1st National Conference on Technology
(Volume-3)

Electronics and Telecommunication
Paper Type :: Research Paper
Title :: IOT Based Multiple Tanks water Level Monitoring and Control
Country :: India
Authors :: Ashfaque Ahmed || Siddiqui Ahmed Mohsin || Faheem Ansari || Shahzad Mobeen
Page No. :: 01-05

In this paper the improvement in the previous work is proposed by changing the programming of the 8051 microcontroller and webpage programming. The change in the software programming of 89S52 microcontroller is done and due to which the administrator can control the individual tank water level by turning on/off relays which in turn controls the solenoid valve open/close. In manual mode of administrator login four new tabs will appear on web page labeled as Relay1 On/OFF, Relay2 On/Off, Relay3 On/Off and Relay 4 On/Off. In manual mode set motor on/off button appears on webpage only when all 4 tanks get filled completely with water. The admin can control the individual tank water level without turning motor off each time. The motor will be off manually when all 4 tanks are filled 100% then pump motor can be switched off by using set motor off button.

Keyword : 89S52 microcontroller, float sensor , Internet of Things ,Solenoid valve, Relay

[1]. Ashfaque Ahmed; Vijay D. Chaudhari et., Multilevel Water Level Control and Monitoring of Multiple Tanks, International Journal of Advances in Scientific Research and Engineering (IJASRE),Volume 4,Issue 1,Jan. 2018.
[2]. Narong Aphiratsakun; Warranipit Suvittayakul; KanyanatSaingam, AU water level process control system , Electrical Engineering/Electronics, Computer Telecommunications and Information Technology (ECTI-CON), 12th International Conference , 2015.
[3]. M. Bala Krishna; Deepanshu Goyal,, Mobile middleware application and services for real-time water pump system , Signal Processing and Integrated Networks (SPIN) 2nd International Conference, 2015.
[4]. Hiranmoy Mandal, Satish Chandra Bera, An improved technique of measurement of liquid level in a storage tank , Automation, Control, Energy and Systems (ACES), First International Conference , Feb. 2014.
[5]. A. Atojoko; M. Bin-Melha; E. Elkazmi; M. Usman; R. A. Abd-Alhameed; C. H. See, Liquid level monitoring using passive RFID tags, ,Design and Test Symposium (IDT) 8th International, Dec. 2013.


Paper Type :: Research Paper
Title :: Black Phish: A Novel Approach for Anti-Phishing
Country :: India
Authors :: Ansari Aadil || Sachin Aware || Saud Mahevi
Page No. :: 06-08

In recent years, many researches have been going on topic of anti-phishing, phishing theft has become increasingly epidemic. Phishing attacks have become more profitable, especially with the popularity of e-banking and mobile payment. Exploring efficient and practical anti-phishing technology is particularly necessary and important. In this paper, by examining the resources (CSS, JS, and image files) request characteristics of phishing sites, we proposed BlackPhish, a novel anti-phishing method. BlackPhish as an enhanced blacklist technology, can detect not only phishes in blacklist, but also phishing which are emerging.

Keywords: phishing sites, phishing detection, anti-phishing, epidemic, blacklist.

[1]. FBI Warns of 270% Increase in BEC Scams, $2.3 Billion Lost. http://www.batblue.com/fbi-warns-of-270-increase-in-bec-scams-2- 3-billion-lost/.
[2]. Xiang. G, Hong. J, Rose. C. P, &Cranor, L. F. (2011). CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites,ACM Transactions on Information and System Security, 14(2).
[3]. Sheng. S, Wardman. B, Warner. G, Cranor L. F, Hong. J, & Zhang. C, (2009). An empirical analysis of phishing blacklists. In Proceedings of Sixth Conference on Email and Anti-Spam (CEAS).
[4]. Prakash. P, Kumar. M, Kompella. R. R, & Gupta. M. (2010). Phishnet: predictive blacklisting to detect phishing attacks,In INFOCOM, 2010 Proceedings IEEE (pp. 1-5). IEEE.
[5]. Legacy extensions for Firefox for Android - Mozilla | MDN. https://developer.mozilla.org/en-US/Addons/ Legacy_Firefox_for_Android


