International Journal of Engineering and Techniques
IJET -Volume 3, Issue 3, May - June 2017
S.No
|
Title/Author Name
|
Serial No
|
1
|
Blood Bank Automation Using Android Application
- Y.R.Risodkar , KhushabuShirsath , SnehaWagh , KunalSali
Abstract
Insert Abstract. Keyword: Reliability of power, Mitigation of Interruption, Radial feeders, power transformer and grid feeders. × Y.R.Risodkar , KhushabuShirsath , SnehaWagh , KunalSali, "Blood Bank Automation Using Android Application" Vol. 3 - Issue 3(1-4)- May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P1 |
2
|
Multimodel Biometric Template Authentication of Fingervein and signature using Visual Cryptography
- Shaik Riyaz Ulhaq , Shaik Imtiyaz , Selva Kumar, L.Gopinath
Abstract
In this paper personal verification method using fingervein and signature is presented. Among many authentication systems finger-vein is promising as the foolproof method of automatic personal identification. Finger-vein and signature image is pre-processed and features are extracted using cross number concept and principle compound analysis. Fusion technique is used to fuse the finger vein and signature images. Then the visual cryptographic scheme is applied for the biometric template to generate the shares. The shares are stored in a separate database, and then the biometric image is revealed only when both the shares are simultaneously available. At the same time, the individual image does not reveal the identity of the biometric image. The proposed work is evaluated with evaluation metrics FAR, FRR and accuracy. Keyword: Biometrics, Multimodal,Visual Cryptography Finger vein , Signature. × Shaik Riyaz Ulhaq , Shaik Imtiyaz , Selva Kumar , L.Gopinath "Multimodel Biometric Template Authentication of Fingervein and signature using Visual Cryptography" Vol. 3 - Issue 3 (5-10) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P2 |
3
|
Detection of Abnormalities in the Functioning of Heart Using DSP Techniques
- CH. Aruna Jyothi ,P.Anitha
Abstract
A group key generation algorithm investigates group secret key generation problems for different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A new group key generation strategy with low complexity is proposed, which combines the well-established point-to-point pair wise key generation technique, the multisegment scheme, and the onetime pad. In particular, this group key generation process is studied for three types of communication networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network. Three group key generation algorithms are developed for these communication networks, respectively. The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address the time allocation problem in the channel estimation step to maximize the group key rates. This non-convex max – min time allocation problem is first reformulated into a series of geometric programming, and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also provided to validate the performance of the proposed key generation algorithms and the time allocation algorithm. Keyword: - -. × CH. Aruna Jyothi ,P.Anitha , "Detection of Abnormalities in the Functioning of Heart Using DSP Techniques" Vol. 3 - Issue 3( 11-16 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P3 |
4
|
Manufacturing of an Indexing JIG Operated by Lever Mechanism
- Premodh Leonarld.R , Mirma Vashni.S , Karthikeyan.B , Poovarasan.M , Prabhakaran.T
Premodh Leonarld.R , Mirma Vashni.S , Karthikeyan.B , Poovarasan.M , Prabhakaran.T , "Manufacturing of an Indexing JIG Operated by Lever Mechanism" Vol. 3 - Issue 3( 17-22 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P4 |
5
|
Development of a Robotic Vehicle and Implementation of a Control Strategy for Gesture Recognition through Leap Motion device
- Dr. V. Nithya , T. Sree Harsha, G. Tarun Kumar , D. Sainath
Abstract
The concept of this paper deals with the development of a robotic vehicle and the implementation of a control strategy through gesture recognition (Leap Motion Sensor), by means the natural movement of the forearm and hand. Our experiment shows that our method based on Leap Motion Controller tracking data can recognize hand gesture accurately when no occlusion happens. Keyword: Autonomous Mobile Robot, Gesture recognition, Leap Motion Sensor, zigbee transreceivers. × Dr. V. Nithya , T. Sree Harsha, G. Tarun Kumar , D. Sainath , "Manufacturing of an Indexing JIG Operated by Lever Mechanism" Vol. 3 - Issue 3( 23-29 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P5 |
6
|
A New Data Hiding Technique Using CHAOS Embedded for Colour Image
- N Mallikarjuna , P.Varunraj , K.Santhosh Kumar
Abstract
