1. A DEVELOPMENT OF AUTOMATIC DETECTION AND CLASSIFICATION OF SKIN DISEASE IN MEDICAL IMAGING USING KNN

Authors -  Shilpa. R, D. Jeyamani

Abstract : Skin is the most sensitive part of the body therefore we need a special attention. This research is related to detect skin disease, such as acne, psoriasis etc. In general this type of disease can become more dangerous if it is not controlled at an earlier stage. This research will provide a facility to user for determining the skin disease based on symptoms. In this research the data processing of patients is using KNN (Neural Network) which has recently achieved very promising results in a wide range of areas such as computer vision, speech recognition and natural language processing. It aims to learn hierarchical representations of data by using KNN. In a skin disease detection system, images need to be automatically processed and analyzed. In this paper, we review the KNN algorithms applied to infected skin images of humans in terms of different research topics: skin image detection, image processing, and image recognition and image classification.

Keywords : BSNL, Liberalization, Globalization

PDF - Download Full Article

2. AUTONOMOUS LOW POWER IoT BASED SOLAR PANEL CLEANING SYSTEM

Authors -  Keerthi.K.G, C.S.Agustin Vijay

Abstract : In a world of increasing population, and increased usage of devices, factories, electric cars, the rise of electric power consumption is inevitable. Currently, the energy industry is heading towards a more environmental friendly means of producing electricity. Solar power plants can have installed powers from tens of kilowatts up to hundreds of Megawatts. It is shown that based on the irradiate power of the sun, on the efficiency of solar cells (of 10-20%) and on the efficiency of conversion of DC to AC, it takes on average about 1.5-4 hectares (dependent on the geographical and meteorological position and conditions) for producing 1MW of electrical power. Although their wide availability and ease of use, solar panels are affected by one of the most common environmental factors: dust. Dust accumulation has a considerable effect on the power production, reducing power output down to 50% or even less. To overcome the effect of particle accumulation on solar panels, different kind of cleaning methods are used, depending on the dimensions of the solar plant. Cleaning by using human operator, semi-automated cleaning system (that requires the intervention of human operators but the operation itself is done automatically) or fully automated cleaning systems (that automatically asses the conditions and the necessity of the cleaning procedure). In this paper, an autonomous solar panel cleaning system is developed which can be controlled through wireless communication. The system uses several sensors to analyze the working of solar panel and rolling brushes are used to clean the panel.

Keywords : Wireless Sensor Network, Lion Optimization Algorithm (LOA), Metaheuristic.

PDF - Download Full Article

6. SECURED VEHICLE CONTROL SYSTEM USING IOT

Authors -  B.Dhivya, K.Annam, A.Barakathunisha, R.Kowsalya, R.Lakshmi

Abstract : Internet of things (IOT) is the most trending and emerging technology that changes lifestyle of human being. IOT provides enormous applications in healthcare system, environment monitoring, transportation system and other commercial areas. The first and foremost objective of the paper is to innovate a Smart Vehicle Security Framework (SVSF) using IOT.IOT works on the principle of sensor applications. Sensors are used to monitor, and control real world objects etc., In the existing system the ignition of the moped can be done using remote or key whereas in the proposed system ignition can be done using voice commands through android application. The proposed system helps to control vehicles remotely through smart phones via applications. The smart vehicle security framework IOT which utilizes Radio Frequency Identification (RFID), Global Positioning (GPS), Global System for Mobile communication (GSM), Wi-Fi Technology, Remote correspondence and Cloud to prevent theft . The smart vehicle security system ignites by voice Commands through mobile application to avoid the necessity of vehicle key.

Keywords : Smart Vehicle Security Framework (SVSF), Radio Frequency Identification (RFID), Global Positioning System (GPS), Global System for Mobile Communication (GSM), voice commands.

PDF - Download Full Article

7. EVALUATING PERFORMANCE OF DYNAMIC SCALING MECHANISM USING FOG COMPUTING

Authors -  K. Aruna, M. Poonguzhali, R. Divya

Abstract : Amount of internet users are increased day by day.  the internet has been faced some problem based on the performance like network traffic, high latency, low scalability, low performance etc, in our project we done  a process to improve the network performance  and scalability for reducing  the network traffic and also improve the  scalability  using fog computing . in project we have to plan to implement the fog node to produce interaction between the fog nodes. and specifically use algorithm to improve the scalability .the algorithm uses A  mechanism to dynamically scale in/out the serving instances of the middle nodes in order to
make the whole M2M platform more scalable. Comparing the performance of our dynamic scaling mechanism with those based on a static and fixed pool of serving instances Inside the fog computing.

Keywords : Scalability, fog computing,  IOT..

PDF - Download Full Article

8. DYNAMIC RESOURCE ALLOCATION IN MOBILE CLOUD COMPUTING

Authors -  M.Chitra, Dr. R. Latha, R. Aravindvignesh, S. Vinothkumar

Abstract : This Over the previous decade, mobile devices have become popular among people, and their number is ever growing because of the computing functionality they further than primary However, mobile devices are unable to accommodate most of the compute demand as long as they sure the limited energy supply caused by the capacity of their small battery to store only a relatively Describes several specialist techniques projected in academia and industry that save the mobile device energy and solve this quandary to some extent but not satisfactorily. Task loading from mobile devices to cloud computing is a promising technique for tackling the problem especially with the emergence of high-speed wireless networks and the ubiquitous Since task .Our frame is built to be pertinent to modern transportable devices and expandable Experimental validation prove that our framework is practical to real life scenarios. Our frame is built to be pertinent to modern transportable devices and expandable by Considering all system parameters that have impact on the off loading decision. Experimental validation prove that our framework is practical to real life scenarios.

