Special Issue No. – 2, August, 2019

National Conference on Advancement in Engineering, Science & Technology

Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India

Modeling and Simulation Capacity Analysis of MIMO Wireless Sensor Network

Authors:

S.Arulselvi,B.Karthik,M.Sundararajan,R.A.Veer,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00031

Abstract:

In conventional wireless conversation device the problematic of approximating the parameters such as coherence time, coherence band width and so on. Continues to be not correct. This problematic is especially owing to the circumstance that the mobile receiver may be in movement and additionally obtained signals can attain alongside a couple of pondered paths. In this paintings, the channel modeling, most efficient location scatterers and reflectors with appreciate to the region of receiver and transmitter and the surest valve of pointed range with the course of movement of the cell receiver are to be travelled. The consequence of the multipath fading both over the years and frequency is also to be careful. The algorithms and arrangements projected in this articles shall gain within the (i) choicest location of scatterers everywhere a receiver transferring at an adjustable velocity (ii) practical modeling of MIMO declining channels overwhelming the conventional assumption that fading coefficients among exclusive transmit and get hold of antennas are unbiased unsystematic variables.

Keywords:

Mobility models,Multipath fading,Channel uncertainty,MIMO fading channel,

Refference:

I. Cho, M., Cho, H., Ro, S., and Hong, D.: ‘A novel time spreading method for down-link OFDM-coded division multiplexing systems’. Proc. IEEE VTC, April 2003,
pp. 764–768.
II. FoschiniG. J., M. J. Gans, ,,On Limits of wireless Communications in a Fading Environment”, Wireless Personal Communications, 6, pp. 311-335, 1998.
III. Gesbert, David; Akhtar, Jabran. Breaking the barriers of Shannon’s capacity: An overview of MIMO wireless system. Telektronikk: 53-64, 2008.
IV. Soysal A. and S. Ulukus. Optimum power allocation for single-user MIMO and multiuser MIMO-MAC with partial CSI. IEEE Journal on Selected Areas in Communications, 25(7):1402–1412, September 2007.
V. YuW., W. Rhee, S. Boyd, and J. M. Cioffi. Iterative water-filling for Gaussian vector multiple access channels. IEEE Transactions on Information Theory, 50(1):145–151, January 2004.
VI. Zentner. R, Nagy R, Zentner E: ,,Elliptical Single- bounce Model for MIMO Channel Simulations”, COST273, Germany, 2004.

View | Download

Object Co-Segmentation Using Image Processing

Authors:

Balaji. S,John Paul Praveen A,Mohanraj R,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00032

Abstract:

Given a lot of pictures that contain objects from a typical classification, object co-division goes for naturally finding and sectioning such regular articles from each picture. In the proposed structure, we initially present the idea of association foundation and use it to improve the power for smothering the picture foundations contained by the given picture gatherings. At that point, we likewise debilitate the necessity for the solid earlier learning by utilizing the foundation earlier. For the feeble foundation earlier, the model which is called the MR-SGS model is utilized. This is characterized as complex positioning with a self-learned diagram structure.it can derive the reasonable chart structures as opposed to fixing diagram structures in a given plan.

Keywords:

Picture division,Image co-division,managed learning,Interactive learning,PC vision,

Refference:

I. Liangliang Cao and Li Fei-Fei, “Spatially coherent latent topic model for concurrent segmentation and classification of objects and scenes,” in Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. IEEE, 2007, pp. 1–8.
II. Malisiewicz and Alexei A Efros, “Improving spatial support for objects via multiple segmentations,” 2007.
III. Sreenath Rao Vantaram and Eli Saber, “Survey of contemporary trends in color image segmentation,” Journal of Electronic Imaging, vol. 21, No. 4, pp. 040901–1, 2012 Tomasz
IV. Thomas Blaschke, “Object based image analysis for remote sensing,” ISPRS journal of photogrammetry and remote sensing, vol. 65, no. 1, pp. 2–16, 2010.
V. Younes L., Optimal Matching between Shapes via Elastic Deformations. Image and Vision Computing, Vol. 17, 5-6, April 1999.
VI. Yukalov V.I., Probabilistic Approach to Pattern Selection. Physica A: Statistical Mechanics and its Applications, Vol. 291, 1-4, March 2001.

View | Download

IOT Based Industrial Air Pollution Control System Using Microcontroller

Authors:

Sowmiya Manoj.M,Arulselvi.S,Hemalatha.B,Saravana.S,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00033

Abstract:

Air contamination has critical impact on the grouping of constituents in the climate prompting impacts like an unnatural weather change and corrosive downpours. Due to the harmful industrial gases and To cancel such adverse un equalences in the environment, an air pollution control system is mostly important. This paper makes to form an effective main solution for industrial air pollution controlling system by use of IOT on a real implemented time based scale named true time wired less industrial air polluted control design. A less weighted and a web ( IOT ) communicate to see the real mechanical air contamination information as counts, diagrams of proving grounds were created and accessible anyplace on the web Other elements like temperature and mugginess likewise detected alongside gas fixations to empower information investigation through information combination systems. Experimentation completed utilizing the created remote modern air contamination control framework under various physical conditions demonstrate that the framework gathers dependable wellspring of continuous fine-grain contamination information.

