NATIONAL CONFERENCE ON COPULATION OF TRENDS IN INFORMATION, COMPUTER AND COMMUNICATION ENGINEEGING, PSN ENGINEERING COLLEGE

Home > Nonfiction > NATIONAL CONFERENCE ON COPULATION OF TRENDS IN INFORMATION, COMPUTER AND COMMUNICATION ENGINEEGING, PSN ENGINEERING COLLEGE > Page 1
NATIONAL CONFERENCE ON COPULATION OF TRENDS IN INFORMATION, COMPUTER AND COMMUNICATION ENGINEEGING, PSN ENGINEERING COLLEGE Page 1

by DENY J


Adaptive Background Segmentation Based Moving Target Detection

  For UAV Aerial Surveillance videos

  Athilingam R1, Senthil Kumar K2, Nuzrath Hameedha A3

  1Research Scholar ,2 Associate Prof , 3Student, Division of Avionics, Department of Aerospace Engineering,

  Madras Institute of Technology, Anna University, Chennai 600044, India

  Abstract

  This paper proposes an algorithm that detects moving objects robustly from videos that are obtained from UAV (Unmanned Air Vehicle). Existing algorithms face a common problem, when it comes to Videos from UAV. The problem is timely varying camera position, because of the movement of its platform. While segmenting object of interest, the relative motion of camera and object should be considered. The proposed algorithm effectively detects the object of interest from the video considered. High Definition Input videos are obtained from Dhaksha (UAV) and processed by using proposed algorithm using MATLAB.The experimental results show that the proposed method works effectively in dynamic environment.

  Keywords: UAV, High Definition.

  On The Detection of Vehicle Condition and Driver Behaviour

  Guided By, Presented By,

  A.Jegatheesan M.E, (Ph.d) J. Abitha, N.Jenisha, H.Adlin Shiji

  HOD/IT Final Year, IT. E-mail id:[email protected]

  Abstract

  The road accident can increase day to- day because of human errors. So many vehicle manufactures continue to develop their emphasis on safety with driver assistance system. But this does not satisfy multipurpose device which is able to analyze and advice on safety conditions. We use the three-axis accelerometer of an android based laptop for recording and analyzing various driver behaviors and road condition. This guides the driver how to operate a vehicle safety and efficiently. Also the auditory alerts increases the drivers overall awareness.

  Protocol in Wireless Sensor Networks-Key Management

  ANTO JESSY MARY.A [a], .D.C.JULIE JOSEPHINE[b]

  Abstract

  Wireless Sensor Networks (WSN) are wireless networks composed of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. Each sensor node in a sensor network is typically equipped with a radio transceiver or other wireless communication device, a small microcontroller, and an energy source, usually a battery. The security analysis and performance simulation show that ROSS not only achieves the predefined security goals, but also allows a tradeoff between security and performance cost. In three new mechanisms in the framework of random key redistributions were proposed to address the bootstrapping problem, namely the q-composite scheme, the multipath reinforcement scheme, and the random pair wise scheme. Each of these three schemes represents a different tradeoff in the design space of random key protocols.

  KEYWORDS: Sense temperature, pressure, sound, light, vibration.

  Ensuring Cloud Information Accountability Using Auditing Mechanism

  Boopathi.K

  Department of Computer Science and Engineering

  Mahendra Institute of Engineering and Technology, Namakkal, Tamilnadu.

  Mail Id: [email protected]

  Abstract

  Cloud computing presents a new way to supplement the current consumption and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the Internet. It enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data can become a significant barrier to the wide adoption of cloud services. To address this problem, a novel highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, I propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. I leverage the Logging mechanism to both create a dynamic and traveling object, and to ensure that any access to users’ data will trigger authentication and automated logging. To strengthen user’s control, I also provide distributed auditing mechanisms. I provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.

  Keywords- Cloud Information Accountability, Auditing mechanism, logging mechanism.

  Efficient Audit Services for Verification of Integrity of Outsourced Cloud Storages

  C.MURUGAN/II YEAR M.E., DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, MAHENDRA INSTITUTE OF ENGINEERING AND TECHNOLOGY, TIRUCHENGODE.

  GUIDED BY : MR.M.SARAVANAN/AP/DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING, MAHENDRA INSTITUTE OF ENGINEERING AND TECHNOLOGY, TIRUCHENGODE.

  MR.J.SATHYASEELAN/AP/ DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, MAHENDRA INSTITUTE OF ENGINEERING AND TECHNOLOGY, TIRUCHENGODE.

  MR.R.NATCHADALINGAM/AP/DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, PSN ENGINEERING COLLEGE, TIRUNELVELI.

  Abstract

  In this paper, we propose a dynamic audit service for verifying the integrity of untrusted and outsourced storage. Our audit service, constructed based on the techniques, fragment structure, random sampling and index-hash table, can support provable updates to outsourced data, and timely abnormal detection. In addition, we propose an efficient approach based on probabilistic query and periodic verification for improving the performance of audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit system has a lower computation overhead, as well as a shorter extra storage for audit metadata.

