Paper Type | :: | Research Paper |
Title | :: | IOT Based Multiple Tanks water Level Monitoring and Control |
Country | :: | India |
Authors | :: | Ashfaque Ahmed || Siddiqui Ahmed Mohsin || Faheem Ansari || Shahzad Mobeen |
Page No. | :: | 01-05 |
In this paper the improvement in the previous work is proposed by changing the programming of the 8051 microcontroller and webpage programming. The change in the software programming of 89S52 microcontroller is done and due to which the administrator can control the individual tank water level by turning on/off relays which in turn controls the solenoid valve open/close. In manual mode of administrator login four new tabs will appear on web page labeled as Relay1 On/OFF, Relay2 On/Off, Relay3 On/Off and Relay 4 On/Off. In manual mode set motor on/off button appears on webpage only when all 4 tanks get filled completely with water. The admin can control the individual tank water level without turning motor off each time. The motor will be off manually when all 4 tanks are filled 100% then pump motor can be switched off by using set motor off button.
Keyword : 89S52 microcontroller, float sensor , Internet of Things ,Solenoid valve, Relay
[1]. Ashfaque Ahmed; Vijay D. Chaudhari et., Multilevel Water Level Control and Monitoring of Multiple Tanks, International Journal
of Advances in Scientific Research and Engineering (IJASRE),Volume 4,Issue 1,Jan. 2018.
[2]. Narong Aphiratsakun; Warranipit Suvittayakul; KanyanatSaingam, AU water level process control system , Electrical
Engineering/Electronics, Computer Telecommunications and Information Technology (ECTI-CON), 12th International Conference
, 2015.
[3]. M. Bala Krishna; Deepanshu Goyal,, Mobile middleware application and services for real-time water pump system , Signal
Processing and Integrated Networks (SPIN) 2nd International Conference, 2015.
[4]. Hiranmoy Mandal, Satish Chandra Bera, An improved technique of measurement of liquid level in a storage tank , Automation,
Control, Energy and Systems (ACES), First International Conference , Feb. 2014.
[5]. A. Atojoko; M. Bin-Melha; E. Elkazmi; M. Usman; R. A. Abd-Alhameed; C. H. See, Liquid level monitoring using passive RFID
tags, ,Design and Test Symposium (IDT) 8th International, Dec. 2013.
Paper Type | :: | Research Paper |
Title | :: | Black Phish: A Novel Approach for Anti-Phishing |
Country | :: | India |
Authors | :: | Ansari Aadil || Sachin Aware || Saud Mahevi |
Page No. | :: | 06-08 |
In recent years, many researches have been going on topic of anti-phishing, phishing theft has become increasingly epidemic. Phishing attacks have become more profitable, especially with the popularity of e-banking and mobile payment. Exploring efficient and practical anti-phishing technology is particularly necessary and important. In this paper, by examining the resources (CSS, JS, and image files) request characteristics of phishing sites, we proposed BlackPhish, a novel anti-phishing method. BlackPhish as an enhanced blacklist technology, can detect not only phishes in blacklist, but also phishing which are emerging.
Keywords: phishing sites, phishing detection, anti-phishing, epidemic, blacklist.
[1]. FBI Warns of 270% Increase in BEC Scams, $2.3 Billion Lost. http://www.batblue.com/fbi-warns-of-270-increase-in-bec-scams-2-
3-billion-lost/.
[2]. Xiang. G, Hong. J, Rose. C. P, &Cranor, L. F. (2011). CANTINA+: A Feature-Rich Machine Learning Framework for Detecting
Phishing Web Sites,ACM Transactions on Information and System Security, 14(2).
[3]. Sheng. S, Wardman. B, Warner. G, Cranor L. F, Hong. J, & Zhang. C, (2009). An empirical analysis of phishing blacklists. In
Proceedings of Sixth Conference on Email and Anti-Spam (CEAS).
[4]. Prakash. P, Kumar. M, Kompella. R. R, & Gupta. M. (2010). Phishnet: predictive blacklisting to detect phishing attacks,In
INFOCOM, 2010 Proceedings IEEE (pp. 1-5). IEEE.
