensing and communication capabilities. The important problem of WSNs applications is Energy conservation. Clustered sensor network uses cluster heads (CHs) for data gathering. In Target tracking applications, sensor nodes in multiple clusters do not uses a single target path, which leads to redundant data transmissions from CHs to the sink so much energy is to waste. In this paper we propose coordinated and adaptive information collecting strategy (CAICS) for Target tracking in clustered WSNs. In CAICS a coordinated node selection method considering the spatial correlation of sensing nodes is proposed to dynamically select the best set of nodes for tracking missions. And an adaptive aggregation node is selected for data collection to reduce the redundant data transmission and balance the energy cost. Experimental results exhibit that the proposed approach reduces the computational complexity of node selections without degrading tracking accuracy and achieves a significant energy consumption reduction and network lifetime extension compared with the state-of-the-art approaches.

Keywords : Energy Conservation, WSNs, Clustered sensor network, Target tracking, Adaptive, CAICS

Recent

[1] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan,“Energy efficient communication protocol for wireless micro sensor networks,” in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci.(HICSS),Jan. 2000, pp. 1–10. [2] A. A. Abbasia and M.Younis, “A survey on clustering algorithmsfor wireless sensor networks,” Comput. Commun., vol. 30, nos. 14–15,pp. 2826–2841, Oct. 2007. [3] H. Gao, H. Li, and Y. Cheng, “A hybrid relative distance based cluster scheme for energy efficiency in wireless sensor networks,” in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1–5. [4] R. Rajagopalan and P. K. Varshney, “Data-aggregation techniques in sensor networks: A survey,” IEEE Commun. Surveys Tuts., vol. 8, no. 4, pp. 48–63, Oct./Dec. 2006. [5] H. Chen, H. Mineno, and T. Mizuno, “Adaptive data aggregation scheme in clustered wireless sensor networks,” Comput. Commun., vol. 31, no. 15, pp. 3579–3585, Sep. 2008. [6] Liu and G. Cao, “Distributed monitoring and aggregation in wireless sensor networks,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9. [7] W. Lou, “An efficient N-to-1 multipath routing protocol in wireless sensor networks,” in Proc. IEEE Int. Conf. MASS, Washington, DC, USA, Nov. 2005, pp. 665–672. [8] K. Dasgupta, K. Kalpakis, and P. Namjoshi, “An efficient clustering–based heuristic for data gathering and aggregation in sensor networks,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Mar. 2003, pp. 468–474. [9] W.-P. Chen, J. C. Hou, and L. Sha, “Dynamic clustering for acoustic target tracking in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 3, no. 3, pp. 258–271, Jul./Aug. 2004. [10] G.-Y. Jin, X.-Y. Lu, and M.-S. Park, “Dynamic clustering for object tracking in wireless sensor networks,” in Ubiquitous Computing Systems (Lecture Notes in Computer Science), vol. 4239. Berlin, Germany: Springer-Verlag, 2006, pp. 200–209. [11] Q. Mamun, S. Ramakrishnan, and B.Srinivasan, “Selecting member nodes in a chain oriented WSN,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Apr. 2010, pp. 1–6. [12] N. Shrivastava, R. Mudumbai, U. Madhow, and S. Suri, “Target tracking with binary proximity sensors: Fundamental limits, minimal descriptions, and algorithms,” in Proc. 4th Int. Conf. SenSys, 2006, pp. 251–264. [13] X. Wang, J.-J. Ma, S. Wang, and D.-W. Bi, “Cluster-based dynamic energy management for collaborative target tracking in wireless sensor networks,” Sensors, vol. 7, no. 7, pp. 1193–1215, 2007. [14] (2011). OMNeT++ Network Simulator. [Online]. Available: http://www.omnetpp.org/ [15] H. Wang, G. Pottie, K. Yao, and D. Estrin, “Entropy-based sensor selection heuristic for target localization,” in Proc. 3rd Int. Symp. IPSN, Berkeley, CA, USA, Apr. 2004, pp. 3645. [16] W. Zhao, Y. Han, H. Wu, and D. Zhang, “Weighted distance based sensor selection for target tracking in wireless sensor networks,” IEEE Signal Process. Lett., vol. 16, no. 8, pp. 647–650, Aug. 2009. [17] J. Qian, X. Jin, and Y. Zhang, “Energy-efficient node selection for acoustic source localization in wireless sensor network,” in Proc. 6th Int. Conf. Wireless Commun. Netw. Mobile Comput. (WiCOM), Sep. 2010, pp. 1–4.

Title
:
Association Rule Mining in Big Data using MapReduce approach in Hadoop
Article Type
:
Conference Article
Author Name(s)
:
J.Jenifer Nancy, Kalasalingam University; M.Jansi Rani ,; Dr.D.Devaraj ,
Country
:
India
Research Area
:
Computer science and engineering

The concept of Association rule mining is an important task in data mining. In case of big data the large volume of data makes is impossible to generate rules at a faster pace. By making use of parallel execution in Hadoop using the MapReduce framework, the rules can be generated much faster and in an efficient way. The existing method transforms the input dataset into binomial representation before processing them using MapReduce. But binomial conversion is not user-friendly since it is complex in case of continuous values. In this paper, an improved and scalable algorithm is proposed for association rule mining that will convert the input dataset into key-value pairs instead of binomial. All the stages of proposed association rule mining algorithm are parallelized using MapReduce. The proposed algorithm works on high cardinality features and so no dimension detection is needed.

Keywords : Hadoop, MapReduce, Association rule mining, Data mining, big data

Recent

[1] Ashrafi, M.Z.,Taniar,D., Smith,K., “ODAM:An Optimized Distributed Association Rule Mining Algorithm”, Distributed Systems Online, IEEE, Volume 5, Issue 3, 2004. [2] R.Agrawal, R.Srikant, “Fast Algorithms for Mining Association Rules” , In Proceedings of International Conference on Very Large DataBases ,pp.487-499, Santiago,Chile,September1994. [3] JongSooPark, Ming-SyanChen, PhilipS. Yu,“An Effective Hash-based Algorithm for Mining Association Rules”, In Proceedings of the ACMSIGMOD International Conference on Management of Data, Michael Carey and Donovan Schneider, ACM, 1995. [4] Ozel,S.A., Guvenir,H.A., “An Algorithm for Mining Association Rules using Perfect Hashing and Database Pruning”,10th Turkish Symposiumon Artificial Intelligence and Neural Networks , Gazimagusa, Springer, pp. 257-264, 2001. [5] KaramGouda, Mohammed JaveedZaki, “Efficiently Mining Maximal Frequent Itemsets”, In Proceedings of the IEEE International Conference on DataMining, pp.163-170, November29-December 02 , 2001. [6] J.Han,J. Pei,Y. Yin, “Mining Frequent Patterns without Candidate Generation”, ACMSIGMOD International Conference,Dallas,2000. [7] D.W.Cheung, Jiawei Han, V.T. Ng, A.W. Fu, Yongjian Fu, "Afast Distributed Algorithm for Mining Association Rules”, In Proceedings of International Conference on Parallel and Distributed Information Systems, IEEE CS Press, 1996. [8] AnsariE, DastghaibifardG, KeshtkaranM, KaabiH, “Distributed Frequent Itemset Mining using Trie Data Structure ”,International Journal of Computer Science, Volume 35, Issue 3, pp. 337-381, 2008. [9] Park,J.S.,Chen,M. S., Yu,P. S., “Efficient Paralle l Data Mining for Association Rules”, In Proceedings of the Fourth International Conference on Information and Knowledge Management,pp.31-33, 1995. [10] Woo, J., Xu, Y, “Market Basket Analysis Algorithm with Map/Reduce of Cloud Computing”, In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2001. [11] Lin, Ming-Yen, Pei-Yu Lee, Sue-Chen Hsueh, "Apriori-based Frequent Itemset Mining Algorithms on MapReduce", In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ACM, 2012. [12] PeddiKishor, SammulalPorika, “Literature Survey on Association Rule Discovery in Data Mining”, International Journal of Computer Science and Management Research, Volume 2, Issue 1, January 2013. [13] Zhang C.S, Li Z.Y, Zheng D.S., “An Improved Algorithm for Apriori”, In Proceedings of the 1st International Workshop on Education Technology and Computer Science, Volume 1, pp. 995-998, 2009. [14] C.Jin, C.Vecchiola, R.Buyya, “MRPGA: An Extension of MapReduce for Parallelizing Genetic Algorithms”, Fourth IEEE International Conference on eScience, pp. 214-221, 2008. [15] T.Elsayed, J.Lin, Douglas W. Oard, “Pairwise Document Similarity in Large Collections with MapReduce”, In Proceedings of 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009. [16] J.H.C. Yeung, C.C. Tsang, K.H. Tsoi, B.Kwan, C. Cheung, A.P.C. Chan P.H.W. Leong, “Map-reduce as a Programming Model for Custom Computing Machines”, In Proceedings of the 16th IEEE Symposium on Field-Programmable Custom Computing Machines, pp. 149-159, 2008. [17] M.Zaharia, A.Konwinski, A. D. Joseph, R. Katz, I. Stoica, “Improving MapReduce Performance in Heterogeneous Environments”, EECS Department University of California, Berkeley Technical Report Number UCB/EECS-2008-99 August 19, 2008. [18] MohammadhosseinBarkhordari, Mahdi Niamanesh, “ScadiBino: An Effective MapReduce-based Association Rule Mining Method”, ACM 16th International Conference on Electronic Commerce, August 2014. [19] P.Ganesh Kumar, D.Devaraj, “Intrusion Detection using Artificial Neural Network with Reduced Input Features”, International Journal on Soft Computing, ICTACT, Issue 1, pp. 30-36, July 2010.

