NCSC2D-2016-3rd National Conference on Sustainable Computing and Communication for Development of Nation

"NCSC2D 2016 Conference Papers "

[1] [2] [3]
Overview of Near Field Communication & Secure Mobile System[ ]


Near field communication (NFC) is commonly used for Smartphone and similar devices to set up radio communication with each other by moving them together or bringing them into closeness, usually no more than a few inches. As mobile phone availability becomes being present everywhere at once around the world, the use of Mobile phone based patient terminals require an easy-to-use and able to move freely in all directions. To assemble these requirements a user interface idea based on mobile phones, social networking, social organization as well as medical sensor devices enabled with Near Field Communication. NFC is related or an acquired form of Radio Frequency Identification (RFID). Its working principal is technically based on RFID, which is closely related to Bluetooth device. Currently, it has applications mostly in the field of contactless electronic payment.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact of Black Hole attack on Mobile Ad-hoc Networks (MANETS) Ad-hoc Demand Routing (AODV) protocol[ ]


In this paper we have discussed some basic routing protocols from Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to that of the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack others nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Overview and Approach for Joint Image Encryption and Compression[ ]


In image processing, to provide security to an image many encryption techniques are available. But most of the Encryption techniques mask some amount of data to the source image that always increases the size of image. Encryption makes it difficult to transmit an image through bandwidth constrained channel. To overcome this problem, Image Compression can be applied on the Encrypted image to reduce its size. This paper presents the analysis and overview of some prominent approaches which are relevant to the image encryption and compression. It also discusses an approach to perform joint encryption and compression on image. The scope of implementation for the derived idea exists. Some analytical analysis is also presented from the proposed approach implementation point of view.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Swarm Intelligence Based Demand Partitioning For Virtual Memory Management[ ]


For multiprogramming, multitasking environment system required useful mechanisms that partition a main memory into blocks. The size of block must be sufficient to execute process. Finding the preferred size of block is daunting tasks. This paper proposed a swarm intelligent based demand partitioning for virtual memory. For scalable and efficient memory management .Each process begin with different size. The task of memory allocation algorithm is to find size of process and then divides a process into many blocks. So to process fit into memory and execute. As main memory receives many requests for execution. To execute all requests we need larger size of main memory.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Information Retrieval System Based On Ontology[ ]


Over the years, the volume of information available through the world wide web has been increasing continuously, and never has so much information readily available and shared among so many people. Unfortunately, the unstructured nature and huge volume of information accessible over network have made it difficult for users to shift through and find relevant information.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Mobility scheme for MANET to improve throughput and overhead tradeoffs[ ]


Mobility models of MANET have been still research area in mobile computing and in wireless network with lots of mobility algorithms to design the efficient mobility model. This paper focused on five different techniques such as capacity achieving scheme, three-hop routing scheme 3HR, two-hop relay scheme, TDMA Scheduling, joint coding-scheduling algorithm. To improve this scheme the new method is proposed here that is “Link Failure Detection and Local Route Repair” that gives better throughput and less overhead.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improved Methodology for Face Annotation Technique[ ]


Various face annotation techniques has been still research area in In Image processing with lots of mobility algorithms to design the efficient mobility model. This paper focused on five different techniques such as Collaborative FR for Face Annotation in OSNs, Clustering-Based Approximation, weak label regularized local coordinate coding technique, correlation mining with relaxed graph embedding technique, Robust Multi-Instance Regression Formulation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CALL DROP ISSUE'S OF MOBILE PHONES IN INDIA[ ]


This paper gives you a detail idea about how the "Call Drop Issue" occur, what are the different factor responsible for causing this, how can we calculate the call Drop for 2G and 3G. that data is completely calculated by TRAI with different service provider. the possible solution for consumer point of view and finally try to give a possible solution for reducing the Call Drop Issue.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mobile Based Voting SystemFor Real Time Applications[ ]


The major purpose of Research Work is to increase the number of voters, make voting easier and avoid the mischiefness (viz. rigging) with voting data during elections. On one hand it will minimize the possibilities of rigging of votes while on the other hand it will reduce the massive cost which is put in for elections. It will emerge as a potent weapon for change in the system whereas it will require very very less infrastructure and man power resulting in lesser use of government funds for elections which can be effectively diverted for the various progressive work of the nation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on Analysis and Reusability of FPGA Implementation for I2C Protocol[ ]


