Sei sulla pagina 1di 159

IEEE 2014 PROJECT LIST

ECE/E&I/ETC/EMBEDDED DEPARTMENT
SPECTRUM SOLUTIONS

COMPANY DETAIL:
SPECTRUM SOLUTIONS is a Pondicherry based R&D firm which always looks forward in
the field of science and technology to provide best technical support for the final year students.
SPECTRUM has a great team of technical experts for the design development of Electronic and software
Systems using Embedded, MATLAB, Java, Dot Net Technology.

SPECTRUM SOLUTIONS always concentrate us to provide quality products for various
institutions and students. We offer the projects in all domains for the students of Diploma,
B.Tech/B.E,M.Tech/M.E,MS,BCA,MCA etc. Our major concern is in the field of technical education to
bridge the gap between Industry and Academics. We are always in the good eyes of the Educational
Institutions in India to provide training & projects in Embedded Systems MATLAB and software
technologies. We also provide interview training for free of cost. We never stop in going that extra mile
ahead in providing greater value to own ideas of students, may it be in terms of providing adequate
workforce proficient in highly application cost oriented Embedded Systems or Software Systems.

EDUCATIONAL PARTNER:

International Journal of Research in Engineering and Advanced Technology (IJREAT)












OUR FEATURES FOR STUDENTS:

1. 10 Days technical Project classes with practical.
2. 5 Days personality development classes.
3. Paper presentation guidance.
4. Individual Certificates.
5. Weekend Classes.
6. Students help with their job search queries.
7. Lower project cost without hampering the quality.
8. Project delivery on time.
POJECTS FOR - : B.Tech /B.E ,M.Tech/M.E,M.S,DIPLOMA,BCA,MCA
MAIL ID : spectrumpondichery@gmail.com
WEBSITE : www.spectrumpondicherry.blogspot.in/
FACEBOOK : https://www.facebook.com/pages/Spectrum-Solutions/548721691855495?ref=hl
LANDLINE NO : 0413-2618850
MOBILE NO : 9381775781
ADDRESS : SPECTRUM SOLUTIONS
E-Mail: spectrumpondicherry@gmail.com
Contact: 0413-2618850, 9381775781
No-66,1st Floor
Near Rogini Nagar Govt Hospital
Poornankuppam
Pondicherry-07













No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

4

CONTENT

S.NO TITLE PAGE NO
1 ELECTRONICS & COMMUNICATION 5
EMBEDDED 5-55
MATLAB IMAGE PROCESSING 56-69
MATLAB DSP/COMMUNICATION 70-73
ANDROID 74-81
2 INFORMATION TECHNOLOGY & COMPUTER SCIENCE 82
JAVA DOTNET 82-108
3 MECHANICAL 109
MECHATRONICS 109-130
4 ELECTRICAL & ELECTRONICS 131-158



No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

5

ELECTRONICS & COMMUNICATION
EMBEDDED
APPENDIX:
E = Embedded
I = Instrumentation
B = Biomedical
W = Wireless
M = Mechatronics
G = Gesture base
R = Robotics
S.No Code Title Year Abstract
1 EIA-01 Flexible Indoor
Localization and
Tracking Based
on a Wearable
Platform and
Sensor Data
Fusion
2014 Indoor localization and tracking of moving human
Targets are a task of recognized importance and
difficulty. In this paper, we describe a position
measurement technique based on the fusion of various
sensor data collected using a wearable embedded
platform. Since the accumulated measurement
uncertainty affecting inertial data (especially due to
the on-board accelerometer) usually makes the
measured position values drift away quickly, a
heuristic approach is used to keep velocity estimation
uncertainty in the order of a few percent. As a result,
unlike other solutions proposed in the literature,
localization accuracy is good when the wearable
platform is worn at the waist. Unbounded uncertainty
growth is prevented by injecting the position values
collected at a very low rate from the nodes ofan
external fixed infrastructure (e.g., based on cameras)
into an extended Kalman filter. If the adjustment rate
is in the order of several seconds and if such
corrections are performed only when the user is
detected to be in movement, the infrastructure
remains idle most of time with evident benefits in
terms of scalability. In fact, multiple platforms could
work simultaneously in the same environment without
saturating the communication channels.
2 EIA-02 Monitoring of
Oxygen Content
in the Flue Gas
at a Coal-Fired
Power Plant Using
Cloud Modeling
Techniques
2014 The accurate measurement of oxygen content in the
flue gas at a coal-fired power plant is important for the
plant operators to realize closed-loop and optimal
control. In this paper, eight zirconium oxygen
analyzers were used to measure the oxygen content in
the flue gas under real plant conditionsA cloud model
is incorporated into the measurement system.
Inconsideration of the temporal and spatial
characteristics of the oxygen sensors, a quantitative
transformation fusion model based on the cloud model

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

6

theory is established. The oxygen content in the flue
gas is calculated using mean value, space fusion, and
spacetime fusion methods, respectively. The
temperatures of both flue gas and cold air are also
measured to calculate the heatless of the flue gas and
the combustion efficiency of the boiler. On-plant
demonstration results show that the proposed method
produces more accurate measurements than those
from the mean value method, leading to increased
combustion efficiency and Reduced heat loss.
3 EIA-03 Enhanced Three-
factor Security
Protocol for
Consumer USB
Mass Storage
Devices
2014 The Universal Serial Bus (USB) is an extremely
popular interface standard for computer peripheral
connections and is widely used in consumer Mass
Storage Devices (MSDs). While current consumer USB
MSDs provide relatively high transmission speed and
are convenient to carry, the use of USB MSDs has been
prohibited in many commercial and everyday
environments primarily due to security concerns.
Security protocols have been previously proposed and
a recent approach for the USB MSDs is to utilize
multi-factor authentication. This paper proposes
significant enhancements to the three-factor control
protocol that now makes it secure under many types of
attacks including the password guessing attack, the
denial-of-service attack, and the replay attack. The
proposed solution is presented with a rigorous security
analysis and practical computational cost analysis to
demonstrate the usefulness of this new security
protocol for consumer USB MSDs1.
4 EIA-04 Autonomic
Intelligent Cyber
Sensor to Support
Industrial Control
Network
Awareness
2014 The proliferation of digital devices in a networked
industrial
Ecosystem, along with an exponential growth in
complexity and scope, has resulted in elevated security
concerns and management complexity issues. This
paper describes a novel architecture utilizing concepts
of autonomic computing and a simple object access
protocol (SOAP)-based interface to metadata access
points (IF-MAP) external communication layer to
create a network security sensor. This approach
simplifies integration of legacy software and supports
a secure, scalable, and self-managed framework. The
contribution of this paper is twofold: 1) A flexible two-
level communication layer based on autonomic
computing and service oriented architecture is detailed
and 2) three complementary modules that dynamically
reconfigure in response to a changing environment are
presented. One module utilizes clustering and fuzzy
logic to monitor traffic for abnormal behavior.
Another module passively monitors network traffic
and deploys deceptive virtual network hosts. These
components of the sensor system were implemented in

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

7

C++ and PERL and utilize a common internal D-Bus
communication mechanism. A proof of concept
prototype was deployed on a mixed-use test network
showing the possible real-world applicability. In
testing, 45 of the 46 network attached devices were
recognized and 10 of the 12 emulated devices were
created with specific operating system and port
configurations. In addition, the anomaly detection
algorithm achieved a 99.9% recognition rate. All
output from the modules were correctly distributed
using the common communication structure.
5 EIA-05 Feature Selection
and Activity
Recognition
System Using a
Single Tri-axial
Accelerometer
2014 Activity recognition is required in various applications
Such as medical monitoring and rehabilitation.
Previously developed activity recognition systems
utilizing tri-axial accelerometers have provided mixed
results, with subject-to-subject variability. This paper
presents an accurate activity recognition system
utilizing a body worn wireless accelerometer, to be
used in the real life application of patient monitoring.
The algorithm utilizes data from a single, waist-
mounted tri-axial accelerometer to classify gait events
into six daily living activities and transitional events.
The accelerometer can be worn at any location around
the circumference of the waist, thereby reducing user
training. Feature selection is performed using Relief-F
and sequential forward floating search (SFFS) from a
range of previously published features, as well as new
features introduced in this paper. Relevant and robust
features that are insensitive to the positioning of
accelerometer around the waist are selected. SFFS
selected almost half the number of features in
comparison to Relief-F and provided higher accuracy
than Relief-F. Activity classification is performed
using Nave Bayes and k-nearest neighbor (k-NN) and
the results are compared. Activity recognition results
on seven subjects with leave-one-person-out error
estimates show an overall accuracy of about 98% for
both the classifiers. Accuracy for each of the individual
activity is also more than 95%.
6 EIA-06 Experiential
Learning of
Digital
Communication
Using Lab VIEW
2014 This paper discusses the design and implementation of
laboratories and course projects using Lab VIEW in
an Instrumentation course. The pedagogical challenge
is to enhance students learning of digital
communication using Lab VIEW. Lab VIEW was
extensively used in the laboratory sessions, which
better prepared students for the course projects. Two
course projects were designed to familiarize the
students with virtual instrumentation, data
acquisition, Modbus communication, and simple
closed-loop control. One project involved the
instrumentation and control of a brushed dc

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

8

permanent magnet motor; the other involved the
instrumentation and control of a small-scale
temperature chamber. Students used one computer,
functioning as a Modbus slave, to measure the motor
speed or temperature inside the chamber and to turn
the motor or light bulbs on and Off. Another
computer, functioning as a Modbus master, reads the
measurements using Modbus communication protocol
via RS-485 wires, compared the measurements to the
set points, made control decisions, and sent the
commands to the Modbus slave for actuation. The
effectiveness of student learning is analyzed using
student survey data.
7 EIA-07 Portable
Grounding
Impedance Meter
Based on DSP
2014 A new grounding impedance measuring system based
on digital signal processor (DSP) platform was
developed. The low-cost portable device includes a
built-in voltage impulse generator, nonvolatile
memory for storage of measured current and voltage
waves and a graphical display for fast data
visualization. General hardware structure overview
and software implementation are discussed. Consistent
preliminary field-test results were provided by the
measuring system, consisting of records of grounding
potential rise and impressed current, impulse
impedance, and estimated low-frequency grounding
resistance obtained for different electrode
arrangements buried in low- and high-resistivity soils.
8 EIA-08 Communication-
Based Train
Control (CBTC)
Systems With
Cooperative
Relaying: Design
and Performance
Analysis
2014 A communication-based train control (CBTC) system
is an automated train control system using
bidirectional ltrainground communications to ensure
the safe operation of Rail vehicles. CBTC systems have
stringent requirements for communication availability
and latency. Most existing CBTC Trainground
communication systems work in the infrastructure
mode without traintrain communications. Due to
unreliable wireless communications and frequent
handoffs, existing CBTC systems can severely affect
train control performance, train operation efficiency,
and the utility of the railway. In this paper, we use
recent advances in cooperative relaying to enable
traintrain communications and, consequently,
enhance the train control performance of CBTC
systems. Trains act not only as end communication
points but as relays for other trains as well. Unlike
existing works on cooperative relaying, in this paper,
linear quadratic cost for the train control performance
in CBTC systems is considered as the performance
measure. We jointly consider cooperative relaying and
handoff decision issues in CBTC systems. Moreover, to
mitigate the impacts of handoff latency on the train
control performance, we propose an optimal guidance

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

9

trajectory calculation scheme in the train control
procedure that takes full consideration of the tracking
error caused by handoff latency. Simulation results
show that the train control performance can be
substantially improved in our proposed CBTC system
with cooperative relaying.
9 EIA-09 Data Fusion and
Fault Diagnosis
for Flexible
Arrayed pH
Sensor
Measurement
System
Based on Lab
VIEW
2014 This paper concerns the data fusion (DF) and fault
diagnosis (FD), which could increase the reliability of
measured results when one sensing window was faulty.
The flexible arrayed pH sensor was fabricated by
radio frequency sputtering system and screen-printed
technology, which the ruthenium dioxide was
deposited on the polyethylene terephthalate substrate
as sensitive membranes and the miniature reference
electrodes were fabricated by screen-printed
technology. We measured pH buffer solutions for five
times and the flexible arrayed pH sensor had a Wide
sensing range of pH 113 solutions. The average
sensitivity and linearity were 47.70 mV/pH and 0.839,
respectively. We used the Laboratory Virtual
Instrumentation Engineering Workbenchto do
deficient diagnosis which could remove the fault
sensing window. The average DF with FD, self-
adaptive data fusion with FD and coefficient of
variance data fusion with FD could increase sensitivity
and linearity 22% and 0.14, respectively.
10 EBA-01 Non-invasive
Respiration Rate
Monitoring
Using a Single
COTS TX-RX
Pair
2014 Respiratory rate is an important vital sign that can
indicate progression of illness but to also predict rapid
decline in health. For the purpose, non-contact
monitoring systems are becoming more popular due to
the self-evident increase in patient comfort. As a cost
effective solution for non-invasive breathing
monitoring, utilizing the received signal strength
measurements of inexpensive transceivers has been
proposed. However, the applicability of the available
solutions is limited since they rely on numerous
sensors. In this work, considerable improvement is
made, and a respiratory rate monitoring system based
on a single commercial off-the-shelf transmitter-
receiver pair is presented. Methods that enable
estimation and enhance the accuracy are presented
and their effects are evaluated. Moreover, is
empirically demonstrated that the performance of the
system is comparable to the accuracy of a high-end
device for 3-4orders of magnitude less price; achieving
mean absolute error of 0.12 breaths per minute in the
most realistic scenario of the experiments.
11 EBA-02 Brain Waves for
Automatic
Biometric-Based
User Recognition
2014 Brain signals have been investigated within the
medical field for more than a century to study brain
diseases like epilepsy, spinal cord injuries,
Alzheimers, Parkinsons, Schizophrenia and stroke

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

10

among others. They are also used in both brain
computer and brain machine interface systems with
assistance, rehabilitative, and entertainment
applications. Despite the broad interest in clinical
applications, the use of brain signals has been only
recently investigated by the scientific community as a
biometric characteristic to be used in automatic people
recognition systems. However, brain signals present
some peculiarities, not shared by the most commonly
used biometrics ,such as face, iris, and fingerprints,
with reference to privacy compliance, robustness
against spoofing attacks, possibility to perform
continuous identification, intrinsic live misdetection
and universality. These peculiarities make the use of
brain signals appealing. On the other hand, there are
many challenges which Need to be properly addressed.
The understanding of the level of uniqueness and
permanence of brain responses, the design of
elicitation protocols, and the invasiveness of the
acquisition process are only few of the challenges
which need to be tackled. In this paper, we further
speculate on those issues, which represent an obstacle
toward the deployment of biometric systems based on
the analysis of brain activity in real life applications
and intend to provide a critical and comprehensive
review of state-of-the-art Methods for
electroencephalogram-based automatic user
recognition, also reporting neuro-physiological
evidences related to the performed claims.
12 EBA-03 Soft Biometrics
and Their
Application in
Person
Recognition at a
Distance
2014 Soft biometric information extracted from a human
body (e.g., height, gender, skin color, hair color, and so
on) is ancillary information easily distinguished at a
distance but it is not fully distinctive by itself in
recognition tasks. However, this soft information can
be explicitly fused with biometric recognition systems
to improve the overall recognition when confronting
high variability conditions. One significant example is
visual surveillance, where face images are usually
captured in poor quality conditions with high
variability and automatic face recognition systems do
not work properly. In this scenario, the soft biometric
information can provide very valuable information for
person recognition. This paper presents an
experimental study of the benefits of soft biometric
labels as ancillary information based on the
description of human physical features to improve
challenging person recognition scenarios at a distance.
In addition, we analyze the available soft biometric
information in scenarios of varying distance between
camera and subject. Experimental results based on the
Southampton multi-biometric tunnel database show

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

11

that the use of soft biometric traits is able to improve
the performance of face recognition based on sparse
representation on real and ideal scenarios by adaptive
fusion rules.
13 EBA-04 RFID Technology
for IoT-Based
Personal
Healthcare in
Smart Spaces
2014 The current evolution of the traditional medical model
toward the participatory medicine can be boosted by
the Internet of Things (IoT) paradigm involving
sensors (environmental, wearable, and implanted)
spread inside domestic environments with the purpose
to monitor the users health and activate remote
assistance. RF identification (RFID) technology is now
mature to provide part of the IoT physical layer for
the personal healthcare in smart environments
through low-cost, energy-autonomous, and Disposable
sensors. It is here presented a survey on the state-of
the-art of RFID for application to body centric systems
and for gathering information (temperature, humidity,
and other gases) about the users living environment.
Many available options are described up to the
application level with some examples of RFID systems
able to collect and process multichannel data about the
human behavior in compliance with the power
exposure and sanitary regulations. Open challenges
and possible new research trends are finally discussed.
14 EBA-05 Novel Electrodes
for Underwater
ECG Monitoring
2014 We have developed hydrophobic electrodes that
provide all morphological waveforms without
distortion of an ECG signal for both dry and water-
immersed conditions. Our electrode is comprised of a
mixture of carbon black powder (CB) and poly
dimethylsiloxane(PDMS). For feasibility testing of the
CB/PDMS electrodes, various tests were performed.
One of the tests included evaluation of the electrode-
to-skin contact impedance for different diameters,
thicknesses, and different pressure levels. As expected,
the larger the diameter of the electrodes, the lower the
impedance and the difference between the large sized
CB/PDMS and the similarly-sized Ag/AgCl hydrogel
electrodes was at most 200 k, in, in favor of the
latter. Performance comparison of CB/PDMS
electrodes to Ag/AgCl hydrogel electrodes was carried
out in three different scenarios: a dry surface, water
immersion, and post water immersion conditions. In
the dry condition, no statistical differences were found
for both the temporal and spectral indices of the heart
rate variability analysis between the CB/PDMS and
Ag/AgCl hydrogel (p > 0.05) electrodes. During water
immersion, there was significant ECG amplitude
reduction with CB/PDMS electrodes when compared
to wet Ag/AgCl electrodes kept dry by their
waterproof adhesive tape, but the reduction was not
severe enough to obscure the readability of the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

12

recordings, and all morphological waveforms of the
ECG signal were discernible even when motion
artifacts were introduced. When water did not
penetrate tape-wrapped Ag/Ag Cl electrodes, high
fidelity ECG signals were observed. However, when
water penetrated the Ag/Ag Cl electrodes, the signal
quality degraded\ to the point where ECG
morphological waveforms were not discernible.
15 EBA-06 ERNN: A
Biologically
Inspired Feed
forward
Neural Network to
Discriminate
Emotion
from EEG Signal
2014 Emotions play an important role in human cognition,
perception, decision making, and interaction. This
paper presents a six-layer biologically inspired feed
forward neural network to discriminate human
emotions from EEG. The neural network comprises a
shift register memory after spectral filtering for the
input layer, and the estimation of coherence between
each pair of input signals for the hidden layer. EEG
data are collected from 57 healthy participants from
eight locations while subjected to audio-visual stimuli.
Discrimination of emotions from EEG is investigated
based on valence and arousal levels. The accuracy of
the proposed neural network is compared with various
feature extraction methods and feed forward learning
algorithms. The results showed that the highest
accuracy is achieved when using he proposed neural
network with a type of radial basis function.
16 EBA-07 An Enhanced Fall
Detection System
for Elderly Person
Monitoring
using Consumer
Home Networks
2014 Various fall-detection solutions have been previously
proposed to create a reliable surveillance system for
elderly people with high requirements on accuracy,
sensitivity and specificity. In this paper, an enhanced
fall detection system is proposed for elderly person
monitoring that is based on smart sensors worn on the
body and operating through consumer home networks.
With treble thresholds, accidental falls can be detected
in the home healthcare environment. By utilizing
information gathered from an accelerometer, cardio
tachometer and smart sensors, the impacts of falls can
be logged and distinguished from normal daily
activities. The proposed system has been deployed in a
prototype system as detailed in this paper. From a test
group of 30 healthy participants, it was found that the
proposed fall detection system can achieve a high
detection accuracy of 97.5%, while the sensitivity and
specificity are96.8% and 98.1% respectively.
Therefore, this system can reliably be developed and
deployed into a consumer product for use as an elderly
person monitoring device with high accuracy and a
low false positive rate1.
17 EBA-08 Assistive Clothing
Pattern
Recognition
for Visually
2014 Choosing clothes with complex patterns and colors is a
challenging task for visually impaired people.
Automatic clothing pattern recognition is also a
challenging research problem due to rotation, scaling,

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

13

Impaired People illumination, and especially large infraclass pattern
variations. We have developed a camera-based
prototype system that recognizes clothing patterns in
four categories (plaid, striped, pattern less, and
irregular) and identifies 11 clothing colors. The system
integrates a camera, a microphone, a computer, and a
Bluetooth earpiece for audio description of clothing
patterns and colors. A camera mounted upon a pair of
sunglasses is used to capture clothing images. The
clothing patterns and colors are described o blind
users verbally. This system can be controlled by speech
input through microphone. To recognize clothing
patterns, we propose a novel Radon Signature
descriptor and a schema to extract statistical
properties from wavelet sub bands to capture global
features of clothing patterns. They are combined with
local features to recognize complex clothing patterns.
To evaluate the effectiveness of the proposed
approach, we used the CCNY Clothing Pattern
dataset. Our approach achieves 92.55% recognition
accuracy which significantly outperforms the state-of-
the-art texture analysis methods on clothing pattern
recognition. The prototype was also used by ten
visually impaired participants. Most thought such a
system would support more independence in their
daily life but they also made suggestions for
improvements.
18 EBA-09 Wireless and
Wearable EEG
System for
Evaluating Driver
Vigilance
2014 Brain activity associated with attention sustained on
the task of safe driving has received considerable
attention recently in many neurophysiological studies.
Those investigations shave also accurately estimated
shifts in drivers levels of arousal, fatigue, and
vigilance, as evidenced by variations in their task
performance, by evaluating electroencephalographic
(EEG) changes. However, monitoring the
neurophysiological activities of automobile drivers
poses a major measurement challenge when using a
laboratory-oriented biosensor technology. This work
presents a novel dry EEG sensor based mobile wireless
EEG system (referred to herein as Mind) to monitor in
real time a drivers vigilance status in order to link the
fluctuation of driving performance with changes in
brain activities. The proposed Mind system
incorporates the use of a wireless and wearable EEG
device to record EEG signals from hairy regions of the
driver conveniently. Additionally, the proposed system
can process EEG recordings and translate them into
the vigilance level. The study compares the system
performance between different regression models.
Moreover, the proposed system is implemented using
JAVA programming language as a mobile application

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

14

for online analysis A case study involving 15 study
participants assigned a 90 min sustained-attention
driving task in an immersive virtual driving
environment demonstrates the reliability of the
proposed system. Consistent with previous studies,
power spectral analysis results confirm that the EEG
activities correlate well with the variations in vigilance.
Furthermore, the proposed system demonstrated the
feasibility of predicting the drivers vigilance in real
time.
19 EBA-10 A Tactile
Stimulation
Device for EEG
Measurements in
Clinical Use
2014 A tactile stimulation device for EEG measurements in
clinical environments is proposed. The main purpose
of the tactile stimulation device is to provide tactile
stimulation to different parts of the body. To stimulate
all four major types of mechanoreceptors, different
stimulation patterns with frequencies in the range of
5250 Hz have to be generated. The device provides
two independent channels, delivers enough power to
drive different types of electromagnetic transducers, is
small and portable, and no expensive components are
required to construct this device. The generated
stimulation patterns are very stable, and deterministic
control of the device is possible. To meet electrical
safety requirements, the device was designed to be
fully galvanic ally isolated. Leakage currents of the
entire EEG measurement system including the tactile
stimulation device were measured by the European
Testing and Certifying Body for Medical Products
Graz (Notified Body0636). All measured currents were
far below the maximum allowable currents defined in
the safety standard EN 606011:2006 for medical
electrical equipment. The successful operation of the
tactile stimulation device was tested during an EEG
experiment. The left and right wrist of one healthy
subject was randomly stimulated with seven different
frequencies. Steady-state somatosensory evoked
potential (SSSEPs) could successfully be evoked and
significant tuning curves at electrode positions
contralateral to the stimulated wrist could be found.
The device is ready to be used in clinical environment
in a variety of applications to investigate the
somatosensory system, in brain-computer interfaces
(BCIs), or to provide tactile feedback.
20 EBA-11 Bio impedance-
Based Respiration
Monitoring With
a Defibrillator
2014 Defibrillators often use an ace measurement to ensure
safe electrode placement. Some defibrillators also
utilize impedance measurements for ventilation
monitoring. This paper investigates how such
measurements can be optimized for high respiration
sensitivity and finds that it is beneficial to add two
extra electrodes in addition to the two defibrillator
electrodes. This four electrode setup increases

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

15

sensitivity and also allows respiration measurements at
lower frequencies than the two electrode setup.
21 EBA-12 A Configurable
and Low-Power
Mixed Signal SoC
for Portable ECG
Monitoring
Applications
2014 This paper describes a mixed-signal ECG System-on-
Chip (SoC) that is capable of implementing
configurable functionality with low-power
consumption for portable ECG monitoring
applications. A low-voltage and high performance
analog front-end extracts 3-channel ECG signals and
single channel electrode-tissue-impedance (ETI)
measurement with high signal quality. This can be
used to evaluate the quality of the ECG measurement
and to filter motion artifacts. A custom digital signal
processor consisting of 4-way SIMD processor
provides the configurability and advanced
functionality like motion artifact removal and R peak
detection. A built-in 12-bit analog-to-digital converter
(ADC) is capable of adaptive sampling achieving a
compression ratio of up to 7, and loop buffer
integration reduces the power consumption for on-
chip memory access. The SoC is implemented in 0.18
m CMOS process and consumes 32 W from a 1.2 V
while heart beat detection application is running, and
integrated in a wireless ECG monitoring system with
Bluetooth protocol. Thanks to the ECG SoC, the
overall system power consumption can be reduced
significantly.
22 EBA-13 Automatic
Ingestion
Monitor: A Novel
Wearable
Device for
Monitoring of
Ingestive Behavior
2014 Objective monitoring of food intake and digestive
behavior in a free-living environment remains an open
problem that has significant implications in study and
treatment of obesity and eating disorders. In this
paper, a novel wearable sensor system (automatic
ingestion monitor, AIM) is presented for objective
monitoring of digestive behavior in free living. The
proposed device integrates three sensor modalities that
wirelessly interface to a smartphone: a jaw motion
sensor, a hand gesture sensor, and an accelerometer. A
novel sensor fusion and pattern recognition method
was developed for subject-independent food intake
recognition. The device and the methodology were
validated with data collected from 12 subjects wearing
AIM during the course of 24 hin which both the daily
activities and the food intake of the subjects were not
restricted in any way. Results showed that the system
was able to detect food intake with an average
accuracy of 89.8%, which suggests that AIM can
potentially be used as an instrument to monitor
digestive behavior in free-living individuals.

23 EBA-14 An Armband
Wearable Device
for Overnight
2014 24-h blood pressure (BP) has significant prognostic
value for cardiovascular risk screening, but the
present BP devices are mainly cuff-based, which are

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

16

and Cuff-Less
Blood Pressure
Measurement
unsuitable for long-term Measurement, especially
during nighttime. In this paper, we developed an
armband wearable pulse transit time (PTT) system
for24-h cuff-less BP measurement and evaluated it in
an unattended out-of-laboratory setting. Ten healthy
young subjects participated in this ambulatory study,
where PTT was measured at 30-mininterval by this
wearable system and the reference BP was measured
by a standard oscillo metric ambulatory BP monitor.
Due to the misalignment of BP and PTT on their
recording time caused by the different measurement
principles of the two BP devices, anew estimation
method has been proposed: transients in PTT were
removed from the raw data by defined criteria, and
then evenly interpolated, low-pass filtered, and
resampled to synchronize at the time when BP was
recorded. The results show that with the proposed
method, the correlation between PTT and systolic BP
(SBP) during nighttime with dynamic range of 21.8
14.2 mmHg has improved from 0.50 0.24 to 0.62
0.20 (p <0.1), and the difference between the estimated
and reference SBP has improved from 0.7 10.7 to 2.8
8.2 mmHg with root mean square error reduced
from 10.7 to 8.7 mmHg. In addition, the correlation
between very low frequency component of SBP and
PTT obtained from the proposed method during
nighttime is 0.80 0.10 and the difference is 2.45.7
mmHg for a dynamic BP range of 13.58.0 mmHg. It
is therefore concluded from this study that the
proposed wearable system has great potential to be
used for overnights monitoring, especially to measure
the averaged SBP over a long period.
24 EBA-15 Temperature
Increase in the
Fetus Exposed to
UHF
RFID Readers
2014 Exposure to electromagnetic fields (EMFs) has
prominently increased during the last decades due to
the rapid development of new technologies. Among the
various devices emitting EMFs, those based on Radio-
frequency identification (RFID) technologies are used
in all aspects of everyday life, and expose people
unselectively. This scenario could pose a potential risk
for some groups of the general population, such as
pregnant women, who are expected to be possibly
more sensitive to the thermal effects produced by EMF
exposure. This is the first paper that addresses the
estimation of temperature rise in two pregnant women
models exposed to ultrahigh frequency RFID by
computational techniques. Results show that the
maximum temperature increase of the fetus and of the
pregnancy-related tissues is relatively high (even
about0.7 C), not too far from the known threshold of
biological effects. However, this increase is confined to
a small volume in the tissues.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

17

25 EBA-16 Using a Head-up
Display-Based
Steady-State
Visually Evoked
Potential Brain
Computer
Interface to
Control a
Simulated Vehicle
2014 In this paper, we propose a new steady-state visually
evoked potential (SSVEP) braincomputer interface
(BCI) with visual stimuli presented on a windshield via
a head-up display, and we apply this BCI in
conjunction with an alpha rhythm to control a
simulated vehicle with a 14-DOF vehicle dynamics
model. A linear discriminant analysis classifier is
applied to detect the alpha rhythm, which is used to
control the starting and stopping of the vehicle. The
classification models of the SSVEP BCI with three
commands (i.e., turning left, turning right, and going
forward) are built by using a support vector machine
with frequency domain features. A real-time brain-
controlled simulated vehicle is developed and tested by
using four participants to perform a driving ask
online, including vehicle starting and stopping, lane
keeping, avoiding obstacles, and curve negotiation.
Experimental results show the feasibility of using the
human mind alone to control a vehicle, at least for
some users.
26 EBA-17 A Low-
Computational
Approach on Gaze
Estimation With
Eye Touch System
2014 Among various approaches to eye tracking systems,
light-reflection based systems with non-imaging
sensors, e.g., photodiodes or phototransistors are
known to have relatively low complexity; yet, they
provide moderately accurate estimation of the point of
gaze. In this paper, a low-computational approach on
gaze estimation is proposed using the Eye Touch
system, which is a light-reflection based eye tracking
system, previously introduced by the authors. Based
on the physical implementation of Eye Touch, the
sensor measurements are now utilized in low-
computational least-squares algorithms to estimate
arbitrary gaze directions, unlike the existing light
reflection-based systems, including the initial Eye
Touch implementation, where only limited predefined
regions were distinguished. The system also utilizes an
effective pattern classification algorithm to be able to
perform left, right, and double clicks based on
respective eye winks with significantly high accuracy.
In order to avoid accuracy problems for sensitive
sensor biasing hardware, a robust custom
microcontroller-based data acquisition system is
developed. Consequently, the physical size and cost of
the overall Eye Touch system are considerably
reduced while the power efficiency is improved. The
results of the experimental analysis over numerous
subjects clearly indicate that the proposed eye tracking
system can classify eye winks with 98% accuracy, and
attain an accurate gaze direction with an average
angular error of about 0.93. Due to its lightweight
structure, competitive accuracy and low-

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

18

computational requirements relative to video based
eye tracking systems, the proposed system is a
promising human-computer interface for both
stationary and mobile eye tracking applications.
27 EBA-18 A Machine Vision-
Based Gestural
Interface for
People With
Upper Extremity
Physical
Impairments
2014 A machine vision-based gestural interface was
developed to provide individuals with upper extremity
physical impairments an alternative way to perform
laboratory tasks that require physical manipulation of
components. A color and depth based 3-D particle
filter framework was constructed it unique descriptive
features for face and hands representation. This
framework was integrated into an interaction model
utilizing spatial and motion information to deal
efficiently with occlusions and its negative effects.
More specifically, the suggested method proposed
solves the false merging and false labeling problems
characteristic in tracking through occlusion. The same
feature encoding technique was subsequently used to
detect, track and recognize users hands. Experimental
results demonstrated that the proposed approach was
superior to other state-of-the art tracking algorithms
when interaction was present (97.52%accuracy). For
gesture encoding, dynamic motion models were
created employing the dynamic time warping method.
The gestures were classified using a conditional density
propagation based trajectory recognition method. The
hand trajectories were classified into different classes
(commands) with a recognition accuracy of 95.9%. In
addition, the new approach was validated with the
one shot learning paradigm with comparable results
to those reported in 2012. In a validation experiment,
the gestures were used to control a mobile service
robot and a robotic arming a laboratory chemistry
experiment. Effective control policies were selected to
achieve optimal performance for the presented
gestural control system through comparison of task
completion time between different control modes.
28 EBA-19 Controlling a
Human
Computer
Interface System
With a Novel
Classification
Method that Uses
Electrooculograph
y Signals
2014 Electrooculography (EOG) signals can be used to
control humancomputer interface (HCI) systems, if
properly classified. The ability to measure and process
these signals may help HCI users to overcome many of
the physical limitations and inconveniences in daily
life. However, there are currently no effective
multidirectional classification methods for monitoring
eye movements. Here, we describe a classification
method used in a wireless EOG-based HCI device for
detecting eye movements in eight directions. This
device includes wireless EOG signal acquisition
components, wet electrodes and an EOG signal
classification algorithm. The EOG classification
algorithm is based on extracting features from the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

19

electrical signals corresponding to eight directions of
eye movement (up, down, left, right, up-left, down-left,
up-right, and down-right) and blinking. The
recognition and processing of these eight different
features were achieved in real-life conditions,
demonstrating that this device can reliably measure
the features of EOG signals. This system and its
classification procedure provide an effective method
for identifying eye movements. Additionally, it may be
applied to study eye functions in real-life conditions in
the near future.
29 EWA-01 The Generic
Design of a High-
Traffic Advanced
Metering
Infrastructure
Using Zigbee
2014 A multi-interface Zigbee building area network
(MIZBAN) for a high-traffic advanced metering
infrastructure (AMI) for high-rise buildings was
developed. This supports meter management functions
such as Demand Response for smart grid applications.
To cater for the high-traffic communication in these
building area networks (BANs), a multi-interface
management framework was defined and designed to
coordinate the operation between multiple interfaces
based on a newly defined tree-based mesh (T-Mesh)
Zigbee topology, which supports both mesh and tree
routing in a single network. To evaluate MIZBAN, an
experiment was set up in a five-floor building. Based
on the measured data, simulations were performed to
extend the analysis to a 23-floor building. These
revealed that MIZBAN yields an improvement in
application-layer latency of the backbone and the floor
network by 75% and 67%, respectively. This paper
provides the design engineer with seven
recommendations for a generic MIZBAN design,
which will fulfill the requirement for demand response
by the U.S. government, i.e. a latency of less than 0.25
s.
30 EWA-02 A Reconfigurable
Smart Sensor
Interface for
Industrial
WSN in IoT
Environment
2014 A sensor interface device is essential for sensor data
collection of industrial wireless sensor networks
(WSN) in IoT environments. However, the current
connect number, sampling rate, and signal types of
sensors are generally restricted by the device.
Meanwhile, in the Internet of Things (IoT)
environment, each sensor connected to the device is
required to write complicated and cumbersome data
collection program code. In this paper, to solve these
problems, a new method is proposed to design a
reconfigurable smart sensor interface for industrial
WSN in IoT environment, in which complex
programmable logic device (CPLD) is adopted as the
core controller. Thus, it can read data in parallel and
in real time with high speed on multiple different
sensor data. The standard ofIEEE1451.2 intelligent
sensor interface specification is adopted for this

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

20

design. It comprehensively stipulates the smart sensor
hardware and software design framework and
relevant interface protocol to realize the intelligent
acquisition for common sensors. A new solution is
provided for the traditional sensor data acquisitions.
The device is combined with the newest CPLD
programmable technology and the standard of
IEEE1451.2 intelligent sensor
specification.Performanceoftheproposedsystemisverifi
edandgoodeffectsareachievedin practical application of
IoT to water environment monitoring.
31 EWA-03 Automated
Irrigation System
Using a Wireless
Sensor Network
and GPRS
Module
2014 An automated irrigation system was developed to
optimize water use for agricultural crops. The system
has a distributed wireless network of soil-moisture and
temperature sensors placed in the root zone of the
plants. In addition, agate way unit handles sensor
information, triggers actuators, and transmits data to
a web application. An algorithm was developed with
threshold values of temperature and soil moisture that
was programmed into a microcontroller-based
gateway to control water quantity. The system was
powered by photovoltaic panels and had a duplex
communication link based on a cellular-Internet
interface that allowed for data inspection and
irrigation scheduling to be programmed through a
web page. The automated system was tested in a sage
crop field for 136 days and after savings of up to 90%
compared with traditional irrigation practices of the
agricultural zone was achieved. Three replicas of the
automated system have been used successfully in other
places for 18 months. Because of its energy autonomy
and low cost, the system has the potential to be useful
in water limited geographically isolated areas
32 EWA-04 RAMSES: RFID
Augmented
Module
for Smart
Environmental
Sensing
2014 This paper presents radio frequency identification
(RFID) augmented module for smart environmental
sensing (RAMSES), which is a fully passive device with
sensing and computation capabilities conceived to
explore novel and unconventional RFID applications.
RAMSES implements an RF energy-harvesting circuit
enhanced by a dc-dc voltage booster in silicon-on-
insulator technology, an ultralow-power
microcontroller, temperature, light, and acceleration
sensors, and new-generation I2C-RFID chip to
wirelessly deliver sensor data to standard RFID EPC
global Class-1 Generation-2 readers A preliminary
RAMSES prototype, fabricated on a printed circuit
board using low-cost off-the-shelf discrete components,
has been extensively tested through experiments
conducted both in lab and real-world application
scenarios. The achieved results have demonstrated the
ability of RAMSES to harvest the RF energy emitted

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

21

by an interrogator placed up to 10 move distance and
autonomously perform sensing, computation, and data
communication. To our knowledge, this is the longest
range ever reported for fully passive RFID sensors.
Furthermore, for applications requiring larger
operating distances, RAMSES provides also a battery-
assisted passive mode yielding up to 22-
mcommunication range.
33 EWA-05 Fluid Embeddable
Coupled Coil
Sensor for
Wireless pH
Monitoring in a
Bioreactor
2014 A passive embeddable coupled coil sensor for remote
bioprocess pH monitoring is described. The sensor is
sterilized able, able to operate in a fluid medium and
small enough to fit inside a small bioreactor or test
tube. It consists of a planar spiral inductor connected
parallel to a visitorforming an LC resonant circuit. A
pH combination electrode made of an iridium/iridium
oxide sensing electrode and a silver/silver chloride
reference electrode is connected parallel to the visitor.
A potential difference change across the electrodes due
top variation of the medium changes the voltage-
dependent capacitance and shifts the resonant
frequency of the sensor. An interrogator coil is
inductively coupled to the sensor coil and remotely
tracks the resonant frequency of the sensor. Florin-
fluid monitoring, the sensor is encapsulated in a
manner that reduces the influence of the permittivity
and conductivity of the medium. The sensor,
calibrated over 212 pH range, exhibits a rapid
response with 2.477-MHz/pH sensitivity. The sensor
was used for remote pH monitoring of
Yarrowialipolytica and Saccharomyces cerevisiae
fermentation in a shake flask over63 and 25 h,
respectively. The experiments demonstrate that the
medium pH can be monitored repeatedly with an
accuracy of.08 ph.
34 EWA-06 An Integrated
System for
Regional
Environmental
Monitoring and
Management
Based on Internet
of Things
2014 Climate change and environmental monitoring and
management have received much attention recently,
and an integrated information system (IIS) is
considered highly valuable. This paper introduces a
novel IIS that combines Internet of Things (IoT),
Cloud Computing, Geo informatics [remote sensing
(RS), geographical information system (GIS), and
global positioning system (GPS)], and e-Science for
environmental monitoring and management, with a
case study on regional climate change and its
ecological effects. Multi-sensors and web services were
used to collect data and other information for the
perception layer; both public networks and private
networks were used to access and transport mass data
and other information in the network layer. The key
technologies and tools include real-time operational
database (RODB); extractiontransformationloading

