Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 7, Issue 5, May (2019)

S.No Title & Authors Full Text
1 Smart Fire Alarm System Using Arduino
Ashwini C, Delfin.S, Nelluri Harinadh
Abstract - The fire is a kind of disaster threatening the social wealth and humanity’s safety. They cause threats to the residential community and may results in deaths and property damage. In present days, people construct buildings without any proper safety measures and Fire usually occurs in homes because of carelessness and changes in the environmental conditions.so we need a system that can detect the fire accidents. Fire alarm system is needed in different places like buildings, hospitals, libraries, schools and banks etc.so in this paper we proposed a fire alarm system using Arduino. The primary purpose of the system is to provide early warning of fire. So, that the people can be evacuated & immediate action can be taken to eliminate or reduce of the fire.in this system alarm can be trigged by using detectors or by manual cell points.
Download
2 Implementation of Video Proposal on Cloud with Analysis of Applicant in Public System
R.Sathya, Siva Sankar.D, Vinod Reddy.S, Adarsh.B, Santosh.S
Abstract - Due to the huge growth in multimedia services and the enormous offers of video contents in online social networks, users have difficulty in obtaining their interests. Therefore, various personalized recommendation systems have been proposed. To handle these problems, it’s been proposed a cloud-assisted differentially private video recommendation system based on distributed online learning. In our project we proposed the new optimization technique for recommendation. The video recommendation is based on user’s behaviour (user’s interest) and also using the pattern mining for video tag search recommendation. We have search option as sub category search and global search in our application. With the massive multimedia services and contents in the Internet is based the content provider. We need to find out the irrelevant content promoters. Content promoters are the one who usually trying to promote their contents to social media service or video service sites in internet. In our project Based upon the user’s interest we can detect and avoid the irrelevant content and also content promoters.
Download
3 Biometric Fingerprint Spoof Identification Using Neural Networks
Ajimol C, Dr.R.Kavitha Jaba Malar
Abstract - Biometrics is a recognition of individuals based on their behavioral and physical appearances. It have become popular in this era since it gives effective and a secured confirmation to a particular person. Biometric identification is gaining more and more recognition as a leading technology for identity management and security systems. Biometrics includes face, iris, fingerprints, voice, palms, hand geometry, retina, handwriting, gait etc. The fingerprints are considered to be the most determined because of its uniqueness and it can never be identical to another .Also they retain the same without any change throughout the time period. In biometrics, there are vulnerable shortcomings such as they are fragile to some attacks namely spoofing which refers to the fraudulent action by an unauthorized person to biometric system with fake inputs that generate authorized person's input. Henceforth it is important to detect the spoof, to this the proposed paper describes an easy to integrate and inexpensive technique or methodology to improvise the security through finger prints using Support Vector Machine (SVM). We achieved a better accuracy of 95.37.
Download
4 Classification of Phishing Website Based on URL Features
S.Aarthi, Narsepalli Vamsi Kishan, V.Surya Teja, N.V.Harsha Vardhan Gupta
Abstract - Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception. It includes stealing of passwords, Mastercard numbers, bank account details, other confidential information. Phishing messages sometimes take the shape of faux notifications from banks, providers, e-pay systems and alternative organizations. Already a few methods are proposed to counter phishing attacks, but none of them are perfect solutions. One of the best ways to prevent phishing is through data mining by accessing data of a particular website. In this paper, we propose an algorithm called URL Mining algorithm to analyze a URL in different ways. Based on different parameters used we extract URL features of the website and classify it as a phishing website or genuine website. This strategy provides security from phishing websites by 98.5% compared to other methods.
Download
5 Failure Mode and Effects Analysis
Dr.R.Uday Kumar
Abstract - Failure mode and effects analysis (FMEA) is a term-based methodology for identifying potential problems with new or existing design. It is one of the most frequently used hazard analysis tools. FMEA identifies the mode of failure of every component in a system and determines the effect on the system of each potential failure. By failure we mean inability to meet a customer’s requirements as opposed to actual catastrophic material breakage or failure. Thus, a failure mode is any way that a part could fail to perform its required function. For example, a cable used to lift I-beams could fray from wear, kink from misuse, or actually fracture from excessive load. Note that either fraying or kinking could lead to fracture, but fracture might occur without these events if a design error incorrectly estimated either the strength of the cable or the load it needed to support. There are many variations in detailed FMEA methodology, but they are all aimed to accomplishing three things: Predicting what failures could occur, Predicting the effect of the failure on the functioning of the system and establishing steps that might be taken to prevent the failure, or its effect on the function. FMEA is useful in identifying critical areas of the design that need redundant components and improved reliability. FMEA is a bottom-up process that starts with the required functions, identifies the components to provide the functions, and for each component, lists all possible modes of failure.
Download
6 Design and Simulation of Online Uninterrupted Power Supply
Sharath Chandra M N, Dr. Chayapathy V, Vasu M