I2C is a multi-master serial computer bus invented by Philips that is used to attach low-speed peripherals to a motherboard, embedded system, or cellphone. It is a two-wire, bidirectional serial bus that is Serial Data line (SDA) and Serial Clock line (SCL) which provides a simple, efficient method of data exchange between devices. This paper presents a method for implementation of I2C protocol for reusability. The method proposed the design divided into three levels. The levels are named as Protocol level, Signal level and Interface level. This concept is widely applicable for any high speed device or slow device. Reusability allows us to us a various master and slave pairs without any modification in the design. This design method is to be design in VHDL and implementation will be in the FPGA.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on “Real-Time Nonintrusive Monitoring and Prediction of Driver Fatigue”[ ]


The project titled as “Real-Time Nonintrusive Monitoring and Prediction of Driver Fatigue” describes a driver-fatigue level based on various visual cues. For acquiring driver fatigue, cameras are laced with infrared illuminators. For characterization of individual?s level of fatigue, different visual cues are extracted and are combined in a particular manner for measuring fatigue level of an individual.Eyelid movement, gaze movement, head movement and facial expression are required visual cues. For typical prediction of fatigue level, probabilistic model is prepared.Various visual cues are required for detection of fatigue level of an individual. Using multiple visual cues and their systematic combination concurrently, results in more accurate and robust characterization of fatigue level as compared to use of single visual cue.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation of System to overcome the drowsiness by using Cardio Respiratory Phase Synchronization[ ]


Preventing accidents caused by drowsiness has become a major focus of active safety driving in recent years. A variety of things may cause drowsiness. These include mental state and life choices to serious medical conditions. Certain life choices may lead to increased drowsiness, such as working very long hours or switching to a night shift. Many automobile companies and institutions have been studying ways to monitor drowsiness and keep drivers awake. When drowsiness is detected during driving, audible sound, vibrations, or messages on a display are generally used to warn the driver to concentrate on driving or to take a rest. These methods help to prevent drowsiness-related crashes to some extent, but for greater safety, methods need to be developed to physiologically overcome drowsiness. The key to overcoming drowsiness is to keep the body constantly supplied with oxygen. Experimental results demonstrate the feasibility of quantitatively estimating drowsiness level using cardiorespiratory phase synchronization (CRPS).This study found it possible to induce CRPS by paced breathing (PB) using pulse sound, which synchronized with heartbeats. In conclusion, inducing CRPS by PB using pulse sound synchronized with the heartbeat has the potential to reduce drowsiness physiologically.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Intelligent Indian Currency Detection with Note to Coin Exchanger[ ]


Requirement of coins in a daily transaction at places like bus station, railway station, mall and park is the main purpose of designing an efficient and simple machine which will fulfil need of coins for transactions so that people will not face any problem of coins. This project will provide coins for note, for this purpose we have developed mechanical coin dispensing project which takes the note inside and checks whether note is fake or real, if note is real camera takes picture of it and after that it will find out its value using image processing technique and then according to the value of note equivalent number of coins are dispensed. In this way we are trying to design an efficient machine which will be having low cost as compared to other existing machines.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey on De-noising and Enhancement of Underwater Images[ ]


Underwater image pre-processing is completely needed due to the quality of images captured under water. Basically, underwater images suffer by quality degradation due to transmission of limited range of light, low contrast and blurred image due to eminence of light and diminishing color. When an underwater image is captured, pre-processing is necessarily done to correct and adjust the image for more study and processing. Different filtering techniques are available for pre-processing of underwater images. For the problem of underwater image de-noising, in this paper we have proposed a new method based on adaptive wavelet combining adaptive threshold selection with adaptive output of the threshold function and enhancement technique. Using peak signal-to-noise ratio (PSNR), removes noise effectively, improves image output and also yields superior quality and embodies the superiority of wavelet de-noising.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A New Randomized Cryptographic Image Base Key Generation[ ]