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

22

(ETL); on-line analytical processing (OLAP) and
relational OLAP (ROLAP); naming, addressing, and
profile server (NAPS); application gateway (AG);
application software for different platforms and tasks
(APPs); IoT application infrastructure (IoT-AI); GIS
and e-Science platforms; and representational state
transfer/Java database connectivity (Restful/JDBC).
Application Program Interfaces (APIs) were
implemented in the middleware layer of the IIS. The
application layer provides the functions of storing,
organizing, processing, and sharing of data and other
information, as well as the functions of applications in
environmental monitoring and management. The
results from the case study show that there is a visible
increasing trend of the air temperature in Xinjiang
over the last 50 years
35 EWA-07 Teaching RFID
Information
Systems Security
2014 The future cyber security workforce needs
radiofrequency identification (RFID) information
systems security (INFOSEC) and threat modeling
educational materials. A completer RFID security
course with new learning materials and teaching
strategies is presented here. A new RFID Reference
Model is used in the course to organize discussion of
RFID, much as the open systems interconnection (OSI)
model is used in a computer networking course.
Students use a general-purpose threat modeling
process named STRIDE and a risk analysis model
named DREAD to determine and to mitigate security
risks. Class modules on topics such as the threat
modeling process and privacy can be integrated into
fourth-year undergraduate or first-year graduate-level
computer science and computer engineering courses
such as network security, wireless security, computer
networks, sensor/RFID networks, or network
performance
36 EWA-08 EasySMS: A
Protocol for End-
to-End
Secure
Transmission of
SMS
2014 Nowadays, short message service (SMS) is being used
in many daily life applications, including healthcare
monitoring, mobile banking, mobile commerce, and so
on. But when we send an SMS from one mobile phone
to another, the information contained in the SMS
transmit as plain text. Sometimes this information may
be confidential like account numbers, passwords,
license numbers, and so on, and it is a major drawback
to send such information through SMS while the
traditionalisms service does not provide encryption to
the information before its transmission. In this paper,
we propose an efficient and secure protocol called
Easy SMS, which provides end-to end secure
communication through SMS between end users. The
working of the protocol is presented by considering
two different scenarios. The analysis of the proposed

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

23

protocol shows that this protocol is able to prevent
various attacks, including SMS disclosure, over the air
modification, replay attack, man-in-the middle attack,
and impersonation attack. The Easy SMS protocol
generates minimum communication and computation
overheads as compared with existing SMS Sec and
PK-SIM protocols. On An average, the Easy SMS
protocol reduces 51% and 31% of the bandwidth
consumption and reduces 62% and 45% of message
exchanged during the authentication process in
comparison to SMS Sec and PK-SIM protocols
respectively. Authors claim that Easy SMS is the first
protocol completely based on the symmetric key
cryptography and retain original architecture of
cellular network.
37 EWA-09 Relay-Assisted
Wireless
Communication
Systems in
Mining Vehicle
Safety
Applications
2014 Relays enabled with multiuser MIMO techniques have
great potential to mining vehicle safety applications.
However, they are yet to be practical due to high
scheduling overhead immobile, radio-unfriendly,
mining environments. A new decentralized relay-
assisted multiuser MIMO approach is proposed, which
cuts the overhead by 80% and enables relay-assisted
multiuser MIMO to be implemented in practice. This
approach is a new distributed participatory downlink
transmission method, where both the relays and
destinations participate in the scheduling decisions. A
new recursive algorithm is also developed to optimally
quantize the channel conditions of the vehicles,
thereby minimizing the feedback requirement.
Analytical results, confirmed by simulations, show that
the proposed approach is able to achieve97.6% of the
sum-rate upper bound of the network, using only three
bits to characterize the channel condition of each
vehicle. In terms of throughput, the proposed
decentralized scheme can perform 45.2% better than
the existing centralized scheme. The proposed
approach is compatible with industrial communication
standards and can be implemented with commercial
industrial communication systems.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

24

38 EWA-10 Accurate Human
Navigation Using
Wearable
Monocular Visual
and Inertial
Sensors
2014 This paper presents a novel visual-inertial integration
system for human navigation in free-living
environments, where the measurements from wearable
inertial and monocular visual sensors are integrated.
The predestinated orientation, obtained from magnet,
angular rate, and gravity sensors, issued to estimate
the translation based on the data from the visual and
inertial sensors. This has a significant effect on the
performance of the fusion sensing strategy and makes
the fusion procedure much easier, because the
gravitational acceleration can be correctly removed
from the accelerometer measurements before the
fusion procedure, where a linear Kalman filter is
selected as the fusion estimator. Furthermore, the use
of predestinated orientation can help to eliminate
erroneous point matches based on the properties of the
pure camera translation and thus the computational
requirements can be significantly reduced compared
with the Random Sample Consensus algorithm. In
addition, an adaptive-frame rate single camera is
selected to not only avoid motion blur based on the
angular velocity and acceleration after compensation,
but also to make an effect called visual zero-velocity
update for the static motion. Thus, it can recover a
more accurate baseline and meanwhile reduce the
computational requirements. In particular, an
absolute scale factor, which is usually lost in
monocular camera tracking, can be obtained by
introducing it into the estimator. Simulation and
experimental results are presented for different
environments with different types of movement and
the results from a Pioneer robot are used to
demonstrate the accuracy of the proposed method.
39 EWA-11 Using Smart-
Phones and Floor
Plans for Indoor
Location Tracking
2014 We implement pedestrian dead reckoning (PDR) for
indoor localization. With a waist-mounted PDR based
system one smart-phone, we estimate the users step
length that utilizes the height change of the waist based
on the Pythagorean Theorem. We propose a zero
velocity update (ZUPT) method to address sensor drift
error: Simple harmonic motion and a low-pass
filtering mechanism combined with the analysis of gait
characteristics. This method does not require training
to develop the step length model. Exploiting the
geometric similarity between the user trajectory and
the floor map, our map matching algorithm includes
three different filters to calibrate the direction errors
from the gyro using building floor plans. A sliding-
window-based algorithm detects corners.The system
achieved 98% accuracy in estimating user walking
distance with a waist-mounted phone and 97%
accuracy when the phone is in the users pocket. ZUPT

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

25

improves sensor drift error (the accuracy drops from
98% to 84% without ZUPT) using 8 Hzas the cut-off
frequency to filter out sensor noise. Corner length
impacted the corner detection algorithm. In our
experiments, the overall location error is about 0.48
meter.
40 EWA-12 Understanding
Taxi Service
Strategies
From Taxi GPS
Traces
2014 Taxi service strategies, as the crowd intelligence of
massive taxi drivers, are hidden in their historical
time-stamped PS traces. Mining GPS traces to
understand the service strategiesof skilled taxi drivers
can benefit the drivers themselves, passengers, and city
planners in a number of ways. This paper intends to
uncover the efficient and inefficient taxi service
strategies based on a large-scale GPS historical
database of approximately 7600taxis over one year in a
city in China. First, we separate the GPStraces of
individual taxi drivers and link them with the revenue
generated. Second, we investigate the taxi service
strategies from three perspectives, namely, passenger-
searching strategies, passenger-delivery strategies, and
service-region preference. Finally, were present the
taxi service strategies with a feature matrix and
evaluate the correlation between service strategies and
revenue, informing which strategies are efficient or
inefficient. We predict the revenue of taxi drivers
based on their strategies and achieve a prediction
residual as less as 2.35 RMB/h,1 which demonstrates
that the extracted taxi service strategies with our
proposed approach well characterize the driving
behavior and performance of taxi drivers.
41 EMA-01 Combined AFS
and DYC Control
of
Four-Wheel-
Independent-
Drive Electric
Vehicles
over CAN
Network with
Time-Varying
Delays
2014 This paper deals with the lateral motion control
offour-wheel-independent-drive electric vehicles
(4WID-EVs) subject to onboard network-induced time
delays. It is well known that the in-vehicle network
and x-by-wire technologies have considerable
advantages over the traditional point-to-point
communication. However, on the other hand, these
technologies would also induce the probability of time-
varying delays, which would degrade control
performance or even deteriorate the system. To enjoy
the advantages and deal with in-vehicle network
delays, anH-based delay-tolerant linear quadratic
regulator (LQR) control method is proposed in this
paper. The problem is described in the form of an

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

26

augmented discrete-time model with uncertain
elements determined by the delays. Delay uncertainties
are expressed in the form of a polite using Taylor
series expansion. To achieve good steady-state
response, a generalized proportionalintegral control
approach is adopted. The feedback gains can be
obtained by solving a sequence of linear matrix
inequalities (LMIs). Co-simulations with Simulink and
Carsem demonstrate the effectiveness of the proposed
controller. Comparison with a conventional LQR
controller is also carried out to illustrate the strength
of explicitly dealing with in-vehicle network delays.
42 EMA-02 Using a Head-up
Display-Based
Steady-
StateVisually
Evoked Potential
Brain
ComputerInterfac
e to Control a
Simulated Vehicle
2014 In this paper, we propose a new steady-state visually
evoked potential (SSVEP) braincomputer interface
(BCI) with visual stimuli presented on a windshield via
a head-up display, andwe apply this BCI in
conjunction with an alpha rhythm to control a
simulated vehicle with a 14-DOF vehicle dynamics
model. Alinear discriminant analysis classifier is
applied to detect the alpha rhythm, which is used to
control the starting and stopping of the vehicle. The
classification models of the SSVEP BCI with three
commands (i.e., turning left, turning right, and going
forward) are built by using a support vector machine
with frequency domain features. A real-time brain-
controlled simulated vehicle is developed and tested by
using four participants to perform a driving task
online, including vehicle starting and stopping, lane
keeping, avoiding obstacles, and curve negotiation.
Experimental results show the feasibility of using the
human mind alone to control a vehicle, at least for
some users.
43 EMA-03 A Cooperative
Heterogeneous
Mobile Wireless
Mechatronic
System
2014 This paper describes a framework for controlling a
heterogeneous wireless robotic network consisting of
aerial and ground vehicles. By use of the term
heterogeneous, we imply the synergy of multiple
robotic platforms characterized by different dynamics
and specialized sensing capabilities. Two main
scenarios concerning wireless communications are
presented: 1) a decentralized connectivity strategy in
which a mesh of ground mobile routers swarms in a
cluttered environment maintaining communication
constraints based on spring-mass virtual physics,
potential functions, and routing optimization and 2) an
autonomous communications relay in GPS-denied
environments via antenna diversity andextreme-
seeking SNR optimization. For both scenarios, we
validate the proposed methodologies by numerical
simulations and experiments. One important feature of
our test bed is that it can be used for both indoor and

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

27

outdoor operations.
44 EMA-04 Smartphone-
Based Vehicle-to-
Driver/Environme
nt Interaction
System for
Motorcycles
2014 This letter concerns the definition and the
implementation of an add-on interaction system for
motorcycles. The systemconsistsofa vehicle-to-
driveranda vehicle-to-
environmentcommunicationmechanism, which is
based on a smartphone core and ona wireless
Bluetooth medium. The system is focused to increase
thesafety level of a motorcycle and it is constituted by
a vehicle witha CAN bus, a compact embedded
electronic unit implementing a CAN-to-Bluetooth
gateway, a smartphone and a Bluetooth helmet. The
driver-to-vehicle interaction is based on an audio
interaction located at helmet level. The driver-to-
environment is represented by communication via the
HTTP protocol. The vocal synthesis, the speech
recognition, and the gateway to the web server are
implemented on the smartphone. This letter presents
the hardware architecture, the software architecture
and some case-study implementation issues. An
evaluation of the critical aspects of the system is also
provided.
45 EMA-05 Robust Sliding
Mode-Based
Learning Control
for
Steer-by-Wire
Systems in
Modern Vehicles
2014 In this paper, a robust sliding mode learning
control(SMLC) scheme is developed for steer-by-wire
(SbW) systems. Itis shown that a SbW system with
uncertain system parametersand unknown external
disturbance from the interactions between the tires
and the variable road surface can be modeled as a
second-order system. A sliding mode learning
controller can then be designed to drive both the
sliding variable and the tracking error between the
steered front-wheel angle and the hand-wheel
reference angle to asymptotically converge to zero.
The proposedSMLC scheme exhibits many advantages
over the existingschemes, including: 1) no information
about vehicle parameteruncertainties and self-aligning
torque variations is required for controller design; and
2) the control algorithm is capable of
efficientlyadjusting the closed-loop response based on

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

28

the most recenthistory of the closed-loop stability and
ensuring a robust steeringperformance. Both
simulations and experiments are presented toshow the
excellent steering performance and the effectiveness
ofthe proposed learning control methodology
46 EMA-06 Estimating Speed
Using a Side-
Looking
Single-Radar
Vehicle Detector
2014 This paper presents a side-looking single-beam
microwavevehicle detector (VD) system for estimation
of per-vehiclespeed and length. The proposed VD
system is equipped with a 2-Drange Doppler
frequency-modulated continuous-wave (FMCW)radar
using a squint angle. The associated Fourier processor
usesan inverse synthetic aperture radar (ISAR)
algorithm to extract range and speed data for each
vehicle using a single-beam FMCWradar. The
simulation and experimental results show accurate
estimations of vehicle speed and length. The
measurement errors of speed and length were
approximately 4 km/h and 1 respectively. The
proposed method has excellent detection capability for
small moving targets, such as bikes and pedestrians, at
speeds down to 5 km/h. A commercial 10.6-GHz radar
with signal processing modifications was used in the
experiments
47 EMA-07 Portable Roadside
Sensors for
Vehicle Counting,
Classification, and
Speed
Measurement
2014 This paper focuses on the development of a portable
roadside magnetic sensor system for vehicle counting,
classification, and speed measurement. The sensor
system consists of wireless anisotropic magnetic
devices that do not require to be embedded in the
roadwaythe devices are placed next to the roadway
and measure traffic in the immediately adjacent lane.
An algorithm based on a magnetic field model is
proposed to make the system robust to the errors
created by larger vehicles driving in the nonadjacent
lane. These false calls cause an 8% error if
uncorrected. The use of the proposed algorithm
reduces this error to only 1%. Speed measurement is
based on the calculation of the cross correlation
between longitudinally spaced sensors. Fast
computation of the cross correlation is enabled by
using frequency-domain signal processing techniques.
An algorithm for automatically correcting for any
small misalignment of the sensors is utilized. A high-
accuracy differential Global Positioning Systemis used

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

29

as a reference to measure vehicle speeds to evaluate
the accuracy of the speed measurement from the new
sensor system. The results show that the maximum
error of the speed estimates is less than 2.5% over the
entire range of 527 m/s (1160 mi/h).Vehicle
classification is done based on the magnetic length and
an estimate of the average vertical magnetic height of
the vehicle.Vehicle length is estimated from the
product of occupancy andestimated speed. The
average vertical magnetic height is estimated using two
magnetic sensors that are vertically spaced by 0.25
m.Finally, it is shown that the sensor system can be
used to reliably count the number of right turns at an
intersection, with an accuracy of 95%. The developed
sensor system is compact, portable, wireless, and
inexpensive. Data are presented from a large number
of vehicles on a regular busy urban road in the Twin
Cities, MN, and USA.
48 EGA-01 A Gesture
Learning
Interface for
Simulated Robot
Path Shaping
With a Human
Teacher
2014 Recognition of human gestures is an active area of
research integral for the development of intuitive
humanmachine interfaces for ubiquitous computing
and assistive robotics. In particular, such systems are
key to effective environmental designs that facilitate
aging in place. Typically, gesture recognition takes the
form of template matching in which the human
participants expected to emulate a choreographed
motion as prescribed bythe researchers. A
corresponding robotic action is then a one-
tonemapping of the template classification to a library
of distinct responses. In this paper, we explore a
recognition scheme basedon the growing neural gas
(GNG) algorithm that places no initialconstraints on
the user to perform gestures in a specific way.
Motiondescriptors extracted from sequential skeletal
depth data areclustered by GNG and mapped directly
to a robotic response thatis refined through
reinforcement learning. A simple good/bad
rewardsignal is provided by the user. This paper
presents results thatshow that the topology-preserving
quality of GNG allows generalizationbetween gestured
commands. Experimental results usingan automated
reward are presented that compare learning
resultsinvolving single nodes versus results involving
the influence of node neighborhoods. Although
separability of input data influences the speed of
learning convergence for a given neighborhood radius,
it is shown that learning progresses toward emulation
of an associative memory that maps input gesture to
desired action

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

30

49 EGA-02 Automatic User
State Recognition
for Hand Gesture
Based Low-Cost
Television Control
System
2014 Hand gesture based television (TV) control is
attracting more and more researchers. Most of
existing works focus on the hand gesture recognition
algorithm and the corresponding user interface, while
the power consumption or computational cost is not
considered carefully. In practice, keeping the camera
device and the gesture recognition module running all
the time often costs much energy. Till now, few
methods have been reported to solve this problem.
This paper proposes an automatic user state
recognition scheme to recognize the TV user's state
and activate the camera-based gesture recognition
module only when the user is trying to control the TV.
Specifically, the user's behavior active or not is
detected by lowcostsensors, the user's gaze watching
TV or not is tracked by theface-based view detection,
and the user's state is then decided according to a
finite-state machine composed of four states: Absent,
Other Action, Controlling, and Watching. The
prototypes based on an ultrasonic distance sensor
array, a red-green-blue(RGB) camera, and a depth
camera are implemented and tested. The results show
that the proposed scheme can effectively reduce the
power consumption or computational cost of the
original hand gesture based control schemes1
50 EGA-03 Computer-
Assisted Culture
Learning in an
Online
Augmented
Reality
Environment
Based on Free-
Hand Gesture
Interaction
2014 The physical-virtual immersion and real-time
interaction play an essential role in cultural and
language learning. Augmentedreality (AR) technology
can be used to seamlessly merge virtual objects with
real-world images to realize immersions.
Additionally,computer vision (CV) technology can
recognize free-hand gestures from live images to
enable intuitive interactions. Therefore, we
incorporate the latest AR and CV algorithms into a
Virtual English Classroom, called VECAR, to promote
immersive and interactive language learning. By
wearing a pair of mobile computing glasses, users can
interact with virtual contents in a three-dimensional
space by using intuitive free-hand gestures. We design
three cultural learning activities that introduce
students to authentic cultural products and new
cultural practices, and allow them to examine various
cultural perspectives. The objectives of the VECAR
are to make cultural and language learning appealing,
improve cultural learning effectiveness, and enhance
interpersonal communication between teachers and
students
51 EGA-04 A Low-
Computational
Approach on Gaze
Estimation With
2014 Among various approaches to eye tracking systems,
light-reflection based systems with non-imaging
sensors, e.g. Photodiodes or phototransistors, are
known to have relatively low complexity; yet, they

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

31

Eye Touch System provide moderately accurate estimation of the point of
gaze. In this paper, a low-computational approach on
gaze estimation is proposed using the Eye Touch
system, which is a light-reflection based eye tracking
system, previously introduced by the authors. Based
on the physical implementation of Eye Touch, the
sensor measurements are now utilized in low-
computational least-squares algorithms to estimate
arbitrary gaze directions, unlike the existing light
reflection-based systems, including the initial Eye
Touch implementation, where only limited predefined
regions were distinguished. The system also utilizes an
effective pattern classification algorithm to be able to
perform left, right, and double clicks based on
respective eye winks with significantly high accuracy.
In order to avoid accuracy problems for sensitive
sensor biasing hardware, arobust custom
microcontroller-based data acquisition system
isdeveloped. Consequently, the physical size and cost
of the overallEye Touch system are considerably
reduced while the powerefficiency is improved. The
results of the experimental analysisover numerous
subjects clearly indicate that the proposed eyetracking
system can classify eye winks with 98% accuracy, and
attain an accurate gaze direction with an average
angular errorof about 0.93. Due to its lightweight
structure, competitiveaccuracy and low-computational
requirements relative to videobasedeye tracking
systems, the proposed system is a promising human-
computer interface for both stationary and mobile
eyetracking applications.
52 EGA-05 Multi-touch
Gesture-Based
Authentication
2014 This paper investigates multitouch gestures for
userauthentication on touch sensitive devices. A
canonical set of22 mult-itouch gestures was defined
using characteristics of hand and finger movement.
Then, a multi-touch gesture matching algorithm
robust to orientation and translation was developed.
Two different studies were performed to evaluate the
concept. First, a single session experiment was
performed in order to explore feasibility of mult-
itouch gestures for user authentication. Testing on the
canonical set showed that the system could achieve
good performance in terms of distinguishing between
gestures performed by different users. In addition, the
tests demonstrated desirable alignment of usability
and security as gestures that were more secure from a
biometric point of view were rated as more desirable
in terms of ease, pleasure, and excitement. Second, a
study involving a three-session experiment was
performed. Results indicate that biometric
information gleaned from a short user-device

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

32

interaction remains consistent across gaps of several
days, though there is noticeable degradation of
performancewhen the authentication is performed
over multiple sessions.In addition, the study showed
that user-defined gestures yield the highest recognition
rate among all other gestures, whereas the use of
multiple gestures in a sequence aids in boosting
verification accuracy. In terms of memorability, the
study showed that it is feasible for a user to recall user-
defined gestural passwords and it is observed that the
recall rate increases over time. It is also noticed that
performing a user-defined gesture over a customized
background image does result in higher verification
performance. In terms of usability, the study shows
that users did not have difficulty in performing mult-
itouch gestures as they all rated each gesture as easy to
perform.
53 EGA-06 A Hand Gesture
Recognition
Framework and
Wearable
Gesture-Based
Interaction
Prototype for
Mobile Devices
2014 An algorithmic framework is proposed to process
accelerationand surface electromyography (SEMG)
signals for gesture recognition. It includes a novel
segmentation scheme, a score-based sensor fusion
scheme, and two new features. A Bayes linear classifier
and an improved dynamic time-warping algorithm are
utilized in the framework. In addition, a prototype
system, including a wearable gesture sensing device
(embedded witha three-axis accelerometer and four
SEMG sensors) and an applicationprogram with the
proposed algorithmic framework for a mobile phone,
isdeveloped to realize gesture-based real-time
interaction. With the deviceworn on the forearm, the
user is able to manipulate a mobile phone using19
predefined gestures or even personalized ones. Results
suggest that thedeveloped prototype responded to each
gesture instruction within 300 mson themobile phone,
with the average accuracy of 95.0% in user-
dependenttesting and 89.6% in user-independent
testing. Such performance duringthe interaction
testing, along with positive user experience
questionnairefeedback, demonstrates the utility of the
framework
54 EGA-07 Novice and Expert
Performance of
Key Scretch:
A Gesture-Based
Text Entry
Method
for Touch-Screens
2014 KeyScretch is a text entry method for devices
equippedwith touch-screens, based on a menu-
augmented soft keyboard.In these keyboards, a menu
containing a small number of frequentcharacters is
shown, while a key is pressed, allowing
furthercharacter entry by menu selection. KeyScretch
improves the previouslystudied menu-based methods
by enabling the interpretation f compound strokes,
which allow the input of text chunks longerthan two
characters. The performance of the method is
analyzedon different kinds of touch-screens: First, we

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

33

present a 25-sessionuser study on a stylus-based
device, showing that an instance of themethod
optimized for Italian can be learned in a reasonable
timeby the users and significantly outperforms the
traditional methodbased on the tapping interaction.
Then, we define and validate amodel for predicting
expert text entry rates on finger-based devices.The
predicted rates for instances of KeyScretch optimized
for differentWesternlanguages vary fromabout 4450
words/min on theQwerty layout, enabling
improvements in the range of 3049% ascompared
with the traditional method.
55 EGA-08 Human Hand
Motion Analysis
With
Multisensory
Information
2014 In order to study and analyze human hand
motionsthat contain multimodal information, a
generalized framework integratingmultiple sensors is
proposed and consists of modules ofsensor integration,
signal preprocessing, correlation study of
sensoryinformation, andmotion identification. Three
types of sensorsare integrated to simultaneously
capture the finger angle trajectories,the hand contact
forces, and the forearm electromyography (EMG)
signals. To facilitate the rapid acquisition of
humanhand tasks, methods to automatically
synchronize and segmentmanipulation primitives are
developed in the signal preprocessingmodule.
Correlations of the sensory information are studied by
usingEmpirical Copula and demonstrate that there
exist significantrelationships between muscle signals
and finger trajectories andbetween muscle signals and
contact forces. In addition, recognizingdifferent hand
grasps and manipulations based on the EMGsignals is
investigated by using Fuzzy Gaussian Mixture Models
(FGMMs) and results of comparative experiments
show FGMMoutperform Gaussian MixtureModels
and support vector machinewith a higher recognition
rate. The proposed framework integratingthe state-of-
the-art sensor technology with the developed
algorithmsprovides researchers a versatile and
adaptable platformfor human hand motion analysis
and has potential applicationsespecially in robotic
hand or prosthetic hand control and humancomputer
interaction.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

34

56 EGA-09 A Wireless
Accelerometer-
Based Automatic
Vehicle
Classification
Prototype System
2014 Automatic vehicle classification (AVC) systems
providedata about vehicle classes that are used for
many purposes. This paper describes a prototype axle
count and spacing AVCsystem using wireless
accelerometers and magnetometers.
TheAccelerometers detect vehicle axles, and the
magnetometers report vehicle arrivals and departures
and estimate speed. The prototype system is installed
on Interstate 80 at Pinole, CA, USA, and tested under
various traffic conditions. Video images and reports
from a nearby commercial weigh-in-motion station
provide ground truth to evaluate the performance of
the system, including classification, axle spacing, and
vehicle counts. The results show that the prototypic
system is reliable in classifying vehicles even under
congested traffic with accuracy of 99%.
57 EGA-10 Editor: A
Prototype for a
Sign Language
Interfacing
System
2014 Sign languages are as capable of expressing human
thoughts and emotions as traditional (spoken)
languages. The distinctive visual and spatial nature of
sign languages makes it difficultto develop an
interfacing system as a communication medium
platform for sign language users. This paper targets
this problem by presenting some explorations in the
areas of computer graphics, interface design, and
humancomputer interaction with emphasis on
software development and implementation. We
propose a sign language interfacing system, as a
working platform, that can be used to create virtual
human body parts, simulate virtual gestures, and
construct, manage, and edit sign language linguistic
parts. Itis expected that the system and the results
presented in this paper would provide an example for
the future sign language editor.
58 EGA-11 A Machine Vision-
Based Gestural
Interface for
People With
Upper Extremity
Physical
Impairments
2014 A machine vision-based gestural interface was
developed to provide individuals with upper extremity
physical impairments an alternative way to perform
laboratory tasks that require physical manipulation of
components. A color anddepth based 3-D particle filter
framework was constructed with unique descriptive
features for face and hands representation. This
framework was integrated into an interaction model
utilizing spatial and motion information to deal
efficiently with occlusions and its negative effects.
More specifically, the suggested method proposed
solves the false merging and false labeling problems
characteristic in tracking through occlusion. The same
feature encoding technique was subsequently used to
detect, track and recognize users hands. Experimental
results demonstrated that the proposed approach was
superior to other state-of-thearttrackingalgorithms
when interaction was present (97.52%accuracy). For

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

35

gesture encoding, dynamic motion models were
created employing the dynamic time warping method.
The gestures were classified using a conditional density
propagation basedtrajectory recognition method. The
hand trajectories were classified into different classes
(commands) with a recognitionaccuracy of 95.9%. In
addition, the new approach was validated with the
one shot learning paradigm with comparable results
to those reported in 2012. In a validation experiment,
the gestures were used to control a mobile service
robot and a robotic arming a laboratory chemistry
experiment. Effective control policies were selected to
achieve optimal performance for the presented
gestural control system through comparison of task
completion time between different control modes.
59 ERA-01 Human-Inspired
Control of Bipedal
Walking Robots
2014 This paper presents a human-inspired control
approach to bipedal robotic walking: utilizing human
data and output functions that appear to be intrinsic
to human walking in order to formally design
controllers that provably result instable robotic
walking. Beginning with human walking data,
outputsor functions of the kinematicsare
determined that resulting a low-dimensional
representation of human locomotion. These same
outputs can be considered on a robot, and human-
inspired control is used to drive the outputs of the
robot to the outputs of the human. The main results of
this paper are that, in the case of both under and full
actuation, the parameters of this controller can be
determined through a human-inspired optimization
problem that provides the best fit of the human data
while simultaneously provably guaranteeing stable
robotic walking for which the initial condition can be
computed in closed form. These formal results are
demonstrated in simulation by considering two bipedal
robotsan under actuated 2-D bipedal robot,
AMBER, and fully actuated 3-D bipedal robot, NAO
for which stable robotic walking is automatically
obtained using only human data. Moreover, in both
cases, these simulated walking gaits are realized
experimentally to obtain human-inspired bipedal
walking on the actual robot

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

36

60 ERA-02 A New
Wheelchair
Ergometer
Designed as an
Admittance-
Controlled Haptic
Robot
2014 Wheelchair ergometers aim to simulate the propulsion
of a wheelchair in a controlled laboratory setup. One
drawback of current ergometers is that the simulated
wheelchair is always modeled as a simple one-
dimensional mass and friction, whichdo not allow a
correct simulation of turning maneuvers. In thispaper,
we present a new design for a wheelchair ergometer
based on haptic robotics. This ergometer allows us to
simulate any linear or nonlinear model of the
wheelchairuser system in real time, including models
that implement turning maneuvers. The presented
prototype was validated experimentally. The rear
wheels of the ergometer match the rear wheels
velocities of the simulated wheelchair with a root-
mean-square error of 0.9 %. Therefore,
theergometers accuracy is mainly bounded by the
accuracy of the wheelchairuser model, which means
that future improvements of the wheelchairuser
model will be directly reflected by the ergometer. The
conditions for stability were also evaluated. A minimal
simulated mass of 18 kg and a minimal simulated
moment of inertia of 1 kgm2 are needed. These
requirements are encountered by any wheelchairuser
combination
61 ERA-03 Walking Intent-
Based Movement
Control for
JAIST Active
Robotic Walker
2014 This paper presents a novel interactive control for our
assistive robotic walker, the JAIST Active Robotic
Walker (Jarrod), developed for elderly people in need
of assistance. The aim of our research is to recognize
characteristics of the users gait and to generate the
movement of Jarrod accordingly. Specifically, the
proposed control enables JARoW to accurately
generate the direction and velocity of its movement in
a way that corresponds to the users variable walking
behaviors. The algorithm and implementation of the
control are explained in detail, and the effectiveness
and usability of JARoW are verified through extensive
experiments in everyday environments.
62 ERA-04 Development of a
Laser-Range-
Finder-Based
Human Tracking
and Control
Algorithm
for a Marathoner
Service Robot
2014 This paper presents a human detection algorithm and
an obstacle avoidance algorithm for a marathoner
service robot(MSR) that provides a service to a
marathoner while training. Tube used as a MSR, the
mobile robot should have the abilities to follow a
running human and avoid dynamically moving
obstacles in an unstructured outdoor environment. To
detect a human by laser range finder (LRF), we
defined features of the human body inLRF data and
employed a support vector data descriptionmethod.In
order to avoid moving obstacles while tracking a
running person, we defined a weighted radius for each
obstacle using the relative velocity between the robot
and an obstacle. For smoothly bypassingObstacles

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

37

without collision, a dynamic obstacle avoidance
algorithm for the MSR is implemented, which directly
employed a real-time position vector between the robot
and the shortest path around the obstacle. We verified
the feasibility of these proposed algorithms through
experimentation in different outdoor environments.
63 ERA-05 Wet Adhesion
Inspired Bionic
Climbing Robot
2014 Arthropods like stick insects have remarkable
locomotion performance to climb vertical surfaces
with their wet adhesionpads. This paper focuses on the
development of a novel wet adhesion pad for wall-
climbing robots that can scale walls. According to the
morphology of insects pads, mechanism of wet
adhesives analyzed. A novel wet adhesive pad with
microstructure based on combining electroforming
process with soft lithography is explored
Characteristic test results show that microstructures
on the surface of pads fabricated by the proposed
technique can improve the wet adhesive ability
effectively. The design, manufacture, and test of a
hexapod climbing robot prototype are also discussed.
Experimental results show that the climbing ability of
the robot with the pads is exceptional; the robot can
climb up to more than 80sloped surface and stick to
the vertical surface statically.
64 ERA-06 Implementing
Flexible and Fast
Turning
Maneuvers
of a Multipoint
Robotic Fish
2014 This paper focuses mainly on the control issues of
replicating fast C-start maneuvers commonly found in
fish propelled by their bodies and/or caudal fins. To
generate an escape maneuver that combines a high
degree of flexibility and precision, major factors
related to the caudal fins, the moving joints, and the
used motors are explored. Specifically, the turning
rates maximized by finely designing the preparatory
and propulsive stages, while the relatively precise
turning angle is achieved by closed-loop control
strategy in the propulsive and variable stages.
Different types of C-starts are extensively
implemented and compared by using a four-joint
robotic fish. The latest results obtained show that the
robotic fish is able to execute C-starts flexibly with
turning angle of up to 213, a top turning rate of
approximately670/s measured by the onboard
gyroscope. Meanwhile, an upper limit of turning
precision of less than 10 is achieved

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

38

65 ERA-07 Towards a New
Modality-
Independent
Interface
for a Robotic
Wheelchair
2014 This work presents the development of a robotic
wheelchair that can be commanded by users in a
supervised way or by a fully automatic unsupervised
navigation system. It provides flexibility to choose
different modalities to command the wheelchair, in
addition to be suitable for people with differentlevels
of disabilities. Users can command the wheelchair
based on their eye blinks, eye movements, head
movements, by sip-and-puffand through brain signals.
The wheelchair can also operate like anauto-guided
vehicle, following metallic tapes, or in an autonomous
way. The system is provided with an easy to use and
flexible graphical user interface onboard a personal
digital assistant, which issued to allow users to choose
commands to be sent to the robotic wheelchair. Several
experiments were carried out with people with
disabilities, and the results validate the developed
system as an assistive tool for people with distinct
levels of disability.
66 ERA-08 Bio inspired
Hydrodynamic
Force Feed
forward for
Autonomous
Underwater
Vehicle Control
2014 It is believed that the lateral line found in most fish
and some other aquatic organisms plays an important
role inmanybehaviors by providing hydrodynamic
information about the surrounding fluid. This paper
presents a lateral line inspired feedforwardcontrol
design for the autonomous underwater vehicles. The
goal of this paper is to improve maneuvering accuracy
for underwater exploration and environmental
monitoring. The proposed controller takes pressure
measurements at multiple locations over the entire
vehicle hull and forms a B-spline surface
approximation of the pressure distribution.
Hydrodynamic forces acting on the vehicle are then
estimated and passed to the controller for the
improved trajectory tracking performance. The
algorithm is formulatedin such a way that the force
estimation is a linear, fixed weight combination of the
pressure signals, which enables rapid online
computation. The performance of the feed
forwardcontrollers simulated in conjunction with the
robust integral of the sign of the error control
design. Trajectory tracking is investigated for control
accuracy in the presence of localization errors.
Reduced tracking errors are observed with the feed
forward design. Experimental tests with pressure
sensors on a moving cylinder further vindicate the
force estimation algorithm

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

39

67 ERA-09 Designing and
Evaluating a
Social Gaze-
Control
System for a
Humanoid Robot
2014 This paper describes a context-dependent social gaze
control system implemented as part of a humanoid
social robot. The system enables the robot to direct its
gaze at multiple humansWho are interacting with each
other and with the robot. The attention mechanism of
the gaze-control system is based on features that have
been proven to guide human attention: nonverbal and
verbal cues, proxemics, the visual field of view, and the
habituation effect. Our gaze-control system uses
Kinect skeleton tracking together with speech
recognition and SHORE-based facial expression
recognition to implement the same features. As part of
a pilot evaluation, we collected the gaze behavior of 11
participants in an eye-tracking study. We showed
participants videos of two-person interactions and
tracked their gaze behavior. A comparison of the
human gaze behavior with the behavior of our gaze-
control system running on the same videos shows that
it replicated human gaze behavior 89% of the time.
68 ERA-10 Driving Assistance
by Deictic Control
for a Smart
Wheelchair: The
Assessment Issue
2014 In this paper, an assessment of a driving assistanceby a
deictic command for a smart wheelchair is proposed.
This equipment enables the user to move with a series
of indications on an interface displaying a view of the
environment and bringingabout automatic movement
of the wheelchair. Two sets of testswere implemented
to assess the advantages of this type of assistance
compared with conventional wheelchair control. The
first set evaluated the performance of the human
machine system that is based on a course time analysis,
an observation of users actions, and an estimation of
driving comfort. The second test was implemented to
assess the cognitive requirements of the driving task,
specifically the attention and executive processes
required when driving in assisted mode. A dual-task
method was used to achieve this. The results show that
driving assistance brings about a decrease inphysical
load for the same level of comfort as manual driving,
but requires an additional cognitive effort for the
user,especially in terms of executive abilities.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

40

69 ERA-11 Programming
Robots to Express
Emotions:
Interaction
Paradigms,
Communication
Modalities, and
Context
2014 Robots are beginning to be used in many fields,
including health care, assistive industries, and
entertainment. However, we believe that the usefulness
of robots will remain limited until end-users without
technology expertise can easily program them. For
example, the wide ranges of situations in which robots
must express emotions as well as the differences in
people with whom robots interact require that
emotional expressions be highly customized. Thus, end
users should have the ability to create their own robot
behaviors to express emotions in the specific situations
and environments in which their robots operate. In
this paper, we study the ability of novice users to
program robots to express emotions using off-the-shelf
programming interfaces and methods forNo and Plea
robots. Via a series of user studies, we show that
novice participants created nonverbal expressions with
similar characteristics to those identified by experts.
However, overall,the emotions expressed through these
nonverbal expressionsWere not easily discerned by
others. Verbal expressions were more discernible,
although substantial room for improvement was
observed. Results also indicate, but do not definitively
show, that procedural mechanisms can improve users
abilities to create good verbal expressions.
70 ERA-12 Design of Sensing
System and
Anticipative
Behavior for
Human Following
of Mobile Robots
2014 The human-following behavior design for mobile
robots is considered in this paper. In particular, the
issue should be addressed from the perspective of
humanrobot interaction since humans are aware of
the following actions. This makes the problem quite
different from human tracking where recognition and
location accuracy are the main concerns. An
anticipative humanfollowingbehavior is proposed by
incorporating the human model.The human model is
constructed using relevant scientific studies about
human walk and social interaction, allowing the robot
to predict the human trajectory and to take
preemptive action. To realize the idea, it is necessary
to have a robust sensing system that is capable of
tracking the human location persistently. In this
paper, we also propose a sensing system based on a
novel 3-D mean shiftalgorithm on RGBD camera. The
system performance is assessed through experimental
evaluation of three specific humanfollowingscenarios:
following from behind, following on the side, and
following in front. Each of these scenarios has its
particularities and applications, thus providing insight
about the effectiveness and usability of anticipative
behavior.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

