Manuscripts

Recent Papers

Research Article

An innovative approach based on VLSI to bring yoga under electro automation

This Project Belongs to a very important domain and having widespread applications across the Globe. The level of stress and tension is increasing day by day, particularly in the Metropolis and people are running after solutions in a different way. The quantum of Traditional Yoga studios is being opened up on a fantastic scale in most of the cities in Europe, Asia, and America. It is a subject to note the level of practicing accuracy blended with quick recovery portfolio is very much needed. In order to manage this challenging problem- Teacher free fully automated Yoga Platform with extraordinary electronic set up would be a novel idea and I have just selected this as my Project to serve people all over the world and also to open up new vistas of further research on it. This project to be based on totally Advanced VLSI Technology with customized software.  

Published by: Bulty Chakrabarty

Author: Bulty Chakrabarty

Paper ID: V3I4-1298

Paper Status: published

Published: April 20, 2018

Full Details
Research Article

LPG refrigeration

The climatic change and global warming demand accessible and affordable cooling systems in the form of refrigerators and air conditioners. The energy crisis persists all across the globe. We think of recovering the energy which is already spent but not being utilized further, to overcome this crisis with no huge investment. To address this problem we designed and analyzed a refrigerator which uses the energy spent in pressurizing and liquefying the LPG. LPG is extracted at high pressure in the liquefied state from the storage device. Its pressure and the flow rate is controlled by a valve connects it to the evaporator at the requisite pressure in requisite quantity. An evaporator is housed through which LPG flows. It gets converted from liquefied state to gaseous state and expands. So it absorbs heat in the form of latent heat. Due to this process, heat from surrounding is absorbed so cooling effect is produced. This effect is magnified by an evaporator. A network of pipes containing gas is covered by thin and closely spaced fins which help in effective and fast cooling. The insulating material helps in storing the cooling effect for a longer period of time. The LPG leaves the evaporator in gaseous form; it is then directed towards the burner where it is to be used. Thus, no LPG is consumed for cooling purpose.

Published by: Piyush Raj, Amit Kumar Verma, Anand Sagar, Ajay Kumar, Prasoon Choudhary

Author: Piyush Raj

Paper ID: V3I4-1296

Paper Status: published

Published: April 19, 2018

Full Details
Review Article

An automated method for characterization of facial expression

This paper presents a new facial expression technique, locality directional ternary pattern (LDTP), for facial emotion recognition. LDTP efficiently encode various information of expression-related features (ı.e., eyes, eyebrows, nose, mouth and lips) by using the directional information and advanced pattern in order to take advantage of the robust of advanced patterns in the edge region while overcoming the weakness of other methods in smooth regions. Our proposal, unlike existing face description methods that divide the face into multiple regions and sample the codes uniformly, uses a two-level grid to construct the face descriptor while sampling emotion information at different scales. We use a grid for stable codes (highly related to non-expression), and another one for active codes (highly related to expression). This multi-level approach enables us to do a finer description of facial motions while still characterizing the other features of the expression. Moreover, we learn the active pattern codes from the expression-related facial regions. We tested our method by using person-dependent and independent cross-validation schemes to evaluate the performance. We show that our approaches improve the overall accuracy of facial expression recognition on six data sets.

Published by: Rashmika. R, Sudha Mercy, Sangeetha Kamatchi. C , Preethi. R

Author: Rashmika. R

Paper ID: V3I4-1250

Paper Status: published

Published: April 19, 2018

Full Details
Technical Notes

Technology challenge white paper: Coping with spool space challenge in Teradata

Teradata is a high-performance database system. It uses spool space to perform queries on the database. It writes the result from each step in the query execution plan to disk to a spool file and subsequently reading these results. Hence it is important to plan spool space utilization in an optimized way, else we will end up with spool space error. Spool space and capacity planning are mutually dependent concepts. It is important to increase the system's performance without making any hardware changes. It is the challenge as data is continuously increasing and most systems will respond to increased load with some degree of decreasing performance. Considering the importance a lot of work has been done all over the world on DWH performance tuning, it is critical to understand multiple facts to be considered to ensure optimal utilization of Teradata Spool Space. If we are using the Spool Space in an optimal way then we are increasing the system performance without causing any additional cost to an organization. Poor planning will result out of spool space memory and hence can lead to failure of the Teradata based application. Understanding of spool space, its allocation, causes of spool space error, mitigation plan are detailed in this white paper.

Published by: Rajneesh Shukla

Author: Rajneesh Shukla

Paper ID: V3I4-1279

Paper Status: published

Published: April 18, 2018

Full Details
Research Article

Design and development of All Terrain vehicle

The Study named “Design and Development of Steering System of an All Terrain Vehicle” is to find out the most efficient steering system for an all-terrain vehicle. For this selection, various parameters are considered. The geometry for steering is selected to be Anti- Ackerman geometry. The system selected to convert the rotational motion into translational motion is Rack and Pinion. The steering column used is a one specifically used for steering of Tata Nano. The steering wheel is self-designed so as to optimize its size and reduce its weight. During the design of steering wheel, ergonomics are not compromised. The motion is transferred to the wheels with the help of a pair of tie rods. The tie rods and wheel hub are connected with self-designed steering arms.