Information sharing via digital media is a vital and challenging one. Those challenges are addressed with the help of cryptographic and stenographic techniques.Cryptography is basically securing the data or information during the communication between different systems and parties . The Algorithm and Key are require to provide the security of data during communication in cryptography. The confidentiality and integrity of the data in communication depends partially on algorithm and partially on key. The size of key in cryptography is limited due to human memorizability.The main objective of this paper is to increase the security in communication by encrypting the information with the key generated by using an images in a session manner. Based on the session type a key is generated which is used for encrypting and decrypting the messages which is further transmitted and received between two sides. The length of the key changes in every session according to the session type. This is a reliable and flexible way to generate the key to secure the information which is transferred on the networks and it is easy to implement. This method try to ensures the prevention of guesses or breaking the key and provides a more secure way for information encryption.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Video Enhancement For Low Light Environment[ ]


Digital video has become an integral part of everyday life. It is well-known that video enhancement as an active topic in computer vision has received much attention in recent years .In this paper we are basically focusing on enhancement of video that taken into the low light conditions for this Video footage recorded in very dim light is especially targeted. Enhancement of low-light video is done by noise reduction; motion adaptive temporal filtering . Dynamic range of denoised video is increased by applying RGB histograms base on adaptive adjustment. In color image data, the chromaticity is restored of raw RGB input data is performed simultaneously with the noise reduction. Finally due to the high level of noise edges and textures are often over-smoothed during the denoising process. Remaining noise is removed using Non-local means (NLM) denoising.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW ON IMPLEMENTATION OF SMS (SHORT MESSAGING SERVICE) BASED AUTOMATED BLOOD BANK USING RASPBERRY PI FOR RURAL AREAS[ ]


A blood bank is bank of blood or blood components gathered as a result of blood donation or collection, stored and preserved for later use in blood transfusion. Automated Blood Bank using Raspberry Pi is an associate work that brings voluntary blood donors and those in need of blood on to a common platform. The term "blood bank" refers to a division of a hospital where the storage of blood product occurs and where proper testing is performed. Automated Blood Bank tries to help victims/patients/those in need of blood. It is an endeavour to achieve dead set these people in want of blood and connects them to those eager to donate. The mission is to fulfil every blood request in the rural areas with a promising SMS application and motivated individuals who are eager to donate blood.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A COMPARATIVE STUDY OF DIFFERENT IMAGE FUSION TECHNIQUES FOR TONE-MAPPED IMAGES[ ]


Image Fusion is the major research area in image processing. Image fusion is the process in which two or more images are merged into single image which can retain all important features of all original images. Fused image will be more informative and complete than any of the input image. To improve quality of information from a set of images fusion process is used.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
MULTIMODAL IMAGE FUSION: A SURVEY[ ]


The quality of information offered by the medical images for diagnosis support can be increased by combining images from different compatible medical devices. Medical image fusion has been used to derive useful information from multimodality medical image data. Image fusion is the process by which two or more images are combined into a single image retaining the important features and information from each of original images ,so image become more interpretable, reliable and much easier to understand by people. Fused image will be represented in format capable for computer processing. Image fusion can be performed by using wavelet transform, complex wavelet transform, non sub sampled contourlet transform, etc. The resulting image possesses more information compared to individual images. This paper describes different techniques and related research for image fusion for multimodal medical imaging.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study of Generalized Equalization Model for Camera Image Enhancement[ ]


A generalized equalization model for image enhancement based on analysis on the relationships between image histogram and contrast enhancement white balancing , a generalized equalization model integrating contrast enhancement and white balancing into a unified framework of convex programming of image histogram. Many image enhancement tasks can be accomplished by the model using different configurations of parameters. With two defining properties of histogram transform, namely contrast gain and nonlinearity, the model parameters for different enhancement applications can be optimized. Then derive an optimal image enhancement algorithm that theoretically achieves the best joint contrast enhancement and white balancing result with trading-off between contrast enhancement and tonal distortion.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WILDLIFE ANIMAL TRACKING USING RFID AND GSM TECHNOLOGY[ ]


This project is used to track the location of Animal in the wildlife reserves or national parks. This project utilizes a RFID (Radio Frequency Identification Device) module and a GSM (Global System Mobile) modem for this purpose. Forest officer or Government authority person will get these SMS containing area in which that animals observe. For example white tiger, panda and many other animals. But these animals also undergo some disease or there can be some situations where human being attention is required for these animals like vaccination of these animals. If they met with some accident or are hurt then we have to cure their wounds, in such cases we need to catch those animals and do the required treatments. Main problem in such situations is that in large wildlife sanctuaries these animals are really hard to locate. Due to this many times we have to search the entire area.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Internet of Things for Industrial Monitoring and Control Applications[ ]