41

71 ERA-13 Heartbeat
Synchronization
With Haptic
Feedback for
Telesurgical
Robot
2014 Motion-canceling bilateral control, a
teleportationmethod, is proposed and implemented for
Telesurgicalrobots. Telesurgical robots have difficulty
in achieving control owing toelack of haptic feedback
and the beating motion of organs.Hence, this study
aims to provide a surgeon with the meansfor feeling
the tactile sensation of the remote organ, as well
asSynchronizing with its motion. Therefore, a surgeon
can treat the target using a master robot as if the
organ is not moving even though it actually moves.
The proposed method basically consists of
acceleration-based bilateral control to achieve haptic
feedback, and visual serving is used to compensate for
organ motion. The frequency characteristics and root
locus of the proposed method are analyzed to evaluate
its performance and stability, respectively. The
proposal is validated through experiments using
telesurgicalforceps robots.
72 ERA-14 LAROB: Laser-
Guided
Underwater
Mobile Robot
for Reactor Vessel
Inspection
2014 In a nuclear power plant, there are several
cylindricalvessels such as a reactor vessel and
pressurizer. The vessels areusually constructed by
welding large rolled plates or nozzle pipes together. To
ensure the integrity of the vessel, their welds should be
periodically inspected using sensors such as ultrasonic
transducers or visual cameras. To inspect these welds
effectively, we developed an underwater mobile robot,
which is guided by a laser pointer. The robotic system
was devised to reduce the inspection time and schedule
during mandatory code inspections compared to a
conventional inspection machine with a large
structure. The system mainly consists of an
underwater mobile robot, a laser positioning unit, and
a main control station. The underwater mobile robotis
guided by a laser positioning unit with a precise
resolution of0.05. The mobile robot moves on the
reactor vessel wall with four magnetic wheels. This
paper presents the design and implementation of the
underwater mobile robot. The laser guidance control
of the mobile robot is also described along with the
experimental results. The system was integrated with
the main control station, and tested in the reactor
vessel of a Korean nuclear power plant.After many
improvements in its design and engineering, the
system is expected to dramatically reduce the critical
path of the reactor vessel inspection, if the system is
used practically.
73 ERA-15 The MEI Robot:
Towards Using
Mothers to
Develop
Multimodal
2014 We introduce the first steps in a developmental robot
called MEI (multimodal emotional intelligence), a
robot that can understand and express emotions in
voice, gesture and gait using controllertrained only on
voice. Whereas it is known that humans can perceive

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

42

Emotional
Intelligence
affect in voice, movement, music and even as little as
point light displays, it is not clear how humans develop
this skill. Is it innate? If not, how does this emotional
intelligence develop in infants? Theme robot develops
these skills through vocal input andperceptual
mapping of vocal features to other modalities. We
baseMEIs development on the idea that motherless is
used as a way to associate dynamic vocal contours to
facial emotion from an early age. MEI uses these
dynamic contours to both understand and express
multimodal emotions using a unified model called
SIRE (Speed, Intensity, irregularity, and Extent).
Offline experiments with MEI support its cross-modal
generalization ability: a model trained with voice data
can recognize happiness, sadness, and fearing a
completely different modalityhuman gait. User
evaluations oftheme robot speaking, gesturing and
walking show that it can reliably express multimodal
happiness and sadness use only the voice-trained
model as a basis.
74 ERA-16 Control-
Configured
Design of
Spheroidal,
Appendage-Free,
Underwater
Vehicles
2014 A highly maneuverable, spheroid-shaped, underwater
robot using appendage-free, multi-degree of freedom
(DOF) propulsion technologies is presented. The
vehicle is hydrodynamic ally unstable due to think
moment. The vehicle is stabilized by feedback control,
rather than passive fins, which facilitates rapid turns
and agile motions. The new design was motivated by
nuclear reactor inspection and other applications
where external appendages must be avoided. Two
technical challenges are addressed in this paper. One is
the development of a compact, multi-DOFpropulsion
system that generates multiaxis water jets and switches
them rapidly. The other is the design of a jet
configuration and control system that augments
stability and achieves high maneuverability. A
nonlinear hydrodynamic model is formulated, and its
linearized dynamics are analyzed to attain insights into
how jet direction influences controllability and
stability. Prototype vehicles built and used to verify
these concepts. The integrated design method is
implemented and shown to achieve stable motions,
high maneuverability, and multidirectional capability

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

43

75 ERA-17 HumanRobot
Collaboration
Based on Motion
Intention
Estimation
2014 In this paper, adaptive impedance control is proposed
for a robot collaborating with a human partner, in the
presence ofunknown motion intention of the human
partner and unknown robot dynamics. Human motion
intention is defined as the desired trajectory in the
limb model of the human partner, which is extremely
difficult to obtain considering the nonlinear and
timevaryingproperty of the limb model. Neural
networks are employed to cope with this problem,
based on which an online estimation method is
developed. The estimated motion intention is
integrated \ into the developed adaptive impedance
control, which makes the robot follow a given target
impedance model. Under the proposed method, the
robot is able to actively collaborate with its human
partner, which is verified through experiment studies.
76 ESX-01 A Novel and
Lightweight
System to Secure
Wireless Medical
Sensor Networks
2014 Wireless medical sensor networks (MSNs) are a key
enabling technology in e-healthcare that allows the
data of a patients vital body parameters to be
collected by the wearable or implantable biosensors.
However, the security and privacy protection of the
collected data is a major unsolved issue, with
challenges coming from the stringent resource
constraints of MSN devices, and the high demand for
both security/privacy and practicality. In this paper,
we propose a lightweight and secure system for MSNs.
The system employs hash-chain based key updating
mechanism and proxy-protected signature technique
to achieve efficient secure transmission and fine-
grained data access control. Furthermore, we extend
the system to provide backward secrecy and privacy
preservation. Our system only requires symmetric-key
encryption/decryption and hash operations and is thus
suitable for the low-power sensor nodes. This paper
also reports the experimental results of the proposed
system in a network of resource-limited motes and
laptop PCs, which show its efficiency in practice. To
the best of our knowledge, this is the first secure
77 ESX-02 Fire Localization
Based On Range-
Range-Range
Model for Limited
Interior Space
2014 Fire localization problem is studied based on
temperature data taken by wireless sensor arrays and
a novel range-range-range (RRR) model is proposed to
overcome shortcomings, which exists in the current
range-point-range (RPR) model in this paper. For a
single sensor array composed of four sensors deployed
with a square, three angle estimates on fire bearing
can be obtained using far-field localization technology.
These angle estimates are used to get their statistical
mean and variance at a single time. Based on the
statistical features, we propose two fire localization
methods under the RRR frame, which are angle
bisector and nonlinear filtering methods. For the angle

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

44

bisector method, a recursive formula of the mean and
variance is presented in time series so that global angle
estimates can be used. Furthermore, a fire coordinate
estimate, which is actually the center of estimated-
range circle, can be taken by use of intersecting two
angle bisectors from two sensor arrays. Moreover, the
estimation of a radius for the estimated fire region is
also realized. In order to improve localization
accuracy and robustness of fire estimation to non-
Gaussian noise component, the fire localization is
taken as a nonlinear bearing-only tracking issue for
the case where the covariance of measurement noise is
unknown and a specific variation Bayesian adaptive
square cubature Kalman filter is proposed to estimate
the coordinate of the center. These proposed
algorithms not only provide some new points of view
on the fire localization for limited interior space, but
are helpful for practical firefighting applications.
78 ESX-03 Fraud Detection
From Taxis
Driving Behaviors
2014 Taxi is a major transportation in the urban area,
offering
great benefits and convenience to our daily life.
However, one of the major business fraud in taxis is
the charging fraud, specifically overcharging for the
actual distance. In practice, it is hard for us to always
monitor taxis and detect such fraud. Due to the Global
Positioning System (GPS) embedded in taxis, we can
collect the GPS reports fromthe taxis locations, and
thus, it is possible for us to retrieve their traces.
Intuitively, we can utilize such information to
construct taxis trajectories, compute the actual
service distance on the citymap, and detect fraudulent
behaviors. However, in practice, due to the extremely
limited reports, notable location errors, complex city
map, and road networks, our task to detect taxi fraud
faces significant challenges, and the previous methods
cannot work well. In this paper, we have a critical and
interesting observation that fraudulent taxis always
play a secret trick, i.e., modifying the taximeter to a
smaller scale. As a result, it not only makes the service
distance larger but also makes the reported taxi speed
larger. Fortunately, the speed information collected
from the GPS reports is accurate. Hence, we utilize the
speed information to design a system, which is called
the Speed-based Fraud Detection System (SFDS), to
model taxi behaviors and detect taxi fraud. Our
method is robust to the location errors and
independent of the map information and road
networks. At the same time, the experiments on real-
life data sets confirm that our method has better
accuracy, scalability, and more efficient computation,
compared with the previous related methods. Finally,

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

45

interesting findings of our work and discussions on
potential issues are provided in this paper for future
city transportation and human behavior research.
79 ESX-04 An Instrumented
Insole for Long
Term Monitoring
Movement,
Comfort, and
Ergonomics
2014 We present a new electronic insole for wireless
monitoring of motor activities and shoe comfort. The
proposed device, equipped with both Zigbee
transmission and local data storage allows
unobtrusive, long term monitoring of subjects
outside the laboratory, during natural behavior
activites, such as daily living and sports. The system
detailed in this work includes humidity and
temperature sensors, as well as a three axis
accelerometer and four pressure sensors, all fitted
within a 3.7 mm thick insole. Preliminary experiments
have shown that the device is reliable and may be
worn without causing discomfort even for long periods
of time, suggesting that it could be useful in
applications ranging from ergonomics studies on
footwear to sports and rehabilitation.
80 ESX-05 Automated
Irrigation System
Using a Wireless
Sensor Network
and GPRS
Module
2014 An automated irrigation system was developed to
optimize water use for agricultural crops. The system
has a distributed wireless network of soil-moisture and
temperature sensors placed in the root zone of the
plants. In addition, a gateway unit handles sensor
information, triggers actuators, and transmits data to
a web application. An algorithm was developed with
threshold values of temperature and soil moisture that
was programmed into a microcontroller-based
gateway to control water quantity. The system was
powered by photovoltaic panels and had a duplex
communication link based on a cellular-Internet
interface that allowed for data inspection and
irrigation scheduling to be programmed through a
web page. The automated system was tested in a sage
crop field for 136 days and water savings of up to 90%
compared with traditional irrigation practices of the
agricultural zone were achieved. Three replicas of the
automated system have been used successfully in other
places for 18 months. Because of its energy autonomy
and low cost, the system has the potential to be useful
in water limited geographically isolated areas.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

46

81 ESX-06 BeAMS: A
Beacon-Based
Angle
Measurement
Sensor for Mobile
Robot Positioning
2014 Positioning is a fundamental issue in mobile robot
applications, and it can be achieved in multiple ways.
Among these methods, triangulation based on angle
measurements is widely used, robust, accurate, and
flexible. This paper presents BeAMS, which is a new
active beacon-based angle measurement system used
for mobile robot positioning. BeAMS introduce several
major innovations. One innovation is the use of a
unique unsynchronized channel with onoff keying
modulated infrared signals to measure angles and to
identify the beacons. We also introduce a new
mechanism to measure angles: Our system detects a
beacon when it enters and leaves an angular window.
We show that the estimator resulting from the center
of this angular window provides an unbiased estimate
of the beacon angle. A theoretical framework for a
thorough performance analysis of BeAMS is provided.
We establish the upper bound of the variance and
validate this bound through experiments and
simulations; the overall error measure of BeAMS is
lower than 0.24 for an acquisition rate of 10 Hz. In
conclusion, BeAMS is a low-power, flexible, and
robust solution for angle measurement and a reliable
component for robot positioning.
82 ESX-07 Capacitive Touch
Communication:
A Technique
to Input Data
through Devices
Touch Screen
2014 As we are surrounded by an ever-larger variety of
post-PC devices, the traditional methods for
identifying and authenticating users have become
cumbersome and time consuming. In this paper, we
present a capacitive communication method through
which a device can recognize who is interacting with it.
This method exploits the capacitive touchscreens,
which are now used in laptops, phones, and tablets, as
a signal receiver. The signal that identifies the user can
be generated by a small transmitter embedded into a
ring, watch, or other artifact carried on the human
body. We explore two example system designs with a
low-power continuous transmitter that communicates
through the skin and a signet ring that needs to be
touched to the screen. Experiments with our prototype
transmitter and tablet receiver show that capacitive
communication through a touchscreen is possible, even
without hardware on a receiver. This latter approach
imposes severe limits on the data rate, but the rate is
sufficient for differentiating users in multiplayer tablet
games or parental control applications. Controlled
experiments with a signal generator also indicate that
future designs may be able to achieve data rates that
are useful for providing less obtrusive authentication
with similar assurance as PIN codes or swipe patterns
commonly used on smartphones today.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

47

83 ESX-08 COTraMS: A
Collaborative and
Opportunistic
Traffic
Monitoring
System
2014 Traffic monitoring and control are becoming more
and more important as the number of vehicles and
traffic jams grow. Nevertheless, these tasks are still
predominantly performed by visual means using
strategically placed video cameras. For more
effectiveness, proposals to improve traffic monitoring
and control should consider automated systems. In this
paper, we propose the Collaborative and
Opportunistic Traffic Monitoring System (COTraMS),
which is a system that monitors traffic using available
IEEE 802.11 networks. COTraMS is collaborative
because user participation is essential in defining the
vehicle movement and opportunistic because it uses
existing information. To evaluate the performance of
COTraMS, a prototype is implemented using an IEEE
802.11 b/g network. Measurements from a real public
wireless network in Rio de Janeiro, Brazil,
demonstrate the possibility of obtaining traffic
conditions with our proposed monitoring system. In
addition, we analyze COTraMS via simulation to
evaluate its performance in scenarios with a larger
number of vehicles. The comparison of the obtained
results with data obtained from Global Positioning
System shows high accuracy in detecting both the
position of the vehicle and the estimation of the road
condition, using a simple architecture and a small
amount of network bandwidth.
84 ESX-09 Detecting
Direction of
Movement Using
Pyroelectric
Infrared Sensors
2014 Pyro electric infrared (PIR) sensors are widely used as
a simple but powerful people presence triggers, e.g.,
automatic lighting systems. In particular, by
alternating the effective polarization of the sensing
elements in a PIR sensor, it is possible to determine the
relative direction of the movement of an object moving
on the motion plane of the PIR sensor. In this paper,
we present a novel method of detecting a relative
direction of human movement (in eight directions
uniformly distributed) with two pairs of PIR sensors
whose sensing elements are orthogonally aligned. We
have developed a data collection unit with four dual
sensing element PIR sensors with modified lenses, and
collected data set from six subjects walking in eight
directions each. Based on the collected PIR signals, we
have performed classification analysis with well-
known machine learning algorithms, including
instance-based learning and support vector machine.
Our findings show that with the raw data set captured
from two orthogonally aligned PIR sensors with
modified lenses, we were able to achieve more than
98% correct detection of direction of movement. We
also found that with the reduced feature set composed
of three peak values for each PIR sensor, we could

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

48

achieve 89%95% recognition accuracy according to
machine learning algorithms.
85 ESX-10 Development of a
Control Strategy
of Variable Speed
Limits to Reduce
Rear-End
Collision Risks
Near
Freeway
Recurrent
Bottlenecks
2014 The primary objective of this paper was to develop a
control strategy of variable speed limits (VSLs) to
reduce rear-end collision risks near freeway recurrent
bottlenecks. The risks of rear-end collisions were
estimated using a crash risk prediction model that is
specifically developed for rear-end collisions in
freeway bottleneck areas. The effects of the VSL
control strategy were evaluated using a cell
transmission model. Several control factors were
tested, including the start-up threshold of the collision
likelihood, the target speed limit, the speed change
rate, and the speed difference between adjacent links.
A genetic algorithm was used to optimize critical
control factors. For the high demand scenario, the
proposed control strategy used 25% of the maximum
collision likelihood for the start-up threshold, 35 mi/h
for the target speed limit, 10 mi/h per 30 s for the
speed change rate, and 10 mi/h for the speed difference
between different links. For the moderate demand
scenario, the strategy used 20% of the maximum
collision likelihood for the start-up threshold, 40 mi/h
for the target speed limit, 15 mi/h per 30 s for the
speed change rate, and 10 mi/h for the speed difference
between different links. The results of comparative
analyses suggested that the proposed control strategy
outperformed other strategies in reducing the rear-end
collision risks near freeway recurrent bottlenecks.
With the proposed control strategy, the VSL control
reduced the rear-end crash potential by 69.84% for
the high demand scenario and by 81.81% for the
moderate demand scenario.
86 ESX-11 Dynamic
Authentication
with Sensory
Information for
the Access Control
Systems
2014 Access card authentication is critical and essential for
many modern access control systems, which have been
widely deployed in various government, commercial,
and residential environments. However, due to the
static identification information exchange among the
access cards and access control clients, it is very
challenging to fight against access control system
breaches due to reasons such as loss, stolen or
unauthorized duplications of the access cards.
Although advanced biometric authentication methods
such as fingerprint and iris identification can further
identify the user who is requesting authorization, they
incur high system costs and access privileges cannot be
transferred among trusted users. In this work, we
introduce a dynamic authentication with sensory
information for the access control systems. By
combining sensory information obtained from

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

49

onboard sensors on the access cards as well as the
original encoded identification information, we are
able to effectively tackle the problems such as access
card loss, stolen, and duplication. Our solution is
backward-compatible with existing access control
systems and significantly increases the key spaces for
authentication. We theoretically demonstrate the
potential key space increases with sensory information
of different sensors and empirically demonstrate
simple rotations can increase key space by more than
1,000,000 times with an authentication accuracy of 90
percent. We performed extensive simulations under
various environment settings and implemented our
design on WISP to experimentally verify the system
performance.
87 ESX-12 Energy-Saving
Driver Design for
Full-Color
Large-Area LED
Display Panel
Systems
2014 This paper demonstrates how the multilevel pulse
width modulation (PWM) (MPWM) driving method
can be implemented on a full-color large-area light-
emitting diode (LED) display panel system through a
low-cost modification of the existing hardware
configuration. The method employs multiple LED
driver modules connected in parallel which are
combined to deliver MPWM current to individual
LED pixels. For a three-level driving scheme, the
criterion for selecting the midlevel current in order to
maximize the luminous efficacy gain is derived
mathematically. The algorithm for video signal
conversion required for deriving the sub video signals
from the original high-definition multimedia interface
or digital visual interface video signal for activating
multiple LED driver modules is also discussed.
88 ESX-13 Development Of
An Improved
TimeFrequency
Analysis-Based
Nonintrusive
Load Monitor For
Load Demand
Identification

In a smart house connected to a smart grid via
advanced metering infrastructure, a nonintrusive load
monitor (NILM) that identifies individual appliances
by disaggregating composite electric load signal from
the minimal number of sensors installed at the main
distribution board in the field can be regarded as a
part of a home/building energy management system.
This type of load monitoring technique, not only for
domestic but also for industrial applications, is
relevant to electricity energy management and
conservation issues. In this paper, an improved time
frequency analysis-based NILM composed of three
system components, including data acquisition,
transient feature extraction, and load identification, is
proposed. The improved NILM proposed in this paper
incorporates a multiresolution S-transform-based
transient feature extraction scheme with a modified 0
1 multidimensional knapsack algorithm-based load
identification method to identify individual household
appliances that may either be energized

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

50

simultaneously or be identified under similar real
power consumption. For the load identification
process, an ant colony optimization algorithm is
employed to perform combinatorial search that is
formulated as a modified 01 multidimensional
knapsack problem. As shown from the experimental
results, the improved NILM strategy proposed in this
paper is confirmed to be feasible.
89 ESX-14 Measurement of
Speed and
Calibration of
Tachometers
Using Rotating
Magnetic Field
Fast speed measurement and control signals are
required for feedback control applications. In the
proposed technique, a rotating magnetic field (RMF) is
used to measure the speed and the variation in speed
with high accuracy. In addition to a 400 Hz, three-
phase input voltage circuit and an output zero-crossing
detector circuit, a contact-type synchro is used as a
primary transducer. A balanced three-phase ac
voltage is applied to the stator windings of synchro,
which produces an RMF. The frequency of
electromotive force induced in the rotor circuit of
synchro depends upon the speed of rotor or rotating
member. The RMF revolves at a speed of 24 000 r/min,
which is purposely kept very high in comparison with
the speed of the rotor or rotating member. Thus, the
measurement becomes very fast and the change in
speed is sensed within 2.5 ms. The time response of the
proposed scheme is also compared with the time
response of a dc tacho generator. A digital storage
oscilloscope and a microcontroller are used for
measurement of the output. The 16-b digital output of
the microcontroller is made available as a feedback
signal for control applications. The high accuracy of
measurement of the proposed technique is also
successfully used for calibration of different contact-
and noncontact-type tachometers.
90 ESX-15 Overcoming
Drowsiness by
Inducing
Cardiorespiratory
Phase
Synchronization
Drowsiness is one of the major factors leading to car
accidents. Many automobile companies and
institutions have been studying ways to monitor
drowsiness and keep drivers awake. When drowsiness
is detected during driving, audible sound, vibrations,
or messages on a display are generally used to warn
the driver to concentrate on driving or to take a rest.
These methods help to prevent drowsiness-related
crashes to some extent, but for greater safety, methods
need to be developed to physiologically overcome
drowsiness. The key to overcoming drowsiness is to
keep the body constantly supplied with oxygen. We
focused on cardiorespiratory phase synchronization
(CRPS) to recover from oxygen desaturation during
drowsiness. This study found it possible to induce
CRPS by paced breathing (PB) using pulse sound,

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

51

which synchronized with heartbeats. The experiment
results showed SpO2 measured from forehead
increased during this PB. The increase in SpO2 was
larger than that of yawns, deep breathing, or a period
of drowsiness spontaneously reduced. In conclusion,
inducing CRPS by PB using pulse sound synchronized
with the heartbeat has the potential to reduce
drowsiness physiologically.
91 ESX-16 Profiling Aquatic
Diffusion Process
Using
Robotic Sensor
Networks
Water resources and aquatic ecosystems are facing
increasing threats from climate change, improper
waste disposal, and oil spill incidents. It is of great
interest to deploy mobile sensors to detect and monitor
certain diffusion processes (e.g., chemical pollutants)
that are harmful to aquatic environments. In this
paper, we propose an accuracy-aware diffusion
process profiling approach using smart aquatic mobile
sensors such as robotic fish. In our approach, the
robotic sensors collaboratively profile the
characteristics of a diffusion process including source
location, discharged substance amount, and its
evolution over time. In particular, the robotic sensors
reposition themselves to progressively improve the
profiling accuracy. We formulate a novel movement
scheduling problem that aims to maximize the
profiling accuracy subject to the limited sensor
mobility and energy budget. We develop an efficient
greedy algorithm and a more complex near-optimal
radial algorithm to solve the problem. We conduct
extensive simulations based on real data traces of GPS
localization errors, robotic fish movement, and
wireless communication. The results show that our
approach can accurately profile dynamic diffusion
processes under tight energy budgets. Moreover, a
preliminary evaluation based on the implementation
on Telos B motes validates the feasibility of deploying
our profiling algorithms on mote-class robotic sensor
platforms.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

52

92 ESX-17 Rail Component
Detection,
Optimization, and
Assessment for
Automatic Rail
Track Inspection
In this paper, we present a real-time automatic vision-
based rail inspection system, which performs
inspections at 16 km/h with a frame rate of 20 fps. The
system robustly detects important rail components
such as ties, tie plates, and anchors, with high accuracy
and efficiency. To achieve this goal, we first develop a
set of image and video analytics and then propose a
novel global optimization framework to combine
evidence from multiple cameras, Global Positioning
System, and distance measurement instrument to
further improve the detection performance. Moreover,
as the anchor is an important type of rail fastener, we
have thus advanced the effort to detect anchor
exceptions, which includes assessing the anchor
conditions at the tie level and identifying anchor
pattern exceptions at the compliance level.
Quantitative analysis performed on a large video data
set captured with different track and lighting
conditions, as well as on a real time field test, has
demonstrated very encouraging performance on both
rail component detection and anchor exception
detection. Specifically, an average of 94.67% precision
and 93% recall rate has been achieved for detecting all
three rail components, and a 100% detection rate is
achieved for compliance-level anchor exception with
three false positives per hour. To our best knowledge,
our system is the first to address and solve both
component and exception detection problems in this
rail inspection area.
93 ESX-18 RAMSES: RFID
Augmented
Module
for Smart
Environmental
Sensing
This paper presents a radio frequency identification
(RFID) augmented module for smart environmental
sensing (RAMSES), which is a fully passive device with
sensing and computation capabilities conceived to
explore novel and unconventional RFID applications.
RAMSES implements an RF energy-harvesting circuit
enhanced by a dc-dc voltage booster in silicon-on-
insulator technology, an ultralow-power
microcontroller, temperature, light, and acceleration
sensors, and a new-generation I2C-RFID chip to
wirelessly deliver sensor data to standard RFID
EPCglobal Class-1 Generation-2 readers. A
preliminary RAMSES prototype, fabricated on a
printed circuit board using low-cost off-the-shelf
discrete components, has been extensively tested
through experiments conducted both in lab and real-
world application scenarios. The achieved results have
demonstrated the ability of RAMSES to harvest the
RF energy emitted by an interrogator placed up to 10
m of distance and autonomously perform sensing,
computation, and data communication. To our
knowledge, this is the longest range ever reported for

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

53

fully passive RFID sensors. Furthermore, for
applications requiring larger operating distances,
RAMSES provides also a battery-assisted passive
mode yielding up to 22-m communication range.
94 ESX-19 Resilient
Monitoring
Systems:
Architecture,
Design,
and Application to
Boiler/Turbine
Plant
Resilient monitoring systems, considered in this paper,
are sensor networks that degrade gracefully under
malicious attacks on their sensors, causing them to
project misleading information. The goal of this paper
is to design, analyze, and evaluate the performance of
a resilient monitoring system intended to monitor
plant conditions (normal or anomalous). The
architecture developed consists of four layers: data
quality assessment, process variable assessment, plant
condition assessment, and sensor network adaptation.
Each of these layers is analyzed by either analytical or
numerical tools. The performance of the overall
system is evaluated using a simplified boiler/turbine
plant. The measure of resiliency is quantified based on
the KullbackLeibler divergence and shown to be
sufficiently high in all scenarios considered.
95 ESX-20 Secure Data
Retrieval for
Decentralized
Disruption-
Tolerant Military
Networks
Mobile nodes in military environments such as a
battlefield or a hostile region are likely to suffer from
intermittent network connectivity and frequent
partitions. Disruption-tolerant network (DTN)
technologies are becoming successful solutions that
allow wireless devices carried by soldiers to
communicate with each other and access the
confidential information or command reliably by
exploiting external storage nodes. Some of the most
challenging issues in this scenario are the enforcement
of authorization policies and the policies update for
secure data retrieval. Cipher text-policy attribute-
based encryption (CP-ABE) is a promising
cryptographic solution to the access control issues.
However, the problem of applying CP-ABE in
decentralized DTNs introduces several security and
privacy challenges with regard to the attribute
revocation, key escrow, and coordination of attributes
issued from different authorities. In this paper, we
propose a secure data retrieval scheme using CP-ABE
for decentralized DTNs where multiple key authorities
manage their attributes independently. We
demonstrate how to apply the proposed mechanism to
securely and efficiently manage the confidential data
distributed in the disruption-tolerant military
network.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

54

96 ESX-21 Sensor Fusion-
Based Vacant
Parking Slot
Detection and
Tracking
This paper proposes a vacant parking slot detection
and tracking system that fuses the sensors of an
Around View Monitor (AVM) system and an
ultrasonic sensor-based automatic parking system.
The proposed system consists of three stages: parking
slot marking detection, parking slot occupancy
classification, and parking slot marking tracking. The
parking slot marking detection stage recognizes
various types of parking slot markings using AVM
image sequences. It detects parking slots in individual
AVM images by exploiting a hierarchical tree
structure of parking slot markings and combines
sequential detection results. The parking slot
occupancy classification stage identifies vacancies of
detected parking slots using ultrasonic sensor data.
Parking slot occupancy is probabilistically calculated
by treating each parking slot region as a single cell of
the occupancy grid. The parking slot marking tracking
stage continuously estimates the position of the
selected parking slot while the ego-vehicle is moving
into it. During tracking, AVM images and motion
sensor-based odometry are fused together in the
chamfer score level to achieve robustness against
inevitable occlusions caused by the ego-vehicle. In the
experiments, it is shown that the proposed method can
recognize the positions and occupancies of various
types of parking slot markings and stably track them
under practical situations in a real-time manner. The
proposed system is expected to help drivers
conveniently select one of the available parking slots
and support the parking control system by
continuously updating the designated target positions.
97 ESX-22 Two-Dimensional
Sensor System for
Automotive Crash
Prediction
This paper focuses on the use of magneto resistive and
sonar sensors for imminent collision detection in cars.
The magneto resistive sensors are used to measure the
magnetic field from another vehicle in close proximity,
to estimate relative position, velocity, and orientation
of the vehicle from the measurements. First, an
analytical formulation is developed for the planar
variation of the magnetic field from a car as a function
of 2-D position and orientation. While this relationship
can be used to estimate position and orientation, a
challenge is posed by the fact that the parameters in
the analytical function vary with the type and model of
the encountered car. Since the type of vehicle
encountered is not known a priori, the parameters in
the magnetic field function are unknown. The use of
both sonar and magneto resistive sensors and an
adaptive estimator is shown to address this problem.
While the sonar sensors do not work at very small
inter vehicle distance and have low refresh rates, their

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

55

use during a short initial time duration leads to a
reliable estimator. Experimental results are presented
for both a laboratory wheeled car door and for a full-
scale passenger sedan. The results show that planar
position and orientation can be accurately estimated
for a range of relative motions at different oblique
angles.



No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

56

MATLAB IMAGE PROCESSING AND COMMUNICATION
Appendix:
IP-Image Processing
CM-Communication

SL.NO CODE TITLE YEAR TITLE
1 IPSH-01 Image Quality
Assessment for Fake
Biometric Detection:
Application to Iris,
Fingerprint, and
Face Recognition
2014-
15
To ensure the actual presence of a real legitimate
trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant
problem in biometric authentication, which
requires the development of new and efficient
protection measures. In this paper, we present a
novel software-based fake detection method that
can be used in multiple biometric systems to detect
different types of fraudulent access attempts. The
objective of the proposed system is to enhance the
security of biometric recognition frameworks, by
adding liveness assessment in a fast, user-friendly,
and non-intrusive manner, through the use of
image quality assessment. The proposed approach
presents a very low degree of complexity, which
makes it suitable for real-time applications, using
25 general image quality features extracted from
one image (i.e., the same acquired for
authentication purposes) to distinguish between
legitimate and impostor samples. The experimental
results, obtained on publicly available data sets of
fingerprint, iris, and 2D face, show that the
proposed method is highly competitive compared
with other state-of-the-art approaches and that the
analysis of the general image quality of real
biometric samples reveals highly valuable
information that may be very efficiently used to
discriminate them from fake traits.
2 IPBS-02 Noise Reduction in
Digital Hologram
Using Wavelet
Transforms and
Smooth Filter for
Three-Dimensional
Display
2014-
15
A noise reduction method of Fresnel computer-
generated hologram (CGH) using wavelet
transform and smooth filter is presented. Noise in
hologram is very difficult to remove because an
interference pattern is recorded on a digital camera
during the digital processing. It also occurs in the
reconstruction process, which is affected by discrete
quantizing levels and optical experiment setup. So,
we develop an algorithm that is capable of changing
pixel values at different scales with imaginary or
real value according to the requirements of each
position in the hologram. A new algorithm is
proposed to satisfy the above requirements using a

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

57

mathematical transformation between the smooth
filter function and mother wavelet function in a
wavelet transform. In this paper, a theoretical
model to predict the effect of noise is described and
verified by the experimental results. Based on this,
the resultant noises in the reconstructed image by
Fresnel CGH algorithm are decreased clearly when
spatial light modulator (SLM) for 3D object is
placed at distance from 260 mm to 900 mm. The
enhanced 3D images can be obtained from digital
holograms using efficient noise reduction algorithm
to apply this proposed model.
3 IPBS-03 Methods for Nuclei
Detection,
Segmentation, and
Classification in
Digital
Histopathology: A
ReviewCurrent
Status and Future
Potential
2014-
15
Digital pathology represents one of the major
evolutions in modern medicine. Pathological
examinations constitute the gold standard in many
medical protocols, and also play a critical and legal
role in the diagnosis process. In the conventional
cancer diagnosis, pathologists analyze biopsies to
make diagnostic and prognostic assessments,
mainly based on the cell morphology and
architecture distribution. Recently, computerized
methods have been rapidly evolving in the area of
digital pathology, with growing applications related
to nuclei detection, segmentation, and classification.
In cancer research, these approaches have played,
and will continue to play a key (often bottleneck)
role in minimizing human intervention,
consolidating pertinent second opinions, and
providing traceable clinical information.
Pathological studies have been conducted for
numerous cancer detection and grading
applications, including brain, breast, cervix, lung,
and prostate cancer grading. Our study presents,
discusses, and extracts the major trends from an
exhaustive overview of various nuclei detection,
segmentation, feature computation, and
classification techniques used in histopathology
imagery, specifically in hematoxylineosin and
immunohistochemical staining protocols. This
study also enables us to measure the challenges that
remain, in order to reach robust analysis of whole
slide images, essential high content imaging with
diagnostic biomarkers and prognosis support in
digital pathology
4 IPS3-04 Blood Vessel
Extraction For
Retinal Images Using
Morphological
Operator and KCN
Clustering
2014-
15
This paper presents an automated blood vessel
detection method fromthe fundus image. The
method first performs some basic image
preprocessing tasks on the green channel of the
retinal image. A combination of morphological
operations like top- hat and bottom-hat
transformations are applied on the preprocessed

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

58

image to highlight the blood vessels. Finally, the
Kohonen Clustering Network is applied to cluster
the input image into two clusters namely vessel and
non-vessel .The performance ofthe proposed
method is tested by applying it on retinal images
from Digital Retinal Images for Vessel Extraction
(DRIVE)database. The results obtained from the
proposed method are compared with three other
state of the art methods. The sensitivity, false-
positive fraction (FPF)and accuracy of the
proposed method is found to be higher than the
other methods which imply that the proposed
method is more efficient and accurate.
5 IPS3-05 Action Recognition
Using Nonnegative
Action Component
Representation and
Sparse Basis
Selection
2014-
15
In this paper, we propose using high-level action
units to represent human actions in videos and,
based on such units, a novel sparse model is
developed for human action recognition. There are
three interconnected components in our approach.
First, we propose a new context-aware spatial
temporal descriptor, named locally weighted word
context, to improve the discriminability of the
traditionally used local spatial-temporal
descriptors. Second, from the statistics of the
context-aware descriptors, we learn action units
using the graph regularized nonnegative matrix
factorization, which leads to a part-based
representation and encodes the geometrical
information. These units effectively bridge the
semantic gap in action recognition. Third, we
propose a sparse model based on a joint l2,1-norm
to preserve the representative items and suppress
noise in the action units. Intuitively, when learning
the dictionary for action representation, the sparse
model captures the fact that actions from the same
class share similar units. The proposed approach is
evaluated on several publicly available data sets.
The experimental results and analysis clearly
demonstrate the effectiveness of the proposed
approach
6 IPS3-06 Performance
analysis of region of
interest based
Compression method
for medical images
2014-
15
In medical domain the high quality image data is
maintained with the help of highly efficient servers
across the network. There are some areas of
medicine where it is sufficient to maintain high
image quality only for diagnostically important
regions, for example, tumor region of the brain
MRI. Thus, the regions of interest are compressed
with almost zero data loss while transmitting and
storing the images, while the rest of image may
possess less quality. This paper represents a
compression method based on ROI, its
performance analysis focusing on Haar Wavelet

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

59

transform technique.
7 IPIT-01 3D Assisted Face
Recognition: Dealing
With Expression
Variations
2014-
15
One of the most critical sources of variation in face
recognition is facial expressions, especially in the
frequent case where only a single sample per
person is available for enrollment. Methods that
improve the accuracy in the presence of such
variations are still required for a reliable
authentication system. In this paper, we address
this problem with an analysis by-synthesis-based
scheme, in which a number of synthetic face images
with different expressions are produced. For this
purpose, an animatable 3D model is generated for
each user based on 17 automatically located
landmark points. The contribution of these
additional images in terms of the recognition
performance is evaluated with three different
techniques (principal component analysis, linear
discriminant analysis, and local binary patterns) on
face recognition grand challenge and Bosphorus 3D
face databases. Significant improvements are
achieved in face recognition accuracies, for each
database and algorithm.
8 IPIT-02 3-D Face Recognition
Using Curvelet Local
Features
2014-
15
In this letter, we present a robust single modality
feature-based algorithm for 3-D face recognition.
The proposed algorithm exploits Curvelet
transform not only to detect salient points on the
face but also to build multi-scale local surface
descriptors that can capture highly distinctive
rotation/displacement invariant local features
around the detected key points. This approach is
shown to provide robust and accurate recognition
under varying illumination conditions and facial
expressions. Using the well-known and challenging
FRGC v2 dataset, we report a superior
performance compared to other algorithms, with a
97.83% verification rate for probes with all facial
expressions.
9 IPIT-03 High-Quality Real-
Time Video
Inpainting with
PixMix
2014-
15
While image in painting has recently become widely
available in image manipulation tools, existing
approaches to video in painting typically do not
even achieve interactive frame rates yet as they are
highly computationally expensive. Further, they
either apply severe restrictions on the movement of
the camera or do not provide a high-quality
coherent video stream. In this paper we will present
our approach to high-quality real-time capable
image and video inpainting. Our PixMix approach
even allows for the manipulation of live video
streams, providing the basis for real Diminished
Reality (DR) applications. We will show how our
approach generates coherent video streams dealing

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

60

with quite heterogeneous background
environments and non-trivial camera movements,
even applying constraints in real-time.
10 IPIT-04 Moving Object
Detection Based on
Temporal
Information
2014-
15
This letter presents an automatic moving object
detection method in image sequences captured
from videos. While we focus on extracting moving
objects throughout a frame sequence, our approach
does not require any prior knowledge such as the
background modeling nor the interaction by users
such as empirical thresholds tuning. Based on the
continuous symmetric difference of the adjacent
frames, we get the full resolution saliency map of
the current frame, which highlights the moving
objects with higher saliency values and meanwhile
inhibits the saliency of the background. Then, the
maximum entropy sum method is utilized to
adaptively calculate the threshold to determine the
candidate areas and get the reasonable attention
seeds. After that, the ground truth is obtained
based on the modified fuzzy growing of the
attention seeds. The proposed algorithm is effective,
robust and the experimental results demonstrate
that it is promising for moving object detection.
11 IPIT-05 Iris Image
Classification Based
on Hierarchical
Visual Codebook
2014-
15
Iris recognition as a reliable method for personal
identification has been well-studied with the
objective to assign the class label of each iris image
to a unique subject. In contrast, iris image
classification aims to classify an iris image to an
application specific category, e.g. iris liveness
detection (classification of genuine and fake iris
images), race classification (e.g. classification of iris
images of Asian and non-Asian subjects), coarse-to-
fine iris identification (classification of all iris
images in the central database into multiple
categories). This paper proposes a general
framework for iris image classification based on
texture analysis. A novel texture pattern
representation method called Hierarchical Visual
Codebook (HVC) is proposed to encode the texture
primitives of iris images. The proposed HVC
method is an integration of two existing Bag-of-
Words models, namely Vocabulary Tree (VT), and
Locality-constrained Linear Coding (LLC). The
HVC adopts a coarse-to-fine visual coding strategy
and takes advantages of both VT and LLC for
accurate and sparse representation of iris texture.
Extensive experimental results demonstrate that
the proposed iris image classification method
achieves state-of-the-art performance for iris
liveness detection, race classification, and coarse-to-
fine iris identification. A comprehensive fake iris