Title
:
A Time Efficient RFID Mutual Authentication Protocol for HealthCare Environments Using Hyper Elliptic curve Cryptosystem
Article Type
:
Conference Article
Author Name(s)
:
P.Gowsalya, K.L.N.College of Engineering; D.Pravin Kumar ,
Country
:
India
Research Area
:
Computer science and engineering

RFID is a transformative technology in the healthcare industry. By applying RFID tags in healthcare environments, for locating and tracking of staff, equipments and patients made easy. However the potential security and running time of the systems are remains, challengeable in RFID system. In this thesis, a new design called mutual authentication protocol for RFID, based on Hyper elliptic curve cryptosystem was introduced. This methodology provides same level of security compared to the existing scheme with lower number of bits. The protocol can provide better efficiency, because it uses pre-computing method within tag’s communication. In terms of security, the protocol can achieve confidentiality, unforgetability, mutual authentication, tag’s anonymity, availability and forward security. The protocol can overcome the weakness of the existing protocols .It also reduce the computation cost and communication overhead

Keywords : Hyper elliptic curve, Mutual Authentication, Pre-Computing, Security, Running Time

Recent

[1] Atzori.L, Iera.A, and Morabito.G(2010), “The Internet of Things: A survey,” Computer Network, vol. 54, no. 15, pp. 2787–2805. [2] Bringer.J, Chabanne .H, and Icart .T,(2008) “Cryptanalysis of EC-RAC, a RFID identification protocol,” in Proc. 7th International Conference on Cryptgraphica. Network Security(CNS’08), pp. 149–161. [3] Chunhua Jin , Chunxiang Xu , Xiaojun Zhang ,Jining Zhao (2015), „A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic CurveCryptography‟, Journal of medical system ,39: 24,pp.1-8. [4] Deursen .T and Radomirovic .S(2009), “Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC,” Cryptology ePrint Archive, Report, 2009/332. [5] He D., Chen Y., and Chen, J.(2012), “Cryptanalysis and improvement of an extended chaotic maps–based key agreement protocol‟. Nonlinear Dynamics. 69(3):1149–1157. [6] Jonathan Sangoro, Waweru Mwangi, Michael Kimwele (2014), „Enhancement of Security in RFID using RSA Algorithm‟, Vol 5,no.10,pp. 2222-2871. [7] Kakali Chatterjee, Asok De, and Daya Gupta,(2013)” Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices”, International Journal of Network Security, Vol.15, No.1, PP.9-15. [8] Lee Y., Batina L., and Verbauwhede I.(2008), “EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol,”iProc. IEEE Inernational. Conference on RFID, pp. 97–104. [9] Liao ,Y and Hsiao .C(2014), “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,” Ad Hoc Network, vol. 18,pp. 133–146. [10] Ohkubo M. , Suzuki K. , and Kinoshita S. (2003), “Cryptographic Approachto ‘Privacy-Friendly‟ Tags‟, Proc. Radio Frequency Identification (RFID)Privacy Workshop. [11] Tuan Anh Pham, Mohammad S. Hasan and HongnianYu (2012), “A RFID mutual authentication protocol based on AES Algorithm‟, IEEE, pp. 997-999. [12] Weinstein .R(2005), “RFID: A technical overview and its application to the enterprise,” IEEE IT Prof., vol. 7, no. 3, pp. 27–33. [13] Zhang .Z and Qi .Q(2014), “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography, Journal of Medical System., vol. 38, no. 5, doi: 10.1007/s10916-014-0047-8. [14] Zhao .Z(2014), “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” Journal of Medical System., vol. 38, no. 5, doi: 10.1007/s10916-014-0046-9.

Title
:
PARTICIPATORY SENSING FOR PUBLIC TRANSPORTATION INFORMATION SERVICE
Article Type
:
Conference Article
Author Name(s)
:
T.R.P.Monisha, K.L.N. College of Engineering; N.Nandhini ,; S.S.Aarthy ,; R.Aarthy ,
Country
:
India
Research Area
:
Computer science and engineering

Mobile phones emergence has brought about a huge impact in today’s technology. Especially smart phones play a major role in everyday life. This advantage is used in public transportation service. Public transportation in India has always had its indigenous issues which have proven to be fatal to many. This issue is addressed here. Here the front end is a Traffic Info application which is a peer to peer application which helps in knowing the public transportation status. It is a simple and easy-to-use Android application which visualizes real-time public transport information of the given city on Google Maps. Crowd sensing helps to make travelling easier and sophisticated. The lively updates are assisted by service provider. We use generic publish/subscribe communication model in our framework to implement interactions. Traffic Info is built upon Extensible Messaging and Presence Protocol (XMPP) based communication framework. The significant features of Traffic Info are Visualization, Information Sharing and Sensing

Keywords : android application, crowdsourcing, Traffic Info, Traffic updates

Recent

[1] https://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use [2] http://yourstory.com/2015/07/mobile-internet-report-2015/ [3] R. Ganti, F. Ye, and H. Lei, “Mobile Crowdsensing: CurrentState and Future Challenges,” IEEE Commun. Mag., Nov. 2011, pp. 32–39. [4] http://www.json.org/ [5] T. Bray et al., Extensible Markup Language (XML) 1.0 (Fifth Edition), W3C, W3C Recommendation REC-xml-20081126, Nov. 2008, http://www.w3.org/TR/2008/RECxml-20081126/. [6] P. Zhou et al., “How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing,” Proc. 10th Int’l. Conf. Mobile Systems, Applications, and Services (MobiSys 2012), June 2012. [7] L. Bedogni, M. Di Felice, and L. Bononi, “By Train or by Car? Detecting the User's Motion Type Through Smartphone Sensors Data,” Proc. IFIP Wireless Days Conf. (WD 2012), 2012, pp. 1–6.

Title
:
An Energy Efficient VM Placement Technique for Cloud Datacenters
Article Type
:
Conference Article
Author Name(s)
:
Deepa.R, Kalasalingam University; R.Kanniga Devi ,
Country
:
India
Research Area
:
Computer science and engineering

The use of cloud computing technology has been an important aspect in many applications in recent time. The cloud provides scalable and on-demand services to the customers and keeps the customer information and data secure. The overall performance of the cloud depends on the reliability, availability and standard of the resources. Even though the cloud provides many usefulness it faces many issues and challenges that needs to be handled. One such challenge is the efficient resource allocation to minimize the overall energy consumption. In this paper an efficient VM placement and allocation strategy is proposed for cloud datacenters to reduce the cost incurred for using the resources within the cloud datacenters. The proposed technique is implemented in the CloudSim toolkit where a simulation is done using sample cloud datacenters. The experimented results are noted down.

Keywords : Distributed Generation, Distribution System, Voltage Stability, Particle Swarm Optimization

Recent

[1] BhushanLalSahu, Rajesh Tiwari; “A Comprehensive Study on Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012. [2] David C. Chou; “Cloud Computing: A Value Creation Model”, ELSEVIER, Journal of Computer Standards and Interfaces, Feb 2015. [3] AbdelzahirAbdelmaboud, Dayang N.A. Jawawi, Imran Ghani, AbubakarElsafi, Barbara Kitchenham; “Quality of Service Approaches in Cloud Computing: A Systematic Mapping Study”, ELSEVIER, Journal of Systems and Software, Volume 101, March 2015. [4] DimitriosZissis, DimitriosLekkas; “Addressing Cloud Computing Security Issues”, Journal of Future Generation Computer Systems, ELSEVIER, Volume 28, Issue 3, March 2012. [5] D.Borgetto, P.Stolf; "An energy efficient approach to virtual machines management in cloud computing", IEEE 3rd International Conference on Cloud Networking, pp. 229-235, October 2014. [6] Microsoft, “Windows azure: Microsoft’s cloud services platform,” http://www.microsoft.com/windowsazure/. [7] N.Kord, H.Haghighi; "An energy-efficient approach for virtual machine placement in cloud based data centres", IEEE International Conference on Information and Knowledge Technology, pp. 44-49, May 2013. [8] Jian Cao, Yihua Wu, Minglu Li; "Energy Efficient Allocation of Virtual Machines in Cloud Computing Environments Based on Demand Forecast", Journal of Advanced in Grid and Pervasive Computing, Springer, pp. 137-151, May 2012. [9] Shuo Fang, R.Kanagavelu, Bu-Sung Lee, ChuanHengFoh, KhinMiMiAung; "Power-Efficient Virtual Machine Placement and Migration in Data Centers", IEEE International Conference on IEEE Cyber, Physical and Social Computing, pp. 1408-1413, August 2013. [10] C.Mastroianni, M.Meo, G.Papuzzo; "Probabilistic Consolidation of Virtual Machines in Self-Organizing Cloud Data Centers", IEEE Transactions on Cloud Computing, Volume 1, pp. 215-228, Feb 2014. [11] F.Farahnakian, P.Lilijeberg, J.Plosila; "Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning", IEEE 22nd Euromicro International Conference on Parallel, Distributed and Network-based Processing, pp. 500-507, August 2014. [12] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A.F. De Rose, RajkumarBuyya; “CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource and Provisioning Algorithms”, Journal of Software Practice and Experience, Wiley Online Library, Volume 41, 2010, pp. 23-50.