Keywords:

IOT,Air Pollution,ARM GSM,GPRS,

Refference:

I . Chaudhari. A.N., and Kulkarni. G.A. (2017), ‘IoT based Environmenal Pollution Monitoring System’ , IRJET. Vol. 04 , pp. 1823-1829.
II. Chu. D.A., Kaufman. Y.J., Zibordi. G., Chern. J.D., Mao. J., Li. C., and Holben. B.N. (2003), ‘Global monitoring of air pollution over land from the Earth Observing System Terra Moderate Resolution Imaging Spectroradiometer (MODIS)’. pp. 1-8.
III. Chaitanya H P1, H. Prasanna Kumar2 “Automated system for air pollution detection and control of speed in vehicles International Journal of Advances in Engineering & Technology, Aug., 2016.©IJAET ISSN: 22311963.
IV. C. Balasubramaniyan* and D. ManivannanIoT Enabled Air Quality Monitoring System (AQMS) using Raspberry PiISSN (Print) : 0974-6846 Indian Journal of Science and Technology, Vol 9(39), DOI: 10.17485/ijst/2016/v9i39/90414, October 2016 ISSN (Online) : 0974-5645
V. Khedo. K.K., Perseedoss. R., and Mungur. A. (2010), ‘A Wireless Sensor Network Air Pollution Monitoring System’ , IJWMN. Vol. 2 , No. 2., pp. 31-45.
VI. Navreetinder Kaur1, Rita Mahajan2, Deepak Bagai3 “Air Quality Monitoring System based on Arduino Microcontroller International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 5, Issue 6, June 2016”
VII. Saha. H.N., Auddy. S., Chatterjee. A., Pal. S., Pandey. S., Singh. R., Singh. R., Sharan. P., Banarjee. S., Ghosh. D., and Maity. A. (2017), ‘Pollution Control using Internet of Things (IoT)’ , Vol. 10 ,pp. 65-68.
VIII. Vaishnavi V. Daigavane and Dr. M.A Gaikwad Water Quality Monitoring System Based on IOT “Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1107-1116 © Research India Publications http://www.ripublication.com “
IX. Okokpujie. K., Noma-Osaghae. E., Modupe. O., John. S., andOluwatosin. O. (2018), ‘A Smart Air Pollution Monitoring System’ , IJCIET. Vol. 9 , pp. 799-809.

View | Download

Detecting and Disabling Digital Cameras using Image Processing Techniques

Authors:

G. Angelo Virgin,Balaji S,K.Subbulakshmi,John Paul Praveen A,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00034

Abstract:

In this paper, we discuss about the equipment has the ability to recognize and disabling digital cameras. The camera is positioned and neutralized by the system CCD is the image sensor available in every camera which is retro reflective and transmits light back to its source at the same angle. Infrared light is emitted by the device which is not visible to human eye at a distance of about 20 feet. Camcorder is used to accumulate the video of reflection. Then the video of the reflections is transmitted to a computer connected to the equipment , where it is sent through imageprocessing algorithms that acquires infrared light bouncing back an invisible infrared laser is projected into the camera's lens once the camera is identified, thereby overexposing the photo and providing it useless. Digital camera are neutralized by low level IR lasers but are neither a health danger to homosapiens nor physical damage to cameras. We review the simplified design of the device that can utilized in theatres to block piracy. The research areas being covered here are optics and image processing.

Keywords:

Camcorder,CCD,LED,Retro reflector,Hough Transform,

Refference:

I. Arjun Venugopal, Antony Vibin, Gokul Raj, Surekha Mariam Varghese, Ani Sunny,” International Research Journal (IRJET),Vol.:5, Issue: 5, pp.2813
II. C. P. Reshma Chand, J. Dheeba, “Automatic Detection of Exudates in Color Fundus Retinopathy Images”, Indian Journal of Science and Technology, Vol. 8 issue 26, pp. 566
III. Debajit Sensarma, Samar SenSarma, “A Survey on Different Graph Based Anomaly Detection Techniques”, Indian Journal of Science and Technology, Vol:8,issue.31 ,Nov2015
IV. J. Manasa, J.T. Pramod, S.A.K. Jilani, S. Javeed Hussain, “Real Time Object Counting using Raspberry pi”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 7, July 2015.
V. K. H. Hemalatha, G. Babu, R. Sivakumar, “Lesion Area Detection (LAD) using Super pixel Segmentation”, Indian Journal of Science and Technology, Vol. 8 Issue 15, July2015
VI. P. Sujatha, K. K. Sudha, “Performance Analysis of Different Edge Detection Techniques for Image Segmentation”, Indian Journal of Science and Technology, Vol:8,issue 14 ,July 2015
VII. Panth Shah, TithiVyas, “Interfacing of MATLAB with Arduino for Object Detection Algorithm Implementation using Serial
Communication”, International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 10, pp. 1069-1071, Oct 2014.

View | Download

Google Assistant Controlled Home Automation

Authors:

B. Hemalatha,Balaji. S,Sowmiya manoj. M,Kanjula Hrushiekesh Reddy,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00035

Abstract:

“The system is implemented using ordinary household appliances Natural language voice commands are given to the Google Assistant and with the help of IFTTT (If This Then That) application and the Blynk application the commands are decoded and then sent to the microcontroller, the microcontroller in turn controls the relays connected to it as required, turning the device connected to the respective relay On or OFF as per the users request to the Google Assistant. The microcontroller used is NodeMCU (ESP8266) and the communication between the microcontroller and the application is established via Wi-Fi (Internet).”

Keywords:

NodeMCU ESP8266,IFTTT -If This Than That Application,(IoT),Google Assistant,Voice Control,Smartphone,

Refference:

I. Aayush Agarwal , Anshul Sharma , Asim Saket Samad , S Babeetha, IJARIIE, “UJALA- Home Automation System Using Google Assistant”, Vol-4 Issue-2, 2018
II. Kusuma S M, Assistant Professor, Department of telecommunication, MSRIT, Bangalore, India. “Home Automation Using Internet of Things” July 1999.
III. Manish Prakash Gupta,. Department of Electronics and Communication, Maharishi Dayanand University, Rohtak, Haryana, India, “Google Assistant Controlled Home Automation” Volume: 05 Issue: 05 | May-2018
IV. Mummaka Sai Srinath, Manepalli Nanda Kishore, M.D. Anto Praveena, Interactive International Journal of Pure and Applied Mathematics, “Home Automation System With Google Assistant”, Volume 119 No. 12 2018, 14083-14086
V. Mhanta Prasad, Mayuri Ghodke, Swati Gaikwad, Prof. N. V. Kurhade, IOSR Journal of Engineering, “Controlling Home Appliances on Google Assistant and Monitoring Data” , PP 58-62.
VI. Niharika Shrotriya, Anjali Kulkarni, Priti Gadhave, International Journal of Science, Engineering and Technology Research (IJSETR), “SMART HOME USING WI-FI” December 1996.