Paper Type :: Research Paper
Title :: Image Enhancement Using PCNN
Country :: India
Authors :: Aware Sachin || Aadil Ansari || Ansari Zaid Anjum || Shah Awais Ahemad
Page No. :: 09-11

Image enhancement is an important task in image processing, use of wavelet transform improves the quality of an image and reduces distortion level. Image enhancement is an important step for any complicated algorithms, in computer vision and image processing. Denoising is necessary and the initial step to be taken prior to the image data is analyzed. It is essential to apply an efficient enhancement technique, to compensate such data corruption. The effort of image enhancement is to improve an image that is cleaner than its distortion observation. Therefore, a substantial technology in image analysis is noise reduction and the initial step to be taken prior to images is analyzed.

Keywords: processing, distortion, Denoising,data corruption,technology.

[1]. Din Ramirez Rivera, ByungyongRyu, OksamChae "Content-Aware Dark Image Enhancement through Channel Division". IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012.
[2]. Z.H.A. O. Shiru QU "The Fuzzy Nonlinear Enhancement Algorithm of Infrared Image, Based on Curvelet Transform". Elsevier ltd, 2011.
[3]. Bhutada,Saxena "image enhancement by wavelet-based thresholding, neural network with adaptive learning rate", 2010. Pp 573. [4]. Seyed Mohammad Entezarmahdi, MehranYazdi "Stationary Image Resolution Enhancement, On the Basis of Contourlet and Wavelet Transforms by meanI.E.E.E, 2010.
[5]. T.P. Li, Jian. Cheng "A BIOLOGICALL Y INSPIRED NEURAL NETWORK .IMAGE ENHANCEMENT", C. Systems, 2010.


Paper Type :: Research Paper
Title :: Image Stegnography Based On Wavalet Transform
Country :: India
Authors :: Shah Awais Ahemad || Aware Sachin || K.K. Sharma || Sai Mandale
Page No. :: 12-13

Image Steganography technique play important role in digital multi-media data copyright protection. The process of Steganography applies in different field such as image Steganography, video Steganography, text Steganography and voice Steganography. The process of Steganography performs different modes one is spatial domain and another is frequency domain. Transform based operation used in frequency domain and Pixel based operation performs in spatial domain. The image Steganography faced a problem of geometrical attack.

Keywords: stenography, domain, pixel, spatial.

[1]. SabyasachiKamila, Ratnakirti Roy, SuvamoyChangder "A DWT basedSteganography Scheme with Image Block Partitioning";.Signal Processing and Integrated Networks, IEEE; 2015.
[2]. Prabakaran G, Bhavani R, Sankaran S, "Dual Wavelet Transform Used;.in Color Image Steganography Method", IEEE, 2014.
[3]. Jas R Sheth "Snake and Ladder Based Algorithm for Steganographic. Application of Specific Streamline Bits on Prime Gap Method", C. Instrumentation, C. Technologies, IEEE, 2014.
[4]. S.T.Patil, A.JPatil, "Resourceful and protected Biometric Image Stenography using Discrete Wavelet Transform". International Journal of Innovative,Research in Advanced Engineering; 2014.


Paper Type :: Research Paper
Title :: A Review on Current-Mode CMOS Multiplier circuits with Improved Accuracy using Analog VLSI
Country :: India
Authors :: Ansari Faheem Ahmed || Shahezad Mobeen || Siddiqui Mohsin || Ashfaque Ahmed || Rabiya Hamid
Page No. :: 14-19

This paper is consisting on reviews of researches done on analog multipliers with better performances in many aspects. As there are two techniques exists in making analog circuits which are voltage mode approach and current mode approach, so taking the advantages of current mode techniques over voltage mode in mind in this paper we have reviewed only current mode analog multipliers. Analog multipliers since are useful in analog signal processing they have huge applications in our daily life devices and equipment, like watt meter, watt hour meter(power supply measurement), Densitometer, Acoustic Thermometer, oscillators and many more. These applications have their own interest as they are the part of the devices which Wegener all yuseinour daily life............