Title
:
Lossless Representation of High Utility Itemset Using APRIORI Algorithm
Article Type
:
Conference Article
Author Name(s)
:
S.Rashmi, K.L.N. College of Engineering; A.Selvaraj ,; K.Pavithra ,; S.Sundareswari ,
Country
:
India
Research Area
:
Computer science and engineering

Mining High Utility Item set (HUIs) becomes an important data mining task. Too many HUIs may degrade the level of performance. To achieve high efficiency of mining task apriori algorithm is used. In this method a refined database is made that makes the search easier. This in-turn serves to be a compact and lossless representation of HUIs.

Keywords : Mining High Utility Item set (HUIs), apriori algorithm

Recent

[1] Sen Zhang, Member, IEEE, Zhihui Du, Member, IEEE, and Jason T. L. Wang, Member, IEEE “New Techniques for Mining Frequent Patterns in Unordered Trees “in IEEE TRANSACTIONS ON CYBERNETICS, VOL. 45, NO. 6, JUNE 2015 1113. [2] Vincent S. Tseng, Cheng-Wei Wu, Philippe Fournier-Viger, and Philip S. Yu, Fellow, IEEE” Efficient Algorithms for Miningthe Concise and Lossless Representation of High Utility Item sets” in Ieee Transactions On Knowledge And Data Engineering, Vol. 27, No. 3, March 2015 [3] Divya Bansal and Lekha Bhambhu M.Tech Scholar Assistant Professor Department Of Computer Science Department Of Computer Science. J.C.D College Of Engineering And Technology G.J.U. University Of Science & Technology, India “ Execution Of Apriori Algorithm Of Data Mining Directed Towards Tumultuous Crimes Concerning Women” In Volume 3, Issue 9, September 2013 Issn: 2277 128x International Journal Of Advanced Research In Computer Science And Software Engineering [4] U Kanimozhi, J K Kavitha, D Manjula Mining High Utility Item sets – A Recent Survey In International Journal Of Scientific Engineering And Technology (Issn : 2277-1581)Volume No.3 Issue No.11, Pp : 1339-1344 [5] International Journal Of Innovative Research In Computer And Communication Engineering (An Iso 3297: 2007 Certified Organization) Vol. 3, Issue 11, November 2015discovering Frequent Item sets Using Fastapriori Algorithm M. Premalatha1, T. Menaka2 [6] Akshita Bhandaria, Ashutosh Gupta, DE basis Das” Improvised Apriori Algorithm Using Frequent Pattern Tree For Real Time Applications in Data Mining” International Conference on Information and Communication Technologies (Icict 2014) [7] Claudio Lucchese, Salvatore Orlando, And Raffaele Perego Fast And Memory Efficient Mining Of Frequent Closed Item sets In Ieee Transactions On Knowledge And Data Engineering, Vol. 18, No. 1, January 2006 [8] Jiawei Han University of Illinois at Urbana-Champaign Jianpei State University Of New York At Buffalo Yiwen Yin Simon Fraser University Raying Mao Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach.

Title
:
Optimized Task Scheduling With Secure Storage And Deuduplicating Data For Iaas Cloud
Article Type
:
Conference Article
Author Name(s)
:
K.Vivekrabinson, Kalasalingam Institute of Technology; R.Parvadha Devi ,
Country
:
India
Research Area
:
Computer science and engineering

Infrastructure as a Service is a form of cloud computing that provides virtualized computing resources over the Internet. This paper provides a short overview of how to create instance based on user request and how to set priority and schedule the instance. In this project use generalized priority algorithm and PSO (particle swarm optimization based scheduling) to manage the instance. The use of generalized priority algorithm is to prioritize the user requests based on size, Memory and bandwidth and also use to rank the instance based on cloudlet. The working procedure of PSO used to outsource its task to external clouds when its own resources are not sufficient to meet the demand and at the same time guarantee the QoS (Quality of Service). It is similar to outsourcing during hike period. Users also can store their data to cloud. By the help of advanced encryption standard and diff algorithm increase reliability and efficiency by encrypting user files and remove duplicate data from cloud.

Keywords : cloud storage, cloudlet, priority, outsourcing, encryption, duplicate check

Recent

[1] Amit Agarwal, Saloni Jain (2014) “Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment”, International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 7. [2] Chun-Yan LIU ,Cheng-Ming ZOU, Pei WU (2014) ”A task scheduling algorithm based on genetic algorithm and ant colony optimization in cloud computing”, 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science. [3] http://ais.seecs.nust.edu.pk/colonial/siteData/Documentation%20on%20adding%20encryption%20to%20OpenStack%20Swift_v1_4.pdf [4] http://c2.com/cgi/wiki?DiffAlgorithm [5] http://docs.openstack.org/juno/install-guide/install/apt/content/ [6] http://docs.openstack.org/security-guide/tenant-data/data-encryption.html [7] https://en.wikipedia.org/wiki/Advanced_Encryption_Standard [8] https://en.wikipedia.org/wiki/Load_balancing_%28computing%29 [9] https://en.wikipedia.org/wiki/Scheduling_%28computing%29 [10] http://searchnetworking.techtarget.com/definition/load-balancing [11] http://www.mnemstudio.org/particle-swarm-introduction.htm [12] http://www.swarmintelligence.org/tutorials.php [13] http://www.tutorialspoint.com/operating_system/os_process_scheduling.htm [14] http://www.tutorialspoint.com/cryptography/advanced_encryption standard.htm

Title
:
Dreck Dispatching System Using Internet of Things (IOT)
Article Type
:
Conference Article
Author Name(s)
:
B.Chandra, K.L.N. College of Engineering; C.Manjula Devi ,; J.K Rashmi ,; G.M.Sri Vidhya ,; N.Srinithikannamma ,
Country
:
India
Research Area
:
Computer science and engineering

In day-to-day life, the aspect of cleanliness with respect to the waste management is getting reduced tremendously. As a major application field of IoT, waste management has become one such issue. The overflow of garbage in the public places creates an unhygienic condition thereby paves the way for many diseases. To overcome this issue, the dreck dispatching system is designed. This system presents a smart bin designed with sensor, for measuring the level of the garbage and the information is communicated to the municipal authority through GSM technology.

Keywords : Arduino, IoT, SIMComm

Recent

[1] IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Volume: 04 Issue: 03 | Mar-2015, “Smart garbage collection system in residential area” Gaikwad Prajakta , Jadhav Kalyani , Machale Snehal. [2] International Journal of Industrial Electronics and Electrical Engineering, ISSN: 2347-6982 Volume-3, Issue-5, May-2015 Smart Dustbin 101 “Smart Dustbin” Twinkle Sinha, K.Mugesh kumar, P.Saisharan. [3] International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015, Krutika Agrawal1 IJECS Volume 4 Issue 8 Aug, 2015 “Interactive Dustbin” Krutika Agrawal1 1Sandip Polytechnic, Post Mahiravani, Trimbak. [4] International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 ISSN 2229-5518 –”Smart Bin Implementation for Smart Cities” Narayan Sharma, Nirman Singha, Tanmoy Dutta. [5] Journal of Clean Energy Technologies, Vol. 2, No. 3, July 2014-“Efficient Garbage Disposal Management in Metropolitan Cities Using VANETs” Narendra Kumar G., Chandrika Swamy, and K. N. Nagadarshini. [6] IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 8, October 2014. ISSN 2348 – 7968 “Smart Trash system: An Application using ZigBee”, Pavithra. [7] International Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 – 8169 Volume:1,Issue:7-“Concept , Design and Implementation of Automatic Waste Management System “ Adil Bashir, ShoaibAmin Banday Ab. Rouf Khan, Mohammad Shafi. [8] Yann Glouche, Paul Couderc. “A Smart Waste Management with Self-Describing objects” Leister, Wolfgang and Jeung, Hoyoung and Koskelainen, Petri. The Second International Conference on Smart Systems, Devices and Technologies (SMART’13), Jun 2013, Rome, Italy. 2013.

Title
:
Two Stage Approach for Economic Dispatch in Using Quasi-Oppositional Based Particle Swarm Optimization
Article Type
:
Conference Article
Author Name(s)
:
Dr.K.Gnanambal, K.L.N College of Engineering ; A. Marimuthu ,; K.Jeyanthi ,
Country
:
India
Research Area
:
Electrical engineering

This paper presents a practical approach to implement the economic power dispatch of the power system. The proposed economic dispatch method consists of two stages. The first stage involves the economic power dispatch with considering network loss using quasi-oppositional Based particle swarm optimization technique. The second stage involves economic dispatch considering network loss and security constraints, where two objectives are proposed for the second stage. One is loss minimization, and another is the minimum movement of generator output from the initial generation plan. For showing the effectiveness of the proposed two stage economic dispatch approach, the six unit system is used for testing. The test results show the two stage dispatch method can not only reduce the system losses and system fuel consumption.