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

61

image database simulating four types of iris spoof
attacks is developed as the benchmark for research
of iris liveness detection.
12 IPIT-06 Inpainting for
Remotely Sensed
Images With a
Multichannel
Nonlocal Total
Variation Model
2014-
15
Filling dead pixels or removing uninteresting
objects is often desired in the applications of
remotely sensed images. In this paper, an effective
image inpainting technology is presented to solve
this task, based on multichannel nonlocal total
variation. The proposed approach takes advantage
of a nonlocal method, which has a superior
performance in dealing with textured images and
reconstructing large-scale areas. Furthermore, it
makes use of the multichannel data of remotely
sensed images to achieve spectral coherence for the
reconstruction result. To optimize the proposed
variation model, a Bregmanized-operator-splitting
algorithm is employed. The proposed inpainting
algorithm was tested on simulated and real images.
The experimental results verify the efficacy of this
algorithm
13 IPIT-07 Lung Nodule
Classification With
Multilevel Patch-
Based Context
Analysis

2014-
15
In this paper, we propose a novel classification
method for the four types of lung nodules, i.e.,well-
circumscribed,vascularized, juxta-
pleural,andpleural-tail, in low dose computed
tomography scans. The proposed method is based
on contextual analysis by combining the lung
nodule and surrounding anatomical structures, and
has three main stages: an adaptive patch-based
division is used to construct concentric multilevel
partition; then, a new feature set is designed to
incorporate intensity, texture, and gradient
information for image patch feature description,
and then a contextual latent semantic analysis-
based classifier is designed to calculate the
probabilistic estimations for the relevant images.
Our proposed method was evaluated on a publicly
available dataset and clearly demonstrated
promising classification performance.
14 IPIT-08 Noise Reduction in
Hyperspectral
Images Through
Spectral Unmixing
2014-
15
Spectral unmixing and denoising of hyperspectral
images have always been regarded as separate
problems. By considering the physical properties of
a mixed spectrum, this letter introduces unmixing-
based denoising, a supervised methodology
representing any pixel as a linear combination of
reference spectra in a hyper spectral scene. Such
spectra are related to some classes of interest, and
exhibit negligible noise influences, as they are
averaged over areas for which ground truth is
available. After the unmixing process, the residual
vector is mostly composed by the contributions of
uninteresting materials, unwanted atmospheric

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

62

influences and sensor-induced noise, and is thus
ignored in the reconstruction of each spectrum. The
proposed method, in spite of its simplicity, is able to
remove noise effectively for spectral bands with
both low and high signal-to-noise ratio.
Experiments show that this method could be used
to retrieve spectral information from corrupted
bands, such as the ones placed at the edge between
ultraviolet and visible light frequencies, which are
usually discarded in practical applications. The
proposed method achieves better results in terms of
visual quality in comparison to competitors, if the
mean squared error is kept constant. This leads to
questioning the validity of mean squared error as a
predictor for image quality in remote sensing
applications.
15 IPIT-09 Object Detection in
High-Resolution
Remote Sensing
Images Using
Rotation Invariant
Parts Based Model
2014-
15
In this letter, we propose a rotation invariant parts
based model to detect objects with complex shape
in high-resolution remote sensing images.
Specifically, the geospatial objects with complex
shape are firstly divided into several main parts,
and the structure information among parts is
described and regulated in polar coordinates to
achieve the rotation invariance on configuration.
Meanwhile, the pose variance of each part relative
to the object is also defined in our model. In
encoding the features of the rotated parts and
objects, a new rotation invariant feature is
proposed by extending histogram oriented
gradients. During the final detection step, a
clustering method is introduced to locate the parts
in objects, and that method can also be used to fuse
the detection results. By this way, an efficient
detection model is constructed and the
experimental results demonstrate the robustness
and precision of our proposed detection model.
16 IPIT-10 Noise Reduction of
Echocardiographic
Images Based on
Temporal
Information
2014-
15
Noise suppression of echocardiography images is a
challenging issue for accurate and effective human
interpretation and computer-assisted analysis. In
spite of comprehensive speckle reduction methods,
until now there have been few studies of denoising
echocardiography sequences based on temporal
information. In this article, a fast and accurate
filter based on temporal information has been
proposed that enables the reduction of noise in
echocardiography images. The proposed method
consists of smoothing intensity variation time
curves (IVTC) assessed in each pixel. By filtering
high-frequency components of each temporal signal
and then replacing the smooth signals in their
positions, all pixels of all frames can be

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

63

reconstructed in a parallel manner. The
performance of the proposed method is evaluated
and compared with seven other speckle-reduction
filters. Comparison of the filters is based on a series
of computer-simulated and real clinical images, and
also on visual assessment by experts. The
experimental results show that the proposed
algorithm is fast, less computationally demanding
than other filters, and accurate, in addition to
preserving the edges of the images.
17 IPIT-11 Soft Biometrics and
Their Application in
Person Recognition
at a Distance
2014-
15
Soft biometric information extracted from a human
body (e.g., height, gender, skin color, hair color,
and so on) is ancillary information easily
distinguished at a distance but it is not fully
distinctive by itself in recognition tasks. However,
this soft information can be explicitly fused with
biometric recognition systems to improve the
overall recognition when confronting high
variability conditions. One significant example is
visual surveillance, where face images are usually
captured in poor quality conditions with high
variability and automatic face recognition systems
do not work properly. In this scenario, the soft
biometric information can provide very valuable
information for person recognition. This paper
presents an experimental study of the benefits of
soft biometric labels as ancillary information based
on the description of human physical features to
improve challenging person recognition scenarios
at a distance. In addition, we analyze the available
soft biometric information in scenarios of varying
distance between camera and subject.
Experimental results based on the Southampton
multibiometric tunnel database show that the use of
soft biometric traits is able to improve the
performance of face recognition based on sparse
representation on real and ideal scenarios by
adaptive fusion rules.
18 IPIT-12 A New Secure Image
Transmission
Technique via
Secret-Fragment-
Visible Mosaic
Images by Nearly
Reversible Color
Transformations
2014-
15
A new secure image transmission technique is
proposed, which transforms automatically a given
large-volume secret image into a so-called secret-
fragment-visible mosaic image
of the same size. The mosaic image, which looks
similar to an
arbitrarily selected target image and may be used
as a camouflage of the secret image, is yielded by
dividing the secret image into fragments and
transforming their color characteristics to be those
of the corresponding blocks of the target image.
Skillful techniques are designed to conduct the
color transformation process so that the secret

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

64

image may be recovered nearly losslessly. A scheme
of handling the overflows/underflows in the
converted pixels color values by recording the
color differences in the untransformed color space
is also proposed. The information required for
recovering the secret image is embedded into the
created mosaic image by a lossless data hiding
scheme using a key.
Good experimental results show the feasibility of
the proposed
method.
19 IPIT-13 An Efficient Parallel
Approach for
Sclera Vein
Recognition
2014-
15
Sclera vein recognition is shown to be a promising
method for human identification. However, its
matching speed
is slow, which could impact its application for real-
time applications.To improve the matching
efficiency, we proposed a new parallel sclera vein
recognition method using a two-stage parallel
approach for registration and matching. First, we
designed a rotation- and scale-invariant Y shape
descriptor based feature extraction method to
efficiently eliminate most unlikely matches. Second,
we developed a weighted polar line sclera
descriptor structure to incorporate mask
information to reduce GPU memory cost. Third, we
designed a coarse-to-fine two-stage matching
method. Finally, we developed a mapping scheme to
map the subtasks to GPU processing units. The
experimental results show that our proposed
method can achieve dramatic processing speed
improvement without compromising the
recognition accuracy.
20 IPIT-14 Fingerprint
Compression Based
on Sparse
Representation
2014-
15
A new fingerprint compression algorithm based on
sparse representation is introduced. Obtaining an
over complete dictionary from a set of fingerprint
patches allows us to represent them as a sparse
linear combination of dictionary atoms. In the
algorithm, we first construct a dictionary for
predefined fingerprint image patches. For a new
given fingerprint images, represent its patches
according to the dictionary by computing l0-
minimization and then quantize and encode the
representation. In this paper, we consider the effect
of various factors on compression results. Three
groups of fingerprint images are tested. The
experiments demonstrate that our algorithm is
efficient compared with several competing
compression techniques (JPEG, JPEG 2000,
andWSQ), especially at high compression ratios.
The experiments also illustrate that the proposed
algorithm is robust to extract minutiae.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

65


21 IPIT-15 Designing an
Efficient Image
Encryption-Then-
Compression System
via Prediction
Error Clustering and
Random
Permutation
2014-
15
In many practical scenarios, image encryption has
to be conducted prior to image compression. This
has led to the problem of how to design a pair of
image encryption and compression algorithms such
that compressing the encrypted
images can still be efficiently performed. In this
paper, we design a highly efficient image
encryption-then-compression (ETC) system, where
both lossless and lossy compressions are considered.
The proposed image encryption scheme operated in
the prediction error domain is shown to be able to
provide a reasonably high level of security. We also
demonstrate that an arithmetic coding-based
approach can be exploited to efficiently compress
the encrypted images. More notably, the proposed
compression approach applied to encrypted images
is only slightly worse, in terms of compression
efficiency, than the state-of-the-art lossless/lossy
image coders, which take original, unencrypted
images as inputs. In contrast, most of the existing
ETC solutions induce significant penalty on the
compression efficiency.
22 IPIT-16 Mining Weakly
Labeled Web Facial
Images
for Search-Based
Face Annotation
2014-
15
This paper investigates a framework of search-
based face annotation (SBFA) by mining weakly
labeled facial images that are freely available on the
World Wide Web (WWW). One challenging
problem for search-based face annotation scheme is
how to effectively perform annotation by exploiting
the list of most similar facial images and their weak
labels that are often noisy and incomplete. To
tackle this problem, we propose an effective
unsupervised label refinement (ULR) approach for
refining the labels of web facial images using
machine learning techniques. We formulate the
learning problem as a convex optimization and
develop effective optimization algorithms to solve
the large-scale learning task efficiently. To further
speed up the proposed scheme, we also
propose a clustering-based approximation
algorithm which can improve the scalability
considerably. We have conducted an extensive set
of empirical studies on a large-scale web facial
image testbed, in which encouraging results showed
that the proposed ULR algorithms can significantly
boost the performance of the promising SBFA
scheme.
23 IP-02 Quick Detection of
Brain Tumors and
Edemas: A Bounding
Box Method Using
2013-
14
A significant medical informatics task is indexing
patient databases according to size, location, and
other characteristics of brain tumors and
edemas, possibly based on magnetic resonance

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

66

Symmetry (MR) imagery. This requires segmenting tumors
and edemas within images from different MR
modalities. To date, automated brain tumor or
edema segmentation from MR modalities remains a
challenging as well as computationally intensive
task. In this paper, we propose a novel
automated, fast, and approximate segmentation
technique. The input is a patient study consisting
of a set of MR slices. The output is a corresponding
set of the slices that circumscribe the tumors with
axis-parallel bounding boxes. The proposed
approach is based on an unsupervised change
detection method that searches for the most
dissimilar region (axis-parallel bounding boxes)
between the left and the right halves of a brain in
an axial view MR slice. This change detection
process uses a novel score function based on
Bhattacharya coefficient computed with gray
level intensity histograms. We prove that this score
function admits a very fast (linear in image height
and width) search to locate the bounding box.
The average dice coefficients for localizing brain
tumors and edemas, over ten patient studies, are
0.57 and 0.52 respectively, which significantly
exceeds the scores for two other competitive region-
based bounding box techniques.
24 IP-03 An Efficient
Denoising
Architecture for
Removal of Impulse
Noise in Images
2013-
14
Images are often corrupted by impulse noise in the
procedures of image acquisition and transmission.
In this paper, we propose an efficient denoising
scheme and its VLSI architecture for the removal
of random-valued impulse noise. To achieve the
goal of low cost, a low-complexity VLSI
architecture is proposed. We employ a decision-
tree-based impulse noise detector to detect the noisy
pixels, and an edge-preserving filter to reconstruct
the intensity values of noisy pixels. Furthermore, an
adaptive technology is used to enhance the effects of
removal of impulse noise. Our extensive
experimental results demonstrate that the proposed
technique can obtain better performances in terms
of both quantitative evaluation and visual quality
than the previous lower complexity methods.
Moreover, the performance can be comparable to
the higher complexity methods. The VLSI
architecture of our design yields a processing rate
of about 200 MHz by using TSMC 0.18m
technology. Compared with the state-of-the-art
techniques, this work can reduce memory storage
by more than 99 percent. The design requires only
low computational complexity and two line memory
buffers. Its hardware cost is low and suitable to be

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

67

applied to many real-time applications
25 IP-04 Exposing Digital
Image Forgeries by
Illumination Color
Classification
2013-
14
For decades, photographs have been used to
document space-time events and they have often
served as evidence in courts. Although
photographers are able to create composites of
analog pictures, this process is very time consuming
and requires expert knowledge. Today, however,
powerful digital image editing software makes
image modifications straightforward. This
undermines our trust in photographs and, in
particular, questions pictures as evidence for real-
world events. In this paper, we analyze one of the
most common forms of photographic manipulation,
known as image composition or splicing. We
propose a forgery detection method that exploits
subtle inconsistencies in the color of the
illumination of images. Our approach is machine-
learning based and requires minimal user
interaction. The technique is applicable to images
containing two or more people and requires no
expert interaction for the tampering decision. To
achieve this, we incorporate information from
physics- and statistical-based illuminant estimators
on image regions of similar material. From these
illuminant estimates, we extract texture- and edge-
based features which are then provided to a
machine-learning approach for automatic decision-
making. The classification performance using an
SVM meta-fusion classifier is promising. It yields
detection rates of 86% on a new benchmark dataset
consisting of 200 images, and 83% on 50 images
that were collected from the Internet.
26 IP-05 Partial Face
Recognition:
Alignment-Free
Approach
2013-
14
Numerous methods have been developed for
holistic face recognition with impressive
performance. However, few studies have tackled
how to recognize an arbitrary patch of a face
image. Partial faces frequently appear in
unconstrained scenarios, with images captured by
surveillance cameras or handheld devices (e.g.,
mobile phones) in particular. In this paper, we
propose a general partial face recognition approach
that does not require face alignment by eye
coordinates or any other fiducial points. We
develop an alignment-free face representation
method based on Multi-Keypoint Descriptors
(MKD), where the descriptor size of a face is
determined by the actual content of the image. In
this way, any probe face image, holistic or partial,
can be sparsely represented by a large dictionary of
gallery descriptors. A new keypoint descriptor
called Gabor Ternary Pattern (GTP) is also

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

68

developed for robust and discriminative face
recognition. Experimental results are reported on
four public domain face databases (FRGCv2.0, AR,
LFW, and PubFig) under both the open-set
identification and verification scenarios.
Comparisons with two leading commercial face
recognition SDKs (PittPatt and FaceVACS) and
two baseline algorithms (PCA+LDA and LBP)
show that the proposed method, overall, is superior
in recognizing both holistic and partial faces
without requiring alignment.
27 IP-06 Depth Estimation of
Face Images Using
the Nonlinear Least-
Squares Model
2013-
14
In this paper, we propose an efficient algorithm to
reconstruct the 3D structure of a human face from
one or more of its 2D images with different poses.
In our algorithm, the nonlinear least-squares model
is first employed to estimate the depth values of
facial feature points and the pose of the 2D face
image concerned by means of the similarity
transform. Furthermore, different optimization
schemes are presented with regard to the accuracy
levels and the training time required. Our
algorithm also embeds the symmetrical property of
the human face into the optimization procedure, in
order to alleviate the sensitivities arising from
changes in pose. In addition, the regularization
term, based on linear correlation, is added in the
objective function to improve the estimation
accuracy of the 3D structure. Further, a model-
integration method is proposed to improve the
depth-estimation accuracy when multiple no frontal
view face images are available. Experimental
results on the 2D and 3D databases demonstrate the
feasibility and efficiency of the proposed methods
28 IP-07 Query-Adaptive
Image Search With
Hash Codes
2013-
14
Scalable image search based on visual similarity
has been an active topic of research in recent years.
State-of-the-art solutions often use hashing methods
to embed high-dimensional image features into
Hamming space, where search can be performed in
real-time based on Hamming distance of compact
hash codes. Unlike traditional metrics (e.g.,
Euclidean) that offer continuous distances, the
Hamming distances are discrete integer values. As
a consequence, there are often a large number of
images sharing equal Hamming distances to a
query, which largely hurts search results where
fine-grained ranking is very important. This paper
introduces an approach that enables query-
adaptive ranking of the returned images with equal
Hamming distances to the queries. This is achieved
by firstly offline learning bitwise weights of the
hash codes for a diverse set of predefined semantic

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

69

concept classes. Query-adaptive weights are then
computed online by evaluating the proximity
between a query and the semantic concept classes.
With the query-adaptive bitwise weights, returned
images can be easily ordered by weighted Hamming
distance at a finer-grained hash code level rather
than the original Hamming distance level.
Experiments on a Flickr image dataset show clear
improvements from our proposed approach
29 IP-08 Unified Blind
Method for Multi-
Image Super-
Resolution and
Single/Multi-Image
Blur Deconvolution
2013-
14
This paper presents, for the first time, a unified
blind method for multi-image super-resolution
(MISR or SR), single-image blur deconvolution
(SIBD), and multi-image blur deconvolution
(MIBD) of low-resolution (LR) images degraded by
linear space-invariant (LSI) blur, aliasing, and
additive white Gaussian noise (AWGN). The
proposed approach is based on alternating
minimization (AM) of a new cost function with
respect to the unknown high-resolution (HR) image
and blurs. The regularization term for the HR
image is based upon the Huber-Markov random
field (HMRF) model, which is a type of variational
integral that exploits the piecewise smooth nature
of the HR image. The blur estimation process is
supported by an edge-emphasizing smoothing
operation, which improves the quality of blur
estimates by enhancing strong soft edges toward
step edges, while filtering out weak structures. For
better performance, the blur estimation is done in
the filter domain rather than the pixel domain, i.e.,
using the gradients of the LR and HR images. The
regularization term for the blur is Gaussian (L2
norm), which allows for fast no iterative
optimization in the frequency domain. We
accelerate the processing time of SR reconstruction
by separating the up sampling and registration
processes from the optimization procedure.
Simulation results on both synthetic and real-life
images (from a novel computational imager)
confirm the robustness and effectiveness of the
proposed method.



No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

70

MATLAB DSP/COMMUNICATION
Appendix :
CM-Communication
DSP-Digital Signal Processing
S.NO CODE TITLE YEAR ABSTRACT
1. CMSH-01 On Signal Detection
in the Presence of
Weakly Correlated
Noise over Fading
Channels
2014-
15
In cognitive radio networks, in order to avoid
interference form secondary users to the primary
license holders of the spectrum, reliable spectrum
sensing is necessary. In scenarios where the noise
samples are correlated, the spectrum sensing
methods optimized considering impairment by
independent noise samples will not provide
optimum performances. To address this issue, a
locally optimum detection method for random
signals under a weakly correlated noise model over
fading channels is proposed. The probabilities of
false alarm and detection of the proposed detector
in the low signal to noise ratio regime are analyzed.
The average probabilities are calculated over
different channel gains. Numerical and simulation
results demonstrate the superiority of the proposed
method over the known energy detection method
with comparable complexities. Furthermore, we
consider the scenario where the estimated
correlation is different from the real correlation and
investigate the effect of this correlation mismatch on
the probabilities of false alarm and detection of the
proposed method
2. CMSH-02 On Ergodic Secrecy
Rate for MISO
Wiretap Broadcast
Channels with
Opportunistic
Scheduling
2014-
15
In this letter, we studyon-off opportunistic
beamforming for the multiuser downlink channel
with a passive eavesdropper. Two opportunistic
scheduling schemes exploiting multiuser diversity
are investigated which require limited feedback of
the effective signal-to-noise ratio (SNR) from the
legitimate users. For the two scheduling schemes,
we derive new closed-form expressions for the
ergodic secrecy rate withon-off beamforming over
Rayleigh fading channels. Numerical results are
provided to verify our analytical results and
illustrate the impact of multiuser diversity on the
secrecy performance.
3. CMSH-03 Performance Analysis
of Multiuser
Multiple Antenna
Relaying Networks
with
Co-Channel
Interference and
2014-
15
This paper presents a comprehensive performance
analysis of multiuser multiple antenna amplify-and-
forward relaying networks employing opportunistic
scheduling with feedback delay and co-channel
interference over Rayleigh fading channels.
Specifically, we derive exact as well as approximate
closed-form expressions for the outage probability

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

71

Feedback Delay and average symbol error rate (SER) of the system.
In addition, simple asymptotic expressions at the
high signal-to-noise ratio (SNR) regime are
obtained, which facilitate the characterization of the
achievable diversity order and coding gain of the
system. Moreover, two novel ergodic capacity
bounds valid for general systems with arbitrary
number of antennas and users are proposed.
Finally, the optimum power allocation scheme in
terms of minimizing the average SER is studied,
and simple analytical solutions are obtained.
Simulation results are provided to corroborate the
derived analytical expressions, and it is
demonstrated that the ergodic capacity bounds
remain sufficiently tight across the entire range of
SNRs and the proposed power allocation scheme
offers significant improvements on the SER
performance. The findings of the paper suggest that
the full diversity order can only be achieved when
there is ideal feedback, i.e., no feedback delay, and
the diversity order always reduces to one in the
presence of feedback delay. Also, the impact of key
parameters such as the number of antennas and
users on the system performance is intimately
dependent on the level of feedback delay.
4. CMSH-04 Achievable Rate
Analysis and
Feedback Design for
Multiuser MIMO
Relay with Imperfect
CSI
2014-
15
This paper investigates a multiuser MIMO relay
downlink system with imperfect channel estimation
and limited feedback. We analyze the achievable
rate loss due to channel state information (CSI)
mismatch arising from both channel estimation and
quantization feedback. We first derive an upper
bound to characterize the effect of imperfect CSI,
and then present a limited feedback strategy for
both the two-hop channels in the relay system. This
newly presented feedback strategy reveals the
relationship among the CSI quantization levels, the
transmit power, and the pilots for channel
estimation. An optimized pilot design at the base
station and the relay is also presented by applying
the derived bounds for the two-hop system.
5. CMSH-05 Interference
Alignment With
Partial CSI Feedback
in
MIMO Cellular
Networks
2014-
15
Interference alignment (IA) is a linear precoding
strategy that can achieve optimal capacity scaling at
high SNR in interference networks. However, most
existing IA designs require full channel state
information (CSI) at the transmitters, which could
lead to significant CSI signaling overhead. There
are two techniques, namely CSI quantization and
CSI feedback filtering that reduce CSI feedback
overhead. In this paper, we consider IA processing
with CSI feedback filtering in MIMO cellular
networks. We introduce a novel metric, namely the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

72

feedback dimension, to quantify the first order CSI
feedback cost associated with the CSI feedback
filtering. The CSI feedback filtering poses several
important challenges in IA processing. First, there
is a hidden partial CSI knowledge constraint in IA
precoder design, which cannot be handled using
conventional IA design methodology. Furthermore,
existing results on the feasibility conditions of IA
cannot be applied due to the partial CSI knowledge.
Finally, it is very challenging to find out how much
CSI feedback is actually needed to support IA
processing. We shall address the above challenges
and propose a new IA feasibility condition under
partial CSIT knowledge in MIMO cellular
networks. Based on this, we consider the CSI
feedback dimension minimization subject to the
degrees of freedom requirements, and further
propose an asymptotically optimal solution and
derive closed-form trade-off results between the CSI
feedback cost and IA performance in MIMO
cellular networks.
6. CMSH-06 MIMO Systems With
Quantized
Covariance Feedback
2014-
15
A unified approach is developed for the study of
multi-input, multi-output (MIMO) systems under
fast fading with quantized covariance feedback. In
such systems, the receiver computes, using perfect
channel state information (CSI), the covariance
matrices to be adopted by the transmitter
corresponding to the current channel realization,
and feeds back a quantized version of this
information to the transmitter usingfinite, say N
1
,
bits per channel realization. Our analysis is based
on a geometric framework we developed in a
companion paper for manifolds of positive semi-
definite (covariance) matrices with various trace
and rank constraints. That analysis applies to
MIMO systems in aunified manner to optimal as
well as various suboptimal precoding methods for
obtaining input covariances. These include, for
example, the capacity achieving spatio-temporal
water-filling strategy, the incorporation of just
spatial water-filling and reduced-rank beamforming
with power allocation in both cases, as well as
MIMO systems with antenna selection. For a given
system strategy, including the one that achieves
capacity, the gap between the communication rates
in the perfect and quantized covariance cases is
shown to be O(2^-N
f
/N) ,where N is the dimension
of the particular Pn manifold used for quantization.
This dimension depends on the precoding strategy
adopted and strongly determines how quickly the
communication rate with quantized covariance

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

73

feedback approaches that with perfect CSI at the
transmitter (CSIT). Our results show how the
choice of covariance quantization manifold can be
tailored to the available feedback rate in MIMO
system design
7. CM-01 Interference
Alignment
Techniques for
MIMO
Multi-Cell Interfering
Broadcast Channels
2013-
14
The interference alignment (IA) is a promising
technique to efficiently mitigate interference and to
enhance capacity of a wireless communication
network. This paper proposes an interference
alignment scheme for a network with multiple cells
and multiple multiple-input and multiple-output
(MIMO) users under a Gaussian interference
broadcast channel (IFBC) scenario. We first extend
a grouping method already known in the literature
to a multiple-cells scenario and jointly design
transmit and receiver beamforming vectors using a
closed form expression without iterative
computation. The algorithm in its dual form is
solved using interior point methods. We show that
the proposed approach outperforms the extension of
the grouping method in terms of capacity and base
station complexity. Finally, a rate balancing
technique is introduced to maintain fairness among
users.
8. CM-02 Localized Algorithms
for Detection of Node
Replication Attacks in
Mobile Sensor
Networks
2013-
14
We deal with the challenging problem of node
replication detection. Although defending against
node replication attacks demands immediate
attention, compared to the extensive exploration on
the defense against node replication attacks in static
networks, only a few solutions in mobile networks
have been presented. Moreover, while most of the
existing schemes in static networks rely on the
witness-finding strategy, which cannot be applied to
mobile networks, the velocity-exceeding strategy
used in existing schemes in mobile networks incurs
efficiency and security problems. Therefore, based
on our devised challenge-and-response and
encounter-number approaches, localized algorithms
are proposed to resist node replication attacks in
mobile sensor networks. The advantages of our
proposed algorithms include 1) localized detection;
2) efficiency and effectiveness; 3) network-wide
synchronization avoidance; and 4) network-wide
revocation avoidance. Performance comparisons
with known methods are provided to demonstrate
the efficiency of our proposed algorithms. Prototype
implementation on Telos B mote demonstrates the
practicality of our proposed methods.



No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

74

ANDROID PROJECTS
APPENDIX:
AN = ANDROID

S.NO CODE TITLE YEAR ABSTRACT
1 ANI-01 Catch Me If You Can:
Evaluating Android
Anti-Malware Against
Transformation
Attacks
2014-
2015
Mobile malware threats (e.g., on Android) have
recently become a real concern. In this paper, we
evaluate the State-of-the-art commercial mobile
anti-malware products for Android and test how
resistant they are against various common
obfuscation techniques (even with known malware).
Such an evaluation is important for not only
measuring the available defense against mobile
malware threats, but also proposing effective, next-
generation solutions. We developed Droid
Chameleon, a systematic framework with various
transformation techniques, and used it for our
study. Our results on 10 popular commercial anti-
malware applications for Android are worrisome:
none of these tools is resistant against common
malware transformation techniques. In addition, a
majority of them can be trivially defeated by
applying slight transformation over known malware
with little effort for malware authors. Finally, in
light of our results, we propose possible remedies
for improving the current state of malware
detection on mobile devices.
2 ANI-02 Collaborative Policy
Administration
2014-
2015
Policy-based management is a very effective method
to protect sensitive information. However, the over
claim of privileges is widespread in emerging
applications, including mobile applications and
social network services, because the applications
users involved in policy administration have little
knowledge of policy-based management. The over
claim can be leveraged by malicious applications,
then lead to serious privacy leakages and financial
loss. To resolve this issue, this paper proposes a
novel policy administration mechanism, referred to
as collaborative policy administration (CPA for
short), to simplify the policy administration. In
CPA, a policy administrator can refer to other
similar policies to set up their own policies to
protect privacy and other sensitive information.
This paper formally defines CPA and proposes its
enforcement framework. Furthermore, to obtain
similar policies more effectively, which is the key
step of CPA, a text mining-based similarity measure
method is presented. We evaluate CPA with the
data of Android applications and demonstrate that

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

75

the text mining-based similarity measure method is
more effective in obtaining similar policies than the
previous category-based method.
3 ANI-03 Context-based Access
Control Systems
for Mobile Devices
2014-
2015
Mobile Android applications often have access to
sensitive data and resources on the user device.
Misuse of this data by malicious applications may
result in privacy breaches and sensitive data
leakage. An example would be a malicious
application surreptitiously recording a confidential
business conversation. The problem arises from the
fact that Android users do not have control over the
application capabilities once the applications have
been granted the requested privileges upon
installation. In many cases, however, whether an
application may get a privilege depends on the
specific user context and thus we need a context-
based access control mechanism by which privileges
can be dynamically granted or revoked to
applications based on the specific context of the
user. In this paper we propose such an access
control mechanism. Our implementation of context
differentiates between closely located sub-areas
within the same location. We have modified the
Android operating system so that context-based
access control restrictions can be specified and
enforced. We have performed several experiments
to assess the efficiency of our access control
mechanism and the accuracy of context detection
4 ANI-04 Context-driven,
Prescription-Based
Personal Activity
Classification:
Methodology,
Architecture,
and End-to-End
Implementation
2014-
2015
Enabling large-scale monitoring and classification
of a range of motion activities is of primary
importance due to the need by healthcare and
fitness professionals to monitor exercises for quality
and compliance. Past work has not fully addressed
the unique challenges that arise from scaling. This
paper presents a novel end-to-end system solution to
some of these challenges. The system is built on the
prescription-based context-driven activity
classification methodology. First, we show that by
refining the definition of context, and introducing
the concept of scenarios, a prescription model can
provide personalized activity monitoring. Second,
through a flexible architecture constructed from
interface models, we demonstrate the concept of a
context-driven classifier. Context classification is
achieved through a classification committee
approach, and activity classification follows by
means of context specific activity models. Then, the
architecture is implemented in an end-to-end system
featuring an Android application running on a
mobile device, and a number of classifiers as core
classification components. Finally, we use a series of

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

76

experimental field evaluations to confirm the
expected benefits of the proposed system in terms of
classification accuracy, rate, and sensor operating
life.
5 ANI-05 Cooperative
Positioning and
Tracking in
Disruption Tolerant
Networks
2014-
2015
With the increasing number of location-dependent
applications, positioning and tracking a mobile
device becomes more and more important to enable
pervasive and context-aware service. While
extensive research has been performed in physical
localization and logical localization for satellite,
GSM and Wi-Fi communication networks where
fixed reference points are densely-deployed,
positioning and tracking techniques in a sparse
disruption tolerant network (DTN) have not been
well addressed. In this paper, we propose a
decentralized cooperative method called Pulse
Counting for DTN localization and a probabilistic
tracking method called Probe Tracking to confront
this challenge. Pulse Counting evaluates the user
walking steps and movement orientations using
accelerometer and electronic compass equipped in
cellphones. It estimates user location by
accumulating the walking segments, and improves
the estimation accuracy by exploiting the
encounters of mobile nodes. Several methods to
refine the location estimation are discussed, which
include the adjustment of trajectory based on
reference points and the mutual refinement of
location estimation for encountering nodes based on
maximum-likelihood. To track user movement, the
proposed Probe Tracking method uses Markov
chain to describe movement patterns and
determines the most possible user walking
trajectories without full record of user locations. We
implemented the positioning and tracking system in
Android phones and deployed a test bed in the
campus of Nanjing University. Extensive
experiments are conducted to evaluate the
effectiveness and accuracy of the proposed methods,
which show an average deviation of 9m in our
system compared to GPS.
6 ANI-06 DELTA++: Reducing
the Size of Android
Application Updates
2014-
2015
This method of creating and deploying update
patches improves on Google Smart Application
Update by rst unpacking the Android Application
Package and then compressing its elements
individually. The smartphone user can then
download a smaller patch. Experiments show that
performance yields 49 percent more reduction
relative to Googles solution, increasing the savings
in cellular network bandwidth use and resulting in
lighter application server loads. This reduction in

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

77

Android application-update trafc could translate to
a 1.7 percent decrease in annual US cellular trafc.
Similar methods applied to iPhone application
updates could yield even greater savings.
7 ANI-07 Effective Risk
Communication for
Android Apps
2014-
2015
The popularity and advanced functionality of
mobile devices has made them attractive targets for
malicious and intrusive applications (apps).
Although strong security measures are in place for
most mobile systems, the area where these systems
often fail is the reliance on the user to make
decisions that impact the security of a device. As our
prime example, Android relies on users to
understand the permissions that an app is
requesting and to base the installation decision on
the list of permissions. Previous research has shown
that this reliance on users is ineffective, as most
users do not understand or consider the permission
information. We propose a solution that leverages a
method to assign a risk score to each app and
display a summary of that information to users.
Results from four experiments are reported in
which we examine the effects of introducing
summary risk information and how best to convey
such information to a user. Our results show that
the inclusion of risk-score information has
significant positive effects in the selection process
and can also lead to more curiosity about security-
related information
8 ANI-08 Face-to-Face
Proximity Estimation
Using Bluetooth On
Smartphones
2014-
2015
The availability of always-on communications has
tremendous implications for how people interact
socially. In particular, sociologists are interested in
the question if such pervasive access increases or
decreases face-to-face interactions. Unlike
triangulation which seeks to precisely define
position, the question of face-to-face interaction
reduces to one of proximity, i.e., are the individuals
within a certain distance? Moreover, the problem of
proximity estimation is complicated by the fact that
the measurement must be quite precise (1-1.5 m)
and can cover a wide variety of environments.
Existing approaches such as GPS and Wi-Fi
triangulation are insufficient to meet the
requirements of accuracy and flexibility. In
contrast, Bluetooth, which is commonly available on
most smartphones, provides a compelling
alternative for proximity estimation. In this paper,
we demonstrate through experimental studies the
efficacy of Bluetooth for this exact purpose. We
propose a proximity estimation model to determine
the distance based on the RSSI values of Bluetooth
and light sensor data in different environments. We

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

78

present several real world scenarios and explore
Bluetooth proximity estimation on Android with
respect to accuracy and power consumption
9 ANI-09 Generating Summary
Risk Scores
for Mobile
Applications
2014-
2015
One of Androids main defense mechanisms against
malicious apps is a risk communication mechanism
which, before a user installs an app, warns the user
about the permissions the app requires, trusting
that the user will make the right decision. This
approach has been shown to be ineffective as it
presents the risk information of each app in a
stand-alone fashion and in a way that requires too
much technical knowledge and time to distill useful
information. We discuss the desired properties of
risk signals and relative risk scores for Android
apps in order to generate another metric that users
can utilize when choosing apps. We present a wide
range of techniques to generate both risk signals
and risk scores that are based on heuristics as well
as principled machine learning techniques.
Experimental results conducted using real-world
data sets show that these methods can effectively
identify malware as very risky, are simple to
understand, and easy to use.
10 ANI-10 GreenDroid:
Automated Diagnosis
of Energy
Inefficiency for
Smartphone
Applications
2014-
2015
Smartphone applications energy efficiency is vital,
but many Android applications suffer from serious
energy inefficiency problems. Locating these
problems is labor-intensive and automated
diagnosis is highly desirable. However, a key
challenge is the lack of a decidable criterion that
facilitates automated judgment of such energy
problems. Our work aims to address this challenge.
We conducted an in-depth study of 173 open-source
and 229 commercial Android applications, and
observed two common causes of energy problems:
missing deactivation of sensors or wake locks, and
cost-ineffective use of sensory data. With these
findings, we propose an automated approach to
diagnosing energy problems in Android
applications. Our approach explores an
applications state space by systematically executing
the application using Java PathFinder(JPF). It
monitors sensor and wake lock operations to detect
missing deactivation of sensors and wake locks. It
also tracks the transformation and usage of sensory
data and judges whether they are effectively utilized
by the application using our state-sensitive data
utilization metric. In this way, our approach can
generate detailed reports with actionable
information to assist developers in validating
detected energy problems. We built our approach as
a tool, Green Droid, on top of JPF. Technically, we

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

79

addressed the challenges of generating user
interaction events and scheduling event handlers in
extending JPF for analyzing Android applications.
We evaluated Green Droid using 13 real-world
popular Android applications. Green Droid
completed energy efficiency diagnosis for these
applications in a few minutes. It successfully located
real energy problems in these applications, and
additionally found new unreported energy problems
that were later confirmed by developers
11 ANI-11 Hiding in the Mobile
Crowd: Location
Privacy through
Collaboration
2014-
2015
Location-aware smartphones support various
location-based services (LBSs): users query the LBS
server and learn on the fly about their
surroundings. However, such queries give away
private information, enabling the LBS to track
users. We address this problem by proposing a
user-collaborative privacy-preserving approach for
LBSs. Our solution does not require changing the
LBS server architecture and does not assume third
party servers; yet, it significantly improves users
location privacy. The gain stems from the
collaboration of mobile devices: they keep their
context information in a buffer and pass it to others
seeking such information. Thus, a user remains
hidden from the server, unless all the collaborative
peers in the vicinity lack the sought information.
We evaluate our scheme against the Bayesian
localization attacks that allow for strong adversaries
who can incorporate prior knowledge in their
attacks. We develop a novel epidemic model to
capture the, possibly time-dependent, dynamics of
information propagation among users. Used in the
Bayesian inference framework, this model helps
analyze the effects of various parameters, such as
users querying rates and the lifetime of context
information, on users location privacy. The results
show that our scheme hides a high fraction of
location-based queries, thus significantly enhancing
users location privacy. Our simulations with real
mobility traces corroborate our model-based
findings. Finally, our implementation on mobile
platforms indicates that it is lightweight and the cost
of collaboration is negligible.
12 ANI-12 How Long to Wait?
Predicting Bus
Arrival Time
With Mobile Phone
Based Participatory
Sensing
2014-
2015
The bus arrival time is primary information to most
city transport travelers. Excessively long waiting
time at bus stops often discourages the travelers and
makes them reluctant to take buses. In this paper,
we present a bus arrival time prediction system
based on bus passengers participatory sensing.
With commodity mobile phones, the bus
passengers surrounding environmental context is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

80

effectively collected and utilized to estimate the bus
traveling routes and predict bus arrival time at
various bus stops. The proposed system solely relies
on the collaborative effort of the participating users
and is independent from the bus operating
companies, so it can be easily adopted to support
universal bus service systems without requesting
support from particular bus operating companies.
Instead of referring to GPS-enabled location
information, we resort to more generally available
and energy efficient sensing resources, including cell
tower signals, movement statuses, audio recordings,
etc., which bring less burden to the participatory
party and encourage their participation. We
develop a prototype system with different types of
Android-based mobile phones and comprehensively
experiment with the NTU campus shuttle buses as
well as Singapore public buses over a 7-week
period. The evaluation results suggest that the
proposed system achieves outstanding prediction
accuracy compared with those bus operator
initiated and GPS supported solutions. We further
adopt our system and conduct quick trial
experiments with London bus system for 4 days,
which suggests the easy deployment of our system
and promising system performance across cities. At
the same time, the proposed solution is more
generally available and energy friendly
13 ANI-13 MOSES: Supporting
and Enforcing
Security Profiles on
Smartphones
2014-
2015
Smartphones are very effective tools for increasing
the productivity of business users. With their
increasing computational power and storage
capacity, smartphones allow end users to perform
several tasks and be always updated while on the
move. Companies are willing to support employee-
owned smartphones because of the increase in
productivity of their employees. However, security
concerns about data sharing, leakage and loss have
hindered the adoption of smartphones for corporate
use. In this paper we present MOSES, a policy-
based framework for enforcing software isolation of
applications and data on the Android platform. In
MOSES, it is possible to define distinct Security
Profiles within a single smartphone. Each security
profile is associated with a set of policies that
control the access to applications and data. Profiles
are not predefined or hardcoded, they can be
specified and applied at any time. One of the main
characteristics of MOSES is the dynamic switching
from one security profile to another. We run a
thorough set of experiments using our full
implementation of MOSES. The results of the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

81

experiments confirm the feasibility of our proposal.
14 ANI-14 Security Threats to
Mobile Multimedia
Applications:
Camera-Based
Attacks on Mobile
Phones
2014-
2015
Todays mobile smartphones are very powerful, and
many smartphone applications use wireless
multimedia communications. Mobile phone security
has become an important aspect of security issues in
wireless multimedia communications. As the most
popular mobile operating system, Android security
has been extensively studied by researchers.
However, few works have studied mobile phone
multimedia security. In this article, we focus on
security issues related to mobile phone cameras.
Specifically, we discover several new attacks that
are based on the use of phone cameras. We
implement the attacks on real phones, and
demonstrate the feasibility and effectiveness of the
attacks. Furthermore, we propose a lightweight
defense scheme that can effectively detect these
attacks
15 ANI-15 The Places of Our
Lives: Visiting
Patterns and
Automatic Labeling
from Longitudinal
Smartphone Data
2014-
2015
The location tracking functionality of modern
mobile devices provides unprecedented opportunity
to the understanding of individual mobility in daily
life. Instead of studying raw geographic coordinates,
we are interested in understanding human mobility
patterns based on sequences of place visits which
encode, at a coarse resolution, most daily activities.
This paper presents a study on place
characterization in peoples everyday life based on
data recorded continuously by smartphones. First,
we study human mobility from sequences of place
visits, including visiting patterns on different place
categories. Second, we address the problem of
automatic place labeling from smartphone data
without using any geo-location information. Our
study on a large-scale data collected from 114
smartphone users over 18 months confirm many
intuitions, and also reveals findings regarding both
regularly and novelty trends in visiting patterns.
Considering the problem of place labeling with 10
place categories, we show that frequently visited
places can be recognized reliably (over 80 percent)
while it is much more challenging to recognize
infrequent places.



