IJET -Volume 5, Issue 4 , July - August 2019
S.No
|
Title/Author Name
|
Serial No
|
1 |
REAL TIME AUTOMATIC HYBRID SOLAR PV
TRACKING SYSTEM
- Manoharan S,Loganayaki .C,Mohamed Rasith.M,Mohanraj. S ,Nowshin Sadikha.s.
Abstract
In these days energy resources is important source in today’s world. Conventional energy resources is the abundant for environmental pollution. Solar energy is one of the best power source in recent days. Solar energy gains rapidly in these days. Solar energy is used for the power shortage in India. Solar cells has been used increasingly in recent days to convert solar energy to electrical energy. The earth receives 84 terawatts of power and our world consumes about 12 terawatts of power per day we are trying to consumes more energy from the sun using solar panel. The tracker generates 16% to 24%more energy comparing to fixed tilt system. To increase the conversion from solar to electrical energy, the solar panels have to be positioned perpendicular to the sun. There are more technology to track the sun position. The single axis PV tracking system gives lower energy output during sun condition. So we are using dual axis PV tracking system to get more power and to increase the efficiency of power and the panel.We used thermoelectric generator to increase the efficiency of the solar panel.The Arduino based design methodology of an automatic tracking system is presented in this paper. LDR is used as sensing element.. Keyword: Light Dependent Resistor , Arduino UNO, Photo Voltaic cell, DC motor, Thermoelectric generator, Submersible pump. × Manoharan S,Loganayaki .C,Mohamed Rasith.M,Mohanraj. S ,Nowshin Sadikha.s REAL TIME AUTOMATIC HYBRID SOLAR PV TRACKING SYSTEM " Volume 5 - Issue 4 (1-9) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P1 |
2 |
The Segmentation of Lumen Boundaries at Intravascular Ultrasound Images
- C.priyanka, Dr.M.vanitha
Abstract
Intravascular Ultrasound Image (IVUS) is one of the medical imaging techniques based on the catheter. These techniques are very useful for studying heart diagnose and management of arterial atherosclerosis. It produces the vessel cross sectional images of blood vessels that provide the quantitative and qualitative assessment of the vascular wall information about the nature of atherosclerosis lesions as well as plaque size and shape. The identification of lumen, medium and adventitia limitations in IVUS images is compulsory for an efficient assessment of the atherosclerotic plaques. Throughout an IVUS assessment, a catheter with an ultrasound transducer is introduce in the deceased through a blood vessel and then pulled back to picture succession of container cross sections. This paper obtainable a one of the attractive and interactive methods is the Active Contour Model (ACM) with Local Image Fitting Energy Minimization (LIFEM) method which has been widely used in medical imaging technique as it always produces computationally efficient for sub-regions with continuous boundaries. In our approach maintains and deals with the boundary regularization property and sub-pixel accuracy. .. Keyword: IVUS Cross Sectional Image, Plaque, Blood Vessels, Atherosclerosis, Lumen, Media, Transducer, Active Contour Model.. × C.priyanka, Dr.M.vanitha The Segmentation of Lumen Boundaries at Intravascular Ultrasound Images " Volume 5 - Issue 4 (1-7) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P2 |
3 |
Securing Message Using Steganography with Pixel Value Differencing Method
- Indah Puspasari Handayani, Pinan, Carudin, Maisaroh
Abstract
Steganography is a technique used in the process of sending secret messages. A cover file is used as a medium to hide the secret message. On the use of the image medium as a cover the message hiding process is done by replacing each pixel bit of the cover image with the secret message bits. LSB (Least Significant Bit) is a method that is often used by replacing the bits in the LSB cover position with secret message bits. Increasing message capacity and reducing the level of distortion in steganography have been carried out by developing PVD (Pixel Value Differencing) techniques. In the technique before the message bits are inserted into the LSB cover, first the cover image is divided into non-overlapping pixel blocks. Each block contains two pixels that are close together. Then, the difference in the values of the two pixels is used to determine the size of the message bits that can be inserted. A large pixel difference can accommodate many such messages otherwise a small difference can only be accommodated by a small message. Keyword: Steganography, Pixel Value Differencing × Indah Puspasari Handayani, Pinan, Carudin, Maisaroh Securing Message Using Steganography with Pixel Value Differencing Method " Volume 5 - Issue 4 (1-4) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P3 |
4 |
A Survey on video indexing and Retrieval
- N.Kalaivani , Dr.K.Mahesh .
Abstract
Video data dominate a lot of accumulation for those using multimedia system and employ like analogue depository, state-supported, educational activity, telecommunication and entertainment. Such employ are useful only when video recovery systems are economic sufficiency to recover video recording and other of the essence information from large databases as quick as possible. However, it is extremely ambitious for the existent entanglement scrutiny engines to search for video over the entanglement so novel methodological analysis are required that are surefooted of influence the video recording information accordant to the self-complacent. For multimedia excavation, harvester of transmission data are accumulation and ordered using proficiency like categorization and commentary of video recording. Most of the entanglement supported video retrieval systems work by indexing and searching videos based on texts associated with them but this technique does not execute well because the texts do not incorporate enough information of the video recording. Since video retrieval is not effectual using customary scene boundary perception technique, heritage based conceptualization is considered as one of the best applicatory solutions for better recovery attribute. This natural philosophy representation is a “live” Templet and already satisfactory the constituent of your paper [statute title, textual matter, heads, etc.] in its style sheet of paper. Keyword: - Video Data, Multimedia System, Video Retrieval, Background based approach, Scene Boundary Detection Retrieval, Video Indexing, and Quality. × N.Kalaivani , Dr.K.Mahesh A Survey on video indexing and Retrieval " Volume 5 - Issue 4 (1-9) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P4 |
5 |
A Review of Diabetic Prediction Using Machine Learning Techniques
- M.Rajeswari, Dr.P.Prabhu .
