When considering about this application’s accuracy, it can cover more than 85% accuracy for user. The key part of architecture is a Deep learning that is trained on a skin disease image database. With the help of this system, we are able to construct a universal skin disease diagnosis system using Deep Learning Train the Deep Learning architecture using the skin disease images from the HAM1000 dataset and test its performance with a part of skin disease dataset images. This image-based technique helps to increase reliability and performance of the system. We were able to construct a universal skin disease diagnosis system using deep Deep Learning. Our system would help address this problem to a great extent since it would allow users to recognize skin diseases and provide advises or treatments for it in a shorter time period by making use of images of the diseased area and by obtaining information from the patient. Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/001 Product Name: Design and Development of Smart Irrigation System Development Lead: Mr. Sivabalan N, Mr. Goutham M Wodayar, Mr. Holigi Shiva Sharana ABSTRACT: India is the agriculture-based country. Our ancient people completely depended on the agricultural harvesting. Agriculture is a source of livelihood of majority Indians and has great impact on the economy of the country. In dry areas or in case of inadequate rainfall, irrigation becomes difficult. So, it needs to be automated for proper yield and handled remotely for farmer safety. Increasing energy costs and decreasing water supplies point out the need for better water management. Irrigation management is a complex decision-making process to determine when and how much water to apply to a growing crop to meet specific management objectives. If the farmer is far from the agricultural land he will not be noticed of current conditions. So, efficient water management plays an important role in the irrigated agricultural cropping systems. INTRODUCTION By using the concept of modern irrigation system a farmer can save water up to 50%. This concept depends on two irrigation methods those are: conventional irrigation methods like overhead sprinklers, flood type feeding systems i.e. wet the lower leaves and stem of the plants. The area between the crop rows become dry as the large amount of water is consumed by the flood type methods, in which case the farmer depends only on the incidental rainfalls. The crops are been infected by the leaf mold fungi as the soil surface often stays wet and is saturated after irrigation is completed. Overcoming these drawbacks new techniques are been adopted in the irrigation techniques, through which small amounts of water applies to the parts of root zone of a plant. The plant soil moisture stress is prevented by providing required amount of water resources frequently or often daily by which the moisture condition of the soil will retain well. The diagram below shows the entire concept of the modern irrigation system. The traditional techniques like sprinkler or surface irrigation requires / uses nearly half of water sources. Even more precise amounts of water can be supplied for plants. As far as the foliage is dry the plant damage due to disease and insects will be reduced, whichfurther reduces the operating cost. The dry rows between plants will leads to continuous federations during the irrigation process. Fertilizers can be applied through this type of system, and the cost required for will also reduces. The erosion of soil and wind is much reduced by the recent techniques when compared with overhead sprinkler systems. The 246
soil characteristics will define the form of the dripping nature in the root zone of a plant which receives moisture. As the method of dripping will reduce huge water losses it became a popular method by reducing the labor cost and increasing the yields. When the components are activated, all the components will read and gives the output signal to the controller, and the information will be displayed to the user (farmer). The sensor readings are analog in nature so the ADC pin in the controller will convert the analog signals into digital format. IMPLEMENTATION AND RESULTS Fig.1 Blynk app showing water level and pump status off By using the concept of modern irrigation system, a farmer can save water up to 50%. This concept depends on two irrigation methods those are: conventional irrigation methods like overhead sprinklers, flood type feeding systems i.e. wet the lower leaves and stem of the plants. The area between the crop rows become dry as the large amount of water is consumed by the flood type methods, in which case the farmer depends only on the incidental rainfalls. The crops are been infected by the leaf mold fungi as the soil surface often stays wet and is saturated after irrigation is completed. Fig.2 App showing water level and pump status ON Fig 3. Blynk app Showing Notification Overcoming these drawbacks new techniques have been opted in the irrigation techniques, through which small amounts of water applies other parts of root zone of a plant. The plant soil moistures is prevented by providing required amount of water resources frequently or often daily by which the moisture condition of 247
the soil will retain well. The diagram below how the entire concept of the modern irrigation system. The traditional techniques like sprinkler or surface irrigation requires / uses nearly half of water sources. Even more precise amounts of water can be supplied for plants. As far as the foliage is dry the plant damage due to disease and insects will be reduced, which further reduces the operating cost. The dry rows between plants will lead to continuous federations during the irrigation process. Fertilizers can be applied through this type of system, and the cost required for will also reduce the erosion of soil and wind is much reduced by the recent techniques when compared with overhead sprinkler systems. The soil characteristics will define the form of the dripping nature in the root zone of a plant which receives moisture. As the method of dripping will reduce huge water losses it became a popular method by reducing the labor cost and increasing the yields. When the components are activated, all the components will read and gives the output signal to the controller, and the information will be displayed to the user (farmer). The sensor readings are analog in nature so the ADC pin in the controller will convert the analog signals into digital format. Fig.4 Working Project Model. Irrigation of plants is usually a very time- consuming activity, to be done in a reasonable amount of time; it requires a large number of human resources. Traditionally all the steps were executed by humans. Nowadays some systems use technology to reduce the number of workers or the time required to water the plants.With such systems,the control is very limited, and many resources are still wasted. Fig.5 Compiling Code 248
SMART IRRIGATION SYSTEM USING IOT it contains solar panel, charge controller, battery, Arduino Ethernet shield, relay, soil moisture sensor, humidity sensor and DCpump. The solar which acts as source and generates electricity. These charges are stored in the battery via charge controller. The Arduino, soil moisture sensor, humidity sensor, DC pump needs supply from the battery via charge controller. Depending upon soil moisture sensor and humidity sensor readings the DC pump can be controlled ON and OFF with the help of relay and Arduino. These data are feed to the BLYNK app and sends email notifications with the help. Fig.6 Executed Code CONCLUSION The primary applications for this project are for farmers and gardeners who do not have enough time to water their crops/plants. It also covers those farmers who are wasteful of water during irrigation. As water supplies become scarce and polluted, there is a need to irrigate more efficiently in order to minimize water use and chemical leaching. Recent advances in soil water sensing make the commercial use of this technology possible to automate irrigation management for vegetable production. However, research indicates that different sensors types perform under all conditions with no negative impact on crop yields with reductions in water use range as high as 70% compared to traditional practices. Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/002 Product Name: License verification using RFID technology Development Lead: Mr. Sivabalan.N, Mr. Yatin, Mr. Anurag, Mr. Hemanth ABSTRACT The number of vehicles/traffic is increasing exponentially day-by-day, due to which automatic vehicles identification/monitoring system is being paid significance all over the world. Different countries in the world are using various types of automatic systems for traffic control, vehicles identification. Number plate recognition (NPR) is an authentic-time embedded system which frequently recognition the number plate of vehicle. Previous systems are using only for identification of vehicle. The proposed system accumulates both the RFID (Radio Frequency Identification) and NPR systems for the identification and verification of vehicle. 249
Automatic Vehicle license plate system requires verification of the license plate of the registered vehicle to ensure for the security purpose and to manage the time in freeway, lance and check station. The system can be configured to work with or without additional verification of the driver. The system is normally implemented using RFID (Radio Frequency Identification System) for automatic identification, localization and to access the control the location of the vehicle. The techniques of RFID are plagued to security and privacy issues due to underlying wireless communication channel. Hence implementation of Automatic Vehicle Identification and license Management System will be implemented using RFID technology, control technology, Finger print detection and IoT using MQTT protocol for high security purpose to avoid illegal usage of vehicle through license identification system. Normally, in license tests a candidate applied for license have to drive over a closed loop path like the number in front of the authorities. The candidate has to drive over the path without any support over the land surface and if he fails to do, he will be disqualified. For that, the authorities have to watch him/her manually. A system for watching the candidate whether he/she is eligible for getting license by using a load cell has been proposed here. The load cell changes its output when there is any pressure change over the surface. Thus, the differential output from the load cell detects the candidate who fails to keep his/her foot in the vehicle while following the path. Then the differential output was processed by the micro-controller. The ultrasonic sensor is used for hand signal detection and finger print sensor is used for the number of attempts made by a person during license test and thereby automatically reject or pass status will be generated by the system. Now a day’s every system is automated in order to face new challenges. In the present days automated system have fewer manual operations, flexibility, reliability and accurate. Due to this demand of less manual controlling, everyone prefers automated control systems. Radio Frequency Identification is one such technology which can be used to design automated systems. Radio Frequency Identification (RFID) is the use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. INTRODUCTION According to the present situation vehicles has to wait for longer time for the vehicle checking by the cops manually, also many illegal activities using vehicles are performed due to the lack of security. Therefore, this project mainly gives the solution to reduce the time for checking the vehicle and to increase the security system of present scenario. To reduce the time of checking and to increase the security, RFID (Radio Frequency Identification System) tags and Finger print module is used. Where RFID is a fast wireless data collection technology having radio transmission that has some identifying information about the license for automatic identification. In RFID systems, the devices use radio frequency waves where it wireless exchange the identifying data using MQTT protocol, which is used to transfer the data from one system to other. This technology plays an important role in Internet of Things. An RFID system comprises of tag, reader and backend server as its main components. Tags the basic building block of RFID system consists of a chip, antenna and a certain amount of computational and storage capacity. A reader queries tag to obtain tag contents and send the encrypted information, which is received by the tag and it again transfers the data to the backend server for checking the legitimacy of the tag. The backend server contains a local database and some processors. The channel between the reader and the backend server are wireless and is secured. Additionally, to increase the security purpose finger print system is used, which is used to scan the authenticated person’s finger print at the time of checking process. After granting the access of the user’s tag and fingerprint verification in the RFID reader and fingerprint sensor respectively, the controller detects and allows the user to move towards from the location without any time delay. 250
Despite continued efforts made by the different state governments in India, various international and national organizations continue to highlight the fatalities on the roads caused by inconsistent process of issuing driving licenses across India. The study conducted by the International Finance Corporation (IFC) indicates that the process of obtaining driving license in India is a distorted bureaucratic one. The independent survey conducted shows that close to 60 percent of license holders did not even have to take the driving license test and 54 percent of them were untrained to drive. The study conducted by IFC also shows that the driving license is in that category of public services that involves corruption of a direct demand and supply of bribes between citizens and bureaucrats. The study also indicates that the corruption is focused on agents that work as intermediaries between the officials and citizens. This practice of agent- usage promotes corruption and subsequently results in higher payment for licenses, reduces driving test quality and this eventually results in unskilled drivers on road. Hence the only solution for this problem is to implement an efficient, transparent and cost-effective driver testing system. In the present scenario, the candidates who have applied for driving license have to appear for a theoretical examination and a practical examination. The theoretical examination evaluates the candidate knowledge on different traffic signs, traffic regulation and also the basic understanding of simple safety check before using a vehicle. Different ways are adopted for the conduct of theoretical examination. These are oral examination, question paper or computer-based examination. Theoretical examination is conducted before the practical examination. A pass in the theoretical examination is a prerequisite for the practical examination. The practical examination comprises of two tests namely off-road test and on-road test. The off-road test is for examining the candidate’s ability in controlling the vehicle. The on-road test is conducted in light traffic on normal road. Normally, the on- road test is carried out after completing off-road test. The off-road test tracks are of three types – H, S and 8 shaped tracks. In India, the test track adopted for off-road test purpose varies from state to state. Domain Detail An embedded system is a special-purpose computer system designed to perform one or a few dedicated functions, sometimes with real-time computing constraints. It is usually embedded as part of a complete device including hardware and mechanical parts. In contrast, a general-purpose computer, such as a personal computer, can do many different tasks depending on programming. Embedded systems have become very important today as they control many of the common devices we use. Since the embedded system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product, or increasing the reliability and performance. Some embedded systems are mass-produced, benefiting from economies of scale. Physically, embedded systems range from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. Complexity varies from low, with a single microcontroller chip, to very high with multiple units, peripherals and networks mounted inside a large chassis or enclosure. In general, \"embedded system\" is not an exactly defined term, as many systems have some element of programmability. For example, Handheld computers share some elements with embedded systems — such as the operating systems and microprocessors which power them — but are not truly embedded systems, because they allow different applications to be loaded and peripherals to be connected. An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular kind of application device. Industrial machines, automobiles, medical equipment, cameras, household appliances, airplanes, vending machines, and toys (as well as the more obvious cellular phone and PDA) are among the myriad possible hosts of an embedded system. Embedded systems that are programmable are provided with a programming interface, and 251