No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

82

INFORMATION TECHNOLOGY & COMPUTER SCIENCE
JAVA DOTNET
APPENDIX:

D = DotNet
J = Java
IP = Image Processing
DM = Data Mining
NS = Network Security
NW = Networking
MC = Mobile Computing
SC = Service Computing
PD = Parallel distribution
S.NO CODE TITLE YEAR ABSTRACT
1 DMCB-01 Design and
Implementation of
Efficient Integrity
Protection for Open
Mobile Platforms
2014-
2015
The security of mobile devices such as cellular
phones and smartphones has gained extensive
attention due to their increasing usage in peoples
daily life. The problem is challenging as the
computing environments of these devices have
become more open and general-purpose while at
the same time they have the constraints of
performance and user experience. We propose and
implement SEIP, a simple and efficient but yet
effective solution for the integrity protection of
real-world cellular phone platforms, which is
motivated by the disadvantages of applying
traditional integrity models on these performance
and user experience constrained devices.
2 DMCB-02 Face-to-Face
Proximity Estimation
Using Bluetooth On
Smartphones
2014-
2015
The availability of always-on communications has
tremendous implications for how people interact
socially. In particular, sociologists are interested in
the question if such pervasive access increases or
decreases face-to-face interactions. Unlike
triangulation which seeks to precisely define
position, the question of face-to-face interaction
reduces to one of proximity, i.e., are the individuals
within a certain distance? Moreover, the problem of
proximity estimation is complicated by the fact that
the measurement
must be quite precise (1-1.5 m) and can cover a wide
variety of environments. Existing approaches such
as GPS and Wi-Fi triangulation are insufficient to
meet the requirements of accuracy and flexibility.
In contrast, Bluetooth, which is commonly available
on most smartphones, provides a compelling

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

83

alternative for proximity estimation.
3 JDMB-03 A Comparative Study
of Implementation
Techniques for Query
Processing
in Multicore Systems
2014-
2015
Multicore systems and multithreaded processing
are now the defect to standards of enterprise and
personal computing. If used in an uninformed way,
however, multithreaded processing might actually
degrade performance. We present the facets of the
memory access bottleneck as they manifest in
multithreaded processing and show their impact on
query evaluation. We present a system design based
on partition parallelism, memory pooling, and data
structures conducive to multithreaded processing.
Based on this design, we present alternative
implementations of the most common query
processing algorithms, which we experimentally
evaluate using multiple scenarios and hardware
platforms.
4 JDMB-04 Active Learning of
Constraints
for Semi-Supervised
Clustering
2014-
2015
Semi-supervised clustering aims to improve
clustering performance by considering user
supervision in the form of pairwise constraints. In
this paper, we study the active learning problem of
selecting pairwise must-link and cannot-link
constraints for semi supervised clustering. We
consider active learning in an iterative manner
where in each iteration queries are selected based
on the current clustering solution and the existing
constraint set. We apply a general framework that
builds on the concept of neighborhood, where
neighborhoods contain labeled examples of
different clusters according to the pairwise
constraints. Our active learning method expands
the neighborhoods by selecting informative points
and querying their relationship with the
neighborhoods.
5 JDMB-05 CORE: A Context-
Aware Relation
Extraction Method
for Relation
Completion
2014-
2015
We identify relation completion (RC) as one
recurring problem that is central to the success of
novel big data applications such as Entity
Reconstruction and Data Enrichment. Given a
semantic relation R, RC attempts at linking entity
pairs between two entity lists under the relation R.
To accomplish the RC goals, we propose to
formulate search queries for each query entity a
based on some auxiliary information, so that to
detect its target entity b from the set of retrieved
documents. For instance, a pattern-based method
(PARE) uses extracted patterns as the auxiliary
information in formulating search queries.
6 JDMB-06 Fast Nearest
Neighbor Search with
Keywords
2014-
2015
Conventional spatial queries, such as range search
and nearest neighbor retrieval, involve only
conditions on objects geometric properties. Today,
many modern applications call for novel forms of
queries that aim to find objects satisfying both a

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

84

spatial predicate, and a predicate on their
associated texts. For example, instead of considering
all the restaurants, a nearest neighbor query would
instead ask for the restaurant that is the closest
among those whose menus contain steak, spaghetti,
brandy all at the same time. Currently, the best
solution to such queries is based on the IR2-tree,
which, as shown in this paper, has a few deficiencies
that seriously impact its efficiency. Experimental
results demonstrate good performance of our
algorithms in multiple settings, particularly in the
presence of large quantities of noise. The proposed
methods are tailored mostly for detecting
approximately hyper spherical clusters and need to
be extended in order to properly handle clusters of
arbitrary shapes.
7 JDMB-07 Learning the Gain
Values and Discount
Factors of Discounted
Cumulative Gains
2014-
2015
Evaluation metric is an essential and integral part
of a ranking system. In the past, several evaluation
metrics have been proposed in information retrieval
and web search, among them Discounted
Cumulative Gain (DCG) has emerged as one that is
widely adopted for evaluating the performance of
ranking functions used in web search. However, the
two sets of parameters, the gain values and discount
factors, used in DCG are usually determined in a
rather ad-hoc way, and their impacts have not been
carefully analyzed. In this paper, we first show that
DCG is generally not coherent, i.e., comparing the
performance of ranking functions using DCG very
much depends on the particular gain values and
discount factors used.
8 JDMB-08 Searching Dimension
Incomplete Databases
2014-
2015
Similarity query is a fundamental problem in
database, data mining and information retrieval
research. Recently, querying incomplete data has
attracted extensive attention as it poses new
challenges to traditional querying techniques. The
existing work on querying incomplete data
addresses the problem where the data values on
certain dimensions are unknown. However, in many
real life applications, such as data collected by a
sensor network in a noisy environment, not only the
data values but also the dimension information may
be missing. In this work, we propose to investigate
the problem of similarity search on dimension
incomplete data. A probabilistic framework is
developed to model this problem so that the users
can find objects in the database that are similar to
the query with probability guarantee. Missing
dimension information poses great computational
challenge, since all possible combinations of missing
dimensions need to be examined when evaluating

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

85

the similarity between the query and the data
objects. We develop the lower and upper bounds of
the probability that a data object is similar to the
query.
9 JDMB-09 Set Predicates in
SQL: Enabling Set-
Level
Comparisons for
Dynamically Formed
Groups
2014-
2015
In data warehousing and OLAP applications, scalar
level predicates in SQL become increasingly
inadequate to support a class of operations that
require set-level comparison semantics, i.e.,
comparing a group of tuples with multiple values.
Currently, complex SQL queries composed by
scalar-level operations are often formed to obtain
even very simple set-level semantics. Such queries
are not only difficult to write but also challenging
for a database engine to optimize, thus can result in
costly evaluation. This paper proposes to augment
SQL with set predicate, to bring out otherwise
obscured set-level semantics. We studied two
approaches to processing set predicatesan
aggregate function-based approach and a bitmap
index-based approach.
10 JDMB-10 Survey: Functional
Module Detection
from Protein-Protein
Interaction Networks
2014-
2015
A protein-protein interaction (PPI) network is a
biomolecule relationship network that plays an
important role in biological activities. Studies of
functional modules in a PPI network contribute
greatly to the understanding of biological
mechanism. With the development of life science
and computing science, a great amount of PPI data
has been acquired by various experimental and
computational approaches, which presents a
significant challenge of detecting functional modules
in a PPI network. To address this challenge, many
functional module detecting methods have been
developed. In this survey, we first analyze the
existing problems in detecting functional modules
and discuss the countermeasures in the data
preprocess and post process. Second, we introduce
some special metrics for distance or graph
developed in clustering process of proteins. Third,
we give a classification system of functional module
detecting methods and describe some existing
detection methods in each category. Fourth, we list
databases in common use and conduct performance
comparisons of several typical algorithms by
popular measurements. Finally, we present the
prospects and references for researchers engaged in
analyzing PPI networks.
11 JDMB-11 Towards Online
Shortest Path
Computation
2014-
2015
The online shortest path problem aims at
computing the shortest path based on live traffic
circumstances. This is very important in modern
car navigation systems as it helps drivers to make
sensible decisions. To our best knowledge, there is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

86

no efficient system/solution that can offer affordable
costs at both client and server sides for online
shortest path computation. Unfortunately, the
conventional client-server architecture scales poorly
with the number of clients. A promising approach is
to let the server collect live traffic information and
then broadcast them over radio or wireless network.
This approach has excellent scalability with the
number of clients. Thus, we develop a new
framework called Live Traffic Index (LTI) which
enables drivers to quickly and effectively collect the
live traffic information on the broadcasting channel.
An impressive result is that the driver can
compute/update their shortest path result by
receiving only a small fraction of the index.
12 JDMS-12 Automatic Itinerary
Planning
for Traveling Services
2014-
2015
Creating an efficient and economic trip plan is the
most annoying job for a backpack traveler.
Although travel agency
Can provide some predefined itineraries, they are
not tailored for each specific customer. Previous
efforts address the problem by providing an
automatic itinerary planning service, which
organizes the points-of-interests (POIs) into a
customized itinerary. Because the search space of all
possible itineraries is too costly to fully explore, to
simplify the complexity, most work assume that
users trip is limited to some important POIs and
will complete within one day. To address the above
limitation, in this paper, we design a more general
itinerary planning service, which generates
multiday itineraries for the users. In our service, all
POIs are considered and ranked based on the users
preference.
13 JDMS-13 Quasi-SLCA Based
Keyword Query
Processing over
Probabilistic XML
Data
2014-
2015
The probabilistic threshold query is one of the most
common queries in uncertain databases, where a
result satisfying the
query must be also with probability meeting the
threshold requirement. In this paper, we investigate
probabilistic threshold keyword queries (PrTKQ)
over XML data, which is not studied before. We
first introduce the notion of quasi-SLCA and use it
to represent results for a PrTKQ with the
consideration of possible world semantics. Then we
design a probabilistic inverted (PI) index that can
be used to quickly return the qualified answers and
filter out the unqualified ones based on our
proposed lower/upper bounds. After that, we
propose two efficient and comparable algorithms:
Baseline Algorithm and PI index-based Algorithm.
To accelerate the performance of algorithms, we
also utilize probability density function. An

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

87

empirical study using real and synthetic data sets
has verified the effectiveness and the efficiency of
our approaches.
14 DDMS-01 Accuracy-
Constrained Privacy-
Preserving
Access Control
Mechanism
for Relational Data
2014-
2015
Access control mechanisms protect sensitive
information from unauthorized users. However,
when sensitive information is shared and a Privacy
Protection Mechanism (PPM) is not in place, an
authorized user can still compromise the privacy of
a person leading to identity disclosure. A PPM can
use suppression and generalization of relational
data to anonymize and satisfy privacy
requirements, e.g., k-anonymity and l-diversity,
against identity and attribute disclosure. However,
privacy is achieved at the cost of precision of
authorized information. In this paper, we propose
an accuracy-constrained privacy-preserving access
control framework. The access control policies
define selection predicates available to roles while
the privacy requirement is to satisfy the k-
anonymity or
l-diversity. An additional constraint that needs to be
satisfied by the PPM is the imprecision bound for
each selection predicate. The techniques for
workload-aware anonymization for selection
predicates have been discussed in the literature.
15 DDMS-02 Building Confidential
and Efficient Query
Services in the Cloud
with RASP
Data Perturbation
2014-
2015
With the wide deployment of public cloud
computing infrastructures, using clouds to host data
query services has become an appealing solution for
the advantages on scalability and cost-saving.
However, some data might be sensitive that the data
owner does not want to move to the cloud unless the
data confidentiality and query privacy are
guaranteed. On the other hand, a secured query
service should still provide efficient query
processing and significantly reduce the in-house
workload to fully realize the benefits of cloud
computing. We propose the random space
perturbation (RASP) data perturbation method to
provide secure and efficient range query and kNN
query services for protected data in the cloud. The
RASP data perturbation method combines order
preserving encryption, dimensionality expansion,
random noise injection, and random projection, to
provide strong resilience to attacks on the
perturbed data and queries. It also preserves
multidimensional ranges, which allows existing
indexing techniques to be applied to
Speed up range query processing.
16 JGCB-12 Challenges and
Opportunities of
Underwater
2014-
2015
In oceans, both the natural acoustic systems (such
as marine mammals) and artificial acoustic
systems (like underwater acoustic networks

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

88

Cognitive Acoustic
Networks
(UANs) and sonar users) use acoustic signal for
communication, echolocation, sensing and detection.
This makes the channel spectrum heavily shared by
various underwater acoustic systems. Nevertheless,
the precious spectrum resource is still underutilized
temporally and spatially in underwater
environments. To efficiently utilize the spectrum
while avoiding harmful interference with other
acoustic systems, a smart UAN should be aware of
the surrounding environment and reconfigure their
operation parameters. Unfortunately, existing UAN
designs have mainly focused on the single network
scenario, and very few studies have considered the
presence of nearby acoustic activities. In this paper,
we advocate cognitive acoustic (CA) as a promising
technique to develop an environment-friendly UAN
with high spectrum utilization.
17 JGCB-13 Cost Minimization for
Big Data Processing
in
Geo-Distributed Data
Centers
2014-
2015
The explosive growth of demands on big data
processing imposes a heavy burden on computation,
storage, and communication in data centers, which
hence incurs considerable operational expenditure
to data center providers. Therefore, cost
minimization has become an emergent issue for the
upcoming big data era. Different from conventional
cloud services, one of the main features of big data
services is the tight coupling between data and
computation as computation tasks can be conducted
only when the corresponding data is available. As a
result, three factors, i.e., task assignment, data
placement and data movement, deeply influence the
operational expenditure of data centers. In this
paper, we are motivated to study the cost
minimization problem via a joint optimization of
these three factors for big data services in geo-
distributed data centers.
18 JGCB-14 Energy-Aware Data
Allocation and Task
Scheduling on
Heterogeneous
Multiprocessor
Systems with Time
Constraints
2014-
2015
In this paper, we address the problem of energy-
aware heterogeneous data allocation and task
scheduling (HDATS) on heterogeneous
multiprocessor systems for real-time applications.
In a heterogeneous distributed shared-memory
Multi-processor system, an important problem is
how to assign processors to real-time application
tasks, allocate data to local memories, and generate
an efficient schedule in such a way that a time
constraint can be met and the total system energy
consumption can be minimized. We propose an
optimal approach, i.e., an integer linear
programming (ILP) method, to solve this problem.
As the problem has been conclusively shown to be
computationally very complicated, we also present
two heuristic algorithms, i.e., TAC-DA (task

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

89

assignment considering data allocation) and TRGS
(task ratio greedy scheduling), to generate near-
optimal solutions for real-time applications in
polynomial time. We evaluate the performance of
our algorithms by comparing them with a greedy
algorithm that is commonly used to solve
heterogeneous task scheduling problems. Based on
our extensive simulation study, we observe that our
algorithms exhibit excellent performance.
19 JGCB-15 Towards Energy
Efficient Big Data
Gathering
in Densely Distributed
Sensor Networks
2014-
2015
Recently, the big data emerged as a hot topic
because of the tremendous growth of the
Information and Communication Technology
(ICT). One of the highly anticipated key
contributors of the big data in the future networks
is the distributed Wireless Sensor Networks
(WSNs). Although the data generated by an
individual sensor may not appear to be significant,
the overall data generated across numerous sensors
in the densely distributed WSNs can produce a
significant portion of the big data. Energy-efficient
big data gathering in the densely distributed sensor
networks is, therefore, a challenging research area.
One of the most effective solutions to address this
challenge is to utilize the sink nodes mobility to
facilitate the data gathering.
20 DGCS-01 Infrequent Weighted
Item set Mining
Using Frequent
Pattern Growth

2014-
2015
Frequent weighted item sets represent correlations
frequently holding in data in which items may
weight differently.
However, in some contexts, e.g., when the need is to
minimize a certain cost function, discovering rare
data correlations is more interesting than mining
frequent ones. This paper tackles the issue of
discovering rare and weighted item sets, i.e., the
infrequent weighted item set (IWI) mining problem.
Two novel quality measures are proposed to drive
the IWI mining process. Furthermore, two
algorithms that perform IWI and Minimal IWI
mining efficiently, driven by the proposed measures,
are presented. Experimental results show efficiency
and effectiveness of the proposed approach.
21 JMCB-16 Joint Interference
Coordination
and Load Balancing
for OFDMA
Multi-hop Cellular
Networks
2014-
2015
Multi-hop cellular networks (MCNs) have drawn
tremendous attention due to its high throughput
and extensive coverage. However, there are still
three issues not well addressed. With the existence
of relay stations (RSs), how to efficiently allocate
frequency resource to relay links becomes a
challenging design issue. For mobile stations (MSs)
near the cell edge, co channel interference (CCI)
become severe, which significantly affects the
network performance. Furthermore, the
unbalanced user distribution will result in traffic

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

90

congestion and inability to guarantee quality of
service (QOS). To address these problems, we
propose a quantitative study on adaptive resource
allocation schemes by jointly considering
interference coordination (IC) and load balancing
(LB) in MCNs. In this paper, we focus on the
downlink of OFDMA-based MCNs with time
division duplex (TDD) mode, and analyze the
characteristics of resource allocation according to
IEEE 802.16j/m specification.
22 JMCB-17 HAWK: An
Unmanned Mini-
Helicopter-Based
Aerial Wireless Kit
for Localization
2014-
2015
This paper presents a fully functional and highly
portable mini Unmanned Aerial Vehicle (UAV)
system, HAWK, for conducting aerial localization.
HAWK is a programmable mini helicopter
Dragon flyer X6armed with a wireless sniffer
Nokia N900. We developed custom PI-Control laws
to implement a robust waypoint algorithm for the
mini helicopter to fly a planned route. A Moore
space filling curve is designed as a flight route for
HAWK to survey a specific area. A set of theorems
were derived to calculate the
minimum Moore curve level for sensing all targets
in the area with minimum flight distance. With such
a flight strategy, we can confine the location of a
target of interest to a small hot area.
23 JMCB-18 Preserving Location
Privacy
in Geo social
Applications
2014-
2015
Using geo social applications, such as Four Square,
millions of people interact with their surroundings
through their friends and their recommendations.
Without adequate privacy protection, however,
these systems can be easily misused, for example, to
track users or target them for home invasion. In this
paper, we introduce Location X, a novel alternative
that provides significantly improved location
privacy without adding uncertainty into query
results or relying on strong assumptions about
server security. Our key insight is to apply secure
user-specific, distance preserving coordinate
transformations to all location data shared with the
server. The friends of a user share this users secrets
so they can apply the same transformation.
24 JMCB-19 Energy-Efficient
Reliable Routing
Considering
Residual Energy in
Wireless Ad Hoc
Networks
2014-
2015
We propose two novel energy-aware routing
algorithms for wireless ad hoc networks, called
reliable minimum energy cost routing (RMECR)
and reliable minimum energy routing (RMER).
RMECR addresses three important requirements of
ad hoc networks: energy-efficiency, reliability, and
prolonging network lifetime. It considers the energy
consumption and the remaining battery energy of
nodes as well as quality of links to find energy-
efficient and reliable routes that increase the
operational lifetime of the network. RMER, on the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

91

other hand, is an energy-efficient routing algorithm
which finds routes minimizing the total energy
required for end-to-end packet traversal. RMER
and RMECR are proposed for networks in which
either hop-by-hop or end-to-end retransmissions
ensure reliability. Simulation studies show that
RMECR is able to find energy-efficient and reliable
routes similar to RMER, while also extending the
operational lifetime of the network.
25 JMCB-20 Dynamic Profit
Maximization of
Cognitive
Mobile Virtual
Network Operator
2014-
2015
We study the profit maximization problem of a
cognitive virtual network operator in a dynamic
network environment.
We consider a downlink OFDM communication
system with various network dynamics, including
dynamic user demands, uncertain sensing spectrum
resources, dynamic spectrum prices, and time-
varying channel conditions. In addition,
heterogeneous users and imperfect sensing
technology are incorporated to make the network
model more realistic.
26 JMCB-21 DA-Sync: A Doppler-
Assisted
Time-Synchronization
Scheme
for Mobile
Underwater Sensor
Networks
2014-
2015
Time synchronization plays a critical role in
distributed network systems. In this paper, we
investigate the time synchronization problem in the
context of underwater sensor networks (UWSNs).
Although many time-synchronization protocols
have been proposed for terrestrial wireless sensor
networks, none of them can be directly applied to
UWSNs. This is because most of these protocols do
not consider long propagation delays and sensor
node mobility, which are important attributes in
UWSNs. In addition, UWSNs usually have high
requirements in energy efficiency. To solve these
new challenges, innovative time synchronization
solutions are demanded. In this paper, we propose a
pairwise, cross-layer, time-synchronization scheme
for mobile underwater sensor networks, called DA-
Sync.
27 JMCB-22 Profiling Aquatic
Diffusion Process
Using
Robotic Sensor
Networks
2014-
2015
Water resources and aquatic ecosystems are facing
increasing threats from climate change, improper
waste disposal, and oil spill incidents. It is of great
interest to deploy mobile sensors to detect and
monitor certain diffusion processes (e.g., chemical
pollutants) that are harmful to aquatic
environments. In this paper, we propose an
accuracy-aware diffusion process profiling
approach using smart aquatic mobile sensors such
as robotic fish. In our approach, the robotic sensors
collaboratively profile the characteristics of a
diffusion process including source location,
discharged substance amount, and its evolution over
time. In particular, the robotic sensors reposition

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

92

themselves to progressively improve the profiling
accuracy.
28 JMCB-23 The Places of Our
Lives: Visiting
Patterns and
Automatic Labeling
from Longitudinal
Smartphone Data
2014-
2015
The location tracking functionality of modern
mobile devices provides unprecedented opportunity
to the understanding of individual mobility in daily
life. Instead of studying raw geographic coordinates,
we are interested in understanding human mobility
patterns based on sequences of place visits which
encode, at a coarse resolution, most daily activities.
This paper presents a study on place
characterization in peoples everyday life based on
data recorded continuously by smartphones. First,
we study human mobility from sequences of place
visits, including visiting patterns on different place
categories. Second, we address the problem of
automatic place labeling from smartphone data
without using any geo-location information.
29 JMCB-24 Investigating the
Privacy versus
Forwarding
Accuracy Tradeoff in
Opportunistic
Interest-Casting
2014-
2015
Many mobile social networking applications are
based on a friend proximity detection step,
according to which two mobile users try to jointly
estimate whether they have friends in common, or
share similar interests, etc. Performing friend
proximity detection in a privacy-preserving way is
fundamental to achieve widespread acceptance of
mobile social networking applications. However, the
need of privacy preservation is often at odds with
application-level performance of the mobile social
networking application, since only obfuscated
information about the other users profile is
available for optimizing performance. In this paper,
we study for the first time the fundamental tradeoff
between privacy preservation and application-level
performance in mobile social networks.
30 JMCB-25 Snapshot and
Continuous Data
Collection
in Probabilistic
Wireless Sensor
Networks
2014-
2015
Data collection is a common operation of Wireless
Sensor Networks (WSNs), of which the performance
can be measured by its achievable network capacity.
Most existing works studying the network capacity
issue are based on the unpractical model called
deterministic network model. In this paper, a more
reasonable model, probabilistic network model, is
considered. For snapshot data collection, we
propose a novel Cell-based Path Scheduling (CPS)
algorithm that achieves capacity of1=5!lnnW in
the sense of the worst case and order-optimal
capacity in the sense of expectation, where is the
number of sensor nodes, !is a constant, and W is the
data transmitting rate.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

93

31 JNSB-26 Secure Continuous
Aggregation
in Wireless Sensor
Networks
2014-
2015
Continuous aggregation is usually required in many
sensor applications to obtain the temporal variation
information of aggregates. However, in a hostile
environment, the adversary could fabricate false
temporal variation patterns of the aggregates by
manipulating a series of aggregation results through
compromised nodes. Existing secure aggregation
schemes conduct one individual verification for each
aggregation result, which could incur great
accumulative communication cost and negative
impact on transmission scheduling for continuous
aggregation. In this paper, we identify distinct
design issues for protecting continuous in network
aggregation and propose a novel scheme to detect
false temporal variation patterns.
32 JNSB-27 Efficient Data
Collection for Large-
Scale Mobile
Monitoring
Applications
2014-
2015
Radio frequency identification (RFID) and wireless
sensor networks (WSNs) have been popular in the
industrial field, and both have undergone dramatic
development. RFID and WSNs are well known for
their abilities in identity identification and data
transmission, respectively, and hence widely used in
applications for environmental and health
monitoring. Though the integration of a sensor and
an RFID tag was proposed to gather both RFID tag
and sensed information, few previous research
efforts explore the integration of data transmission
modes in the RFID and WSN systems to enhance
the performance of the applications. In this paper,
we propose a hybrid RFID and WSN system (HRW)
that synergistically integrates the traditional RFID
system and WSN system for efficient data collection.
HRW has hybrid smart nodes that combine the
function of RFID tags, the reduced function of
RFID readers, and wireless sensors.
33 JNSB-28 Secure Time
Synchronization in
Wireless
Sensor Networks: A
Maximum
Consensus-Based
Approach
2014-
2015
Time synchronization is a fundamental requirement
for the wide spectrum of applications with wireless
sensor networks
(WSNs). However, most existing time
synchronization protocols are likely to deteriorate
or even to be destroyed when the WSNs are
attacked by malicious intruders. This paper is
concerned with secure time synchronization for
WSNs under message manipulation attacks.
Specifically, the theoretical analysis and simulation
results are first provided to demonstrate that the
maximum consensus based time synchronization
(MTS) protocol would be invalid under message
manipulation attacks.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

94

34 JNSB-29 Efficient Location
Privacy-Aware
Forwarding in
Opportunistic Mobile
Networks
2014-
2015
This paper proposes a novel fully distributed and
Collaborative k-anonymity protocol (LPAF) to
protect users location information and ensure
better privacy while forwarding queries/replies
to/from untrusted location-based service (LBS) over
opportunistic mobile networks (Opp M Nets). We
utilize a lightweight multi hop Markov-based
stochastic model for location prediction to guide
queries toward the LBSs location and to reduce
required resources in terms of retransmission
overheads. We develop a formal analytical model
and present theoretical analysis and simulation of
the proposed protocol performance.
35 JNSB-30 A Scalable and
Modular Architecture
for
High-Performance
Packet Classification
2014-
2015
Packet classification is widely used as a core
function for various applications in network
infrastructure. With increasing demands in
throughput, performing wire-speed packet
classification has become challenging. Also the
performance of todays packet classification
solutions depends on the characteristics of rule sets.
In this work, we propose a novel modular Bit-
Vector (BV) based architecture to perform high-
speed packet classification on Field Programmable
Gate Array (FPGA).
36 JNSB-31 Defending Against
Collaborative Attacks
by
Malicious Nodes in
MANETs: A
Cooperative Bait
Detection Approach
2014-
2015
In mobile ad hoc networks (MANETs), a primary
requirement for the establishment of
communication among nodes is that nodes should
cooperate with each other. In the presence of
malevolent nodes, this requirement may lead to
serious security concerns; for instance, such nodes
may disrupt the routing process. In this context,
preventing or detecting malicious nodes launching
gray hole or collaborative black hole attacks is a
challenge.
37 JNSB-32 Tradeoff Between
Reliability and
Security in
Multiple Access Relay
Networks Under
Falsified Data
Injection Attack
2014-
2015
We consider a multiple access relay network where
multiple sources send independent data to a single
destination through multiple relays, which may
inject falsified data into the network. To detect the
malicious relays and discard (erase) data from
them, tracing bits are embedded in the information
data at each source node. In addition, parity bits are
added to correct the errors caused by fading and
noise. When the total amount of redundancy,
tracing bits plus parity bits, is fixed, an increase in
parity bits to increase the reliability requires a
decrease in tracing bits, which leads to a less
accurate detection of malicious behavior of relays,
and vice versa.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

95

38 JNSB-33 Multi attribute
SCADA-Specific
Intrusion
Detection System for
Power Networks
2014-
2015
The increased interconnectivity and complexity of
supervisory control and data acquisition (SCADA)
systems in power system networks has exposed the
systems to a multitude of potential vulnerabilities.
In this paper, we present a novel approach for a
next-generation SCADA-specific intrusion detection
system (IDS). The proposed system analyzes
multiple attributes in order to provide a
comprehensive solution that is able to mitigate
varied cyber-attack threats.
39 JNSB-34 ACPN: A Novel
Authentication
Framework with
Conditional
Privacy-Preservation
and Non-Repudiation
for VANETs
2014-
2015
In Vehicular Ad hoc Networks (VANETs),
authentication is a crucial security service for both
inter-vehicle and vehicle road side communications.
On the other hand, vehicles have to be protected
from the misuse of their private data and the
attacks on their privacy, as well as to be capable of
being investigated for accidents or liabilities from
non-repudiation. In this paper, we investigate the
authentication issues with privacy preservation and
non-repudiation in VANETs. We propose a novel
Authentication framework with Conditional
Privacy-preservation and Non-repudiation (ACPN)
for VANETs. In ACPN, we introduce the public-key
cryptography (PKC) to the pseudonym generation,
which ensures legitimate third parties to achieve the
non-repudiation of vehicles by obtaining vehicles
real IDs.
40 JNSB-35 Integrated Anomaly
Detection for Cyber
Security of
the Substations
2014-
2015
Cyber intrusions to substations of a power grid are
a source of vulnerability since most substations are
unmanned and with limited protection of the
physical security. In the worst case, simultaneous
intrusions into multiple substations can lead to
severe cascading events, causing catastrophic power
outages. In this paper, an integrated Anomaly
Detection System (ADS) is proposed which contains
host- and network-based anomaly detection systems
for the substations, and simultaneous anomaly
detection for multiple substations. Potential
scenarios of simultaneous intrusions into the
substations have been simulated using a substation
automation Test bed.
41 JNSS-36 Privacy-Preserving
Multi-Keyword
Ranked
Search over
Encrypted Cloud
Data
2014-
2015
With the advent of cloud computing, data owners
are motivated to outsource their complex data
management systems from local sites to the
commercial public cloud for great flexibility and
economic savings. But for protecting data privacy,
sensitive data have to be encrypted before
outsourcing, which obsoletes traditional data
utilization based on plaintext keyword search. Thus,
enabling an encrypted cloud data search service is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

96

of paramount importance. Considering the large
number of data users and documents in the cloud, it
is necessary to allow multiple keywords in the
search request and return documents in the order of
their relevance to these keywords. Related works on
searchable encryption focus on single keyword
search or Boolean keyword search, and rarely sort
the search results. In this paper, for the first time,
we define and solve the challenging problem of
privacy-preserving multi-keyword ranked search
over encrypted data in cloud computing (MRSE).
We establish a set of strict privacy requirements for
such a secure cloud data utilization system. Among
various multi-keyword semantics, we choose the
efficient similarity measure of coordinate
matching, i.e., as many matches as possible, to
capture the relevance of data documents to the
search query. We further use inner product
similarity to quantitatively evaluate such similarity
measure. We first propose a basic idea for the
MRSE based on secure inner product computation,
and then give two significantly improved MRSE
schemes to achieve various stringent privacy
requirements in two different threat models. To
improve search experience of the data search
service, we further extend these two schemes to
support more search semantics. Thorough analysis
investigating privacy and efficiency guarantees of
proposed schemes is given.

42 JNSS-37 Private Searching on
Streaming
Data Based on
Keyword Frequency
2014-
2015
Private searching on streaming data is a process to
dispatch to a public server a program, which
searches streaming
sources of data without revealing searching criteria
and then sends back a buffer containing the
findings. From an Abelian group homomorphic
encryption, the searching criteria can be
constructed by only simple combinations of
keywords, for example, disjunction of keywords.
The recent breakthrough in fully homomorphic
encryption has allowed us to construct arbitrary
searching criteria theoretically. In this paper, we
consider a new private query, which searches for
documents from streaming data on the basis of
keyword frequency, such that the frequency of a
keyword is required to be higher or lower than a
given threshold. This form of query can help us in
finding more relevant documents. Based on the state
of the art fully homomorphic encryption techniques,
we give
disjunctive, conjunctive, and complement

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

97

constructions for private threshold queries based on
keyword frequency. Combining the basic
constructions, we further present a generic
construction for arbitrary private threshold queries
based on keyword frequency. Our protocols are
semantically secure as long as the underlying fully
homomorphic encryption scheme is semantically
secure.
43 JNWB-36 Multipath Wireless
Network Coding: An
Augmented
Potential Game
Perspective
2014-
2015
We consider wireless networks in which multiple
paths are available between each source and
destination. We allow each source to split traffic
among all of its available paths, and we ask the
question: How do we attain the lowest possible
number of transmissions per unit time to support a
given traffic matrix? Traffic bound in opposite
directions over two wireless hops can utilize the
reverse carpooling advantage of network coding
in order to decrease the number of transmissions
used. We call such coded hops hyper-links. With
there verse carpooling technique, longer paths
might be cheaper than shorter ones. However, there
is a peculiar situation among sourcesthe network
coding advantage is realized only if there is traffic
in both directions of a shared path.
44 JNWB-37 Neighbor Table Based
Shortcut Tree
Routing
in Zigbee Wireless
Networks
2014-
2015
The Zigbee tree routing is widely used in many
resource-limited devices and applications, since it
does not require any routing table and route
discovery overhead to send a packet to the
destination. However, the Zigbee tree routing has
the fundamental limitation that a packet follows the
tree topology; thus, it cannot provide the optimal
routing path. In this paper, we propose the shortcut
tree routing (STR) protocol that provides the near
optimal routing path as well as maintains the
advantages of the Zigbee tree routing such as no
route discovery overhead and low memory
consumption. The main idea of the shortcut tree
routing is to calculate remaining hops from an
arbitrary source to the destination using the
hierarchical addressing scheme in Zigbee, and each
source or intermediate node forwards a packet to
the neighbor node with the smallest remaining hops
in its neighbor table.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

98

45 JNWB-38 Minimum Energy
Data Transmission
for
Wireless Networked
Control Systems
2014-
2015
The communication protocol design for wireless
networked control systems brings the additional
challenge of providing the guaranteed stability of
the closed-loop control system compared to
traditional wireless sensor networks. In this paper,
we provide a framework for the joint optimization
of controller and communication systems
encompassing efficient abstractions of both systems.
The objective of the optimization problem is to
minimize the power consumption of the
communication system due to the limited lifetime of
the battery operated wireless nodes. The constraints
of the problem are the schedule ability and
maximum transmit power restrictions of the
communication system, and the reliability and delay
requirements of the control system to guarantee its
stability. The formulation comprises
communication system parameters including
transmission power, rate and scheduling, and
control system parameters including sampling
period.
46 JNWB-39 Data Offloading in
Load Coupled
Networks:
A Utility
Maximization
Framework
2014-
2015
We provide a general framework for the problem of
data offloading in a heterogeneous wireless
network, where some demand of cellular users is
served by a complementary network. The
complementary network is either a small-cell
network that shares the same resources as the
cellular network, or a Wi Fi network that uses
orthogonal resources. For a given demand served in
a cellular network, the load, or the level of resource
usage, of each cell depends in a non-linear manner
on the load of other cells due to the mutual coupling
of interference seen by one another. With load
coupling, we optimize the demand to be served in
the cellular or the complementary networks, so as to
maximize a utility function.
47 JNWB-40 Large-Scale Site and
Frequency Diversity
in
Urban Peer-to-Peer
Channels for
Six Public-Safety
Frequency Bands
2014-
2015
We report on peer-to-peer large-scale wireless
channel characteristics for an urban environment in
six public-safety
Bands, for five simultaneous receiving sites. Results
are based upon measurements taken in Denver in
July 2009 with stationary receivers and a pedestrian
transmitter. The six frequencies at which we
measured are (in MHz) 430, 750, 905, 1834, 2400,
and 4860. We quantify both site and frequency
diversity, and show that 5-site selection yields
minimum average gains of 15 dB in mean received
power levels; 5-site selection diversity also reduces
received power variation by 17-29 dB, depending on
frequency. Frequency diversity yields similar gains.
By approximating received powers as lognormal, we

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

99

describe an analytical method to approximate the
cdf of the per-site, or per-frequency (or both)
maximum received power.
48 JNWB-41 Semi-Blind Channel
Estimation with
Superimposed
Training for OFDM-
Based AF Two-Way
Relaying
2014-
2015
We consider the problem of channel estimation for
OFDM-based amplify-and-forward (AF) two-way
relay networks (TWRNs). While previous works
have adopted a pilot-based approach, we propose a
semi-blind approach that exploits both the
transmitted pilots as well as the received data
samples to improve the estimation performance.
Our proposed semi-blind estimator is based on the
Gaussian maximum likelihood (GML) criterion
which treats that data symbols as Gaussian-
distributed nuisance parameters. The GML
estimates are obtained using an iterative quasi-
Newton method.
49 JNWB-42 Asymptotic
Throughput and
Throughput-Delay
Scaling in Wireless
Networks:
The Impact of Error
Propagation
2014-
2015
This paper analyzes the impact of error
propagation on the achievable throughput and
throughput-delay tradeoff in wireless networks. It
addresses the particular class of multi hop routing
schemes for parallel unicast that achieve a
throughput scaling of
n12 per node in a
network of n nodes. It is shown that in the finite-
block-length case, necessitated by finite decoding
memory at the nodes, the guaranteed per-node
throughput in the network cannot scale better than
onr per node for any
r>0. This bound on the guaranteed per-node
throughput is tighter than the
O1n bound shown
previously.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

