IJET -Volume 3, Issue 6 , November - December 2017
S.No
|
Title/Author Name
|
Serial No
|
|
71 |
A Smart School Pupil‘s Transport Monitoring System
- B. Ramesh, Dr.S.A.K. Jilani
Abstract
In the present world, there are different technological methods available in order to provide safety and security for school children in the process of transportation to and from school. But these methods and hardware used are costlier and consume more power. At the same time, they are static and not real time operable.Security concerned activities always demand high cost human resourcesand manual operations. In order to overcome the above disadvantages,the proposed model is designed with the embedded systemusing ARM7 TDMI processor. The model uses different modules such as Micro controller LPC2148, RFID reader, RFID tags, GSM modem, 16X2 LCD. This paper presents anautomated system to monitor the schoolchildren who are using school transportation for attending school. The system consists of two modules such as Busmodule, parent module and school module. The Bus modulein this system is used to identify the pupil every time when he or she board or alight the school bus with the help of RFIDtag, which is, placed in identity card. This information is communicated to the parent mobile along with time stamp by using SMS. Daily Student attendance at various pick-up points is recorded and updated in onboard module and also in school module. The parent and school modules may be a simple mobile phone, which receives SMS alerts from the Bus module. Microcontroller LPC2148 is the heart of the project. It reads student ID numbers from ID cards by using the RFID reader interfaced to it. The GSM modem is also interfaced to the microcontroller, which sends the alert messages to the parent mobile phones.Keil IDE is used to develop the source code of the project.Flash magic software is used to load the generated object file into the microcontroller IC. Proteus simulator softwareis used to simulate the entire project before working on hardware. Keyword: Student Transport monitoring, ARM7, TDMI, GSM module, RFID reader, RFID tags, Keil IDE, Proteus× B. Ramesh, Dr.S.A.K. Jilani" A Smart School Pupil‘s Transport Monitoring System" Vol. 3 - Issue 6 ( 466 - 470 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P71 |
|
72 |
Innovation and opportunities of Big Data: promote business Intelligence
- Sara Riahi, Azzeddine Riahi
Abstract
New uses linked to the proliferation of the Internet (social networks, smartphones, mobile applications, etc.) and advances in technology (use of sensors, GPS, RFID chips, etc.) contribute to an avalanche of data produced on a large scale in an unstructured way. This is the Big Data phenomenon. For companies, the real challenge in the age of Big Data is to be able to process and analyze in real time large data flows from different sources in structured and unstructured form in order to extract value and to obtain a competitive advantage. In other words, a big data project puts companies face technological challenges since a suitable architecture to be set up, to organizational issues to decide the strategy and the data flow organization to be treated and as economic issues in terms of value creation. In this article, we present an overview of these issues for companies. According to IDC (International Data Corporation), the volume of digital data created in the world surpassed 2.8 zettabytes in 2012, and will be multiplied by 50 in the next decade. We talk about data deluge, mega data, big data. The data are of various types: text data, images, videos, links in social networks, bank data, and public data (open data), IDC predicts an annual growth rate of the technology market and Big Data services in the world of 26.24% in 2018. Keyword: Big data, Data scientist, data analysis, Business Intelligence× Sara Riahi, Azzeddine Riahi" Innovation and opportunities of Big Data: promote business Intelligence" Vol. 3 - Issue 6 ( 470 - 481 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P72 |
|
73 |
Characterization of Colloidal Solution for
Wound Dressing using Honey
- Dr. Hireni Mankodi,Utkarshsinh Solanki,Dr. Bharat Patel
Abstract
The wound dressing are one of the critical products of medical textile. The wound management system includes wound dressings, bandages, pressure garments and tissue engineering etc. The main function of wound dressings is to heal the wound depending upon the severity of the wound, preventing from infections and providing appropriate condition for faster wound healing. The honey is well-known natural product used for medicated purpose in different medical problem. The technical research shows that the honey can be act as anti-microbial, anti-fungal, anti-biotic, anti-inflammatory and anti-dour. The result of studies shows that honey with silver Nano particles gives efficient wound healing performance. Further study required to get the standardized the wound dressing. In this present study, using honey and silver, the standardize colloidal solution has been prepared using honey by varying the concentration of honey and stock solution and it?s characterization has been done which has been applied to prepared the spunlace wound dressing and antimicrobial activities has been checked Keyword: Spunlace, colloidal solution, Nano particles, wound dressing, honey× Dr. Hireni Mankodi,Utkarshsinh Solanki,Dr. Bharat Patel" Characterization of Colloidal Solution for Wound Dressing using Honey " Vol. 3 - Issue 6 ( 482 - 487 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P73 |
|
74 |
Automated Voice based Braille Script Teaching Aid using Raspberry Pi
- S. Ayesha Tanveer, Dr. S.A.K Jilani
Abstract