  Distributed Combined Biometric Security in Mobile Adhoc Network

  B.Dhanasekar and R.Srivatsan

  Dept. of Electronics & Communication Engg.,

  Sudharsan Engineering college,Pudukottai,Tamilnadu,India.

  Abstract

  This paper is an attempt to study and implement high security in Mobile Ad-hoc Networks (MANETs) using Multi-modal biometric technology and by using Dempster- Shafer theory for data fusion. MANETs supporting securitysensitive an application in hostile environments needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper we study and present the theory, architecture, implementation and performance of a multimodal combined IDS and Finger print authentication with data fusion providing authentication in a distributed manner.

  Keywords— Multimodal biometric, MANET, Data Fusion, IDS, Dempster-Shafer Theory.

  AUTMan Humanoid Kid-Size Robot

  Ezhilarasi.S

  Department of Electronics & Instrumentation Engg

  ASAN Memorial college of engg & technology

  [email protected]

  Abstract

  This document describes AUTMan kid-size research is mainly based on the other active research groups working on different RoboCup leagues in Amirkabir University of Technology. The focus is to use experiences of our Soccer Simulation 3D team and SPL team, which is closely related to the humanoid robot league. A brief history of Team
AUTMan and its research interests will be described. Future work based on the humanoid kid -size robots will also be discussed. Our main re-search interests within the scope of the humanoid robots are robust real-time vi-sion and object recognition, machine learning for adaptation and architectures for humanoid decision-making.

  Ensuring Distributed Accountability for Data Sharing in the Cloud

  W.Riyaz Ahamed *1 , A.Prashanth *2 , F.Femila #1

  *1U.G Student, B.E ECE, Asan Memorial College of Engineering and Technology, chengalpattu, Chennai, T.N, India.

  *2 U.G Student B.E ECE, Asan Memorial College of Engineering and Technology, chengalpattu, Chennai, T.N, India.

  #1 Assistant Professor, Asan Memorial College of Engineering and Technology, chengalpattu, Chennai, T.N, India.

  [email protected]

  Abstract

  Cloud computing enables highly scalable services to be easily consumed over the Internet on as-needed basis. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this paper, we propose a highly decentralized information accountability framework to keep track of the actual usage of the users’ data in the cloud. In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users’ data and policies. We leverage the JAR programmable capabilities to both create a dynamic and travelling object, and to ensure that any access to users’ data will trigger authentication and automated logging local to the JARs. To strengthen user’s control, we also provide distributed auditing mechanisms.

  Keywords— Cloud computing, accountability, data sharing

  A Method for Automatic Fall Detection of Elderly People Using Posture Recognition

  M.IMAYAVARAMBAN, B.THIYAGARAJAN,

  Department of Computer Science & Engineering

  Asan Memorial College of Engineering & Technology.

  Abstract

  The mobile application is capable of detecting possible falls for elderly, through the use of special sensors. The alert messages contain useful information about the people in danger, such as his/her geo location and also corresponding directions on a map. In occasions of false alerts, the supervised person is given the ability to estimate the value of importance of a possible alert and to stop it before being transmitted. This paper describes system for monitoring and fall detection of ELDERLY PEOPLE using triaxial accelerometer together with ZigBee transceiver to detect fall of ELDERLY PEOPLE. The system is composed of data acquisition, fall detection and database for analysis. Triaxial accelerometer is used for human position tracking and fall detection. The Accidental Fall Detection System will be able to assist carers as well as the elderly, as the carers will be notified immediately to the intended person. This fall detection system is designed to detect the accidental fall of the elderly and alert the carers or their loved ones via Smart-Messaging Services (SMS) immediately. This fall detection is created using microcontroller technology as the heart of the system, the accelerometer as to detect the sudden movement or fall and the Global System for Mobile (GSM) modem to send out SMS to the receiver.

  Automatic Multilevel Thresholding Of Digital Images

  Mr. J.Elavarasan 1, Mrs C.Sri Venkateshwaran 2

  PG Student1, Associate Professor2, Department of Electronics and Communication Engineering,

  CK College of Engineering and Technology, Cuddalore-31, 2

  Email ID: [email protected], [email protected]

  Abstract

  Image segmentation plays a vital role in the field of medical images for the diagnosis of diseases. Segmentation of such digital medical images is based on threshold values but the selection of threshold is difficult and the threshold is keeping by manual does not give satisfactory result like efficiency computational speed as in the existing algorithm such as K-means, improved k-mean, region growing and otsu method. So the aim of the project is the achieve automatic multilevel of thresholding for the above said models which involves techniques such as adjustment of parameters, slope of histogram, and factors affecting the threshold values. Hence this method will improves the efficiency and to obtain the essential detail of the area of interest in the given image.