Abstract
Diabetes is a very dangerous disease and does not able to cure. If this disease affects once, it will maintain in your life time. At the same time, your blood having too much of glucose can cause health issues. Like kidney disease, heart disease, stroke, eye problems, dental disease, foot problems, nerve damage. So you can take step to oversee your diabetes and avert these complications. The most general type of diabetes is type 1 and type 2. In this type of diabetes create problems like the body does not able to produce or use insulin. But there are also other kinds of diabetes, like gestational diabetes, which crop up during pregnancy. Gestational diabetes causes high blood sugar that can affect your pregnancy and you baby’s health. Several machine learning and data mining methods are used to diagnoses diabetes and administering diabetes. This study focuses on new developments in machine learning which have made significant impacts in the detection and diagnosis of diabetes. In this work, the machine learning algorithms are used to classifying diabetes patients. The classification accuracy is achieved by the classifying diabetes patients. Keyword: - VDiabetes, classification, prediction, machine learning, accuracy × M.Rajeswari, Dr.P.Prabhu A Review of Diabetic Prediction Using Machine Learning Techniques " Volume 5 - Issue 4 (1-7) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P5 |
6 |
Development of Ultra Strength Concrete and case study on behavior under the influence of Metakaolin and Micro-Silica
Mr.CH.H.SIVA KUMAR REDDY, Dr.VICTOR BABU NEELA
Abstract
Ultra high strength concrete (UHSC) is the latest spectacular development in the domain of Portland cement-based materials. By eliminating the coarse aggregate, improving the packing density of powders with specific grain-size distributions and using water curing at 90 °C, it is possible to increase UHSC compressive strength to over 200 MPa when using mineral powders, 270 MPa with glass powder and 800 MPa with iron powder. When 1–2% of fibers are introduced in the matrix SCC behaves like a pseudo-ductile material, working at a micro structural level like reinforced concrete, which explains why this material – which from a grain-size distribution is a mortar – is called a UHSC. Very impressive structures like the cyclo-pedestrian footbridge at Sherbrooke, the extension of Hamada Airport in Tokyo and two recent architectural buildings in France, the MUCEM in Marseille and The Iceberg, the Louis Vuitton Foundation building in Paris, have been built with this material. In india lot of construction is progressing and high strength concrete is the future engineering result which plays an vital role in development and sustainability. Keyword: - Fibres, Glass powder, Packing density optimization, Pseudo- ductility, Steel powder, Ultra high strength concrete × Mr.CH.H.SIVA KUMAR REDDY, Dr.VICTOR BABU NEELA Development of Ultra Strength Concrete and case study on behavior under the influence of Metakaolin and Micro-Silica " Volume 5 - Issue 4 (1-10) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P6 |
7 |
The Enhancement Of Heat Transfer In Solar Parabolic Collector With Different Nano-Fluids As Working Fluid -A Review
- Vinayak Talugeri
Abstract
The power produced by conventional methods leads to increase in global warming and many harmful emissions to the atmosphere. Hence the solar energy is best choice for power generation. One of the device is to extract solar energy is solar parabolic collector, which manly used for small scale power generation, heating application in chemical industries, oil refining industries etc. The performance of such parabolic collector is enhanced by using Nano-fluid as working fluid. The effect of flow rate, volume concentration in base fluid, nano particle size and type of base fluid on performance of the solar parabolic collector are revived in this paper. Finally, the challenges of nano-fluid in solar collectors are discussed. Keyword: - Base fluids, Nano-fluid, Solar collector × Vinayak Talugeri The Enhancement Of Heat Transfer In Solar Parabolic Collector With Different Nano-Fluids As Working Fluid -A Review " Volume 5 - Issue 4 (1-7) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P7 |
8 |
Effect of Process Parameters in Wire Cut Electric Discharge Machining of Al2285-Mgo Metal Matrix Composites
- Bhavya H.R Bhaskar H.B
Abstract
This paper deals with the machining characteristics of wire cut electrical discharge machining process in Aluminum 2285-MgO composite material. Di-electric used for experiment was De-ionized water. The effects of various process parameters of wire cut electrical discharge machining like pulse on time (TON), pulse off time (TOFF), servo voltage, wire speed, discharge current and servo feed have been investigated to reveal their impact on material removal rate of aluminum 2285-MgO composite.The optimal set of process parameters has been predicted to maximize the material removal rate. Keyword: - WEDM, TON, TOFF, SV, WF, MRR × Bhavya H.R Bhaskar H.B Effect of Process Parameters in Wire Cut Electric Discharge Machining of Al2285-Mgo Metal Matrix Composites " Volume 5 - Issue 4 (1-8) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P8 |
9 |
ANALYSIS OF VEINING DEFECT IN SPHEROIDALGRAPHITE IRON CASTING
- Dr. S. Santhana Krishnan, Priyanka. B, R. Srivatsan, R. Srivigneesh
Abstract