100

50 JNWB-43 A New Learning
Algorithm for a Fully
Connected Neuro-
Fuzzy Inference
System
2014-
2015
A traditional Neuro-Fuzzy system is transformed
into an equivalent fully connected three layer neural
network (NN), namely, the fully connected Neuro-
Fuzzy inference systems (F-CONFIS). The F-
CONFIS differs from traditional NNs by its
dependent and repeated weights between input and
hidden layers and can be considered as the variation
of a kind of multilayer NN.
51 JNWB-44 Quaternion-Valued
Echo State Networks
2014-
2015
Quaternion-valued echo state networks (QESNs)
are introduced to cater for 3-D and 4-D processes,
such as those
observed in the context of renewable energy (3-D
wind modeling) and human centered computing (3-
D inertial body sensors). The introduction of QESNs
is made possible by the recent emergence of
quaternion nonlinear activation functions with local
analytic properties, required by nonlinear gradient
descent training algorithms. To make QENSs
second-order optimal for the generality of
quaternion signals (both circular and noncircular),
we employ augmented quaternion statistics to
introduce widely linear QESNs.
52 JNWB-45 Toward System-
Optimal Routing in
Traffic Networks: A
Reverse Stackelberg
Game Approach
2014-
2015
In the literature, several road pricing methods
based on hierarchical Stackelberg games have been
proposed to reduce congestion in traffic networks.
We propose three novel schemes to apply the
extended reverse Stackelberg game, through which
traffic authorities can induce drivers to follow
routes that are computed to reach a system-optimal
distribution of traffic on the available routes of a
freeway, e.g., to minimize the total time spent of
traffic in the network and to reduce traffic
emissions in urban traffic networks.
53 JNWS-46 Secure and Efficient
Data Transmission
for Cluster-Based
Wireless Sensor
Networks
2014-
2015
Secure data transmission is a critical issue for
wireless sensor networks (WSNs). Clustering is an
effective and practical way
to enhance the system performance of WSNs. In this
paper, we study a secure data transmission for
cluster-based WSNs (CWSNs),where the clusters
are formed dynamically and periodically. We
propose two secure and efficient data transmission
(SET) protocols for CWSNs, called SET-IBS and
SET-IBOOS, by using the identity-based digital
signature (IBS) scheme and the identity-based
online/offline digital signature (IBOOS) scheme,
respectively. In SET-IBS, security relies on the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

101

hardness of the Diffie-Hellman problem in the
pairing domain. SET-IBOOS further reduces the
computational overhead for protocol security,
which is crucial for WSNs, while its security relies
on the hardness of the discrete logarithm problem.
We show the feasibility of the SET-IBS and SET-
IBOOS protocols with respect to the security
requirements and security analysis against various
attacks. The calculations and simulations are
provided to
illustrate the efficiency of the proposed protocols.
The results show that the proposed protocols have
better performance than the existing secure
protocols for CWSNs, in terms of security overhead
and energy consumption
54 JSCB-46 A Scalable
Architecture for
Automatic Service
Composition
2014-
2015
This paper addresses automatic service composition
(ASC) as a means to create new value-added
services dynamically and automatically from
existing services in service-oriented architecture
and cloud computing environments. Manually
composing services for relatively static applications
has been successful, but automatically composing
services requires advances in the semantics of
processes and an architectural framework that can
capture all stages of an applications lifecycle. A
framework for ASC involves four stages: planning
an execution workflow, discovering services from a
registry, selecting the best candidate services, and
executing the selected services. This four-stage
architecture is the most widely used to describe
ASC, but it is still abstract and incomplete in terms
of scalable goal composition, property
transformation for seamless automatic composition,
and integration architecture. We present a
workflow orchestration to enable nested multilevel
composition for achieving scalability.
55 JSCB-47 Mining Contracts for
Business Events and
Temporal Constraints
in Service
Engagements
2014-
2015
Contracts are legally binding descriptions of
business service engagements. In particular, we
consider business events as elements of a service
engagement. Business events such as purchase,
delivery, bill payment, bank interest accrual not
only correspond to essential processes but are also
inherently temporally constrained. Identifying and
understanding the events and their temporal
relationships can help a business partner determine
what to deliver and what to expect from others as it
participates in the service engagement specified by a
contract. However, contracts are expressed in
unstructured text and their insights are buried
therein. Our contributions are threefold. We
develop a novel approach employing a hybrid of

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

102

surface patterns, parsing, and classification to
extract (1) business events and (2) their temporal
constraints from contract text. We use topic
modeling to (3) automatically organize the event
terms into clusters.
56 JSCB-48 A Real-time Group
Auction System for
Efficient Allocation of
Cloud Internet
Applications
2014-
2015
Increasing number of the cloud-based Internet
applications demands for efficient resource and cost
management. This paper proposes a real-time
group auction system for the cloud instance market.
The system is designed based on a combinatorial
double auction, and its applicability and
effectiveness are evaluated in terms of resource
efficiency and monetary benefits to auction
participants (e.g., cloud users and providers). The
proposed auction system assists them to decide
when and how providers allocate their resources to
which users. Furthermore, we propose a distributed
algorithm using a group formation game that
determines which users and providers will trade
resources by their cooperative decisions.
57 JSCB-49 Towards Efficient
Authenticated Sub
graph Query
Service in Outsourced
Graph Databases
2014-
2015
Graphs have been a powerful tool that is suitable
for a large variety of applications including
chemical databases and the Semantic Web, among
others. A fundamental query of graph databases is
sub graph query: given a query graph q, it retrieves
the data graphs from a database that containing.
Due to the cost of managing massive data coupled
with the computational hardness of sub graph
query processing, outsourcing the processing to a
third-party service providers an appealing
alternative. However, security properties such as
data integrity and the response time are critical
Quality of Service (QOS) issues in query services.
Unfortunately, to our knowledge, authenticated sub
graph query services have not been addressed
before.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

103

58 JSCB-50 Verification of
Change in a
Fragmented
Event-Based Process
Coordination
Environment
2014-
2015
To allow the distribution of control and visibility of
cross-organizational process models and to increase
availability and performance of the processes, a
process model can be fragmented into logically
different parts and distributed in the enterprise
architecture. Fragmentation algorithms and
execution environments which connect the
fragmented process model parts together,
recreating the original process execution semantics,
have been proposed in earlier works. However, a
critical challenge that is left open is the ability to
independently change the control structure of a
process fragment.
59 JSCB-51 Robust Service
Compositions with
Functional and
Location Diversity
2014-
2015
Service composition provides a means of customized
and flexible integration of service functionalities.
Quality-of-Service (QOS) optimization algorithms
select services to adapt workflows to the non-
functional requirements of the user. With
increasing number of services in a workflow,
previous approaches fail to achieve a sufficient
reliability. Moreover, expensive ad-hoc re-planning
is required to deal with service failures. The major
problem with such sequential application of
planning and re-planning is that it ignores the
potential costs during the initial planning and they
consequently are hidden from the decision maker.
Our idea to overcome this problem is to compute a
QOS optimized selection of service clusters that
includes a sufficient number of backup services for
each service employed.
60 JSCB-52 Requirements-Driven
Self-Optimization of
Composite Services
using Feedback
Control
2014-
2015
In an uncertain and changing environment, a
composite service needs to continuously optimize its
business process and service selection through
runtime adaptation. To achieve the overall
satisfaction of stakeholder requirements, quality
tradeoffs are needed to adapt the composite service
in response to the changing environments. Existing
approaches on service selection and composition,
however, are mostly based on quality preferences
and business processes decisions made statically at
the design time. In this paper, we propose a
requirements-driven self-optimization approach for
composite services. It measures the quality of
services (QOS), estimates the earned business value,
and tunes the preference ranks through a feedback
loop.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

104

61 JSCB-53 Trustworthy
Stigmergic Service
Composition
and Adaptation in
Decentralized
Environments
2014-
2015
The widespread use of web services in forming
complex online applications requires service
composition to cope with highly dynamic and
heterogeneous environments. Traditional
centralized service composition techniques are not
sufficient to address the needs of applications in
decentralized environments. In this paper, a
stigmergic based approach is proposed to model the
decentralized service interactions and handle
service composition in highly dynamic open
environments. In the proposed approach, web
services and resources are modeled as multiple
agents.
62 JSCB-54 A Framework for
Composing SOAP,
Non-SOAP
and Non-Web
Services
2014-
2015
Recently, there is a trend on developing mobile
applications based on service-oriented architecture
in numerous application domains, such as
telematics and smart home. Although efforts have
been made on developing composite SOAP services,
little emphasis has been put on invoking and
composing a combination of SOAP, non-SOAP, and
non-web services into a composite process to
execute complex tasks on various mobile devices.
Main challenges are two-fold: one is how to invoke
and compose heterogeneous web services with
various protocols and content types, including
SOAP, RESTFUL, and OSGI services; and the
other is how to integrate non-web services, like Web
contents and mobile applications, into a composite
service process.
63 JIPB-55 Evaluating
Combinational
Illumination
Estimation
Methods on Real-
World Images
2014-
2015
Illumination estimation is an important component
of color constancy and automatic white balancing. A
number of methods of combining illumination
estimates obtained from multiple subordinate
illumination estimation methods now appear in the
literature. These combinational methods aim to
provide better illumination estimates by fusing the
information embedded in the subordinate solutions.
The existing combinational methods are surveyed
and analyzed here with the goals of determining: 1)
the effectiveness of fusing illumination estimates
from multiple subordinate methods; 2) the best
method of combination; 3) the underlying factors
that affect the performance of a combinational
method; and 4) the effectiveness of combination for
illumination estimation in multiple-illuminant
scenes.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

105

64 JIPB-56 A New Secure Image
Transmission
Technique via
Secret-Fragment-
Visible Mosaic Images
by Nearly
Reversible Color
Transformations
2014-
2015
A new secure image transmission technique is
proposed, which transforms automatically a given
large-volume secret image into a so-called secret-
fragment-visible mosaic image
of the same size. The mosaic image, which looks
similar to an arbitrarily selected target image and
may be used as a camouflage of the secret image, is
yielded by dividing the secret image into fragments
and transforming their color characteristics to be
those of the corresponding blocks of the target
image.
65 JIPB-57 A Bit Allocation
Method for Sparse
Source Coding
2014-
2015
In this paper, we develop an efficient bit allocation
strategy for sub band-based image coding systems.
More specifically, our objective is to design a new
optimization algorithm based on a rate-distortion
optimality criterion. To this end, we consider the
uniform scalar quantization of a class of mixed
distributed sources following a Bernoulli
generalized Gaussian distribution. This model
appears to be particularly well-adapted for image
data, which have a sparse representation in a
wavelet basis.
66 JIPB-58 Fingerprint
Compression Based
on Sparse
Representation
2014-
2015
A new fingerprint compression algorithm based on
sparse representation is introduced. Obtaining an
over complete dictionary from a set of fingerprint
patches allows us to represent them as a sparse
linear combination of dictionary atoms. In the
algorithm, we first construct a dictionary for
predefined fingerprint image patches. For a new
given fingerprint images, represent its patches
according to the dictionary by computing l 0 -
minimization and then quantize and encode the
representation.
67 JIPB-59 Efficient Structure-
Aware Image
Smoothing by
Local Extrema on
Space-Filling Curve
2014-
2015
This paper presents a novel image smoothing
approach using a space-filling curve as the reduced
domain to perform separation of edges and details.
This structure-aware smoothing effect is achieved
by modulating local extreme after empirical mode
decomposition; it is highly effective and efficient
since it is implemented on a one-dimensional curve
instead of a two-dimensional image grid. To
overcome edge staircase-like artifacts caused by a
neighborhood deficiency in domain reduction, we
next use a joint contrast-based filter to consolidate
edge structures in image smoothing.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

106

68 JIPB-60 A Compressive
Sensing based Secure
Watermark
Detection and Privacy
Preserving Storage
Framework
2014-
2015
Privacy is a critical issue when the data owners
outsource data storage or processing to a third
party computing service, such as the cloud. In this
paper, we identify a cloud
computing application scenario that requires
simultaneously
performing secure watermark detection and
privacy preserving multimedia data storage. We
then propose a compressive sensing (CS)-based
framework using secure multiparty computation
(MPC) protocols to address such a requirement.
69 JIPB-61 Image Segmentation
Using Higher-Order
Correlation
Clustering
2014-
2015
In this paper, a hyper graph-based image
segmentation framework is formulated in a
supervised manner for many high-level computer
vision tasks. To consider short- and long-range
dependency among various regions of an image and
also to incorporate wider selection of features, a
higher order correlation clustering (HO-CC) is
incorporated in the framework. Correlation
clustering (CC), which is a graph partitioning
algorithm, was recently shown to be effective in a
number of applications such as natural language
processing, document clustering, and image
segmentation.
70 JIPB-62 Local-Prediction-
Based Difference
Expansion
Reversible
Watermarking



2014-
2015
This paper investigates the use of local prediction in
difference expansion reversible watermarking. For
each pixel, a least square predictor is computed on a
square block centered on the pixel and the
corresponding prediction error is expanded. The
same predictor is recovered at detection without
any additional information. The proposed local
prediction is general and it applies regardless of the
predictor order or the prediction context.
71 JIPB-63 Example-Based
Super-Resolution
Land Cover
Mapping Using
Support Vector
Regression
2014-
2015
Super-resolution mapping (SRM) is a promising
technique to generate a fine resolution land cover
map from coarse fractional images by predicting
the spatial locations of different land cover classes
at sub pixel scale. In most cases, SRM is
accomplished by using the spatial dependence
principle, which is a simple method to describe the
spatial patterns of different land cover classes.
However, the spatial dependence principle used in
existing SRM models does not fully reflect the real-
world situations, making the resultant fine
resolution land cover map often have uncertainty.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

107

72 JIPB-64 Reversible Data
Hiding in Encrypted
JPEG Bitstream
2014-
2015
This correspondence proposes a framework of
reversible data hiding (RDH) in an encrypted
JPEG bit stream. Unlike existing RDH methods
for encrypted spatial-domain images, the proposed
method aims at encrypting a JPEG bit stream into a
properly organized structure, and embedding a
secret message into the encrypted bit stream by
slightly modifying the JPEG stream. We identify
usable bits suitable for data hiding so that the
encrypted bit stream carrying secret data can be
correctly decoded. The secret message bits are
encoded with error correction codes to achieve a
perfect data extraction and image recovery.
73 JPDS-01 A System for Denial-
of-Service Attack
Detection
Based on Multivariate
Correlation Analysis
2014-
2015
Interconnected systems, such as Web servers,
database servers, cloud computing servers and so
on, are now under threads from network attackers.
As one of most common and aggressive means,
denial-of-service (DoS) attacks cause serious impact
on these computing systems. In this paper, we
present a DoS attack detection system that uses
multivariate correlation analysis (MCA for accurate
network traffic characterization by extracting the
geometrical correlations between network traffic
features. Our MCA-based DoS attack detection
system employs the principle of anomaly based
detection in attack recognition. This makes our
solution capable of detecting known and unknown
DoS attacks effectively by learning the patterns of
legitimate network traffic only. Furthermore, a
triangle-area-based technique is proposed to
enhance and to speed up the process of MCA. The
effectiveness of our proposed detection system is
evaluated using KDD Cup 99 data set, and the
influences of both non-normalized data and
normalized data on the performance of the
proposed detection system are examined. The
results show that our system outperforms two other
previously developed state-of-the-art approaches in
terms of detection accuracy.
74 JPDS-02 Cross-Layer
Approach for
Minimizing Routing
Disruption in IP
Networks
2014-
2015
Backup paths are widely used in IP networks to
protect IP links from failures. However, existing
solutions such as the commonly used independent
model and Shared Risk Link Group (SRLG) model
do not accurately reflect the correlation between IP
link failures, and thus may not choose reliable
backup paths. We propose a cross-layer approach
for minimizing routing disruption caused by IP link
failures. We develop a probabilistically correlated
failure (PCF) model to quantify the impact of IP
link failure on the reliability of backup paths. With
the PCF model, we propose an algorithm to choose

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

108

multiple reliable backup paths to protect each IP
link. When an IP link fails, its traffic is split onto
multiple backup paths to ensure that the rerouted
traffic load on each IP link does not exceed the
usable bandwidth. We evaluate our approach using
real ISP networks with both optical and IP layer
topologies. Experimental results show that two
backup paths are adequate for protecting a logical
link. Compared with existing works, the backup
paths selected by our approach are at least 18
percent more reliable and the routing disruption is
reduced by at least 22 percent. Unlike prior works,
the proposed approach prevents the rerouted traffic
from interfering with normal traffic.
75 JPDS-03 Key-Aggregate
Cryptosystem for
Scalable Data Sharing
in Cloud Storage
2014-
2015
Data sharing is an important functionality in cloud
storage. In this paper, we show how to securely,
efficiently, and flexibly Share data with others in
cloud storage. We describe new public-key
cryptosystems that produce constant-size cipher
texts such that efficient delegation of decryption
rights for any set of cipher texts is possible. The
novelty is that one can aggregate any set of secret
keys and make them as compact as a single key, but
encompassing the power of all the keys being
aggregated. In other words, the secret key holder
can release a constant-size aggregate key for flexible
choices of cipher text set in cloud storage, but the
other encrypted files outside the set remain
confidential. This compact aggregate key can be
conveniently sent to others or be stored in a smart
card with very limited secure storage. We provide
formal security analysis of our schemes in the
standard model. We also describe other application
of our schemes. In particular, our schemes give the
first public-key patient-controlled encryption for
flexible hierarchy, which was yet to be known.



No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

109

MECHANICAL
MECHATRONICS

1 MESS-01 Anti-dazzling head
light for two wheeler
2014 As for Indian road transport scenario is concerned,
accidents are becoming a day to day cause an
attempt has been made in this project to reduce
such mishaps. In our project having the following
operation occurs automatically in the vehicle.
Automatic head light brightness controller due to
opposite vehicle light intensity
2 MESS-02 Automatic bottle
filling
system

2014 Our project is automation based bottle filling
system for mineral water. This project will be very
much useful to domestic people and mineral water
manufacturing industries. If suppose we implement
the project for a complete network in an area, that
will be consuming very huge water and it can
calculate the water consumption of the area.
3 MESS-03 Automatic break
failure indicator and
engine over heating
alarm
2014 The aim is to design and develop a control system
based an electronically controlled automatic break
failure indicator by using IR Sensor and engine over
heating alarm by using heat sensor is called
Automatic Break Failure Indicator And Engine
Over Heating Alarm. Automatic break failure
indicator and engine over heating alarm is consists
of IR sensor circuit, Heat sensor Circuit, Control
Unit and frame. The sensor is used to detect the
break wire. There is any disconnection of the break
wire or cutting of any few turns of break wire, the
control signal to the alarm unit. Similarly the heat
sensor is fixed to the engine and this heat is
measured and giving the alarm signal when the
engine heat exceeds the setted temperature limit.
4 MESS-04 Automatic break in
hill station
2014 The proposed mechanism is to reverse break using
ratchet gear. By reverse locking the differential the
differential is disengaged from the axle. Thus the
power is directly transmitted to the axle and hence
to the wheels. This will considerably reduce the
power loss in some occasions when unwanted loss is
happening due to the transmission if power from
the shaft to the ratchet gear and then to the axle and
hence to the wheels. So in mechanism the unwanted
power loss in the due course of transmission
through the gear wheel is reduced.
5 MESS-05 Automatic cell phone
charger with pay
system
2014 Our objective is to design and develop a charger
system normally Automatic Cell Phone Charger
With Pay System. For this project cell phone
automatically charged with the help of charger
circuit which interfaced with coin box arrangement.
The control mechanism contains the
microcontroller unit, LCD display, cell phone

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

110

charger unit and key pad.
6 MESS-06 Automatic dam
shutter controlling
system
2014 The lead sensor is used to control the water levels in
the dam automatically. In this project, the motor is
used to open/close the dam, when the sensor giving
the control signals to the microcontroller.
7 MESS-07 Automatic double axis
welding machine
2014 In our project Automatic Double Axis Welding
Machine is beings with an introduction to welding
the various components automatically. Three-
pneumatic cylinder and solenoid valve are provided.
One cylinder is for the up and down movement,
another one for arm lifting and one for the rotary
motion.
8 MESS-08 Automatic ingot
feeder for boundary
2014 This project work titled Automatic Ingot Feeder
For Boundary has been conceived having studied
the difficulty in type of aluminum ingot material.
Our survey in the regard in several industrial
boundary of furnace, revealed the facts that mostly
some difficult methods were adopted in the ingot
boundary. This ingot feeder using two pneumatic
cylinders. An ingot is a material, usually metal, that
is cast into a shape suitable for further processing.
Non-metallic and semiconductor materials prepared
in bulk form may also be referred to as ingots,
particularly when cast by mold based methods.
9 MESS-09 Automatic musical
water foundation
2014 Automatic musical water foundation is a
multipurpose project, which can be used for both
Agriculture and domestic purposes. This project is
modification of the automatic plant water system.
This is different from other model, but our project
an all one project. The musical sensor is used to
senses the music device in the speaker. Then
automatically the pump is On/OFF so that the water
flow is varying.
10 MESS-10 Automatic plant
water moistering
system for garden
2014 Automatic moisture control in Garden is a
multipurpose project, which can be used for both
Agriculture and domestic purposes. This project is
modification of the automatic plant water system.
This is different from other model, but our project
an all one project. The touch sensor is used to senses
the moisture contents in the garden. Then
automatically the pump is On/OFF in the garden.
11 MESS-11 Automatic Pneumatic
Bumper and Break
Actuation Before
Collision
2014 The technology of pneumatics has gained
tremendous importance in the field of workplace
rationalization and automation from old-fashioned
timber works and coal mines to modern machine
shops and space robots. It is therefore important
that technicians and engineers should have a good
knowledge of pneumatic system, air operated valves
and accessories. The aim is to design and develop a

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

111

control system based intelligent electronically
controlled automotive bumper activation and
automatic braking system is called Automatic
Pneumatic Bumper And Break Actuation Before
Collision. This system is consists of IR transmitter
and Receiver circuit, Control Unit, Pneumatic
bumper system and pneumatic braking system. The
IR sensor is used to detect the obstacle. There is any
obstacle closer to the vehicle (with in 3-4 feet), the
control signal is given to the bumper activation
system and also pneumatic braking system
simultaneously. The pneumatic bumper and
braking system is used to product the man and
vehicle. This bumper and braking activation system
is only activated the vehicle speed above 30-40 km
per hour. This vehicle speed is sensed by the
proximity sensor and this signal is given to the
control unit and pneumatic bumper and braking
activation system.
12 MESS-12 Automatic pneumatic
bumper for four
wheeler
2014 The technology of pneumatics has gained
tremendous importance in the field of workplace
rationalization and automation from old-fashioned
timber works and coal mines to modern machine
shops and space robots. It is therefore important
that technicians and engineers should have a good
knowledge of pneumatic system, air operated valves
and accessories. The aim is to design and develop a
control system based an intelligent electronically
controlled automotive bumper activation system is
called Automatic Pneumatic Bumper. This system
is consists of IR transmitter and Receiver circuit,
Control Unit, Pneumatic bumper system. The IR
sensor is used to detect the obstacle. There is any
obstacle closer to the vehicle (with in 4 feet), the
control signal is given to the bumper activation
system. The pneumatic bumper system is used to
product the man and vehicle. This bumper
activation system is only activated the vehicle speed
above 40-50 km per hour. This vehicle speed is
sensed by the proximity sensor and this signal is
given to the control unit and pneumatic bumper
activation system.
13 MESS-13 Automatic pneumatic
high speed sheet
cutting machine
2014 The sheet metal cutting process is a main part of the
all industries. Normally the sheet metal cutting
machine is manually hand operated one for medium
and small scale industries. In our project is
Automatic Pneumatic High Speed Sheet Cutting
Machine. Automation in the modern world is
inevitable. Any automatic machine aimed at the
economical use of man, machine, and material

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

112

worth the most. In our project is solenoid valve and
control timing unit is used for automation.The sheet
metal cutting machine works with the help of
pneumatic double acting cylinder. The piston is
connected to the moving cutting tool. It is used to
cut the small size of sheet metal. The machine is
portable in size, so easy transportable.
14 MESS-14 Automatic power
saving conveyor
2014 In our project Automatic Power Saving Conveyor
beings with an introduction to pneumatic, its
various applications. The conveyor will operate only
the work pieces kept in the conveyor only. The
remaining time the conveyor will be in off condition
so that the power is saved. The conveyor
Automation is very useful for material handling in
modern engineering industries. The motor is used to
drive the conveyor. The materials are transferred
from one place to another place by using conveyor.
This system gives smooth operation and smooth
movement of the belts to the jobs at required time.
15 MESS-15 Automatic pressure
control valve
Open/close system
2014 In a process industry pressure is an important
parameter. Particularly pneumatic pressure is a
very important parameter. By using the pneumatic
pressure controller, we can save the power
consumed by the industries too. Normally in the
industries, there are high pressure is somewhat low
(say around 30 to 40 mbar) the required pressure is
depends upon the process presently we are working
with the machine. The required pressure is setted to
the pressure switch which measures the current
pressure continuously. The electrical pressure
switch is designed for starting or stopping of
equipment when pressure in the system drops or
exceeds the pre-set limits.
16 MESS-16 Automatic quick tool
retrieval system
2014 Tool retrieval is the activity of obtaining different
tool from a collection of different resources.
Automated tool retrieval systems are used to reduce
the time duration and increase the productivity.
This is very useful for all mechanical workshop and
industries to do bulk production of different
products.
17 MESS-17 Automatic side stand
with breaking locking
system
2014 This project work titled Automatic Side Stand
With Breaking Lockig System has been conceived
having studied the difficulty in standing the any
type of two wheeler vehicle. Our survey in the
regard in several automobile garages, revealed the
facts that mostly some difficult methods were
adopted in standing the vehicles in rest. Now the
project has mainly concentrated on this difficulty,
and hence a suitable hydraulic unit has been
designed. Such that the vehicles can be stand the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

113

floor land without application of any impact force.
By pressing the button in the dashboard, the
solenoid valve activates the hydraulic jack
automatically. The fabrication part of it has been
considered with almost case for its simplicity and
economy, such that this can be accommodated as
one of the essential tools on automobile garages.
18 MESS-18 Automatic vehicle
accident prevention
system
2014 The aim is to design and develop a control system
based an intelligent electronically controlled
automotive braking system is called Automatic
Vehicle Accident Prevention System. This Braking
system is consists of IR transmitter and Receiver
circuit and the vehicle. The IR sensor is used to
detect the obstacle. There is any obstacle in the
path, the IR sensor senses the obstacle and giving
the control signal to the breaking system. The relay
is used to disconnect the motor supply voltage.
19 MESS-19 Beans seller machine 2014 We produce this powerful, yet easily portable
electric pea seller that is sure to save you a lot of
time and effort in the task of shelling peas and
beans. First created by Lee Manufacturing
Company in 1976, many thousands were made with
plywood. Now our Electric Pea Sheller, Sr. (Mr. Pea
Sheller) is constructed of great looking and durable
aluminum which makes it much easier to clean after
shelling a bushel basket of beans. Measuring
approximately 16" in length and 9" tall (weighs
Under 20 lbs), this pea sheller is small enough to
store easily and move from kitchen counter, to
dining room table to patio without much effort. Yet
its powerful 1/15 horsepower motor will make quick
work of pea shelling. Plug into any outlet and you
are ready to get to work. Our shelling rollers have
"teeth" or splines. They grip the bean pods and
pull them through.
20 MESS-20 Bio diesel extraction
from plastic material
2014 The material is then transported to smelter or
reduction plants where it is placed into a caustic
chemical bath of sodium hydroxide in order to
dissolve the desired metal at very high
temperatures. With the amount of plastic that is
going to landfill and incineration reaching epidemic
levels, our planet is in dire trouble and people are
looking for a greener solution. Waste Tech
Industries (WTI) has responded to these challenges
by setting its sights on the development,
construction, and marketing of processing plants
for hydrocarbon wastes, e.g., oil sludge, transformer
oils, waste engine oils, crude oils and plastics.
21 MESS-21 Biomass briquetting
machine
2014 The project deals about the Biomass briquetting
machine. The main principle is to compress the
plastic material in a barrel and the compressing

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

114

motion is developed by rotating the rack and pinion
arrangement. The plastic material is heated by the
heater surrounding the barrel. Then it is converted
into molten state. The molten plastic is injected
through the nozzle in barrel to the die by the
compressing force. After completing this process,
we will get the product from the die. Commercial
products like bushes, couplings, switches etc., can be
produced.
22 MESS-22 Chain tighter 2014 We have noticed that the chain on nearly every
chain-driven bike weve inspected in the parking
lots of long-distance events, including the Iron Butt
Rally, is incorrectly adjusted. They are almost
always adjusted too tight. Even if the chain is
lubricated properly and the rear wheel is aligned
correctly, running a chain with too little slack leads
to pre-mature wear of the chain and sprockets,
suspension binding, and can even result in damage
to the bearings supporting the countershaft and
sprocket carrier in the rear hub.
23 MESS-23 Briquette burner 2014 As the briquette burns, the concentration of carbon
monoxide gradually increases. Because of its
toxicity (and not the exhaustion of oxygen as
sometimes thought) CO concentrations of as little as
one part per thousand in the air in a confined space
are fatal if inhaled over an extended period. The
incomplete combustion of carbon produces carbon
monoxide, which binds strongly to hemoglobin,
rapidly decreasing the ability of blood to deliver
oxygen to the body. These results in death due to
hypoxia brought about by carbon monoxide
poisoning. The method is described as "easy and
painless" compared to other suicide methods.
Unlike jumping from a high-rise building or cutting
with a knife, the suicidal person does not have to
endure more pain. Many who attempt suicide by
briquette burning use alcohol or hypnotic drugs
during the attempt, and survivors report that they
felt no discomfort.
24 MESS-24 Catelite converter for
automobile
2014 Diesel power inevitably finds a very important role
in the development of the plants economy and
technical growth. Inspire of their high thermal
efficiency, one cannot ignore the fact about the
effect of their exhaust, in the atmosphere. It is a
well-known fact that the toxic gases emitted in diesel
engines are less than the engines. Due to high cost of
petrol, diesel engines are more in use. Anticipating
the use of diesel engines, even more in the near
future; this system developed can be used to control
the toxic gases, coming out of the diesel engines

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

115

25 MESS-25 Design and
fabrication of cam
vice
2014 This project deals with the design and fabrication of
CAM VICE which works in the principle or
eccentric cam mechanism. The main features of the
cam vice are promotes mass production, can hold
irregular jobs, more rigidity, reduces fatigue. Cam
was designed to hold the job at high pressure. The
other parts were designed to hold the job in rigid
condition. Cam vice is suitable for mass production.
It is possible to hold irregular components also, and
similar components can be very quickly.
26 MESS-26 Eccentric punching
machine
2014 The eccentric punching machine system has gained
a large amount of importance in last few decades.
This importance is due to its accuracy and cost.
This convenience in operating the motor system has
made us to design and fabricate this unit as our
project. This unit, as we hope that it can be
operated easily with semi-skilled operators. The
eccentric punching machine has an advantage of
working in battery, The work piece thus got is for
required dimensions and the piece can be collected
through the land clearance provided in the die. The
die used in this is fixed such that the die of required
shape can be used according to the requirement.
This enables us to use different type punch dies
resulting in a wide range of products. Different
types of punch as requirement can be thus got.
According to the work material the operating
motor.
27 MESS-27 Electro-magnetic
braking system for
automobile
2014 These brakes designed by controlling for
equipment, auto mobiles and movers are suitable
for AC & DC supplies up to 12V to 220V, and are
suitable for a wide range of drum sizes 10 to 380mm
dia. These brakes are suitable with a rated torque
ranging from 100 kg-cm for the smallest brake up
to 2000 kg-cm for a 380 mm dia at 50% coil rating,
i.e., the coil remains in circuit for a maximum of 5
min. Out of every 10 min.Since these brakes are in
normally closed position, the release of the brake
shoes is affected by energizing the electromagnetic
coil which overcomes the spring force and shoes are
moved clear off the drum by lever / arm linkage
system so that the drum is free to rotate without any
friction. When the power is given to the
electromagnetic coil the coil gets energized and in
turn pulls the plunger down. The plunger in turn
operates the arm of the brakes and the brake opens.
The design of the brake is such that as the lining
keeps wearing out due to normal operation of the
brake, adjusts itself on its own to achieve the rated
toque. When specified, brake drum or drum

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

116

coupling both pin bush type and flexible geared type
can be supplied along with the brakes.
28 MESS-28 Emission test for co2 2014 Diesel power inevitably finds a very important role
in the development of the plants economy and
technical growth. Inspite of their high thermal
efficiency, one cannot ignore the fact about the
effect of their exhaust, in the atmosphere. It is a
well-known fact that the toxic gases emitted in diesel
engines are less than the engines. Due to high cost of
petrol, diesel engines are more in use. Anticipating
the use of diesel engines, even more in the near
future; this system developed can be used to control
the toxic gases, coming out of the diesel engines.
These toxic gases are harmful not only to the
atmosphere, but also to the human & animal race.
Objective of this project is to design & fabricate a
simple system, where the toxic levels are controlled
through chemical reaction to more agreeable level.
This system acts itself as a silencer; there is no need
to separate the silencer. The whole assembly is fitted
in the exhaust pipe; it does not give rise to any
complications in assembling it. This system is very
cost effective and more economical.
29 MESS-29 Grass cutter machine 2014 A Grass cutter is a machine that uses revolving
blades to cut a lawn at an even length. Even more
sophisticated devices are there in every field. Power
consumption becomes essential for future. Grass
cutter is a very useful device which is very simple in
construction. It is used to maintain and upkeep
lawns in gardens, schools, colleges part etc. We
have made some changes in the existing machine to
make its application easier at reduced cost. Our
main aim in pollution control is attained through
this. Unskilled operation can operate easily and
maintain the lawn very fine and uniform surface
look. In our project, Grass cutter is used to cut
the different grasses for the different application.
30 MESS-30 Fabrication of ground
dryer
2014 The machine, ground dryer, we introduce through
our project is mainly useful for drying grounds such
as cricket ground, football ground and wherever
moisture contents. Now a day, rain fall occurs at the
time of final matches such as football or cricket. At
that time, the ground dryer is used to remove the
moisture contents in the ground. In our project, the
ground dryer consists of two main parts such as
heating element and blower. The blower is used to
passing the hot air to the ground, so that the
moisture contents in the ground was removed. The
size of our project is also portable. So we can move
the ground dryer to any place very easily.
31 MESS-31 Groundnut thruster 2014 Thrusting of groundnut are the most important

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

117

operations in groundnut cultivation. During peak
seasons, due to the non-availability of labor in time,
delay in thrusting results in heavy loss to the
farmer. For alleviating the labor problems during
peak seasons and for accomplishing the timeliness
of operation an attempt was made to develop a
groundnut combine thruster. As the combine
harvester has to perform the dual operations viz.,
harvesting and threshing, the groundnut harvesting
mechanism, conveyors and threshing mechanism
have to be mounted integrally to carry out
harvesting and threshing simultaneously.
32 MESS-32 High speed object
counting conveyor
2014 The objective of our project is object counting
conveyor.
33 MESS-33 Hydro-pneumatic vice 2014 This project deals with the design and fabrication of
the hydro pneumatic vice with an air-to-hydraulic
pressure booster, the hydro pneumatic vice is
capable of holding small and minute work pieces
with a large force thus enabling accurate and
precise operation. The project combines the
advantages of both hydraulics and pneumatics, thus
eliminating the drawbacks that may be associated
with the use of fluid power Also the air-to-hydraulic
pressure booster amplifiers the force with which the
vice grips the work piece. The highlights of this
project are that it is very economical, accurate, and
easy to operate and has wide variety of applications.
34 MESS-34 Integrated drunken
drive prevention
system
2014 Driving while either intoxicated or drunk is
dangerous and drivers with high blood alcohol
content (BAC) are at increased risk of car accidents,
highway injuries and vehicular deaths. Prevention
measures evaluated include license suspension or
revocation, impounding or confiscating vehicle
plates, enforcing open container bans, increasing
penalties such as fines or jail for drunk driving,
mandating education for young people, and
lowering legal bacs. Also discussed are safety seat
belts, air bags, designated drivers, and effective
practical ways to stay sober. Furthermore, the plan
will urge the implementation of safety and health
education by employers with regard to fire safety in
multiple-tenant buildings with small businesses. At
the same time, it will seek all-embracing strategies
to prevent explosion and fire accidents, including
measures to prevent dust explosions caused by
magnesium alloys. In our project is Alcohol
Detector used to senses the gas leakage and
indicates the alarm with indication.
35 MESS-35 Intelligent motorized
wall painting crane
2014 This project deals with the fabrication of Motorized
wall Painting crane. The aim of this project work is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

118

to acquire practical knowledge in the field of
complicated wall painting with the help of motor.
The project work is concerned with the fabrication
of the portable motorized crane. This machine is
very useful for lifting and carrying heavy loads such
as painting equipment, painting person and etc.
36 MESS-36 Internal grinding
attachment for lathe
2014 Everyone knows a grinding attachment for lathhe is
one mighty handy item to have as an addition to a
lathe, however, if you ever priced one, you know
they run in to some serious amounts of money. So,
with this in mind, I set off to build my own.
Pictured below is the outcome of that project. I have
to say the grinding attachment for lathe works
extremely well. By varying the pulley sizes I can get
a high end speed of over 10,000 rpm if needed. The
only change I would make is to have a totally
enclosed motor to keep out the grit.
37 MESS-37 Laminar flow water
turbine
2014 Laminar Flow Water turbines convert Mechanical
rotary energy into Electrical energy. A mechanical
interface, consisting of a Laminar flow setup, water
Pump and a suitable coupling transmits the energy
to an electrical generator. The output of this
generator is connected to the Battery or system
grid.
38 MESS-38 Lamination machine 2014 Automatic laminating machines, designed with
represent an ideal choice for professional single
sided lamination in small and medium size visiting
card, driving licenses and etc. The inside of the
lamination pouch is coated with a heat-activated
film that adheres to the product being laminated as
it runs through the laminator. The substrate side of
the board contains a heat-activated adhesive that
bonds the print to the substrate. This can be any of
a number of board products or another sheet of
laminate.
39 MESS-39 Lathe coolant pump
with fitting
arrangement
2014 The process of converting hot material into cold is
called cooling process. The main aim of the lathe
coolant is converting hot input to the cold material.
The water pump is used to supply the coolant water
into the work piece. The lathe coolant consists of
flexible tube and fuel pump. The machining process
of the hardening material is produces the large
amount of hot. The coolant pump is used to hot
material into cold material.
40 MESS-40 Magnetic power
transmission for
machine
2014 The magnetic gear transmission for machine is used
for mechanical gear transmission with help of the
magnetic and motor. This is transducer electrical
energy convert to the mechanical energy.
41 MESS-41 Marble polishing
machine
2014 This project deals with the designing and
fabrication of Marble polishing Machine. The aim

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

119

of this project work is to develop and modernized
process for polishing the marble with wet and dry.
It is very useful for polishing the floors. It can be
used wet and dry; hence it is widely used in houses,
hospitals, auditorium, shops, computer centers, etc.
In modern days interior decorations are becoming
an important role in our life. Polishing of marble is
a very important one for our health and reduces the
man power requirement. Hence our project is very
useful in our day to day life.
42 MESS-42 Mini firefighting
robot
2014 There are many fields in which artificial intelligence
(AI) may be related to electrical, mechanical,
psychology and philosophy. We use this concept in
a simpler application of fire detection. In our
project, we use a sensor to detect fire, which sends
the information to a micro-controller, which is
written with a program based on fuzzy logic
algorithm, which turns nozzle head of the fire
fighter to that direction. One stepper motor is used
for the clockwise and anticlockwise rotation. A
valve opens in the nozzle, which is controlled by the
D.C Motor. Fuzzy logic algorithm here used is to
sense the fire and to trigger the nozzle in the
direction of fire
43 MESS-43 Mini jet engine 2014 Before describing the construction of the minijet
engine, some basic Principles should be understood.
A minijet engine can be broken down into five
major subassemblies, the inlet duct, compressor,
combustion chamber, turbine wheel, and exhaust
outlet. When the engine is running, air is drawn into
the compressor where it is compressed and the
pressure is increased. It is then ducted to the
combustion chamber where fuel is added and
burned.
44 MESS-44 Solar air cooler 2014 Mechanical Engineering without production and
manufacturing is meaningless and inseparable.
Production and manufacturing process deals with
conversion of raw materials inputs to finished
products as per required dimensions, specification
and efficiently using recent technology. The new
developments and requirements inspired us to think
of new improvements in air conditioning
Engineering field. Nowadays air cooler is available
in market. In our project, solar power is stored in a
battery. This power is used to run the air collar
when ever we required. Solar energy means all the
energy that reaches the earth from the sun. It
provides daylight makes the earth hot and is the