Industrial Monitoring and Control is essential to collect all the relevant information, statistics and data related to the various industrial processes, motors, machines and devices employed in industry premises. This aims at controlled access, better productivity and high quality results of industrial products being manufactured.In this new era of technological developments remote control and monitoring via communication techniques such as ZigBee, RF, Infrared, techniques has been widely used in Industries.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Android Based Application for E-Voting[ ]


Today’s world is all about Technology, Time is money becomes the equation. The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The e-voting promising the possibility of convenient, easy and safe way to capture and count the votes in an election. This paper provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. We also described how the android mobile phones are efficient and can be used for voting. The android platform is used to develop an applicationVoter can see the list of applying candidates at the time of voting

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FINGER CONTROLLED WHEEL DRIVE SYSTEM[ ]


Many people in the world have physical disabilities; they cannot move one place to another place itself. People have certain problems with traditional wheel-chair thus we try to design a system that may rotate wheel-chair without much efforts. We may control wheel-chair by using microcontroller and sensors combination, so that it helps to control wheel-chair by implementing the principle of hall effect.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
GREEN HOUSE MONITERING AND CONTROLLING USING GSM AND ANDROID[ ]


Greenhouse monitoring is a needed one for variable climate changes. GSM technologies have been rapidly developing wireless technology during few years. Starting from industrial controls and telecommunication, it is now being applied in environmental monitoring and agriculture.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Evaluation of Contemporary System for Classification of Synthetic Images[ ]


Recent classification system of images focuses on Natural (e.g photographic) images and synthetic/artificial (e.g non-photographic). In automatic image identification classification of images based on description is important and challenging problem. For natural and synthetic image classification an algorithm has been developed. From the raw images data in order to exploit the difference of color pattern and spatial correlation of pixels in synthetic and natural images some features are extracted. These features have poor accuracy If these features are used alone they may have poor accuracy but can form a more complex and accurate global classifier when combined together, and their precision can be boosted. We will use low-level image features such as Color map, edge map, energy level, Threshold ratio & nearest neighborhood classifier for classifying the image into natural and synthetic in our image classification algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Power Management System Using PIR Sensor[ ]


Intelligent energy saving system, the aim of the project is to save the energy or power, is use in places like home, libraries, industries etc. where lighting is very important. The aim of the project is use to save energy or power use in places like libraries where lighting is very important for the people who come to read books. So libraries will be well illuminated with many lamps. However, in this project work the basic signal processing of various parameters which are temperature, LDR, Relay, micro-controller etc.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Web Based Automation Of Training And Placement Cell[ ]


Web based Training and Placement Cell Management is a leading step in automating the very much manual and tedious task of training and placement department. This provides a platform which has all the required information of students and so it can match the exact student profile with the company’s requirements. Main purpose of this project is to provide a friendly access to its user, may it be a student, a training and placement officer or any official of the college. Students would be easily feeding there required data into the system and then the TPO can also easily fetch the required matching student details. As this would be a complete automated system it will reduce lots of human efforts and also will save a lot of time of both Students and TPO in submitting and chasing for the required data respectively. This system could also be used as a central depository which controls/possess the entire data of student academic details.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF SRAM IN SUBMICRON TECHNOLOGY USING VLSI[ ]


Designing a chip has low power becomes major challenge of present time. Design of SRAM implies power has been increasing with scaling of technologies. As modern technology is concerned, it is very important to design lower power, high performance and fast responding SRAM(Static Random Access Memory) therefore they are critical component in high performance processors. The conventional 8T SRAM cell is very much create noise during read operation. To overcome this problem, researchers have proposed different SRAM topologies such as 6T bit cell design.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Facial Expression Detection Using FACS[ ]


Human emotions and intentions are very often communicated by changes in one or a few discrete facial features and cannot be classified into a small set of prototypic expressions. Many a times people communicate emotions that might otherwise be very difficult to communicate through their ex-pressions. Thus understanding these nuances would definitely help in maintaining a peaceful co-existence. In this project, we propose to develop a system for detecting the basic human expressions using a Facial Action Coding System (FACS). We propose to develop an Automatic Facial Action Recognition System to analyse facial expressions based on both permanent facial features (brow, eyes, mouth) and transient facial features (deepening of facial furrows). The system will recognize the fine changes in facial expression into action units (AUs) of the Facial Action Coding System(FACS). We are using more than one techniques namely: Contour Matching, a rule based method, Support Vector Machine (SVM) and Local Binary Pattern (LBP) to increase the overall efficiency of the code.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CONTENT BASED EFFICIENT APPROACH TO REMOVE MALICIOUS TEXT USING OSN WALLS[ ]


