International Conference on Emerging Trends in Engineering and Technology Research (ICETETR-2019)
(Volume-1)

CIVIL

Paper Type :: Research Paper
Title :: An Experimental Study on Deterioration of Concrete in Puducherry Coastal Region
Country :: India
Authors :: K.Srinivasan || Dr.S.Jayakumar || P.Harishkumar || K.Mohamed Nasim
Page No. :: 01-08

The aim of this research work is to study the behavior of concert in marine environment for study period of three month along the Puducherry coast. The concrete cubes of both conventional and epoxy coated are kept at various exposure conditions like fully submerged (F.S), partly submerged (P.S) and atmospheric conditions (A.C) along the Puducherry coast. Carbonation depth, Chloride Test, Compressive strength and pH test were conducted for the samples at end of each month. The mineralogical compositions of all exposure condition to synthetic seawater for 3 months at the surface layer and at the core of tested specimens were investigated by X-ray diffraction (XRD).After 3 months of testing, concrete degradation occurred in the external surface of the samples. The most aggressive conditions are found on the partly submerged (P.S) followed by fully submerged (F.S) non-coated samples. The coated samples for all the exposure conditions were found to be unaffected during the study period.

Keyword : Carbonation depth, Chloride Test, Compressive strength and pH Test.

[1]. Neelamani and sundarvadivelu 2006. Investigation on the reasons for erosion of Pondicherry Coast, South East Coast of India; Journal of Coastal Research, SI 39 (Proceedings of the 8th International Coastal Symposium), 880 - 883. Itajaí, SC, Brazil, ISSN 0749-0208.
[2]. Nam, P.T., Larson, M., Hanson, H., Hoan, L.X., 2009. A numerical model of near shore waves, currents, and sediment transport In: Coastal Engineering, Vol. 56, 1084-1096.
[3]. Nam, P.T., Larson, M., 2010. Model of near shore waves and wave induced current around a detached In: Journal of Waterway, Port, Coastal, and Ocean Engineering, Vol. 136, No. 3, 156-176.
[4]. Larson, M., Camenen, B., Nam, P.T., 2010. A unified sediment transport model for inlet application Submitted to: Journal of Coastal Research (in press).
[5]. Rajalakshmi P.R. and Usha Natesan, 'Dynamics of Pulicat mouth', November 2006, Accepted in the Journal of Engineering today.


Paper Type :: Research Paper
Title :: An Experimental Study on Purification of Leachate and Analysis of Its Application in Plant Growth
Country :: India
Authors :: K.Srinivasan || Dr.S.Jayakumar || S.Nivedita || R.Sumithra Thillaikannu
Page No. :: 09-13

Landfill leachate is a significant polluting factor of the environment. The leachate generation is a major problem of municipal landfill sites or dump yards. The leachate is a toxic black liquid leached from the landfill containing dissolved and suspended matter in it. Leachate is a product formed when precipitation or atmospheric moisture enters the landfill that is undergoing degradation. The leachate contains organic and inorganic compounds, heavy metals and pathogens, if not collected they can pollute both surface and ground water. Due to their low biodegradability, high nitrogen content and presence of other possible toxic components, the co-treatment of leachate along with the municipal waste water in the conventional municipal waste water treatment plants is undesirable...........

Keywords: Fly ash, Filtration process, Irrigating, Leachate, Marine sand, Palm flower (konka), Plants, RO membrane, Toxic.