Keywords : Cloud computing, energy, task loading, battery, mobile device.

PDF - Download Full Article

9. DEEP LEARNING APPROACH FOR STRESS DETECTION BASED ON SOCIAL INTERACTIONS

Authors -  Dr. Y.Pavan Kumar Reddy, T.Lakshmi Priya

Abstract : Deep Learning methods are widely used in automation technology in this decade. This used in self driving cars, health care, voice search, automatic text generation , Image Recognition, Image caption generation, advertising, predicting earth quakes, Brain cancer detection, finance, market price forecasting  and many more. This paper we are using Deep Reinforcement learning (DRL), Support Vector Machine (SVM) methods for human stress detection based on social Interactions. Deep Reinforcement Learning is the used variety of a neural network which learns by communicates with its environment via interpretation, actions, and rewards. DRL has been successfully used to determine human strategies. DRL is essential as it is among the most general purpose learning techniques that you can use for developing business applications. It also requires significantly less data for training models. Another advantage is that you can train it by using simulation. This completely removes the need for labeled data.

Keywords : Deep Reinforcement learning (DRL), Support Vector Machines (SVM), Deep Leaning, Social Interactions.

PDF - Download Full Article

3. WIRELESS COMMUNICATION BASED ANTENNA RADIATION REDUCING SYSTEM

Authors -  S.Sivakumar, G.Preethi, K.Priyanka, K.Rasika

Abstract : Mobile phones can be an essential means of communication when we are away from the office or home and it can be an important security asset in the event of an emergency. All over the world, people have been debating about associated health risk due to radiation from cell phone and cell tower. These cell towers transmit radiation 24x7, so people living within 10’s of meters from the tower will receive 10,000 to 10,000,000 times stronger signal than required for mobile communication. Children’s, adults, and birds are more vulnerable to cell phone radiation.  So our project gives a solution to avoid more towers. In this project, Stochastic Geometry Modeling and system-level analysis for design the uplink heterogeneous cellular networks with multiple frequencies at the base station (BS) are presented. We develop multiple frequencies in single tower to reduce the radiation.

Keywords : Mobile phones, Base Station, Cellular Networks

PDF - Download Full Article

4. REAL TIME MONITORING AND VALIDATION OF DRIVING PATTERN RECOGNITION SYSTEM

Authors -  Sivakumar.S, Bavadharini.M, Dhivyadarshini.J, Durga.S,  Nathiya.K

Abstract : This project focuses on automatic riding pattern recognition based on a machine-learning approach. The proposed methodology considers the multivariate aspect of the data and the mechanical correlation between the different parameters measured on a two wheeler.  Real experiments are conducted by different subjects driving two wheelers instrumented with accelerometers, gyroscopes, and vehicle sensors.  The riding pattern recognition problem is then formulated as a classification problem to identify the class of the riding pattern from the measurements provided by   3-D accelerometer/gyroscope sensors mounted on the motor cycle. This project also focuses on implementing Co emission monitoring and reporting system in the Transport vehicle.

Keywords : machine-learning, 3-D accelerometer, gyroscope sensors

PDF - Download Full Article

5. SECURING THE NATIONAL PRIDE (WOMEN SAFETY) BY USING IoT

Authors -  Sivakumar.S, Bavadharini.M, Dhivyadarshini.J, Durga.S,  Nathiya.K

Abstract : Women’s security is a problematic thing in today’s world and it’s essential for every individual to be acting over such an issue. In today’s world there is no assurance for the safety of women, they are facing more number of circumstances like abductions, sexual pestering, & physical attack. Because of these reasons women’s can’t step outside. The crucial query in the mind of every women taking into account is the increase of problems on women pestering in the past, is only about their secured life. The only thing lingering every Women is when they feel free to move on without perturbing about their security even in night hours. When they are having any device in that particular situation they could not feel insecure. In most of the existing systems, they came with smart devices but it will be useful to send the location. With the aid of our proposed system girls & women could stay out without any fear at any time. The system consists of PIC Microcontroller, IoT, PC and Sensors (heart beat sensor, temperature sensor, connectivity sensor, PIR sensor), vibration motor, spray bottle and make use of wireless communication devices. This scheme can be used at any locations like bus stops, railway stations, footpaths, shopping malls, markets, etc. This project aims on Women’s Safety system which is useful for women after sent their location details. By using special sensor the controller will activate the whole device to safeguard themselves.

Keywords : PIC Microcontroller, IoT, PC and Sensors

PDF - Download Full Article
ISSN (Online): 2348-3105 | ISSN (Print): 2347-6729
Under the aegis of Pranavam Educational & Scientific Public Charitable Trust®
(An ISO 9001:2015 certified)
INTERNATIONAL JOURNAL ON RECENT RESEARCHES IN SCIENCE, ENGINEERING & TECHNOLOGY (IJRRSET)
Copyright @ Pranavam Publications. All rights reserved.