Keywords : Power systems, economic dispatch, Loss minimization, Losses, smart grid, Quasi oppositional based particle swarm Optimization

Recent

[1] Optimization of power system second Edition jizhong zhu IEEE books wiley publications. [2] Two stage approach for economic power dispatch jizhong Zhu, Senior Member, IEEE, Xiaofu Xiong, Shan Lou,Mingzhong Liu, Zhiqiang Yin, Bin Sun, Cheng Lin,IEEE 2008. [3] Particle swarm optimization with chaotic opposition-based population initialization and stochastic search technique Wei-feng Gao , San-yang Liu, Ling-ling Huang Gharavi H, Ghafurian R. [4] .Particle Swarm Optimization to Solving the Economic Dispatch Considering the Generator Constraints Zwe-Lee Gaing [5] Smart grid: the electric energy system of the future. Proc. of IEEE 2011;99(6):917–921. [6] Fang X, Misra S, Xue GL, Yang DJ. Smart grid—the new and improved power grid: a survey. IEEE Commun. Surv. Tutor. 2012;14(4):944–980. [7] M.R. Irving, and M.J.H. Sterling, “Economic Dispatch of Active Power with Constraint Relaxation,” IEE Proc. C, Vol.130, No.4, 1983 [8] M.R. Irving, and M.J.H. Sterling, “Efficient Newton-Raphson Algorithm for Load Flow Calculation in Transmission and Distribution Networks,” IEE Proc. C, Vol.134, 1987 [9] J.Z. Zhu and G.Y. Xu, “A New Real Power Economic Dispatch Method with Security,” Electric Power Systems Research, Vol.25, No.1,1992, pp9-15 [10] D.C. Walters and Z.C. Sheble, “Genetic Algorithm Solution of Economic Dispatch with Valve Point Loading,” IEEE Trans., on Power Systems, Vol.8, No.3, 1993

Title
:
Single Channel Eeg Device For The Analysis Of Person State Of Depression
Article Type
:
Conference Article
Author Name(s)
:
P.Amsaleka, PSNA College of Engineering and Technology; Dr.S.Mythili ,
Country
:
India
Research Area
:
Electrical engineering

The persons state (i.e., normal or depressed) are identified by monitoring the brain signal. Now, a days a normal person faces a lot of problems in their day to day life and this at one stage made them depressed. The human brain wave has alpha, beta, theta and delta frequencies. The changes in these frequencies is only responsible for changes in the person’s current state. When the alpha and delta wave is higher it indicates that the person is depressed. For analyzing these signals a device called Electroencephalogram (EEG} device is used. Depression is a common mental disorder characterized by sadness, loss of interest or pleasure, feelings of guilt or low self-worth, disturbed sleep or appetite feeling tiredness and poor concentration. Here the brain wave is picked from the scalp of the person who is rest state by using silver chloride (AgCl) surface electrode and the obtained signal is given to the developed EEG device containing differential amplifier (TL072 and TL074 ) and filter containing low pass and high pass filter. And the filtered output is seen using Digital Signal Oscilloscope (DSO). The normal and the depressed persons signal is seen in the DSO. Using the difference in their amplitude and frequency the state of the person is identified. Here the state of both normal and depressed person is analyzed. Further the processor is used for the analysis of depression or normal and it is displayed using LCD display.

Keywords : EEG, Depression, Electrode

Recent

[1] YashikaKatyal, Suhas V Alur, ShipraDwivede, Menaka R ,” EEG Signal and Video Analysis Based Depression Indication” IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT) 2014. [2] Subha D. Puthankattil, Paul K. Joseph, ” Analysis of EEG Signals Using Wavelet Entropy and Approximate Entropy: A Case Study on Depression patients” [3] International Journal of Medical, Health, Biomedical, Bioengineering and Pharmaceutical Engineering Vol:8, No:7, 2014. [4] AshishPanat and Anita Patil,”Analysis of emotion disorders based on EEG signals of Human Brain”International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.4, August 2012. [5] Subha D. Puthankattil and Paul K. Joseph,“Classification of eeg signals in normal and depression conditions by ann using rwe and signal entropy” Journal Of Mechanics In Medicine And Biology • October 2012. [6] XiaoweiLia, Bin Hua,,TingtingXua, JiShena, MartynRatcliffeb,” A study on EEG-based brain electrical source of mild depressed subject” Elsevier Ireland Ltd 2015.

Title
:
Optimal Power Flow using Hybrid Teaching Learning Based Optimization Algorithm
Article Type
:
Conference Article
Author Name(s)
:
Dr.K.Gnanambal, K.L.N College of Engineering; K.R.Jeyavelumani ,; H.Juriya Banu ,
Country
:
India
Research Area
:
Electrical engineering

The flow of electric power in an interconnection system is known as power flow. Optimal Power Flow (OPF) refers to load flow that gives maximum system security by minimizing the overload. The main objective of OPF is to reduce the total cost of active power generation and to determine the loss and meet the total demand. This teaching learning algorithm technique is based on the influence of teachers on learners. This algorithm is a population-based method and uses a population of solutions to obtain the global solution. The population is considered as the group of learners or a class of learners. In this project, the Teaching Learning Based Optimization technique along with cross over property of Genetic algorithm is used to solve the optimal power flow problem. The obtained results indicate that the Teaching Learning Based Optimization provides useful and strong high quality solution when solving the optimal power flow problem with different complexities

Keywords : optimal power flow-teaching learning based optimization-hybrid teaching learning algorithm-cross over property of genetic algorithm-comparison with other methods-minimization of cost-convergence

Recent

[1] Taher Niknam, Faranak Golestaneh, and Mokhtar Sha Sadeghi “θ -Multiobjective Teaching–Learning-Based Optimization for Dynamic Economic Emission Dispatch”, IEEE systems Journal., vol. 6, no. 2,pp. 341-351,June 2012 [2] Gajendra Shu and Kuldeep Swarnkar, “Optimization of Economic Load Dispatch Problem using Genetic Algorithm”, International Journal of Science, Engineering and Technology Research (IJSETR)., vol. 3, pp. 2673-2679,Oct 2014. [3] Dharamjit and D.K.Tanti, “Load Flow Analysis on IEEE 30 bus system”, International Journal of Scientific and Research Publications., vol. 2, pp 1-6, Nov 2012. [4] Viktor A. Levi and Dusko P. Nedic, “Application of the Optimal Power Flow Model in Power System Education”, IEEE Transactions on power systems., vol.16, no.4, pp 572-580, Nov 2001. [5] B.Bommirani and K.Thenmalar “Optimization Technique For Economic Dispatch In Power System Operation”, International journal of computer.,vol. 2, pp. 153-158,June 2013. [6] Deyu Tang, Jie Zhao and Huan Li “An Improved TLBO algorithm with Memetic method for Global Optimization”, IJACT., vol.5, no.9, May 2013. [7] T.Govindaraj and M.Vidhya, “Optimal Economic Dispatch for Power Generation using Genetic Algorithm”, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering., vol. 2, no.1, pp. 808-814, Jan.2014. [8] A.Farag, S.Baiyat, and T.C Cheng, “Economic Load Dispatch Multiobjective optimization Procedures using Linear Programming Techniques”, IEEE Trans. power syst., vol. 10, no. 2,pp.731-738,May 1995. [9] K.Lee, Y.Park and J.Ortiz, “A united approach to optimal real and reactive power dispatch”, IEEE Trans. Power App. Syst., vol. PAS-104, no.5, pp. 1147-1153,May 1985. [10] H.R.E.H.Bouchekara,M.A.Abido and M.Boucherma “Optimal Power flow using Teaching learning based optimization”, pp. 49-59, March 2014.

Title
:
Blind Zone Alert System using ZigBee based Wireless Sensor Network
Article Type
:
Conference Article
Author Name(s)
:
K.C. Vigneswar, PSNA College of Engineering & Technology; S. Arunkumar ,
Country
:
India
Research Area
:
Electrical engineering

The main purpose of this project is to detect and monitor objects within a predetermined distance from the vehicle that may be approaching its blind-spot. Moreover, the invention is particularly designed to be used for a vehicle that does not have a factory-equipped blind-spot detection system. This method and system utilizes two ultrasonic sensors for the vehicle to detect approaching objects, including other vehicles, pedestrians and other possible obstacles, in the blind-spot area. Due to the increasing number of sensors deployed in modern vehicles, intra-vehicular wireless sensor networks (IVWSNs) have recently received a lot of attention in the automotive industry, as they can reduce the amount of wiring harness inside a vehicle. By removing the wires, car manufacturers can reduce the weight of a vehicle and improve engine performance, fuel economy, and reliability. An example application, known as a side blind zone alert (SBZA) system, which monitors the blind zone of the vehicle and alerts the driver in a timely manner to prevent collisions, is discussed in this project. The performance of the IVWSN-based SBZA system is done with the help of ZigBee which are implemented on two moving vehicle modules.

Keywords : Blind spot, Pedestrian, Intra-vehicular Wireless sensor.