embedded systems programming is a specialized occupation. Certain operating systems or language platforms are tailored for the embedded market, such as Embedded Java and Windows XP Embedded. However, some low-end consumer products use very inexpensive microprocessors and limited storage, with the application and operating system both part of a single program. The program is written permanently into the system's memory in this case, rather than being loaded into RAM (random access memory), as programs on a personal computer are. EXISTING SYSTEM In the present scenario, the candidates who have applied for driving license have to appear for a theoretical examination and a practical examination. The theoretical examination evaluates the candidate knowledge on different traffic signs, traffic regulation and also the basic understanding of simple safety check before using a vehicle. Different ways are adopted for the conduct of theoretical examination. These are oral examination, question paper or computer-based examination. Theoretical examination is conducted before the practical examination. Pass in the theoretical examination is a prerequisite for the practical examination. The practical examination comprises of two tests namely off-road test and on-road test. The off-road test is for examining the candidate’s ability in controlling the vehicle. The on-road test is conducted in light traffic on normal road. Normally, the on-road test is carried out after completing off-road test. The off-road test tracks are of three types – H, S and 8 shaped tracks. In India, the test track adopted for off-road test purpose varies from state to state. PROPOSED SYSTEM In this proposed track, in addition to detect interruption along the edges, we must also check if the vehicle moves correctly in the specified path. For detection of the correct path, we again use the same setup consisting of metal strips (pressure switch). Here we are using pairs of metal strips and they are placed in positions as shown in the diagram. The test taker must move to the following path. That is the test taker must start at start position and end the test at stop position. Here the metal strip is kept horizontally across each path. When the vehicle moves through the respective path, the metal strip is not conducting and this is done in a sequential manner that is from path start to stop end. On successful completion of the test, “pass” report will be generated or else a “failure” report. IMPLEMENTATION AND RESULTS Fig.1 Block Diagram of proposed system Fig.2 Block Diagram of proposed system 252
Fig.3 Block Diagram of power supply The given block diagram includes following: Transformer: A transformer is an electro-magnetic static device, which transfers electrical energy from one circuit to another, either at the same voltage or at different voltage but at the same frequency. 253
Rectifier: The function of the rectifier is to convert AC to DC current or voltage. Usually in the rectifier circuit full wave bridge rectifier is used. Filter: The Filter is used to remove the pulsated AC. A filter circuit uses capacitor and inductor. The function of the capacitor is to block the DC voltage and bypass the AC voltage. The function of the inductor is to block the AC voltage and bypass the DC voltage. Voltage Regulator Voltage regulator constitutes an indispensable part of the power supply section of any electronic systems. The main advantage of the regulator ICs is that it regulates or maintains the output constant, in spite of the variation in the input supply. b. IR SENSOR The IR sensor is used for detecting the line tracking. c. Load Cells A load cell is a transducer that is used to convert a force into electrical signal. The most common type is a strain gauge load cell. A load cell is made by bonding strain gauges to a spring material. To efficiently detect the strain, strain gauges are bonded to the position on the spring material where the strain will be the largest. d. RFID The RFID Proximity OEM Reader Module has a built-in antenna in minimized form factor. It is designed to work on the industry standard carrier Frequency of 125 kHz. This LF reader module with an internal or an external antenna facilitates communication with Read-Only transponders—type UNIQUE or TK5530 via the air interface. The tag data is sent to the host systems via the wired communication interface with a protocol selected from the module Both TTL and weigh and protocol. The LF module is best suited for applications in Access Control, Time and Attendance, Asset Management, Handheld Readers, Immobilizers, and other RFID enabled applications. e. MICROCONTROLLER The AVR is a modified Harvard architecture8- bit RISC single chip microcontroller which was developed by Atmel in 1996.The AVR was one of the first microcontroller families to use on-chip flash memory for program storage, as opposed to one-time programmable ROM, EPROM, or EEPROM used by other microcontrollers at the time. f. RS 232 Due to its relative simplicity and low hardware overhead (as compared to parallel interfacing), serial communications is used extensively within the electronics industry. Today, the most popular serial communications standard in use is certainly the EIA/TIA–232–E specification. In recent years, this suffix has been replaced with “EIA/TIA” to help identify the source of the standard. We use the common notation “RS–232”. g. Switching Circuit The pressure switch (metal strip) is used as pairs where each pair consists of a transmitter and a receiver. The IR sensors can be also referred to as a long-range IR start, stop pair. Sensors are mounted on to yardstick for embedding on the track. The IR sensor pairs, pressure switch used for detecting the trouncing of sensor mounted yardstick or the crossing of line intersection between the sensors. Two IR sensors are used at “START‟ and „STOP‟ position of the track. Speed sensor is used into the vehicle wheel to enable or disable of zero rpm measurement system. These sensors are interfaced to the microcontroller based central control unit. When either of these sensor pairs makes a high to low transition. The microcontroller based central control unit enables or disables the microcontroller based on-vehicle control unit for monitoring the 254
vehicle motion. The on-vehicle control unit for zero rpm measurement is designed to perform the measurement only when the vehicle is inside the sensor embedded track. RESULTS User personal details: The test taker enters his personal data in the specified field. Here the test taker has to fill his name, date of birth, e-mail, mobile number, address and gender. If any one of the data is not filled, then a pop-up window displays for filling the data. Test Status: The test status of the candidate who is undertaking the test is displayed in this test status box. On successful completion of the test, „PASS‟ message will be displayed or else a „FAIL‟ message will be displayed. System Status: Here the system status will be displayed i.e. It displays the status of the test taken by the candidate. Here the system first gets ready, initializes, monitors, save the report and displays the report. Test Taking: Once the mandatory details are completed, then the test taker can get ready for his test by entering the vehicle. On his word the controller can press the „START‟ button on the software interface. This will mark the commencement of the test (for the controller at the PC interface, the LCD display will show processing). If all goes well and the driver returns his car safely without any deviations in the „H‟ (curved) track, press the „STOP‟ button on the software interface. This will point to the end of his test (for the controller at the PC interface, the LCD display will show some indication). The candidate can now get his result at the software interface. There are three conditions to get driving license (i) to cover the complete path. (ii) do not ouch or hit the edges (iii) speed of the vehicle must not to be zero. When all these conditions are satisfying then the pass result will be displayed in the form of report, otherwise fail report will be generated. Fig.4 Working Model-I Fig.5 Working Model-II CONCLUSION A secure authentication technique is implemented using low passive RFID tags. The passive tags come like a card with a coil which is cost efficient. This technique is secure where the finger print module is used as an addition security purpose against the common attacks possible in an RFID system. This system avoids the error produced due to the improper data transmission where all the information is matched and checked with the information stored in the backend server using MQTT protocol. It also extended to various areas like product authentication system, vehicle tracking, wireless sensor networks and mobile based tracking systems. A Driving License test automation system using RF Module based wireless acquisition is discussed. The usage of VB based technology for skill assessment in the automated driving test process eliminates human intervention leaving no scope for manipulation and negotiation. Hence, we can say that the system 255
increases the level of transparency in the driving skill test process and decreases the rate of corruption in the process of issuing the driving license. Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/003 Product Name: Gesture Recognition using image Processing and conversion to speech Development Lead: Dr. Pamela Vinitha, Ms. Kaveri R, Ms. Anju N ABSTRACT: Speech and text are the main medium for human communication. A person needs vision to access the information in a text. However, those who have poor vision can gather information from voice. For blind or visually impaired persons and the increasing availability of cost efficiency, high performance and portable digital imaging devices has created a tremendous opportunity for supplementing traditional scanning for document image acquisition. This project proposes a camera based assistive text reading to help visually impaired person in reading the text present on the captured image. The faces can also be detected when a person enter into the frame by the mode control. The proposed idea involves text extraction from scanned image using Tesseract Optical Character Recognition (OCR) and converting the text to speech by e-Speak tool, a process makes visually impaired persons to read the text. This is a prototype for blind people to recognize the products in real world by extracting the text on image and converting it into speech. Proposed method is carried out by using Raspberry pi and portability is achieved by using a battery backup. Thus, the user can carry the device anywhere and will be able to use at any time. Upon entering the camera view, previously stored faces are identified and informed which can be implemented as a future technology. This technology helps millions of people in the world who experience a significant loss of vision. INTRODUCTION The activity recognition aims to recognize the actions and goals of one or more agents from a series of observations on the agents' actions and the environmental conditions. Since the 1980s, this research field has captured the attention of several computer science communities. Due to its strength in providing personalized support for many different applications and its connection to many different fields of study such as medicine, human-computer interaction, or sociology. In image processing, input is taken as an image later perform processing on that image based on the requirement. Many types of input are to be taken in image processing such as a video, image or collect frames from video and after output is produced in the form of an image or set of parameters related to image. The use of image processing for improve the image quality and gather useful information in the image this process is called as feature extraction. This image processing techniques can be used for detecting the hand gesture or analyzing actions or many other purposes in various fields. In the system developed these image processing techniques are used for communication purpose in such community where people are vocally impaired and hearing impaired. The communication by the body language is understood as the fundamental trade mark include that characterizes a hard of hearing group. Sign based correspondence is a physical action by using arms, hands, fingers and eye with which we can talk with idiotic and in need of a hearing aide people. Seeing human action from picture game plans is a champion among the most troublesome issues in computer vision with various imperative applications, for instance, tuning video perception, content-based video recuperation, human-robot collaboration, and 256
splendid home. The errand is troublesome not in light of between class assortments, camera advancements, establishment confusing and fragmentary obstacle, also to some between class spreads and similarities, for instance, running as opposed to running or walking. Earlier tackles human movement affirmation in video frequently used overall representations. 257
IMPLEMENTATION AND RESULTS There could be many ways of implementing this project we have chosen Python because python is a widely used high-level, general-purpose, interpreted, dynamic programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C++ or Java. The language provides constructs intended to enable clear programs on both a small and large scale. Python supports multiple programming paradigms, including object-oriented, imperative and functional programming or procedural styles. It features a dynamic type system and automatic memory management and has a large and comprehensive standard library. Python, the reference implementation of Python, is free and open-source software and has a community-based development model, as do nearly all of its alternative implementations. Python is managed by the non-profit Python Software Foundation The Project is divided into 4 different modules: ● Text-to-Speech (TTS): The first process text to speech conversion is done for the dumb masses who cannot speak. The Dumb people convert their thoughts to text which could be transferred to a voice signal. The converted voice signal is spoken out by e-speak synthesizer. After selecting the option OP1 the OS and sub process imported. Call text to speech function and enter the text as input. After entering the text from keyboard, the e-speak synthesizer converts text to speech. The process also provided with the keyboard interrupt ctrl+C. ● Image-to-Speech using camera (ITSE): The second process is developed for blind people who cannot read normal text. In order to help blind people, we have interfaced the Logitech camera to capture the image by using OPENCV tool. The captured image is converted to text using Tesseract OCR and save the text to file out.txt. Open the text file and split the paragraph into sentences and save it. In OCR, the adaptive thresholding techniques are used to change the image into binary images and they are transferred to character outlines. The converted text is read out by the e- speak. ● Gesture-to-Speech (GTS): The third process is developed for the vocally impaired people who cannot exchange the thoughts to the normal people. Dumb people use gesture to communicate with normal people which are majorly not understandable by normal people. The process starts with the capturing of image and crops the useful portion. Convert the RGB image into gray scale image for better functioning, Blur the cropped image through Gaussian blur function and pass it to the threshold function to get the highlighted part of the image. Find the contours and an angle between two fingers number of defects. According to the number of defects, the text is printed on display and read out by the Speaker. ● Speech-to-Text (STT): The fourth process is developed for the hearing impairment, people who cannot understand the words of normal people. In order to help them, our project is provided with a switch which is used to convert the voice of the normal people text. We have used a chromium browser which is automatically connected to URL speech texter.com. The process is performed by assigning a minimum threshold voltage to recognize the voice signal. The input is given through a microphone which is converted into a text format. The URL supports a variety of languages. If the voice signals recognizable it will print the text else it gives the error signal. 258