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

120

source of energy for plants to grow. Solar energy is
also put to two types of use to help our lives directly
solar heating and solar electricity. Solar electricity
is the technology of converting sunlight directly in
to electricity. It is based on photo-voltaic or solar
modules, which are very reliable and do not require
any fuel or servicing. Solar electric systems are
suitable for plenty of sun and are ideal when there is
no main electricity. Our objective is to design and
develop a solar system normally Solar Air Cooler.
45 MESS-45 Mini water service
station

2014 This machine can be used for cleaning light vehicles
especially for two wheelers and 3 wheelers and it
has a better performance in agricultural purposes.
Now days this machine can have a good market
because of the following reasons. It is very simple in
construction and using simple mechanism. Easy to
operate. Since it is hand operated no electrical
power is required. Available at low cost It saves
time and money. It is portable If needed it can also
be operated with a compressor Using a hand
operated pump the water is pressurized by
compressing the air in the water tank. Then it is
delivered through a nozzle under high pressure
about 15 kg/cm.
46 MESS-46 Motorized screw jack

2014 This project work titled Fabrication Of
Motorized Screw Jack has been conceived having
studied the difficulty in lifting the any type of light
vehicles. Our survey in the regard in several
automobile garages, revealed the facts that mostly
some difficult methods were adopted in lifting the
vehicles for reconditioning. Now the project has
mainly concentrated on this difficulty, and hence a
suitable device has been designed. Such that the
vehicle can be lifted from the floor land without
application of any impact force. The fabrication
part of it has been considered with almost case for
its simplicity and economy, such that this can be
accommodated as one of the essential tools on
automobile garages.
47 MESS-47 Nano abrasive rails
filter
2014 The Machine we designed and fabricated is used for
grinding any shape of object like Circular,
Rectangular, and Polygon. In our project the work
abrasive belt is used to grinding the material. The
abrasive belt is rotated by the single phase induction
motor. Hence our project namely abrasive belt
grinder is a Special type of Machine. According to
the type of material to be grind, the grinding tool
can be changed. This project gives details of
grinding various shapes and sizes of components.
This machine can be widely applied in almost all
type of industries. By varying the pulley sizes I can

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

121

get a high end speed of over 10,000 rpm if needed.
The only change I would make is to have a totally
enclosed motor to keep out the grit.
48 MESS-48 Oil milling machine 2014 We want to connect one belt from motor to pulley.
There are two sides in pulley. From the two sides of
the pulley we want to connect one rod through gear.
That rod will touch the gear which is in the body of
the oil mill. Connect one gear to that pulley that is
we want to connect the new gear in center of the
pulley and the body of the oil mill gear. When we
ON the motor, force will come via belt to pulley.
Pulley will start to rotate because belt rotates
because belt is connected to the pulley. Rod which is
connected to the two sides. From the new gear is
also connected. From this connecting rod is also
connected. Gear which is in one side of connecting
rod is connected to the gear of the oil mill. So that
oil mill will start to rotate .These are the modified
techniques.
49 MESS-49 Oil pump testing
equipment

2014 Oil pump tester is equipment that is used to test the
performance of the oil pump. In lubrication system
of engine the oil pump plays a vital role. Serious
damages are caused to the engine components when
the pressure developed by the oil pump is low.
Hence testing the oil pump becomes very important.
To check the condition of the pump the actual
performance of the pump is compared with the
standard performance that is required for the
efficient oil pump is measured at a constant
pressure and at a rated RPM of the efficient oil
pump is measured at a constant pressure and at a
rated RPM of the pump. This quantity of oil is
compared with the standard quantity of oil that
should be delivered by the pump for efficient
distribution of oil at the same pressure and RPM. If
the quantity of the delivered oil is lesser than the
standard quantity, it can be confirmed that the oil
pump should be reconditioned or replaced.
50 MESS-50 Pantograph universal
gas cutting machine
2014 This project namely Pantograph Universal Gas
Cutting Machine is designed and fabricated by us is
mainly used to cut M.S plates in to any shapes. It is
a most viable and economic project among the other
projects what we have decided to do. The project
has been innovated by means of initiating the
various ideas from our project mates which make us
to design and fabricate the machine in a right
manner. This low cost and high valuable equipment
which was not available in the market make create
a huge demand if it is introduced to the market.
The application of the project is found to be wider.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

122

The machine is simple and compact and is easy to
operate. Even a lay man can understand the
principle of this machine and can operate without
any risk.
51 MESS-51 Paper cup making
machine
2014 Generally the cups and plate are made in plastics.
The plastics are harmful and it has many
disadvantages to us. By naturally we get leaves,
papers by using this we can make cups. It is very
cheap and it does not have any chemical effects. The
paper cup is made by a pneumatic machine. The
machine is operated by the pneumatic system. By
using this we can produce cup at high production
rate. By using different shape die we can produce
different shape and size cups. The machine size is
comfortable to suit anywhere. The air enters to the
flow control valve and gives pressure to the double
acting cylinder. The direction is control by the
direction 5/2 control valve. The movement of piston
will be varied by adjusting the flow control valve.
By adjusting the speed, the production rate will be
varied.
52 MESS-52 Pedal operated cell
phone charger
2014 Pedal operated Mobile phone charger an important
role in the material, social and cultural life of
mankind. Imagine never having to plug your cell
phone into the wall again now you can just plug it
into your cycle Watts Maker cell phone charger.
The system consists of a small generator that
provides power to your mobile phone while you take
an evening ride around the neighborhood or pedal
to work. This model takes about 90 minutes to go
from dead to fully charged, and it produces energy
as long as the wheels keep turning.
53 MESS-53 Piezo electric energy
harvesting system

2014 Synopsis pi ezoel ectri c energy harvester uses
pi ezoelectri c effect to convert normal l y
wasted mechani cal energy i n the form of
vi brati ons i nto a useabl e el ectri cal energy.
Any appl i cati on where sensi ng i s needed
and there i s a consi stent vi brati on to
harvest from can benefi t from the vol tage.
Bei ng a developi ng country the power
consumption i s i ncreasi ng on l arge scal e to
meat a growi ng need of the peopl e. Power
generati on i s wi dely on non-renewabl e
sources and these sources bei ng depl eti ng
some means have to be found for savi ng. In
the l ast few years, there has been an
increasi ng demand for low power and
portabl e energy source due to the
devel opi ng and mass consumpti on of
portabl e energy devi ces l i ke mobi l e phone,

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

123

personal computer etc. Thi s paper
descri bes the use of pi ezoel ectri c pol ymer
in order to harvest energy i n peopl e
wal ki ng, together wi th the el ectroni cs
needed to i ncrease energy transfer and
storage effi ci ency. An el ectrostati c
generator was also incl uded i n order to
increase energy harvesti ng. There have
been i ndependent sol uti ons i n i ncreasi ng
the harvesti ng effi ci ent on thei r mechanical
harvesti ng or on i ts power management
ci rcui try.
54 MESS-54 Piezo electric power
generating shock
absorber
2014 When used in a vehicle or hybrid electric vehicle the
electricity generated by the shock absorber can be
stored in the battery to be used later. In non-electric
vehicles the electricity can be used to power
accessories such as air conditioner. The two designs
that we had considered for conserving energy from
shock absorber are Electromagnetic & Hydraulic
55 MESS-55 Pneumatic door open
clos system

2014 Tired of stopping your vehicle and manually
opening/closing your door every time you leave or
come home? Simplify the process with a pneumatic
door opening system which operating the hand liver
valve so that opens your door. Automation in the
modern world is inevitable. Any automatic machine
aimed at the economical use of man, machine, and
material worth the most. In our project is direction
control valve is used for automation.
56 MESS-56 Design and
fabrication of
pneumatic drill jig
2014 This project work deals with the Design And
Fabrication Of Pneumatic Drill Jig For Hp Motor
Cover. This Pneumatic Drill Jig shows reduction in
the labor time, machining time, etc. This type of Jig
is used for mass production for motor cover,
bearing cap and other mechanical and automobile
equipments. This pneumatic drill jig is provided
with pneumatic clamping arrangement. This type of
clamping arrangement saves the setting time,
marking time, punching time etc. When compressed
air is taken from a convenient medium to provide
pope clamping force and good gripping to the
component. As the quantity to produce is large the
proposed pneumatic drill jig fulfills the mass
production requirement in the shop. Clamping can
be done by releasing the pressured air using valves.
57 MESS-57 Pneumatic dual water
pumping system
2014 The aim of the project is pneumatic operated water
pumping system. Radial plunger Pneumatic Water
pumping system are reciprocating pump in which
the piston is provided for the pumping action. The
piston is reciprocated with the help of a pneumatic
cylinder and solenoid valve. There are two cylinders
are used in this project, one for pneumatic cylinder

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

124

and another one for hydraulic cylinder. The output
quantity of the water is varied by the timing control
unit
58 MESS-58 Pneumatic forging
machine
2014 The pneumatic forging machine has gained a large
amount of importance in last few decades. This
importance is due to its accuracy and cost. This
convenience in operating the pneumatic system has
made us to design and fabricate this unit as our
project. This unit, as we hope that it can be
operated easily with semi-skilled operators. The
pneumatic forging has an advantage of working in
low pressure, that is even a pressure of 6 bar is
enough for operating the unit. The pressurized air
passing through the tubes to the cylinder, forces the
piston out whose power through the linkage is
transmitted to the punch. The work piece thus got
is for required dimensions and the piece can be
collected through the land clearance provided in the
die. The die used in this is fixed such that the die of
required shape can be used according to the
requirement. This enables us to use different type
dies resulting in a wide range of products. Different
shapes as requirement can be thus got. According
to the work material the operating pressure can be
varied.
59 MESS-59 Pneumatic multi-
purpose grinder
2014 The aim of our project is to design and fabricate a
pneumatically operated multipurpose grinder.
With this device a number of operations can be
performed. They are as follows Grinding (Soft and
Hard), Drilling, Reaming, Boring, Screw driving.
This device is operated by compressed air. It
consists of the following main parts. Barrel, Shaft,
Frame and supporting column, Chuck and key,
Couplings, etc. A high pressure compressed air is
forced on a fan and the fan is made to rotate. This
rotation is transmitted to the machining head by a
shaft and the required operation is carried out.
Further if a hole is to be drilled in a part in an
automobile, the particular part is to be dismantled
from the vehicle. By using this pneumatically
operated device holes can be drilled in the required
part with one dismantling it from the vehicle. So
this pneumatically operated multipurpose grinder is
used for various operations with a less amount of
investment.
60 MESS-60 Fabrication of multi-
purpose machine
2014 The aim of our project is to design and fabricate an
electrically operated multipurpose (drilling grinding
cutting) device. With this device a number of
operations can be performed. They are as follows
Drilling, Reaming, Boring, Grinding, Screw driving

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

125

61 MESS-61 Pneumatic
reciprocating
grinding machine
2014 The pneumatic reciprocating grinding is a metal
reciprocating grinding machine tool designed to
cut/grind metal by applying pneumatic pressure.
The machine is exclusively intended for mass
production and they represent the fast and more
efficient way to cut a metal. The slow speed
operation is occurs in a grinding operation. This
machine is a multipurpose machine. Hacksaws are
used to cut thin and soft metals. The grinding shaft
is used to grinding operation by replacing the
hacksaw frame. The operation of the unit is
simplified to a few simple operations involving a
cylinder block and piston arrangement. There are
numerous types of cutting machines in Engineering
field, which are used to fulfill the requirements. We
are interested to introduce pneumatic system in
especially in cutting machine and also grinding
operation. The main function of Pneumatic cutting
is to cut thin and soft metals by pneumatic power.
62 MESS-62 Pneumatic switch
board cutter
2014 The Pneumatic Switch board cutter can be moved
anywhere near the job and can be fitted on the job.
This eliminates the risk of carrying the job to the
machine table. This enables the slide to get the
reciprocating motion having a stroke length of
75mm. The cutter (or) blade is welded to the slider
at the bottom edge. In our project, Pneumatic
switch board Cutter is used to cut the different
material for the different application.
63 MESS-63 Portable circular saw
machine
2014 The Machine we designed and fabricated is used for
cutting any shape of object like Circular,
Rectangular, and Polygon. In our project the work
holding vice is a special type of vice such that the
fixed jaw can be adjusted to an that the fixed jaw
can be adjusted to an angle of 0 to 40 and can be
fixed in any manner likely the movable jaw can also
be swiveled 0 to 45 automatically. Hence our project
namely portable circular saw Machine is a Special
type of Machine. According to the type of material
to be cut, the cutting tool can be changed. This
project gives details of Cutting various shapes and
sizes of components. This machine can be widely
applied in almost all type of industries.
64 MESS-64 Power generation
from industrial waste
water
2014 Water turbines convert Mechanical rotary energy
into Electrical energy. A mechanical interface,
consisting of a step-up gear, overhead tank and a
suitable coupling transmits the energy to an
electrical generator. The output of this generator is
connected to the Battery or system grid. The battery
is connected to the inverter. The inverter is used to
convert DC voltages to AC voltages. The load is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

126

drawn current from the inverter. Generator, Mains
haft with Leafs, Gear Wheel Arrangement. Water
power ratings can be divided into three convenient
grouping, small to 1kw, medium to 50 kw and large
200 kw to megawatt frame size.
65 MESS-65 Power saving system
for lathe

2014 In this modern world, the power saving system is
help to us many purposes. Here we are using an
electronic A.C motor speed regulator. This
regulator is used to maintain the set speed of the
motor constant. The speed variation due to over
load, line voltage fluctuations, over voltage, surge
problems etc. Can be controlled and the speed is
maintained constant by using this Power Saving
System In Lathe. This unit can be used up to 1
H.P. A.C. motor.
66 MESS-66 Remote controlled
belt conveyor
2014 In our project Remote Operated Belt Conveyor
beings with an introduction to transmitter and
receiver, its various applications and units, and
briefly explains a few devices capable of producing
air and their relative merits. The conveyor is very
useful for material handling in modern engineering
industries. The motor is used to drive the conveyor.
The materials are transferred from one place to
another place by using conveyor. The transmitter
and receiver circuit is used to control the motor.
This system gives smooth operation and smooth
movement of the belts to the jobs at required time.
67 MESS-67 Road marking
machine
2014 This project Road Marking Machine is used to
mark the divider live of the 2-lane roadways. The
main aim of this project is to save time and to
reduce fatigue of the workers. This works on the
Principle of belt drive mechanism. Here the belt
fitted with a specially designed sponch. The sponch
projects from the surface of the belt. Special
attachments are made to transfer the paint exactly
on the brush surface. The sponch is made as equal
to the length of the divider line. The details of this
project are narrated in forthcoming chapters.
68 MESS-68 Rotary gear pump

2014 In most of the industries available in the country,
the pumps are used for many purposes. For
pumping water, For pumping oil, For pumping air
and For creating gear. Such pumps have to be
lubricated. But in the Gear pump we cant provide
oil holes, because of the difficulty of attaining the
absolute gear. The crisis involved in the above
pumps can be overcome by this project. Because
are used. So, there is no need for providing oil holes
and oil rings. Also, the main criteria are to make it
a self-lubricated pump. This type of Gear pump is
used to produce and maintain GEAR in a system by

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

127

removing matter from the space involved to a
degree dependent upon the type of system. This
type of pump is generally used in printing presses.
69 MESS-69 Design and
fabrication of cyclone
separator using vane
pump
2014 Cyclone separator is a machine for removing dust
particles from an air or liquid stream, without the
use of filters, through vortex separation. Rotational
effects and gravity are used to separate mixtures of
solids and fluids. This machine can also be used to
separate fine droplets of liquid from a gaseous
stream.
70 MESS-70 Rotary kaller

2014 This project work titled Fabrication Of Rotary
Kaller has been conceived having studied the
difficulty in powder the any type of harden masala
powder substance. Our survey in the regard in
several home/hotel, revealed the facts that mostly
some difficulty occurs in powder huge amount of
masala powder. The powdering of huge amount of
masala in hand is taking more time and high
manual force. Now the project has mainly
concentrated on this difficulty, and hence a suitable
device has been designed. Such that the masala
powdering operation can be done without
application of any impact force.
71 MESS-71 Salt water converted
into purified water by
using pedel power

2014 Salt Water Converted Into Purified Water By Using
Pedel Power is a separation process that uses
pressure to force a solvent through a membrane
that retains the solute on one side and allows the
pure solvent to pass to the other side, meaning it
allows the passage of solvent but not of solute. In
reverse osmosis, the idea is to use the membrane to
act like an extremely fine filter to create drinkable
water from salty water. Reverse osmosis (RO) is a
membrane-technology filtration method that
removes many types of large molecules and ions
from solutions by applying pressure to the solution
when it is on one side of a selective membrane. The
result is that the solute is retained on the
pressurized side of the membrane and the pure
solvent is allowed to pass to the other side. To be
"selective," this membrane should not allow large
molecules or ions through the pores (holes), but
should allow smaller components of the solution
(such as the solvent) to pass freely
72 MESS-72 Sand collecting
vehicle
2014 Created by a panel of sand collection system
industry experts, this sand collector guide provides
information on present state of the art technology
used in industrial/home cleaning equipment
commonly known as sand collectors. In addition to
providing general sand collector information, these
professionals are knowledgeable people who work

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

128

in the industrial pollution control industry every
day and clean and green. The machine, dust
collector, we introduce through our project is
mainly useful for collecting sand from home and
playground such as cricket ground, football ground
and wherever sand and dust contents. In our
project, the sand collector consists of two main
parts such as blower unit and storage tank. The
blower is used to suction the sand and small
particles of dust to the ground, so that the sand
contents in the ground was removed. The size of our
project is also portable. So we can move the sand
collector to any place very easily.
73 MESS-73 Sensor based
automatic escalator
movement
2014 In our project Sensor Based Automatic Escalator
Movement beings with an introduction to
automatic escalator, its various applications. The
escalator will operate only the person enters near by
the escalator. The remaining time the escalator will
be in off condition so that the power is saved. The
escalator Automation is very useful for shopping
complex in modern engineering industries. The
motor is used to drive the escalator. This system
gives smooth operation and smooth movement of
the belts.
74 MESS-74 Sheet bending and
bend removing
machine
2014 This report deals with design and fabrications of
pneumatic multipurpose presses, which is used for
fixing bearings of rotors in the shaft, bending and
bend removing with the help of a compressor.
Initially the shaft is held between two fixtures; top
of the bearing is freely located on the step in the
shaft and the other one is placed on the bottom
fixture. As one of the bearing (located on the shaft
step) is compressed, both the bearings are inserted
in the shaft simultaneously as the top fixture moves
down words. Similarly bending and bend removing
process also occurred.
75 MESS-75 Solar cooker 2014 No being can live without food. To cook the food
heat energy is required. Now a day to get heat
energy, liquefied petroleum gas, Kerosene etc. Are
being used as fuel. These fuels are costly. Solar
energy can be used to cook food. Solar energy is
available almost everywhere and very cheap also.
Solar reflector box type solar cooker is used to cook
food efficiently. This type of cooker is very much
useful in rural areas where LPG or kerosene is
hardly available and wood is the fuel. The solar
reflector box type solar cooker is designed and
fabricated in such a way that it can be used for
cooking as well as storing heat energy. This type of
solar cooker can be used every provided sun light is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

129

available. This cooker can be used for a long time
and the cost involved in manufacturing this cooker
is low.
76 MESS-76 Solar emergency
lighting system
2014 Solar energy means all the energy that reaches the
earth from the sun. It provides daylight makes the
earth hot and is the source of energy for plants to
grow. Solar energy is also put to two types of use to
help our lives directly solar heating and solar
electricity. Solar electricity is the technology of
converting sunlight directly in to electricity. It is
based on photo-voltaic or solar modules, which are
very reliable and do not require any fuel or
servicing. Solar electric systems are suitable for
plenty of sun and are ideal when there is no main
electricity. Our objective is to design and develop a
solar electric system normally Solar Emergency
Light. For this project the conversion of the solar
energy is done by the solar panel and the battery
charger is used to charging the battery. The control
mechanism carries the inverter and battery charge
controller. We have discussed the various
applications and further extension also.
77 MESS-77 Solar parabolic
collector
2014 Solar Kettle is used as a principle of solar thermal
heating system. Solar thermal systems convert
sunlight into heat. "Flat-plate" solar thermal
collectors produce heat at relatively low
temperatures (80 to 140F [27 to 60C]), and are
generally used to heat air or a liquid for space and
water heating or drying agricultural products.
Concentrating solar collectors produce higher
temperatures. They can also be applied in the
production or refining of chemicals and fuels or to
produce mechanical or electrical energy. The
following is a discussion of concentrating systems
for space or water heating. Such collectors can also
be used to produce heat for absorption cooling
78 MESS-78 Solar water purifier 2014 The brackish or any sort of water is poured into the
basin and the water is allowed to stay under the sun.
The heat of the sun is trapped and by this the water
gets evaporated and reaches the glass cover. In glass
cover it gets condensed and forms water droplets.
Due to the inclination the droplets join together and
they reach the region where the pure water is to be
collected. From there the water is collected using
the outlet pipe. Efficiencies of 25% are typical.
Daily output as a function of solar irradiation is
greatest in the early evening when the feed water is
still hot but when outside temperatures are falling.
79 MESS-79 Steam power plant 2014 Steam Power Plant is convert Mechanical rotary
energy into Electrical energy. A mechanical
interface, consisting of a boiler, heater and a

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

130

suitable coupling transmits the energy to an
electrical generator. The output of this generator is
connected to the Battery or system grid. The battery
is connected to the inverter. The inverter is used to
convert DC voltages to AC voltages. The load is
drawn current from the inverter. Generator, ains
shaft with Leafs, Amount of Steam (or) Pressure.
The power ratings can be divided into three
convenient grouping, small to 1kw, medium to 50
kw and large 200 kw to megawatt frame size.
80 MESS-80 Universal cutter
(specially for coconut
and areca nut)
2014 In our project has a simple and low cost Universal
Cutter (Specially For Coconut And Areca Nut),
which can help generate employment in rural areas.
Coconut chisels are peeled and collected in a basket.
Coconut is fixed in the coconut holder. The high
speed cutting blade is fixed in the top of the coconut
holder with up and down liver mechanism. The
blade is driven by the single phase A.C motor with
the help of belt drive mechanism.
81 MESS-81 Universal tapping
machine
2014 The aim of our project is to design and fabricate a
pneumatically operated tapping machine is called
universal tapping machine. This device is operated
by compressed air. It consists of the following main
parts. Barrel, Shaft, Bearing, Couplings, etc. A high
pressure compressed air is forced on a fan and the
fan is made to rotate. This rotation is transmitted
to the machining head by a shaft and the required
operation (tapping) is carried out. So this
pneumatically operated cylindrical tapping machine
device is used for various operations with a less
amount of investment.
82 MESS-82 Vehicle ignition using
RFID smart card
2014 This project is RFID Based Ignition System for
Vehicles.
83 MESS-83 Waste oil burning
system
2014 By autonomously navigating the waters surface,
Sea swarm proposes a new system for ocean-
skimming and oil removal. Sea swarm uses a
photovoltaic powered conveyor belt made of a thin
nano wire mesh to propel itself and collect oil. The
nano material, patented at MIT, can absorb up to
20 times its weight in oil. Sea swarm is intended to
work as a fleet, or swarm of vehicles, which
communicate their location through GPS and Wi-Fi
in order to create an organized system for collection
that can work continuously without human support.
Sea swarm works by detecting the edge of a spill
and moving inward until it has removed the oil
from a single site before joining other vehicles that
are still cleaning.


No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

131

ELECTRICAL AND ELECTRONICS
APPENDIX:
PS = Power System
PE = Power Electronics
EM = Electrical Machines

SL.NO CODE TITLE YEAR ABSTRACT
1 PETC-091 A Two-Phase
Interleaved Power
Factor Correction
Boost Converter With
a Variation-Tolerant
Phase Shifting
Technique
2014-
2015
This paper presents a two-phase interleaved
critical conduction mode (CRM) power factor
correction boost converter with a variation-tolerant
phase shifter (VTPS), which ensures accurate 180
phase shift between the two interleaved converters.
A feedback loop similar to a phase-locked loop
controls the amount of the phase shifting of the
VTPS. The proposed VTPS has better immunity of
process, supply, and temperature variations than
the conventional phase shifter. A 320-W two-phase
interleaved CRM boost converter prototype has
been implemented, while the proposed VTPS and
conventional interleaving phase shifter can be
selectively applied to compare the performance of
the proposed technique with the conventional one.
Experimental results show that the two-phase
interleaved CRM boost converter has better
performance with the proposed VTPS. The
proposed VTPS circuit can be applied to any type
of interleaved switching power converter.
2 PETC-092 On/Off Control of
Boost PFC
Converters to
Improve Light-Load
Efficiency in
Paralleled Power
Supply Units for
Servers
2014-
2015
This paper proposes an on/off control of boost
power factor correction (PFC) converters to
improve the light-load efficiency in paralleled power
supply units (PSUs) for servers. The proposed
scheme operates the PFC stages of two paralleled
PSUs alternately during one cycle of a 60-Hz ac
input only at light loads. This improves the light-
load efficiency without deteriorating the heavy-load
efficiency by reducing load-independent losses such
as capacitive turn-on and core losses. In addition,
the proposed scheme alleviates the harmonic
distortion by reducing the discontinuous conduction
mode region. Experimental results from 1.6-kW
PFC boost converters are shown to verify the
proposed work.
3 PETC-093 Analysis and Design
of a New Soft-
Switching Boost
Converter With a
Coupled Inductor
2014-
2015
In this paper, a new topology of a non-isolated boost
converter with zero-voltage-switching (ZVS)
capabilities is proposed. In order to realize ZVS
conditions, the auxiliary circuit only consists of a
coupled inductor and a diode, which operates with a

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

132

zero-current-switching (ZCS) condition. Due to
ZVS, the reverse recovery problem of MOSFET
antiparallel body diodes can be resolved, and the
voltage and current stresses on the switch
components are also reduced. The detailed
operating analysis of the proposed converter and
the design method of the main circuit are presented.
With the aim to verify the effectiveness and
feasibility of the proposed boost converter, a 500 W
experimental prototype is built up, and the related
experimental waveforms and the efficiency curve
are presented
4 PETC-094 A Family of
Multilevel Passive
Clamp Circuits With
Coupled Inductor
Suitable for Single-
Phase Isolated Full-
Bridge Boost PFC
Converter
2014-
2015
A family of multilevel passive clamp circuits is
proposed and investigated in a single-phase isolated
full-bridge boost power factor correction (PFC)
converter, by which the voltage spike across
primary side of the power transformer can be
suppressed effectively, and the absorbed energy can
be transferred to the output side automatically.
These clamp circuits are composed of several
capacitors, diodes and one coupled inductor. With
the help of the coupled inductor, synchronous
resonances of the different resonant circuits can be
achieved, which will avoid the unbalance of the
voltage and current in these circuits. For the N-level
passive clamp circuit, as N increases, the maximum
duty cycle of the PFC converter will increase, the
current stress of the switches will decrease, and the
volume of the coupled inductor will decrease. Take
a three-level clamp circuit for example, the
operational principle of multilevel clamp circuits
are discussed. Furthermore, some related analysis
and comparison are given. Finally, experimental
study has been done on a laboratory-made single-
phase PFC prototype in which a four-level and a
five-level clamp circuits are adopted, respectively.
The feasibility of the proposed method and the
validity of the theoretical analysis are verified by
the experimental results.
5 PETC-095 A Novel Control
Strategy of
Circulating Currents
in Paralleled Single-
Phase Boost
Converters With
Different Power
Sharing for Microgrid
Applications
2014-
2015
In this paper, analysis of circulating currents of
paralleled single-phase boost converter systems is
presented. The dc loop and ac loop circulating
currents are clearly explained. In order to
eliminate the dc loop circulating currents and
reduce switching losses, a simplified pulse width
modulation strategy is adopted in a paralleled
single-phase boost converter. Based on the analysis
of circulating currents, common-mode circulating
current (CMCC) and differential-mode circulating
current (DMCC) are defined. Then, CMCC and
DMCC compensators are proposed in a centralized

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

133

control scheme to reduce the common-mode and
differential-mode circulating currents in a parallel
system operated in both rectifier and inverter
modes with different power sharing for microgrid
applications. Converter-paralleled system stability
analysis is also presented. Finally, a prototype
system is constructed to facilitate the theoretical
results as verification. From the experimental
results, the proposed control scheme can indeed
reduce the circulating currents under equal and/or
different power rating conditions in the parallel
system.
6 PETC-096 A Novel Soft-
Switching Boost
Converter with
Magnetically Coupled
Resonant Snubber
2014-
2015
A novel soft-switching boost converter with
magnetically coupled resonant snubber is
presented in this paper. The passive snubber
circuit, which is composed with two diodes, two
capacitors and one coupled inductor, ensures a
zero current turn-on and zero voltage turn-off
conditions for the power switch, and alleviates
the reverse-recovery problem for the output
diode. Moreover, with proper design of the
snubber circuit, the power switch and output diode
can be softly switched in a wide load range. The
operating principle and performance analysis of
the proposed converter are described in detail.
Experiment from a 400W prototype has been
carried out and the results show that the
proposed converter has the advantages of
simple structure, low complexity control, and the
highest efficiency is more than 95%.
7 PETC-097 Direct Voltage
Control of DC-DC
Boost Converters
Using Enumeration-
Based Model
Predictive Control
2014-
2015
This paper presents a model predictive control
(MPC) approach for dc-dc boost converters. A
discrete-time switched non-linear (hybrid) model of
the converter is derived, which captures both the
continuous and the discontinuous conduction mode.
The controller synthesis is achieved by formulating
an objective function that is to be minimized subject
to the model dynamics. The proposed MPC
strategy, utilized as a voltage mode controller,
achieves regulation of the output voltage to its
reference, without requiring a subsequent current
control loop. Furthermore, a state estimation
scheme is implemented that addresses load
uncertainties and model mismatches. Simulation
and experimental results are provided to
demonstrate the merits of the proposed control
methodology, which include a fast transient
response and a high degree of robustness.
8 PETC-098 A Novel ZVT-ZCT-
PWM Boost
Converter
2014-
2015
In this study, a new boost converter with an active
snubber cell is proposed. The active snubber cell
provides main switch to turn ON with zero-voltage

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

134

transition (ZVT) and to turn OFF with zero-current
transition (ZCT). The proposed converter
incorporating this snubber cell can operate with soft
switching at high frequencies. Also, in this converter
all semiconductor devices operate with soft
switching. There is no additional voltage stress
across the main and auxiliary components. The
converter has a simple structure, minimum number
of components, and ease of control as well. The
operation principle and detailed steady-state
analysis of the novel ZVT-ZCT-PWM boost
converter are given. The presented theoretical
analysis is verified exactly by a prototype of 100
kHz and 1 kW converter. Also, the overall efficiency
of the new converter has reached a value of 97.8%
at nominal output
power.
9 PETC-099 Application of
Interleaved Bridgeless
Boost PFC
Converter without
Current Sensing
2014-
2015
Interleaved bridgeless boost power factor correction
(PFC) converter based on predictive control method
without any current sensing is presented in this
paper. Complicated control
strategies including current sensing are used to
obtain proper
current sharing and current ripple minimization for
interleaved type PFC converters which are more
suitable than the conventional type PFC converters
by virtue of the improving power rating and
reducing input current ripple. The proposed
predictive control method doesnt need to sample
any current signals, only the samplings of the input
voltage and the output voltage are required. The
input current of the converter is computed based on
the input and output voltages according to the
switching operations. The duty cycle for next
switching is predicted by using reference current
signal obtained from the voltage loop compensator,
computed input current and converter parameters.
A prototype of interleaved bridgeless boost PFC
converter controlled by a digital signal processor
(DSP) board was established to show the related
results.
10 EMTC-
011
A Novel Speed
Measurement Method
for a High-Speed
BLDC Motor Based
on the Signals From
the Rotor Position
Sensor
2014-
2015
The paper presents a digital algorithm of a speed
control block for a dc brushless motor and a
method for measuring the motors rotational speed
based on the signals from the rotors position
sensor. The proposed method allows an increase in
the measurement frequency (six measurements per
rotation for two-pole motor or 12 measurements for
a four-pole motor) and the measurement results are
not affected by the misalignment mounting of the
sensor. The paper describes a conceptual structure

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

135

of a series PI controller.
11 EMTC-
012
A PFC-Based BLDC
Motor Drive Using a
Canonical Switching
Cell Converter
2014-
2015
This paper presents a power factor correction
(PFC)-based canonical switching cell (CSC)
converter-fed brushless dc motor (BLDCM) drive
for low-power household applications. The speed of
BLDCM is controlled by varying the dc-bus voltage
of voltage source inverter (VSI). The BLDCM is
electronically commutated for reduced switching
losses in VSI due to low-frequency switching. A
front-end CSC converter operating in discontinuous
inductor current mode (DICM) is used for dc-bus
voltage control with unity power factor at ac mains.
A single sensor for dc-bus voltage sensing is used for
the development of the proposed drive, which
makes it a cost-effective solution. A prototype of the
proposed configuration is developed, and its
performance is validated with test results for the
control of speed over a wide range with a unity
power factor at universal ac mains.
12 EMTC-
013
An Adjustable-Speed
PFC Bridgeless Buck
Boost Converter-Fed
BLDC Motor Drive
2014-
2015
This paper presents a power factor corrected (PFC)
bridgeless (BL) buckboost converter-fed brushless
direct current (BLDC) motor drive as a cost-
effective solution for low-power applications. An
approach of speed control of the BLDC motor by
controlling the dc link voltage of the voltage source
inverter (VSI) is used with a single voltage sensor.
This facilitates the operation of VSI at fundamental
frequency switching by using the electronic
commutation of the BLDC motor which offers
reduced switching losses. A BL configuration of the
buckboost converter is proposed which offers the
elimination of the diode bridge rectifier, thus
reducing the conduction losses associated with it. A
PFC BL buckboost converter is designed to
operate in discontinuous inductor current mode
(DICM) to provide an inherent PFC at ac mains.
The performance of the proposed drive is evaluated
over a wide range of speed control and varying
supply voltages (universal ac mains at 90265 V)
with improved power quality at ac mains. The
obtained power quality indices are within the
acceptable limits of international power quality
standards such as the IEC 61000-3-2. The
performance of the proposed drive is simulated in
MATLAB/Simulink environment, and the obtained
results are validated experimentally on a developed
prototype of the drive
13 EMTC-
014
Design of A High-
Efficiency Minimum-
Torque Ripple
12V/1kW 3-Phase
2014-
2015
A 12V motor drive system using the on-board
battery is promising in vehicle applications, e.g. To
rotate an air pump to adjust its air delivery to the
burner thereby providing autonomous exhaust

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

136

BLDC Motor Drive
System for Diesel
Engine Emissions
Reductions
temperature control for the conventional diesel
engine vehicle. The 12V/1kW motor drive system
proposed in this paper consists of a series-
resonant LLC MOSFET full bridge converter,
which provides the high-efficiency power transfer
through implementing Zero Voltage Switching
an boosts the DC-bus to ~300V, and an IGBT
inverter which provides the high-side phase
currents to a 1kW/6000rpm brushless DC motor.
This design secures the high efficiency, low cost and
low volume. Meanwhile, with the variable
output voltage of this DC/DC converter, this
paper realizes a commutation torque-ripple
reduction method, which will minimize the
mechanical vibration. Experimental results on this
prototype system demonstrate 1) the LLC DC/DC
part efficiency is 97.6% with 92% of the inverter
efficiency and 2) the motor commutation torque
ripple is reduced close to zero.
14 EMTC-
015
DTC of B4-Inverter-
Fed BLDC Motor
Drives With Reduced
Torque Ripple During
Sector-to-Sector
Commutations
2014-
2015
The paper deals with the direct torque control
(DTC) of brushless DC (BLDC) motor drives fed by
four-switch inverters (also known as B4-inverters)
rather than six-switch inverters (also known as B6-
inverters) in conventional drives. The B4-inverter
could be regarded as a reconfigured topology of the
B6-inverter in case of a switch/leg failure which
represents a crucial reliability benefit for many
applications especially in electric and hybrid
propulsion systems. The principle of operation of
the BLDC motor is firstly recalled considering both
cases of B6- and B4-inverters in the armature, with
emphasis on the two- and three-phase conduction
modes. Then, the DTC of B4-inverter-fed BLDC
motor drives is treated considering three strategies,
such as: 1) DTC-1: a strategy inspired from the one
intended to B6-inverter-fed BLDC motor drives; 2)
DTC-2: a strategy that considers a dedicated vector
selection subtable in order to independently control
the torques developed by the phases connected to
the B4-inverter legs during their simultaneous
conduction; and 3) DTC-3: a proposed strategy that
eliminates the torque dips penalizing DTC-2 during
sector-to sector commutations. Following the design
of the corresponding vector selection tables and
subtables (if any), an experimentally based
comparative study of the three DTC strategies is
carried out considering, in the first step, the BLDC
motor steady-state operation under DTC-1 and
DTC-3. Then, the comparison is extended to the
BLDC motor features during sector-to-sector
commutations, under DTC-2 and DTC-3. The

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

137

experimental results clearly validate the predicted
performance of the proposed DTC strategy.
15 EMTC-
016
PFC Cuk Converter
Fed BLDC Motor
Drive
2013-
2014
This paper deals with a power factor correction
(PFC) based Cuk converter fed brushless DC motor
(BLDC) drive as a cost effective solution for low
power applications. The speed of the BLDC motor
is controlled by varying the DC bus voltage of
voltage source inverter (VSI) which uses a low
frequency switching of VSI (electronic commutation
of BLDC motor) for low switching losses. A diode
bridge rectifier (DBR) followed by a Cuk converter
working in discontinuous conduction mode (DCM)
is used for control of DC link voltage with unity
power factor at AC mains. Performance of the PFC
Cuk converter is evaluated in four different
operating conditions of discontinuous and
continuous conduction mode (CCM) and a
comparison is made to select a best suited mode of
operation. The performance of the proposed system
is simulated in MATLAB/Simulink environment
and a hardware prototype of proposed drive is
developed to validate its performance over a wide
range of speed with unity power factor at AC mains.
16 EMTC-
017
Sensorless Control of
BLDC Motor Drive
for an Automotive
Fuel Pump Using a
Hysteresis
Comparator
2014-
2015
This paper develops the brushless dc (BLDC) motor
sensorless control system for an automotive fuel
pump. The sensorless techniques that are based on a
hysteresis comparator and a potential start-up
method with a high starting torque are suggested.
The hysteresis comparator is used to compensate
for the phase delay of the back EMFs due to a low-
pass filter (LPF) and also prevent multiple output
transitions from noise or ripple in the terminal
voltages. The rotor position is aligned at standstill
for maximum starting torque without an additional
sensor and any information of motor parameters.
Also, the stator current can be easily adjusted by
modulating the pulse width of the switching devices
during alignment. Some experiments are
implemented on a single chip DSP controller to
demonstrate the feasibility of the suggested
sensorless and start-up techniques.
17 SMIPE02 A High Efficiency
Single-Phase
Transformerless
PVInverter Topology
with Reduced
Leakage Current
2013 Driven by worldwide demand for renewable
sources, there is a strong trend in photovoltaic
scenario to use Transformerless inverter topologies
to obtain higher efficiencies and lower ground
leakage current. This paper presents a new topology
based on H-bridge with ac decoupling scheme
consisting of diode bridge and a switch with
clamping to the DC midpoint. The PV panel is
modeled to obtain a voltage of 350V. Also the
topology is simulated and compared with two other