The main bulk density representation in the moulding material is opening material, refractory granular material with a particle size of 0.02 mm. It forms shell moulds and cores, and therefore in addition to activating the surface of the grain is one of the most important features: angularity and particle size of grains. These last two features specify the porosity and therefore the permeability of the mixture, and thermal dilatation of tension from braking dilation, the thermal conductivity of the mixture and even largely affect the strength of moulds and cores, and thus the surface quality of castings. The veining is one of the common surface defects that occur during cast iron casting. They can be eliminated in several ways. The veining is a foundry defect, which arises as a result of tension generated at the interface of the moulds and metal. This tension also arises due to the abrupt thermal expansion of silica sand. And therefore, in the development of veining on the surface of casts influences the characteristics of the filler material and opening material in the production of iron castings Keyword: - angularity, cast-iron casting defects, shell molds, permeability, porosity, thermal dilation, veining. × Dr. S. Santhana Krishnan, Priyanka. B, R. Srivatsan, R. Srivigneesh ANALYSIS OF VEINING DEFECT IN SPHEROIDALGRAPHITE IRON CASTING " Volume 5 - Issue 4 (1-13) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P9 |
10 |
Design and Fabrication of Radius Turning Attachment using Worm Wheel Mechanism
- Priyanka B, Sree Krishna R, Srivatsan R, Srivigneesh R 10.29126/23951303/IJET-V5I4P10
Abstract
Radius turning has always been a challenging task in lathe. Though in recent times numerous attachments and arrangements have been developed, their accuracy and finish have always been in doubt. Our radius turning attachment aims at providing an easier and a more accurate operation using a worm and wheel mechanism. The wheel provides the necessary turn for the tool while the turn itself Is given by means of a worm meshed to the wheel. This ensures a smoother and a much faster operation compared to existing mechanisms Keyword: - lathe, radius turning attachment, wheel, worm. × Priyanka B, Sree Krishna R, Srivatsan R, Srivigneesh R Design and Fabrication of Radius Turning Attachment using Worm Wheel Mechanism " Volume 5 - Issue 4 (1-) 3July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P10 |
11 |
TWEET BASED STRESS ANALYSIS USING WEB MINING AND CLASSIFIED CLUSTERS
- S.Nivetha, Dr. T.Meyyappan 10.29126/23951303/IJET-V5I4P11
Abstract
Web mining is a category of data mining technique and it is mostly used to discover interesting data from a web store. Web mining plays an important role in understanding the customer’s need, analysing user’s behaviour and their needs through the raw data. The discovered data can be applied into various fields to offer newer services. This proposed research work aims to discover the stress possibilities of web users. The proposed work focus on prediction of stress level of twitter users based on their tweets. The tweet history of every user can be captured from the twitter server and the raw data will be clustered based on the tweets and session. The clustered data will be extracted to detect the stress patterns. The proposed approach implements the K-Means cluster approach with Query mining based classification technique to generate quick and accurate reports of stress possibilities. The main objective of the proposed approach is to provide faster prediction compared to existing methods. The proposed method is implemented with CNN and NB techniques Keyword: - Stress, Web Mining, Clusters, Prediction, Query Mining × S.Nivetha, Dr. T.Meyyappan TWEET BASED STRESS ANALYSIS USING WEB MINING AND CLASSIFIED CLUSTERS " Volume 5 - Issue 4 (1-6) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P11 |
12 |
VOLUME FRACTION ANALYSIS AND STATIC COMPRESSION TEST OF THERMOPLASTIC COMPOSITES FOR LIGHT WEIGHT BODY ARMOR
- K.K.Gupta, B.L.Gupta 10.29126/23951303/IJET-V5I4P12
Abstract
In the present study material characterization of thermoplastic composite is performed. Two types of fibers i.e. Kevlar fiber and Basalt fiber are considered and matrix is maleic- anhydride grafted polypropylene (PP). Kevlar/PP and Basalt/PP composite laminates with 8 layers are fabricated using vacuum based compression molding technique. Since these composites have extremely tough surface and are very difficult to cut, hence, these composites are cut by laser cutting and the samples for the static compression, shear and dynamic compression tests are prepared. Volume fraction analysis is carried out by using burn off test. Static compression is performed on UTM. Compression test has been carried for getting the properties in in-plane compression. Keyword: × K.K.Gupta, B.L.Gupta VOLUME FRACTION ANALYSIS AND STATIC COMPRESSION TEST OF THERMOPLASTIC COMPOSITES FOR LIGHT WEIGHT BODY ARMOR " Volume 5 - Issue 4 (1-4) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P12 |
13 |
EXPERIMENTAL AND INVESTIGATION OF SHELL AND TUBE HEAT EXCHANGER
- Dr. S. Santhana Krishnan , Archana S , Dayanidhi R , Jayashruthi. R 10.29126/23951303/IJET-V5I4P13
Abstract
The main objective of the research work aims to study on the heat transfer characteristics of various heat exchangers namely Shell and Tube Heat Exchanger, Cross Flow Plate Fin Heat Exchanger, Spiral Heat Exchanger and Plate Type Heat Exchanger using both miscible and immiscible systems. The various parameters employed in determining the heat transfer characteristics include Reynolds number, Nusselt number, Overall Heat Transfer Coefficient, Capacity Ratio, Number of Transfer Units (NTU), Effectiveness and Efficiency. Experiments are conducted on a 1-1 Shell and Tube Heat Exchanger, Spiral Heat Exchanger and Plate Type Heat Exchanger for parallel and counter current flow patterns with different cold side flow rates, and different composition (9%, 10%, 20% and 25% on volume basis) of cold fluid. Keyword:Heat exchanger, Heat transfer. × Dr. S. Santhana Krishnan , Archana S , Dayanidhi R , Jayashruthi. R EXPERIMENTAL AND INVESTIGATION OF SHELL AND TUBE HEAT EXCHANGER " Volume 5 - Issue 4 (1-5) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P13 |