[1]. EL Fadel H., Merzouki M., Laamayema A., Najem M., and Benlemlih M. "Purification Performance of Filtration process for Leachate in Morocco By Marine Sands, Clay and Fly Ash". Journal of Biotechnological Letters, 4(1), 2013, 51-59.
[2]. Amin Mojiri, Hamidi Abdul Aziz, and Shuokr Qarani Aziz "Trends in Physical-Chemical Methods for Landfill Leachate Treatment". International Journal of Scientific Research in Environmental Sciences, 1(2), 2013, 16-25.
[3]. Minu Singh, Masroor M., Khan A., and Naeem M. "Effect of Nitrogen on Growth, Nutrient Assimilation, Essential Oil Content, Yield and Quality Attributes in Zingiber officinale Rose". Journal of the Saudi Society of Agricultural Sciences, 15, 2014, 171-178. November 2014.
[4]. Cheng CY., Tsang CK., Wong RSK., and Chu LM. "Is Landfill Leachate a Potential Source of Nitrogen for Plant Growth?". International Conference on Environment and Industrial Innovation, 2011, 286-295.
[5]. Subhra Singh, N. Janardhana Raju, Wolfgang Gossel and Peter Wycisk, "Assessment of Pollution Potential of Leachate From Solid Waste Disposal Site And its Impact on Ground Water Quality, Varanasi environs, India", Arabian Journal of Geosciences, 9(131), 2016, 1-12.


Paper Type :: Research Paper
Title :: An Experimental Study on Termite Tracker using Moisture sensor and Thermal camera
Country :: India
Authors :: Dr. S Jayakumar || K Srinivasan || R Pirainila || G Amitha Stains Mary
Page No. :: 14-17

One of the ideas is using moisture sensor which detects the moisture using electrical conductivity. There are several test methods available for the detection of moisture in these things one of them was ASTM methods they were used widely for the testing of timber and walls. The moisture content (MC) of porous building materials is often estimated via measurement of the resistance between two electrodes inserted into the material. The most common material to which this technique is applicable is wood. In general, the MC reading obtained is affected by several internal and external factors. Also in addition we have thermal imaging camera in order to capture the moisture or mostly used for termite tracking. Thermal cameras are passive sensors that capture the infrared radiation emitted by all objects with a temperature above absolute zero. The infrared thermal imaging camera was used so that we could visualize..........

Keywords:ASTM methods, Android Application, Electrical conductivity, Moisture sensor, Thermal imaging camera.

[1]. Nicola Ludwig, Michele Bertucci, Marco Gargano, Palo Bison, Ermanno Grinzato "Infrared thermography for moisture detection : A laboratory study and in-situ test", Material evaluation, January 2011.
[2]. Philipp Dietsch, Steffen Franke, Bettina Franke, Andreas Gamper, Stefan Winter "Methods to determine wood moisture content and their applicability in monitoring concepts", Journal civil structure health monitoring, August 2014.
[3]. Czeslaw Suchocki, Jacek Katzer "Terrestrial laser scanning harnessed for moisture detection in building materials – Problems and limitations", Automation in construction, June 2018.
[4]. Tatsuo Toba and Akio Kitagawa "Wireless moisture sensor using a microstrip –antenna", Journal of sensors, Vol 2011, September 2011.
[5]. Tamogna Ojha, Sudip Misra, Narendra Singh Raghuwanshi "Wireless sensor networks for agriculture: The state of the art in pra itice and future design", Computer and Electronics in agriculture, 2015.


Paper Type :: Research Paper
Title :: Experimental Study on Polypropylene Fibre Reinforced Concrete Using Steel Slag as a Partial Replacement of Cement
Country :: India
Authors :: D. Aravindhan || P. Prem Kumar || Ms. T. Lavanya
Page No. :: 18-21

The major problem the world is facing today is the environmental pollution. In the construction industry mainly the production of Portland cement will causes the emission of pollutants results in environmental pollution. We can reduce the pollution effect on environment, by increasing the usage of industrial by-products in our construction industry. Geo-polymer concrete is such a one and in the present study, to produce the geo-polymer concrete the Portland cement is fully replaced with steel slag and alkaline liquids are used for the binding of materials. The alkaline liquids used in this study for the polymerization are the solutions of Sodium-hydroxide (NaOH) and sodium silicate (Na2Sio3). This study investigates the use of steel slag in 50% replacements by mass in cement. And the polypropylene fiber is added as 0.5%, 1% and 1.5%. Harden concrete properties like compressive strength, Splitt tensile, flexural strength of concrete are be determined for Geoplymer concrete and Normal concrete. Finally the test results were compared from the test results, it has been observed that the geo-polymer concrete possess better result than the normal concrete.