Data hiding algorithms, which have many methods describing in the literature, are widely used in information security. In data hiding applications, optimization techniques are utilized in order to improve the success of algorithms. The genetic algorithm is one of the largely using heuristic optimization techniques in these applications. Long running time is a disadvantage of the genetic algorithm. In this paper, chaotic maps are used to improve the data hiding technique based on the genetic algorithm. Peak signal to noise ratio (PSNR) is chosen as the fitness function. Different sized secret data are embedded into the cover object using random function of MATLAB and chaotic maps. Randomness of genetic is performed by using different chaotic maps. The success of the proposed method is presented with comparative results. It is observed that gauss, logistic and tent maps are faster than random function for proposed data hiding method. Keyword: - -. × N Mallikarjuna , P.Varunraj , K.Santhosh Kumar , "A New Data Hiding Technique Using CHAOS Embedded for Colour Image" Vol. 3 - Issue 3( 30-41 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P6 |
7
|
Application of Data Mining in Equity Market
- Akshay Chelawat , Rishi Agarwal , Ashutosh Das , Nalini N
Abstract
The current paper is focused on investigating the approaches of forecasting of financial time series paying the main attention to the tools, which are taken from the methodology of Data Mining which are neural networks and clustering. The paper has the qualitative design and it is based on the studying of the secondary sources. Keyword: Data mining, Securities, Wiener process, Heston’s Model, Brownian Motion, Clustering , Neural Networks. × Akshay Chelawat , Rishi Agarwal , Ashutosh Das , Nalini N , "Application of Data Mining in Equity Market " Vol. 3 - Issue 3( 42-49 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P7 |
8 |
Implementation of Maximum Power Point Tracking Algorithm Using Raspberry PI
- B. Evangeline kiruba, K.Gerard Joe Nigel
Abstract
Renewable energy plays a vital role for the development of a country. Energy can be extracted from a number of ambient conditions like vibration, solar, thermal gradient etc. The maximum power from these systems can be extracted by using MPPT along with power converters. However, conventional maximum power point tracking (MPPT) method for solar cells, are complex and cannot be utilized due to their cost and power requirements. In proposed system the performances of DC-DC converter assisted by MPPT and the performance is characterized by and Perturb and Observe algorithm along with Raspberry Pi controller using boost converter by varying the duty cycle of the boost converter. The main advantages of P&O algorithm are simple in structure, with both stand-alone and grid-connected systems, MPP tracking can be done with very high efficiency. Keyword: Perturb and observe algorithm, Photovoltaic, MPPT, Raspberry Pi.× B. Evangeline kiruba, K.Gerard Joe Nigel , "Implementation of Maximum Power Point Tracking Algorithm Using Raspberry PI" Vol. 3 - Issue 3( 50-56 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P8 |
9 |
Development of Remote Vehicle Monitoring System FOR Surveillance Applications
- Thishone. P , Samson Isaac. J
Abstract
This paper focuses on the development of a portable road side sensor system for vehicle classi?cation, and speed measurement. Vehicle classi?cation is done based on the vehicle length and an estimate of the height of the vehicle. Vehicle length is estimated from the product of occupancy and estimated speed. The average vertical vehicle height is estimated using ultrasonic sensors that are vertically spaced by 2 m. To calculate the speed of the vehicle with an accuracy of 95%. The developed sensor system is compact, portable, wireless, and in-expensive. Data are presented from a large number of vehicles and different type of vehicles are passed in the roadside. To the types of vehicle and speed of the particular vehicle is displayed in the display unit. Finally, the remote monitoring system is used in Lab-VIEW. Keyword: vehicle classification, vehicle speed measurement, vehicle height, Display unit.× Thishone. P , Samson Isaac. J , "Development of Remote Vehicle Monitoring System FOR Surveillance Applications" Vol. 3 - Issue 3( 50-56 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P9 |
10 |
A Survey on Deceptive Attack and Defense Game in Honeypot-Enabled Networks for IOT
- K.Thenmozhi , E.Dilip kumar
Abstract
This paper focuses on the development of a portable road side sensor system for vehicle classi?cation, and speed measurement. Vehicle classi?cation is done based on the vehicle length and an estimate of the height of the vehicle. Vehicle length is estimated from the product of occupancy and estimated speed. The average vertical vehicle height is estimated using ultrasonic sensors that are vertically spaced by 2 m. To calculate the speed of the vehicle with an accuracy of 95%. The developed sensor system is compact, portable, wireless, and in-expensive. Data are presented from a large number of vehicles and different type of vehicles are passed in the roadside. To the types of vehicle and speed of the particular vehicle is displayed in the display unit. Finally, the remote monitoring system is used in Lab-VIEW. Keyword: vehicle classification, vehicle speed measurement, vehicle height, Display unit.× K.Thenmozhi , E.Dilip kumar , "A Survey on Deceptive Attack and Defense Game in Honeypot-Enabled Networks for IOT" Vol. 3 - Issue 3( 57-62 ) - May - June 2017 , International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I3P10 |