Electrocardiography signal interpretation system using filters with FPGA
In this proposed method, for analyzing electrocardiography signals system design used. This Procedure manipulates high pass least-square linear phase filtering technique to filter out the standard wander noise ingrained in the input ECG signal which is more effective than the existing filter. Discrete Wavelet Transform and support vector machine exploits to extract the reduced feature set from the input ECG signal and classifying the signal. They are implemented in the Xilinx system generator (XSG).
Published by: Hannah Maria John, N. G. Elakiya, A. Deepika, K. Priya, S. L. Bharathi
Author: Hannah Maria John
Paper ID: V5I2-1562
Paper Status: published
Published: March 28, 2019
The graphical secret code in internet banking for improved security transaction
Internet Banking is a course of action of organizations given by a gathering of sorted out bank workplaces. Bank customers may get to their assets from any of the part branch or working environments by means of web. The main problem in Internet Banking is the realness of the client. On account of unavoidable hacking of the databases on the web, it is difficult to accept on the security of the information on the web. Phishing is a kind of online information misrepresentation that expects to take tricky information, for instance, electronic keeping cash passwords and cash exchanges information from customers. One importance of phishing is given as "it is a criminal activity using social planning techniques. Secret word based verification is a standout amongst the most broadly utilized techniques to verify a client before allowing gets to anchored sites. The wide selection of secret key based validation is the consequence of its minimal effort and effortlessness. Customers may enroll different records on a comparable site or over various goals, and these passwords from similar customers are presumably going to be the same or practically identical. We proposed framework having the character for each individual note and a proficient viable client verification conspire utilizing use diverse cryptographic natives, for example, encryption and pixel distinguishing proof and clients have extra pixel recognizable proof framework. In proposed framework implies that for every last cash in in our application surrendered by the client we will produce the interesting id for each money, when the sum is exchanged from source to goal not just the sum and check of the money will be taken notwithstanding that one of a kind id will likewise be exchanged with the goal that we can track the way of the cash going around. The unprecedented development of internet keeping money and web based business frameworks has prompted a gigantic increment in the quantity of usernames and passwords oversaw by singular clients.
Published by: P. Jebaselvi, Dr. C. K. Gomathy
Author: P. Jebaselvi
Paper ID: V5I2-1286
Paper Status: published
Published: March 28, 2019
Bus detection for blind people using RF transceiver
This paper presents a bus detection system using RF MODULE technology that aims to ease the traveling and movement of blind people. The proposed system consists of two detection subsystems, one on the buses and the other on the bus stations, database system. In the bus detection subsystem, the nearby stations will be easily detected and then announced through a voice message inside the bus. Moreover, any existing blind person in the surrounding area of the station will be detected by the bus subsystem to alert the bus driver about the number of blind persons. In the bus station subsystem, the coming buses will be detected and then announced in the station in order to alert the blind people. A complete system prototype has been constructed and tested to validate the proposed system. The archived results show that the system performance is promising in terms of system functionality, safety, and cost.
Published by: Sunil Kumar S., M. Krishnaraj, A. Jeevarathinam, A. Rahul Raj
Author: Sunil Kumar S.
Paper ID: V5I2-1527
Paper Status: published
Published: March 27, 2019
Food adulteration prediction using data mining algorithms
Major food adulteration and contamination events seem to occur with some regularity, such as the widely publicized adulteration of milk products with melamine.With globalization and rapid distribution systems, these can have international impacts with far-reaching and sometimes lethal consequences. These events, though potentially global in the modern era, are in fact far from contemporary, and deliberate adulteration of food products is probably as old as the food processing and production systems themselves. This review first introduces some background into these practices, both historically and contemporary, before introducing a range of the technologies currently available for the detection of food adulteration and contamination. These methods include the vibrational spectroscopies: near-infrared, mid-infrared etc. This subject area is particularly relevant at this time, as it not only concerns the continuous engagement with food adulterers, but also more recent issues such as food security, bioterrorism, and climate change. It is hoped that this introductory overview acts as a springboard for researchers in science, technology, engineering, and industry, in this era of systems-level thinking and interdisciplinary approaches to new and contemporary problems. In food safety and regulation, there is a need for a system to be able to make predictions on which adulterants are likely to appear in which food products. The aim is to identify the minimum detectable limit for the adulterants in milk. There are many adulterants that are added to milk including water, flour, starch and even urea in quantitative measures making it undetectable. MATLAB was used to write the algorithm code.
Published by: J. Sathyaleka, R. Sangeetha, R. Ramya, S. Prince Sahaya Brighty
Author: J. Sathyaleka
Paper ID: V5I2-1510
Paper Status: published
Published: March 27, 2019
An approach to develop a smart and intelligent wheelchair
We live in a world, where the technology is growing to the next level every day. But it is very strange to see paralyzed people depending on someone's help for there mobility. In this project, we have developed a smart wheelchair which helps the completely paralyzed patient to move on their own. This is achieved by the voice control method by using an android application connected to the accelerometer. Another method is a hand gesture control method. In this method, we use the flex sensor to control the motion of the wheelchair. Hand gesture control can be used only by partially paralyzed patients. The Android-based voice control through the Bluetooth has been designed in the motor, the motor is controlled by the predesigned embedded C software.
Published by: Naveen Kumar K., T. Swetha M. E., B. S. Sai Kumar, K. Rahul
Author: Naveen Kumar K.
Paper ID: V5I2-1514
Paper Status: published
Published: March 27, 2019
Particulate emission control and direct carbon dioxide capture
The atmosphere is one of the valuable resources which needs to be protected for future generation. It’s being increasingly polluted every year. In the past 10 years the air in the many regions of our country such as Delhi, Mumbai is seriously polluted. Due to modernization and development, the use of automobiles was increased which emit harmful exhaust toxic gases with particulate emission. The level of CO2 content in the atmosphere was increased up to 410 ppm. In the meantime, CO2 is also the raw products for many industries such as food processing industries, Pharmaceutical industries, fire extinguishers etc. We have conducted experiments to capture carbon dioxide from direct air. This process is carried out using a carbon absorbent solution made to react with atmospheric air in the reaction chamber in which carbon dioxide present in the air directly captured in the absorbent solution. Air is constituents of various gases. Here we discussed in capturing the carbon from the air. Direct air capture is leading technology to capture CO2 from the air. Here various concentrations of solutions are made to effective capture of carbon dioxide. In addition, Electrostatic precipitator is implemented to control the particulate emission. It holds the small micro dust particles up to 2.5 PM. The operation performs in controlling particulate and capturing carbon dioxide from the air.
Published by: A. Kanagaraj, M. Hariharan, R. Ajith, S. Nandha Kumar, P. Deepan
Author: A. Kanagaraj
Paper ID: V5I2-1519
Paper Status: published
Published: March 27, 2019