Keywords:Current mode, Rectifier, Cadence Virtuoso, Hspice

[1]. Cosminpopa, Improved Accuracy Current-Mode Multiplier Circuits With Applications in Analog Signal Processing,IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014
[2]. Cosmin Popa, CMOS Computational Circuits with Improved Performances,IEEE EuroCon, Zagreb, Croatia, 1-4 July 2013
[3]. C.A De La Cruz-Blas, G.Thomas-Erviti, J.M. Algueta-Miguel, A. Lopez-Martin, CMOS Analog current mode multiplier/divider operating in triode-saturation with bulk driven technique" ElseVier Integration the VLSI , 2017
[4]. Aram Bahramast, Syed JawadAzhari, SiavashMowlavi, "A new current mode high speed four quadrant cmos analog multiplier" 24th Iranian Conference on Electrical Engineering (ICEE), 2016


Paper Type :: Research Paper
Title :: A DSP Based Power Factor Correction Scheme for Switching Power Supplies
Country :: India
Authors :: Shahzad Mobeen Ahmed || Faheem Ansari || Siddiqui Mohsin || Ashfaque Ahmad
Page No. :: 20-25

Power factor correction (PFC) is necessary for ac-to-dc switched mode power supply in order to comply with the requirements of international standards, such as IEC-1000–3–2 and IEEE-519. Industry standard for the control of switch mode power supply (SMPS) systems has been analog control. Now with the advent of high speed, low cost Digital Signal Processors (DSPs) ICs, there has been an increased interest in digital control of SMPS. PFC can reduce the harmonics in the line current, increase the efficiency and capacity of power systems, and reduce customers' utility bills. An algorithm for digital control of power factor correction (PFC) is presented in this paper. Based on this algorithm............

Keywords-Digital control, power factor correction (PFC).

[1]. P. C. Todd, "UC3854 controlled power factor correction circuit design," U-134, Unitrode Application Note, pp. 2693-288.
[2]. R. Redl and B. P. Erisman, "Reducing distortion in peak-current-controoled Boost power-factor corretors," in Proc. IEEE Applied Power Electronics Conf. Expo, 1994, pp. 576–583.
[3]. J. Spangler and A. Behera, "A comparison between hysteretic and fixed frequency Boost converters used for power factor correction," in Proc. IEEE Applied Power Electronics Conf. Expo, 1993, pp. 281–286.
[4]. R. Zane and D. Maksimovic, "Nonlinear-carrier control for high-powerfactor rectifiers based on up-down switching converters," IEEE Trans. Power Electron., vol. 13, pp. 213–221, Mar. 1998.
[5]. Shamim Choudhury, "Average Current Mode Controlled Power Factor Correction Converter TMS320LF2407A," Application Report, SPRA902, Texas Instruments, Apr. 2003.


Paper Type :: Research Paper
Title :: Performance analysis of AODV and DSR Routing Protocols using NS2 Simulator
Country :: India
Authors :: Siddiqui Ahmed Mohsin || Shahzad Mobeen || Ashafaque Ahmed || Faheem Ansari
Page No. :: 26-31

Path routing and protocol collections are the crucial tactics to design any wireless network. In Mobile Adhoc Network (MANET) the nominated protocol should have best in terms of data delivery and data reliability. Hence the performance analysis of the protocols is the main step before selecting a specific protocol. In this paper, the performance analysis is approved out on Adhoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols using NS2 simulator. The delay, throughput, control overhead and packet delivery ratio are the four collective measures used for the comparison of the performance of overhead protocols.