View | Download

Data Deduplication in Wireless sensor network

Authors:

M. Jasmin,S.Philomina,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00036

Abstract:

In the data transmitting from node to node, increase the speed in the development, rapid growth in the total number of the basestations, rate of utilization of power in the vital growth of information technology the sponsor amount is large. In the transition environment many companies are observing their information storage, techniques thereby to optimize the power saving system. Data deduplication strategy to limit the capacity framework can indispensable job in reduce data, consequently improve settings use additionally limit heat reduces. Data deduplication can decrease circles numbers utilized in the work to improve plate control absorb rate. By breaking down the data deduplication procedure, produces, and system for the further procedure lay the substation to the work.

Keywords:

Data Deduplication,Power rate,Disk number,power storage,

Refference:

I. A. Elmagarmid, P. Ipeirotis, and V. Verykios. “Duplicate record detection: A survey. Knowledge and Data Engineering” ,IEEE Transactions on, 19:1-16, 2007.
II. Austin Clements, Irfan Ahmad, Murali Vilayannur, and Jinyuan Li. “Decentralized deduplication in san cluster file systems”. In Proc. of the USENIX Annual Technical Conference, June 2009.
III Bolosky WJ, CorbinS, GoebelD, DouceurJR. “Single instance storage in Windows”.In:Proc.of the 4th Usenix Windows System Symp. Berkeley: USENIX Association, 13-24 , 2000.
IV. Changyou Guo and Xuefeng Zheng, “The Research of Data Security Mechanism Based on Cloud Computing” @International journal of Security and its applications 2015
V FalconStor. “ Demystifying Data Reduplication: Choosing the Best Solution” http://www. pexpo.co.uk /contentldownload ” 2009-10
VI. Jorge Guerra, Luis Useche, Medha Bhadkarnkar, Ricardo Koller, and Raju Rangaswami. The Case for Active Block Layer Extensions” ACM Operating Systems Review, 42(6),October 2008.
VII. Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller “Secure Data Deduplication ” StorageSS’08, Fairfax, Virginia, USA. 1-10. ctober 31, 2008.
VIII. McKnight J,AsaroT, BabineauB Digital archiving: End-User survey and Market forecast”. http://www.Enterprise srategy group.com lESG Publications/ 2006-2010
IX. Medha Bhadkarnkar, Jorge Guerra, Luis Useche, Sam Burnett, Jason Liptak, Raju Rangaswami, and VagelisHristidis. BORG: Blockre Organization for Self optimizing Storage Systems. In Proc. of the USENIX File and Storage Technologies, February 2009.
X. M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. “Secure data deduplication”. In Proc. of StorageSS, 2018.
XII. Y. Wang and S. Madnick “The Inter-Database Instance Identification Problem in Integrating Autonomous Systems” In Proceedings of the Fifth International Conference on Data Engineering IEEE Computer Society.
pages 46-55,Washington, DC, USA, 1989.

View | Download

Gesture Controlled Quad copter Using RF Technology

Authors:

John Paul Praveen A,Balaji. S,Mohanraj R,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00037

Abstract:

Gesture recognition technologies are much growing in the world of today. At this time there is much effective analysis in the terrain and limited in the way of openly available implementations. Many techniques have been implemented for sensing gestures and controlling quad copters. Glove based technique is a wellknown methods of recognizing hand gestures. A Gesture Controlled quad copter is a kind of quad copter which can be regulated by hand gestures and not the older way by using remotes. The user needs to wear a glove on his hand which comprises a sensor which is an Flex sensor in our case. Sensors convert physical movements into electrical signals. Also sensor converts different gesture movements of hands into electrical signals. Other commonly used transducers are Accelerometer and Gyroscopes. The user need wear a gesture device which includes flex sensor. A flex sensor is a sensor that measures the amount of bending. The sensor will document the drive of hand in particular direction which will result in the movement of quadcopter

Keywords:

Quad-copter,Flex sensor,Motion capture system,UAV,

Refference:

I. Jinay S. Gadda1, Rajaram D. Patil, „Quad-copter (UAVS) For Border Security With GUI System‟, 2013, ISSN 2231-1297.
II. Kalpesh N. Shah, Mr. Bala J. Dutt, Hardik M Quadrotor – An Unmanned Aerial Vehicle‟, 2014, International journal of Engineering Development and Research.
III. Kumar Kawale, Supriya Kolhe, Gauri Katale, Dhanashri Hemane, “Fighter Quad-copter Control Using Computer System”, International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 4, Issue 11, November 2016.
IV. Matlock.A, R. Holsapple, C. Schumacher, J. Hansen and A. Girard, “Cooperative Defensive Surveillance using Unmanned Aerial Vehicles”, 2009 American Control Conference. V. M.D.L.C. De Oliveira,“Modeling, Identification and Control of a Quad rotor Aircraft, Master’s Thesis, Czech Technical university in Prague” 2011.
VI. Muhammad, M. ; Swarnaker, D. ; Arifuzzaman, M, Autonomous Quadcopter for product home delivery. Publication Year:2014, Page(s):1-5 IEEE Conference Publications.
VII. Nicolas Ives Roque Pacheco, Daniel de Castro Ribeiro Resende, Pedro Américo Almeida Magalhães”, Stability Control of an Autonomous Quadcopter through PID Control Law
VIII. Oywind Magnussen, Kjell Eivind, Skjonhaug “Modeling Design and Experimental Study for A Quad-copter System Construction” University of Agder Department of Engineering Faculty of Technology and Science
2011.