Fig.1 Steps Chart Fig.2 Text-to-speech Fig.3 Image-to-Speech Fig.4 Speech to text Algorithm: Text-to-speech (TTS) Step 1: Start Step 2: Choose option OP1 to convert text to voice. Step 3: Call the function Text-to-Speech (). Step 4: Convert text to speech using e-speak synthesizer. Step 5: Voice is generated Step 6: Stop Image-to-speech using camera (ITSC) Step 1: Start Step 2: Choose option OP2 to convert image to speech Step 3: Call the function Image-to-Speech Step 4: Capture the required image. Step 5: Convert image to text using Tesseract OCR. Step 6: Split the text into paragraph Step 7: Convert text to speech using e-speak synthesizer. Step 8: Voice is generated. Step 9: Stop 259
Gesture-to-speech (GTS) Step 1: Start Step 2: Choose the option OP3 to convert text Step 3: Capture and read the gesture. Step 4: Crop the useful portion. Step 5: Convert RGB image to Grey scale Step 6: Blur the image using Gaussian Blur algorithm. Speech-to-Text (STT) Step 1: Start Step 2: Choose the option OP4 for Speech-to-Text conversion. Step 3: Call the function Speech-to-Text (). Step 4: Open chromium browser and connect to the website speech texter. Step 5: Select any universal language. Step 6: Speak now, by turning on microphone. Step 7: Check, if the voice is perfect. Step 8: Clear the screen. Step 9: The text is displayed. Step 10: Recognization it as error and resend. Step 11: Execute the above steps recursively. Step 12: Stop CONCLUSION This project aims to lower the communication gap between the deaf or mute community and the normal world, help them to lead standard lifestyle. The device is used to convert text/image to voice for blind, speech to text conversion for deaf and conversion of hand gestures to text (Kannada words) for dumb people. We have designed the prototype model for blind, deaf and dumb people into a single compact device. The advantage of this device is that it can be easily carried (portable) due to its less weight and size. The device can be used as smart assistant for differently abled people to communicate with others and it is a language independent system. Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/004 Product Name: Predictive Maintenance of Car Brake System Development Lead: Mr. Santhosh Kumar B, Mr. Yeshwant Raj ABSTRACT: Predictive maintenance techniques are designed to help determine the condition of in-service equipment in order to estimate when maintenance should be performed. This approach promises cost savings over routine or time-based preventive maintenance, because tasks are performed only when warranted. Thus, it is regarded as condition-based maintenance carried out as suggested by estimations of the degradation state of an item. The key is \"the right information in the right time\". By knowing which equipment needs maintenance, maintenance work can be better planned (spare parts, people, etc.) and what would have been \"unplanned stops\" are transformed to shorter and fewer \"planned stops\", thus increasing plant availability. 260
INTRODUCTION In predictive maintenance scenarios, data is collected over time to monitor the state of equipment. The goal is to find patterns that can help predict and ultimately prevent failures. The main promise of predictive maintenance is to allow convenient scheduling of corrective maintenance, and to prevent unexpected equipment failures. Other potential advantages include increased equipment lifetime, increased plant safety, fewer accidents with negative impact on environment, and optimized spare parts handling. Predictive maintenance differs from preventive maintenance because it relies on the actual condition of equipment, rather than average or expected life statistics, to predict when maintenance will be required. Some of the main components that are necessary for implementing predictive maintenance are data collection and pre-processing, early fault detection, fault detection, time to failure prediction, maintenance scheduling and resource optimization. Predictive maintenance has also been considered to be one of the driving forces for improving productivity and one of the ways to achieve \"just-in-time\" in manufacturing. Car Braking System Modern cars have brakes on all four wheels, operated by a hydraulic system. The brakes may be disc type or drum type. The front brakes play a greater part in stopping the car than the rear ones, because braking throws the car weight forward on to the front wheels. Many cars therefore have disc brakes, which are generally more efficient, at the front and drum brakes at the rear. All-disc braking systems are used on some expensive or high-performance cars, and all-drum systems on some older or smaller cars. IMPLEMENTATION The brake cylinder applies force to a series of levers and rods which are connected to the brake beams. Two brake heads, each holding a brake shoe, are attached to each brake beam. As the shoes push against the wheels there is resultant strain in the brake beams. Using the new technology, brake pedals on each car will be fitted with a strain-gauge-equipped sensor. The degree and orientation of the strain provides a direct indication of the braking force being applied to the wheel. If the brakes are off the strain should be near zero, if they are applied and the shoes actually pushing against the wheel, there will be some amount of strain greater than zero, dependent upon the amount of braking force being applied. Unlike a single measurement of the brake cylinder force or displacement, this system can provide information for each wheel set, or even each wheel, depending on how many sensors an individual user wishes to apply. Another potential benefit of strain-gauge-equipped, self-networking sensors on the braking system is that by providing an independent measure of the braking force being applied throughout the car. A car equipped with the system described herein would provide considerably better information because the actual braking force for each brake beam would be known. Instead of relying on averages or statistical estimates of a car’s stopping distance, each individual car’s stopping performance could be calculated during an initial brake test. Furthermore, with the appropriate algorithms, the braking distance estimate could be automatically updated each time a brake application was made. This method can be used to accurately predict when the brakes will fail and alert the user beforehand. 261
Fig.1 Working Model Fig.2 Strain Gauge Sensor Fig.3 Strain Gauge anatomy Fig.4 Brake pad anatom EXPERIMENTATION The following experiments were done on a live model (bike) to check the feasibility of the above-mentioned studies. 1. Analysis of Brake pads using Wave Generation Analysis The model (bike) was experimented in two scenarios: with worn out old brake pads and new brake pads. The noise generated from these scenarios were recorder individually and was made into a waveform digitally and were compared side to side. Fig.5 Experimentation on model 262
Observation Fig.6 Waves generated Fig.7 Referenced graph from published paper As researched in the paper: Vibration analysis on disk brake motor -IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE), the results from the experimentation match the results from the paper which shows higher frequency in good brake pad and lower frequency in bad brake pad. Though this vibration analysis method can be used to determine the faults in the brake it is not feasible to attach a device which can be put inside the braking system in real life scenarios as they are not very cost efficient. 2. Measuring brake fluids ● For reliable and consistent brake system operation, brake fluid must maintain a constant viscosity under a wide range of temperatures, including extreme hot and cold. ● Glycol based brake fluid starts to absorb moisture from the moment it is put in the hydraulic brake system or exposed to the air. The fluid attracts moisture through microscopic pores in rubber hoses, past seals, and exposure to the air. The problem is obviously worse in wet climates where humidity is high. ● Brake fluid level in the master cylinder will drop as the brake linings (pads or shoes) wear and the calipers or wheel cylinders extend further to compensate. ● The brake fluid level may also be low because of a leak, which could result in a loss of hydraulic pressure and consequently a significant loss of braking ability. Fig.8 Hall Effect sensor 263
Methodology: As the float comes down, due to the lack of oil level, the sensor is activated. As the sensor is activated, a warning can be given as required. CONCLUSION According to statistics nearly 1300 accidents occur every day in India out which 2.3% are caused by brake related problems, to reduce those types of accidents alert the user using today’s technology predictive maintenance is implemented. Through the concepts of IOT and predictive maintenance users can be alerted beforehand of any problems arising in the brake system. By implementing machine learning algorithms, the product may learn any patterns arising in the usage of the brake systems and use it to predict the failures of the brakes and their causes more accurately and efficiently. The main goal of this project is to build a cost-efficient and accurate solution to identifying the problems in the brake and alerting the drivers. Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/005 Product Name: Advanced Driver Machine Interface for Locomotives Development Lead: Ms. Shanmughapriya, Ms. Shalini . K ABSTRACT An advanced driver machine interface for locomotives for the benefit of the customer to have a standard interface to be followed for DMI uniformity across major railway systems. The Driver Machine Interface will act not only as an interface for locomotive drivers, but also as a point of contact between the driver and the railway signaling system. The objective of this communication consists in the evaluation of the performances of a system in the presence of failures, because today we note an evolution from the classic referential of Dependability (evaluation of probabilistic indicators for a given mission, each mission evaluated corresponding to a set of very specific performance levels) towards a benchmark of Performance Engineering. In fact, in the classic approach to Dependability, the mission levels chosen arbitrarily (maximum mission profiles, critical) among the set of possible trajectories of the system, lead to decision- making in the design process based on partial considerations. However, today, an industrialist must be able to commit to the achievement of performance, the specification of which includes all the hazards likely to be encountered during the operational life cycle of the system. INTRODUCTION Public transports become necessary today because the traffic increased resulting in congestion today which can demand increase in number of trains and kinds of locomotives, to fulfil the service demands. The aim of this chapter is to review psychological factors associated with human performance in railway industry and discuss the importance of psychological approach towards assessment of train drivers’ performance. The chapter provides fresh literature on various psychological factors which influence the protection of Railways and models developed by other researchers to supply innovative ideas and ideas during the method of understanding the present problems and issues specific to coach drivers. This project mainly aims at implementing an advanced driver machine interface for locomotives for the benefit of the customer to have a standard interface to be followed for DMI uniformity across major railway systems. The objective of this communication consists in the evaluation of the performances of a system in the presence of failures, because today we note an evolution from the classic referential of Dependability towards a benchmark of Performance Engineering. IMPLEMENTATION AND RESULTS 264
European Train Control System (ETCS) European Train Controlling Systems (ETCS) recognized as one which is known for gesticulate and govern the parts of the European Railway Traffic Managing Systems. It’s substitute of old locomotives saving system along with this importantly outlined to restore those all the mismatched protection unit presently utilized along the European railways. In its latest version, all the lineside data carry forwarded to operator without wire in the cabin, withdrawing the use for side of line indicators who are inspected by operator in charge. Track side instrument goal is to interchange data with the locomotive present for the safely over viewing the train movement. ETCS Command-Control and Signalling System European traffic control system was being implemented in relation to the ATP system which was already present all over the Europe it is important to explain that the types of etc system is not fully uniform all along Europe. 1. The brakes which are utilized for the working of the operation which is automatic brake do not need the intervention of human beings and is in working with the ATO system; 2. The speed of the train is one of the most important aspects which is highly monitored by the whole Framework all the time. And the driver has the most important job to take the given data along with the guidance which is been provided in the cockpit in reference to the European train control system of the ATP system. European traffic control system or ETCS levels The whole system which is present is divided based on the different functionality as per the levels the road map of ETCS level depends on how the data is being transferred from the signal station to the train if a train is fitted with all the instruments in relation to the ETCS it will be able to work on any of the levels of without any difficulty. LEVEL 0 OF ETCS The most important plus point for the utilization of the ETCS or ERTMS standardization not working with signal laterally. But whenever the year ERTMS locomotive moves through a track which is non gear ERTMS the equipment which are present in the train are utilized for monitoring the speed off the train and here is the responsibility of the train driver to observe the signals alongside the train. LEVEL 1 OF ETCS The level one of the TMS is the one in which signals the system can be imposed on the already present signals that is it is able to leave the lateral signaling system in its place. Eurobalise is the radio with its up off the train with the help of the adaptor of the signal and the encoder of the telegram and is able to send them to the locomotive as a movement order along with the data at each pointthe level 1 of the European traffic control system superimposed on top original signal control and provides interlocking. Fig.1 Working Model 265
LEVEL 2 OF ETCS Level 2 of the European traffic control system is the one in which signals are most importantly radio based and utilizes the concept of projecting framework. The train is not need to change most of the path and it should follow the guidance which is being provided as with the help of the landmarks therefore apart from only couple of indication angles which are the extreme inter marks which is very difficult to see and the signals on the borders, it becomes possible to start working without worrying about signaling aspect laterally. Reporting there exact location and will be giving the direction along which it is travelling at certain. So that data can be developed instructions can be provided for the driver to follow in the coming period of time. Fig.2 Radio signal and to display the signals in the cab The level 2 of the system is based on the concept of radio signal and to display the signals in the cab. The information which is being divided by the train is passed to the radio block center at a constant period of time so that tracking exact location direction will be possible and are provided by the driver's cab which is in communication and passing the location and other information. LEVEL 3 OF ETCS The level 3 of European traffic control system is able to provide a road map on how to implement a fully surfaced signaling radio based. Signals which are based on the fixed track or no more required because of the presence of the level 3 of ETCS. If we go with level 2 European traffic control system to find the Positioning by itself which will lead to use of the system which are present on the train and can sometime lead to inefficient result as compared to win result is been checked twice with the help of the system outside and the train. Fig.3 European traffic control system 266