14 |
A Compendious study on Smart Home Energy Management System for energy forecasting
- Karthika Velu,Pramila Arulanthu,Eswaran Perumal 10.29126/23951303/IJET-V5I4P14
Abstract
Energy management is the indispensable factor to protect energy. Global needs to save energy due to the aspects like energy pricing, emissions targets and lawmaking. Forecasting energy consumption plays a vital and challenging role in the home energy management system. A person cannot manage all works at the same time. So a system established to detect and maintain temperature, power, energy etc., Energy takes a different factors for consumption based on the climate change. Co-ordination among home appliances can work well while reducing the electricity cost. Energy reduction process starts by collecting/metering the energy consumption of a particular building or an organization, then find the adequate way to minimize the cost, and then finally apply the appropriate rule to perform the desired action with a user’s comfort. Co-ordination among home appliances, Demand Response(DR), Peak to Average Ratio(PAR), Prediction Approach, Meter data management, dynamic programming, load shifting, community Micro grids are reliable key factors in Home energy management system. This article helps the researchers to originate the concept of energy saving. Keyword:Load Shifting, Co-ordination Approach, Prediction Analysis, Demand Side Management. × Karthika Velu,Pramila Arulanthu,Eswaran Perumal A Compendious study on Smart Home Energy Management System for energy forecasting " Volume 5 - Issue 4 (1-6) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P14 |
15 |
Multilevel Novel Steganography Technique For Data Security
- S. sindhu, Dr. K. Kuppusamy 10.29126/23951303/IJET-V5I4P15
Abstract
Steganography is a technique used for secure data transmission in cyber world. Inside the enterprise world steganography may be used to hide a secret data or plans for a new invention. Data transmission in public communication system insecure because of interception and improper manipulation by eaves dropper. So the solution for this problem is Steganography,. there are many hiding mechanisms are available in steganography using multimedia files . Already a lot of existing techniques that are only provide the less security, small size of data to be hide, loss of data, Excess time for encryption. The hackers can easily retrieve the encrypted message for the problem of low security. In this paper proposes a Multilevel Novel Stenography Technique (MST) for large-scale data encryption. This research work is to provide more security without data loss, more encryption stages and less time for execution. Keyword:Steganography, AES, MST, Encryption, Decryption. × S. sindhu, Dr. K. Kuppusamy Multilevel Novel Steganography Technique For Data Security " Volume 5 - Issue 4 (1-10) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P15 |
16 |
EFFECT OF WIRE CUT EDM PROCESS PARAMETERS ON SURFACE ROUGHNESS OF ALUMINIUM COMPOSITE
- Harish H , Ravikiran B , S N Lakshminarasimhan 10.29126/23951303/IJET-V5I4P16
Abstract
This paper deals with the effect of wire cut electrical discharge machining (WEDM) process parameters on surface roughness of Al7003 alloy and Al7003+ 6 wt. % TiO2 composite material using one variable at a time approach. The parameters selected were Pulse on, Pulse off, servo voltage, wire speed, discharge current and servo feed. The experiments revealed that pulse off and servo voltage has major influence on surface roughness (Ra). The optimal set of process parameters has also been predicted to minimize the surface roughness.. Keyword:WEDM, TON, TOFF, SV, WF, SR × Harish H , Ravikiran B , S N Lakshminarasimhan EFFECT OF WIRE CUT EDM PROCESS PARAMETERS ON SURFACE ROUGHNESS OF ALUMINIUM COMPOSITE " Volume 5 - Issue 4 (1-7) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P16 |
17 |
A Machine Learning Approach for Early Prediction of Diabetic Retinopathy Using Blood Vessels Extraction
- J.Esthergrace, Dr. E.Ramaraj 10.29126/23951303/IJET-V5I4P17
Abstract
Image processing using Optical coherence tomography (OCT) scan retinal images helps to detect diabetic retinopathy. Diabetic retinopathy involves any disorder concerning specific retinal areas caused by diabetes and it is a major cause of vision loss. This disease can damage the retina’s blood vessels, resulting in visual impairment. Diabetic retinopathy usually affects people's left and right eyes. The intensity of the disease can differ within the eyes. Retina problem is adjusted by color image segmentation it differs from nerves and arteries. The existing Methods namely CV and GAC method diabetic retinopathy identify without extracting blood vessels. By using blood vessel extraction with the machine learning approach is used to improve the accuracy of a diabetic person through retinal images. In this paper, the concept of a machine learning method is used in the blood vessel extraction on both left and right diabetic retinopathy. The proposed method identifies a normal and abnormal result of blood vessels in the retina. The comparative analysis is presented in this paper for existing and proposed methods. The results of the quality metrics Accuracy, Precision, Recall were analyzed with existing and proposed methods to identify the diabetic retinopathy. Keyword:Retina, Blood Vessels Extraction, Sclera, Color Image Segmentation, Diabetic Retinopathy. × J.Esthergrace, Dr. E.Ramaraj EFA Machine Learning Approach for Early Prediction of Diabetic Retinopathy Using Blood Vessels Extraction " Volume 5 - Issue 4 (1-9) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P17 |
18 |
