• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues
    +91-9950712474

    Volume-5 Issue-1


    Title: Adaptive Indoor Positioning System Using ARM

    Authors: Naveena Mariam Jose and Jubin Mathew

    Abstract: Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio signatures are collected and stored for further comparison and matching. Site survey involves intensive costs on manpower and time. In this work, we study unexploited RF signal characteristics and leverage user motions to construct radio floor plan that is previously obtained by site survey. On this basis, we design WILL, an indoor localization approach based on off-the-shelf WiFi or zigbee infrastructure. Within the emerging market of smart phones, ARM is well suited for modern devices and offers an excellent option for localization due to its support of diverse sensors and hardware which can be leveraged for localization beyond GPS (e.g. Wi-Fi, cellular communications, accelerometer), and its higher efficiency. Zigbee technology can also be applied for indoor localization, achieving accuracies of approximately 30 meters. The advance of wireless and embedded technology has fostered the flourish of Smartphone market.

    Download file

    Title: AN ADVANCED TECHNIQUE FOR HARDWARE TROJAN DETECTION FOR MEMORY CELL PROTECTION AND REDUCING TROJAN ACTIVATION TIME

    Authors: Netha Merin Mathew

    Abstract: Semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years. Time to activate a hardware Trojan circuit is a major concern from the authentication standpoint. This paper analyzes time to generate a transition in functional Trojans. A dummy scan flip-flop insertion procedure is proposed aiming at decreasing transition generation time. Moreover, this paper proposes an advanced technique used for the protection of memory cells. The data with Trojan input are scanned before passing through the main memory. Whenever the Trojans are detected it should be scanned out separately and memory cells are protected. Memory cell reordering is a structured cell arrangement for scanning. Structured cell arrangement is used for easy detection of Trojans and for scanning input data. The simulation results demonstrate that, with a negligible area overhead, our proposed method can significantly increase Trojan activity and reduce Trojan activation time.

    Download file

    Title: A Novel Security Enhancement Strategy for Improving the Concert of CDMA Based Mobile Ad-Hoc Network

    Authors: A. Swaminathan, Dr. B. Santhana Krishnan and Dr. M. Ramaswamy

    Abstract: Mobile Ad-hoc networks have become an indispensable part of people?s daily life. Recent research has been shown that the physical layer security techniques become a more essential part in the wireless communications. As a result, security is an imperative and more challenging issue in wireless networks since the users might transmit their sensitive personal information (e.g., credit card details) over the wireless networks. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both eavesdropping and jamming for disrupting legitimate transmissions. Wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. Code division multiple access network is an example of multiple access, where several transmitters can send information simultaneously over a single communication channel with the optimum available bandwidth based on spread spectrum technology. It is proposed to develop an anti eavesdropping strategy for improving the performance of CDMA based network. Network Simulation has been conducted to evaluate the performance of proposed network. The results are obtained in terms of the performance indices with the aid of Zero knowledge protocol to identify the type of attackers and the data are routed through AODV routing pattern. The new approach shows that the proposed outcome is an extended enhancement of network security.

    Download file

    Title: FAULT DETECTION AND ALERT SYSTEM IN RAILWAY TRACK USING MEMS SENSOR THROUGH GSM

    Authors: Ambi Rachel Alex

    Abstract: This project proposes a method that multisensory railway track geometry surveying system. Track fault is detected using MEMS Sensor and Ultrasonic sensor and the message sent to the corresponding station and train using GSM module. Micro-Electro-Mechanical Systems, or MEMS, is a technology that in its most general form can be defined as miniaturized mechanical and electro-mechanical elements that are made using the techniques of micro fabrication. Ultrasonic sensors work on a principle similar to radar or sonar which evaluates attributes of a target by interpreting the echoes from radio or sound waves respectively. The fault location is identified by using GPS module and the location is also sent .The project discusses the technical and design aspects in detail and also provides the proposed multi sensor railway track geometry surveying system. This project also presents the details of the implementation results of the MRTGS utilizing simple components inclusive of a GPS module and GSM Modem.