Representing the speed to be monitored The European traffic control system works on the back end and is able to provide with all the information regarding the speed which is needed an is displayed on the driver machine interface so that it becomes easy for the driver to take appropriate measures in order to complete the journey in time and is not losing time. Targeting Speeds: 1. It is the normal conditioning when the train is travelling at a speed very less when compared to the limit at which it should be driving at. So at this moment no reduction in the overall speed is expected from the train. Blue is the picture of the speedometer when it is travelling below the target speed and is not having any active breaking curve. 2. Here we are able to find an over speed which is indicated when the speed of the train is 2 to 3 km per hour ahead of the monitoring limit which is been allowed for the train to travel at. If you see closely on the speedometer we are able to find the area above the limit which has been permitted in the speed of interventions is having orange color which is able to show its sign the visual warning disappears when the train will again fall back to the speed of the monitoring limit. 3. The mean idea of using driver machine interface is that it provides visual representation to the driver driving and he will be able to understand the maximum speed which needs to be followed. If you see closely on the speedometer we are able to find the area above the limit which has been permitted in the speed of interventions is having orange color which is able to show its sign the visual warning disappears when the train will again fall back to the speed of the monitoring limit. 4. When over exceeding of the speed takes place which is larger than it is important that the break interference takes place. The needle turning red means intervention will start to appear and it is visible on the speedometer if it is not reduced in the coming time the brake intervention will be applied. Fig.4 Target Speed for lower Speed limits TARGET SPEEDS FOR LOWER SPEED LIMITS 1. The announcement monitor field without to work 10 seconds before it is able to reach the break point and it ends when the breakup is about to reach. This is the point for the whole introduction as well as when it comes to the old speedometer field is being displayed in white color. 2. Speed warning is been displayed as it is about to reach the maximum. Limitation is being provided after which they want the siren and the system will go of the train so it becomes important for the driver to see the speedometer in display. 267
3. The mean idea of using driver machine interface is that it provides visual representation to the driver driving and he will be able to understand the maximum speed which needs to be followed. If you see closely on the speedometer we are able to find the area above the limit which has been permitted in the speed of interventions is having orange color which is able to show its sign the visual warning disappears when the train will again fall back to the speed of the monitoring limit. 4. When over exceeding of the speed takes place which is larger than it is important that the break interference takes place. Simple the train is going at expected which is of no necessity because all the calculations have been done previously. If you see closely on the speedometer we are able to find the area above the limit which has been permitted in the speed of interventions is having orange color which is able to show its sign the visual warning disappears when the train will again fall back to the speed of the monitoring limit. CONCLUSION The project consisted of the implementation of three systems and its integration. The three systems being, the analogue gauge, the alert system and the alarm system. The basic business requirement that was provided to us was to use Qt framework, and implement a Driver Machine Interface, which was used in conjunction with the ERTMS specifications given to us by the client. The three systems were designed using the Qt framework, and using QML (the UI), and C++ (for the business logic). The design and the development of this project have been completed successfully as per the guidelines provided by the company. The next step to our project is to integrate the DMI that we have created with the locomotive hardware in the QUEST Global office. This consists of mainly integrating our C++ code via sockets to the signaling systems that are present inside the locomotive, as well as integrating the train hardware such as alarms, to our back-end logic Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/006 Product Name: Earthquake prediction using machine learning Development Lead: Ms. Pramilarani, Ms. S Hema Sai, Ms. Vikitha M Kathari ABSTRACT Earthquake prediction is an important and complex task in real world. Although many data mining based methods have been proposed to solve this problem, the prediction accuracy is still far from satisfactory due to the deficiency of feature extraction techniques. To this end, in this project, we propose a precursory pattern based feature extraction method to enhance the performance of earthquake prediction. Specially, the raw seismic data is firstly divided into fixed day time periods, and the magnitude of the largest earthquake in each fixed time period is labeled as main shock. The precursory pattern is a part of seismic sequence before the main shock, on which the existing mathematical statistic features can be directly generated as seismic indicators. Based on these precursory pattern based features, a simple yet effective classification and regression tree algorithm (CART) is adopted to predict the label of main shock in a pre- defined future time period. The experimental results on two historical earthquake records of the Changding-Garze and Wudu Mabian seismic zones of China demonstrate the effectiveness of the proposed precursory pattern-based features with the selected CART algorithm for earth quake prediction. 268
INTRODUCTION Earthquake is one of the devastating events in natural hazards that cause great casualties and property damage every day in the world since that it is hard to predict. With the increasing amount of earthquake datasets collected, many researchers try to solve the task of predicting the earthquake in the future time. Earthquake prediction is to estimate the time, location and magnitude of the future earthquake, which is one of the theoretical foundations of geophysics, geology, computer science. With the development of data mining techniques, a large number of scholars have devoted to discover the earthquake patterns from seismic time series based on various feature extraction methods and achieved some success The prediction of earthquake as a whole has proved to be a challenge which is essentially impossible. With modern computing power, machine learning techniques, and a significantly narrowed emphasis, however, this important role may possibly be made some headway. To this end, predict the occurrence of earthquakes using seismic signal. Earthquake prediction research projects in a variety of countries are reviewed in accordance with achievements in various disciplines involved in earthquake prediction science, i.e. geodesic work, observation of tide gages, continuous observation of crustal movement, seismic activity and seismological system, seismic wave frequency, geotectonic work, geomagnetic and geoelectric work and laboratory work and its application in the field. Present-day progress of earthquake prediction research indicates that significant, if not all, prediction of any class of earthquakes might be feasible within a span of a few tens of years, given that basic data could be collected steadily. Acoustic / seismic precursors to failure seem to be an almost common material phenomenon. For example, failure in granular materials is often followed by impulsive acoustic / seismic precursors, many of which are very small. Precursors are found in laboratory faults and corresponding earthquakes are commonly but not routinely detected. We claim that the magnitudes of seismic precursors can be very small, and so often go unrecorded or unidentified. An earthquake consists of many individual elastic waves. The functioning of EWS is based on the principle that these waves have travelled from the epicenter to recombine at the recording site as a function of their respective velocities, focal distances, and propagation paths. Body waves propagate within a body of rock and appear in the first arrival. When a natural disaster, such as a big earthquake, happens, we should first grasp the range and sinuousness of the damaged areas for supporting the rescue activities. For collecting the information around the damaged areas widely and rapidly, the aerial images are useful. We have proposed the method of detecting the damaged areas before the earthquake and after the earthquake. In the method, two images are registered manually, and hence, it is troublesome for detecting the damaged areas taken by various locations. In many methods of detecting the damaged areas are not automatically registered. We propose a new method of automatic detection of the damaged areas. The damaged areas are detected automatically and displayed graphically on think speak webpage by our proposed method. The combining of the sensor’s accelerometers, vibrator, GPS, etc. and the different connectivity options allows to have well equipped IoT devices on our hands and, through these, automatically monitor our movements, locations, and workouts throughout the day; and beyond that, it can be the key to the solution of problems in other areas as transportation, medicine, weather, social. We propose a precursory pattern based feature extraction method for earthquake prediction, which can predict both the magnitude range of future earthquakes and obtain the effective time range of prediction results. In this study, earthquake precursor refers to a part of seismic records before the main shock, which is represented as the precursory pattern of earthquake. In order to obtain the representative learning samples, the raw seismic data is firstly divided into a set of fixed day time periods and the 269
magnitude of the largest earthquake of each time period called main shock is as the label of the fixed period. Then the sequence composed of the last w(w > 0) events in the last time period before the current time and the events before the main shock in current time period is treated as earthquake precursory pattern. And the seismic indicators based on the obtained precursory patterns with a selected classification and regression tree algorithm named CART can lead to satisfactory earthquake prediction results on two real-world seismic datasets of Changding- Garze and Wudu Mabian zones. In summary, the contributions of this paper can be summarized as follows: We propose a precursory pattern based feature extraction method to better capture the characteristics of earthquake, thus can be used to enhance earthquake prediction. Noting that the proposed method can not only obtain the seismic features, but also be used to estimate the effective time period of prediction results. We evaluate the effectiveness of the proposed feature extraction method with CART algorithm on two real world seismic datasets of the Changding-Garze and Wudu-Mabian zones in China. The experimental results show the superior performance of our method over the comparison algorithms, which indicates that the proposed precursory pattern based feature extraction method with selected CART is a promising method for accurate earthquake prediction. The rest of this paper is structured as follows, we first give the formulation of earthquake prediction problem and we present the proposed precursory pattern based feature extraction method and the adopted CART algorithm, in which the precursory pattern is described in detail. We describe the seismic dataset, evaluation metrics, comparison algorithms and the experimental results to demonstrate the effectiveness of the precursory pattern based feature extraction method with CART algorithm in Section IV and the conclusions drawn from this study are finally shown. IMPLEMENTATION AND RESULTS The construction of CART The proposed works compares the different Hadoop data processing technologies. The USGS dataset is used for data acquisition phase. The data is processed using Hadoop distributed computing algorithm. The techniques of Hive and Impala are used for the data pre-processing. The cleansed dataset is then fed to the different algorithms in order to observe insights and patterns. The first phase uses the K-means clustering algorithm to form the clusters based on the different locations of the earthquake. The hierarchical clustering and k-means clustering algorithm divide the earthquakes into clusters of Northern Hemisphere, Southern Hemisphere and the ones near the equator. Classification Model Classification and regression tree algorithm (CART) is an important data mining method. CART is a binary recursive partitioning procedure capable of splitting the scalar attributes and processing the continuous and discrete attributes. Besides, CART is nonparametric and it does not require variables to be selected in advance because this decision tree can do feature selection work automatically. In addition, CART algorithm can generate understandable rules and its calculation cost is relatively small. Thus, this method has been applied in many fields, such as financial and medical. The building process of CART includes two main steps: the construction of CART and pruning. In general, a decision tree contains a root node, several internal nodes and leaf nodes. The leaf node is the decision result, and other nodes are based on the attribute test. Therefore, the key of the decision tree algorithm is to select the partitioning attribute based on data purity, and there are many methods to measure the purity of data, such as information gain, Gini index, χ 2 statistics and so on. Classification and regression tree (CART) algorithm is based on Gini index. Specifically, the Gini index of the dataset D is given. Gini(D) = 1 − ∑ |y| k=1 p 2 k (3) 270
Where pk is the proportion of the k-th class in dataset D, and |y| is the number of samples. The Gini index reflects the probability that two samples randomly selected from the dataset D with different category labels. Thus, the purity of the dataset D with a small Gini index Gini(D) is high. In the binary partitioning process of the CART algorithm, the purity of one attribute exceeds the predefined threshold and is divided into the left subtree, otherwise it is divided into the right subtree. And the Gini index of the attribute a is defined as Eq. Gini index(D, a) = ∑ V v=1 |Dv | |D| Gini(D v ) where V is the number of nodes when a is used to divide dataset D, and Dv is the sample of the attribute a on the v-th branch node. Therefore, the attribute with the smallest Gini index in candidate attribute set A is regard as the optimal partition attribute a∗ . The optimal attribute a∗ is calculated as follows. a∗ = arg min a∈A Gini index(D, a). Fig.1 CART Algorithm Fig.2 CART Algorithm-Diagram Figure 2, this picture gives a simple example of applying the CART algorithm to infer the health status of the body based on blood pressure and age: normal or high risk. CONCLUSION Thus it can be observed that by using the following algorithmic model for earthquake prediction, proper methods can be implemented for deploying warnings and preparing for earthquakes. The proposed algorithmic model efficiently performs data analysis using Hadoop and can be used for observing insights 271