Hybrid K-Means and Watershed, Texture Machine Learning Approach to Predict Brain Tumor
- A.Benazir, E.Ramaraj 10.29126/23951303/IJET-V5I4P18
Abstract
Image processing is utilized in the analytic machine for tumor detection. Brain tumor is a major issue in the restorative field. Image segmentation is used to detect tumor from the brain.MRI scanned images are utilized to identify brain tumor with the help of existing k-means segmentation. Various distinct schemes such as pre-processing, MRF&CRF used to enhance the quality of edge detection and the combination of k-means and watershed, texture segmentation. The proposed method described in this paper is used to improve the image clarity. A machine learning concept and proposed KWT (K-means, Watershed, texture) method are used to predict the brain tumor with better accuracy, sensitivity and specificity. In this paper, comparative analysis is made for existing and proposed k-means methods. The quality metrics such as PSNR&MSE yields better accuracy than the exiting methods. Keyword:Machine learning, Canny Operator, MRF and CRF, k-means, watershed and texture segmentation. × A.Benazir, E.Ramaraj Hybrid K-Means and Watershed, Texture Machine Learning Approach to Predict Brain Tumor " Volume 5 - Issue 4 (1-7) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P18 |
19 |
Hybrid Image Enhancement Machine learning Method to Detect Tumour in MRI Scanned Images
- C.Pandimani, Dr.E.Ramaraj 10.29126/23951303/IJET-V5I4P19
Abstract
Medical image processing is the study of interior organs of the human body with the help of scanned digital images. It helps to provide a visual representation of interior organs which are hidden by the skin and preserved by bones. Scanning of interior affected organs and analyzing the scanned image helps to diagnose and treat disease. In India human dies of tumor cancer every 8 minutes. so tumor cancer is very dangerous disease in Medical file. MRI scanned images plays a vital role in the predict cancer. MRI scanned images is used to identify tumor cancer using existing fuzzy c-means method. A machine learning concept is used to propose in this paper to improve the accuracy of tumor detection. A new method called HIEML (Hybrid Image Enhancement Machine Learning) proposed this paper to analyses the MRI scanned Image of the tumor by combining both image processing and machine learning technique. MRI scanned tumor image is collected from the primary health care center then pre-processing is done on the image to remove noise with the help of the filtering method. The proposed method finds out the tumor affected region the segmented and enhancement is done to improve the quality of the tumor image. Finally, the K-means clustering method is used to identify a similar case of tumor separated over the segmented region. The experimental results shown better results in predicting the tumor infected region of MRI scanned image and it is very useful for better treatment of cancer. The proposed HIEML method compared with existing respected quality matrix PSNR, MSE, CR. Keyword:MRI, Machine learning, cancer detection, K-means clustering, fuzzy c-means. × C.Pandimani, Dr.E.Ramaraj Hybrid Image Enhancement Machine learning Method to Detect Tumour in MRI Scanned Images " Volume 5 - Issue 4 (1-6) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P19 |
20 |
Biometric Image Encryption Based on Modified Lenstra-Lenstra-Lovasz Algorithm
- Mahendra Patil,Avinash Gawande,Dilendra Hiran 10.29126/23951303/IJET-V5I4P20
Abstract
This study proposes a chaos-based image encryption scheme using modified Lenstra-Lenstra-Lovasz algorithm with multiple levels of confusion and diffusion. This encryption algorithm has high key space, entropy very close to eight (for grey images) and very less correlation among adjacent pixels. The highlight of this method is the ideal number of pixels change rate and unified average changing intensity it offers. These ideal values indicate that the encrypted images produced by this proposed scheme are random-like. Multi-biometric systems are being mostly installed in many large-scale biometric applications most importantly UIDAI system in India. Encryption of the biometric images is very important due increasingly use of insecure systems and networks for storage, transmission and verification. Experimental simulations were performed to obtained the encryption parameters and validate the algorithm through common attacks such as noise and compression. Thus the proposed encryption algorithm may be applied to finger print images used in attendance monitoring systems. Keyword:Encryption algorithm, Biometric images, Lenstra-Lenstra-Lovasz algorithm, Attacks. . × Mahendra Patil,Avinash Gawande,Dilendra Hiran Biometric Image Encryption Based on Modified Lenstra-Lenstra-Lovasz Algorithm " Volume 5 - Issue 4 (1-6) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P20 |
21 |
Numerical Investigation of an Axis Symmetric Ramjet Missile Intake at High Angle of Attack
- Sachingowda A.C , Dr. N.K.S. Rajan, Dr. Tharakeshwar T.K 10.29126/23951303/IJET-V5I4P21
Abstract