..................


Paper Type :: Research Paper
Title :: Studies on Treatment of Textile Effluent Using Activated Charcoal
Country :: India
Authors :: Dr.S.Jayakumar || S.Nivedita || K.Srinivasan || M Mohana Linga Balaji M
Page No. :: 22-25

Water being an essential component of life and symbol of purity, is becoming extinct and contaminated with extensive use by industries. The sources of occurrence of water pollution are majorly from textile industries. Waste minimization is of great importance in decreasing pollution load and production costs. So, in order to minimize the waste from the textile industries, the effluent from the industry are treated and reused. The treatment process is carried out with the help of activated charcoals prepared from the waste natural materials. The activated charcoal acts as an adsorbent for the adsorption of the dye and impurities. The treatment process comprises of separation of dyes from the textile effluent and treating the wastewater extracted from the effluent for reuse.ule...........

Keywords: Activated Charcoal, Economical, Natural Waste Materials, Regeneration And Reuse.

[1]. S.Supriya and P.N.Palanisamy (2016)."Removal of disperse red 9 from textile wastewater using acid activated carbon and polypyrrolenano composite – A comparative study."Volume-2, Issue-7, ISSN: 2455-6653.
[2]. ChinenyeAdaobiIgwegbe (2016). "Adsorptive Treatment of Textile Wastewater Using Activated Carbon Produced fromMucunapruriens Seed Shells." 4, 21-37.
[3]. M. Santhi, P. E. Kumar (2015). "Removal of Basic Dye Rhodamine-B by Activated Carbon-MnO2-Nanocomposite and Activated Carbon-A Comparative Study." Volume 4, Issue 5,ISSN: 2319-7064.
[4]. N.Gopal and M. Asaithambi (2015). "Adsorption of acid blue- 40 (a textile dye) using ProsopisJuliflora Activated Carbon embedded in Polyaniline matrix." Vol. 8, Issue.3, pp.279 – 286.
[5]. Gopal N, Asaithambi M (2015), "Removal of a basic dye using Polymer Bound Activated Carbon prepared from ProsopisJuliflora seeds." Vol.5, Issue. 7, ISSN: 2394-1537.


Paper Type :: Research Paper
Title :: Study On Wastewater Treatment By Advanced Oxidation Process
Country :: India
Authors :: K.Srinivasan || Dr.S.Jayakumar || S.Sakthi || R.Sumithra Thillaikannu
Page No. :: 23-32

Various dairy products are produced by dairy industries using different chemicals which generates effluent contains recalcitrant elements. Advanced oxidation process plays a efficient role in treatment of dairy wastewater using Fenton's reagents like hydrogen peroxide and ferrous sulphate. Initially pH of effluent is reduced to 4 by using sulphuric acid and to treat 1 liter of effluent we use about 2 ml of H2O2 and 1.5 mg of FeSO4. Then, pH of effluent is increased to 7 for better results floc settlement and alum is used as coagulant in coagulation process. Various tests are carried out in treated effluent like BOD; COD, pH, TDS etc. 85% of COD and 60% of BOD is removed in treated effluent in reaction time of 40 minutes in oxidation process and 1 hour in coagulation process. So, advanced oxidation process shows significant results in treatment of wastewater.

Keywords - Alum, Coagulation, Fenton's reagent, Floc settlement, Ferrous sulphate, Hydrogen peroxide, Oxidation process.

[1]. Kavithaloganathan, Sarpersarp, 2018, Removal of micro algae from sea water using Chitosan-alum/ferric chloride dual coagulation, Desalination 433, 25-32.
[2]. Zi Jun Yong, SumathiSethupathi, 2018, A sequential treatment of intermediate Tropical landfill leachate using a sequencing batch reactor and coagulation, Journal of
[3]. Ruyuan Jiao, Rolando Fabris, 2017, Influence of coagulation mechanisms and floc Formation on filterability, Journal of Environmental Sciences 344, 1-8.
[4]. Fuyi Cui, Shi xu, 2016, Effect of reused alum floc on coagulation performance and floc Characteristics formed by aluminum in acid water, Chemical Engineering Journal 287, 225-232.
[5]. H Zhang, H Choi, 2015, Optimization of Fenton process for the treatment of landfill Leachate, Journal of Hazardous materials 125, 166-174.