    Download file

    Title: A Novel on Dual Polarized HMSS

    Authors: Jubin Mathew and Naveena Mariam Jose

    Abstract: An increasing number of hybrid mobile systems comprising a satellite and a terrestrial component are becoming standardized and realized. The next generation of these systems will employ higher dimensions adopting multiple-input multiple output orthogonal frequency division multiplexing (MIMOOFDM) techniques. In this work, we build upon recent studies of dual polarization MIMO for each component and propose the use of full-rate fulldiversity( FRFD)codes adopting a space frequency paradigm. We also propose a scheme taking advantage of the separation between the subcarriers to enhance the coding gain. By critically assessing the different options for the 4 transmit, 2 receive hybrid scenario taking into account system and channel particularities, we demonstrate that the proposed scheme is a solution for enhancing the performance of next generation hybrid mobile satellite systems.

    Download file

    Title: PROPOSED CONCEPT OF EXTENDING 8x8 4T1D N0N-VOLATILE DRAM CELL IN 0.18 ?m TECHNOLOGY

    Authors: Teena Susan Joseph

    Abstract: DRAM is widely used as main memory storage in contemporary computer systems. As VLSI process technology advances, more transistors can be integrated in a single chip leading to higher storage capacity. Basic DRAMs are volatile memory. The volatile DRAMs are made into a non-volatile one by adding an extra transistor and a resistor (1T1R) along with the core. The performance comparison of volatile as well as proposed non-volatile cell is examined. Comparison of different DRAM cells is done. Considerations on delay, the power dissipated and overall area is made here. The NVDRAM (4T1D) cell is then proposed. The project also dealt with basic memory architecture. The CMOS memory design includes sense amplifiers, row and column decoders and finally the operating memory cells themselves. The 8x8 non-volatile 4T1D DRAM cell is then proposed and implemented. And their performances is examined. The schematic entry was done using Mentor Graphics Design architect and simulations are done using Mentor Graphics Eldo. The simulation results obtained with TSMC 180nm process technology at 1.8V.

    Download file

    Title: An Artificial Bee Colony Approach for Optimal Contrast Tone Mapping

    Authors: Anitharajam B. S.

    Abstract: This paper proposes a novel arithmetic approach of image enhancement via optical contrast tone mapping. Histogram Equalization (H E) is a simple and effective image enhancing technique. It is a simple technique for improving image contrast, but its effect is too severe for certain purposes. However dramatically different results may be obtained with relatively minor modifications. Therefore the proposed approach maximises expected contrast gain subject to an upper limit on tone distortion and optionally to other constraints that suppress artifacts. The underlying contrast-tone optimization problem can be solved efficiently by linear programming. In this optimization approach, we can add and fine tune the constraints to achieve desired visual effects. Experimental results demonstrate clearly superior performance of the new approach over histogram equalization and its variants.

    Download file

    Title: OFDM TRANSCEIVER WITH FIBONACCI BASED ON CHIP CROSSTALK AVOIDANCE CODEC

    Authors: Gaggera Balagurappa and S. Chiranjeevi Reddy

    Abstract: In recent trends , the inter symbol interference(ISI) and inter carrier interference(ICI) are overcome by Orthogonal Frequency Division Multiplexing(OFDM) modulation mechanism. The on chip crosstalk avoidance Forbidden Pattern Free(FPF) codec design is the challenging issue for Deep Sub Micron processes in the VLSI domain. The on chip crosstalk for DSM processes is avoided by generating Fibonacci based FPF codes . A model is proposed for cross talk avoidance and also to modulate and demodulated FPF codes. The suitable system for transmitting and receiving that codes with high speed is OFDM system. In this paper, high speed OFDM system model with the Fibonacci numeral system based on chip crosstalk avoidance codec is analyzed.