View | Download

Health Care Monitoring UsingLi-Fi

Authors:

John Paul Praveen A,Balaji. S,Mohanraj R,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00038

Abstract:

Reliable checking of the patient's health condition in the prosperity center is either manual or remote unfaltering quality (Wi-Fi)- based structure. A Wi-Fi-based system winds up lazy in pace as a result of exponentially copied versatility. In this circumstance, delicate precision (Li-Fi) finds the spots wherever Wi-Fi is material to various highlights of quick data compose. Beside the pace factor, Li-Fi is increasingly critical fitting in sanatorium utility for watching the patient's conditions despite repeat impedance with the human body. This paper proposes an execution of Li-Fi social order in the crisis center for controlling the patient's essentials, for instance, temperature, heartbeat, and respiratory conditions using specific sensors. The gathered substances from the sensors are transmitted to the sink, and further, this information has dealt with the usage of a microcontroller and sent to an introduction unit as mechanized. Given the thinking of seen light correspondence, a model mannequin is created with the microcontroller and essential sensors as peripherals and attempted it is working. Thusly, the utilization of Li-Fi as health watching device exhibited probably.

Keywords:

Social insurance checking,Light transmitting diode light,Medical hardware,Patient condition,Visible light correspondences,

Refference:

I. Arijit Ghosh, “Patient Health Monitoring System,” International Conference on Intelligent Control Power and Instrumentation October 2016.
II. Harald Haas, “wireless data from every light bulb “, TED Global, Edinburgh, July 2011.
III. Harald Haas, Liang Yin, ‘What is Li-Fi?’ published in the Journal of lightwave technology, Volume: 34, Issue:6, March 15, 2016.
IV. Harald Haas with Prof Svilen and Prof Thilo and Prof Irina:” Li-Fi modulation and networked Li-Fi attocell concept” 2012.
V. Kalpana P.M, “Design and Development of PIC Microcontroller based Wireless Architecture for Human Health Monitoring”, International Journal of Innovative Research in Science, Engineering and Technology Vol. 4, Issue 4, April 2015.
VI. Niranjana Dye, Amira S. Ashur, Fujian Shi, “Developing Residential Wireless Sensor Networks for ECG Healthcare Monitoring”, IEEE Transactions on Consumer Electronics, Vol. 63, No. 4, November 2017.
VII. Reba Mohammed, Dyer Omer, “Health Mate: Smart Wearable System for Health Monitoring,” Networking Sensing and Control, August 2017.
VIII. Saidpur Rahman, Shim anta Kumar Dye, Bikash Kumar, “Design and Implementation of Real-Time Transformer Health Monitoring System Using GSM Technology”, International Conference on Circuits, Power and Computing Technologies, February 2017.
IX. Suhas Kaie, “Design and Implementation of Real-Time Embedded Tele-Health Monitoring System,” International Conference on Circuits, Power and Computing Technologies, June 2013.
X. Kalpana P.M, “Design and Development of PIC Microcontroller based Wireless Architecture for Human Health Monitoring”, International Journal of Innovative Research in Science, Engineering and Technology Vol. 4, Issue 4, April 2015.
XI. Birgit Wilhelm, Senait Forst, Matthias M. Weber, Martin Larbig, Andreas Pfitzner, Thomas Forst “Evaluation of CGMS During Rapid Blood Glucose Changes in Patients with Type 1 Diabetes”, Diabetes Technology and Therapeutics 8:2, 2006,
pp.146-155.
XII. Moussa Ayyash, Hany Elgala, Abdallah Khreishah, Volker Jungnickel, Thomas Little, Sihua Shao, Michael Rahaim, Dominic Schulz, Jonas Hilt, Ronald Freund, “Coexistence of Wi-Fi and Li-Fi towards 5G”, Concepts, Opportunities, and Challenges 2016.

View | Download

WPAN Communication Using Rssi For Locomotives Prediction For Transferable Rostrum

Authors:

G. Kanagavalli,Balaji.S,John Paul Praveen A,Mohanraj R,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00039

Abstract:

By victimization embedded system we've got an inclination to face live about to develop a high quality platform. Every time when the train arrives the platform, mechanically it can open by intimating a warning to the passengers those who live victimization the mobile platform. Using wireless communication this may be done. All the train is connected with RF transceiver, so that it send a knowledge of arrival before it reaches the platform of the station. If the train leaves from the platform, then automatically the mobile platform square measure visiting be bridged between a try of platforms to form a path between them. This project is supposed with PIC18F45J11 Microcontroller. The PIC18F45J11 Microcontroller will work of partaking the input from the RSSI and it offers command to the motor to run therefore on tackle the modification within theposition of the quality Rostrum.

Keywords:

PIC18F45J11 Microcontroller,MRF24J40 MiWi,RSSI,WPAN,

Refference:

I. Eason, B. Noble and I. N. Sneddon, “On Certain Integrals of Lipschitz-Hankel Type Involving Products of Bessel Functions,” Philosophical Transactions of Royal Society, London, Vol. A247, April 1955, pp. 529-551.
II. G.I. Howitt, J. A. Gutierrez, “IEEE 802.15.4 low rate- wireless Personal area network coexistence issues,” Wireless Communications and Networking, vol.3 , March 2003.
III. H. Laitinenet al, “Experimental Evaluation of Location Methods Based on Signal-Strength Measurements”, IEEE Trans. on Vehicular Technology, vol.56, no.1, pp.287-296, Jan.2007
IV. “IEEE 802.11-2012″ IEEE. 2012-03-29. Retrieved 2013-02-11
V. M. Shankar, A Microchip Wireless Based Wearable Physiological Parameters Monitoring
VI. System, Volume 2, Issue2: Page No.71-74, March – April (2013)
VII. T. S. Rappaport, “Wireless Communications: Principles & Practices”, Prentice-Hall Inc., 1996
VIII. Microchip, “PIC18F4XJ11 Datasheet”
IX. 1486.http://www.microchip.com/pagehandler/enus/products/picmicrocontrollers
X. http://en.wikipedia.org/wiki/MiWi