Now a days social network become very popular and on line social networks is to give users the ability to control the messages photo posted on their own private space to avoid that unwanted content is displayed on walls.A propose system allow on line social users to have a direct control on the messages,images posted on their walls. This is achieved through a new design rule-based system, that allows users to customize the filtering criteria to be applied to their walls, and a Machine Learning based soft classifiers are used automatically labeling messages in support of content-based filtering such as image and text. It is achieved through a flexible rule based system, that permit users to customize the filtering criteria to be put on their walls, and a Machine Learning based soft classifier automatically labeling messages in endure of content based filtering.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhance Quality Of Services In Common Radio Resource Management In Heterogenious Network[ ]


Radio Resource Management refers to a group of mechanisms that are collectively responsible for efficiently utilizing a Radio Access Technology to provide services with an acceptable level of QoS. RRM mechanisms contains Power Control ,Handover Control , Packet Scheduling or Congestion Control , and Admission Control .Radio Resource Management new strategies are implemented independently in each RAT. RRM strategies is suitable for the heterogeneous network, because each RRM strategy only considers that situation of one particular RAT. CRRM strategy is also known as Multi-access RRM(MRRM) has been proposed. In this paper focus on JCAC algorithm has been presented. Considering four different simulation results are obtained and compared. Result show joint management of radio resources and bandwidth adaptation reduce call blocking or dropping probability in heterogeneous cellular networks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
MOBILITY MANAGEMENT VERTICAL AND HORIZONTAL HANDOVER DECISIONS IN HETEROGENEOUS WIRELESS NETWORKS USING OMNET[ ]


Wireless and mobile computing a new technology and fastest growing area with regularly increased data rates and coverage areas. Future challenge is to make the best possible use of the available different networks vertical or Horizontal. In this paper used Wi-Fi and Wi-MAX heterogeneous networks. In this proposed paper analyse handover procedures by using OMNET. Using this simulator, we assessed performance such as delay, packet loss and throughput of GSM,Wi-Fi and Wi-MAX during handover. Recent focus on handover decisions for customized mobility management in heterogeneous wireless networks. Our algorithm supports the best access point horizontal handover decisions and vertical as well as the best access network vertical handover decisions to user based on the current set of user preference, application requirements, and context information. In this paper our main contributions are: First A novel decision making algorithm for personalized handover, Second an enhanced autonomic architecture to apply to personalized mobility management, and Third an extensible and user-friendly OMNET platform for implementing and evaluating and testing handover decision .

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
TWO LEVEL DATA SECURITY SYSTM USING IMAGE SLICER WITH STEGANOGRAPHY[ ]


The main purpose of a security system is to transfer data securely in an open system environment. There are various ways of doing this. Sometimes multiple methods are used simultaneously to add multiple levels of security for data transfer. Cryptography and Steganography are the basic methods used in a security system. Cryptography is the science of encrypting data in such a way that nobody can understand the encrypted message, whereas in Steganography the existence of data is conceived, means its presence cannot be noticed. The information to be hidden is embedded into the cover object which can be text, image, audio or video so that the appearance of cover object doesn’t vary even after the information is hidden. This paper presents a two level data security system using Visual Cryptography and Steganography.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW ON FPGA IMPLEMENTATION OF POLYPHASE FILTER[ ]


Use of Digital filters are in digital transmitter / receiver side. One access to parallel digital signal processing splits a high bandwidth signal into multiple lower bandwidth (rate) signals by an analysis bank. After processing by using synthesis bank, the subband signals are recombined into a fullband output signal. This paper describes a polyphase filter bank and implementation on FPGA-based architectures according to size, timing and bandwidth requirements. In this paper we study implementation of a Vedic Multiplier based polyphase filter which will be faster and more accurate than the existing systems.Using the polyphase FIR filter to filter out signal frequencies which are not needed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Geometric Distorted Shape for Retrieval From Database[ ]