Recent

[1] M. Ahmed, C. Saraydar, T. ElBatt, J. Yin, T. Talty, and M. Ames, “Intravehicular wireless networks,” in Proc. IEEE Globecom Workshop, Nov. 2007, pp. 1–9. [2] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Netw., vol. 52, no. 12, pp. 2292–2330, 2008. [3] F. Kong and J. Tan, “A collaboration based hybrid vehicular sensor network architecture,” in Proc. IEEE Int. Conf. Inf. Autom. (ICIA), 2008, pp. 584–589. [4] I. Demirkol, C. Ersoy, and F. Alagoz, “Mac protocols for wireless sensor networks: A survey,” IEEE Commun. Mag., vol. 44, no. 4, pp. 115–121, Apr. 2006. [5] S. C. Ergen and P. Varaiya, “Tdma scheduling algorithms for wireless sensor networks,” Wireless Netw., vol. 16, no. 4, pp. 985–997, 2010. [6] S. C. Ergen and P. Varaiya, “PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks,” IEEE Trans. Mobile Comput., vol. 5, no. 7, pp. 920–930, Jul. 2006. [7] W. Shen, T. Zhang, F. Barac, and M. Gidlund, “Prioritymac: A priorityenhanced mac protocol for critical traffic in industrial wireless sensor and actuator networks,” IEEE Trans. Ind. Informat., vol, 10, no. 1, pp. 824– 835, Feb. 2014. [8] E. Toscano and L. Lo Bello, “Multichannel superframe scheduling for ieee 802.15. 4 industrial wireless sensor networks,” IEEE Trans. Ind. Informat., vol. 8, no. 2, pp. 337–350, May. 2012. [9] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad hoc Netw., vol. 3, no. 3, pp. 325–349, 2005. [10] S. C. Ergen and P. Varaiya, “Energy efficient routing with delay guarantee for sensor networks,” Wireless Netw., vol. 13, no. 5, pp. 679–690, 2007. [11] D. Zhang, G. Li, K. Zheng, X. Ming, and Z.-H. Pan, “An energy-balanced routing method based on forward-aware factor for wireless sensor networks,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 766–773, Feb. 2014. [12] J. Niu, L. Cheng, Y. Gu, L. Shu, and S. K. Das, “R3E: Reliable reactive routing enhancement for wireless sensor networks,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 784–794, Feb. 2014. [13] A. Bonivento, C. Fischione, L. Necchi, F. Pianegiani, and A. Sangiovanni- Vincentelli, “System level design for clustered wireless sensor networks,” IEEE Trans. Ind. Informat., vol. 3, no. 3, pp. 202–214, Aug. 2007. [14] S.Shin, T.Kwon, G.-Y. Jo, Y.Parkand H. Rhy, “An experimental study of hierarchical intrusion detection for wireless industrial sensor networks”, IEEE Trans. Ind. Informat., vol. 6, no. 4, pp. 744–757, Nov. 2010. [15] G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, “Energy conservation in wireless sensor networks: A survey,” Ad hoc Netw., vol. 7, no. 3, pp. 537–568, 2009. [16] G. Anastasi, M. Conti, and M. Di Francesco, “Extending the lifetime of wireless sensor networks through adaptive sleep,” IEEE Trans. Ind. Informat., vol. 5, no. 3, pp. 351–365, Aug. 2009. [17] M. Magno, D. Boyle, D. Brunelli, E. Popovici, and L. Benini, “Ensuring survivability of resource-intensive sensor networks through ultra-low power overlays,” IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 946–956, May 2014. [18] L. Li, S. Li, and S. Zhao, “Qos-aware scheduling of services-oriented internet of things,” IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1497– 1505, May 2014. [19] N. Marchenko, T. Andre, G. Brandner, W. Masood, and C. Bettstetter, “An experimental study of selective cooperative relaying in industrial wireless sensor networks,” IEEE Trans. Ind. Informat., vol. 10, no. 3, pp. 1806–1816, Aug. 2014. [20] K. Park, J. Kim, H. Lim, and Y. Eun, “Robust path diversity for network quality of service in cyber-physical systems,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2204–2215, Nov. 2014. [21] A.R.Moghimi, H.-M.Tsai, C.Saraydar and O.K.Tonguz, “Characterizing intra-car wireless channels”, IEEE Trans. Veh. Technol., vol. 58, no. 9, pp. 5299–5305, Nov. 2009. [22] J.-R.Lin, T.Talty, and O.K.Tonguz, “An empirical performance study of intra-vehicular wireless sensor networks under wifi and bluetooth interference,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 581–586. [23] H. Lee, H.-M.Tsai and O.K.Tonguz, “On the security of intra-car wireless sensor networks,” in Proc. IEEE 70th Veh. Technol. Conf. (VTC), 2009, pp. 1–5. [24] H.-M. Tsai et al., “Zigbee-based intra-car wireless sensor networks: A case study,” IEEE Wireless Commun. Mag., vol. 14, no. 6, pp. 67–77, Dec. 2007. [25] J.-R.Lin, T. Talty, and O.K.Tonguz, “On the potential of Bluetooth low energy technology for vehicular applications,” IEEE Commun. Magazine, Ad Hoc Sensor Netw. Series, vol. 53, no. 1, pp. 267–275, Jan. 2015. [26] O.K.Tonguz, H.M.Tsai, T. Talty, A. Macdonald, and C. Saraydar, “RFID technology for intra-car communications: A new paradigm,” in Proc. IEEE 64th Veh. Technol. Conf. (VTC), 2006, pp. 1–6. [27] W.Niu, J.Li and T.Talty, “Intra-vehicle UWB channel measurements and statistical analysis”, in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2008, pp. 1–5. [28] C. U. Bas and S. C. Ergen, “Ultra-wideband channel model for intravehicular wireless sensor networks,” in Proc. IEEE Wireless CommunNetw. Conf. (WCNC), 2012, pp. 42–47. [29] C. U. Bas and S. C. Ergen, “Ultra-wideband channel model for intravehicularwireless sensor networks beneath the chassis: From statisticalmodel to simulations,” IEEE Trans. Veh. Technol., vol. 62, pp. 14–25, Jan.2013. [30] J. P. Carmo, P. M. Mendes, C. Couto, and J. H. Correia, “A 2.4-ghzcmos short-range wireless-sensor-network interface for automotive applications,”IEEE Trans. Ind. Electron., vol. 57, no. 5, pp. 1764–1771, May2010. [31] R.de Francisco, L.Huang, G.Dolmans and H.de Groot, “Coexistence ofzigbee wireless sensor networks and Bluetooth inside a vehicle”, in Proc.IEEE 20th Int. Symp. Personal, Indoor Mobile Radio Communications, 2009,pp. 2700–2704. [32] L. Lo Bello and E. Toscano, “Coexistence issues of multiple co-locatedIEEE 802.15.4/ZigBee networks running on adjacent radio channelsin industrial environments,” IEEE Trans. Ind. Informat., vol. 5, no. 2,pp. 157–167, May 2009. [33] D. W. Matolak and A. Chandrasekaran, “Aircraft intra-vehicular channel characterization in the 5 ghz band,” in Proc. IEEE Integr. Commun.Navig.Surveill. Conf. (ICNS), 2008, pp. 1–6.

Title
:
Design of optimal Controllers for a Ball & Beam system
Article Type
:
Conference Article
Author Name(s)
:
S.Nagammai, K.L.N. College of Engineering; V.Akalya ,; P.Vinitha ,
Country
:
India
Research Area
:
Electrical engineering

One of the bench mark problem used by many researchers in the area of control engineering is the Ball and Beam system (BBS) which possess severe nonlinearity and instability characteristics. The BBS connected with servo motor results in an open loop unstable system due to the presence of multiple poles at the origin. This process has the difficulty in controller design because of assumed nonlinear relation between beam angle and ball displacement. This paper deals with design methodology of full state feedback (FSFB) controller with pre compensator and the performance of which is compared with linear quadratic controller (LQC). The state feedback controller with pre compensator yields better performance in terms of transient response specifications compared with linear quadratic controller. A simulation is carried out using MATLAB to evaluate the proposed control algorithm on the modelled Ball and Beam system.

Keywords : BBS, State-Space model, full state feedback controller, linear quadratic controller

Recent

[1] J. Hauser, S. Sastry, and P. Kokotovic, “Nonlinear control via approximate input-output linearization the ball and beam example,” Institute of Electrical and Electronics Engineers, Transactions on Automatic Control, vol. 37, no. 3, pp. 392–398, 1992. [2] Z.H Pang, G. Zheng and C.X. Luo, “Augmented State Estimation and LQR Control for a Ball and Beam System”, Proc. of the 6th IEEE Conference on Industrial Electronics and Applications., pp.1328-1332, June 21-23, 2011. [3] H. Verrelst, K. Van Acker, J. Suykens, B. Motmans, B. De Moor and J. Vandewalle, “Neural Control Theory: Case Study for a Ball and Beam System”, Proc. of the European Control Conference Brussels, Belgium, July –4, 1997. [4] S.K Oh, H.J. Jang and W. Pedrycz, “The Design of a Fuzzy Cascade Controller for Ball and Beam System: A Study in Optimization with the Use of Parallel Genetic Algorithms”, Engineering Applications of Artificial Intelligence, Vol. 22, pp. 261–271, 2009. [5] Y.H. Chang, C.W. Chang, C.W. Tao, H.W. Lin and J.S. Taur, “Fuzzy Sliding-mode Control for Ball and Beam System with Fuzzy ant Colony Optimization”, Expert Systems with Applications, Vol. 39, No. 3, pp. 3624-3633, 2012. [6] “Ball and Beam Experiment and Solution,” Quanser Consulting, 1991..

Title
:
A Novel Multiplier Design Using Adaptive Hold Logic to Mitigate BTI Effect
Article Type
:
Conference Article
Author Name(s)
:
A.Gopivignesh, PSNA College of Engineering and Technology; P.N.Sundararajan ,
Country
:
India
Research Area
:
Electrical engineering

The overall performance of a system depends on the performance of the multipliers, thus digital multipliers are among the most critical arithmetic functional units; but their performance is affected by negative bias temperature instability effect and positive bias temperature instability effect. The negative bias temperature instability effect occurs when a pMOS transistor is under negative bias (Vgs =−Vdd), increasing the threshold voltage of the pMOS transistor, and reducing multiplier speed. A similar phenomenon, positive bias temperature instability, occurs when an nMOS transistor is under positive bias. Both these effects degrade transistor speed, and in the long term, the system may fail due to timing violations. Therefore this paper proposes an aging-aware multiplier design with a new adaptive hold logic (AHL) circuit. To mitigate performance degradation due to the aging effect, this architecture can be applied to a column- bypassing multiplier or row-bypassing multiplier.