  Keyword: segmentation, k-means, multilevel thresholding

  Robust Automatic Face, Gender and Age Recognition Using Abifgar Algorithm

  Mr.R.Jeganlal1 and Ms.S.Rajeswari2

  1Dept.of ECE, PSN College of Engineering and Technology(Autonomous), Tirunelveli, [email protected]

  2Asst.Prof, Dept. of ECE, PSN College of Engineering and Technology(Autonomous), Tvl, [email protected]

  Abstract

  The face recognition system attains good accuracy in personal identification when they are provided with a large set of training sets. In this paper, we proposed Advanced Biometric Identification on Face, Gender and Age Recognition (ABIFGAR)algorithm for face recognition that yields good results when only small training set is available and it works even with a raining set as small as one image per person. The process is divided into three phases: Pre-processing, Feature Extraction and Classification. The geometric features from a facial image are obtained based on the symmetry of human faces and the variation of gray levels, the positions of eyes, nose and mouth are located by applying the Canny edge operator. The gender and age are classified based on shape and texture information using Posteriori Class Probability and Artificial Neural Network respectively. It is observed that the face recognition is 100%, the gender and age classification is around 98% and 94% respectively.

  Index Terms- Posteriori Class Probability and Artificial Neural Network, Canny edge operator.

  An Optimal Data Hiding Scheme with Tree based Parity Check

  1P.JOSE PRAVIN , 2K.RAMAMURTHY

  Bachler Of Technology ,Dept of information Technology,

  Lord Jegannath college of engg and Technology,Nagercoil

  [email protected]

  Guided by::Miss.D.Allen Steffy AP/IT

  Abstract

  We analyse an asymptotic behavior when designing a steganographic scheme for increasing the embedding efficiency.Reducing distortion between the cover object and the stego object is an important issue for steganography. The treebased parity check method is very efficient for hiding a message on image data due to its simplicity. Based on this approach, we propose a majority vote strategy that results in least distortion for finding a stego object. The lower embedding efficiency of our method is better than that o f previous works when the hidden message length is relatively large.

  Network Datalog Based On Adaptive Mobile Ad-Hoc Network

  Paper submitted by V.Raja lakshmi, T.Jothi Chithra; Dept: Information Technology;

  Lord Jegannath college of Engineering and Technology,Ramannathichenputoor.

  E-mailid:[email protected],[email protected]

  Abstract

  This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols. In this paper said that the NDlog concept for the MANET protocol. DAWN leverages declarative networking techniques to achieve extensible routing and forwarding using declarative languages. We make the following contributions. First, we demonstrate that traditional MANET protocols can be expressed in a concise fashion as declarative networks and policy-driven adaptation can be specified in the same language to dictate the dynamic selection of different protocols based on various network and traffic conditions. Second, we propose inter-protocol forwarding techniques that ensure packets are able to seamlessly traverse across clusters of nodes running different protocols selected based

  on their respective policies. Third, we have developed a full fledged implementation of DAWN using the Rapid Net declarative networking system. We experimentally validate a variety of policy-based adaptive MANETs in various dynamic settings using a combination
of ns-3 simulations and deployment on the ORBIT test bed. Our experimental results demonstrate that hybrid protocols developed using DAWN outperform traditional MANET routing protocols, and are able to flexibly and dynamically adapt their routing mechanisms to achieve a good tradeoff between bandwidth utilization and route quality.We further demonstrate DAWN’s capabilities to achieve inter-protocol forwarding across different protocols.

  Power Optimization Using Error-Tolerant Adder Combined With Spurious Power Suppression Technique In Dsp Application

  Jyothi vijay

  Department of Electronics & Communication Engg

  ASAN Memorial college of engg & technology

  [email protected]

  Abstract

  In conventional digital VLSI design, one usually that a usable circuit/system should always provide definite and accurate results. Furthermore, due to the advances in transistor size scaling, factors such as noise and process variations which are previously insignificant are becoming important in today’s digital IC design. An error tolerant design is one that does not unduly penalize user errors. It is the human equivalent of fault tolerant design that allows equipment to continue functioning in the presence of hardware faults. The data processed by many digital systems may already contain errors. In many applications, such as a communication system, the analog signal coming from the outside world must be sampled before being converted to digital data. The digital data are then processed and transmitted in a noisy channel before converting back to an analog signal. During this process, errors may occur anywhere. In modern VLSI technology, the occurrence of all kinds of errors has become inevitable. By adopting an emerging concept in VLSI design and test, error tolerance (ET), a novel error-tolerant adder (ETA) is proposed. The ETA is able to ease the strict restriction on accuracy, and at the same time achieve tremendous improvements in both the power consumption and speed performance. When compared to its conventional counterparts, the proposed ETA is able to attain more improvement in the Power-Delay Product (PDP). One important potential application of the proposed ETA is in digital signal processing systems that can tolerate certain amount of errors. In the future work ETA adder can be combined with SPST adder for further power optimization.

 

‹ Prev