Manuscripts

Recent Papers

Control of Vehicle Pollution Through IOT

The large majority of today's cars and trucks travel by using internal combustion engines that burn gasoline or other fossil fuels. The process of burning gasoline to power cars and trucks contributes to air pollution by releasing a variety of emissions into the atmosphere. Emissions that are released directly into the atmosphere from the tailpipes of vehicles are the primary source of vehicular pollution. With the increase in urbanization and industrialization and due to poor control on emissions, a great amount of particulate and toxic gasses are produced. So, in our proposed system we use of a spectrophotometer (spectrophotometry method) as a sensor to identify the toxic gas. Missions are measured during regular basis and informed to the user if above the permitted level and the failure of the sensor. If the user doesn’t take any action within a week the alert is passed to the server of the pollution monitoring center through Internet of Things (IoT). The center decides the fine amount and intimates the user.

Published by: Rose Sweetlin .T, Priyadharshini .D, Preethi .S, Sikkandar Sulaiman .A

Author: Rose Sweetlin .T

Paper ID: V3I2-1201

Paper Status: published

Published: March 10, 2017

Full Details

Design of Aging Aware Reliable Multiplier Using Mixed Bypassing Technique

Digital multipliers have many numbers of DSP applications. The overall performance leans on the output of the multiplier. When we apply a negative bias to the PMOS transistor, there occurs temperature instability. The minimum voltage at which the PMOS transistor is ON will be increased whereas it decreases the multiplier speed. Similarly, if we apply a positive bias to the NMOS transistor, temperature instability occurs.This degrades the transistors speed and the system fails because there is a violation in time. There exists an aging-aware multiplier with adaptive hold logic (AHL) circuit. This circuit provides higher throughput through the variable latency. In the existing method, Row or Column bypassing is done to reduce the aging effect. Our desired structure is that we are bypassing column and row together so that the throughput can be increased. We are implementing our advanced design in real time applications like FIR filters.

Published by: Gowthami .G, S. Suganya, Karthika .G, Deepika .D, Indhumathi .N

Author: Gowthami .G

Paper ID: V3I2-1200

Paper Status: published

Published: March 10, 2017

Full Details

Analysis and Improved Performance of ANN Based Chaotic Generator

The main objective of this research paper is to analysis on the improved performance of ANN based chaotic generator. We are analyzing the performance of chaotic generator model during encryption and description and produced outcomes compare with earlier published work scenario. In this work Encryption and decryption of binary value has been completed by the same value. Chaotic neural network algorithm used for producing the random chaotic sequence.[1][2] Produced random chaotic sequence value is the encrypted binary ASCII values of A to Z sequence of original ASCII Code binary value, with a same initial parameter. This paper provides a review on the use of improved the performance of ANN based chaotic generator and provides high range of security in the field of cryptography.

Published by: Sona Mishra, Amit Mishra

Author: Sona Mishra

Paper ID: V3I2-1199

Paper Status: published

Published: March 10, 2017

Full Details

Design & Optimization of Finfet Based Schmitt Trigger Using Leakage Reduction Techniques

In this proposed work we are applying valuable power gating schemes to FinFET based Schmitt trigger to enhance its performance by reducing the leakage current in standby mode (off-state mode). The power gating schemes like Sleep Transistor approach and Multi-Threshold CMOS (MTCMOS) and Double-Threshold CMOS(DTCMOS) have been analysed and simulated which shows the tremendous reduction in the leakage current thus increasing the stability of the design. In this paper, different consecutive designs of PULL-UP and PULL-DOWN networks of NMOS and PMOS are applied to FinFET based Schmitt trigger one after another. Due to this treatment of PULL-UP and PULL-DOWN network, controlled voltage supply is obtained and the current driving capability of the design is increased, the hence less Gate leakage current is formed. This provides the motivation to explore the design of low leakage FinFET based Schmitt trigger. Simulation is performed on the cadence virtuoso tool in 45nm technology and simulation results revealed that there is a significant reduction in leakage current for this proposed design.

Published by: Priyadharshini .M, Anitha .R, Saranya .P, Sindhu .M, Sindhu .K

Author: Priyadharshini .M

Paper ID: V3I2-1198

Paper Status: published

Published: March 10, 2017

Full Details

Automated Diagnosis of Heart Disease using Random Forest Algorithm

The accurate diagnosis of heart diseases, is one of the most important biomedical problems whose administration is imperative. In the proposed work, decision support system is made by three data mining techniques namely Classical Random Forest, Modified Random Forest and Weighted Random Forest. The classical random forests construct a collection of trees. In Modified Random Forest, the tree is constructed dynamically with an online fitting procedure. A random forest is a substantial modification of bagging. Forest construction is based on three step process . 1. Forest construction 2. The polynomial fitting procedure 3.The termination criterion In Weighted Random Forest, The Attribute Weighting Method is used for improving Accuracy of Modified Random Forest. There are Two Techniques are Used in Attribute Weighting: 1. Averaged One-Dependence Estimators (AODE) 2. Decision Tree-based Attribute Weighted Averaged One-dependence Estimator( DTWAODE).

Published by: Priya Rajendra Patil, S. A Kinariwala

Author: Priya Rajendra Patil

Paper ID: V3I2-1197

Paper Status: published

Published: March 9, 2017

Full Details

Privacy Preserving and Secure Data Integrity Protection Security in Regenerating Coding Based Public Cloud Storage

Now a day’s use of cloud computing is rapidly increasing. Cloud infrastructure is being a common solution adopted by large organizations for storing and accessing data. It provides the current need for data storage with a flexible and dynamic storage that can grow. In this paper, we describe the design and development of a cloud computing based secure cloud data storage using encryption. Cloud data storage is a major solution to overcome this problem. These mechanisms to provide data integrity and security for client’s data in cloud storages. In users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. This understands the trend in terms of complexity and strength of a secured solution and provides some insights of what is still left in such area of research. Cloud data storage provide better privacy as well as ensure data availability and reliability can be achieved by dividing the user’s data block into data pieces. Cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free.

Published by: Monika B. Thakare, N. M Dhande

Author: Monika B. Thakare

Paper ID: V3I2-1196

Paper Status: published

Published: March 9, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X