CSE

Paper Type :: Research Paper
Title :: Deep See Face Recognition – Assistive Device For Visually Impaired People
Country :: India
Authors :: Mrs.T.Umamageswari || T.Deepa || S.Praveena || A.Selva Sabeena
Page No. :: 33-40

We introduce the DEEP-SEE FACE framework, an assistive device designed to improve cognition, interaction and communication of visually impaired (VI) people in social encounters. The proposed approach jointly exploits computer vision algorithms (region proposal networks, ATLAS tracking and global, low level image descriptors) and deep convolutional neural networks (CNNs) in order to detect, track and recognize, in real-time, various persons existent in the video streams. The major contribution of the paper concerns a global, fixed-size face representation that takes into account various video frames while remaining independent of the length of the image sequence..............

Keywords: Convolutional neural networks, face recognition in video streams, assistive devices for visually impaired users

[1]. J. Obermayer, W. Riley, O. Asif, J. Jean-Mary, "College smoking-cessation using cell phone text messaging", J Am Coll Health. 2004;53(2):71–8.
[2]. S. Haug, C. Meyer, G. Schorr, S. Bauer, U. John, "Continuous individual support of smoking cessation using text messaging: a pilot experimental study", Nicotine Tob Res, 11 (8) (2009), pp. 915-923.
[3]. D. Scherr, R. Zweiker, A. Kollmann, P. Kastner, G. Schreier, F.M. Fruhwald, "Mobile phone-based surveillance of cardiac patients at home", J Telemed Telecare, 12 (5) (2006), pp. 255-261.
[4]. P. Rubel, J. Fayn, G. Nollo, D. Assanelli, B. Li, L. Restier, et al. "Toward personal eHealth in cardiology. Results from the EPIMEDICS telemedicine project",
[5]. S.C. Wangberg, E. Arsand, N. Andersson, "Diabetes education via mobile text messaging", J Telemed Telecare, 12 (Suppl 1) (2006), pp. 55-5


Paper Type :: Research Paper
Title :: Heart Rate Monitoring System based on IOT
Country :: India
Authors :: B.Priyadharshini || K.Priya
Page No. :: 41-48

Detection of atrial fibrillation is done by checking the variation in the period of heart rate, if a patient has atrial fibrillation then the period between each heart beat will vary. But in this Paper, we developed a heart rate sensor which can be used to detect the variations in the heart rate, this is done by using PPG(Photo Plethysmo Graphy). The heart rate sensor is a thumb-sized heart rate monitor designed for ATMEGA328PU Microcontroller. A pulse sensor which is developed based on PPG techniques, used to detect the blood volume changing in the micro vascular bed of tissues. It is relatively easy to detect the pulsatile component of cardiac cycle.According to this theory, the sensor has two holes that you can used to attach to your belt. You can wrap on your finger, wrist, earlobe or other areas where it has contact with skin.............

Keywords : ATMEGA328PC Microcontroller, Heart Rate Sensor, GSM Modem,LCD Display, Rectifier, Transformer, USB to TTL Convertor, Voltage Regulator.

[1]. W. Ping, W. Jin-gang, S. Xiao-bo, and H. Wei, "The research of telemedicine system based on embedded computer," in Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the, 2006, pp. 114-117.
[2]. e. ECG. (2018-February-24). Available: http://www.megaemg.com/products/emotion-ecg/
[3]. H. Ng, M. Sim, C. M. Tan, and C. Wong, "Wireless technologies for telemedicine," BT Technology Journal, vol. 24, pp. 130-137, 2006.
[4]. W. M. Sweileh, S. W. Al-Jabi, A. S. AbuTaha, H. Z. Sa'ed, F. M. Anayah, and A. F. Sawalha, "Bibliometric analysis of worldwide scientific literature in mobile-health: 2006–2016," BMC medical informatics and decision making, vol. 17, p. 72, 2017.
[5]. B. K. Host, A. W. Turner, and J. Muir, "Real‐time teleophthalmology video consultation: an analysis of patient satisfaction in rural Western Australia," Clinical and Experimental Optometry, vol. 101, pp. 129-134, 2018.