View | Download

Implementation of Wind Mill Monitoring System Using IoT and Wi-Fi through GSM Protocol

Authors:

M.Sriram,S.P.Vijayaragavan,B.Karthik,I.Vetrivel,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00040

Abstract:

This undertaking presents contemplations of utilizing remote sensor systems for checking conditions inside wind ranches, enchanting into contemplations the particular of such submissions. In these situations, which are planned to make a great deal of progress or even work in troublesome radio conditions with solid lessening, the basic and straight correspondence among source and goal isn't constantly conceivable, because of the separation confinement. To beat these actualities, we propose a framework which constantly screens the parameters of the windmill framework and transmits those information's to the cloud utilizing IOT. This framework disposes of the Range compel for passing these parameters to the checking framework.

Keywords:

Wireless sensor networks,attenuation,windmill system,Internet of Things,

Refference:

I. Arawomo D. F.. (2017). “Electricity billing systems and household electricity use behaviour in Ibadan, Nigeria”, Energy for Sustainable Development, 40, pp. 77–84.
II. Cinque M., D. Cotroneo, C. Di Martino and S. Russo, “Modeling and Assessingthe Dependability of Wireless Sensor Networks”, The 26th IEEE Intern. Symp. on Reliable Distributed Systems, pp33-42, Beijing, China, Oct. 2007.
III. DongS. K., K.M. Shazzad and S. P. Jong, “A framework of survivability model for wireless sensor network”, The 1st Int. Conf. on Availability, Reliability and Security, Page(s): 8., 2006.
IV. Rabaey J. M., M. J. Ammer J. L. da Silva, D. Patel and S. Roundy, “Pico Radio Supports Ad Hoc Ultra-Low Power Wireless Networking”, IEEE Computer,33(7): 42–48, 2000.
V. Shrivastava N., C. Buragohain, D. Agrawal and S. Suri, “Mediansand Beyond: New Aggregation Techniques for Sensor Networks”, in Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 2004.
VI. SzeidertI., O. Prostean, A. Robu, L. Jurca, “Windmill’s Design and Implementation Aspects”, Intelligent Manufacturing andAutomation, Trnava, Slovakia, 2008.
VII. Vijayaragavan, SP; Karthik, B; Kiran Kumar, TVU; , A DFIG based wind generation system with unbalanced stator and grid condition, Middle-East Journal of Scientific Research, V-20, I-8, pp-913-917, 2014.
VIII. ZhijunY. and W. Jie, “Fault-Tolerant Sensor Coverage for Achieving Wanted Coverage Lifetime with Minimum Cost”, Int. Conf. on Wireless Algorithms, Systems and Applications, ,Pp:95-102, Aug. 2007.

View | Download

Elimination of High Density Salt and Pepper Noise in Video through Modified Cascaded Filter

Authors:

B. Karthik,T.Krishnakumar,M.Sundararajan,M.Sriram,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00041

Abstract:

Video are degraded through Impulse Noise (salt and pepper noise- SPN). This methodology that produces the noisy to noise free video frames. Median filters are recognized for their ability to eliminate impulse noise and protects original type. This system is to differentiate between noisy pixels and therefore the noisy free pixels. We have projected an algorithm known as modified Cascaded filter (MCF) algorithm for the restoration of color or gray scale video frames which could be significantly degraded by using salt and pepper noise. This planned algorithmic rule indicates higher results than few best algorithms. To verify the algorithmic rule with varied color video frames and it offers higher outcome with high IEF and PSNR.

Keywords:

Noise Elimination,MCF,IEF,PSNR,

Refference:

I. AstolaJ.andP.Kuosmanen, Fundamentals of Non-Linear Digital Filtering,
BocRaton, CRC, 1997.
II. Cyriac, Marykutty; Karthik, B; , Detection of Optical Disc and Exudates in
Colour Fundus Images, Indian Journal of Science and Technology, V-8, I-32, pp-
, 2015.
III. KarthikB, TVUK Kumar, MA Dorairangaswamy, E Logashanmugam, “Removal
of High Density Salt and Pepper Noise Through Modified Cascaded Filter”,
Middle East Journal of Scientific Research, 20(10),pp 1222-1228, 2014.
IV. KarthikB, TVUK Kumar, “Noise Removal Using Mixtures of Projected Gaussian
Scale Mixtures”, World Applied Sciences Journal, 29(8), pp 1039-1045, 2014.
V. Kumar, TVU Kiran; Karthik, B; Kumaran, E Bharath; , Visual Secret Sharing
Scheme for JPEG Compressed Images, Middle-East Journal of Scientific
Research, V-12, I-12, pp-1873-1880, 2012.

VI. Karthik, B; Kirankumar, TVU; Raj, M Sundar; BharathKumaran, E; , Simulation
and Implementation of Speech Compression Algorithm in VLSI, Middle-East
Journal of Scientific Research, V-20, I-9, pp-1091-1092, 2013.
VII. Pitas I. and A.N.Venetsanopoulous, Non-linear Digital Filter Principles and
Applications, (Boston: Kluwer Academic publishers, 1990).
VIII. PrattW.K., Digital Image Processing (New York: Wiley 1978).
IX. RemziOten and Rui J. P. de Figueiredo, “Adaptive alpha-trimmed mean filters
under deviations from assumed noise model,” IEEE Tran.on Image Processing,
vol. 13, no. 5, pp. 627-639, 2004
X. Srinivasan E.andD.Ebenezer, “A New Class of Midpoint Type Non-linear Filters
for Eliminating Short and Long Tailed Noise in Images, Third International
Symposium on Wireless Personal Multimedia Communication, November 2000,
Bangkok, Thailand.
XI. VeerakumarT., S. Esakkirajan, IlaVennila, “Combined Fuzzy Logic and
Unsymmetric Trimmed Median Filter Approach for the Removal of High
Density Impulse Noise”, WSEAS Transactions on Signal Processing, Issue 1,
Volume 8, January 2012.
XII. Yi Hong, Sam Kwong, Hanli Wang, “Decision-Based Median Filter Using KNearest
Noise-Free Pixels” IEEE ICASSP 2009