Education is the key to success in life, normal children learn from teachers in schools seeing and communicating with each other. For Visually challenged students learning to read and write is much more difficult because of visual impairment. The teaching aids required to teach such blind pupil are special and require lot of teacher?s attention. For a first time learning blind student, character set and numbers are taught with a help of marbles and slotted slate. Different arrangement patterns of marbles on slotted slate represent different characters. For each character representation, teacher has to reach each student and change the arrangement of marbles. This is harder and time-consuming exercise. This paper describes a Raspberry Pi based Hardware Implementation of the Braille teaching device, where the above problem can be abridged. This project implements a Braille Script Teaching Aid in which the presence of marbles is detected using IR sensors and this information is given to Raspberry Pi which produces the audio output of the letter. This method provides an easy way of teaching Braille Script. Some self-learning programmes are developed to make students to learn without the help of a teacher. It is well suited for first time learners. We can teach different languages with the same setup by selecting the language based on the requirement Keyword: Braille script, Braille cell, marble, Raspberry Pi, IR Sensor× S. Ayesha Tanveer, Dr. S.A.K Jilani"Automated Voice based Braille Script Teaching Aid using Raspberry Pi" Vol. 3 - Issue 6 ( 488 - 495 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P74 |
|
75 |
Raspberry Pi based Real Time People Detection, Trackingand Counting System
- Mr. V.Mustafa, Dr. S.A.K Jilani
Abstract
In present days, people detection, tracking and counting is an important aspect in the video investigation and subjectin demand in Computer Vision systems. For many applications it is necessary to identify people and then accurately count the number of people in the real time. To perform the people counting, a robust system for people Detection and Tracking is needed. This paper mainly discusses the detection, tracking and counting of people in real time with images captured from a stationary camera.This method uses a Background Subtraction technique for people detection and Kalman Filtering Algorithm for tracking. The present work describes a standalone people counting gadget designed using Raspberry Pi2, asingle Board visiting card size computer. MATLAB Simulink computer vision system and Simulink support package for raspberry pi hardware toolboxes are used in rapid prototyping the design Keyword: Motion detection, Tracking and Counting, Raspberry Pi2, SimulinkComputer vision, Raspberry pi toolbox, Rapid prototyping× Mr. V.Mustafa, Dr. S.A.K Jilani" Raspberry Pi based Real Time People Detection, Trackingand Counting System" Vol. 3 - Issue 6 ( 496 - 503 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P75 |
|
76 |
Secure Ranked Multi Keyword Hierarchical Search Arrangement Over Encoded Cloud Data
- C.Thangamalar, M.Elakkani, V.Mekala
Abstract
The new Trent through the beginning of cloud computing, it obligates developed progressively general aimed at numbers cloud processors to subcontract their information to community cloud servers although allowing information users to recover this figures. For confidentiality apprehensions, secure searches over scrambled cloud information obligate interested numerous investigations the comprehensive thing underneath the solitary administrator archetypal. Nonetheless, thorough going mist attendants in duplication establish not unprejudiced attend individual proprietor in its residence, they food numerous owners near section the supports transported by cloud computing. In this paper, we propose arrangements near procedure finished confidentiality preserving ranked multi-keyword search in a multi proprietor model .To allow mist waiters toward achieve protected examination deprived of meaningful the unaffected material of composed keywords and trapdoors, we systematically suggestion a innovative endangered inspection technique. To enthusiastic the examination consequences and conserves the privacy of implication channels between keywords and documentations, we propose a novel preservative knowledge and discretion preserving meaning household. To stop the aggressors since attics plummeting underground solutions and imagining to be permissible information users succumbing explorations, we new idea a new information user verification procedure. Additionally, privacy links effective substantial operator annulment. Overall investigations on real world datasets confirm the efficacy and efficiency of preserving system model Keyword: cloud, encoded, data× C.Thangamalar, M.Elakkani, V.Mekala"Secure Ranked Multi Keyword Hierarchical Search Arrangement Over Encoded Cloud Data" Vol. 3 - Issue 6 ( 504 - 506 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P76 |
|
77 |
Novel System For Image Re-ranking Using Query-Specific Semantic Signatures
- Kavitha guda, Doolam ramdarshan
Abstract
Picture re-positioning, as a powerful approach to enhance the aftereffects of online picture seek, has been embraced by momentum business web crawlers, for example, Bing and Google. Given an inquiry catchphrase, a pool of pictures is first recovered in view of literary data. By requesting that the client select a question picture from the pool, the rest of the pictures are re-positioned in view of their visual likenesses with the inquiry picture. A noteworthy test is that the likenesses of visual highlights don't well relate with pictures' semantic implications which translate clients' pursuit expectation. As of late individuals proposed to coordinate pictures in a semantic space which utilized traits or reference classes firmly identified with the semantic implications of pictures as premise. Notwithstanding, taking in a widespread visual semantic space to describe exceedingly various pictures from the web is troublesome and wasteful. In this paper, we propose a novel picture re-positioning structure, which naturally disconnected learns distinctive semantic spaces for various question