Manuscripts

Recent Papers

Review Paper

Electrocardiography signal interpretation system using filters with FPGA

In this proposed method, for analyzing electrocardiography signals system design used. This Procedure manipulates high pass least-square linear phase filtering technique to filter out the standard wander noise ingrained in the input ECG signal which is more effective than the existing filter. Discrete Wavelet Transform and support vector machine exploits to extract the reduced feature set from the input ECG signal and classifying the signal. They are implemented in the Xilinx system generator (XSG).

Published by: Hannah Maria John, N. G. Elakiya, A. Deepika, K. Priya, S. L. Bharathi

Author: Hannah Maria John

Paper ID: V5I2-1562

Paper Status: published

Published: March 28, 2019

Full Details
Research Paper

The graphical secret code in internet banking for improved security transaction

Internet Banking is a course of action of organizations given by a gathering of sorted out bank workplaces. Bank customers may get to their assets from any of the part branch or working environments by means of web. The main problem in Internet Banking is the realness of the client. On account of unavoidable hacking of the databases on the web, it is difficult to accept on the security of the information on the web. Phishing is a kind of online information misrepresentation that expects to take tricky information, for instance, electronic keeping cash passwords and cash exchanges information from customers. One importance of phishing is given as "it is a criminal activity using social planning techniques. Secret word based verification is a standout amongst the most broadly utilized techniques to verify a client before allowing gets to anchored sites. The wide selection of secret key based validation is the consequence of its minimal effort and effortlessness. Customers may enroll different records on a comparable site or over various goals, and these passwords from similar customers are presumably going to be the same or practically identical. We proposed framework having the character for each individual note and a proficient viable client verification conspire utilizing use diverse cryptographic natives, for example, encryption and pixel distinguishing proof and clients have extra pixel recognizable proof framework. In proposed framework implies that for every last cash in in our application surrendered by the client we will produce the interesting id for each money, when the sum is exchanged from source to goal not just the sum and check of the money will be taken notwithstanding that one of a kind id will likewise be exchanged with the goal that we can track the way of the cash going around. The unprecedented development of internet keeping money and web based business frameworks has prompted a gigantic increment in the quantity of usernames and passwords oversaw by singular clients.

Published by: P. Jebaselvi, Dr. C. K. Gomathy

Author: P. Jebaselvi

Paper ID: V5I2-1286

Paper Status: published

Published: March 28, 2019

Full Details
Research Paper

Bus detection for blind people using RF transceiver

This paper presents a bus detection system using RF MODULE technology that aims to ease the traveling and movement of blind people. The proposed system consists of two detection subsystems, one on the buses and the other on the bus stations, database system. In the bus detection subsystem, the nearby stations will be easily detected and then announced through a voice message inside the bus. Moreover, any existing blind person in the surrounding area of the station will be detected by the bus subsystem to alert the bus driver about the number of blind persons. In the bus station subsystem, the coming buses will be detected and then announced in the station in order to alert the blind people. A complete system prototype has been constructed and tested to validate the proposed system. The archived results show that the system performance is promising in terms of system functionality, safety, and cost.

Published by: Sunil Kumar S., M. Krishnaraj, A. Jeevarathinam, A. Rahul Raj

Author: Sunil Kumar S.

Paper ID: V5I2-1527

Paper Status: published

Published: March 27, 2019

Full Details
Review Paper

Food adulteration prediction using data mining algorithms

Major food adulteration and contamination events seem to occur with some regularity, such as the widely publicized adulteration of milk products with melamine.With globalization and rapid distribution systems, these can have international impacts with far-reaching and sometimes lethal consequences. These events, though potentially global in the modern era, are in fact far from contemporary, and deliberate adulteration of food products is probably as old as the food processing and production systems themselves. This review first introduces some background into these practices, both historically and contemporary, before introducing a range of the technologies currently available for the detection of food adulteration and contamination. These methods include the vibrational spectroscopies: near-infrared, mid-infrared etc. This subject area is particularly relevant at this time, as it not only concerns the continuous engagement with food adulterers, but also more recent issues such as food security, bioterrorism, and climate change. It is hoped that this introductory overview acts as a springboard for researchers in science, technology, engineering, and industry, in this era of systems-level thinking and interdisciplinary approaches to new and contemporary problems. In food safety and regulation, there is a need for a system to be able to make predictions on which adulterants are likely to appear in which food products. The aim is to identify the minimum detectable limit for the adulterants in milk. There are many adulterants that are added to milk including water, flour, starch and even urea in quantitative measures making it undetectable. MATLAB was used to write the algorithm code.

Published by: J. Sathyaleka, R. Sangeetha, R. Ramya, S. Prince Sahaya Brighty

Author: J. Sathyaleka

Paper ID: V5I2-1510

Paper Status: published

Published: March 27, 2019

Full Details
Others

An approach to develop a smart and intelligent wheelchair

We live in a world, where the technology is growing to the next level every day. But it is very strange to see paralyzed people depending on someone's help for there mobility. In this project, we have developed a smart wheelchair which helps the completely paralyzed patient to move on their own. This is achieved by the voice control method by using an android application connected to the accelerometer. Another method is a hand gesture control method. In this method, we use the flex sensor to control the motion of the wheelchair. Hand gesture control can be used only by partially paralyzed patients. The Android-based voice control through the Bluetooth has been designed in the motor, the motor is controlled by the predesigned embedded C software.

Published by: Naveen Kumar K., T. Swetha M. E., B. S. Sai Kumar, K. Rahul

Author: Naveen Kumar K.

Paper ID: V5I2-1514

Paper Status: published

Published: March 27, 2019

Full Details
Research Paper

Particulate emission control and direct carbon dioxide capture

The atmosphere is one of the valuable resources which needs to be protected for future generation. It’s being increasingly polluted every year. In the past 10 years the air in the many regions of our country such as Delhi, Mumbai is seriously polluted. Due to modernization and development, the use of automobiles was increased which emit harmful exhaust toxic gases with particulate emission. The level of CO2 content in the atmosphere was increased up to 410 ppm. In the meantime, CO2 is also the raw products for many industries such as food processing industries, Pharmaceutical industries, fire extinguishers etc. We have conducted experiments to capture carbon dioxide from direct air. This process is carried out using a carbon absorbent solution made to react with atmospheric air in the reaction chamber in which carbon dioxide present in the air directly captured in the absorbent solution. Air is constituents of various gases. Here we discussed in capturing the carbon from the air. Direct air capture is leading technology to capture CO2 from the air. Here various concentrations of solutions are made to effective capture of carbon dioxide. In addition, Electrostatic precipitator is implemented to control the particulate emission. It holds the small micro dust particles up to 2.5 PM. The operation performs in controlling particulate and capturing carbon dioxide from the air.

Published by: A. Kanagaraj, M. Hariharan, R. Ajith, S. Nandha Kumar, P. Deepan

Author: A. Kanagaraj

Paper ID: V5I2-1519

Paper Status: published

Published: March 27, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X