related to earthquakes. A deep study observed a number of areas that are more prone to earthquakes. Some of these regions include the pacific ring of fire, the Hindukush and the Himalayas, the Japanese coastal spread and the Philippines. It was observed that a number of reasons were responsible for earthquakes, the most dominant were tectonic disturbances followed by nuclear activities. A number of clustering algorithms were used through the course of the research such as K-means and Hierarchical clustering. Hierarchical Clustering was found to be more efficient in terms of entropy but takes more processing time. Similarly, the coefficient of variance of hierarchical clustering was lower than K- means but it was found to have a higher F-measure. Similarly the data analysis was done in the Hadoop environment and techniques like Hive and Impala were compared. However there were a number of drawbacks related to the technique for prediction which can be improved upon. Product Development Period: 2019-2020 Ref: 19-20-PD/CSE/007 Product Name: Text Recognition and Face Detection Aid for Visually Impaired Person Using Raspberry pi Development Lead: Ms. Asha Rani Borah, Ms. Navya.K, Ms. Swapna KM, Ms. Vidhya M ABSTRACT The magnitude of Visual communication is far greater than speech and text. A picture paints a thousand words. With this in mind, let us consider the day-to-day circumstances of visually impaired people. The increasing availability of cost efficiency, high performance and portable digital imaging devices has created a tremendous opportunity for supplementing traditional scanning for document image acquisition. This project proposes a camera based assistive text reading to help visually impaired people in reading the text present on the captured image. The faces can also be detected when a person enters into the frame by the mode control. The proposed idea involves text extraction from scanned image using Tesseract Optical Character Recognition (OCR) and converting the text to speech by e-Speak tool, a process that enables visually impaired people to read the text. This is a prototype for the visually challenged people to recognize the products in the real world by extracting the text on image and converting it into speech. Proposed method is carried out by using Raspberry pi and portability is achieved by using a battery backup INTRODUCTION The aim of this project is to present a progressive work in developing an assistive aid for the visually impaired. It helps them in object identification, face recognition and obstacle detection as well as reading newspapers and books. In this approach the object identification, face recognition, text extractor block, obstacle detection module is integrated into a single device. The necessity for learning Braille is overcome by the camera module. This system captures images of any kind of text and converts it to speech. The OCR stands for Optical Character Recognition. This algorithm is used for converting captured image into readable codes. Captures the image, localize the text region, crop the text from the image, and Recognize the text code using OCR. Speech synthesis is the artificial synthesis of human speech. A Text-To-Speech (TTS) synthesizer is a computer-based system that should be able to read any text aloud, whether it was directly introduced in the computer by an operator or scanned and submitted by an Optical Character Recognition (OCR) system. Testing of the device was done on raspberry pi platform. The Raspberry Pi is a basic embedded system and being a low cost, single- board computer used to reduce the complexity of systems in real time applications. Extensive Use of Machine Learning has been made in this project. In traditional computing, algorithms are sets of explicitly programmed instructions used by computers to solve problems. Machine learning 272
algorithms instead allow for computers to train on data inputs and use statistical analysis in order to output values that fall within a specific range. The backbone of this project is: Raspberry pi, a fully functional, compact Linux Computer and The Raspberry Pi camera. The camera module plugs to the CSI connector on the Raspberry Pi. It is able to deliver clear 5MP resolution image, or 1080p HD video recording at 30fps. The camera module attaches to Raspberry Pi by a 15 pin Ribbon Cable, to the dedicated 15 pin MIPI Camera Serial Interface (CSI), which was designed especially for interfacing to cameras. The proposed method uses the raspberry pi board as the main controller. The latest version of Raspbian wheezy issued on to the board. After installing the OS to the board connect all the necessary hardware components and switch on the power supply. It starts booting up the Board and login the raspberry pi by username and password. IMPLEMENTATION AND RESULTS Fig.1 Image Acquisition Using a Single Sensor The text is captured using a raspberry pi camera or an HD webcam with high resolution. The acquired image is then applied to the image pre- processing step for reduction of unwanted noise. In image processing, it is defined as the action of retrieving an image from some source, usually a hardware- based source for processing it as the first step in the work flow sequence because without an image, no processing is possible. The image that is acquired is completely unprocessed. Now the incoming energies are transformed into a voltage by the combination of input electrical power and sensor material that is responsive to a particular type of energy being detected. The output voltage waveform is the response of the sensor(s) and a digital quantity is obtained from each sensor by digitizing its response. Image acquisition using a single sensor. Example of a single sensor is a photodiode. To obtain a two-dimensional image using a single sensor, the motion should be in both X & Y directions. Rotation provides motion in one direction. Linear motion provides motion in the perpendicular direction In image pre-processing the unwanted noise in the image is removed by applying appropriate threshold (OTSU), morphological transformations like dilation and black hat transformation, discrete cosine transformations, generating the required contours and drawing the bounding boxes around the required text content in the image. Initially the captured image is re-scaled to appropriate size and converted into gray scale image such that it will be more useful for further processing. A face detection system using Haar-cascades. OpenCV has a robust set of Haar-cascades that was used for the project. Using face-cascades alone caused random objects to be identified and eye cascades were 273
incorporated to obtain stable face detection. For this project three algorithms are implemented independently. These are Eigenface, Fisherface and Linear binary pattern histograms respectively. All three can be implemented using OpenCV libraries In this project the Tesseract OCR engine is used to extract the recognized text. The aim of Optical Character Recognition (OCR) is to classify optical patterns (often contained in a digital image) corresponding to alphanumeric or other characters. The process of OCR involves several steps including segmentation, feature extraction, and classification. In principle, any standard OCR software can now be used to recognize the text in the segmented frames. However, a hard look at the properties of the candidate character regions in the segmented frames or image reveals that most OCR software packages will have significant difficulty to recognize the text. Optical character Recognition (OCR) is a process that converts scanned or printed text images, handwritten text into editable text for further processing. OCR is an important element in this module. OCR or Optical Character Recognition is a technology that automatically recognizes the character through the optical mechanism, this technology imitates the ability of the human senses of sight, where the camera becomes a replacement for the eye and image processing is done in the computer engine as a substitute for the human brain. Tesseract OCR is a type of OCR engine with matrix matching. The selection of Tesseract engine is because of its flexibility and extensibility of machines and the fact that many communities are active researchers to develop this OCR engine and also because Tesseract OCR can support 149 languages. In this project we are identifying English alphabets. Before feeding the image to the OCR, it is converted to a binary image to increase the recognition accuracy. The output of OCR is the text, which is stored in a file (speech.txt). In the TTS module text is converted to speech. The output of OCR is the text, which is stored in a file (speech.txt). Now this speech.txt is converted to speech. In the case of face detection, if a face is captured it will check with an id if the id matches then that is converted to speech. Fig.2 Sequence Diagram 274
RESULTS: Serial Number of TC 01 TC 02 TC 03 TC 04 TC 05 Test Case Module Under Capturing Camera Conversion of Conversion of text to Capture human face using Identification of Test image from Raspberry image to txt using voice using TTS OCR tool system Raspberry Pi Camera human names Pi Description Raspberry Pi camera Tesseract assumes Speech synthesis is Raspberry Pi camera Once the Raspberry captures the image, that its input is a used to create voice captures the human face Pi camera captures which contains only binary image with output. A synthesizer to identify the person the human face. The region of text. optional text region can be used to name. next step is to finding defined. The binary convert text to the person name with image is converted speech. his characteristics. to text by Tesseract library in OCR engine Input Image Captured Captures the image The input is taken Capture the face image of User select captured of txt from the from previously human. image face of human. raspberry pi converted text using camera. OCR tool. Output Text will be captured; Once the image of The converted text is If the face image of human Once the image face Images will be txt has captured, converted to speech is captured, it will be of human is captured, ignored. using tesseract it using TTS(Text-to- preceded with next step or the person name will will be converted to Speech) system. else it will be ignored. be identified. text. Remarks Test Successful. Test Successful. Test Successful. Test Successful. Test Successful. CONCLUSION This design of face and text recognition based on raspberry pi, is mainly designed for the purpose of blind navigation. Our future work will focus on detecting the emotions of the persons and recognizing more types of indoor objects and icons on signage in addition to text for indoor way finding aid to assist blind people travel independently. We will also study the significant human interface issues including auditory output and spatial updating of object location, orientation, and distance. With real-time updates, blind users will be able to better use spatial memory to understand the surrounding environment, obstacles and signs. 275
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Publication Details (August 2017 to July 2018) Sl. Author(s) Title of Article Name of journal Vol. No. Year and ISSN Impact Factor Indexing/Abstracting # Page Number if any 1. Dr. B. Rajalakshmi, A Comparison of Load Balancing Approaches International Journal of Scientific Volume 7, Issue 3, May- ISSN: 0.654 (GIF) SIS S.HeyShanthini pandiyakumari, in Cloud: EOLB Research in Computer Science 2018 2319-1953 Sheeba P Applications and Management Studies Dr. B.RajaLakshmi Ravishankar, International Journal of Creative Volume 6, Issue 2, April 2. S.HeyShanthini pandiyakumari Research Frontiers in Cloud Forensics Research Thoughts 2018 ISSN: 2320-2882 5.97 Google scholar, DOI S, Aishwarya Rajamani Vijayalakshmi A Lepakshi, Scheduling Workflows with Data International Journal of Vol 9 No 4, Sep 2017 ISSN (Print): 2319- - SCOPUS, Academia.edu, 3. Prashanth C S R Host Reservation in Cloud Computing Engineering and Technology 8613 Google Scholar (IJET) ISSN (Online): 0975-4024 Tarannum Bloch, Understanding Live Migration Techniques https://doi.org/10.1007/97 ISBN 978-981-10- Thomson Reuters, 8-981-10-6620-7_47, Oct 6619-1 SCOPUS 4. R Sridaran, Intended for Resource Interference Springer 2017 - CSR Prashanth Minimization in Virtualized Cloud Environment 276 5. Dr. V. Hanuman Kumar, Python Libraries, Development Frameworks International Journal of Vol. 7 Issue 04, April- ISSN: 2278-0181 Google scholar, Dr. Chandra Naik and Engineering Research & 2018 - Crossref - DOI Algorithms for Machine Learning Applications Technology Prefix: 10.17577 6. Dr. V. Hanuman Kumar Modern sensors, applications and health International journal of basic and June 2018 Volume 8 ISSN 2249-3352 5.86 UGC Approved safety (P) 2278-0505 (E) applied research Number 6 Dr. Beena B M , Harshitha H D Ant Colony Optimization for Efficient International Journal on Recent Volume: 5 Issue: 6 ISSN: 2321-8169 - UGC Approved 7. Resource Allocation in Cloud Computing October 2017 and Innovation Trends in Computing and Communication Dr. V.Ilango, Factors for improving the research International Journal of Civil Volume 8, Issue 4, April SSN Print: 0976- publications and quality metrics Engineering and Technology 2018 6308 and ISSN 8. Dr. S. Mohan Kumar, (IJCIET) Online: 0976-6316 - Scopus Indexed Dr. R. Chinnaiyan Dr. S. Mohan Kumar, Surveys on Detection of Melanoma through International Journal for Volume 6 Issue III, March ISSN: 2321-9653 6.887 UGC Approved 9. Dr. R. Chinnaiyan Image Processing Techniques Research in Applied Science & 2018 Engineering Technology (IJRASET) Dr. S. Mohan Kumar, Automated detection of retinal defects using European Journal of Biomedical Volume 5, Issue 01 189- ISSN 2349-8870 4.382 UGC Approved 10. Dr. R. Chinnaiyan image mining- a review AND Pharmaceutical sciences 194, 2018, Dr. S. Mohan Kumar, Healthcare Solution based on Machine International Journal of Pure and Volume 119 No. 16 2018, ISSN: 1314-3395 - UGC Approved 11. Dr. R. Chinnaiyan Learning Applications in Applied Mathematic 1473-1484, IOT and Edge Computing
12. Dr. S. Mohan Kumar, Medical diagnosis cad system using latest International Journal of Computer Volume 8, Issue 1, ISSN Print: 0976- 9.3590 UGC Approved Dr. R. Chinnaiyan, technologies, sensors and cloud computing Engineering & Technology January- February 2018 6367 and ISSN (IJCET) Online: 0976–6375 Dr. S. Mohan Kumar, Design and Implementation of CNN for Volume 6 Issue III, March 6.887 UGC Approved 13. Dr. Jitendranath Mungara, detecting Melanoma through Image International Journal for 2018 ISSN: 2321-9653 Processing Research in Applied Science & Dr. R. Chinnaiyan, Engineering Technology (IJRASET) Dr. S. Mohan Kumar, 14. Karthik. V, Geocentric Based Node Detection and IJSART Volume 3 Issue 4 –APRIL ISSN [ONLINE]: - UGC Approved Revoking Malicious Node in WSN 2018 2395-1052 Ms. Gayathri.T Dr. S. Mohan Kumar, Importance of accreditation and autonomous International Journal of January, 2018 3.785 ISSN: 2277-9655 3.785 UGC Approved 15. Muralidhara. S, status in „HEI‟ – an assessment with special Engineering Sciences & ISSN(Online): Dr. R. Chinnaiyan, orientation to Karnataka state Research Technology Vol. 5, Issue 3, March 2320-9801 - UGC Approved 2018 ISSN (Print): 2320- Dr. S. Mohan Kumar, Booster in High Dimensional Data International Journal of 9798 16. Dr. R Chinnaiyan, Classification Innovative Research in Computer Volume 3, Issue 4 ISSN: 2456-3307 and Sheba Pari N Fundamental Concepts of SEO – A Review Communication Engineering Volume 3, Issue 4 ISSN: 2456-3307 17. Dr. R. Chinnaiyan RESTful -Webservices International Journal of Scientific Volume 3, Issue 4 ISSN: 2456-3307 - UGC Approved Research in Computer Science, 277 AI in Cyber Security- A Review Engineering and Information IJAET/Vol.I/ Issue III/Oct.- E-ISSN 0976-3945 Technology Dec.,2017/240-250 18. Dr. R. Chinnaiyan Reliability management and failure Volume 25– No.3, July ISSN: 2249 – 8958 - UGC Approved maintenance of component based software International Journal of Scientific 2018 19. Dr. R. Chinnaiyan systems Research in Computer Science, Volume-9 Issue-3, - UGC Approved 20. Dr. R. Chinnaiyan An Experimental Study on Reliability Engineering and Information February, 2018 - UGC Approved 21. Dr. R. Chinnaiyan Estimation of GNU Compiler Components – A Technology - UGC Approved 22. Dr. R. Chinnaiyan Review - UGC Approved International Journal of Scientific Smart Crop Monitor using Internet of Things, Research in Computer Science, Cloud, Machine Learning and Android App Engineering and Information Technology International Journal of Advanced Engineering Technology International Journal of Computer Applications (0975 – 8887) International Journal of Engineering and Advanced Technology (IJEAT) ,
