• Home
  • DENY J
  • NATIONAL CONFERENCE ON COPULATION OF TRENDS IN INFORMATION, COMPUTER AND COMMUNICATION ENGINEEGING, PSN ENGINEERING COLLEGE Page 2

NATIONAL CONFERENCE ON COPULATION OF TRENDS IN INFORMATION, COMPUTER AND COMMUNICATION ENGINEEGING, PSN ENGINEERING COLLEGE Read online

Page 2


  Keywords— ETA, SPST, MSP, LSP, Detection logic unit, Error tolerance.

  SPIHT Algorithm Based Securable Image Compression

  Kalimuthu Pandian S 1, Lakshmi A 2

  Department of Electronics and Communication Engineering, Kalasalingam University

  Anand Nagar, Krishnankoil-626 126, Sivilliputtur (via), Virudhunagar (Dt), TamilNadu, India

  [email protected],[email protected]

  Abstract

  In multimedia application most of the images are in color. But color images contain lot of redundancy and require a large amount of storage space. For presenting the performance of different wavelet SPIHT algorithm is used for compression of color image. In this RGB component of color image are converted to Y, Cb and Cr before wavelet transform is applied in that Y is Luminance component while Cb and Cr are chrominance components of the image. Image is compressed for different bits per pixel by changing level of wavelet decomposition. For this simulation MATLab/SIMULINK software is used. Results are analyzed using peak signal to noise ratio (PSNR) and mean square error (MSE). Graphs are plotted to show the variation of PSNR for different bits per pixel and level of wavelet decomposition.

  Keywords— SPIHT, Color Image, Wavelet, luminance, chrominance.

  The research of based on ARM9 core units embedded video monitor system

  M. R. Geetha Devi

  Assistant Professor

  Department of Electronics & Instrumentation Engg

  ASAN Memorial college of engg & technology

  [email protected]

  Abstract

  This paper introduces the composition of embedded video monitor system based on ARM9 S3C2440 microprocessor, It discusses the basic elements of the system and the principle, It focus on the hardware composition and the methods of realization about software modules. The system saves the hardware cost for using the compression algorithm.

  Key words-ARM9; embedded system;video monitor.

  A Hardware Encryption and Decryption System Design

  M.R.Anusiya Devi

  Assistant Professor

  Department of Computer science & Engineering

  ASAN Memorial college of engg & technology

  Abstract

  In allusion to the malpractice about pure software encryption techniques, this article puts forward an exploring thought and design process of a hardware encryption and decryption system. This system applies DES encryption algorithm, implements hardware encryption and on-line upgrade. It adopts FPGA chip and MCU as the control cores, applies microchip control technology to implement PCI bus protocol, DES algorithm and the communication with the storage device through a self-defined interface.

  Keywords- encryption, decryption, DES, FPGA, MCU

  Graphical Password Authentication System Using Persuasive Cued-Click Points

  P.NANDHINI, S.JAYAPRADHA,

  Department of Computer Science & Engineering,

  Asan Memorial College of Engineering & Technology.

  [email protected] ,[email protected]

  Abstract

  In this paper, a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called cued click points(CCP) is presented. In this system a password consists of sequence of some images in which user can select one clickpoint per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. Graphical passwords provide a promising alternative to traditional alphanumeric passwords. They are attractive since people usually remember pictures better than words. In this extended abstract, we propose a simple graphical password authentication system. We describe its operation with some examples, and highlight important aspects of the system.

  Increasing the Lifetime Of Wireless Sensor Network Using Asynchronous Power Management

  1D.Nirmal Pratheep 2T.Preethiya

  1P.G.Student, Department of Electronics and communication Engineering, Kalasalingam University

  KrishnanKoil, Tamilnadu, India, Email Id: [email protected]

  2Assistant Professor-II Department of Electronics and communication Engineering, Kalasalingam University

  KrishnanKoil, Tamilnadu, India, Email Id: [email protected]

  Abstract

  In wireless sensor network, every sensor node needs to consume energy for transmission reception of data’s. The wireless sensor networks are mainly deployed in hostile environment where human cannot intervene often, so there is less chance to provide a constant battery power supply to the sensor node. The sensor needs to conserve the energy consumption rate into low to ensure the maximum lifetime of the node. If any node goes to sleep state, then the communication is interrupted. The communication should not be interrupted as the data sends by this network will be a critical data from critical environment. We propose an efficient mobile sensor node deployment method called GRID DEPLOYMENT. The network space is divided into multiple individual grids and the weight of each grid is determined by environmental factors such as pre-deployed nodes, boundaries and obstacles The grid with minimum values is the goal of the mobile node. We also design an asynchronous power management strategy in our sensor node to reduce power consumption of the sensor network. To prevent the communication loss, we propose GREEDY APPROACH This approach immediately replace the sleep node with its possible neighbour node. Giving energy to each node has the lifetime of network will increases while the packet may sends the data from source to destination node. The self deception of node will leads to sleep mode and lacks communication interrupt.