In this paper we provide analysis for shape retrieval using Feature point extraction. It provides detail analysis of how system works for shape retrieval from the databases of countable number of shapes. The human visual system retrieves distorted shapes from complete database in the real world, and it has inspired a lot of computational methods of retrieving shapes. To match retrieve shapes from the observed shapes are decided to be alike or unlike remembered shapes in memory. To compare the observed and remembered shapes, they must be appropriately represented so that matching can be done appropriately. For this reason, the shape retrieval process needs a appropriate shape representation as well as shape mapping methods. Moreover, the shape representations should be normalized before the mapping process. Correction process for representations under unpredictable conditions has not yet been established. In this paper, we propose a shape retrieval method that enables us to retrieve shapes under unpredictable conditions with a suitable process. Using curvature partition and angle-length profile, our shape retrieval method normalizes the shape representation. As a result, unlike the previously proposed methods, geometric distortion, and differences in image resolution occur simultaneously.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review of Image Segmentation techniques to detect brain tumor from MR Images[ ]


Image Processing is no longer aloof from the world of medical. Medical image processing is challenging and important field now a day. Processing of MRI is one of the part of this field. Medical diagnostics can easily provide image in digital formats. However precise identification of brain tumor growth from medical images is still a critical and complicated task. Manual brain tumor detection may prone to human error. Hence researchers are now trying to automate the diagnostics. In this paper various techniques of automatic tumor Segmentation and detection has been discussed. Also describes our proposed strategy to detect & extract brain tumor from patient’s MRI scan images using wavelet transform. These methods incorporate with some noise removal processes, segmentation and morphological operations which are the basic concepts of image processing.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW ON DESIGN OF PROGRAMMABLE VOLTAGE REGULATOR WITH INPUT OUTPUT BUFFER USING VLSI TECHNOLOGY[ ]


A Programmable voltage regulator with Input–Output Differential Voltage with nm VLSI technology in increasing the Density, provides for the new approaches towards power management. Buffer is used in input and output of programmable LDO circuit for matching input and output impedance of circuit. Trans-Conductance Amplifier is used as the Error Amplifier (EA), with a current splitting technique is implemented to boost the gain. In the rail-to-rail output stage of the Error Amplifier, Cancellation of power noise is formed, minimizing the size of the Power MOS transistor. These helps the proposed LDO Regulator to operate over a wide range of operating conditions achieving maximum current efficiency, output variation is less for a variable load transient, and effective PSRR.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A NOVEL APPROACH FOR SMART ENERGY METER USING 89C51 MICROCONTROLLER[ ]


It is the new concept in the world of electricity measurement. This concept is not only beneficial for electricity measurement but also has the capabilities to prevent power theft and misuses of electricity which is based on “Pay first..Then use it..”. The concept of PEM (Prepaid Energy Meter) is very similar to prepaid mobile system, you recharge and spend accordingly.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Removal of power line interference and baseline wander noise from ECG using FFT/IFFT filter[ ]


ECG signals obtained for diagnosis normally contain a lot of noises and artifacts such as power line interference, baseline wander noise, high frequency noise and noise generated by human body. These noises degrade signal quality, which may be critical for routine monitoring and diagnosis. Primarily the power line interference and baseline wander noise affect the ECG signal strongly. In this paper a fast Fourier transform/ inverse fast Fourier transform (FFT/IFFT) filter is used to reduce power line interference and baseline wander noise in ECG signaL.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Lifting Based Wavelet Transform for Lossy to Lossless Image Coding[ ]


In the field of image coding many researchers demand increases for application in multimedia, communications and computer networks. It provides higher compression ratio which is desired and retaining good image quality which is needful in the present demanding environment.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
HARDWARE IMPLEMENTATION OF CRYPTOSYSTEM BY AES ALGORITHM USING FPGA[ ]


Advanced Encryption Standard (AES) is an approved cryptographic Algorithm that can be used to protect electronic data. The Advanced Encryption Standard can be programmed in software or built with hardware. However Field Programmable Gate Arrays (FPGAS) offer a quicker, more customizable solution.It is shown, how a modified structure in these Hardware devices results in significant improvement of the design efficiency. The conventional scheme of AES is vulnerable for cryptanalysis. This consumes a lot of Memory for the storage of look up table. Thus it is essential to generate S-Bytes at run time. It is beneficial if the S-byte generated during run time varies with the input key. Another weakness of AES is that it works with a single key. In this paper, a new scheme of AES involving generation of Key based S-Boxes and dual key AES is proposed. This overcomes the vulnerability of static S-Boxes and also single key encryption scheme.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
STUDY OF ADVANCEMENTS IN LINE PROTECTION[ ]