Keywords : Adaptive hold logic (AHL), negative bias temperature instability (NBTI), positive bias temperature instability (PBTI), reliable multiplier, variable latency

Recent

[1] Y. Cao. (2013). Predictive Technology Model (PTM) and NBTI Model [Online]. Available: http://www.eas.asu.edu/∼ptm [2] S. Zafar et al., “A comparative study of NBTI and PBTI (charge trapping) in SiO2/HfO2 stacks with FUSI, TiN, Re gates,” in Proc. IEEE Symp. VLSI Technol. Dig. Tech. Papers, 2006, pp. 23–25. [3] S. Zafar, A. Kumar, E. Gusev, and E. Cartier, “Threshold voltage instabilities in high-k gate dielectric stacks,” IEEE Trans. Device Mater. Rel., vol. 5, no. 1, pp. 45–64, Mar. 2005. [4] H.-I. Yang, S.-C. Yang, W. Hwang, and C.-T. Chuang, “Impacts of NBTI/PBTI on timing control circuits and degradation tolerant design in nanoscale CMOS SRAM,” IEEE Trans. Circuit Syst., vol. 58, no. 6, pp. 1239–1251, Jun. 2011. [5] R. Vattikonda, W. Wang, and Y. Cao, “Modeling and miimization of pMOS NBTI effect for robust [6] naometer design,” in Proc. ACM/IEEE DAC, Jun. 2004, pp. 1047–1052. [7] H. Abrishami, S. Hatami, B. Amelifard, and M. Pedram, “NBTI-aware flip-flop characterization and design,” in Proc. 44th ACM GLSVLSI, 2008, pp. 29–34 [8] S.V.Kumar,C.H.Kim,and S.S.Sapatnekar,“NBTI-awaresynthesis of digital circuits,” in Proc. ACM/IEEE DAC, Jun. 2007, pp. 370–375. [9] A. Calimera, E. Macii, and M. Poncino, “Design techniqures for NBTI- tolerant power-gating architecture,” IEEE Trans. Circuits Syst., Exp. Briefs, vol. 59, no. 4, pp. 249–253, Apr. 2012. [10] K.-C. Wu and D. Marculescu, “Joint logic restructuring and pin reordering against NBTI-induced performance degradation,” in Proc. DATE, 2009, pp. 75–80. [11] Y. Lee and T. Kim, “A fine-grained technique of NBTI-aware voltage scaling and body biasing for standard cell based designs,” in Proc. ASP-DAC, 2011, pp. 603–608.

Title
:
AN IoT BASED PARKING SYSTEM
Article Type
:
Conference Article
Author Name(s)
:
M.Prem Anand, Easwari Engineering College; Divya Gopinath ,; M.Anto Ajisha Shriny ,; M.Illakiya ,
Country
:
India
Research Area
:
Electrical engineering

The idea of the project is to propose an Internet of Things (IoT) based solution to enable the public to find a parking space without delay and congestion on roads. Every parking space is fitted with an IR distance interrupter sensor to determine if the lot is empty or vacant. Based on the time taken by the IR waves to get reflected back, occupancy status is determined. A database is created in cloud with the information about all the parking lots in the building under study. Based on the output of the car detection unit, the database is periodically updated and hence real time monitoring of the parking lots is done. A user wishing to park his car can reserve a parking space for him using a mobile app. The app acquires the data from the cloud. The graphical view of the parking lot in the building is shown on the application pointing to the vacant parking lot. This reservation is applicable only when the user is within a kilometer radius around the destination. It prevents unnecessary reservation. This proposal is economical, time efficient and it reduces the fuel consumption of the vehicles. Pollution is also reduced. The study of some existing systems shows that the level of automation in them is limited to number plate processing further enhancement that can be added in this system is to fit a timer in the parking lot, which will enable the computation of parking cost. Thus the entire system is completely automated, reducing man power. Cloud computing and mobile app development using Android SDK is the technologies used.

Keywords : IoT, Cloud computing, IR distance interrupter sensor, Android SDK

Recent

[1] Automated Car Parking System Commanded by Android Application - Prof. D. J. Bonde , Rohit S. Shende, Ketan S. Gaikwad, Akshay S. Kedari,Amol U. Bhokre [2] Android Mobile Application Build on Eclipse-Garima Pandey, Diksha Dani [3] Research on Mobile Cloud Computing: Review,Trend and Perspectives-Han Qi,Abdullah Gani ,University of Malaya [4] Design and Implementation of an Intelligent Parking Management System using Image Processing - B.Karunamoorthy, R.SureshKumar, N.JayaSudha [5] http://kata.coderdojo.com/wiki/Free_Access_to_IBM_Bluemix,_a_Platform-as-a-Service_%28PaaS%29

Title
:
Electronic Medication System to Assist the Elderly
Article Type
:
Conference Article
Author Name(s)
:
B.V.JANAVI, EASWARI ENGINEERING COLLEGE; R.GEETHANJALI ,; D.KANAGAVALLI ,; P.BINI PALAS ,
Country
:
India
Research Area
:
Electrical engineering

Not taking prescribed medication on time can have serious health consequences. Anyone who cares for someone with a chronic illness for very long will soon realize there is much to be learned about how to organize medications. How about a system that can help several elderly patients at home adapt to the schedule without too much complication? In the proposed type of Electronic Medication System, the caretaker can remind the elderly patient what pills to be taken and when to take upon the caretaker’s command provided the pillbox and the caretaker’s smartphone are in constantly paired.

Keywords : Home Automation System, Internet of Things, Wi-Fi network, Cloud Networking

Recent

[1] Takako Nonaka ,Masato Shimano, Yuta Uesugi, and Tomohiro. Embedded Server and Client System for Home Appliances on Real-Time Operating Systems.IEEE (2010) [2] How Stuff Works Website. [Online] http://www.howstuffworks.com/search.php?terms=home +automation [3] A. Alheraish, “Design and Implementation of Home Automation System”, 2004, IEEE Transactions on Consumer Electronics ,Vol. 50(4) , pp. 1087-1092. [4] H. Brooke Stauffer “Smart Enabling System for Home automation”, 1991, IEEE Transactions on Consumer Electronics, Vol. 37(2) , pp. 29-35. [5] Eddie M C Wong, “A Phone Based Remote Controller for Home and Office Automation”, 1994, IEEE Transactions on Consumer Electronics, Vol. 40(1), pp. 28-34.

Title
:
A Low Power Memory Architecture for Zigbee Trans-Receiver
Article Type
:
Conference Article
Author Name(s)
:
M.Marudhupandian, KIT- KalaignarKarunanidhi Institute of Technology; V.Kamalkumar ,
Country
:
India
Research Area
:
Electrical engineering

A Low-power memory architecture for Zigbee Trans-Receiver is designed in this project. It proposes a level converting Retention flip-flop (RFF) in dual edge triggered pulse with feedback system in Zigbee SoC’s Trans-receiver. This RFF the master flip flop are hold the data in standby mode and the data will be restored in the slave flip flop in active mode thus reduces the power consumption. Then the data will be passed from the VDD, Coreto and VDD, IO with the help of NMOS pass-Transistor. This proposed RFF does not require any additional control signals for power and data transitioning. This RFF with dual-edge triggered pulse with feedback system will overcome the problems like high power consumption, large DC current and low performance when compared with existing single-edge triggered RFF. Using 180nm technology the proposed RFF is designed for low power consumption using Tanner EDA Tool.

Keywords : I/O supply voltage, Retention Flip flop, Standby leakage current, Standby mode, Level-Conversion, Dual-Edge triggered flip-flop

Recent

[1] Hamid Mahmoodi-Meimand and Kaushik Roy(2004),“Dual-Edge Triggered Level Converting Flip Flops” School of Electrical and Computer Engineering, Purdue University West Lafayette, IN, USA.IEEE. [2] J. Hu, W. Liu, W. Khalil, and M. Ismail (2010), “Increasing sleep-mode efficiency by reducing battery current using a DC-DC converter, "in Proc. IEEE Int. MWSCAS, Aug. [3] J.-S. Lee,Y.-W. Su, and C.-C. Shen (2007), “A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi,” IEEE Wireless Commun., vol. 14, no. 4, pp. 70–78, Nov. [4] J. Tschanz, et al (2001), “Comparative delay and energy of single edge triggered and dual edge-triggered pulsed flip-flops for high performance microprocessors,” International Symp. on Low Power Electronics and Design, pp. 147–152. [5] Jung-Hyun Park, Heechai Kang, Dong-Hoon Jung, Kyungho Ryu, and Seong-Ook Jung (2015), “Level-Converting Retention Flip-Flop for Reducing Standby Power in ZigBee SoCs”, Senior Member, IEEE Transactions on VLSI Systems, Vol. 23, No. 3. [6] L. T. Clark, M. Kabir, and J. E. Knudsen (2007),“A low standby power flipflopwith reduced circuit and control complexity,” in Proc. IEEE CICC,pp. 571–57. [7] N. B. Kothari, T. S. B. Sudarshan, S. Gurunarayanan, and R. A. Chandrasekhar (2006), “SoC design of a low power wireless sensor network node for ZigBee systems,” in Proc. Int. Conf. Adv. Comput. Commun.,pp. 462–466. [8] P. Zhao et al (2009), “Low-power clocked-pseudo-nMOS flip-flop for level conversion in dual supply systems,” IEEE Trans. Very Large Scale Integr.(VLSI) Syst., vol. 17, no. 9, pp. 1196–1202. [9] Ravi.T, Irudaya Praveen.D, Kannan.V (2013),“Design and Analysis of High Performance Double Edge Triggered D-Flip Flop”, (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6. [10] W. Kluge et al (2006), “A fully integrated 2.4-GHz IEEE 802.15.4-compliant transceiver for ZigBee applications,” IEEE J. Solid-State Circuits,vol. 41, no. 12, pp. 2767–2775. [11] Xiaohui Fan, Yangbo Wu, Hengfeng Dong, and Jianping Hu (2014),“A Low Leakage Autonomous Data Retention Flip-Flop with Power Gating Technique Faculty of Electrical Engineer and Computer Science and Technology, Ningbo University, Ningbo 15211, China.