Ms. Anjana Sharma, Survey on Pedestrian and Object Detection in International Journal of Research Vol.6, No.11, November E-ISSN: 2321-9637 - UGC Approved 23. Nidhishree M, Video in Advent Technology 2018 Vinoth Kumar Cloud Based RDF Security: A Secured Data International Journal of Intelligent 2185310, 21853118 - H index: 6 Model for Cloud Computing 0.654 (GIF) Clara Kanmani Arulanandu, Engineering and Systems Vol.11, No.1, 2018 ISSN 2319 – 1953 SIS 24. Suma Vasu Deva Murthy, Attribute Based Encryption for Secure 4.890 Allocation of E-Health Data On Cloud ISSN (Online) 6.017 DRJI, Google scholar Guruprasad Nagraj 2394-2320 UGC Approved Cloud Computing and Semantic web: An ISSN 2320–088X - 25. Sanjana M, Interplay International Journal of Scientific Volume 7, Issue 3, May UGC Approved Clara kanmani Research in Computer Science 2018 ISSN: 1314-3395 - Adapting SIP for Enabling Applications and Management (on-line version) 0.654 (GIF) UGC Approved Clara Kanmani A, Voice Calls in MANET Studies Vol 4, Issue 9, Sep 2017 26. Suma V, Analysing different ISSN: 2320-2882 5.97 SIS machine learning International Journal of Vol.6 Issue.3 4.895 Google scholar N Guruprasad approaches for malicious Engineering Research in ISSN 2319 – 1953 6.8875 Copernicua, Crossref - DOI content detection in Computer Science and 5.38 Prefix: 10.22214 27. Sheeba P, social media: a survey Engineering ISSN: 2320-2882 Google scholar Dr. R. Chinnaiyan ISSN: 2321-9653 Google scholar A survey on the analysis of emotions in International Journal of Computer ISSN [ONLINE]: spams in social network Science and Mobile Computing 2395-1052 ISSN [ONLINE]: 278 28. N.Deepika, Dr. N.Guruprasad, Survey on Privacy Based Health Data International Journal of Pure and Volume 120 No. 6 2017, 2395-1052 Syamili Mohandas Storage and Applied Mathematics 12125-12143, August 16, Retrieval in a Cloud environment 2017 Deepika N, Anomaly detection on run time machines IJCRT Volume 6, Issue 1 March 29. Meira Yendrembam, using OC-SVM 2018 International Journal of Scientific Dr. N Guruprasad A Survey on Device Discovery in Internet of Research in Computer Science Volume 7, Issue 3, May Things Applications and Management 2018 30. Nidhishree M S, Studies Mrs. Deepika N Internet of Things: Survey on MQTT Protocol International Journal of Creative Volume 6, Issue 2 April Research Thoughts 2018 31. Lavanya N, Internet Of Things (IOT) Communication International Journal for Deepika N Protocols : Research in Applied Science & Volume 6 Issue V, May Analysis And Review Engineering Technology 2018 Vandana CP, 32. Sivabalan, IJSART Volume 4 Issue 7 – JULY 2018 Udhaya, Maseera Shajid IJSART Volume 4 Issue 7 – JULY 33. Sivabalan N 2018 34. Sivabalan N
35. Puneet Palagi, Enhancement of Privacy and User Interaction International Journal on Recent Volume: 6 Issue: 7 ISSN: 2321-8169 - UGC Approved Dr. Ashok KumarPS, in a Social Network with the Aid of Adaptive and Innovation Trends in Computing and Communication 0.654 (GIF) SIS Intelligence 5.070 Copernicus Dr. Chandra Naik 3.022 Google scholar 5.070 Copernicus 36. Ms. Soja Rani S Social Network Analysis – Network Metrics International Journal of Scientific Volume 7, Issue 3 (May ISSN 2319 – 1953 5.97 Google scholar for Detection of Influential Nodes Research in Computer Science 2018) 5.385 Google scholar, , SIS 37. SojaRani.S, Applications and Management ISSN 2348 – 8034 3.022 Google scholar Tinu N. Social Network Analysis – Survey On Data Studies [Rani, 5(7): July 2018] 3.022 Google scholar Collection Methods, Data Formats And DOI- E-ISSN: 2347-2693 5.070 Copernicus 38. N.S. Tinu Analysis Tools Global journal of engineering 10.5281/zenodo.1305005 ISSN 2348 – 8034 - Google scholar A Survey on Blockchain Technology- science and researches ISSN: 2320-2882 5.97 Google scholar 39. Tinu N.S & Taxonomy, Consensus Algorithms and Vol.-6, Issue-5, May ISSN 2231- 2196 5.97 Google scholar SojaRani.S Applications International Journal of Computer 2018 UGC approved Sciences and Engineering [Tinu, 5(7): July 2018] 40. Meghana L, Blockchain technology- an extensive study on DOI- R Jaya its users and applications Global journal of engineering 10.5281/zenodo.1305003 279 science and researches Volume 6, Issue 2 April R.Jaya, Intelligent image encoding 2018 41. C.S. Pillai, Methodology using covq with fss norms International Journal of Creative Research Thoughts Vol: 9, Issue 23, dec R. Jagadeesh Kannan Ontology Based Optimization with Adaptive 2017 Network Based Fuzzy Inference System International Journal of Current Based Health Maintenance System Research and Review R.Jaya, Swarm Intelligence Algorithms - A Survey International Journal of Computer Volume-6, Issue-2, 2018 E-ISSN: 2347-2693 42. Meghana L Sciences and Engineering 43. Uma.N, A Survey and comparative study of the International Journal of Computer Vol.-6, Issue-5, May 2018 E-ISSN: 2347-2693 Prashanth C.S.R various algorithms for Frequent Itemset Sciences and Engineering Mining 44. Ms.Uma.N A Technical Review On Recommendation Global journal of engineering [Uma, 5(6): June 2018] ISSN 2348 – 8034 Systems In A Framework Of Job science and researches DOI- 45. Sangeetha D, Recommender System Using Naive Bayes 10.5281/zenodo.1302263 ISSN (Online): Padma Priya M.K Algorithm International Journal of 2319 – 6734, ISSN Engineering Science Invention Volume 7 Issue 6 Ver II, (Print): 2319 – 6726 46. Raghavendra Naik, Pramilarani Data Integrity Verification In Cloud Database June 2018, PP 79-85 ISSN: 2320-2882 K International Journal of Creative Parallel Mining of Frequent Itemsets Using Research Thoughts Volume 6, Issue 2 April ISSN: 2320-2882 47. Raghavendra Naik MapReduce International Journal of Creative 2018 K.Pramilarani Comparison of frequent pattern mining Research Thoughts Volume 6, Issue 1 algorithms for data streams: a survey February 2018
48. Kavya Krishnan R, A Combination of AES and Key Hash International Journal of Scientific Volume 7, Issue 3, May ISSN 2319 – 1953 0.654 (GIF) SIS K.Pramilarani Message Algorithm to Secure Data in Cloud Research in Computer Science 2018 Applications and Management E-ISSN: 2347-2693 - UGC Approved Muralidhara S, Study of Information Mining (DM) and Studies Vol.-6, Issue-6, June - 49. Dr. Vishwanath Y, Machine Learning (ML) 2018 E-ISSN: 2278– - Copernicus Strategies on Digital Security International Journal of 179X 3.022 Google scholar Dr. R. Chinnaiyan Computer Sciences and Vol.7. No.1, 009-022, ISSN (Online): 5.070 A Review on Mutant Reduction Techniques Engineering 2018 2319 – 6734, ISSN - Google scholar 50. S. Shanmuga Priya Volume 7 Issue 7 Ver II || (Print): 2319 – 6726 - Iot Based Remote Health Care Monitoring An International Peer Review E-3 July 2018 || PP 84-98 - Copernicus 51. S. Shanmuga Priya System Using Wearable Sensor for Tracking Journal of Sciences and Thomson reuters, Google Anomalous Situation Technology scholar UGC Approved International Journal of UGC Approved Engineering Science Invention 52. Jisha Mariam Jose, A Detailed Study on Features of Data International Journal of Computer Vol.-6, Issue-5, May 2018 E-ISSN: 2347-2693 Dr. Sreenivasalu M Warehousing Database-Vertica Sciences and Engineering Jisha Mariam Jose, Data movement in wos - ros on sql Global journal of engineering [Jose, 5(7): July 2018] ISSN 2348 – 8034 53. Dr. Sambasiva Rao, operations in data science and researches DOI- Dr. R. Chinnaiyan Warehousing database-vertica 10.5281/zenodo.1304027 280 54. Gayathri.T, Data mining of restaurant review using WEKA International Journal of Volume 4 Issue 3, May ISSN: 2395-1303 Engineering and Techniques 2018 Dr. K.Swathi 55. Gayathri.T, Data mining of Absentee data to increase International Journal of Volume 4 Issue 3, May ISSN:2395-1303 Dr. Pradeep G productivity Engineering and Techniques 2018 Urmi Priyadarshani Das, Securing Data in Cloud using Disinformation International Journal of Computer Volume 6 Issue 3, May - 56. VijayaKumar R, Data in Fog Computing Science Trends and Technology June 2018 ISSN: 2347-8578 Dr B Rajalakshmi Ravishankar 57. Sheba Pari, Analysing the Detection of Rheumatoid International Journal of Computer Vol.-6, Issue-5, May E-ISSN: 2347-2693 3.022 Google scholar Dr. Sambasiva Rao Arthritis using Image Processing Techniques Sciences and Engineering 2018 Sheba Pari N. , Maintenance Of Structural And Designs Of Global journal of engineering [Sheba, 5(7): July 2018] ISSN 2348 – 8034 5.070 Copernicus 58. Dr. Sambasiva Rao, Historical Buildings Using Light Detection And science and researches DOI- - Ranging (LiDAR) 10.5281/zenodo.1305008 E-ISSN: 2321-9637 - DRJI, Google scholar, Dr. R. Chinnaiyan Weka Workbench For Analysis Of Machine International Journal of Research E-ISSN: 2321-9637 copernicus Learning Classification Algorithms in Advent Technology Volume 6, Issue 5, May 59. Sheba P N 2018 DRJI, Google scholar, Secure Online Data Encryption in Cloud International Journal of Research copernicus 60. Nipa Sarkar, Computing in Advent Technology Vol.6, No.5, May 2018 Sheba
61. Ms. Alpha Vijayan, Preserving privacy of multiple data Journal of Emerging Volume 5, Issue 5, May ISSN-2349-5162 - Google scholar, Thomson Ms. Josmy George In a cloud over a secured network Technologies and Innovative 2018 2319 – 1953 Reuters Research 0976-5697 62. Vasantha M, On the Use of Neuro-fuzzy inference system Volume 7, Issue 3, May - UGC Approved Dr. Prashanth CSR to predict crop selection based on climate International Journal of Scientific 2018 ISSN: 2278 – 909X Research in Computer Science ISSN 2321–2705 Applications and Management e-ISSN: 2455-2585 Studies 2319 – 1953 Lavanya N, A survey on various detection techniques on International JOURNAL of VOLUME 8, No. 9, run time 63. Deepika N, Advanced RESEARCH in November-December - UGC Approved Dr. Beena, Machines COMPUTER Science 2017 Syamili Mohandas 64. V. Karthik, A novel survey on location based node International Journal of Computer Volume 8, Issue 2, - UGC Approved Dr S Mohan Kumar, detection and identifying the malicious activity Engineering & Technology March-April 2018, of nodes in sensor (IJCET) - UGC Approved Dr. R. Chinnaiyan Networks Volume 7, Issue 6, June - Google scholar International Journal of Advanced 2018 5.22 Google scholar, DRJI 65. Santosh Kumar.B Implementation Of A Reconfigurable Delta- Research in Electronics and - UGC Approved Sigma Modulator Using Psoc Communication Engineering Volume V, Issue IV, April 281 66. Santosh Kumar.B 2018 FPGA Implementation of PID Controller International Journal of Research 67. Santosh Kumar.B Using Xilinx System Generator and Scientific Innovation Volume 4, Issue 6, June- 2018 68. Santosh Kumar.B Realization of a Delta-Sigma Data converter International Journal of Technical with Lower Proportion of Oversampling Innovation in Modern Engineering Volume 7, Issue 3, May & Science 2018 Network Processing Access through Multicore Processor International Journal of Scientific Research in Computer Science Applications and Management Studies DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Publication Details (August 2018 to July 2019) Sl. Author(s) Title of Article Name of Journal Vol. No. Year and ISSN Impact Factor Indexing/ # Page Number if any Abstracting Dr. B Rajalakshmi, Security Audit On Cloud Data Storage Journal of Emerging Technologies and Volume: 6, Issue:5, May 2019 2349-5162 5.87 UGC Innovative Research Approved 1. S.Heyshanthinipandiyakumari, 0.654 Bindhu V UGC 2. Dr.Hanuman Kumar, Mobclouds -An Offloading Process International Journal of Scientific Research Volume 8, 2319 – 1953
Dr. Mohan Kumar S,Kusuma bai R in Computer Science Applications and Issue 3 May2019, Page No. Approved Management Studies 4956-4960 UGC 3. Dr. M. Chandra Naik, Muralidhara Structure And Development Of An E-Voting Journal of Emerging Technologies and Volume 6, ISSN-2349-5162 5.87 Approved S System Utilizing Blockchain Technique Innovative Research Issue 6, - Scopus June 2019, 0.453 UGC Approved 3.02 4. Dr.Pamela vinitha ,Dr.Clara Ontologies In Semantic Web: A Comprehensive Jour of Adv Research in Dynamical & Vol. 11, - 6.887 UGC Approved kanmani, Special Issue-02, July 2019 7.17 Analysis Control Systems 6.887 UGC Approved 7.17 5. Dr. V. Hanuman Skin Cancer Detection Using Machine Learning International Journal of Research in Advent Vol.6, No.12, December 2018 2321-9637 5.2 UGC Approved Ms. Sanjana Algorithm Technology - UGC Approved 6. Dr. V. Hanuman Regression Technique To Predict Stages Of International Journal of Computer Sciences 2347-2693 4.305 Ms. Sanjana Basal Cell Carcinoma UGC Approved and Engineering Vol.-7, Issue-4, April 2019 - UGC 7. Dr. V. Hanuman Analyzing Privacy For Remote Data In A Cloud Journal of Emerging Technologies and Volume 6, Approved Ms. Madhushree Issue 5, May 2019 Scopus Storage Innovative Research 2349-5162 ISSN: 2321-9653 UGC 282 8. Dr. V. Hanuman Gowri Prasad, Expression Recognition Using Neural Network International Journal for Research in Applied Volume 7 Approved Prakruthi S. T ISSN-2349-5162 Science & Engineering Technology Issue VI, June 2019 - 2321-9653 9. Dr. Vishwanath Y, Muralidhara S Anamoly Detection Using Cnn Algorithm Journal of Emerging Technologies and Volume 6, Innovative Research (JETIR) Issue 6 0972-1347 June 2019 1682-3915 10. Kavya Krishnan R, Dr. Clara Analysis On Different Algorithms Estimation Of International Journal for Research in Applied Volume 7 ISSN: 2393-9028 Kanmani A (PRINT) e-|ISSN: Blood Pressure Using Ecg And Ppg Sensors Science & Engineering Technology Issue V, May 2019 2348-2281 ISSN-L: 2501 - 11. Kavya Krishnan R, Clara Kanmani Analysis On Blockchain In Internet Of Things For International Journal Of Information And Volume 6, 1111 A Issue 5, May 2019 Building Smart Cities Computing Science 12. Dr. L. Kamatchi Priya, Improvising Classification Performance For High Asian Journal of Information Technology Vol-17, M.K. Kavitha Devi, S.Nagarajan Dimensional And Small Sample Data Sets Issue-4, Dec 2018, PP:261- 270 13. Dr. Rachana Efficient Content Based Image Retrieval International Journal Of Research In VOL. 6 ISSUE 4 ( October- December 2018) Technique Based On The Cuckoo Search Electronics And Computer Engineering Correlation Method IJRECE 14. Dr. Meenakshisundaram Skill Acquisition For Enhancing Employability European Journal of Education Studies Volume 4 B,Dr.S.Mohan Kumar Through Multiple Learning Experience Issue 8 2018
Instructional Strategy (MLEIS)–Towards Ensuring Inclusive And Equitable Technology Education 15. Dr. Meenakshisundaram B Cross Domain Composition Of Web Service International Journal of Computer Science Vol. 6 (3) , 0975-4660 - UGC Workflows Using A Provenance Ontology With and Information Technologies, (IJCSIT) 2019, Approved An Automated Re-Planning ISSN: 2077-1185 e-ISSN:2227- 16. Dr. Meenakshisundaram B Fuzzy-Xdds: A Fuzzy Based Cross-Domain International Journal of Engineering & Vol:15 No:03, 2712 (Print) 1.201 UGC Services Matchmaker For Semantic Web Technology IJET-IJENS June 2019 ISSN NO: 0972- Approved Services 1347 5.2 ISSN NO: 0972- 5.2 UGC 17. Dr. Meenakshisundaram B An Analysis On Security Threats In Cloud International Journal Of Information And Volume 6, 1347 5.2 Approved Computing Computing Science Issue 3, March 2019 ISSN NO: 0972- 5.2 1347 5.2 UGC 18. Dr. Venkata Ramana, Anjana Cctv Pedestrian Anomaly Detection Using Deep International Journal Of Information And Volume 6, ISSN NO: 0972- SJR:0.105 Approved Sharma,Nidhishree.M Issue 5, May 2019 1347 Learning Networks And Repeat Classifier Computing Science ISSN NO: 0972- UGC 1347 Approved 19. Jisha Mariam Jose, Dr. An Experimental Study On Different Data Models International Journal Of Information And Volume 6, Sreenivasulu M Issue 7, July 2019 0976-5506 UGC In Apache Hive Computing Science Approved 2581-5792 283 20. Dr. Sreenivasulu M, Edwin Benny, Dairy Farm Tracking Using Blockchain International Journal Of Information And Volume 6, UGC Jisha Mariam Jose Computing Science Issue 5, May 2019 0972-1347 Approved 21. Dr. G Sambasiva Rao, Pranav M, Modelling Cognitive States Of Pilots To Minimize International Journal Of Information And Volume 6, 2319 -6726 Scopus Sheba Pari Issue 5, May 2019 374 commercial aviation Disasters Computing Science 2321-9939 22. Sheba Pari N.,Majjaru Providing Cyber Security Using Machine Indian Journal of Public Health Research & Vol 9, No. 11, pp:667-670, 2321-9939 Chandrababu,Senthil Kumar K Learning For Social Networks Development Nov 2018 23. G. Manoj, R. Jaya, N. Deepika Opportunistic Routing With Congestion Diversity International Journal of Research in Vol.2 4.308 UGC Issue.1 Approved In Wireless Multi Hop Network Engineering, Science and Management Jan 2019 24. Urmi Priyadarshani Das, Anomaly Detection Using Cnn Algorithm International Journal Of Information And Volume 6, 5.2 UGC Approved Ms.N.Deepika Computing Science Issue 5, May 2019 5.962 UGC Approved 25. Urmi Priyadarshani Das, Anomaly Detection on Images Using Machine International Journal of Engineering Science Volume 7 Ms.N.Deepika Learning Algorithm Invention Issue 11 Ver II, Nov 2018, PP 68-71 26. Anusha S, Deepika Survey On Credit Card Fraud Detection Using International Journal of Engineering Volume 6, 7.37 UGC Approved Issue 4, 2018 7.37 UGC Approved Data Mining Techniques Development and Research 27. Anusha S,Deepika N Two Factor Protection For Accessing Data Using International Journal of Engineering Volume 7, Efficient Revocation In Cloud Storage System Development and Research Issue 2, 2019