In the recent years, missiles with air-breathing engines like ramjets/scramjets are becoming popular for long range applications due to their high specific impulse compared to rockets. In order to reduce the cost of these new system development, flow prediction using CFD methods are advantageous. Hence, the objective of the present study is to identify a suitable two equation turbulence model that can be used for the design optimization, by proper validation with experiment. In this regard, the flow characteristics of an axisymmetric supersonic inlet system at different angles of attack have been studied using a 3D compressible RANS solver and compared with the experimental study of Herman [6]. The axis symmetric ramjet intake model used consisted of a two-cone mixed compression design, designed at Mach number MA = 2.99. The numerical model consisted of an advection scheme with difference-splitting method with the SST k-ω turbulence model. In specific, the intake flow field has been analyzed at on-design (00 angle of attack) and three angles of attack (60 and 120) conditions, corresponding to a supercritical mode of operation. A downstream mass flow throttle with a throttling degree/ blockage ratio of about 30% has been used to achieve this mode of operation. The results show that the cone shocks are captured quite well in the simulation till 12deg AoA. but at higher AoA there exists some discrepancy in the prediction. As the angle of attack increases the flow non-uniformity increases because of the viscous BL and SWBLIs effect, as well as the flow separation due to the terminal normal shock. Keyword:Angle of Attack, SWBLIs, Viscous BL. × Sachingowda A.C , Dr. N.K.S. Rajan, Dr. Tharakeshwar T.K Numerical Investigation of an Axis Symmetric Ramjet Missile Intake at High Angle of Attack " Volume 5 - Issue 4 (1-12) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P21 |
22 |
Cyber Crime Detection using Packet Scheduling Technique
- M. Solaimuthu, T. Meyyappan, SM. Thamarai 10.29126/23951303/IJET-V5I4P22
Abstract
Cybercrime refers to the criminal activities exercised with the computers or some other e-devices. Newer methods are to be evolved to resolve all the attacks made through computers or e-devices. In this paper, a novel method is proposed to protect transactions by customers and create preventive guidelines for them. Hackers trap IP address of the innocent customers during their online financial transactions and complete the transactions as though they are doing it. The drudgers detect or perceive the IP address of the actual consumer from the server although the user’s computer conceals it. The drudgers or hackers authenticate themselves as actual user and gain access to their credentials. The actual users are unaware of this malicious activity done by hackers and lose their money. In the pragmatic technique, voluminous data are sent in one stroke. The time elapsed in sending the packets to the receiver are exploited by the hacker to steal the actual user’s credentials. More the volume of data being sent from sender to receiver, more the actual user is vulnerable to malicious activities by hacker. In the proposed method, the data being sent is split into multiple parts with smaller volumes. Due to fast transmission of data in smaller volumes, the hacker could not gain access to the credentials of actual user and data leakage is prevented. Efficiency of the proposed method is established by experimenting with SQL query injection and Hijack query injection attacks over the transmitted data. Keyword:Cyber Attacks, SQL query injection, Hijack query injection. × M. Solaimuthu, T. Meyyappan, SM. Thamarai Cyber Crime Detection using Packet Scheduling Technique " Volume 5 - Issue 4 (1-9) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P22 |
23 |
Multi-Hop Networks With Wireless Communication
- M.N.K. Karthika rajadevi, R.Venkateswari, Dr.A.Senthilrajan 10.29126/23951303/IJET-V5I4P23
Abstract
Wireless conversation suffers from interference, low bandwidth convenient, low data rates compared to wire line, and signal fading. In such military actions, tactical wireless system required high demands for robustness, responsiveness, reliability, availability and security. Four network paradigms can be classified as wireless multi-hop networks. we will present an overview of wireless multi-hop networks along with brief introductions to these four wireless multi-hop network One of the key requirements of the tactical user expectation is to efficiently utilize the available bandwidth. This will consume the system bandwidth thereby throughput will be reduced. Moreover, hop by hop routing method will reconstruct the entire IP packet by changing the destination MAC address in every hop thereby packet processing time will be increased. IP packet routing in the tactical wireless system which are connected via IP radios consume more system bandwidth in order to maintain the up-to-date information. This will consume the system bandwidth thereby throughput will be reduced. Moreover, hop by hop routing method will reconstruct the entire IP packet by changing the destination MAC address in every hop thereby packet processing time will be incremented. Keyword:Multi-hop, Routing protocol, packet forwarding, Wireless communication. × M.N.K. Karthika rajadevi, R.Venkateswari, Dr.A.Senthilrajan Multi-Hop Networks With Wireless Communication " Volume 5 - Issue 4 (1-6) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P23 |
24 |
DCT APPLICATION IN SPEECH RECOGNITION: A SURVEY
- Atul Narkhede, Dr. Naveen Sen, Dr. Milind Nemade 10.29126/23951303/IJET-V5I4P24
Abstract
Speech recognition with the help of the machine is automatically an important research area for over forty years. Since the voice is an unlimited information signal, the speech signal processing through digital conversion is a very efficient tool for high and accurate automatic signal or voice recognition technology. Speech recognition has found its application in different areas of our daily life as a telephone answering machine for transmitting text and sending voice signals to machines. Function extraction and classification is a major part of the ASR system process. The main part of the voice processing system to improve capacity is the selection of the function extraction method that plays an important role in the accuracy of the system. This document provides a brief overview of the detection of various methods in speech processing where DCT uses to efficiently extract features in different ways. Keyword:DCT, MMSE, MFCC. × Atul Narkhede, Dr. Naveen Sen, Dr. Milind Nemade DCT APPLICATION IN SPEECH RECOGNITION: A SURVEY " Volume 5 - Issue 4 (1-5) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P24 |