View | Download

Enhancement of Digital Map using High Resolution Images

Authors:

G.Karthik,M.Sangeetha,B.Karthik,M.Sriram,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00042

Abstract:

Geospatial data differ accurately and precisely in the attributes as well as their temporal and spatial dimensions. The two approaches proposed for are road extraction based on Normalized Difference Vegetation Index (NDVI) and Fuzzy c means clustering. Image-based and vector-based algorithms are integrated for conflation. Road Intersections and Terminations of different types of are automatically detected by spatial contextual measure extraction algorithm. Iterative Relaxation Algorithm (IRA) is especially used point matching based at the comparative distance records in among the points. The Vector Road Intersections that is coordinated to removed factor sets by way of a Relaxation-Labeling Algorithm. A Rubber-sheeting Transformation is a neighborhood affined ameliorations, which splits the map parts into small sections and implemented nearby modifications on every piece, also preservative topology in the route. At the end of Rubber-Sheeting Transform there can be misalignment that's befell inside the Road segments. In order to clear up this trouble an energetic Contour Model (snake) that is used to address the outstanding dislocation mistakes. Road network extraction is analyzed and compared based on NDVI and Fuzzy C means clustering .This method can be extended for more information.

Keywords:

Normalized Difference vegetation index,Geographic information system,Fuzzy C means clustering,

Refference:

I. Barzohar M. and D. B. Cooper, “Automatic finding of main roads in aerial
images by using geometric-stochastic models and estimation,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 18, no. 7, pp. 707–721, Jul. 1996.
II. Cobb M. A., M. J. Chung, H. Foley, F. E. Petry, and K. B. Shaw, “A rule-based
approach for the conflation of attributed vector data,” Geoinformatica,vol. 2, no.
1, pp. 7–35, Mar. 1998.
III. Dolphin Kiruba D., Karthik B., Development of period extension and
randomness using RM-PRNG, International Journal of Applied Engineering
Research, V-9, I-22, 6194-6201, 2014
IV. Filin S. and Y. Doytsher. “A Linear Conflation Approach for the Integration
Photogram metric Information and GIS Data”, International archives of
photogrammetry and remote sensing, Volume 33(B3/1): 282-288, 2000.
V. Karthik B., Kiran Kumar T.V.U., Authentication verification and remote digital
signing based on embedded arm (LPC2378) platform, Middle – East Journal of
Scientific Research, V-20, I-12, 2341-2345, 2014

VI. Karthik B., Arulselvi, Selvaraj A., Test data compression architecture for
lowpower vlsi testing, Middle – East Journal of Scientific Research, V-20, I-12,
2331-2334, 2014
VII. Karthik B., Arulselvi, Noise removal using mixtures of projected gaussian scale
mixtures, Middle – East Journal of Scientific Research, V-20, I-12, 2335-2340,
2014
VIII. Karthik B., Kiran Kumar T.V.U., Selvaraj A., Test data compression architecture
for lowpower VLSI testing, World Applied Sciences Journal, V-29, I-8, 1035-
1038, 2014
IX. Karthik B., Kiran Kumar T.V.U., Noise removal using mixtures of projected
gaussian scale mixtures, World Applied Sciences Journal, V-29, I-8, 1039-1045,
2014
X. Karthik B., Kumar T.K., Dorairangaswamy M.A., Logashanmugam E., Removal
of high density salt and pepper noise through modified cascaded filter, Middle –
East Journal of Scientific Research, V-20, I-10, 1222-1228, 2014
XI. Saalfeld A., “Conflation: Automated map compilation,” Int. J. Geograph.
XII. Walter V. and D. Fritsch, “Matching spatial data sets: A statistical approach,”
Int. J. Geograph. Inf. Sci., vol. 13, no. 5, pp. 445–473, Jul. 1999.

View | Download

Underwater Image Enhancement and Object Detection Using Edge Preserving and Multiscale Contextual Neural Network

Authors:

M. Meenakumari,Balaji S,John Paul Praveen A,S. Ramya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00043

Abstract:

The submerged perception circumstances cause incredible difficulties to the issue of article location from the low-goals submerged pictures. In this paper, we acquaint an effective strategy with improve the pictures caught submerged and corrupted in light of the medium dispersing and retention. It expands on the mixing of 2 pictures that are legitimately gotten from a shading redressed and white-adjusted adaptation of the first corrupted picture. In the wake of improving the submerged picture, plans to identify object that present in the submerged by utilizing novel edge saving and multiscale logical neural network. We concentrated for the most part on discovery of an item in the submerged that they are utilized to isolate them an article from the foundation by utilizing a mix of programmed difference extending pursued by picture number-crunching task, worldwide edge, and least channel. Our system could be a solitary picture approach that doesn't need particular equipment or information about the submerged conditions or scene structure. our upgraded pictures are described by better exposedness of the dull area, improved worldwide complexity and edge sharpness and our striking article recognition accomplishes both clear identification limit and multi-scale logical vigor at the same time in this manner accomplishes an enhanced presentation.

Keywords:

Underwater enhancement,Striking item revelation,edge safeguarding,multi-scale setting,RGB-D saliency identification,object cover,

Refference:

I. Y. Wei et al. (2015). “STC: A simple to complex framework for
weakly-supervised semantic segmentation.” [Online]. Available:
https://arxiv.org/abs/1509.03150
II. V. Mahadevanand N. Vasconcelos, “Saliency-based discriminant track- ing,” in
Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2009, pp.1007–
1013.