[5]. Legacy extensions for Firefox for Android - Mozilla | MDN. https://developer.mozilla.org/en-US/Addons/
Legacy_Firefox_for_Android
Paper Type | :: | Research Paper |
Title | :: | Image Enhancement Using PCNN |
Country | :: | India |
Authors | :: | Aware Sachin || Aadil Ansari || Ansari Zaid Anjum || Shah Awais Ahemad |
Page No. | :: | 09-11 |
Image enhancement is an important task in image processing, use of wavelet transform improves the quality of an image and reduces distortion level. Image enhancement is an important step for any complicated algorithms, in computer vision and image processing. Denoising is necessary and the initial step to be taken prior to the image data is analyzed. It is essential to apply an efficient enhancement technique, to compensate such data corruption. The effort of image enhancement is to improve an image that is cleaner than its distortion observation. Therefore, a substantial technology in image analysis is noise reduction and the initial step to be taken prior to images is analyzed.
Keywords: processing, distortion, Denoising,data corruption,technology.
[1]. Din Ramirez Rivera, ByungyongRyu, OksamChae "Content-Aware Dark Image Enhancement through Channel Division". IEEE
TRANSACTIONS ON IMAGE PROCESSING, 2012.
[2]. Z.H.A. O. Shiru QU "The Fuzzy Nonlinear Enhancement Algorithm of Infrared Image, Based on Curvelet Transform". Elsevier ltd,
2011.
[3]. Bhutada,Saxena "image enhancement by wavelet-based thresholding, neural network with adaptive learning rate", 2010. Pp 573.
[4]. Seyed Mohammad Entezarmahdi, MehranYazdi "Stationary Image Resolution Enhancement, On the Basis of Contourlet and
Wavelet Transforms by meanI.E.E.E, 2010.
[5]. T.P. Li, Jian. Cheng "A BIOLOGICALL Y INSPIRED NEURAL NETWORK .IMAGE ENHANCEMENT", C. Systems, 2010.
Paper Type | :: | Research Paper |
Title | :: | Image Stegnography Based On Wavalet Transform |
Country | :: | India |
Authors | :: | Shah Awais Ahemad || Aware Sachin || K.K. Sharma || Sai Mandale |
Page No. | :: | 12-13 |
Image Steganography technique play important role in digital multi-media data copyright protection. The process of Steganography applies in different field such as image Steganography, video Steganography, text Steganography and voice Steganography. The process of Steganography performs different modes one is spatial domain and another is frequency domain. Transform based operation used in frequency domain and Pixel based operation performs in spatial domain. The image Steganography faced a problem of geometrical attack.
Keywords: stenography, domain, pixel, spatial.
[1]. SabyasachiKamila, Ratnakirti Roy, SuvamoyChangder "A DWT basedSteganography Scheme with Image Block
Partitioning";.Signal Processing and Integrated Networks, IEEE; 2015.
[2]. Prabakaran G, Bhavani R, Sankaran S, "Dual Wavelet Transform Used;.in Color Image Steganography Method", IEEE, 2014.
[3]. Jas R Sheth "Snake and Ladder Based Algorithm for Steganographic. Application of Specific Streamline Bits on Prime Gap
Method", C. Instrumentation, C. Technologies, IEEE, 2014.
[4]. S.T.Patil, A.JPatil, "Resourceful and protected Biometric Image Stenography using Discrete Wavelet Transform". International
Journal of Innovative,Research in Advanced Engineering; 2014.
Paper Type | :: | Research Paper |
Title | :: | A Review on Current-Mode CMOS Multiplier circuits with Improved Accuracy using Analog VLSI |
Country | :: | India |
Authors | :: | Ansari Faheem Ahmed || Shahezad Mobeen || Siddiqui Mohsin || Ashfaque Ahmed || Rabiya Hamid |
Page No. | :: | 14-19 |
This paper is consisting on reviews of researches done on analog multipliers with better performances in many aspects. As there are two techniques exists in making analog circuits which are voltage mode approach and current mode approach, so taking the advantages of current mode techniques over voltage mode in mind in this paper we have reviewed only current mode analog multipliers. Analog multipliers since are useful in analog signal processing they have huge applications in our daily life devices and equipment, like watt meter, watt hour meter(power supply measurement), Densitometer, Acoustic Thermometer, oscillators and many more. These applications have their own interest as they are the part of the devices which Wegener all yuseinour daily life............