    Download file

    Title: An Efficient Scheme for Compression of Electro Cardiac Signal Using Divide and Conquer Algorithm

    Authors: Dr. Raja Murali Prasad

    Abstract: Recording process of heart electrical activity over a period of time using electrodes that have been placed in skin is known as Electrocardiography (ECG). It is necessary to handle huge amount of ECG data in continuous patient monitoring. Hence, we need to store more data as every time that we need to monitor the patient heart condition. But storing, transmitting and allocating bandwidth to this Meta data is very expensive. To resolve this issue, here an efficient compression technique has been implemented in such a way that can retain all the salient features which have been required clinically. For testing the ECG, we have used the MIT-BIH ECG data base.

    Download file

    Title: QoS Provisioning Using Jitter For IPV6

    Authors: T.Vengatesh and Dr.S.Thabasu Kannan

    Abstract: The main aim of the paper is to perform an unbiased empirical performance analysis between the two protocol stacks:IPv4 and IPv6, and how they are related to the performance on identical settings, and also focuses on QoS provisioning using Jitter. Here we investigate the Jitter while using TCP and UDP. Here two OSs (W2K and Linux Ubuntu) are configured with the two versions of IP and empirically evaluated for performance difference in terms of jitter. This proposed QoS scheme is especially designed for transitional IP network containing both IPv4 and IPv6 network nodes, which is the reality in the process of internet transition from IPv4 to IPv6. Our simulation results show that the some application using IPV6 can be efficient manner. The findings reveal several significant factors which affect IPv6 implementation.

    Download file

    Title: IoT Based Monitoring of Industrial Safety Measures

    Authors: K.Shiva Prasad, A.Shashikiran and K.Arunakala

    Abstract: This paper proposes an advanced system for process management via a credit card sized single board computer called raspberry pi based multi parameter monitoring hardware system designed using RS232 and microcontroller that measures and controls various global parameters. The system comprises of a single master and multiple slaves with wireless mode of communication and a raspberry pi system that can either operate on windows or Linux operating system. The parameters that can be tracked are temperature, light intensity and gas sensor. The hardware design is done with the surface mount devices (SMD) on a double layer printed circuit board (PCB) to reduced the size and improve the power efficiency. The various interesting features are field device communication via USB-OTG enabled Android devices, on field firm ware update without any specific hardware and remote monitoring and control.

    Download file

    Title: Enhanced Hexagon with Early Termination Algorithm for Motion estimation

    Authors: Neethu Susan Idiculay

    Abstract: To achieve a high compression ratio in coding video data, a method known as Motion Estimation (ME) is often applied to reduce the temporal redundancy between successive frames of a video sequence. One of the ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. In recent years, many of these BMAs have been developed with similar intention of reducing the computational costs while at the same time maintaining the video signal quality. Here, an algorithm called Enhanced Hexagon with Early Termination Algorithm is proposed with either Small Cross Search Pattern (SCSP) or X-Shaped Pattern (XSP) in the initial step. This is implemented in MATLAB and is tested with different standard video sequences. Experimental results show that the proposed XSP based algorithm is better than Enhanced Hexagonal Search (EHS) in terms of average number of search points and computational complexity.

    Download file

    Title: A Review of DC Motor Speed Control Using Various Conventional Controllers

    Authors: Betcy Mariam David

    Abstract: DC motors are used extensively in adjustable-speed drives and position control applications. Their speeds below the base speed can be controlled by armature-voltage control. Speeds above the base speed are obtained by field-flux control. D.C motor has been widely used in industries because of its salient features like reliability, wide range of torque ?speed control range, high efficiency, higher starting torque, less electrical noise and high weight/torque ratio. For speed control of DC motor different controllers are used. This paper deals with the usage of various conventional controllers for the control of dc motor speed.

    Download file

    Title: Survey on an Efficient method for finds Friends in Social Networks

    Authors: Bhavana Anant Zambare and Madhuri Zawar

    Abstract: Every day we are overwhelmed with many choices and options, simultaneously recommendation systems have gained popularity in providing suggestions. Today every web application has its own recommendation system. Whereas, Recommendation systems for social networks are different from other kinds of system, since the item here are rational human beings rather than goods. Hence, the ?Social? factor has to be accounted for when making a recommendation. We considered one of the most popular social Networking sites that is Face book as it offers impressive features. Here, we are mainly focusing on recommending friend with similar interest which is different among all the existing ones where Face book uses social graph a friend of friend approach to recommend friend which may not be the most appropriate to reflect a user?s preferences on friend selection in real life. And Netflix, Foursquare which all focus on recommending items. Hence we proposed framework Friend tome, a novel semantic based friend recommendation system for social networks.