28. Deepika N Analysing different machine learning approaches International Journal of Pure and Applied Volume 12 , 1314-3395 7.19 Scopus Issue 6, 2018 0.453 for detecting malicious content : A survey mathematics 5.2 UGC Approved 29. Asha Rani Borah,Nipa Sarkar End-Stage Renal Disease Risk Prediction Via International Journal of Research in Advent Vol.6, No.11, Page No: 3063- 2321-9637 - UGC Approved Machine Learning And Iot Technology 3068, Nov-18 5.2 - Open Access 30. Ms. Priti B Badar, Mr. K Naresh Extraction of E-Learners non-verbal behavior International Journal Of Information And Volume 6, 0972-1347 Kannan Computing Science Issue 5, May 2019 - UGC Approved 31. Priti Badar, Deepa Puranik Analysis On Ontology And Semantic Web Perspectives in Communication, Embedded- Vol. 3, ISSN: 2566-932X, - Open Access Technique In Education systems and Signal-processing Issue 1, April 2019, May 2019 - 7.17 Open Access 32. Priti Badar, Aishwarya Rajamani A Conspectus Of Research Directions For International Journal Of Information And April 2019 0972-1347 5.2 Ontologies Computing Science 5.87 Open Access 5.87 33. Priti Badar, Yogitha A Survey On Various Techniques Used For Video Perspectives in Communication, Embedded- May 2019 2566-932x 5.2 Open Access Retrieval systems and Signal-processing 5.2 UGC Approved 34. Priti Badar, Gayathri GS Study On Web Intelligence In Higher Education: Perspectives in Communication, Embedded- May 2019 2566-932x UGC A Review on Business Intelligence Techniques, systems and Signal-processing Approved Frameworks And Usage UGC Approved 284 35. Priti Badar, Deepa Puranik The Utilization Of Ontologies For Knowledge Perspectives in Communication, Embedded- Vol. 3, ISSN: 2566-932X UGC Model And Data Recovery Approved systems and Signal-processing Issue 1, April 2019 UGC Approved 36. Priti Badar, Comparison Of Classification Modelling Perspectives in Communication, Embedded- May 2019 ISSN: 2566-932X Prem Kumar Algorithms In Web Usage Mining systems and Signal-processing UGC Approved 37. Sangeetha D, Predicting Cancer Using Machine Learning International Journal for Research in Applied Volume 6 Issue XI, 2321-9653 N. Siva Balan, Udhaya Algorithms Science & Engineering Technology Nov 2018 PP:337-342 38. Sangeetha D , N. SivaBalan Predicting Type Of Cancer's Using Machine International Journal Of Information And Volume 6, Issue 5, 0972-1347 Learning Algorithm's Computing Science May 2019 39. Puneet S Palagi Knowledge Enhancement Platform Using Q&A Journal of Emerging Technologies and Volume 6, ISSN-2349-5162 Issue 6,June 2019 Social Media System Innovative Research 40. Puneet S Palagi A Novel Approach To Risk Assessment In Online Journal of Emerging Technologies and Volume 6, ISSN-2349-5162 Issue 6,June 2019 Social Networks Innovative Research 41. Anu Priya K R, A Survey Paper On The Comparison Of Nosql International Journal Of Information And Volume 6, 0972-1347 Soja Rani Engines (Mongo Db Vs. Cassandra) Using Spark Computing Science Issue 5, May 2019 42. Nissi Thomas, Indexing Solr with mysql Database International Journal Of Information And Volume 6, 0972-1347 Soja Rani Computing Science Issue 5, May 2019
43. Tinu N.S Ethereum: A Blockchain Platform With Smart International Journal Of Information And Volume 6, ISSN-0972-1347 5.2 UGC Approved Computing Science Contract Support For Distributed Application Issue 7, PP 142-145, July Development 2019 44. Tinu N.S Hyperledger Fabric – A Platform For Enterprise International Journal Of Information And Volume 6, ISSN-0972-1347 5.2 UGC Approved Computing Science Issue 7, PP 84-89, July 2019 Blockchain Solutions: Architecture And Transaction Flow 45. Kusuma Bai R, R. Jaya An Overview Of Blockchain Applications In International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Various Computing Science Issue 5, May 2019 Domain 46. Rahul Jain, Sriram Gupta Kaluva, Machine Learning: Supervised Learning International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Sandhya Reddy, Jaya R Computing Science Issue 5, May 2019 5.2 UGC Approved 5.2 UGC Approved 47. Soundarya Saravanan, R.Jaya Hand Gesture Recognition Using International Journal Of Information And Volume 6, 0972-1347 Convolutional Neural Network Computing Science Issue 5, May 2019 48. R. Jaya,Sriram Gupta Kaluva, Data And Pre-Processing Of Data For Machine International Journal Of Information And Volume 6, 0972-1347 Issue 5, May 2019 Learning Computing Science 285 49. Kusuma Bai R, R. Jaya Machine Learning Based Air Gesture To Control International Journal of Scientific Research Volume 7, 2319 – 1953 0.654 UGC Approved Wheel Chair in Computer Science Applications and Issue 5, Sep 2018 Management Studies 50. Sushmita Narayan Gaonkar, Jaya Effective Routing Protocol For Ad-Hoc Network International Journal of Research in Vol.2 Issue.1 2581-5792 4.308 UGC Approved R Engineering, Science and Management Jan 2019 4.308 UGC Approved 4.308 UGC Approved 51. Bindu V S, Jaya R Decreasing The Energy Utilization In Network By International Journal of Research in Vol.2 Issue.1 2581-5792 Jan 2019 Using Protocols Engineering, Science and Management 52. Celeste Murnal, R Jaya College Bandwidth Traffic Shaping International Journal of Research in Vol.2 Issue.1 2581-5792 Engineering, Science and Management Jan 2019 53. K. R. Anu Priyanka, R. Jaya Improved Dynamic Cluster Head Election Using International Journal of Research in Vol.2 2581-5792 4.308 UGC Approved Issue.1 Wireless Sensor Network Engineering, Science and Management Jan 2019 54. S. Anusha, R. Jaya Detection Of Malicious Packet Dropping In International Journal of Research in Vol.2 2581-5792 4.308 UGC Approved Wireless Ad-Hoc Network Engineering, Science and Management Issue.1 7.17 UGC Jan 2019 Approved 55. R.Jaya, Kusuma Bai R, Design And Development Of Air Gesture International Journal for Research in Applied Volume 7 2321-9653 Algorithm Science & Engineering Technology Issue V Based On Video Processing
56. R. Jaya, C. S. Pillai, R. Jagadeesh Hybrid Fuzzified Fish School Search Based Jour of Adv Research in Dynamical & Volume 11, - SJR:0.11 Scopus Control Systems Issue 2, June 2019 Kannan Learning Method For Prakriti Analysis 57. Harshitha H, Agricultural Crop Yield Prediction Using Machine International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Ms. Uma N Issue 5, May 2019 Learning Computing Science 58. Sushmita Narayan Gaonkar, Ms Study On Cipher Suit To Secure The Data On Journal of Emerging Technologies and Volume: 6, Issue:5, May 2019 2349-5162 5.2 UGC Approved Uma N Cloud Web Server Innovative Research 59. H D Nidhishree, Uma N Literature Survey on Predicting Thyroid Cancer International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Issue 5, May 2019 Using Machine Learning Algorithms Computing Science 60. Sumangala S, Padmapriya M.K Apache Pig As A Platform For Data Analytics International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Computing Science Issue 5, May 2019 61. V.C Chandra Kishore, Padmapriya A Survey Of Big Data Analytics – It‟s Challenges International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved M.K Computing Science Issue 5, May 2019 62. Celeste Murnal, K.Pramilarani Secure Text Transfer International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Computing Science Issue 5, May 2019 63. Srujani J, K. Pramilarani An Image Processing Algorithm To Detect International Journal of Computer Sciences Vol.-7, Issue-4, April 2019 2347-2693 3.02 UGC Approved Exudates In Fundus Images and Engineering 286 Srujani J, Survey On Exudates Extraction For Fundus International Journal of Research in Advent 64. K Pramilarani Images Technology Vol.6, No.11, November 2018 2321-9637 0.453 UGC Approved 65. Manoj G, Attribute Based Storage Supporting Assured Journal of Emerging Technologies and Volume 6, 2349-5162 5.87 UGC Pramilarani K Innovative Research Issue 4, April 2019 Approved Deduplication Of Encrypted Data In Cloud Storage System 66. Sanjay B Malegoan, S. Shanmuga Sentiment Analysis Of Reviews On E-Commerce International Journal Of Information And Volume 6, 0972-1347 5.2 UGC Approved Issue 5, May 2019 Priya Website To Rank Products Computing Science 67. Ms. S. Shanmuga Priya Define – Use Testing – An Example International Journal of Recent Technology Volume-7 2277-3878 SJR 0.11 Scopus and Engineering Issue-5, pp. 185-194, Jan 2019 Ranking Products On E-Commerce Website 68. Sanjay B Malegoan, S.Shanmuga Using Machine International Journal of Scientific Research Volume 7, 2319 – 1953 0.654 UGC Priya in Computer Science Issue 5, Sep 2018 7.37 Approved Learning Techniques Like Artificial Neural Networks Based On Applications and Management Studies UGC Approved User Reviews 69. S. Shanmuga Priya Integrated Testing Approach For Social-Mobile- International Journal of Engineering Volume 7, 2321-9939
Analytics-Cloud (Smac) Convergence Development and Research Issue 2 Technology 70. Namitha M.S, S.Shanmuga Priya Shoulder Surfing Resistance Using Message International Journal of Scientific Research Volume 03 2590-1892 3.241 UGC Approved Digest 5 Algorithm (Md5) 5.87 in Engineering and Management Issue 06, June 2019 3.215 UGC 3.215 Approved 71. Jisha Mariam Jose, Dr. Venkata A Comparative Air Quality Analysis Using Big Journal of Emerging Technologies and Volume 6, ISSN-2349-5162 5.210 Ramana Data Technologies Innovative Research (JETIR) Issue 6,June 2019 5.210 UGC 6.199 Approved 72. Gayathtri.T Solution Based Mining Of Students Academic International Journal of Research and Volume 6, 2349-5138 Performance Analytical Reviews Issue 2, June 2019 3.68 UGC Approved 73. Gayathtri.T Prediction Of Fake Review International Journal of Research and Volume 6, 2349-5138 Analytical Reviews Issue 2, May 2019 UGC Approved 74. VijayaKumar R,Devisivasankari.P Effective Marketing With Digital Channel: An International journal of Computer Science Volume:5, Issue:3, May 2019 2347 - 8578 Experimental Study Trends and Technology UGC Approved 75. VijayaKumar R,Devisankarai.P An Effective Approach For Building Efficient International journal of Computer Science Volume: 7, Issue: 3, May 2347 - 8578 Websites UGC Trends and Technology 2019 Approved 76. Mrs.Divya K.P, Mrs.Sheeba P A Review on Search Based International Journal of computer science IJCSMC, Vol. 8, Issue. 6, 2320–088X UGC Approved Software Engineering and mobile computing June 2019, pg.124 – 127 287 International Journal of Engineering Vol 5, Alpha Vijayan, Dr.Chandrasekar Isolation Of The Drug Elements Causing Side 77. Shastry Effects Through Machine Learning Research in Electronics and Communication Issue 11, November 2018, 2394-6849 Engineering (IJERECE) PP:1-4 78. Aishwarya Rajamani, Alpha Vijayan A Survey On Realms And Applications Of Social International Journal of Computer Sciences Vol.-6, 3.02 UGC Approved Media Data Analysis and Engineering Issue-11, Nov 2018, PP:844- 2347-2693 5.2 UGC Approved 848 3.02 UGC Approved 79. D.Sakthi Keerthana, Alpha Vijayan Weather Prediction Using Deep Learning International Journal Of Information And Volume 6, 0972-1347 Computing Science Issue 5, May 2019 80. Aishwarya Rajamani, Alpha Vijayan A Framework Of Computational Methods For International Journal of Computer Sciences Vol.7, 2347-2693 Recommender Engine and Engineering issue.4, April 2019 PP: 44-48 An 8b/10 Encoding For High Speed International Journal of Advanced Research Volume 8, Communication 81. Santosh Kumar.B, Dimple W G in Electronics and Communication Issue 7, July 2019, pp:129- 2278 – 909X 6.134 UGC Approved Engineering 130 82. Santosh Kumar B Direct Memory Access Controller Design And International Journal of Research and Volume VI, 2321–2705 - Open Access Dimple W G Scientific Innovation Issue III, March 2019, Implementation For Decreasing The Memory PP:124-125 Access Time, Power And Area
83. Gagan S Purad Amassing The Significance Of A Business Journal of Emerging Technologies and Volume: 6, Issue:5, May 2019 2349-5162 5.87 UGC Organization With The Use Of Data Analytics Innovative Research Approved And The Key Technologies Related To It 7.17 84. Gagan S Purad International journal for research in applied Vol 7, ISSN: 2321-9653 - UGC The Stimulus Of Sentimental Analysis For 2321-2705 Approved Consumer Consummation In Reference To science & Engineering technology Issue 6, June 2019 2319 – 1953 0.654 Social Media Presence Of Consumer - Open Access 85. P. Rajitha Nair, Dr. Ramya Dorai, International Journal of Research and Volume VI, 0972-1347 Vinod Unnikrishnan Review Of Various Block-Chain Based Ssl Scientific Innovation Issue V, May 2019 SJR 0.40 UGC Techniques 5.2 Approved 86. P. Rajitha Nair, Dr. Ramya Dorai, Survey Paper On Block-Chain Based Ssl International Journal of Scientific Research Volume 8, Open Access Vinod Unnikrishnan in Computer Science Applications and Issue 2 Scopus Management Studies UGC Approved 87. Vasantha M , Dr. Chandramouli H Energy Efficient Resource Allocation In Cloud Recent Trends in Cloud Computing and Web Volume 1, Computing Environments Engineering Issue 1 88. Vasantha M , Dr. Chandramouli H Survey Of Task Scheduling Algorithms Journal of Advancement in Parallel Volume 2 Computing Issue 1 288 89. Bindu V S, S Securing Cloud Data By Dna Cryptography International Journal Of Information And Volume 6, Heyshanthinipandiyakumari Computing Science Issue 5, May 2019
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Publication Details (August 2019 to July 2020) Sl. # Author(s) Title of Article Name of Journal Vol. No. Year and ISSN Impact Factor Indexing/ Page Number 2456-3307 if any Abstracting 2456-3307 1. Dr B. Rajalakshmi, Image Organization Using Unsupervised Deep International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 4.032 UGC Approved Heyshanthini Learning - Case study Computer Science, Engineering and Information December 2019. 2456-3307 Technology (IJSRCSEIT) 2277-3878 2456-3307 An application of autocraft workshop International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 4.032 UGC Approved 2. Dr. Clara Kanmani A, Srinivas Computer Science, Engineering and Information December 2019. 2248-9622 Technology (IJSRCSEIT) 2456-3307 1943-023X 3. Dr R Jaya, Dr. Design of UGV for searching and saving lives of International Journal of Scientific Research in Volume 4, Issue 9, 4.032 UGC Approved Saravanan lost persons in natural disasters and military using Computer Science, Engineering and Information December 2019. GSM Zig-bee Technology (IJSRCSEIT) 4. Dr R Jaya Blind Leap Real-Time Object Recognition with International Journal of Scientific Research in Volume 4, Issue 9, 4.032 UGC Approved results converted to Audio for Blind People Computer Science, Engineering and Information December 2019. 4.032 Technology (IJSRCSEIT) 4.032 Scopus Indexed 4.032 289 5. Dr. Pamela Viitha Eric Efficient Approximate Pattern Matching Algorithm International Journal of Recent Technology and Volume 9, Issue 1 6.185 UGC Approved for Biological Sequences Engineering June 2020 UGC Approved, 6. Dr. Pamela Viitha Eric, Pooja A Review on Face Emotion Recognition International Journal of Scientific Research in Volume 4, Issue 9, https://doi.org/10.326 Nimje, Roshlin Acharya, Prachi Techniques Computer Science, Engineering and Information December 2019. 28/IJSRCSEIT Singh Technology UGC Approved, DOI: 10.9790/9622- 7. Ms. Alpha Vijayan, Clustering Based Approach for Isolating The Drug International Journal of Scientific Research in Volume 4, Issue 9, 1005025459 Dr. Chandrasekar Shastry Elements Causing Side Effects Computer Science, Engineering and November- December 2019 UGC Approved Information Technology (IJSRCSEIT) Project Based Learning By Bitcoin International Journal of Engineering Research Volume 10, Issue 5, 8. Manoj. G, Ms. Alpha Vijayan and Applications(IJERA) (Series-II) May 2020, PP. 54-59 Implementation of Movie Recommendation International Journal of Scientific Research in Volume 6, Issue 3, 9. Dr. S.Sridevi, Celeste Murnal System Using Machine Learning Computer Science, Engineering and Information June 2020 Technology (IJSRCSEIT) 10. Mr Santosh Kumar.B Review of Bus Mastering DMA through PCI Journal of Advanced Research in Dynamical and Vol. 11, Special SJR 2019-0.13 Scopus Indexed express Control Systems - JARDCS Issue-08, Page 2442-2445, 2019