III. S. Hong, T. You, S. Kwak, and B. Han, “Online tracking by learning
discriminative saliency map with convolutional neural network,” in Proc. Int.
Conf. Mach. Learn., 2015,pp. 597–606.
IV. B. Lei, E.-L. Tan, S. Chen, D. Ni, and T. Wang, “Saliency-driven image
classification method based on histogram mining and image score,” Pattern
Recognit., vol. 48,no.8, pp. 2567–2580,2015
V. B. Li, W. Xiong, O. Wu, W. Hu, S. Maybank, and S. Yan, “Horror image
recognition based on context-aware multi-instance learning,” IEEE Trans.
Image Process., vol. 24, no. 12, pp. 5193–5205, Dec. 2015.
VI. L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for
rapid scene analysis,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 11,
pp. 1254–1259, Nov. 1998
VII. L. Zhang, M. H. Tong, T. K. Marks, H. Shan, and G. W. Cottrell, “SUN: A
Bayesian framework for saliency using natural statistics,” J. Vis., vol. 8, no. 7,
p. 32,Dec. 2008.
VIII. N. Murray, M. Vanrell, X. Otazu, and C. A. Parraga, “Saliency esti- mation
using a non-parametric low-level vision model,” in Proc. IEEE Conf. Comput.
Vis. Pattern Recognit. (CVPR), Jun. 2011, pp. 433–440.
IX. Y. Zhai and M. Shah, “Visual attention detection in video sequences using
spatiotemporal cues,” in Proc. ACM MM, 2006, pp.815–824.
X. M.-M. Cheng, G.-X. Zhang, N. J. Mitra, X. Huang, and S.-M. Hu, “Global
contrast based salient region detection,” in Proc. CVPR, 2011, pp.569–582.
XI. A. Borji, M.-M. Cheng, H. Jiang, and J. Li. (2014). “Salient object detec- tion:
A survey.” [Online]. Available: https://arxiv.org/abs/1411.5878
XII. T. Liu, J. Sun, N.-N. Zheng, X. Tang, and H.-Y. Shum, “Learning to detect a
salient object,” in Proc. CVPR, Jun. 2007, pp.1–5.
XIII. K. Shi, K. Wang, J. Lu, and L. Lin, “Pisa: Pixelwise image saliency by
aggregating complementary appearance contrast measures with spatial priors,”
in Proc. CVPR, 2013, pp.2115–2122.
XIV. P. Jiang, H. Ling, J. Yu, and J. Peng, “Salient region detection by UFO:
Uniqueness, focusness and objectness,” in Proc. ICCV, 2013, pp.1976–1983.
XV. Y. Wei, F. Wen, W. Zhu, and J. Sun, “Geodesic saliency using back- ground
priors,” in Proc. ECCV, 2012,pp. 29–42.
XVI. W. Zhu, S. Liang, Y. Wei, and J. Sun, “Saliency optimization from robust
background detection,” in Proc. CVPR, 2014, PP 2814–2821.

View | Download

Analogous Contradict Planning of a CMOS using domino sense

Authors:

R.Mohanraj,Balaji.S,John Paul Praveen A,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00044

Abstract:

The fundamental target of this paper comprises of the domino rationale way and checking path. A fast wide range parallel contradicts that accomplishes high working frequencies throughout an account pipeline segment demeanor utilizing just three undemanding redundant CMOS-rationale module types. The three essential module types are isolated by D flip failure. The three element types are set in an exceedingly dull constitution in the tallying way and Domino Logic way. Enthusiastic domino rationale circuits are broadly utilized in present day computerized VLSI circuits. These dynamic circuits are utilized in superior structures. Along these lines simultaneously refreshing the tally state with a consistent deferral at all tallying way module regarding the clock edge. This construction is versatile to self-assertive portion counter widths utilizing just the three module types. The deferral counter is contained the underlying module admittance times only, three-info AND-entryway delay and a D-type flip-flop. The motivation behind the project is to diminish the Power utilization and CMOS Technology in the counter way and Domino rationale way by utilizing DSCH in Microwind Tool. The proposed Counter way is structured utilizing 0.10μm TSMC Digital cell library and its expended 0.215mW.

Keywords:

CMOS Parallel counter design,Domino logic,Counter path,

Refference:

I. B. Parhami,”Computer Arithmetic: Algorithms and HardwareDe-signs”,
London, U.K.: Oxford Univ. Press, 2000.
II. B. Razavi, RF Microelectronics,”Upper Saddle River”, NJ:Prentice-Hall,
1998.
III. C. Yeh, B. Parhami, Y. Wang,“Designs of counters with near minimal
counting/sampling period and hardware complexity”, in Proc. Asilomar Conf.
Signals, Syst., Comput., 2000, pp.894-898.
IV. D. Zhang, G. Jullien, W. Miller, E. Swartzlander, “Arithmetic for digital
neural networks”, in Proc. IEEE 10th Symp. Comput. Arith., Jun. 1991, pp.
58-63.