Keywords: Mobile Adhoc Network; Routing protocols; NS2 (Simulator); Throughput; Delay; Packet Delivery Ratio; Control Overhead. Network simulator

[1]. Sarkar S, Basavaraju T.G. and Puttamadappa C., " Ad Hoc Mobile Wireless Networks: Principles, protocols andapplications", Auerbach Publications, 2008.
[2]. Royer E.M.and Toh C., "A review of current routing protocols for adhoc mobile wireless networks", IEEE personal communications,1999, pp. 46–56.
[3]. Tuteja A, Gujral A, Thalia A, "Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET using NS2", IEEE Comp. Society, 2010, pp. 330-333.
[4]. Broach J, .Maltz D.A, Johnson D.B, Hu Y and Jetcheva J, "A Performance comparision of Multihop Wireless Ad-Hoc Network Routing Protocols", ACM MOBICOM, 1998.
[5]. Boukhalkhal A, Yagoubi M.B., Djoudi D, Ouinten Y and Benmohammed M, "Simulation of Mobile Adhoc Routing Strategies" , IEEE, 2008, pp.128-132.


Paper Type :: Research Paper
Title :: Antitheft Biometric Padlock
Country :: India
Authors :: Aishawarya Ravindra Joshi || Deepanjali Ravaji Kadlag || Kirti Mohanlal Wakhare || Vrushali Rajendrasa Wakhare || Prof. R.G.Zope
Page No. :: 32-34

The proposed work is fine combination of "Biometrics technology" and "Embedded system technology". In this paper the work focuses on padlock without any key or password, moreover the padlock will scan the fingerprint of the user and provide security. It can scan up to 5 fingerprints using fingerprint sensor R300. If anyone tries to open the lock he/she will scan the fingerprint. The ATmega 328p controller will compare it with the stored database then the lock will open otherwise one can get 4 more chance to scan the fingerprint. Still if it does not match then keypad will become activate and One Time Password (OTP) will be provided to the user through Global System for Mobile (GSM). This OTP will be entered by user and lock will open. This system is more secure because if any thief tries to cut the lock at that time it will sense the vibrations and gives signal to controller and will alert the user by sending message as well as audio indication through buzzer.

Keywords : Fingerprint, ATmega, OTP, GSM.

[1]. Joseph Bramha ,Bramah Antique Locks, 1784.
[2]. Omidiora E. O.(2011), A Prototype of a Fingerprint Based Ignition Systems Vol.62 No.2 (2011), pp. 164-171 © EuroJournals Publishingin Vehicles, Published in European Journal of Scientific Research ISSN 1450-216X , Inc. 2011.
[3]. Raghu Ram.Gangiet. Al.Locker Opening And Closing System Using Rfid, Fingerprint, Password and GSM" 2013.
[4]. Pavithra.B.C, Fingerprint Based Bank Locker System Using Microcontroller, Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9.
[5]. Aditya Shankar et. Al Fingerprint based door looking system 2015 Password autheticatiom system bwas replaced y biometric system.


Paper Type :: Research Paper
Title :: Automated Blood Bank Using Embedded System
Country :: India
Authors :: Saniya Mirza || Patil Pradnya || Gujar Sagar || A.R.Wagh
Page No. :: 35-37

Automated Blood Bank connects all blood banks, donors and blood needers in a single platform. It is a digital way to fulfill need of blood in country. The main aim of proposed system is to find required blood group with its blood components (WBC, RBC, Plateletand Hemoglobin).It also provides direct contact between donor and needer. This system is consisting of android app, cloud server and raspberrypie. Needers can easily find blood in blood banks or from person who is ready to donate blood using android app. Data is collected from donor and blood banks using android app and raspberrypi and complete data is stored on cloud server through PHP. Donorand needer can communicate with voice call or needercan get address of blood bank using google map.

Keywords- Android Application,Cloud server,CSS, Java, PHP,Raspberry Pi, XML.