Paper Type :: Research Paper
Title :: Enhance Searchable Public Key Encryption for Wireless Sensor Networks to Overcome Attacks
Country :: India
Authors :: B.Raghupathi || R.Mohan Prakash || S.Prasanth || K.Mathanraj || Mrs.Revathi
Page No. :: 49-53

The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of technology will give rise to new risks to cyber security, particularly the data confidentiality in cloud-assisted WSNs (CWSNs). Search-able public-key encryption (SPE) is a promising method to address this problem. In theory, it allows sensors to up-load public-key ciphertexts to the cloud, and the owner of these sensors can securely delegate a keyword search to the cloud and retrieve the intended data while maintain-ing data confidentiality. However, all existing and semanti-cally secure SPE schemes have expensive costs in terms of
generating ciphertexts and searching keywords...........

...............


Paper Type :: Research Paper
Title :: Secured Scheme for Preserved Data on Cloud Storage Using Computational Intelligence in Fog Computing
Country :: India
Authors :: D. Gajalakshmi || G.Keerthana || Dr. A. Velmurugan
Page No. :: 54-56

The grounds which has been owned by their respective owners in the better and suitable place to en roll all subtleties in paper it self. When enlisting in paper a portion of people can fabricate that documentation as equivalent unique report they do archive in off chance additionally get an opportunity to have same like it. In order to overcome the down time we will actualize in proposed framework that the land how to be enlisted by utilizing scope and longitudinal. When client logged in they need to choose the record to enlist by utilizing of guide in the document to check the scope and longitudes to take. The client need to transfer every one of the subtleties while transfer time in administrator information base. If the client enrolled in that equivalent they can send a demand while sending time on the off chance that the land proprietor acknowledge asked for they can get the document as a client in the event that they need to get the document.

...................


Paper Type :: Research Paper
Title :: Color Space Conversion Based Texture Feature Model for Thermal Sequence Analysis
Country :: India
Authors :: M.Anithaarokiamary || S.Priyadharshini || Rajnandini Mali || Mrs.M.Premalatha
Page No. :: 57-60

The thermal camera can capture keyboard surface temperature change after human's touch. This phenomenon may be used to steal users' passwords physically. In this paper, based on the study of thermal dynamics of keyboards, we design a password break system using an infrared thermal camera. First, we build a signal model to describe the dynamic process of temperature change on the keyboard using Newton's law of cooling. Next, we develop a maximum likelihood parameter estimation algorithm to estimate the keystroke time instants. Then by maximizing the probability of key order arrangement, a novel password breaking algorithm is developed. Our algorithm is tested using simulated data as well as real-world data. Experiment results show that our algorithm is effective for physical password breaking using thermal characteristics. Based on our results, we discuss strategies for password protection at the end.

Keyword: Information protection, the rmal image, sequence analysis, password

-----------------


Paper Type :: Research Paper
Title :: Predicting The Crimes Based On Weather Using PYSPARK
Country :: India
Authors :: Jamila. S || Ramya. K || Sowmiya. M || Mrs. M. Sindhuja
Page No. :: 61-63

Crime analysis is one of the most important activities of the majority of the intelligent and law enforcement organizations all over the world. Generally they collect domestic and foreign crime related data (intelligence) to prevent future attacks and utilize a limited number of law enforcement resources in an optimum manner. A major challenge faced by most of the law enforcement and intelligence organizations is efficiently and accurately analyzing the growing volumes of crime related data. The vast geographical diversity and the complexity of crime patterns have made the analyzing and recording of crime data more difficult. Data mining is a powerful tool that can be used effectively for analyzing large databases and deriving important analytical results. This paper presents an intelligent crime analysis system which is designed to overcome the above mentioned problems. The proposed system is here is we proposed location analysis along with the crime happened and we proposed Pyspark here to store large amount of data's for crime analysis. The proposed system consists of a rich and simplified environment that can be used effectively for processes of crime analysis.