Keywords:Current mode, Rectifier, Cadence Virtuoso, Hspice
[1]. Cosminpopa, Improved Accuracy Current-Mode Multiplier Circuits With Applications in Analog Signal Processing,IEEE
TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014
[2]. Cosmin Popa, CMOS Computational Circuits with Improved Performances,IEEE EuroCon, Zagreb, Croatia, 1-4 July 2013
[3]. C.A De La Cruz-Blas, G.Thomas-Erviti, J.M. Algueta-Miguel, A. Lopez-Martin, CMOS Analog current mode multiplier/divider
operating in triode-saturation with bulk driven technique" ElseVier Integration the VLSI , 2017
[4]. Aram Bahramast, Syed JawadAzhari, SiavashMowlavi, "A new current mode high speed four quadrant cmos analog multiplier" 24th Iranian Conference on Electrical Engineering (ICEE), 2016
Paper Type | :: | Research Paper |
Title | :: | A DSP Based Power Factor Correction Scheme for Switching Power Supplies |
Country | :: | India |
Authors | :: | Shahzad Mobeen Ahmed || Faheem Ansari || Siddiqui Mohsin || Ashfaque Ahmad |
Page No. | :: | 20-25 |
Power factor correction (PFC) is necessary for ac-to-dc switched mode power supply in order to comply with the requirements of international standards, such as IEC-1000–3–2 and IEEE-519. Industry standard for the control of switch mode power supply (SMPS) systems has been analog control. Now with the advent of high speed, low cost Digital Signal Processors (DSPs) ICs, there has been an increased interest in digital control of SMPS. PFC can reduce the harmonics in the line current, increase the efficiency and capacity of power systems, and reduce customers' utility bills. An algorithm for digital control of power factor correction (PFC) is presented in this paper. Based on this algorithm............
Keywords-Digital control, power factor correction (PFC).
[1]. P. C. Todd, "UC3854 controlled power factor correction circuit design," U-134, Unitrode Application Note, pp. 2693-288.
[2]. R. Redl and B. P. Erisman, "Reducing distortion in peak-current-controoled Boost power-factor corretors," in Proc. IEEE Applied
Power Electronics Conf. Expo, 1994, pp. 576–583.
[3]. J. Spangler and A. Behera, "A comparison between hysteretic and fixed frequency Boost converters used for power factor
correction," in Proc. IEEE Applied Power Electronics Conf. Expo, 1993, pp. 281–286.
[4]. R. Zane and D. Maksimovic, "Nonlinear-carrier control for high-powerfactor rectifiers based on up-down switching converters," IEEE Trans. Power Electron., vol. 13, pp. 213–221, Mar. 1998.
[5]. Shamim Choudhury, "Average Current Mode Controlled Power Factor Correction Converter TMS320LF2407A," Application
Report, SPRA902, Texas Instruments, Apr. 2003.
Paper Type | :: | Research Paper |
Title | :: | Performance analysis of AODV and DSR Routing Protocols using NS2 Simulator |
Country | :: | India |
Authors | :: | Siddiqui Ahmed Mohsin || Shahzad Mobeen || Ashafaque Ahmed || Faheem Ansari |
Page No. | :: | 26-31 |
Path routing and protocol collections are the crucial tactics to design any wireless network. In Mobile Adhoc Network (MANET) the nominated protocol should have best in terms of data delivery and data reliability. Hence the performance analysis of the protocols is the main step before selecting a specific protocol. In this paper, the performance analysis is approved out on Adhoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols using NS2 simulator. The delay, throughput, control overhead and packet delivery ratio are the four collective measures used for the comparison of the performance of overhead protocols.
Keywords: Mobile Adhoc Network; Routing protocols; NS2 (Simulator); Throughput; Delay; Packet Delivery Ratio; Control Overhead. Network simulator
[1]. Sarkar S, Basavaraju T.G. and Puttamadappa C., " Ad Hoc Mobile Wireless Networks: Principles, protocols andapplications",
Auerbach Publications, 2008.