25 |
Design and Fabrication of Motorised Scotch Yoke Mechanism
- R. Shanmugam, R. Srivigneesh, S. Raghav, S. Santhosh 10.29126/23951303/IJET-V5I4P25
Abstract
The Scotch Yoke Mechanism can be a reasonably simple mechanism for ever-changing the linear motion of a slider into motility motion or vice-versa. The parts of this device include a sliding bar, a yoke on the bar with a slot cut out, and a smaller bar connected to the yoke and affixed by a pin through the yoke slot to the slippery bar. As the bar slides back and forth, or reciprocates, the smaller bar is forced to slip up and down within the yoke slot, making a motion movement. The converse of this motion relationship is also true; as the pin initiates a rotational movement, the slider correspondingly generates a reciprocal or back and forth movement. In operation, the reciprocating part is directly coupled to the sliding bar or yoke with a slot that engages the pin on the rotating part. The motion of the Scotch Yoke Mechanism is such that pure simple harmonic motion is produced by the mechanism when driven by an eccentric or crank. Because velocity and acceleration are derivatives of the displacement time curve these graphs also have a perfect wave form. Scotch Yoke Mechanism is most ordinarily utilized in management valve actuators in high oil and gas pipelines. Although not a common metal working machine nowadays, crude shapers also use Scotch yokes. Keyword:Scotch Yoke, mechanism, rotation, translation. × R. Shanmugam, R. Srivigneesh, S. Raghav, S. Santhosh Design and Fabrication of Motorised Scotch Yoke Mechanism " Volume 5 - Issue 4 (1-4) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P25 |
26 |
Detection of Edge Methods: Evaluation
- R.Venkateswari,M.N.K. Karthika rajadevi, Dr.A.Senthilrajan 10.29126/23951303/IJET-V5I4P26
Abstract
Edge is a rapid replacement such takes place in an image. Edge Detection is a method worn maximum repeatedly for image segmentation depends on hasty difference in intensity. Edge Detection is a measure that discovers existence and region of edges instituted by unexpected alteration in intensity of digital images. Edges confine the boundaries amid region on an image, which aid with object recognition and image segmentation. Edge Detection of an image notably decreases the quantum of data and filters out idle tiding, while protecting the vital morphological properties in images. The common method of edge detection is to study the alteration n of a single image pixel in a region, widely the deviation of the edge neighboring first series or second series to make out the edges. In this paper, review the various edge detection methods like significant operator method such as sobel operator, prewitt’s technique, canny technique and Laplacian of Gaussian (LoG) edge detection methods are specified. Keyword:Sobel operator, prewitt’s technique, canny technique. × R.Venkateswari,M.N.K. Karthika rajadevi, Dr.A.Senthilrajan Detection of Edge Methods: Evaluation " Volume 5 - Issue 4 (1-5) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P26 |
27 |
BI-WHEEL SELF BALANCING ROBOT
- P Jayaganesh, C Sankaranaraayanan, P Sankara Narayanan, R Vishnu Prabu 10.29126/23951303/IJET-V5I4P27
Abstract
The concept of two wheel self-balancing robot is based on Inverted pendulum theory. This type of robot has earned interest and fame among researchers and engineers worldwide as it uses sensors and micro controller to stabilise a falling object. These robots provide exceptional durability and capability due to their small size and low power requirements. These types of implementation find applications in several purposes such as surveillance & transportation. This project is based on developing a self balanced bi- wheeled robot. In particular, the focus is on the electro-mechanical systems & control algorithms required to enable the robot to identify and act in real time. Keyword:Torque,Self-balance,PID,Stepper motor,Sensors,Accelerometer,Gyroscope × P Jayaganesh, C Sankaranaraayanan, P Sankara Narayanan, R Vishnu Prabu BI-WHEEL SELF BALANCING ROBOT " Volume 5 - Issue 4 (1-6) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P27 |
28 |
Wired Network Analysis Using Ftp Server in Firewall Load balancing based on Round Robin Method
- M.Kowsalya, Dr.A.Senthilrajan 10.29126/23951303/IJET-V5I4P28
Abstract
In modem technology cluster nodes are build to process of finding network range at load balancing on incoming and outgoing network. It provides a best way to transmit a communication network from one place to other place at anytime and anywhere using network load balancer. It was designed as a routed and transmits between network segments. It has some security permission to block both incoming and outgoing connection based on polices of firewall. When fire wall check redundacncy in networks terms based on clustering methods. In previous work it was implemented on K-Means ++ to get 90% of accuracy on load balancer. Now we proposed with Mean Shift clustering to detect a firewall failure due to network failure detection with accuracy of 94%. In case the network fails firewall load balancer detects security threats and block connection to made a path secured. Keyword:firewall, load balancing, security, network. × M.Kowsalya, Dr.A.Senthilrajan Wired Network Analysis Using Ftp Server in Firewall Load balancing based on Round Robin Method " Volume 5 - Issue 4 (1-7) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P28 |
29 |
Optimization Technique for Image Folding
- A.Malar Meenal, S.S.Dhenakaran 10.29126/23951303/IJET-V5I4P29