-------------


Paper Type :: Research Paper
Title :: Job Scheduling and Load Balancing In Cloud Computing Using Hacobee
Country :: India
Authors :: E.Janakiraman || V.Ramya
Page No. :: 64-68

Cloud computing is an emerged architecture in recent times that tends to satisfy the inspiration of entrepreneurs and researches on IT industry. A recent adaptive algorithm, the proposed algorithm is a hybrid algorithm (HACOBEE) which is optimal solution for job scheduling among nodes in a dynamic cloud environment for that uses combination of two approaches i.e. Ant colony optimization and Bee colony approach for workloads distribution among nodes of a cloud. In ant colony(ACO), ants continuously update the pheromone table while moving forward and backward from nest to food source and vice versa. In Bee colony (BCO), bees help in searching food sources and best sources is found calculating the fitness value. In this proposed algorithm for used in load balancing and job scheduling in better response time. To combine Ant colony optimization and Bee colony optimization to establish an effective load balancing and efficient job scheduling algorithm can be implemented in cloud environment to ensure that all virtual machines are busy in their assigned jobs and none of the virtual machines are idle.

Keywords- Ant colony, Bee colony, cloud environment, HACOBEE, job scheduling, load balancing.

[1]. Lenstra J.K., Kan A.H.G.R. & Brucker P., 1977, "Complexity of machine scheduling problems," Annals of Discrete Mathematics, 1, 343 – 362.
[2]. Adams J., Balas E., and Zawack D., 1988, "The Shifting Bottleneck Procedure for Job Shop Scheduling," Management Science, 34(3), 391 – 401
[3]. Kolonko M., 1999 "Some new results on simulated annealing applied to the job shop scheduling problem," European Journal of Operational Research, 113(1), 123-26.
[4]. Suresh R.K. and Mohanasundaram K.M., 2006, "Pareto archived simulated annealing for job shop scheduling with multiple objectives," International J. of Advanced Manufacturing Technology, 29(1-2), 184-196.
[5]. El-Bouri A., Azizi N., and Zolfaghar S., 2007, "A comparative study of a new heuristic based on adaptive memory programming and simulated annealing: The case of job shop scheduling," European Journal of Operational Research, 177(3), 1894 – 1910.


Paper Type :: Research Paper
Title :: Survey on Fuzzy Based Extreme Learning Machine for Intrusion Detection
Country :: India
Authors :: Thamizharasi.E || P.Salini
Page No. :: 69-76

Nowadays, the network based applications are growing rapidly, and therefore the quality of utilizing web contains few dangers of network attacks. Thus, network security must be necessary to produce secure data because of increase in potential network attacks. Intrusion detection is among the most necessary analyses problems in network security. Intrusion Detection System (IDS) is afundamental tool to monitors and analyze network activities for detecting intrusions and security attacks. But it faces large number of problems to perform efficient intrusion detection. One among the vital problem is,it examines all features within the dataset to find intrusion. Many redundant and irrelevant features occurs,which can decrease the intrusion detection efficiency and also it may takemore computational time for the effective response in real time network traffic............

Keywords- Intrusion Detection System(IDS), Machine learning, Accuracy, False Alarm Rate.

[1]. Aburomman, A. A., &Reaz, M. B. I. (2016, November). Survey of learning methods in intrusion detectionsystems.In Advances
inElectrical,Electronic and Systems Engineering (ICAEES), International Conference on (pp. 362-365).IEEE.
[2]. Kala, T. Sree, and A. Christy. "A Survey and Analysis of Machine Learning Algorithms for Intrusion Detection System." (2017):
40-46.