[2]. Royer E.M.and Toh C., "A review of current routing protocols for adhoc mobile wireless networks", IEEE personal
communications,1999, pp. 46–56.
[3]. Tuteja A, Gujral A, Thalia A, "Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET using
NS2", IEEE Comp. Society, 2010, pp. 330-333.
[4]. Broach J, .Maltz D.A, Johnson D.B, Hu Y and Jetcheva J, "A Performance comparision of Multihop Wireless Ad-Hoc Network
Routing Protocols", ACM MOBICOM, 1998.
[5]. Boukhalkhal A, Yagoubi M.B., Djoudi D, Ouinten Y and Benmohammed M, "Simulation of Mobile Adhoc Routing Strategies" ,
IEEE, 2008, pp.128-132.
Paper Type | :: | Research Paper |
Title | :: | Antitheft Biometric Padlock |
Country | :: | India |
Authors | :: | Aishawarya Ravindra Joshi || Deepanjali Ravaji Kadlag || Kirti Mohanlal Wakhare || Vrushali Rajendrasa Wakhare || Prof. R.G.Zope |
Page No. | :: | 32-34 |
The proposed work is fine combination of "Biometrics technology" and "Embedded system technology". In this paper the work focuses on padlock without any key or password, moreover the padlock will scan the fingerprint of the user and provide security. It can scan up to 5 fingerprints using fingerprint sensor R300. If anyone tries to open the lock he/she will scan the fingerprint. The ATmega 328p controller will compare it with the stored database then the lock will open otherwise one can get 4 more chance to scan the fingerprint. Still if it does not match then keypad will become activate and One Time Password (OTP) will be provided to the user through Global System for Mobile (GSM). This OTP will be entered by user and lock will open. This system is more secure because if any thief tries to cut the lock at that time it will sense the vibrations and gives signal to controller and will alert the user by sending message as well as audio indication through buzzer.
Keywords : Fingerprint, ATmega, OTP, GSM.
[1]. Joseph Bramha ,Bramah Antique Locks, 1784.
[2]. Omidiora E. O.(2011), A Prototype of a Fingerprint Based Ignition Systems Vol.62 No.2 (2011), pp. 164-171 © EuroJournals
Publishingin Vehicles, Published in European Journal of Scientific Research ISSN 1450-216X , Inc. 2011.
[3]. Raghu Ram.Gangiet. Al.Locker Opening And Closing System Using Rfid, Fingerprint, Password and GSM" 2013.
[4]. Pavithra.B.C, Fingerprint Based Bank Locker System Using Microcontroller, Proceedings of IRF International Conference, 05th
April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9.
[5]. Aditya Shankar et. Al Fingerprint based door looking system 2015 Password autheticatiom system bwas replaced y biometric
system.
Paper Type | :: | Research Paper |
Title | :: | Automated Blood Bank Using Embedded System |
Country | :: | India |
Authors | :: | Saniya Mirza || Patil Pradnya || Gujar Sagar || A.R.Wagh |
Page No. | :: | 35-37 |
Automated Blood Bank connects all blood banks, donors and blood needers in a single platform. It is a digital way to fulfill need of blood in country. The main aim of proposed system is to find required blood group with its blood components (WBC, RBC, Plateletand Hemoglobin).It also provides direct contact between donor and needer. This system is consisting of android app, cloud server and raspberrypie. Needers can easily find blood in blood banks or from person who is ready to donate blood using android app. Data is collected from donor and blood banks using android app and raspberrypi and complete data is stored on cloud server through PHP. Donorand needer can communicate with voice call or needercan get address of blood bank using google map.
Keywords- Android Application,Cloud server,CSS, Java, PHP,Raspberry Pi, XML.
[1]. BalaSenthilMurugan L, and Anitha Julian, Design and Implementation of Automated Blood Bank using Embedded Systems,IEEE
Sponsored 2nd International Conference on Innovations in Information, Embedded and Communication systems, DOI: 978-1-4799-
6818-3/15/$31.00 © 2015 IEEE.