  Keywords — Coverage, Asynchronous Power Management, mobile sensor node deployment, sensor network.

  Eye Mouse

  PrithiKanaga PaulP.Nivetha

  Jayaraj AnnaPackiam CSI College of Engineering

  Department of Computer Science Engineering

  [email protected],[email protected]

  Abstract

  The paper presents hands free interface between computer and human. This technology is intended to replace the convention al computer screen pointing devices for the use of disabled or an away to interact with mouse. The systems we describe is real time, on-intrusive, fast and afford able technique for tracking facial features. The suggested algorithm solves the problem of occlusions an dis robust to target variations and rotations. It is based on novel template matching technique. A SSR Filter integral image, SVM issued for adaptive search wind own positioning and sizing.

  Keywords-faceRecognition,SRR,SVM,andtemplate matching

  Cloud Computing Security: From Single to Multi-Clouds

  Poomari Durga K

  Assistant Professor

  Department of Computer science & Engineering

  ASAN Memorial college of engg & technology

  [email protected]

  Abstract

  The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of-clouds” has emerged recently. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.

&nbs
p; A Distributed Weighted Clustering Algorithm for Mobile Ad Hoc Networks

  Shantha Sheela S

  Department of Computer science & Engineering

  ASAN Memorial college of engg & technology

  [email protected]

  Abstract

  In this paper, we propose a clustering algorithm, namely a distributed weighted clustering algorithm. The goals of the algorithm are maintaining stable clustering structure, minimizing the overhead for the clustering set up and maintenance, maximizing lifespan of mobile nodes in the system, and achieving good end to- end performance. DWCA chooses locally optimal cluster heads and incorporates power management at the cluster heads. Results obtained from simulations proved that the proposed algorithm achieves the goals.

  Multi-path Encrypted Data Security Architecture for Mobile Ad hoc Networks

  D.Prabu

  Asst.Professor, Department of CSE, Asan Memorial College of Engineering & Technology , Chennai, India

  [email protected]

  Abstract

  Mobile ad hoc networks proved their efficiency in the deployment for different fields, but highly vulnerable to security attacks. It seems to be more challenging of in wireless networks. Existing research carried out provides authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Ad hoc network characteristics should be taken into consideration to design efficient data security along its path of transmission. The proposal of this work presented a Data Security Architecture (DSA) in improving the data transmission confidentiality in ad hoc networks based on multi-path routing. It utilizes the multiple paths between nodes in an ad hoc network to increase the confidentiality robustness of transmitted data. The original message to be secured is split into parts that are transmitted in multiple paths. The parted messages are encrypted on its course of transmission which improves the security to next level. Experimental simulations are conducted to the proposed DSA approach and compared with existing ad hoc multi-path security solutions, which show DSA perform better than existing security solution up to 6% to8% improvement.

  Keywords—Mobile ad hoc networks, security, Data Security Architecture (DSA)

  Automatic Detection of Exudates and Microaneurysms from Non-Dilated Diabetic Retinopathy Retinal Images

  P. Prakash1, K. Mohan Reddy2

  1Final Year, Department of ECE, Vel Tech Engg College, Chennai-62

  Email: [email protected]

  2Asst. Professor, Department of CSE, Vel Tech Multi Tech Engg College, Chennai-62

  Email: [email protected]

  Abstract

  Exudates are one of the earliest and most prevalent symptoms of Diabetic Retinopathy(DR), which is a serious complication of diabetes mellitus and a major cause of blindness worldwide. Certain areas of the retina with such conditions are to be photocoagulated by laser to stop the disease progress and prevent blindness. Outlining these areas is dependent on outlining the exudates, the blood vessels, the optic disc and the macula and the region between them. The earlier the detection of exudates in fund us images, the stronger the kept sight level. So, early detection of exudates in fundus images is of great importance for early diagnosis and proper treatment. In this paper, a robust and computationally efficient approach for the localization of the different features and lesions in a fundus retinal image is presented. Since many features have common intensity properties, geometric features and correlations are used to distinguish between them. First, the blood vessels are removed based on Mathematical Morphology and the exudates are segmented by using column wise neighborhood filter. We proposed a new constraint for optic disk detection by using circular fitting method based on brightest point. After filtering the optic disc, the borders are removed to detect the exudates. We also show that many of the features such as the blood vessels, exudates and micro aneurysms can be detected quite accurately using this technique. The performance of the proposed system is carried out on DRIVE Database.

  Keywords: Exudates, Diabetic Retinopathy (DR), Fundus Image, Circular fitting, Mathematical Morphology.

