Manuscripts

Recent Papers

Research Paper

Automation of tank level by using PLC and SCADA / HMI

The proposed system provides an analysis of the simulation and components required for the implementation of an automated level control system with the help of Programmable Logic Controller (PLC).Supervisory Control and Data Acquisition (SCADA) was established and the HMI was created. The proposed model can effectively supervise level control in multiple tanks. Three level sensors were used to provide the level data to the PLC. PLC used this data to take the required decisions and thereby turning ON and OFF a pump. A manual switch was also provided to override the automatic system. The SIMATIC S7-300 universal controller was used as the main decision-making module. The system was implemented in SCADA to create the required Human Machine Interface (HMI). Modifications can be made by using float sensors model which would effectively provide the correct level but the cost would increase and vibration of the sensor might disrupt the result, our model effectively counters those shortcomings. This paper presents a case study of SCADA system for monitoring and control of the parameters in water supply system. The system main functional parameters and performs continuous supervision of water distribution stations in order to allow any problem to be solved. The control system is organized in a hierarchical structure with three layers. The first layer consists of field instruments, remote terminal units, and field control devices. The signals from instruments via transmitters are sent to dedicated PLC panels at the second layer. The SCADA central level contains high-speed pc computer for supervision or operative drive of remote processes. Water level sensing can be implemented in industrial plants, commercial use and even at home.    

Published by: Gayatri Pradhan, Linkan Priyadarsini

Author: Gayatri Pradhan

Paper ID: V4I2-1908

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Highly sensitive pin-accessibility for ATM using human body communication

In this 21st century, we are searching for the technology which gives us better security and highest protection. We expect technology that should be genuine this need is satisfied by growing most genuine and new technology invented in 2005 called’ HAN based RED-TACTON’ by NTT’s, which is Japanese corporation. This technology is similar to LAN, MAN, WAN, HAN is nothing but human area network and these are advanced to WLAN, infrared and Bluetooth. This technology mainly used in security matters like accessing the things, lock or unlock the things which are we use daily. Here we use the redtacton technology with biometrics (user’s fingerprint for identification) for personal identification and to provide the high level of security and accuracy in ATM machines. Additionally, DC motor is used for rolling the shutter.

Published by: G. Swaminathan, Tharun. G, Sakthivel. T, Venkatesh. V

Author: G. Swaminathan

Paper ID: V4I2-1940

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Multi-factor authentication for secure electronic balloting credentials

In recent times there has been a decline in the confidence of common people over the Electronic Voting Machines (EVMs). Today’s automated vote casting methods have faced immense controversy to being vulnerable to hacking and questions have been raised about their transparency and security. This paper is lodged in style and develop a tamper-resistant electronic legal system that aims to alleviate the problems with existing machines. Here, multiple bedded verification method is administrated on an associate eligible citizen by means of fingerprint recognition primarily to demonstrate his identity. Subsequently, the person would cast the vote by pressing a button corresponding to a particular candidate which would be recorded in the system providing the vote caster a visual confirmation. Then steganography technique is used to hide secret messages into ordinary digital media without drawing suspicion. This system not only prevents multiple vote casts but also eliminates the discrepancies that commonly arise with a person claiming not to have voted, whereas his or her name is present in the list of vote casters. The experimental results show that the proposed method outperforms previous EVMs by electronically transmitting their results back to the Election Commission from the control unit, through a simple and unconditionally secure protocol.

Published by: Anita Titus, Nithiya Princy Rajam. B, Swetha. M, Ramya. S

Author: Anita Titus

Paper ID: V4I2-1933

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Smart grid and smart transformer powered by IoT

The electricity sector in the country is facing many problems, one such a major problem is that power theft in power lines and power grids. Still, there are some villages in the country do not have 24 hours electric power, that is there is a shortage of electricity and this lack of power supply is directly impacting on the country’s economic growth. The electricity sector plays a major role in Indian economy. The project is mainly focused on both hardware and software. The project implements power theft detection and other management services such as voice announcement facility to the concerned department, finding the location of power theft, plotting GPS points in google maps, auto police complaint to the nearest police station, power theft location sharing to police and finally capturing photos remotely for proof of theft. Our project consists of SMS enabled application and voice-based application. This project will also consist of the following features such as object detection on the power line and power grid, measuring temperature in the transformer such as high and low and measuring oil level in the transformer. Measuring temperature and oil level in the transformer and taking necessary actions will lead to improving power transmission and it also boosts transformer efficiency.

Published by: Suresha B L, Bhavani Shankar K

Author: Suresha B L

Paper ID: V4I2-1903

Paper Status: published

Published: April 16, 2018

Full Details
Survey Report

Survey on medical data gathering using big data and cloud computing

Cloud Computing as a technology has helped to integrate large sets of data that can be accessed from anywhere. Big data is a collection of the large data set or data modules. Integrating Cloud Computing with Big Data has served many purposes and can also be used for future advances. The major advantage of integrating these two technologies helps in accessing large sets of data on a global platform. Integrating Hospital data sets present in form of Big Data with the Cloud Computing platform helps in instant access to patient information by the doctor. This helps the doctor to serve the patient sitting back even in a different hospital. The medicine dose details are given by the doctor to the patient which can be checked by the pharmaceutical person. Medicine availability is monitored by the pharmaceutical person who also dispatches the prescribed medicine to the patient.

Published by: Aditya Shankar, Mrigank Sinha, R. Subhashini

Author: Aditya Shankar

Paper ID: V4I2-1898

Paper Status: published

Published: April 16, 2018

Full Details
Technical Notes

Analysis of Ethernet connectivity by using ARP and UDP protocol

Ethernet connectivity focuses on the priorities and necessities of requirements such as flexibility, cost, and area etc that varies for each system, but no extra functionality is desired than required. This paper mainly focuses on the Ethernet frame analysis in Xilinx by using UDP protocol and ARP Protocol. Ethernet frame consists of source and destination MAC addresses. To find out the next hop IP address that has a particular MAC address ARP Protocol is used. And also Ethernet frames payload will be either IPv6 or IPv4. Hence, the IPv4 packet header of UDP protocol is used. The analysis of Ethernet frame is performed by implementing the work on Xilinx FPGA - Spartan 6 as it offers driving network highlights of industry and Wireshark is used to get the traces of Ethernet frames.

Published by: Chaithra K

Author: Chaithra K

Paper ID: V4I2-1897

Paper Status: published

Published: April 16, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X