    Download file

    Title: A Framework to infer Disease Information from Health-Based Queries

    Authors: T.Venkatesh and Raju Dara

    Abstract: Disease inference is very important activity in healthcare domain. When health related queries are made it is important to infer disease information based on the queries made. The inference can fill the gap between online health seekers and the words of busy doctors. A challenging problem here is obtaining disease inference with high accuracy and efficiency. This way community based and online health services can be useful with correlated medical concepts and knowledge gained from health based queries. First of all it is important to know the needs of health seekers that take help of online services. Thus it is important to infer diseases based on the data available in the form of queries. In this paper a learning method is proposed and implemented for achieiving disease inference from health-related questions. We built a prototype application for demonstrating the proof of concept. The empirical results revealed that it is useful to have disease inference in making well informed decisions.

    Download file

    Title: The Effect of Changing Q-factor on the Stability Response of 3rd-pole Current-Mode Active Filter using OTAs and Oas

    Authors: Adnan Abdullah Qasem and Dr. G. N. Shinde

    Abstract: This paper presents a 3^rd-pole current-mode active filter with a general class of filter transfer functions using only active elements. The proposed circuit configuration is studied for different values of Q with f_O=60 kHz. It is shown that the circuit configuration realizesthree filter characteristics in single circuit by suitably adjusting the current output branches: low-pass, band-pass and high-pass filters.It is observed that, the low-pass filter works for all values of quality factor and is extremely stable only for Q?160 with f_O=60 kHz. The band-pass filter works and also is extremely stable for all values of Q with f_O=60 kHz. The high-pass filter works for all values of Q and is asymptotically stable for Q?1 with f_O=60 kHz.

    Download file

    Title: Transformer Fault Protection using GSM

    Authors: Roshni subhash deshmukh, T S. Jadhav, J S. Nikam and Prof. B D. Deore

    Abstract: This project describes the fault protection of transformer. The transformer is an most important key element in an electrical system Proper protection is needed for economical and safe operation in electrical system. If the fault occurs Transformer protective relay should be sense and trip the circuit when an internal fault occurs during measuring. This study describe the design and implementation of micro-controller for protecting transformer project also monitors design & implementation of a system to & load the key parameters of a distribution transformer like load voltages, oil level & and increase in temperature. The GSM system will help the transformer to operate lightly and safely & identify the problems before any fault occurs. The aim of this project is to provide and effective, efficient and more reliable method from protecting fault from power transformer which may cause overload, increase in temperature level or a high input voltage. Generally, faults occur in the transformer due to this reasons only. To safely operate the transformer without any cause or failure we should continuously monitor the above parameters.

    Download file

    Title: Third Party based Security Approaches for Short Range Wireless Communication Technologies

    Authors: Chandan Kumar and Harneet Kour

    Abstract: The development of new advancements prepare to the expansion of new gadgets that occasionally should be interconnected with a specific end goal to get to or share accessible assets or administrations among them. Various distinctive wireless technologies have been created for short separations. These are alluded to as 'short-range wireless communication.' Signals go from a couple of centimetres to a few meters. The short range communication frameworks give remote availability inside a nearby circle of communication. The restricted scope of wireless communication can offer a security highlights.This paper describes various short range wireless communication technologies like Bluetooth, Infrared, Zigbee, and NFCwhere it discusses the existing security techniques. Third party based security mechanisms are also presented in the paper.