Published by: Anuj Kesarwani, Abhinav Mishra, Gopal Kharwar, V. K. Saini, Sunil Kumar

Author: Anuj Kesarwani

Paper ID: V3I4-1243

Paper Status: published

Published: April 18, 2018

Full Details
Research Article

Smart energy management

Smart Energy Management (SEM) is a new emerging technology that will be mandatory for the future electrical network to generate, transmit, distribute, manage and monitor electrical energy and its usage. The major contribution will be from the communication technologies specifically wireless technologies enabling two-way communications. So far, the interface of smart devices is limited to the transmission and distribution side of the power grid, while its interface with the consumer as well as consumer energy consumption is not given major significance [1]. Based on the case study conducted in our university, this paper proposes a Smart Energy Management System (SEMs), that will make use of Internet Of Things (IoT) along with more than one type of wireless communication techniques based on the requirement, to collect energy information from the users and communicate it to the central server. An intelligent sensor node is deployed in the building in order to use the energy, based on the environmental conditions (temperature, humidity, etc). We have proposed decision algorithms which make use of the sensor values for optimization of energy consumption.

Published by: Arpit Mishra, Devendra Pandey

Author: Arpit Mishra

Paper ID: V3I4-1223

Paper Status: published

Published: April 18, 2018

Full Details
Research Article

A lightweight secure data sharing scheme

The ubiquity of distributed computing, cell phones can stock and recover sensitive data from cloud whenever. Therefore, the information security issue in versatile cloud tries out to be increasingly extreme and forestalls advance improvement of the portable cloud. There are generous examinations that have been run to enhance the cloud security. Be that as it can, a big slice of them are not relevant for versatile cloud since cell phones just have constrained registering assets and power. Arrangements with low computational upstairs are in the awesome requirement for versatile cloud applications. In this project, we suggest a lightweight information sharing plan (LDSS) for portable distributed computing. It embraces CP-ABE, an entrance control innovation utilized as a part of typical cloud condition, yet changes the construction of access regulator tree to make it reasonable for portable cloud conditions.LDSS moves an extensive section ofthecomputationalgenuineaccesscontroltreechangeinCP-ABEfrommobilestooutsidego-between servers.Moreover, to decrease the client repudiation cost, it acquaints quality portrayal fields with executing lethargic disavowal, which is a prickly issue program based CP-ABE substructure. The exploratory outcomes demonstrate that LDSS can successfully lessen the overhead on the cell phone side when clients are sharing information in portable cloud conditions.

Published by: Achyuth Ranjan V, K. Karthikayani, P. Jaswanth, Vivekananthan GR, Shankara Lingam

Author: Achyuth Ranjan V

Paper ID: V3I4-1289

Paper Status: published

Published: April 17, 2018

Full Details
Research Article

Preventing distributed denial of service attacks and data security

In recent years, Path identifiers(PID)are used as inter-domain routing objects in the network. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch distributed denial-of-service (DDoS) flooding attacks. To address this issue, introduce a D-PID, framework that uses PIDs negotiated between neighboring domains as inter-domain routing objects. In DPID, the PID of an inter-domain path connecting two domains is kept secret and changes dynamically. Security of data which shared in the network can be ensured with cryptographic techniques also.DPID mechanism with data secure provides more chance to prevent DDoS attacks in the network.

Published by: Shabna. M, Aswathi. T

Author: Shabna. M

Paper ID: V3I4-1264

Paper Status: published

Published: April 17, 2018

Full Details
Research Article

Smart parking system

Now a day the number of personal vehicles usage is increasing on a large scale. People prefer personal vehicles than public transportation. It is very difficult and frustrating as well to find parking space in most metropolitan areas, especially during the rush hours. It is often costly in almost every major city in the world to find proper and secure parking space. Due to this, there is a need to provide sufficient parking places providing plenty of slots to help the user park his vehicle safely. The aim of this paper is to propose a design of Android-based smart Parking System that regulates the number of cars to be parked in the designated parking area. This is done by automating the parking and unparking of the car with the help of an Android Application.

Published by: Pranav Kamble, Sujit Chandgude, Ketki Deshpande, Chetna Kumari, K. M. Gaikwad

Author: Pranav Kamble

Paper ID: V3I4-1147

Paper Status: published

Published: April 17, 2018

Full Details
Research Article

Face detection and recognition in smartphones

In this paper, various algorithms have been referred for face detection and recognition for security purpose in smartphones. Different types of algorithms such as template matching, color code segmentation using the K-mean clustering algorithm, etc. for face detection and KLT for face recognition have been used. In any of the face recognition system, the first step is face detection. The mentioned algorithms have first been constructed in MATLAB and then later it is implemented in SMARTPHONES phones. After the implementation of the mentioned algorithms, we have recognized certain pros and cons while implementing the face recognition system on a mobile phone with limited hardware capabilities.

Published by: Haritha H. Nair, Gauri S. Amte, Nisha B. Todase, Pranali R. Dandekar

Author: Haritha H. Nair

Paper ID: V3I4-1260

Paper Status: published

Published: April 16, 2018

Full Details