Title
:
Design of Metamaterial Antenna For Wireless Applications
Article Type
:
Conference Article
Author Name(s)
:
G.Pradeepa, Sethu Institute of Technology; M.Ameena Banu ,; A.C.Shagar ,
Country
:
India
Research Area
:
Electrical engineering

A multiband compact planar antenna was designed with frequency notched function, the antenna with CPW fed is consist of various microstrip resonators, such as closed ring resonator and SRR, producing some discontinuous resonant bands is suggested. Metamaterial is artificial material that may exhibit electromagnetic (EM) responses not readily found in natural. Presently, it has gained considerable attention since its unique EM characteristics can be advantageous in design of novel EM components and devices. It may be used for making perfect lens or even invisibility cloaks. other examples are that electromagnetic band gap/photonic band gap (EBG/PBG) and artificial magnetic metamaterial have already been used in antennas design, which might be used to open the door to obtain the compact and high performance EM components and devices. Using Agilent Technologies ADS Software, the antenna is designed and simulated for 2.1/3.5/5GHZ UMTS/worldwide interoperability for microwave access (WiMAX)/Wireless LAN (WLAN) application with return loss of more than -10dB. To achieve a very wide bandwidth the rectangular ground planes and the split-ring loops dimensions are tuned. to improve the return loss performance in the required band a tapered transmission line is adopted. Measurement results shows that the proposed UWB antennas have a wide bandwidth from 3.1 to 10.6 GHz. To achieve a very wide bandwidth the rectangular ground planes and the split-ring loops dimensions are tuned.

Keywords : SRR, spilt ring loops, closed ring resonator.

Recent

[1] Y. Li, M. F. Iskander, , Z. Zhang, , and Z.Feng, “A New Low Cost Leaky Wave Coplanar Waveguide Continuous Transverse Stub Antenna Array Using Metamaterial-Based Phase Shifters for Beam Steering,” IEEE Trans. Antennas Propag., vol. 61, no. 7, pp. 3511–3518,July. 2013. [2] A. Dhouibi, S. N. Burokur and A. Lustrac,, “Compact Metamaterial-Based Substrate-Integrated Luneburg Lens Antenna,” IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 1504-1507, 2012. [3] A. B. Ochetan, G. Lojewski, “A novel power divider based on the composite right/left handed metamaterial transmission line, for gsm and umts applications,” U.P.B. Sci. Bull., Series C, Vol. 73, Iss. 3, pp. 141-150, 2011. [4] Jiang Zhu, Marco A. Antoniades and George V. Eleftheriades. 2010. A Compact Tri-Band Monopole Antenna With Single-Cell MetamaterialLoading, Jiang Zhu, IEEE Antennas Wireless Propag. Lett., Vol. 58, 2010. [5] H. Orazi,M.Afsahi, "Design of metamaterial multilayer structures as frequency selective surfaces," progress in Electromagnetics Research C,vol. 6,pp 115-126,2009 [6] C.Wu,,H.Lin, and J.Chen, "A novel low profile dual polarization metamaterial antenna radome design for 2.6 GHz WIMAX," 3rd International Congress on Advanced EM Materials and Optics, 2009. [7] Jiang Zhu, and George V. Eleftheriades, “A Compact Transmission-Line Metamaterial Antenna With Extended Bandwidth, IEEE Antennas Wireless Propag. Lett., Vol. 8, pp 2009. [8] C. Caloz, T. Itoh, “Use of conjugate dielectric and metamaterial slabs as radomes," Microwaves, Antennas and Propagation, IET, pp1751-1825,February,2007. [9] ] G. V. Eleftheriades.. “Enabling RF/microwave devices using negative refractive-index transmissionline (NRI-TL) metamaterials,” IEEE Antennas Propag. Mag., Vol. 49, No. 2, pp. 34–51, April 2007 [10] C. Caloz, T. Itoh, “Electromagnetic Metamaterials: Transmission Line Theory and Techniques,” Wiley-Interscience publication, 2006. [11] G. V. Eleftheriades, A. Grbic and M. Antoniades.. “Negative-refractive-indextransmission-line metamaterials and enabling electromagnetic applications,” in Proc. IEEE Antennas Propag. Soc. Int. Symp. Dig., June. pp. 1399–1402 2004 [12] M.A. Antoniades and G.V. Eleftheriades, “Compact, Linear, Lead/Lag Metamaterial Phase Shifters for Broadband Applications,” IEEE Antennas and Wireless Propagation Letters, vol. 2, issue 7, pp. 103-106, July 2003. [13] Marqu´es, R., F. Mesa, J. Martel, and F. Median, “Comparative analysis of edge and broadside coupled split ring resonators for metamaterial design,” IEEE Trans. Antennas. Propag., Vol. 51, 2572–2581, 2003

Title
:
Design of Fractal Antenna for ISM Band Application
Article Type
:
Conference Article
Author Name(s)
:
S.Lavanya, Sethu Institute Of Technology, Pullor, Kariapatti, Virudhunagar 625115 India; A.C. Shagar ,Sethu Institute Of Technology, Pullor, Kariapatti, Virudhunagar 625115 India
Country
:
India
Research Area
:
Electrical engineering

Emerging wireless communication antennas presently need to operate at ISM. In this paper, a Cantor fractal monopole antenna using multi fractal structure is proposed and presented for ISM band applications. The antenna is designed in FR4 substrate with dielectric constant of 4.6. Simulation is performed with CST microwave studio. The bandwidth of the antenna is optimized and the gain of the proposed antenna is improved.

Keywords : Cantor, fractal antenna, ISM band, Multifractal

Recent

[1] I. Zahraoui, J. Terhzaz, A. Errkik, El. H. Asbdelmounim, A. Tajmouati, L. Abdellaoui, N. Ababssi, M. Latrach “Design and Analysis of a New Dual-Band Microstrip Fractal Antenna,” Vol:9, No:1, 2015 [2] Ghatak, R., A. Karmakar, and D. R. Poddar, “Hexagonal boundary Sierpinski carpet fractal shaped compact ultrawideband antenna with band rejection functionality," International Journal of Electronics and Communications,” Vol. 67, No. 3, 250-255, 2013. [3] Sievenpiper, D. F., D. C. Dawson, M. M. Jacob, T. Kanar, K. Sanghoon, J. Long, and R. G. Quarfoth, “Experimental validation of performance limits and design guidelines for small antennas," IEEE Transactions on Antennas and Propagation, Vol. 60, No. 1, 8-19, 2012. [4] Chen, K. R., C. Y. D. Sim, and J. S. Row, “A compact monopole antenna for super wideband applications," IEEE Antennas and Wireless Propagation Letters, Vol. 10, 488-491, 2011. [5] Azari, A., “A new super wideband fractal microstrip antenna," IEEE Transactions on Antennas and Propagation, Vol. 59, No. 5, 1724-1727, 2011. [6] Tran, D., P. Aubry, A. Szilagyi, I. E. Lager, O. Yarovyi, and L. P. Ligthart, “On the design of a super wideband antenna," 399-426, Ultra Wideband, Boris Lembrikov (ed.), InTech Publication, 2011, ISBN: 978-953-307-139-8. [7] Barbarino, S. and F. Consoli, “Study on super-wideband planar asymmetrical dipole antennas of circular shape," IEEE Transactions on Antennas and Propagation, Vol. 58, No. 12, 4074-4078, 2010. [8] Lu, W. and H. Zhu, Super-wideband antipodal slot antenna," Proceedings of the Asia Pacific Microwave Conference,” 1894-1897, Singapore, 2009. [9] Lau, K. L., K. C. Kong, and K. M. Luk, “Super-wideband monopolar patch antenna," Electronics Letters,” Vol. 44, No. 12, 716-718, 2008. [10] Yan, X. R., S. S. Zhong, and X. X. Yang, “Compact printed monopole antenna with super-wideband," Proceedings of the International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, 605-607, China, 2007. [11] Werner, D. H. and S. Ganguly, “ An overview of fractal antenna engineering research," IEEE Antennas and Propagation Magazine,” Vol. 45, No. 1, 38-57, 2003. [12] Gouyet, J. F., “Physics and Fractal Structures,” Springer, Paris, 1996..

Title
:
Cognitive Radios Spectrum Allocation in Wireless Mesh Networks
Article Type
:
Conference Article
Author Name(s)
:
R.Ganesh Babu, Rajalakshmi Institute of Technology
Country
:
India
Research Area
:
Electrical engineering

Wireless mesh networks (WMNs) are considered to be an economical solution for last-mile broadband Internet access. In this paper, we study end-to-end bandwidth allocation in WMNs with cognitive radios, which involves routing, scheduling, and spectrum allocation. To achieve a good tradeoff between fairness and throughput, we define two fair bandwidth-allocation problems based on a simple max–min fairness model and the well-known lexicographical max–min (LMM) fairness model, respectively. We present Linear Programming (LP) based optimal and heuristic algorithms to solve both problems. Extensive simulation results are presented to justify the effectiveness of the proposed algorithms.