    Download file

    Title: ADVANCED SYSTEM TO STUDY GROWTH ANALYSIS OF PLANT SYSTEM

    Authors: Ms. Sheetal Bhoyar, Ms. Leela Bitla and Ms. Sarita Dhoble

    Abstract: Various aspects of the experimental design and computational methods used in plant growth analysis were investigated. This was done either analytically, or by repeatedly simulating harvests from theoretical populations upon which were imposed the underlying growth curves as well as the variability in plant material.Image Processing of leaf is still an important research topic due to the importance of farming in day to day life . We propose a new image processing technique which will find out the percentage of green pigmentation in plant and changes occurred in plant along with day to day basis.s we know that the farming plays an important role in the economic rate also. In earlier techniques of Finding the Chlorophyll percentage of the plant,Since that Technique uses combination of ? 16777216? Colors.It was difficult to find the Chlorophyll Percentage and it was unable to find out that the leaf grows properly or not . To overcome these problems.We have design this technique. We first convert an image into Gray shade so that it will easy to identify the Chlorophyll Percentage. This technique also find whether the leaf grows properly or not. If it does not grow properly then it will also suggest some fertilizers for the plant.

    Download file

    Title: A Modified Method for Sound Compression Using Intrinsic Mode Functions

    Authors: Divya Jain and Prof. Jyostna V Ogale

    Abstract: Audio compression has become one of the core technology of the transmission era. The amendment within the telecommunication infrastructure over the past few years, from the switched circuit to the packet-switched systems, has conjointly mirrored on however voice and audio are transported in today's systems. The main objective of this analysis is to get original audio signals when compression and decompression where signal sub bands are intrinsic mode functions. The projected algorithmic, has used Lempel Ziv compression and decompression algorithmic over Intrinsic Mode Functions (IMFs) generated by Empirical Mode Decomposition (EMD). EMD decomposes signal into periodic components called intrinsic mode functions (IMF). In the proposed work one algorithm of compression has been considered that presents better results compared to DCT, DWT and other techniques. For the performance analysis few parameters like compression factor(CF), signal-to-noise ratio (SNR), peak signal to noise ratio(PSNR) and normalised root mean square error(NRMSE) are used. The proposed algorithm has worked successfully with compression and reproduced signals are within the audible range.

    Download file

    Title: Vehicular Object Localization and Classification in Traffic Video Dataset

    Authors: Ramanpreet Kaur and Dapinder Kaur

    Abstract: Automatic vehicle identification is an essential stage in intelligent traffic systems. Nowadays vehicles play a very big role in transportation. Also the use of vehicles has been increasing because of population growth and human needs in recent years. Therefore, control of vehicles is becoming a big problem and much more difficult to solve. Automatic vehicle identification systems are used for the purpose of effective control. Automatic vehicle recognition (AVR) is a form of automatic vehicle identification. It is an image processing technology used to identify vehicles by only their license plates. Real time AVR plays a major role in automatic monitoring of traffic rules and maintaining law enforcement on public roads. Since every vehicle carries a unique license plate, no external cards, tags or transmitters need to be recognizable, only license plate. In the existing model, the complex background based on concomitant colors method has been realized for the vehicle detection in the multi-lane system. The existing model has been designed to work on the basis of the uneven illumination for the purpose of multiple vehicle detection on the multiple vehicles captured in the single frame. The existing model has been designed to work in the multiple rounds classify and compute the density of the vehicles over the vehicular object extracted by the various mathematical and morphological operations to extract the vehicle in the video frame data. The proposed model is aimed at using the neural network application for the classification of the vehicles detected in the frames in the input video data. The proposed model is aimed at solving the issue of accuracy in the vehicular object recognition and the vehicular object classification. The proposed model has undergone various experiments over the variety of the video surveillance data for the performance evaluation. The proposed model results have been found efficient enough and better than the existing models by almost 10-20% on each parameters evaluated.