watchwords. The visual highlights of pictures are anticipated into their related semantic spaces to get semantic marks. At the online stage, pictures are re-positioned by looking at their semantic marks acquired from the semantic space indicated by the question watchword. The proposed question particular semantic marks fundamentally enhance both the exactness and productivity of picture re-positioning. The first visual highlights of thousands of measurements can be anticipated to the semantic marks as short as 25 measurements. Trial comes about demonstrate that 25-40 percent relative change has been accomplished on re-positioning precisions contrasted and the best in class techniques. Keyword: Image search, image re-ranking, semantic space, semantic signature, keyword expansion× Kavitha guda ,Doolam ramdarshan"Novel System For Image Re-ranking Using Query-Specific Semantic Signatures" Vol. 3 - Issue 6 ( 507 - 514 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P77 |
|
78 |
High Throughput Polar Codes Of List Decoder Architecture
- Rajesh Kanuganti, Sabavath kinzy bai
Abstract
Meanwhile, as obstacle discretionary twofold facts memory much fewer channels even as decoded through approach for using a low multifaceted nature dynamic cancelation (SC) calculation, the foul-up execution of the SC figuring is negative for polar codes with constrained piece lengths. The cyclic repetition check (CRC)- reinforced SC posting (SCL) unraveling figuring has needed blunder execution over the SC estimation. Although, modern CRC-helped SCL decoders cost the sick outcomes of lengthy unraveling idleness and obliged throughput. In this paper, a lessened torpidity list interpreting (RLLD) figuring for polar codes is proposed. Our RLLD estimation plays out the short assessment interpreting on a twofold tree, whose leaves look at to the bits of a polar code. In gift SCL decoding assessments, every ultimate one of the center focuses on the tree are investigated, and each and every doable end result of the information bits are taken into consideration. Or, however, perhaps, our RLLD estimation visits numerous a lousy package less focuses on the tree and considers abundance considerably less feasible eventual outcomes of the substances bits. At the thing whilst dealt with because it ought to be, our RLLD tally basically lessens the translating lethargy and, thusly, enhances throughput, whilst presenting little execution defilement. In the context of our RLLD consist of, we like manner suggest an excessive throughput posting decoder planning, that is trashy for ways reaching square lengths due to its adaptable incomplete mixture figuring unit. Our decoder building has been completed for distinctive square lengths and synopsis sizes the usage of the TSMC ninety-nm CMOS advancement. The utilization happens exhibit that our decoders fulfill simple nation of no recreation motion diminishing and move sufficiency trade separated and the alternative once-over polar decoders within the synthesis. Keyword: gear utilizes, listing interpreting, low-lethargy, imaginative loosening up× Rajesh Kanuganti, Sabavath kinzy bai"High Throughput Polar Codes Of List Decoder Architecture" Vol. 3 - Issue 6 ( 515 - 521 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P78 |
|
79 |
A Secure And Arbitary Keywords Grade Process On Cloud Data
- SK.Ruksana, M.Srinivas, Dr.Ch.N.Santhosh kumar
Abstract
Due to the broadening noteworthy exceptional of administered setting up, a consistently creating measure of assurances proprietors are dynamic to outsource their substances to cloud servers for wonderful solace and dwindled charge in bits of knowledge control. Be that as it could, sensitive feelings should be mixed early of time than outsourcing for security necessities, which obsoletes estimations use like catchphrase fundamentally based totally record recuperation. in this project, we screen a tranquil multi-watchword put are looking out plot over blended cloud records, which on the equal time fortifies dynamic empower operations like cancellation and eagerness of information. especially, the vector district show up and the by and massive finished TF_IDF indicate are joined inside the document change and request age. We make more prominent a dazzling tree-essentially on a very basic level based totally posting structure and provoke an "insatiable weight at first attempting to find" figuring to reveal talented multi-catchphrase arranged look. The safe KNN estimation is associated with scramble the quick overview and question vectors, and inside the suggest time ensure correct congruity rating consider as a part of encoded record and request vectors. With a picked surrender focus to renounce genuine ambushes, nebulous vision terms are passed on to the record vector for blinding inquiry gadgets. in view of the. Keyword: obsoletes estimations, safe KNN estimation, obvious task, statistics adaptably, request instruments.× SK.Ruksana, M.Srinivas, Dr.Ch.N.Santhosh kumar"A Secure And Arbitary Keywords Grade Process On Cloud Data" Vol. 3 - Issue 6 ( 522 - 530 ) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P79 |
|
80 |
Quality-Control System
- Arjun C.R.M
Abstract
In any production line, 80% of the error occurs due to 20% of major faults and 20% of the error occurs due to 80% of minor faults. The QC, as the name narrates, is not only about controlling the quality of the product but also the ways in which the statistics of the occurring errors can be drawn to improve the process of production.The various tools used to draw the statistics of these errors are of 7 types that are Cause and effect diagram, Check sheets, Control charts, Histogram, Pareto chart, Scatter diagram&Stratification. Keyword: ----.× Arjun C.R.M"Quality-Control System" Vol. 3 - Issue 6 ( 531 - 535) - November - December 2017, International Journal of Engineering and Techniques (IJET) , ISSN: 2395 - 1303 , www.ijetjournal.org × |
IJET-V3I6P80 |
|