Abstract - This paper provides overall view of online uninterrupted power supply. The modern day society with growing technology, the work task in many industries and data centers operate on networks and require continuous power supply. Even a momentary drop can cause loss to industry or organization. Hence, uninterrupted power supply is crucial part of system. In this paper the online uninterrupted power supply is designed and simulated for all three modes of operation. The simulation is done using PSIM software in both open and closed loop conditions. The system with a peak power of 5KVA is designed which includes power factor correction circuit, pure sine wave inverter and bidirectional DC-DC converter.
Download
7 Design and Implementation of Interleaved Buck Converter in Network Communication for Femtocell Technology
Yashaswini H N, Dr. S.G.Srivani
Abstract - This paper describes about a design and implementation of Interleaved Buck Converter in network communication for Femto Technology. The evolution of wireless broadband technology improves the data speed rates and coverage and avoids the web surfing of the network which can be done by using Femtocells without the need of the expensive cell towers [1]. In the hardware architecture of the femto cell, the DC-DC converter such as Buck converter plays a important role which used to convert from the higher voltage to lower voltage towards the supply side of the femto cel. As this converter has the disadvantage of higher switching losses and increased inductor AC, reduction of efficiency, power density and power factor are also less[3]. In order to overcome from all these limitations, Interleaved buck converter has been introduced which has low switching losses & improves step down conversion ratio suitable for high input with the duty ratio of 0.4%.A closed loop control is achieved by designing a digital PID controller to achieve the proper regulator for this converter[4]. For the hardware implementation, power supply circuit, buffer driver circuit and Node MCU specifications has been analyzed to constant output voltage wrt flacutations present in the load. For the enhancement in updating the technology, this converter is connected to the GPRS IOT of ThingSpeak applications for the improvement in the network strength. The design and implementation of the closed loop control of the Interleaved buck converter with the input voltage of 12V and output voltage of 5V with the power rating of 10W for the Femto technology has been discussed[5]. In this proposed paper the hardware architecture of the femto cells along with the design and analysis of the closed loop Interleaved buck converter with the GPRS module has been validated.
Download
8 A Visually Impaired Double Watermarking Using Discrete Wavelet Transform
M. Joseph selvanayagam, Dr.S.John Peter
Abstract - In this analysis a visually impaired double watermarking component for advanced color images in which undetectable dynamic watermarks are installed for copyright assurance and delicate watermarks are inserted for picture validation. With the end goal of copyright, the main watermark is inserted utilizing the discrete wavelet transform in YCbCr color space, and it very well may be extricated aimlessly without access to the host picture. Be that as it may, fragile watermarking depends on an enhanced most significant bits trade approach in RGB segments for picture validation. The genuineness and respectability of a mistrustful picture can be confirmed aimlessly without the host picture and the first watermark. The mix of dynamic and fragile watermarking makes the proposed system reasonable for ensuring profitable unique images. The exploratory outcomes showed that the proposed watermarking implement can withstand different handling attacks and a half tone based multilayer watermarking of low computational complexity also proposed. An additional data hiding strategy is also used to embed different watermarks into the watermark to be introduced to improve the security and embedding limit. At the encoder, the capable direct twofold interest procedure is used to make 256 reference tables to ensure the yield is in halftone plan. At the decoder, the estimation is considered to grow the qualifications among those delivered of the embeddings edges and reduce the required number of estimations for each point. Finally, the Bayes classifier is used to assemble the potential results of multilayer information for requesting the related focuses to expel the introduced watermarks. These decoded watermarks can be moreover secured for recuperating the additional hid layer watermarks.
Download
9 Design, Specification and Simulation of Slow & Fast Battery Charging for Electric Vehicle Application
Santosh Kumar G, Hemalatha J.N
Abstract - In global scenario sustainability is major concern, in order to reduce the dependency on fossil fuels there is shift towards electric vehicle this made sale of electric vehicles (EVs) increase rapidly around the world and EVs’ efficiency and extended battery life and quality is lowering EV’s cost of purchase. Charging configurations play a vital role in an electric powered automobile. Charging systems can be categorized into three levels i.e. level 1, level 2 & level 3. This paper presents the topology that will interphase the two types of charging systems i.e. to charge the battery in both slow and fast charging. TESLA S60 battery model is taken as an example for specification and both modes of charging will have CUK converter to drive the charge for battery. The MATLAB/Simulink software is used to simulate the battery charging model that in turn charge the lithium-ion battery model.
Download
10 Software Development for Vehicle Diagnostics and Communication for Airbag Control Unit
Kamakshi, K. Sreelakshmi
Abstract - Electronic control unit (ECU) is used in many modern vehicle as electronic device. Communication protocol called CAN is supported by ECU. Because of fault confinement quality CAN is used as communication protocol in vehicle. As the number of ECUs increases in car diagnosis of the vehicle is very important. To detect the fault in Airbag Control Unit (ACU), Unified Diagnostic Services are used. This paper explains about how to find out the fault in ACU through diagnostic service. To indicate the fault in ACU warning lamp is placed in the dash board of the car. After the warning lamp is on one can test the ACU with diagnostic services to read the faults. The simulated results are shown in this paper not only idetecting the problem but also can be found out where ectly the problem has occurred.
Download





Publication Process

Accepted papers will be published online,upon receiving the final version from the authors in the upcoming recent issue.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: editor@ijeter.everscience.org

Copyright

COPYRIGHT © EverScience Publications