[2]. Ramesh Singh, PreetiBhargava, and SamtaKain, Smart Phones to the Rescue: The Virtual Blood Bank Project, IEEE CS and IEEE
ComSoc 1536-1268/07/$25.00 © 2007 IEEE Pervasive Computing Magazine.
[3]. Bing-Nan Li, Taipa Ming-Chui Dong, and Vai, M.1. (2006), From Codabar to ISBT 128: Implementing Barcode Technology in
Blood Bank Automation System', 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEEEMBS,
pp. 542-545.
[4]. Arif. M. Sreevas. S. Nafseer. K. and Rahul. R. (2012), Automated online Blood bank database, India Conference (INDICON),
Annual IEEE,Print ISBN: 978-1-4673-2270-6, pp. 012 – 017
Paper Type | :: | Research Paper |
Title | :: | Design of Current Mode Full wave Rectifier and Current Feedback Operational Amplifier |
Country | :: | India |
Authors | :: | Rabia Hamid || Ansari Faheem || Fahad Bilal |
Page No. | :: | 38-42 |
In this paper current mode full wave rectifier and feedback operational amplifier is presented.Thisassembly of CMOS is simulated on using Cadence Virtuoso simulation software with its gpdk180 model, i.e.0.18_m technology. Layout of the design is also presented for integration of the circuit.The proposed CurrentFeedback Operational Amplifier (CFOA) is working on the current mode as well as voltage mode techniquesalso. The CFOA design has benefits of gain bandwidth independency compared to the conventional voltagemode operational amplifier.Design of CFOA is implemented using 180nm technology process and simulationis done on the cadence virtuoso software.Rectifier works properly up to 20 MHz frequency..
Keywords:Cadence Virtuoso,CFOA,gpdk180 model.
[1]. A. Faheem, N. Bhagat, U.P. Khot. "Current Mode Full Wave Rectifier Topology for Integration".In: 3rd IEEE International
Conferenceon Recent Trends in Electronics, Information Communication Technology (RTEICT-2018); 2018.
[2]. A. Faheem, N. Bhagat, U.P. Khot. "Design of low voltage supply Current Feedback Operational Amplifier". In: 2nd International
Conference on Inventive Communication and Computational Technologies (ICICCT 2018); 2018.
[3]. RobertM. Cuzner,GiriVenkataramanan, "Current Source Rectifiers Con- duction Modes of operation". IEEE Transactions on
Industry Applications, 51(1).2014 7.
[4]. Mehmet Sagbas, ShahramMinaei, UmutEnginAyten, "Component reduced current-mode full-wave rectifier circuits using single
active component". IET Circuits, Devices Systems, 10(1). 2016 1.
[5]. ZhenhuaWang, "Full-Wave Performed Suitable Precision Rectification that is in Current Domain and Very for CMOS
Implementation". IEEE Transactions on, 39(6).1992 6.
Paper Type | :: | Research Paper |
Title | :: | Review: IOT In Smart Wearable Devices |
Country | :: | India |
Authors | :: | Ammara Sayyed || Asjad Kamal || Ansari Shoiab || Shoiab Abbas || Kazi Tabrez |
Page No. | :: | 43-46 |
Invention of internet gives us a plate from which we make our life faster, easier and less complicated, now here a new plate from is invented called as IOT (internet of things)in which various devices are connected huge data at any time anywhere, IOT has various application in different fields so this paper review is based on wearable devices which work on IOT. In today's scenario safety of women is biggest problem so to minimize this problem we have studied some devices which are used in rings , jackets etc. which works on IOT. Also we have studied on IOT system that include wearing glass and walking assistant for blind people and we have studied a system that utilizing IOT concepts for detection of accident in two wheelers.
Keyword: IoT, wearable.
[1]. Shruthi Prabhakar, Techniques for women safety based on IOT, global journal for research analysis, volume-7, issue-2, February
2018- ISSN No 2237-8160.
[2]. Shoeb Ahmed Shabbeer, Merin Meleet, Smart Helmet for Accident Detection & Notification, 2nd IEEE International Conference
on Computational System and Information Technology for Sustainable Solution 2017.