Advancements in line protection and long-haul communications allow us to implement better line protection schemes to meet the increasing needs of modern power systems, facilitate savings in primary equipment, and reduce the cost of engineering. High-speed, affordable digital communications channels are key enablers of better and simpler line protection, with reduced engineering effort and lower risk of miscoordination.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Proposed System for Human Health Monitoring through Internet of Thing’s (IoT)[ ]


The design and development of a smart non-invasive wearable physiological parameters monitoring system with secure data transferring and storing is presented in this paper. The system represented is used to monitor physiological parameters such as temperature and heart rate of a human being. In accordance with Health Insurance Portability Act (HIPAA) the patient’s privacy as well as security is important in the protection of healthcare privacy. Point-Of-Care (POC) is an application used in hospital widely provides data integrity, confidentiality, and availability.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Analysis of CMOS ADC Topologies and Design of 4-Bit SAR ADC Using Deep-submicron Technology[ ]


Analog-to-digital converters (ADCs) are key design blocks in digital systems and are currently used by many application fields to improve digital systems, which achieve superior performances with respect to many parameters. This paper presents the comparative analysis of different types of ADC based on different performance parameters and design of SAR ADC. The application of ADC can be found in data acquisition systems, measurement systems and digital communication systems. This paper provides comparison between different performance parameters for ADCs & analyzing the better results & performance in future, the design of SAR ADC is suitable for low power consumption. In modern era, VLSI design is one of the technique to have high speed, less power consumption, effective use of space, easily available productivity and mobility. With the fast advancement of CMOS technology, more & more signal processing functions are implemented in the digital domain for low cost, low power consumption, higher yield, & higher reconfigurability.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review On Automatic Solar Radiation Tracking System[ ]


Fossil fuels are a relatively short-term energy source and thus, there is a need for an alternative energy resource. The use of solar energy as an alternative source is becoming more wide spread. Implementing solar modules to convert solar energy into electricity is a common aspect, but the solar energy is not fully utilised. To make solar energy more useful, the efficiency of solar array systems must be maximized. A feasible approach to maximize the efficiency of solar array systems is Solar Radiation tracking.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review Paper on Smart Restaurant Ordering System[ ]


Nowadays people are looking forward for a system that will satisfy their needs more comprehensibly. Most of the restaurants industries are looking for any application that enhances the dining experience as well as that increase the profit. In traditional ordering system the waiter notes down the order from the customer then places the order to the kitchen and then the billing is done which consumes time and may cause errors. This project aims to automate the food ordering and billing process in restaurant as well as to improve the dining experience of customers.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REVIEW STUDY OF INTELLIGENT STREET LIGHT SYSTEM[ ]


In India, energy consumption plays a major role in day to day life. The outcome is that a large portion of electrical energy used by the Street lighting is wasted unnecessarily if the road traffic is minimum. Conventional street light systems are switched on/off for fixed duration of time .If smart street light is designed and implemented in the cities then, lot of power can be saved .Use of LED lamps over Conventional Street lamps reduces the pollution and increase the life span of lamps .LED lamps has better luminous efficacy as well as better color rendering index. The system is modified in such a way that will automatically turn off during daytime and operates only during the night. System automatically minimizes the intensity of the light after midnight meanwhile if any vehicle passes by then respective set of lamps will be on at maximum intensity.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN & ANALYSIS OF 4-BIT COUNTER USING SUB-MICRON TECHNOLOGY[ ]


This project is aim to design a 4-bit asynchronous counter using D flip flop. A counter is a collection of flip flop each representing a digit in a binary number representation.Counting is a fundamental function of digital circuits. A digital counter consists of a collection of flip-flops that change state (set or reset) in a prescribed sequence. Asynchronous counter is also known as serial or ripple counter. The name asynchronous comes from the fact that this counters flip-flop are not being clocked at the same time. The clock input is applied only to the first flip flop . D flip flops are the basic memory element which is used in many of the applications with this proposed and existing flip flop an asynchronous counter was designed.Power comparison was made between the counters where the asynchronous counter designed using proposed flip flop gives low power consumption when compared to the existing one.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
[1] [2] [3]