[1]. BalaSenthilMurugan L, and Anitha Julian, Design and Implementation of Automated Blood Bank using Embedded Systems,IEEE Sponsored 2nd International Conference on Innovations in Information, Embedded and Communication systems, DOI: 978-1-4799- 6818-3/15/$31.00 © 2015 IEEE.
[2]. Ramesh Singh, PreetiBhargava, and SamtaKain, Smart Phones to the Rescue: The Virtual Blood Bank Project, IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 © 2007 IEEE Pervasive Computing Magazine.
[3]. Bing-Nan Li, Taipa Ming-Chui Dong, and Vai, M.1. (2006), From Codabar to ISBT 128: Implementing Barcode Technology in Blood Bank Automation System', 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEEEMBS, pp. 542-545.
[4]. Arif. M. Sreevas. S. Nafseer. K. and Rahul. R. (2012), Automated online Blood bank database, India Conference (INDICON), Annual IEEE,Print ISBN: 978-1-4673-2270-6, pp. 012 – 017


Paper Type :: Research Paper
Title :: Design of Current Mode Full wave Rectifier and Current Feedback Operational Amplifier
Country :: India
Authors :: Rabia Hamid || Ansari Faheem || Fahad Bilal
Page No. :: 38-42

In this paper current mode full wave rectifier and feedback operational amplifier is presented.Thisassembly of CMOS is simulated on using Cadence Virtuoso simulation software with its gpdk180 model, i.e.0.18_m technology. Layout of the design is also presented for integration of the circuit.The proposed CurrentFeedback Operational Amplifier (CFOA) is working on the current mode as well as voltage mode techniquesalso. The CFOA design has benefits of gain bandwidth independency compared to the conventional voltagemode operational amplifier.Design of CFOA is implemented using 180nm technology process and simulationis done on the cadence virtuoso software.Rectifier works properly up to 20 MHz frequency..

Keywords:Cadence Virtuoso,CFOA,gpdk180 model.

[1]. A. Faheem, N. Bhagat, U.P. Khot. "Current Mode Full Wave Rectifier Topology for Integration".In: 3rd IEEE International Conferenceon Recent Trends in Electronics, Information Communication Technology (RTEICT-2018); 2018.
[2]. A. Faheem, N. Bhagat, U.P. Khot. "Design of low voltage supply Current Feedback Operational Amplifier". In: 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT 2018); 2018.
[3]. RobertM. Cuzner,GiriVenkataramanan, "Current Source Rectifiers Con- duction Modes of operation". IEEE Transactions on Industry Applications, 51(1).2014 7.
[4]. Mehmet Sagbas, ShahramMinaei, UmutEnginAyten, "Component reduced current-mode full-wave rectifier circuits using single active component". IET Circuits, Devices Systems, 10(1). 2016 1.
[5]. ZhenhuaWang, "Full-Wave Performed Suitable Precision Rectification that is in Current Domain and Very for CMOS Implementation". IEEE Transactions on, 39(6).1992 6.


Paper Type :: Research Paper
Title :: Review: IOT In Smart Wearable Devices
Country :: India
Authors :: Ammara Sayyed || Asjad Kamal || Ansari Shoiab || Shoiab Abbas || Kazi Tabrez
Page No. :: 43-46

Invention of internet gives us a plate from which we make our life faster, easier and less complicated, now here a new plate from is invented called as IOT (internet of things)in which various devices are connected huge data at any time anywhere, IOT has various application in different fields so this paper review is based on wearable devices which work on IOT. In today's scenario safety of women is biggest problem so to minimize this problem we have studied some devices which are used in rings , jackets etc. which works on IOT. Also we have studied on IOT system that include wearing glass and walking assistant for blind people and we have studied a system that utilizing IOT concepts for detection of accident in two wheelers.

Keyword: IoT, wearable.