Keywords : Bandwidth allocation, cognitive radios, cross layer optimization, fairness, lexicographical max-min (LMM)fairness, routing, scheduling, spectrum allocation, wireless mesh networks (WMNs)

Recent

[1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802.11-1997, 1997. [2] I. F. Akyildiz, W.-.Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Comput. Netw. J., vol. 50, no. 13, pp. 2127–2159, Sep. 2007. [3] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Netw. J., vol. 47, no. 4, pp. 445–487, Mar. 2005. [4] M. Alicherry, R. Bhatia, and L. Li, “Joint channel assignment and routing for throughput optimization in multi-radio wireless mesh networks,” in Proc. ACM MobiCom, 2005, pp. 58–72. [5] M. S. Bazaraa, J. J. Jarvis, and H. D. Sherali, Linear Programming andNetwork Flows, 3rd ed. Hoboken, NJ: Wiley, 2012. [6] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:Cambridge Univ. Press, 2004. [7] V. Brik, E. Rozner, S. Banarjee, and P. Bahl, “DSAP: A protocol for coordinated spectrum access,” in Proc. IEEE DySPAN, 2015, pp. 611–614. [8] T. X. Brown, H. N. Gabow, and Q. Zhang, “Maximum flow-life curve for a wireless ad hoc network,” in Proc. ACM MobiHoc, 2016, pp. 128–136. [9] A. Brzezinski, G. Zussman, and E. Modiano, “Enabling distributed throughput maximization in wireless mesh networks: A partitioning approach,” in Proc. ACM MobiCom, 2006, pp. 26–37. [10] L. Cao and H. Zheng, “Distributed spectrum allocation via local bargaining,” in Proc. IEEE SECON, 2015, pp. 475–486.

Title
:
An Efficient Extreme Learning Machine Based Intrusion Detection System
Article Type
:
Conference Article
Author Name(s)
:
W. Sylvia Lilly Jebarani, Mepco Schlenk Engineering college; K. Janaki ,Mepco Schlenk Engineering college; R. Anupriya ,Mepco Schlenk Engineering college
Country
:
India
Research Area
:
Electrical engineering

This paper presents an intrusion detection technique based on online sequential extreme learning machine. For performance evaluation, KDDCUP99 dataset is used. In this paper, we use three feature selection techniques – filtered subset evaluation, CFS subset evaluation and consistency subset evaluation to eliminate redundant features. Two network traffic profiling techniques are used. Alpha profiling is done to reduce time complexity and beta profiling is used to remove redundant connection records and hence reduce the size of dataset

Keywords : Network traffic profiling, OS-ELM

Recent

[1] Adetunmbi A.Olusola., Adeola S.Oladele. and Daramola O.Abosede, “Analysis of KDD ’99 Intrusion Detection Dataset for Selection of Relevance Features,” World Congress on Engineering and Computer Science 2010, Vol I. [2] Singh.R.,Kumar, H., &Singla. R. K(2014), “TOPSIS based multi-criteria decision making of feature selection techniques for network traffic dataset”, International Journal of Engineering and Technology,5(6),4598-4604. [3] Chia-Ming Wang, Yin-Fu Huang, “Evolutionary-based feature selection approaches with new criteria for data mining: A case study of credit approval data”, April 2009. [4] Ester,M., Kriegel, H.P., Sander,J.,&Xu,X.(1996),”A Density-based algorithm for discovery clusters in large spatial databases with noise”, Second International Conference on Knowledge Discovery and data Mining(pp.226-231). [5] S. Revathi., A. Malathi., “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection”, International Journal of Engineering & Technology, Vol. 2. [6] KDDCup dataset (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [7] Matlab Language of Technical Computing (2014). http://in.mathworks.com/products/matlab/. [8] Weka 3.6.9: Data Mining Software, http://www.cs.waikato.ac.nz/ml/weka/..

Title
:
Segmentation Of Coronary Artery Blood Vessels Using Morphological Operators
Article Type
:
Conference Article
Author Name(s)
:
Dr.A.Umarani, K.L.N. College of Engineering; A C Shagar ,
Country
:
India
Research Area
:
Electrical engineering

Extraction of coronary artery from coronary angiography is an important goal to improve the diagnosis and treatment of coronary artery disease. This paper presents the extraction of coronary artery blood vessels using Morphological operators. The paper involves two stages. The first stage involves the application of the basic Morphological operator in which the brightness of the arteries was improved using the dilation operator. The second stage presents the background correction using thresholding technique followed by advanced morphological operations whereby the unwanted background particles were removed and the blood vessels of the coronary arteries are extracted. Simulation results show the efficiency of the extraction of coronary artery by the proposed method. The simulation is implemented using Laboratory Virtual Instrumentation Engineering Workbench (Lab VIEW) version 13.

Keywords : Coronary Artery, Image Enhancement, Angiography, Morphological Operator

Recent

[1] M.A. Luengo-Oroz, M.J. Ledesma-Carbayo1, J.J G´omez-Diego, M.A. Garc´ıa-Fern´andez, M. Desco, and A. Santos.Extraction of the Coronary Artery Tree in Cardiac Computer Tomographic Images Using Morphological Operators. F.B. Sachse and G. Seemann (Eds.): FIMH 2007, LNCS 4466, pp. 424–432, 2007.c Springer-Verlag Berlin Heidelberg 2007. [2] G.N.Balaji, T.S.Subashini, A.Suresh. An efficient view classification of echocardiogram using morphological operations. 30th September 2014. Vol. 67 No.3© 2005 - 2014 JATIT & LLS. All rights reserved. [3] Wang Y., Narayanaswamy A., Roysam B. “Novel 4-D Open-Curve Active Contour and Curve Completion Approach for Automated Tree Structure Extraction” 2011 IEEE Conference, Computer Vision and Pattern Recognition (CVPR), pp. 105 – 1112 [4] Lesage D, Angelini ED, Bloch I, Funka-Lea “A review of 3D vessel lumen segmentation techniques: models, features and extractionschemes”. (2009) , Med Image Anal Vol13(6):819–845 [5] Zambal S, Hladuvka J, Kanitsar A, Buhler K “Shape and appearance models for automatic coronary artery tracking”. 2008 ,The Midas Journal—MICCAI Workshop Grand Challenge Coronary Artery Tracking. http://hdl. handle.net/10380/1420. Accessed 9 Dec 2001 [6] Aylward S. R. and Bullitt. E. “Initialization, noise, singularities, and scale in height ridge traversal for tubular object centerline extraction”. 2002. IEEE Trans Medical Imaging, Vol 21(2):61–75, [7] Bouraoui B, Ronse C, Baruthio J, Passat N, Germain P “Fully automatic 3D segmentation of coronary arteries based on mathematical morphology”. (2008) In: IEEE international symposium biomedical imaging: from nano to macro (ISBI) 1059–1062. [8] Gonzalez G., Turetken E., Fleuret F., and Fua P. “Delineating trees in 2d images and 3d image-stacks”. 2010.,IEEE international conference on Computer Vision and Pattern Recognition (CVPR), pages 2799–2806.

Title
:
FPGA Implementation Of Content Addressable Memory
Article Type
:
Conference Article
Author Name(s)
:
S.Gokila, KIT- KalaignarKarunanidhi Institute of Technology; R.Mythili ,; S.Chandra kala ,
Country
:
India
Research Area
:
Electrical engineering

To reduce the power dissipation in circuits, the reversible logic design is implemented. Reversible logic design is one of the main low power techniques. In the proposed design the address decoder is designed using basic reversible logic gates Fredkin gate and Peres gate.The encoder is designed using Fredkin and Feynman gate. In the use of Peres gate in proposed design reduce the quantum cost and power dissipation of the decoder. The Content Addressable memory architecture will be realized using FPGA

Keywords : Decoder, Fredkin gate, FPGA, Peres gate, Reversible logic

Recent

[1] Abu Sadat Md. Sayem, Masashi Ueda, “Optimization of reversible sequential Circuits”, Journal Of Computing, Volume 2, Issue 6, June 2010, Issn 2151-9617. [2] B.Raghukanth, B.Murali Krishna, M. Sridhar, V.G. SanthiSwaroop,“A Distinguish Between Reversible And Conventional Logic Gates”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 ,Vol. 2, Issue 2,Mar-Apr 2012, pp.148-151. [3] DivyanshMathur, ArtiSaxena, AbneeshSaxena, “ Arithmetic and Logic Unit Designing Using Reversible Logic Gate”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013. [4] Neeraj Kumar Misra, Mukesh Kumar Kushwaha, SubodhWairya, Amit Kumar ,“Cost Efficient Design of Reversible Adder Circuits for Low Power Applications”International Journal of Computer Applications (0975 – 8887) Volume 117 – No. 19, May 2015. [5] N.Srinivasa Rao1, P.Satyanarayana ,“A Novel Reversible Gate and its Applications”, International Journal of Engineering and Technology Volume 2 No. 7, July, 2012. [6] Ravish Aradhya HV, Chinmaye R, Muralidhara KN “Design, Optimization and Synthesis of Efficient Reversible Logic Binary Decoder” International Journal of Computer Applications (0975 – 8887), Volume 46– No.6, May 2012. [7] RaghavaGaripelly, P.Madhu Kiran, A.Santhosh Kumar,“ A Review on Reversible Logic Gates and their Implementation”,International Journal of Emerging Technology and Advanced Engineering ,ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013. [8] S Dinesh Kumar, Noor Mahammad Sk, “A Novel Binary Content Addressable Memory Design using Reversible Logic” Computer and Communications Technologies (ICCCT), IEEE International Conference, Year: December 2014,Pages: 1 – 5. [9] ShefaliMamataj, DibyaSaha, NahidaBanu, “ A Review of Reversible Gates and its Application in Logic Design”,American Journal of Engineering Research (AJER) e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-03, Issue-04, pp-151-161.