V. D. R. Lutz, D. N. Jayasimha,“Programmable modulo-K counters”, IEEE
Trans. Circuits Syst. I, Fundam. Theory Appl., Vol. 43, No. 11, pp. 939-941,
Nov. 1996.
VI. D. C. Hendry,“Sequential lookahead method for digital counters”, IEEE
Electron. Lett., Vol. 32, No. 3, pp. 160-161, Feb. 1996.
VII. J. E. Vuillemin,“Constant time arbitrary length synchronous binary counters”,
in Proc. IEEE 10th Symp. Comput. Arith., 1991, pp.180-183.
VIII. K.Hwang,ComputerArithmetic;Pinciples,Architectures and Designs,New
Yok:Wisley,1979.
IX. M. D. Ercegovac, T. Lang,”Digital Arithmetic”, San Mateo,CA: Mogan Kauf
mann, 2004.
X. M. Ercegovac, T. Lang,“Binary counters with counting period of one half
adder independent of Counter size”, IEEE Trans.Circuits Syst., Vol. 36, No. 6,
pp. 924-926, Jun. 1989.
XI. M. Alioto, R. Mita, G. Palumbo,“Design of high-speed power-efficient MOS
current-mode logic frequency dividers”,IEEE Trans. Circuits Syst. II, Expr.
Briefs, Vol. 53, No. 11, pp. 1165-1169, Nov. 2006.
XII. N. Nikityuk,“Use of parallel counters for triggering nuclear instruments and
methods in physics research”, Vol. A321, No. 3, pp. 571-582, Oct. 1992.
XIII. Pramod Kumar Meher,“Extended Sequential Logic for Synchronous Circuit
Optimization and Its Applications”,Vol. 28, No. 4, pp. 469-477, April 2009.
XIV. R. H. Katz,”Contemporary Logic Design”, Redwood City, CA: Benjamin/
Cummings, 1994.
XV. Saleh Abdel-Hafeez, Member, IEEE, and Ann Gordon-Ross, Member, IEEE,
“A Digital CMOS Parallel Counter Architecture Based on State Look-Ahead
Logic” in IEEE transition on very large scale integration (VLSI).vol.19,pp.
1023-1033,2011.
XVI. S. Abdel-Hafeez, S. Harb, and W. Eisenstadt, “High speed digital CMOS
divide-by-N frequency divider” in Proceedings IEEE Int. Symp.Circuits Syst.
(ISCAS), pp. 592–595,2008.

View | Download

Congestion Avoidance-Data replication in Mobile Adhoc Network

Authors:

S. Philomina,M.Jasmin,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00045

Abstract:

In the data transformation in networks, the fast increase in thedevelopment, fast growth in the amount of the basestations, and power utilization in the rapid growth ofinformation technology the spending expenditure is increasing. In the network environment many organizations are viewing the data storage, techniques thereby to optimizethe powersaving system. Data replicationtechnique to minimize the storage system can vital role in minimizedata, thereby optimizepowerusage alsominimizeheat loss. Data replication can reduce disks numbers used in the work to optimize disk power usagerate. By analyzing the data replication strategy,processes, and methodology for the further process lay the base of the work.

Keywords:

Data Replication,Power rate,Disk number,powerstorage,

Refference:

I. Baentsch M., Molter G. and Sturm P. (1996). Introducing Application-level
Replication and Naming into today’s Web, International Journal of
Computer Networks and ISDN Systems, 28(7), 921-930.
II. Bell W. H., Cameron D. G., Carvajal-Schiaffino R., Millar A. P., Stockinger
K., Zini F. (2003). Evaluation of an Economy-Based File Replication
Strategy for a Data Grid, Proccedings of 3rd IEEE International Symposium
on Cluster Computing and the Grid (CCGrid), Tokyo Japan, May 2003,
IEEE Computer Society Press.
III. Bernstein P. A., Hadzilacos V. and Goodman N. (1987). Concurrency
Control and Recovery in Database Systems, Massachusetts, Addision-
Wesley Publishers.
IV. Bhagwan R., Moore D., Savage S., and Voelker G. M. (2002). Replication
Strategies for Highly Available Peer-to-Peer Storage, Proceedings of
International Workshop on Future Directions in Distributed Computing,
Italy, June 2002.
V. Birman K. P. and Joseph T. A. (1987). Reliable communication in the
presence of failures, ACM Transactions on Computer Systems, 5(1), 47-76.
VI. Carman M., Zini F., Serafini L. and Stockinger K. (2002). Towards an
Economy-Based Optimisation of File Access and Replication on a Data
Grid. Proceedings of the 1st IEEE/ACM International Conference on
Cluster Computing and the Grid (CCGrid), (pp: 340-345), Berlin, Germany,
May 2002, IEEE Computer Society Press.
VII. Cohen E., Shenker S. (2002). Replication Strategies in Unstructured Peer-to-
Peer Networks, Proceeding of Special Interest Group on Data
Communications (SIGCOMM), (pp: 177-190), Pittsburg, USA, August 2002.
VIII Cooper B. and Garcia-Molina H. (2002). Peer-to-peer data trading to
preserve information, ACM Transactions on Information Systems (TOIS),
20(2), April 2002, 133-170.
IX Domenici A., Donno F., Pucciani G., Stockinger H., Stokinger K. (2004).
Replica Consistency in a Data Grid, Nuclear Instruments and Methods in
Physics Research; Section A: Accelerators, Spectrometers, Detectors and
Associated Equipment, 534(1-2), November 2004, 24-28, Elsevier publisher.
X Dullmann D., Hosckek W., Jaen-Martinez J., Segal B., Samar A., Stockinger
H. and Stockinger K.(2001). Models for Replica Synchronisation and
Consistency in a Data Grid, Proceeding of 10th IEEE International
Symposium on High Performance and Distributed Computing (HPDC), (pp:
67-75), San Francisco, August 2001.
X1 Foster I.andKesselman C. (Ed.). (2004). The Grid: Blueprint for a New
Computing Infrastructure, Second Edition, Morgan Kaufmann Publishers, USA.
X11 Gray J., Helland P., O’Neil P., and Shasha D. (1996). The Dangers of
Replication and a Solution. Proceedings of International Conference on
Management of Data (ACM SIGMOD), (pp: 173-182), Montreal, Canada, June 1996.
XIII Helal A. A., Hedaya A. A. and Bhargava B. B. (1996). Replication
Techniques in Distributed Systems, Boston, Kluwer Academic Publishers.
XIV Khan S. U. and Ahmad I. (2004). Internet Content Replication: A Solution
from Game Theory (Technical Report CSE-2004-5), Department of
Computer Science and Engineering, University of Texas at Arlington.
XV Kistler J. J. and Satyanarayanan M. (1992). Disconnected Operation in the
Coda File System, ACM Transactions on Computer Systems, 10(1), 3-25.

View | Download