11. Mr Santosh Kumar.B Development of DMA controller for real time data International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 4.032 UGC Approved processing in FPGA based embedded application Computer Science, Engineering and Information December 2019. 4.032 UGC Approved Technology (IJSRCSEIT) 4.032 UGC Approved 4.032 UGC Approved 12. Ms.Suganya R Automatic Reportage of Accident Zone to the International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 Scopus Indexed Emergency Vehicles Using Smart Route Computer Science, Engineering and Information December 2019. 4.032 UGC Approved Framework Technology (IJSRCSEIT) 4.1 UGC Approved 4.032 UGC Approved Disclosure and sniffout of moving entity in real International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 13. Ms. Rajitha Nair, Mr. Vinod. U world Computer Science, Engineering and Information November- Scopus Technology (IJSRCSEIT) December 2019 Scopus Scopus 14. Mr. Gagan S Purad Productive scheduling of scientific workflows International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 Scopus utilizing multiple site awareness big data Computer Science, Engineering and Information November- UGC approved management in cloud Technology (IJSRCSEIT) December 2019 Mr Siva Balan N, Ashutosh Blocking Performance And Analysis Of Routing IEEE Xplore Date Added to Xplore ISBN: 978-1- Srivastava, Prithviraj P And Wavelength Assignment Using Shortest Path : 09 Jnauary ,2020 5386-9543-2 15. Routing Algorithm In All-Optical Network , 16. Ms Tinu N.S Data Models used in Bitcoin and Ethereum International Journal of Scientific Research in Volume 4, Issue 9, 2456-3307 Blockchain Platforms Computer Science, Engineering and Information November- Technology (IJSRCSEIT) December 2019 290 Ms. Deepika N, Dr. Detecting Text Anomalies in Social Networks International Journal of Engineering and Volume 8 Issue 6 17. Guruprasad N, Gayathri T using Different Machine Learning Algorithms Advanced Technology (IJEAT) ISSN:2249 Fashion sales prediction using data mining International Journal of Scientific Research in Volume 4, Issue Computer Science, Engineering and Information 9, November- 18. Ms. Gayathri T Technology (IJSRCSEIT) December 2019 2456-3307 19. Soja Rani S, S R Reeja A Survey on different approaches for malware Lecture notes on 978-3-030- detection using machine learning techniques Data Engineering 34515-0 and Communications Springer Technologies,Vol 39, 20. Ms.Uma.N,Dr. Prashanth C S A Detailed Analysis of the various frequent itemset Journal of Advanced Research in Dynamical and Volume 12, special ISSN, 1943023X R mining algorithms Control Systems - JARDCS Issue-2 21. S. Shanmuga Priya Smart Test Case Quantifier Based on MC/DC International Journal of Recent Technology and Volume 9 Issue 1 2277-3878 Coverage Criterion with UML Sequence Diagram Engineering 22. Dr.B. Meenakshi Sundaram, A Roadmap to Application Integration Using IoT International Journal of Psychosocial Volume 24 Issue 1475-7192 Dr.R.Thirukkumaran Cloud Platform Rehabilitation 5, May 2020 23. Dr Clara Kanmani A, Anusha S Implementation of abstractive summarization Advanced science letters Volume 26, Issue 6 E-ISSN-1936- using attentive recurrent neural network 7317
24. Manjunatha Swamy C Information Mining using Genetic Algorithm and International Journal of Innovative science Volume 6, Issue ISSN: 2348- 6.2 UGC Approved Bigdata Analytic Methodology Engineering and Technology IJISET 12 7968 3 UGC Approved 4.032 UGC Approved 25. Manjunatha Swamy C Web Content Mining Using Bio Inspired Algorithm International Journal of advanced research in Volume 6, Issue 1 ISSN: 2581- 4.032 UGC Approved science and technology 9429 4.032 UGC Approved An Overview on Cashier Free Checkout System International Journal of Scientific Research in Volume 4, Issue Computer Science, Engineering and Information 9, November- 26. Soja Rani S Technology (IJSRCSEIT) December 2019 2456-3307 27. Deepti Rai Timestamp and IP Address based Fraud International Journal of Scientific Research in Volume 4, Issue 2456-3307 Detection in Credit Cards using Hidden Markov Computer Science, Engineering and Information 9, November- Model Technology (IJSRCSEIT) December 2019 28. Deepti Rai Game Playing Agent Using Artificial Neural International Journal of Scientific Research in Volume 4, Issue 2456-3307 Network Computer Science, Engineering and Information 9, November- Technology (IJSRCSEIT) December 2019 Gradient flow-based deep residual networks for Journal of Ambient Intelligence and Humanized DOI: 29. Suganya R, Dr. R. Kanagavalli enhancing visibility of scenery images degraded Computing 10.1007/s12652-020- 1868-5137 4.594 Springer by foggy weather conditions 02225-2 Published on 30.06.2020 291 30. Kamatchi priya, Punyasri Review on Feature Selection for the Analysis of International Journal of Scientific Research in Volume 4, Issue 2456-3307 4.032 UGC Approved Human Activities and Postural Transitions on Computer Science, Engineering and Information 9, November- Smart Phone. Technology (IJSRCSEIT) December 2019 31. Prakruthi S , Gowri Prasad, Dr. Significance of Natural Language Processing in International Journal of Scientific Research in Volume 4, Issue 2456-3307 4.032 UGC Approved V. Hanuman Kumar Language Based Automated Systems and Computer Science, Engineering and Information 9, November- Intelligent Agents Technology (IJSRCSEIT) December 2019 32. Mrs.J.Karthiyayini , Dr. V. License Plate Recognition and Detection using International Journal of Scientific Research in Volume 4, Issue 2456-3307 4.032 UGC Approved Hanuman kumar Machine Learning Computer Science, Engineering and Information 9, November- Technology (IJSRCSEIT) December 2019 33. Puneet A Novel Approach to Share the Online Shopping International Journal of Scientific Research in Volume 4, Issue 2456-3307 4.032 UGC Approved Cart Items in the E-Commerce Apps with Anyone Computer Science, Engineering and Information 9, November- 7.87 Technology (IJSRCSEIT) December 2019 Indexed by PubMed, Google Scholar, Analyzing Various Techniques to Safeguard user Analyzing Various Techniques to Safeguard user Volume 9, Issue ScienceOpen and Sensitive Data OCLC 34. Mrs. K.Pramilarani, Sensitive Data 6, June2020 2278-0181 Dr.Vasanthi Kumari P
35. Jisha Mariam Jose, Kirti R Credit Card Reader with Face Recognition Using International Journal of Scientific Research in Volume 4, Issue 2456-3307 4.032 UGC Approved Nambiar, Vaibhavi Kulkarni Webcam Computer Science, Engineering and Information 9, November- 4.032 Technology (IJSRCSEIT) December 2019 2456-3307 UGC Approved 36. Teena A James, Darshan Recognition of Labels for Hand Drawn Images Scopus Kothawade International Journal of Scientific Research in Volume 4, Issue ISSN: 2231- On the Review of Dehazing Methods for Bad Computer Science, Engineering and Information 9, November- 5381 Scopus, SJR 37. R. Suganya & Dr.R. Weather Images Technology (IJSRCSEIT) December 2019 indexed, Google Kanagavalli Hybrid data model of pace and quadruple:an ISSN:1757- efficient data model for cloud computing International Journal of Engineering Trends and Special Issues - ICT 2665 scholar 38. A. Clara kanmani A Technology 2020 UGC approved International journal of computer aided Vol 13 No1/2, April Scopus Engineering and Technology 2020 UGC approved 39. Bhaskar S.V Efficient simulation of DCT architecture using International Journal of advanced research in Volume 5 , ISSN(2581- 6.646 CORDIC algorithm science and technology Issue 6 9429) UGC approved 40. Alpha Vijayan A review on various approaches for isolating side International Journal of advanced science and Volume 29 , Issue ISSN: 2005- Scopus Indexed 10 4238 effects causing drug elements technology UGC approved Scopus Safe-Ride : Automatic Recognition of Potholes International Journal of Scientific Research in Volume 4 Issue and Humps on Computer Science, Engineering and Information 9 UGC approved Anjana Sharma,Namratha.L Roads using Ultrasonic Sensor and Notifying the Technology ISSN : 2456- 292 41. Bemane,Soja Rani Same to the 3307 4.032 Drivers 42. Gayathri.T, Sivan Analyzing GraphQL and implementing the International Journal of Scientific Research in Volume 4 | Issue ISSN : 2456- 4.032 Chakravarthy framework on Computer Science, Engineering and Information 10 3307 Android devices Technology Dr. Vimal Kumar M N, Dr. Statistical Analysis on Novel Corona Virus: European Journal of Molecular & Clinical Vol 7, Issue 1 Medicine 43. JAYA R, Rubesh C M, Aakash COVID-19 ISSN: 95--103 Ram S Jisha Mariam Jose, Alankrita Natural Language Processing –Interaction International Journal of Scientific Research in Volume 4 Issue ISSN : 2456- 4.032 Srivastava, Hritik between Humans and Machines Computer Science, Engineering and Information 10 3307 44. Technology 45. Kamatchi Priya,Baranidharan Missing Data Imputation Method for Autism International Journal of Recent Technology and Volume-8 Issue-5 ISSN: 2277- Prediction Engineering (IJRTE) 3878, Dr. B. Meenakshi Sundaram, Volume 6, ISSN NO: Issue 6, 0972-1347 46. Ms. A. Sankaridevi, Dr. R. A holistic redesign of web elements using International Journal Of Information And Computing Science Jayakumar CATWOE analysis 5.2
47. Mohan Kumar.S Hotelling Transform Based Interference Mitigation Recent Trends in Programming Languages Volume 6, Issue 1 ISSN: 2455- Scopus in Software GPS Receivers 1821 UGC approved Dr.Prashanth C S R, Anand R International Journal of Scientific Research in IEEE Computer Science, Engineering and Information UGC approved 48. Patil, Nasir Hasan Dilawar, WeVote – Secure voting using Blockchain Technology Volume 4, Issue ISSN : 2456- 6.135 UGC approved Karthik M Bharadwaj, Edwin 10 3307 Free Open Journal UGC approved Benny UGC approved 49. Dr.Prashanth C S R, Dr. Efficient Resource Allocation with Score for Proceedings of the Second International IEEE Xplore Part ISBN: 978-1- UGC approved Vijayalakshmi A. Lepakshi Reliable Task Scheduling in Cloud Computing Conference on Innovative Mechanisms for Number: CFP20K58- 7281-4167-1 UGC approved Systems Industry Applications (ICIMIA 2020) ART 50. Savion Mario Sequeira, S. Overview of Use of Raspberry Pi in International Journal of Scientific Research in Volume 4 ISSN : 2456- 4.032 Shanmuga Priya Implementation of Machine Learning and Image Computer Science, Engineering and Information Issue 10 3307 Processing Technology 51. Moni Krithika S, S. Shanmuga International Journal of Scientific Research in Volume 4 Issue ISSN : 2456- 4.032 Priya Computer Science, Engineering and Information 11 3308 MoC++ Interpreter for the C++ Language Technology 52. S. Heyshanthinipandiya A Survey on Efficiency of an Image Encryption International Journal of Scientific Research in Vol.5, Issue.8 E-ISSN: 2454- Kumari, Anil Kumar Techniques Multidisciplinary Studies 9312 1.021 293 53. Madhushree N, Dr. R. International Journal of Scientific Research in Volume 6 Issue 3 ISSN : 2456- Thirukkumaran Computer Science, Engineering and Information 3307 Earthquake Prediction using Seismic Information Technology 6.135 54. Dr.Senbagavalli.M, Visualization of Enterprise Grade Cloud International Journal for Research in Vol-05, Issue-10, ISSN : 2454- 6.466 Dr.Vinodha.K, Dr.Jesudas.T Architecture for Engineering Application & 9150 the Most Cost-Effective Application Deployment Management(IJREAM) using Mining Tool 55. Dr Vinodha K A Reliability System for Filtering Malicious International Journal of Management, Volume X, Issue I ISSN NO : 6.3 Information on Social Network Technology And Engineering 2249-7455 56. Shalini Koyikkal, Anurag Efficient Buildings – A Key Element to Build Smart International Journal of Scientific Research in Volume 4 ISSN : 2456- 4.032 Rajshekar, Udhaya Cities Computer Science, Engineering and Information Issue 10 3307 Technology
New Horizon College of Engineering Department of Computer Science and Engineering Details of Google Scholar ID Link /Web of Science Researcher ID/ ORCID No. Sl. Name of the Faculty Designation Google Scholar ID Link with NHCE Affiliation Web of Science Researcher ORCID No. with NHCE Affiliation No ID with NHCE Affiliation Professor & HOD https://orcid.org/0000-0002-9570-5980 294 1 Dr. B Rajalakshmi Professor https://scholar.google.co.in/citations?user=wOGarZ8AAAAJ&hl=en ABB-5523-2020 https://orcid.org/0000-0002-4298-6993 2 Dr. Pamela Vinitha Eric Associate Prof https://scholar.google.co.in/citations?user=Tz--F08AAAAJ&hl=en ABB-4094-2020 https://orcid.org/0000-0001-9312-2549 3 Dr. Clara Kanmani A Associate Prof https://scholar.google.com/citations?user=5WfsNaYAAAAJ&hl=en ABB-5156-2020 https://orcid.org/0000-0002-9018-8128 4 Dr. Thirukkumaran R Associate Prof https://scholar.google.com/citations?user=wHli_xMAAAAJ&hl=en ABB-4982-2020. https://orcid.org/0000-0002-3925-4580 Associate Prof https://scholar.google.co.in/citations?user=2MR6QdkAAAAJ&hl=en ABB-4718-2020. https://orcid.org/0000-0002-2354-5885 5 Dr. Sridevi S Associate Prof https://scholar.google.com/citations?user=34Hq4pgAAAAJ&hl=en ABB-4708-2020 https://orcid.org/0000-0001-9176-4812?lang=en 6 Dr.Vinodha K Sr.Asst Prof https://scholar.google.com/citations?view_op=list_works&hl=en&user=YGssLt0AAAAJ ABE-4626-2020 https://orcid.org/0000-0001-9845-8754 7 Dr. Rachana P Associate Prof https://scholar.google.com/citations?user=sUBhsVEAAAAJ&hl=en&authuser=1 AAI-2976-2021 https://orcid.org/0000-0002-6626-1428 8 Dr. Jaya R Associate Prof https://scholar.google.com/citations?user=wPfjI8oAAAAJ&hl=en https://orcid.org/0000-0002-9323-9808 Associate Prof https://scholar.google.com/citations?hl=en&user=Zn7a16sAAAAJ ABB-7275-2020 https://orcid.org/0000-0002-1393-756X 9 Dr.Vaishali M Deshmukh Sr.Asst Prof https://scholar.google.com/citations?user=DnfcNAEAAAAJ&hl=en https://orcid.org/0000-0001-6095-9473 10 Dr.S J Subhashini Sr.Asst Prof https://scholar.google.com/citations?user=s1lU4wYAAAAJ&hl=en&authuser=1 ABB-5074-2020 https://orcid.org/0000-0003-0931-6450 11 Dr.Senthil Kumar R Sr.Asst Prof https://scholar.google.com/citations?user=ms1zU0oAAAAJ&hl=en https://orcid.org/0000-0001-9604-7804 12 Mr. Siva Balan N Sr.Asst Prof https://scholar.google.co.in/citations?user=rA3BMqEAAAAJ&hl=en https://orcid.org/0000-0001-7799-7046 13 Ms. Asha Rani Borah Sr.Asst Prof https://scholar.google.com/citations?user=8tIxdNsAAAAJ&hl=en https://orcid.org/0000-0002-2274-3759 Sr.Asst Prof https://scholar.google.co.in/citations?user=B-2hxQwAAAAJ&hl=en https://orcid.org/0000-0001-7241-4489 14 Ms. Shanmuga Priya S Sr.Asst Prof https://scholar.google.com/citations?user=eY_CkLcAAAAJ&hl=en https://orcid.org/0000-0003-2401-9585 15 Ms. Pramilarani K Sr.Asst Prof https://orcid.org/0000-0001-8608-8506 16 Ms. Alpha Vijayan Sr. Asst Prof https://scholar.google.co.in/citations?hl=en&user=NOwUyDYAAAAJ&view https://orcid.org/0000-0002-2432-2771 17 Ms. Soja Rani S Sr. Asst Prof https://scholar.google.com/citations?user=mfLioagAAAAJ&hl=en https://orcid.org/0000-0003-3891-5567 https://scholar.google.com/citations?user=C7QguQcAAAAJ&hl=en# 18 Mr. Santosh Kumar B Sr. Asst Prof https://scholar.google.com/citations?user=J0PZWHUAAAAJ&hl=en 19 Ms. Deepti Rai Sr. Asst Prof 20 Ms. Suganya.R Sr. Asst Prof https://scholar.google.com/citations?user=OB2c8oIAAAAJ&hl=en 0000-0002-6128-5690 https://orcid.org/0000-0002-6128-5690 21 Mr. Manjunatha Swamy Sr. Asst Prof https://scholar.google.com/citations?user=UL29BFAAAAAJ&hl=en ABB-4018-2020 https://orcid.org/0000-0002-9373-9036 Sr. Asst Prof https://scholar.google.com/citations?user=l27InEcAAAAJ&hl=en&authuser=1 ABB-4023-2020 https://orcid.org/0000-0001-6555-3683 C Sr.Asst Prof https://scholar.google.com/citations?hl=en&authuser=1&user=3HH_K84AAAAJ ABB-3996-2020 https://orcid.org/0000-0002-8430-5391 Asst Prof 2 https://scholar.google.com/citations?user=gSfkAZ0AAAAJ&hl=en ABB-5131-2020 https://orcid.org/0000-0002-5526-4308 22 Ms. Uma N Asst Prof 2 https://scholar.google.com/citations?hl=en&user=JKiw6xAAAAAJ https://orcid.org/0000-0003-0586-170X 23 Ms. Rajitha Nair Asst Prof 2 https://scholar.google.co.in/citations?user=SKZ5vd0AAAAJ&hl=en ABB-5042-2020 https://orcid.org/0000-0003-1822-9180 24 Mr. Praveen Pawaskar Asst Prof 2 https://scholar.google.com/citations?user=nXhQ3fQAAAAJ&hl=en&authuser=1 https://orcid.org/0000-0002-5519-6720 25 Ms. Subhashree Rath Asst Prof 1 https://scholar.google.com/citations?user=hZvJ5nEAAAAJ&hl=en ABB-4298-2020 https://orcid.org/0000-0002-3711-6942 26 Mr.K Kiran Kumar Asst Prof 1 https://scholar.google.com/citations?view_op=list_works&hl=en&user=GByQdLgAAAAJ https://orcid.org/0000-0001-6589-2853 https://scholar.google.com/citations?user=SaCtS-UAAAAJ&hl=en https://orcid.org/0000-0003-4934-910X 27 Mr.Dinesh G https://scholar.google.com/citations?hl=en&user=n3MKkUAAAAAJ https://orcid.org/0000-0002-5634-2451 28 Ms. Yogitha 29 Mr. Bhaskar S V 30 Ms. Tinu N S 31 Ms. Chempavathy 32 Ms. Lakshmi S Hanne 33 Ms.Harshitha H
GREEN INITIATIVES 295
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304