  Cloud Computing for Academic Environment

  Preethi Wilson

  Department of Computer science & Engineering

  ASAN Memorial college of engg & technology

  [email protected]

  Abstract

  In traditional computing, we install software programs on system (computer) update the hardware as per our requirements.Documents we create or save are stored in our computer. Documents are accessible on our own network, but they can’t be accessed by computers outside the network. Using of cloud computing, the software programs aren’t run from one’s personal computer, but are rather stored on servers accessed via the Internet. Cloud Computing provides resources and capabilities of Information Technology (e.g., applications, storages, communication, collaboration, infrastructure) via services offered by CSP (cloud service provider). Cloud Computing has various characteristics as shared infrastructure, self- service, pay-per use model, dynamic and virtualized, elastic and scalable. Cloud computing in academic environment will be benefitted by every student and staff where lots of collaboration and safety of data is needed in academic. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up -to-date software and hardware is must. Cloud computing has the capacity of scaling and elasticity which is perfect for such an environment.

  Keywords: Cloud Computing, Web service, Virtualization, Grid Computing, Virtual Computing Lab, higher education institutions

  Detect and Separation of Text in Various Licence plate

  1M.Rajeshbaba 2N.Sivasankari

  1P.G.Student, Department of Electronics and communication Engineering, Kalasalingam University

  KrishnanKovil, Tamilnadu, India, Email Id: [email protected]

  2Assistant Professor-II Department of Electronics and communication Engineering Kalasalingam University

  KrishnanKovil, Tamilnadu, India, Email Id: [email protected]

  Abstract

  Text detection and localization in Multicolor images is important for content-based image analysis. This conflict is occurring due to the various backgrounds, the inhomogeneous illumination, and the variations of text font, size and line orientation. In this the image is converted into grayscale image then median filter is used to discard the unwanted noise in the gray scale image. Edge detection is mentioned by using canny edge detection and sobel edge detector. Canny edge detection is used to measure edges of the horizontal and vertical axis present around the text region in gray scale image. Sobel edge detector is used to measure edges of the overall boundaries of the horizontal and vertical axis present in the grayscale image. A mask is a dark and bright image of the same dimensions as the original image (or the region of interest we are working in). Group of the pixels in the mask can have therefore a value of 0 (black) or 1 (white). When executing operations on the image the mask is used to restrict the result to the pixels that are 1 (selected, active, and white) in the mask. Morphological operations are defined by moving a structuring element over a binary image to be modified in such a way that it is centered over an image pixel at some point. The process of removing certain details in an image which is smaller than certain preference shape is called Morphological image processing and the preference shape is called structuring element. The goal of the connected component analysis is to detect the large sized connected foreground region or object. This is one of the important operations in motion detection. The pixels that are collectively connected can be clustered into changing or moving objects by analyzing their connectivity. Index Terms— Image segmentation, Optical character recognition (ORC), connected component analysis (CCA),Text Detection, Edge detection.

  Smart Host Microcontroller for Optimal Battery Charging in a Solar-Powered Robotic Vehicle

  G.Ramprasth, M.Pradeesh kumar

  Sathyam Engineering College

&
nbsp; Mail id: [email protected]

  Abstract

  This paper focuses on the design and construction of an optimization charging system for Li–Po batteries by means of tracked solar panels. Thus, the implementation of a complete energy management system applied to a robotic exploration vehicle is put forward. The proposed system was tested on the VANTER robotic platform—an autonomous unmanned exploration vehicle specialized in recognition. The interest of this robotic system lies in the design concept, based on a smart host microcontroller. On this basis, our proposal makes a twofold significant contribution. On the one hand, it presents the construction of a solar tracking mechanism aimed at increasing the rover’s power regardless of its mobility. On the other hand, it proposes an alternative design of power system performance based on a pack of two batteries. The aim is completing the process of charging a battery independently while the other battery provides all the energy consumed by the robotic vehicle.

  Index Terms—Li–Po battery, mechatronic system, photovoltaic (PV), robotic vehicle, solar tracker.

  Assistive Device System for the Blind

  REJINATH R.N1 JAYASHREE.B2

  Student1, Assistant Professor2

  Dept. of Electronics &Communication

  Agni College of Technology

  [email protected], [email protected]

  Abstract

  The blind’s capacities to navigate in a particular place and to organize their daily activities are of vital importance for their health and well-being. Organizing any kind of simple daily activity can be especially difficult; it is not easy for the blind to distinguish the different items, such as packaged foods and drug containers just by touching with their hands. RFID, or radio frequency identification, is a technology that can provide a support for improving the organization and orientation during the daylight activities. RFID uses radio waves to deliver data from a tag, which stores information, to a reader, which can elaborate the information making decisions. This technology is very useful in many different contexts such as scanning passports, shipments and automatic highway toll collecting. As the RFID technology stands out for its inherent technical nature of any basic RFID system, it may involve additional improvements for numerous applications in the field of health care. In this paper, a RFID device designed as a support for the blind in searching some objects is presented; in particular, it has been develop for searching the medicines in a cabinet at home.