[3]. Navya R Sogi, Priya Chatterjee, Nehru U,Suma V, SMARISA: A Raspberry Pi based Smart Ring for Women Safety Using IoT ,
proceeding of the national conference on invent research in computing applications (ICIRCA 2018) IEEE Xplore Complaint Part
Number CFP18N67-ART;ISBN:978-1-5386-2456-2
[4]. Satetha Siyang,Thirawut Nilpanapan,Teerakiat Kerdcharoen, Development of IoT-Based Data Shoes For Daily Life Step Count,
IEEE 7th Global Conference on Consumer Electronics (GCCE), 2018.
Paper Type | :: | Research Paper |
Title | :: | A Review: Speed Control of DC Motor Using Android Application |
Country | :: | India |
Authors | :: | Rumaisa Uzma || Javeriya Kauser || Shabnam Bano |
Page No. | :: | 47-49 |
Speed control of DC motor has wide range of application in today's world. This paper presents different methods of controlling the DC motor by using Android phones remotely with the help of Bluetooth technology. The signal is sent from the android mobile that is connected to Arduino Uno through Bluetooth module. In most cases, PWM technique is used to control the speed of DC motor.
Keywords: Arduino, Android mobile, DC motor, Bluetooth module
[1]. Arindam Bhattacharjee, Gaurav Ghosh, Vijay Kumar Tayal, Pallavi Choudekar, "Speed Control of BLDC Motor through Mobile
Application via Secured Bluetooth", Recent Development Control & Power Engineering (RDCAPE), 2017.
[2]. N.Barsoum," DC motor speed control using SMS application, Journal of Intelligent Control and Automation 5", 2012.
[3]. Ritesh Chaubey, Deepak Kumar, Saketh, Dr. Sudeshna, "Speed & Direction Control of DC Motor using Android Mobile
Application", International Journal of Electrical Electronics & Computer Science Engineering .
[4]. Ankesh N.Nichat, Sheikh Kadir Ali, Yogesh D. Solanke, Amit M.Dodke, "Wireless Speed and Direction Control of DC Motor by
Using Radio Frequency Technology.
[5]. A. Khanna and P. Ranjan, "Solar Powered Android Based Speed Control of DC Motor via Secure Bluetooth", IEEE, 2015.
[6]. V.J. Sivanagappa, K.Haribalan "Speed control of DC motor via Internet for Traction Applications" IEEE, 2016.
Paper Type | :: | Research Paper |
Title | :: | Recent Trends in IOT Technology and Smart Wearables: A Review on Iot Application |
Country | :: | India |
Authors | :: | Sana Irfan || Nabeel Fazlehaque || Shahela Shaheen || Mohammad Ibrahim || Saif Mohammad |
Page No. | :: | 50-52 |
Now a day's the world is going towards the new technologies, and in this paper we summarized the IOT evolution, development, architecture and IOT technology. The IOT plays major role in the field of technologies.it also consist of advantages and disadvantages long with their applications. This paper starts with the introduction of IOT technology.
Keywords- Ecosystems, Internet of things, smart home, wi-fi, CO2
[1]. Amisha Ashok Karia, Lavina Vijay Budhwani, Vishal Sahebrao Badgujar, IoT-Key Towards Automation, International
Conference on Smart City and Emerging Technology (ICSCET), 2018
[2]. L. Roselli, C. Mariotti, P. Mezzanotte, F. Alimenti, G. Orecchini, M. Virili, N.B. Carvalho Review of the present technologies
concurrently contributing to the implementation of the Internet of Things (IoT) paradigm: RFID, Green Electronics, WPT and
Energy Harvesting, IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), 2015
[3]. S.Sujin Issac Samuel, A Review of Connectivity Challenges in IoT-Smart Home, 3rd MEC International Conference on Big Data
and Smart City, 2016
[4]. Trusit Shah, S. Venkatesan,, Authentication of IoT Device and IoT Server Using Secure Vaults, 17th IEEE International
Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data
Science And Engineering, 2018
© 2019 All Rights Reserved | Design by iosrjen