[1]. Shruthi Prabhakar, Techniques for women safety based on IOT, global journal for research analysis, volume-7, issue-2, February 2018- ISSN No 2237-8160.
[2]. Shoeb Ahmed Shabbeer, Merin Meleet, Smart Helmet for Accident Detection & Notification, 2nd IEEE International Conference on Computational System and Information Technology for Sustainable Solution 2017.
[3]. Navya R Sogi, Priya Chatterjee, Nehru U,Suma V, SMARISA: A Raspberry Pi based Smart Ring for Women Safety Using IoT , proceeding of the national conference on invent research in computing applications (ICIRCA 2018) IEEE Xplore Complaint Part Number CFP18N67-ART;ISBN:978-1-5386-2456-2
[4]. Satetha Siyang,Thirawut Nilpanapan,Teerakiat Kerdcharoen, Development of IoT-Based Data Shoes For Daily Life Step Count, IEEE 7th Global Conference on Consumer Electronics (GCCE), 2018.


Paper Type :: Research Paper
Title :: A Review: Speed Control of DC Motor Using Android Application
Country :: India
Authors :: Rumaisa Uzma || Javeriya Kauser || Shabnam Bano
Page No. :: 47-49

Speed control of DC motor has wide range of application in today's world. This paper presents different methods of controlling the DC motor by using Android phones remotely with the help of Bluetooth technology. The signal is sent from the android mobile that is connected to Arduino Uno through Bluetooth module. In most cases, PWM technique is used to control the speed of DC motor.

Keywords: Arduino, Android mobile, DC motor, Bluetooth module

[1]. Arindam Bhattacharjee, Gaurav Ghosh, Vijay Kumar Tayal, Pallavi Choudekar, "Speed Control of BLDC Motor through Mobile Application via Secured Bluetooth", Recent Development Control & Power Engineering (RDCAPE), 2017.
[2]. N.Barsoum," DC motor speed control using SMS application, Journal of Intelligent Control and Automation 5", 2012.
[3]. Ritesh Chaubey, Deepak Kumar, Saketh, Dr. Sudeshna, "Speed & Direction Control of DC Motor using Android Mobile Application", International Journal of Electrical Electronics & Computer Science Engineering .
[4]. Ankesh N.Nichat, Sheikh Kadir Ali, Yogesh D. Solanke, Amit M.Dodke, "Wireless Speed and Direction Control of DC Motor by Using Radio Frequency Technology.
[5]. A. Khanna and P. Ranjan, "Solar Powered Android Based Speed Control of DC Motor via Secure Bluetooth", IEEE, 2015.
[6]. V.J. Sivanagappa, K.Haribalan "Speed control of DC motor via Internet for Traction Applications" IEEE, 2016.


Paper Type :: Research Paper
Title :: Recent Trends in IOT Technology and Smart Wearables: A Review on Iot Application
Country :: India
Authors :: Sana Irfan || Nabeel Fazlehaque || Shahela Shaheen || Mohammad Ibrahim || Saif Mohammad
Page No. :: 50-52

Now a day's the world is going towards the new technologies, and in this paper we summarized the IOT evolution, development, architecture and IOT technology. The IOT plays major role in the field of technologies.it also consist of advantages and disadvantages long with their applications. This paper starts with the introduction of IOT technology.

Keywords- Ecosystems, Internet of things, smart home, wi-fi, CO2

[1]. Amisha Ashok Karia, Lavina Vijay Budhwani, Vishal Sahebrao Badgujar, IoT-Key Towards Automation, International Conference on Smart City and Emerging Technology (ICSCET), 2018
[2]. L. Roselli, C. Mariotti, P. Mezzanotte, F. Alimenti, G. Orecchini, M. Virili, N.B. Carvalho Review of the present technologies concurrently contributing to the implementation of the Internet of Things (IoT) paradigm: RFID, Green Electronics, WPT and Energy Harvesting, IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), 2015
[3]. S.Sujin Issac Samuel, A Review of Connectivity Challenges in IoT-Smart Home, 3rd MEC International Conference on Big Data and Smart City, 2016
[4]. Trusit Shah, S. Venkatesan,, Authentication of IoT Device and IoT Server Using Secure Vaults, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, 2018