    Download file

    Title: A Compact MIMO Antenna with High Isolation for UWB Communications

    Authors: N.Saranya and K.Dhinesh

    Abstract: In this paper, a compact multiple-input-multiple ?output (MIMO) antenna has been proposed for ultra-wide-band (UWB) communications. The proposed antenna consists of two identical elements of semicircular patches and half sized ground planes. By placing the antenna elements orthogonally, the high isolation is achieved without using any other decoupling structures. The proposed antenna can operate over a wide impedance bandwidth and having the mutual coupling of less than -15 dB between the elements. The return loss and isolation of the antenna are investigated by means of Advanced Design System (ADS) 2014 tool. The simulation results shows that the proposed MIMO antenna have high isolation and good impedance match characteristic and it is suitable for some portable UWB MIMO /diversity applications. Since the proposed MIMO antenna has excellent inherent properties, a quad ?element MIMO antenna with good isolation is also discussed.

    Download file

    Title: EMG Signal Based Authorization of Unique Signature with Scalability for RTOS

    Authors: A.Anil Kumar Raju and Mrs. M. Karuna

    Abstract: In the present scenario of authorization, signature duplicating has become a significant challenge. So emphasized techniques regarding signature analytics has been mandatory in this sector. In order to authorize and verify candidate identity, signature plays a vital role in sectors like banks, government sectors, crime department. This project contributes signature authentication by motor neuron action potential from the spinal cord, resulting cross-bridge binding. On integration of EMG signal as an output signal resulting during signature of the candidate, which make EMG signal an assert in assisting signature verification. A High speed microcontroller ?ARDUINO? have been incorporated with EMG signal, in order to attain high data rate, quick persisted output. Many other operational amplifiers are equipped in order to compute signal acquisition and comparison. Such that it could be scalable to real time systems. MATLAB simulation has been implemented and incorporated to the hardware system such that, signal acquisition with comparison and authentication is done graphically.

    Download file

    Title: A Review Paper on Intelligent Driving Assistive System for Gaze Tracking and Alert

    Authors: Pooja P. Wargantiwar and Dr. N. K. Choudhari

    Abstract: The distraction in driving is one of the main cause of accidents. By monitoring the drivers activities that contributes the basis of automobile safety system which helps to reduce accidents by implementing driver?s pupil detection and eye?s off tracking for monitoring driver?s vigilance. Drowsiness is one of the reasons of the accidents. Here we are using image processing techniques .This system has following three main techniques 1) Image Acquisition 2) Facial Feature Detection and Tracking 3) Gaze Estimation. The Eye?s off Road system is a vision based system due to detect the concentration. This system is does not requires manual calibration and it works in real time i.e. during day and night. And by using the geometric analysis, Eye?s off Road can be easily detected.

    Download file

    Title: A review paper on the Performance Analysis of Flip-OFDM for Optical Wireless Communication

    Authors: Jyotsna S. Sawarkar and Dr. N. K. Choudhari

    Abstract: We consider two uniploar OFDM techniques for optical wireless communications: asymmetric clipped optical OFDM (ACO-OFDM) and Flip OFDM. Both techniques can be used to compensate multipath distortion effects in optical wireless channels. However, ACO-OFDM has been widely studied in the literature, while the performance of Flip-OFDM has never been investigated. In this paper, we conduct the performance analysis of Flip-OFDMand propose additional modification to the original scheme in order to compare the performance of both techniques. Finally, it is shown by simulation that both techniques have the same performance but different hardware complexities. In particular, for slow fading channels, Flip-OFDM offers 50% saving in hardware complexity over ACO-OFDM at the receiver.

    Download file

    Title: Adaptive Grass-Fire Blob Detection Algorith (AGFBDA) for the Image Matrices

    Authors: Ramanpreet Kaur and Dapinder Kaur

    Abstract: The blob detection methods plays the vital role in the various image processing models. The blob detection models are utilized for the localization of the visible objects in the given images in order to understand the type and size of the objects. The blob detection can be utilized for the classification, categorization and other purposes in the image processing models. In the proposed model, the robust blob detection model based upon the recursive grass-fire method has been implemented to localize the objects in the given image matrix. The proposed model is intended to handle the moving or still objects in the given image, where the proposed model has been performed adequately well. The proposed model has been tested over the standard image set in order to understand the overall performance under the various perspectives, where it has detection all of the objects very clearly and described the boundary (known as bounding box) around the detected objects. The proposed model has efficiently detected and localized all of the objects in the given image set.

    Download file