Abstract
In this paper, a new technique for optimizing image folding to improve the confidentiality of the image is presented. By folding, images can be hidden as well the size of the image is reduced. In this work, image segmentation procedures are used to divide the image into different segments and then fold them together by mixing pixel values of adjacent segments repeatedly. Arithmetic binary operation performs on the pixels of segments to further fold image. The original image is situating in the last ‘folded image’. The important image to be transmitted securely can be folded using this method. The original image is obtained by reverse process. Keyword:color image, segmentation, image folding, image hiding, image compression. × A.Malar Meenal, S.S.Dhenakaran Optimization Technique for Image Folding " Volume 5 - Issue 4 (1-4) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P29 |
30 |
COMPARATIVE STUDY OF EFFECT OF VARYING SPAN LENGTH ON MAJOR ELEMENTS OF METRO BRIDGE
- NILESH SHADUNKEY 10.29126/23951303/IJET-V5I4P30
Abstract
A metro system is a railway transport system in an urban area with a high capacity, frequency and the grade separation from other traffic. Metro System is used in cities, agglomerations, and metropolitan areas to transport large numbers of people. An elevated metro system is more preferred type of metro system due to ease of construction and also it makes urban areas more accessible without any construction difficulty. An elevated metro system has two major elements pier and girder. In this study we have focused on two curve models of total span of 100 meter. The main focus in this comparative study is to find a suitable design for the metro system because for varying design systems we will face construction issues as well as traffic planning issues. Models of different span of 40 and 70 meter is analysed here just to find out a significant span so that we can generalize the complete metro design from a single analysis it will help us in both construction of metro rail and road traffic planning as well Keyword:Metro Structure, Bridge Pier, Girder Bridge, Seismic Design, Pier Design, Curved Model × NILESH SHADUNKEY COMPARATIVE STUDY OF EFFECT OF VARYING SPAN LENGTH ON MAJOR ELEMENTS OF METRO BRIDGE " Volume 5 - Issue 4 (1-21) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P30 |
31 |
PROGNOSIS OF BRONCHOGENIC CARCINOMA USING MACHINE LEARNING WITH A RESTORATIVE REMEDY
- Dr. Shubhangi D.C, Netravati 10.29126/23951303/IJET-V5I4P31
Abstract
Lung carcinoma is fatal disease in the present generation responsible for high mortality rate across the world. The cause is delayed detection, timely verdict, and asymptotic conditions. The untimely recognition is very exigent to discriminate between the patients being suffered and normal. Though the lung screening trails have been introduced but the realistic functioning has not yet been successful. In this project, the extraction of data from given samples provides a distinctive prospective by making lung cancer screening more quickly and giving a good efficiency using machine learning algorithm along with the restorative remedy. Therefore the SVM, KNN classifiers and linear regression method gives an efficiency of 89% thus reduces risk of invasive surgery and increase survival rates. Keyword:Lung carcinoma, SVM and KNN classifiers, restorative remedy × Dr. Shubhangi D.C, Netravati PROGNOSIS OF BRONCHOGENIC CARCINOMA USING MACHINE LEARNING WITH A RESTORATIVE REMEDY " Volume 5 - Issue 4 (1-8) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P31 |
32 |
“Seismic Assessment of a RC Structure existing School Building usinganalytical tool Staad.Pro : A Review”
- Rashmi Sakalle, Avinash Mishra 10.29126/23951303/IJET-V5I4P32
Abstract
In heritage protection, there is vital necessity to recognize the impending seismic risk in prevailing historic buildings for hazard moderation, disaster alertness and preceding knowledge of probable hazards. Seismic risk estimation remains centered on safety assessment, which necessitates qualitative and computable data. In this study we are reviewing the past researches and publications related to retrofitting of an existing historical structure. Keyword:Seismic Assessment, Staad.pro, forces, displacement, strength, rebound hammer, retrofitting. × Rashmi Sakalle, Avinash Mishra “Seismic Assessment of a RC Structure existing School Building usinganalytical tool Staad.Pro : A Review” " Volume 5 - Issue 4 (1-10) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P32 |
33 |
“Seismic Assessment of a Historical Masonry Structure using ETABS: A Review”
- Rashmi Sakalle, Mohanlal ahirwar 10.29126/23951303/IJET-V5I4P33
Abstract
It is well known fact that un-reinforced masonrystructures are the most vulnerable during an earthquake. Normally URM buildingsare designed for vertical loads and since masonry has adequate compressivestrength, the structures behave well as long as the loads are vertical. When suchmasonry structure is subjected to lateral inertial loads during an earthquake, thewalls develop shear and flexural stresses. The strength of masonry under theseconditions often depends on the bonding between brick and mortar which is ratherpoor. This bond is also very poor when lime mortars or mud mortars are used. In this paper we are presenting literature survey of authors related to assessment of masonry structure. Keyword:Masonry structure, Assessment, Historical building, rani mahal, analysis, forces, moment. × Rashmi Sakalle, Mohanlal ahirwar “Seismic Assessment of a Historical Masonry Structure using ETABS: A Review” " Volume 5 - Issue 4 (1-8) July - August 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I4P33 |
Under in review process, article will publish soon... |
|