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

138

existing topologies. High efficiency and low leakage
current are observed.
18 SMIPE04 Design and Analysis
of High Efficiency
Soft Switched
Interleaved Flyback
Converter
2013 In this paper, a novel zero voltage switched
interleaved fly back converter is proposed for the
low power electrical applications that require
electrical isolation. The proposed converter adopts
the interleaved operation and soft switching
technique to reduce the input current ripple, output
voltage ripple, the switching losses and reverse
recovery losses of diodes resulting in high efficiency.
In this paper, the operation and design equations
are explained for proposed converter and its
performance characteristics are compared with that
of conventional hard switched interleaved flyback
converter using MATLAB/SIMULINK. It has been
demonstrated from the simulation results that the
efficiency of the proposed 500W converter is
improved by 2.8%.
19 SMIPE05 Design and
Performance Analysis
of Different Current
Control Strategies of
Voltage Source
Inverter
2013 This paper presents different current control
techniques described in literature for three phase
voltage source inverters, which can be classified into
two main categories; Linear control, Non-linear
control. Limitations of linear controllers have been
discussed and design methodology for implementing
the non-linear controllers such as Hysteresis
control, Sliding mode control, Ramp comparison
control for three phase voltage source inverter
feeding RLE load have been presented with an
example. The different current control techniques
have been simulated using Matlab Simulink. The
simulation results along with the comparative
analysis on the performance of different control
techniques have also been presented.
20 SMIPE06 Design and
Simulation of Open
and Closed
Loopcontrol for
Transformerless DC
DC Buck-
BoostConverter Using
Switched-Capacitor
Structure
2013 In this Paper, the method of achieving steep step up
and Step down voltage is implemented with the help
switched capacitor structures. When the active
switch of the converter is on, the capacitors in the
C-switching blocks are discharged in parallel. When
the active switch is off, the capacitors in the C-
switching blocks are charged in series. The
proposed converters contain the same rating of
elements as the quadratic converters. The
superiority of the new converters is mainly based on
less energy in the magnetic field, leading to saving in
the size and cost of the inductors, and less current
Stresses in the switching elements, leading to
smaller conduction losses.
21 SMIPE09 Pulse Width
Modulation based
Sliding
ModeController for
2013 This paper proposes a sliding mode controller for
Pulse Width Modulation (PWM) based boost
converter. The boost converter is modeled dynamic
equations describing the converter are derived and

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

139

Boost Converter sliding mode controller is designed. The
performance of the controller is compared with
conventional PID controller. Given a system with
large variations of input voltage and load it is
necessary to guarantee good performance of the
system. Simulation results prove the robustness of
converter with sliding mode controller when tested
against step load changes and input voltage
variations comparable to standard control
techniques
22 SMIPE13 Harmonics and
Torque Ripple
Reduction of
Brushless DC Motor
(BLDCM)
using Cascaded H-
Bridge Multilevel
Inverter
2013 Brushless DC motors are widely used in variable
speed drive application. The torque produced by the
Brushless DC (BLDC) motors with trapezoidal back
Electromotive force (BEMF) is constant under ideal
condition. However in practice the torque ripple
appears on the delivered output torque. Smoothness
of variable speed drive operation is critical due to
this torque ripple. The brushless DC motors uses
power electronic switches for the commutation
purpose, it creates the Harmonics in armature
current. This paper proposes Cascaded H-Bridge
Multilevel Inverter with current controller used to
reduce the torque ripple and the harmonics. This
has been simulated with the help of PSIM
simulation software and the amount of torque
ripple and total harmonic distortion (THD) are
calculated.
23 SMIPE14 Experimental
verification and
implementation of an
isolated ZVT
boost converter for
high step-up electric
traction
2013 Lofty power and elevated step-up isolated dcdc
converters have been widely employed in the
emerald power systems and especially for electric
traction drives. In electronics engineering, a DC to
DC converter is a circuit, which converts a source of
direct current from one voltage to another. It is a
class of power converter. In many DC-DC
applications, output isolation may need to be
implemented depending on the type of application
to meet safety standards to provide impedance
matching. This galvanic isolation is required to
attain a flexible system reconfiguration. Active lamp
boost converter with coupled-inductors is proposed
for high step-up electric traction applications. The
primary-parallel-secondary-series structure is
employed in this project to knob the huge input
current, maintain the high output voltage and
enlarge the voltage gain. Purpose of the coupled-
inductors is to reduce the voltage gain addition and
lesser concern in switching. Clamp circuit is used to
re circulate the energy. The voltage strain in
rectifier is minimized and reverse-recovery problem
is eliminated. The hardware unit utilizes embedded
technology using PIC microcontroller16F84A to

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

140

give gate pulses to the MOSFET converter switches.
In this proposed converter only three MOSFETs
are used which reduces the number of devices and
makes circuit simple in construction. Efficiency,
size, and cost are the primary advantages of the
proposed isolated ZVT boost converter when
compared to other existing converters. Isolated
ZVT boost converter employing series -parallel
arrangement will have an efficiency of about 88-
94%, whereas existing converters are usually 80 to
5% efficient. In the present work, a novel ZVT
boost converter for electric traction drive
application is developed has been designed in
MATLAB/SIMULINK software packages. The
simulation result for a 40-V-to-600-V converter is
simulated in open circuit and closed loop system.
Simulated disturbance is applied at a time period of
0.7 micro second and noted that the output voltage
is maintained constant always. The hardware unit
and experimental results of a 15V to 85-V ZVT
converter is implemented and the results are
verified.
24 SMIPE15 Development of Fly
back Converter for
Hybrid
Electric Vehicles
2013 Hybrid electric vehicle is a cutting edge technology
owing to that the fact that it mitigates air pollution
and increases the fuel efficiency of vehicle which is
the rising demands of the time. Flyback converter
plays vital role in hybrid electric vehicles as it
boosts the dc link voltage. In the proposed work
simulation of flyback converter using power
MOSFETs has been done in the SIMULINK tool of
MATLAB and voltage and current waveforms are
plotted .The result of simulation matches the
theoretical concept which led to development of
hardware of flyback converter in the power
electronics lab.
25 SMIPE29 Harmonic
Minimization of a
Solar fed Cascaded H-
Bridge Inverter using
Artificial Neural
Network
2013 The major concern in the design of inverters is
dealing with harmonics. Harmonics in inverter are
generated due to improper selection of switching
angles to the gates of the inverter switches. The
presence of harmonics in inverter output will affect
the loads connected to it. This paper deals with the
selective harmonic elimination problem in
multilevel inverter using Artificial Neural Networks
(ANN) to generate the switching angles for an
eleven-level full-bridge cascaded H bridge
multilevel inverter powered by five varying DC
input sources (solar panels). The Harmonic
equations are solved and angles are obtained such
that the fundamental was kept constant and the
low-order harmonics were minimized or eliminated.
The different data sets of angle values for various

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

141

input DC voltage conditions are obtained. The data
sets thus collected are used to train the multi-
layered feed forward neural network. The trained
network is then tested for its performance. The
network model is integrated with cascaded H bridge
multilevel inverter to generate the switching angles
in real-time.
26 SMIPE40 Performance
Enhancement Method
for PWM VSI
Drivers in Low
Frequencies
2013 A dead time is essential for an inverter to prevent
short circuit condition in a leg. However, when it is
included the output voltage volt-seconds are lost or
gained depending on the output current direction.
Due to this, there is a deviation of expected voltage.
Inverter consists of IGBTs where each has IGBT
saturation voltage and diode threshold voltage. At
low voltage, dead time distortion and device voltage
drop cause torque pulsation. In this paper a simple
but an accurate dead time distortion compensation
method is used. Also a voltage boost is proposed for
device voltage drop. Using these compensation
methods, torque pulsation is reduced.
27 SMIPE45 Effect of Voltage Sag
on Ageing of Front
End
Rectifier Diodes of
ASD
2013 Adjustable-speed drives are the type of equipment
most sensitive to voltage sags. This paper analyzes
the behavior of front end rectifier of three-phase ac
adjustable-speed drives during balanced and
unbalanced sags. Emphasis is placed on the i2t
rating of diode assuming that the drive will not trip.
By using a previously introduced classification of
three-phase balanced and unbalanced sags, i2t
curves for various capacitor values and different
sag conditions are obtained for AC adjustable-speed
drive. The conclusion from the analysis is that
voltage sags due to three-phase faults are a serious
problem for adjustable-speed drives. However,
single-phase and phase-to-phase faults, causing the
majority of voltage sags, can be tolerated up to 80%
of voltage sag for type C & F sag. While higher
value capacitor is selected for enhancing voltage sag
ride through, at the same time the bridge rectifier
diode I2t value should also be selected such that it
should not cross the diode I2t limit during sag and
sag recovery duration.
28 SMIPE52 Operation Modes
Analysis and
Limitation for Diode-
assisted Buck-boost
Voltage Source
Inverter with Small
Voltage Vector
2013 Diode-assisted buck-boost voltage source inverter
(VSI) boosts the dc source voltage by introducing a
diode-assisted capacitor network. The new topology
extends voltage regulation range and avoids
extreme duty ratio of switching devices in front
boost circuit. As for the unique structure, various
pulse-width modulation (PWM) strategies are
provided to obtain the maximum linear voltage gain
with regard to the chopped intermediate dc-link
voltage of the inverter bridge in one switching time

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

142

period. However, when the inverter supplies
inductive or capacitive load with small load power
factor, the uni-directional current flow of diode may
limit the application of the converter utilizing small
voltage vectors for ac output voltage extension. This
new operation condition is not expected and has not
been discussed before. This paper makes a detailed
circuit analysis of the relationship between the
undesired operation condition and load power
factor. All the theoretical findings are finally
verified by simulations and experiments.
29 SMIPE55 PWM Control of a
Dual Inverter Drive
Using an
Open-Ended Winding
Induction Motor
2013 A dual pwm inverter drive operating an open-
winding induction motor can be an attractive
motor-drive system when operated from a dc
battery source. Operating one of the inverters using
a floating dc-link capacitor provides two main
functions: reactive voltage support for the main
bridge connected to the dc battery voltage source;
voltage boosting to increase the motor terminal
voltage. The latter feature eliminates the
requirement to use a separate dc-dc converter to
provide a voltage boost. The resultant drive system
can provide several benefits such as: lowering the
average battery current by operating the main
bridge at unity power factor; improving the motor
torque and efficiency over a wide operating speed
range; compensation for battery voltage
fluctuations; lowering the motor harmonic losses;
elimination of common-mode circulating currents.
This paper describes a pwm control scheme for the
two inverters to regulate the floating bridge
capacitor voltage over the entire dynamic speed
range of the motor, whilst also providing the desired
motor demand voltage. Experimental results are
used to verify both the operation of the motor-drive
system and the regulation of the floating capacitor
voltage. Experimental results using an induction
motor load confirm the practical feasibility of the
motor-drive system.
30 SMIPE58 Dual-output Four-leg
Inverter
2013 A novel dual-output four-leg inverter topology is
proposed in this paper. The proposed inverter
which is able to provide two three-phase voltage sets
of independent magnitudes and frequencies is
operationally equivalent to two four-leg inverters
working independently though with a reduced
number of semiconductor switches and hence gate
drive and control circuits. The structure of the new
topology is developed and the carrier based PWM
scheme is elaborated for its two subsequently
defined different frequency and equal frequency
operation modes. The proposed converter is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

143

compared with conventional topology in terms of
characteristics of output waveforms, rating of
devices and power loss. A prototype of the system is
built and tested. The simulation and experimental
results confirmed the validity of operation of the
proposed topology
31 SMIPE61 A Step-Up/Down
Three-Phase
Resonant High-
Frequency AC-Link
Inverter
2013 Parallel resonant high-frequency ac-link inverters
with soft switching characteristics, step-up and step-
down abilities, and bidirectional power flow are
introduced in this paper. The converters links are
composed of parallel ac inductors and small ac
capacitors, which are working at high frequencies.
The link inductor is the main component for
transferring the power from the input to the output
or vice versa, and the link capacitor provides partial
resonance to achieve zero voltage switching. The
total number of switches of the basic unidirectional
topology is as low as seven, suitable for low power
applications. By adding three more switches, the
converter can transfer power in both directions. A
small single-phase high-frequency transformer can
be employed in the converters link to provide
galvanic isolation. The basic operation of the new
converters includes six modes and is described in
detail. The analysis and optimal design of the
proposed topologies are carried out as well.
Simulation and experimental results are given to
demonstrate the effectiveness of the proposed power
converters.
32 SMIPE66 Novel Scheme for
Zero Voltage
Switching of Single
Stage Photovoltaic
Micro-inverter
2013 A novel Zero Voltage Switching (ZVS) approach to
improve the efficiency of a single-stage grid
connected flyback inverter is proposed in this
paper. The proposed scheme eliminates the need for
any additional auxiliary circuits to achieve soft-
switching. ZVS of the primary switch is realized by
allowing negative current from the grid-side
through bidirectional switches placed on the
secondary side of the transformer. The negative
current discharges the MOSFETs output capacitor
thereby allowing ZVS turn-on of the primary
switch. Therefore, the switching losses of the bi-
directional switches are negligible. In order to
optimize the amount of reactive current required to
achieve ZVS, a variable frequency control scheme is
implemented over the line cycle. A 250W prototype
was implemented to validate the proposed scheme.
Experimental results confirm the feasibility and
superior performance of the converter compared to
the conventional flyback inverter
33 SMIPE70 Hybrid Transformer
ZVS/ZCS DC-DC
2013 This paper presents a high boost ratio dc-dc
converter with hybrid transformer for non-isolated

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

144

Converter for
Photovoltaic
Microinverters
photovoltaic (PV) Microinverters. The proposed
converter incorporates the resonant operation mode
into the traditional high boost ratio active-clamp
coupled-inductor PWM converter, achieving ZVS
turn-on of the switches and ZCS turn-off of the
diodes. As a result of the inductive and capacitive
energy being transferred simultaneously within
both turn-on and turn-off intervals of the main
switch, the dc bias of the magnetizing current is
reduced and hence the size of magnetics can be
reduced. The magnetizing inductance is designed
with a small value to utilize ripple magnetizing
current to assist ZVS of main switch, while
maintaining low RMS conduction losses. The
voltage stresses on the active switches and diodes
are maintained at a low level and are independent
of the wide changing input PV voltages as a result of
the resonant capacitor in series in the energy
transfer loop. The experimental results based on
250 W prototype circuit show system CEC
efficiencies greater than 96.7% over 20 V to 45 V
PV voltage range
34 SMIPE75 A Novel Three-Level
DC-DC Converter
with
Load Adaptive ZVS
Auxiliary Circuit
2013 Multi-level converters are widely used to convert
high voltage DC (typically above 500V) to an
isolated DC output voltage that may vary from 12V
to 300V, depending on the application. Typical
applications can range from network server power
supplies to battery chargers for purely electric
vehicles. Almost all these industrial applications
require the converter to operate from no load to full
load. Zero-voltage switching is necessary for the
efficient operation of the converter as it ensures
reduced EMI, reduced switching losses and the
proper operation of the switching devices. Most
conventional ZVS techniques for multi-level
converters fail to achieve ZVS typically below 50%
of full load, while some ZVS techniques are able to
do so, but they increase the design complexity of the
overall system. Moreover such techniques may
suffer from increased circulating current loess at
certain load ranges (typically at high loads) thus
offsetting the gain in efficiency achieved through
ZVS. In this paper a simple yet novel ZVS auxiliary
circuit that achieves ZVS even at no load, can
optimize the circulating auxiliary circuit current
necessary for ZVS as a function of load, thus
maximize the efficiency of the converter for all load
conditions, is proposed, analyzed and validated by
experimental results.
35 SMIPE78 A High Efficiency
Hybrid Resonant
2013 This paper presents a high-efficiency zero-voltage-
switching (ZVS) dc-dc converter combing resonant

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

145

PWM Zero-Voltage-
Switching Full-Bridge
DC-DC Converter for
Electric Vehicle
Battery Chargers
and pulse-width-modulation (PWM) power
conversions for electric vehicle battery chargers. A
half-bridge LLC circuit, which operates at series
resonant frequency, shares the lagging-leg with a
phase-shift-full-bridge (PSFB) dc-dc circuit to
guarantee ZVS of the lagging-leg switches of the full
bridge from zero to full load. A secondary-side
hybrid-switching circuit, which is formed by the
leakage inductance, output inductor of the PSFB dc-
dc circuit, a small additional resonant capacitor and
two additional diodes, is incorporated at the
secondary side of the PSFB dc-dc circuit. With the
hybrid-switching circuit providing a clamp path,
the voltage overshoots that arise during the turn-off
of the rectifier diodes are eliminated and the voltage
stress of bridge rectifier is clamped to the minimal
achievable value, which is equal to secondary-
reflected input voltage of the transformer. The sum
of the output voltage of LLC resonant circuit and
the resonant capacitor voltage of the hybrid-
switching circuit is applied between the bridge
rectifier and the output inductor of the PSFB dc-dc
circuit during the freewheeling phases. As a result,
the primary-side circulating current of the PSFB
dc-dc circuit is instantly reset to zero achieving
minimized circulating losses. The experimental
results based on a 4 kW prototype circuit show
98.6% peak efficiency and high efficiency over wide
load and output voltage ranges.
36 SMIPE80 Tuning of a Digital
Proportional-Integral
Compensator for DC-
DC Power Converter
2013 This paper presents a scheme to manually tune a
digital Proportional-Integral (PI) controller
(TunePI scheme) to achieve optimized dynamic
performance of a DC-DC power converter. Based
on a previously proposed compensated-error-signal-
based auto-tuning of compensator gain to achieve
optimized gain for a given set of other compensator
parameters, i.e. zero(s) and pole(s), the paper
presents a new scheme that will tune the complete
set of a PI compensator parameters to result in a
design with an optimum set of parameters for
improved dynamic performance. This paper focuses
on discussing the TunePI scheme and presenting
theoretical and experimental results that employ the
TunePI scheme to manually tune a digital PI
compensator. This will be used as the base for a
future work to develop a controller that is able to
auto-tune the PI compensator during the power
converter operation (online auto-tuning).
37 SMIPE83 A Multi-Variable
Control Technique
for ZVS Phase-Shift
2013 In this paper a multivariable control system is
proposed for an efficient ZVS full-bridge dc-dc
converter used in a Plug-in Hybrid Electric Vehicle

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

146

Full-Bridge DC/DC
Converter
(PHEV). This converter processes the power
between the high voltage traction battery and low
voltage (12V) battery. Generally, Phase-shift
between the two legs of the full-bridge converter is
the main control parameter to regulate the output
power. However, the zero voltage switching cannot
be guaranteed by merely controlling the phase-shift
particularly for light load conditions. In order to
extend the soft switching operation of the converter
for light loads, asymmetrical passive auxiliary
circuits are used to provide reactive current.
However, the auxiliary circuits increase extra
current burden on the power MOSFETs, leading to
lower efficiency. In this paper, the duty cycle of
bridge legs (as another control parameter) is also
controlled to minimize the conduction losses of the
converter. Basically, the multivariable controller
has to adjust the control parameters in such a way
that the circulating currents are kept at their
minimum level for soft switching while the output
power is regulated. The system operating principle,
soft switching and mathematical model are
discussed. Experimental results are also presented
that validate the effectiveness of the control method
for a 2KW prototype.
38 SMIPE84 A New Decoupled
Control Scheme for a
ZVS Dual Full-Bridge
Phase-Shifted DC/DC
Converter with Two
Degrees of Freedom
2013 This paper presents a novel control scheme for a
two-bridge parallel-series DC/DC converter
topology which enables it to regulate the DC-link
voltage while tracking the maximum power point
(MPP) of a photo-voltaic (PV) array. The intended
application for this converter is power conditioning
systems (PCS) of PV arrays used in hybrid
renewable energy system architectures. The unique
aspect of the proposed control scheme is that it
decouples the input-side control variable from the
output-side control variable providing two
independent degrees of freedom to the converter.
This renders the controllers design simpler and
provides a more robust power conditioning system.
The proposed converter is also able to achieve soft-
switching over a wide range. A 2kW experimental
prototype has been provided to validate the
feasibility and performance of the converter.
Theoretical analysis and experimental results prove
that the converter is able to regulate the DC-link
voltage and track the maximum power extracted
from the PV array simultaneously.
39 SMIPE85 Interleaved
Continuous
Conduction Mode
Power Factor
2013 This paper proposes a new modulated carrier
control for an interleaved continuous conduction
mode (CCM) power factor correction (PFC) boost
converter. The proposed method allows precise

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

147

Correction Boost
Converter with
Improved Modulated
Carrier Control
Method
sinusoidal input current shaping for a PFC boost
converter operating in CCM. This is accomplished
by simply comparing the modulated carrier signal
with the switch current sensing signal such that the
inner loop current regulator and rectified line
voltage sensing are not required. The proposed
control method greatly simplifies current sensing
and control circuitry of the parallel connected
converters. The proposed control technique also
enables simple current balancing between two
converters by employing modulated carrier signals
with the same amplitude for both converters. The
detailed circuit operation and design consideration
are discussed. The performance of the proposed
control method is experimentally verified by a 600-
W PFC converter.
40 SMIPE91 Analysis of Delay
effects in Single-loop
Controlled Grid-
connected Inverter
with LCL Filter
2013 Delay in a grid current single-loop controlled
inverter with LCL filter has a great influence on the
system stability. The unstable problem of grid-
connected inverters with LCL filter is clearly
explained from positive feedback concept, and the
positive role of delay in system stable control is
explored in this paper. Then the range of delay time
is calculated to guarantee the system stable. The
effects of delay on dynamic and steady state
performance of system are also revealed. An
optimized delay time is designed to realize stable
operation, fast dynamic response and low
harmonics of resonance frequency based on the
theoretical analysis. Experimental results validate
the theoretical analysis about the effects of delay.
41 SMIPE96 Modulation
Technique to Reduce
Leakage Current in
Transformerless
Photovoltaic Systems
using a Three-Level
Inverter
2013 Transformerless photovoltaic (PV) systems are used
because they have many advantages (weight, size,
efficiency, etc.). However, transformerless PV
systems suffer from leakage current. The present
paper proposes a modulation technique to reduce
the leakage current in transformerless PV systems
using a three-level inverter. The cause of the
leakage current is analyzed. The proposed
technique uses large vectors, medium vectors, and
only one zero vector, and switching occurs once in a
switching period. The effectiveness of the proposed
technique is verified by comparing its results with
those of the space vector pulse width modulation
(SVM) method. The results are obtained through
simulation.
42 SMIPE100 Current Distortion
Correction in Dual
Buck
Photovoltaic Inverter
with a Novel PWM
2013 The trend for photovoltaic (PV) inverter is toward
low cost, high efficiency, high reliability, low ground
leakage current, and low-output ac-current
distortion. This paper would introduce high
efficiency and low cost dual buck PV inverter,

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

148

Modulation
and Control Method
which has no reverse recovery problem for
MOSFET and is very suitable for Super-junction
power MOSFETs application. However, due to the
duty cycle would be 50% at zero-crossing, current
would have a significant distortion when it adopts
bipolar PWM for PV application. This paper would
propose a novel modulation method for bipolar
PWM, which provides 0% duty cycle at zero-
crossing. With this modulation method, the current
zero-crossing distortion would be eliminated, but
the total current would have distortion due to
nonlinear modulation. In the last part, combined
with proposed PWM modulation method, a
repetitive current controller is introduced to
eliminate the distortion from nonlinear modulation.
All the experiment results in standalone (380Vdc,
208Vac) verified the analysis and proposed method
for current distortion correction in dual buck PV
inverter.
43 SMIPE101 Accurate Design of
High-Performance
Synchronous
Buck DC-DC Power
Converters
2013 Accurate power loss calculations are presented for a
synchronous buck DC-DC power converter based
on simple physics-based circuit models for the
switch and inductor. The converter design is shown
to be optimized for different die sizes of the high-
side and low-side power switches; this design
feature becomes important at increased switching
frequencies. It is further shown that conventional
power loss formulations are in error as they do not
accurately calculate the switching power losses. A
new figure-of-merit (FOM) is proposed to assess the
performance of emerging high-performance power
semiconductor switch technologies, especially for
low-voltage point-of-load (POL) DC-DC power
converters that utilize scaled silicon power
MOSFETs and emerging Gallium Nitride (GaN)
power transistors.
44 SMIPE102 A Novel Flying-
Capacitor Dual Buck
Three-Level Inverter
2013 A novel flying-capacitor dual buck three-level
inverter (FCDBTLI) was presented in this paper. It
was a kind of flying-capacitor inverter, which was
based on the main circuit of dual buck inverter. The
topology cherished the merits of dual buck inverter,
such as no shoot-through problem, no body diode
reverse-recovery problem. The switches array of the
inverter is flexible which realizes voltage balancing
of the flying capacitors through logical controlling.
The validity of the proposed inverter is verified by
computer-aided simulation and experimental result.
45 SMIPE103 A ZVS Parallel-Series
Dual-Bridge Phase-
Shift DC/DC
Converter with Two
2013 This paper presents a new two-bridge parallel-series
DC/DC converter topology which can operate with
ZVS over a wide input and load range. This
intended application for this converter is power

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

150

significantly high voltage gain compared to the
traditional PWM techniques. Detailed analysis of
output voltage gain, individual harmonies
contributions and THD for various modulation
indices is simulated and the results are presented
48 SMIPE110 Design and Analysis
01 a New Resonant
Step up/down DC-DC
Converter
2013 To achieve soft switching technique, converters
such as boost, SEPIC and Zeta converters
employ more auxiliary elements which leads to
increase in size and cost. In order to overcome
this problem, this paper presents design and
analysis of a new resonant step up/down dc to dc
converter where all the auxiliary elements
operate under soft switching condition. The
coupling capacitor in the proposed circuit is a
resonant capacitor and its capacity becomes
much less which tends to decrease in the cost. The
current stress is also less which makes the
proposed converter to be used in high current
applications.
49 SMIPE116 Constant Output
Under Transient
Condition in Wind
Turbine using Novel
Boost Converter
2013 -The performance of the wind turbine is greatly
depends on the force of the wind. As for as,
Indian environmental condition concern constant
flow of the wind is an unexpected one. During
the soft start of the wind turbine a fluctuation
occurred and due to the change in the flow of
the wind the revolution speed is changed. At the
same time the output voltage is directly
proportional to the speed of the DC generator
connected with the wind turbine. Due to the
fluctuation in the flow of air the output voltage
is greatly disturbed, so that it is important to
boost up the voltage and get constant output.
DC to DC boost converters are particularly
useful in stepping up the voltage from a battery
or DC generator to match the operating voltage
range of inverter or constant Volta get loads.
Even though lot of converters are introduced,
the novel and advanced converter using the
snubbed capacitor is used in this proposed
converter, it has more advantage and making
the switching of the switches soft and boosting
the voltage higher than the conventional boost
converter in the same frequency and in same
duty cycle. Here how the output is being
constant in the variable voltage condition of the
wind turbine by the boost converter and
parameters used are investigated. Moreover, the
various mode of operation of the boost
converter during the transient period is
discussed. The simulation model is generated and
outputs are obtained by using Matlab Simulink.

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

151

50 SMIPE118 Performance
Evaluation of a
Magnetically Coupled
DC -DC Converter
for Photovoltaic
Energy Systems
2013 Renewable energy resources are an increasingly
Important part of power generation in the recent
years. Solar Energy is one of the most
environment friendly power sources available in
the world. All the energy stored in Earth's
reserves in the form of Coal, Oil and Natural gas
is equal to the energy in just 20 days of
sunshine. Hence, Solar Energy can be
considered as one of the most sustainable of the
renewable energies. In this paper PV array (4X4
PV modules) is to be developed in the Matlab-
Simulink environment to study the performance
of modular (1-V & P-V) characteristics under
various working conditions and to design and
analyze the proposed Magnetically Coupled DC-
DC Converter. Due to the presence of
magnetically coupled inductor, higher voltage gain
is achieved when compared with the conventional
converters and it can be used for high power
applications. The proposed Magnetically Coupled
Boost converter and PV system are to be
designed, modeled, analyzed and simulated using
Matlab-Simulink software package.
51 SMIPE127 Modeling and
Simulation 01 Closed
Loop Controlled
Interleaved Boost
Converter System
2013 This paper deals with design calculations and
simulation studies of interleaved boost converter
cascaded with photovoltaic inverter for residential
applications. Interleaved boost converter is mainly
used for non-conventional energy soires. IBC has
two boost converters connected in parallel to reduce
the ripple. Low voltage is boosted to higher level
using IBC. The open loop and closed loop systems
are modeled and simulated. The output waveforms
are presented.
52 SMIPE131 Soft Switched Boost
Converter for a
Battery Operated
Electric Vehicle
2013 Electric vehicles are considered less practical
because, huge batteries are required to provide
the power for acceleration. High voltage can be
obtained with the help of DC-DC boosters. A soft
switched DC-DC converter with high efficiency
is proposed in this paper. A theoretical analysis
of a soft switched boost converter is carried out
and its operating principles are presented and
the same is verified through simulation results
53 SMIPE133 Implementation 01
Shunt Active Power
Filter for
Dynamically
Distorted Load
Conditions Using
Goertzel Algorithm
2013 In this paper the shunt active power filter
(SAPF) under varying harmonie conditions is
considered. The control technique used for
reference current generation consists of Goertzel
algorithm. The Goertzel Algorithm calculates the
fundamental component of load current under
non sinusoidal conditions with high speed and
accuracy of response. The variation in harmonies
is realized by changing the firing angle of

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

152

Thyristor Controlled Reactor (TCR). The SAPF
can be used for both single phase and 3 phase
loads and can directly be connected to utility.
The shunt active power filter controlled by
Goertzel Algorithm is realized using
MATLAB/Simulink. The simulation results meet
the IEEE 519- 1992 recommended harmonie
standard limits with minimum computations.
54 SMIPE134 A Novel Technique
For Implementation
01 Shunt Active
Power Filter Under
Balanced And
Unbalanced Load
Conditions
2013 in this paper Enhanced Phase Locked Loop
(EPLL) based Shunt Active Power Filter is
discussed. The performance of EPLL based system
is tested under balanced and unbalanced load
conditions. The EPLL is used to extract the
magnitude and phase of required frequency
component from input signal. The method is used
in shunt active power filters to eliminate
harmonics, improve power factor and correct
the unbalanced conditions. The EPLL based
system is simulated for both three phase
balanced and unbalanced load conditions using
MATLAB/Simulink. The simulation results are
presented to demonstrate the effectiveness of
proposed system
55 SMIPE150 Intelligent Fuzzy
MPPT Controller
using Analysis of DC
to DC Novel Buck
Converter for
Photovoltaic Energy
System Applications
2013 A maximum power point tracking (MPPT)
algorithm using fuzzy controller was considered.
MPPT method was implemented based on the
voltage and current reference of PV value was
obtained from of PV modules. Therefore, measuring
both the PV module voltage and current is adequate
for MPPT operation. Fuzzy controller is used to
directly control the design of dc-dc new buck
converter. The simulation results have been used to
verify the effectiveness of the algorithm. The
proposed method is produce good efficiency with
low switching loss. The nonlinearity and
addictiveness of fuzzy controller provided good
performance under parameter variations such as
solar irradiation. Tracking of the maximum power
point (MPPT) plays an important role in
photovoltaic (PV) power systems because they
maximize the power output from a PV system for a
given set of conditions, and therefore maximize they
module efficiency. This work presents a fuzzy logic
controller based MPPT algorithms using design of
dc to dc new buck converter for photovoltaic
applications. The introduction of fuzzy controller as
a solution has given very good performance and
whatever the parametric variation of the system.
56 SMIPE152 High Conversion
Ratio Bidirectional
DC-DC Converter
2013 In this paper, a high conversion ratio bidirectional
DC-DC converter with coupled-inductor is
proposed. In boost mode, two capacitors are

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

153

with Coupled-
inductor
parallel charged and series discharged by the
coupled-inductor. Thus, high step-up voltage gain
can be achieved with an appropriate duty ratio. The
voltage stress on the main switch is reduced by a
passive clamp circuit. Therefore, low resistance
RDS (ON) of the main switch can be adopted to
reduce conduction loss. In buck mode, two
capacitors are series charged and parallel
discharged by coupled-inductor. The bidirectional
converter can have high step-down gain. Besides, all
of the switches achieve zero voltage-switching turn
on (ZVS) and the switching loss can be improved.
Due to two active clamp circuits, the energy of
leakage inductor of coupled-inductor is recycled.
The efficiency can be further improved. The
operating principle and steady-state analyses of the
voltage gain are discussed. Finally, a 24-V input
voltage, 400-V output voltage, and 200-W output
power prototype circuit is implemented in the
laboratory to verify the performance.
57 SMIPE154 Z-Source Five Leg
Inverter
2013 In recent years, five leg inverter and nine switch
inverter have been proposed. Those can
independently control two three-phase loads. This
paper proposes a novel structure for Five-Leg
Inverter (FLI) named Z-source FLI. This inverter
has ten switching devices and can independently
control two three phase loads with high voltage
range. First, the construction of the Z-source FLI
is introduced and then, PWM modulation
method for the z-source FLI is elaborated.
Consequently, it is shown with Z-source one can
improve Voltage Utility Factor in FLI. In the end,
the validity of the method is verified by
simulations
58 SMIPE157 Dual-Input Single-
Output DC-DC-AC
Converter
2013 In this study, a new multi-input converter with
two inputs and one single phase ac output is
proposed, which dc/dc converters are able to
operate in buck and boost modes. Both dc/dc
and dc/ac part works simultaneously with
minimum limitation on the operating function of
the other parts. The proposed converter structure
and operating principle in all operation modes
are presented and discussed. A carrier-based
PWM switching method is also proposed for the
converter. The proposed converter is simulated and
the results are illustrated in the paper. The
simulation results verified operation and
converter can be considered in a multi energy
source system. Theoretical analysis of the system.
59 SMIPE158 Direct Voltage
Control of DC-DC
2013 This paper presents a model predictive control
(MPC) approach for dc-dc boost converters. A

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

154

Boost Converters
Using Enumeration-
Based Model
Predictive Control
discrete-time switched non-linear (hybrid) model of
the converter is derived, which captures both the
continuous and the discontinuous conduction mode.
The controller synthesis is achieved by formulating
an objective function that is to be minimized subject
to the model dynamics. The proposed MPC
strategy, utilized as a voltage-mode controller,
achieves regulation of the output voltage to its
reference, without requiring a subsequent current
control loop. Furthermore, a state estimation
scheme is implemented that addresses load
uncertainties and model mismatches. Simulation
and experimental results are provided to
demonstrate the merits of the proposed control
methodology, which include a fast transient
response and a high degree of robustness
60 SMIPE170 Experimental
Evaluations of a Five
Element Multi
Resonant DCDC
Converter with an
Improved PFM
Control Range
2013 An LLC multi-resonant DC-DC converter with
anti-resonant tank is presented in this paper. The
five-element multi-resonant (LLC-LC) dc-dc
converter can realize the wide range regulations of
output voltage and power by pulse frequency
modulation (PFM) under soft switching conditions.
The resonant dc-dc converter proposed herein is
suitable for renewable and sustainable energy
applications such as battery chargers interfaced
with a photovoltaic power generation system. In this
paper, the design guideline of circuit parameters is
originally described. Experiment results on the soft-
switching performances and steady-state
characteristics including the power loss analysis are
demonstrated; thereby the effectiveness is verified
from a practical point of view.
61 SMITPE1
74
A High Step-Up
Converter With a
Voltage Multiplier
Module for a
Photovoltaic System
2013 A novel high step-up converter is proposed for a
front-end photovoltaic system. Through a voltage
multiplier module, an asymmetrical interleaved
high step-up converter obtains high step-up gain
without operating at an extreme duty ratio. The
two-phase configuration not only reduces the
current stress through each power switch, but also
constrains the input current ripple, which decreases
the conduction losses of metaloxidesemiconductor
field-effect transistors (MOSFETs). In addition, the
proposed converter functions as an active clamp
circuit, which alleviates large voltage spikes across
the power switches. Thus, the low-voltage-rated
MOSFETs can be adopted for reductions of
conduction losses and cost. Efficiency improves
because the energy stored in leakage inductances is
re-cycled to the output terminal. Finally, the
prototype circuit with a 40-V input voltage, 380-V
output, and 1000- W output power is operated to

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

155

verify its performance. The highest efficiency is
96.8%.
62 SMIPS08 Reactive power
Improvement in Wind
ParkSystem Using
FACTS
2013 Large number of wind turbines are being installed
and connected to power systems. In some of the
countries the penetration of wind power is
significant high so as to affect the power quality,
system operation and control and power system
stability. In this paper an attempt is made to predict
the reactive power burden of the wind farm based
on conventional fixed speed induction generator
during wind variation and fault condition. PSCAD
based large scale wind farm model is developed
where STATCOM is introduced as an active voltage
and reactive power supporter to increase the power
system stability. STATCOM unit injects reactive
power to mitigate power quality problems and to
get stable grid operation.
63 SMIPS10 Power System
Stability
Enhancement
WithGenetically
Optimized SVC
Controller
2013 Multi-machine power system stability improvement
by tuning of Static Var compensator (SVC) - based
controller parameters is investigated in the
proposed method. The design problem is
formulated as an optimization problem with a time-
domain simulation-based objective function and
Real-Coded Genetic Algorithm (RCGA) is used for
searching optimal controller parameters. A multi-
machine power system model is developed using
MATLABs SIMULINK which incorporates SVC
Controller. A fault is created on the transmission
line. The simulation results of the multi-machine
power system without SVC Controller and with
SVC Controller are presented. The simulation
results are analyzed which shows that the power
system becomes unstable on the occurrence of the
fault if SVC controller is not used. This paper shows
the effectiveness of the proposed design. The
proposed method enhances the multi-machine
power system stability.
64 SMIPS11 Multi-index
Coordinated Control
for STATCOM and
Generator Excitation
in Differential
Algebraic System
2013 The six-order nonlinear mathematical model is
established for the power system which with a Static
Synchronous Compensator (STATCOM). As an
example, a salient-pole generator model is applied
in single machine infinite bus (SMIB) system. The
coordinated controller of this system is designed by
Multi-index Nonlinear Control scheme based on the
Differential Algebraic System. Starting with the
internal structure of STATCOM, this paper uses
the STATCOMs pulse control angle and the
anglewhich is between the voltage vector of output
of the STATCOM and the voltage vector of an
infinite system as the control variables. The
previous mathematical models strong constraints

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

156

conditions are overcome by this new model and the
nonlinear systems dynamic and steady-state
performances are improved. The simulation results
compared with the results by Linear Optimal
Control indicate that this new STATCOM model
and the nonlinear control law up resented in this
paper are reasonable and effective
65 SMIPS48 Control Methodology
of Three Phase Four
Wire
Current Controlled
Voltage Source Active
Power
Filter for Power
Quality Improvement
2013 In these paper two topologies of current controlled
voltage source inverter (CCVSI) based active power
filter using direct current control technique for
compensating unbalanced loads in a three-phase
four-wire system is proposed. In this method the
harmonic compensation current reference is
generated without introducing any additional
harmonic extraction filtering circuits. A control
approach for balancing the DC voltage of the active
power filter is incorporated to cover the system
losses. The proposed shunt active power filter
compensates harmonics and reactive power in all
three phases as well as the neutral current. To
regulate and balance the dc capacitor voltage, a
current control method using hysteresis controller is
proposed. The simulation results based on
MATLAB\Simulink tool demonstrate the feasibility
of the proposed topologies. The total harmonic
distortion of source current has been calculated and
compared for two topologies to demonstrate
important compensation characteristic of proposed
control methodology of shunt active power filter.
66 SMIPS92 Multi-Parallel-
Connected Static
Synchronous Series
Compensators
2013 A modular and scalable concept of series
compensation for enhancing controllability and
increasing power flow transfer in future
distributed power systems is proposed. It is
based on paralleling multiple static synchronous
series compensators (SSSC), namely multi-
parallel-connected SSSC (MSSSC), to achieve
reactive power compensation. Each compensator
unit is under autonomous control with its output
voltage been regulated and its output current
been coupled with another compensator unit
through cyclically-coupling transformers. The
transmission current is shared equally among the
compensators. The modeling, design and analysis
of a compensator unit and the entire MSSC in
an elementary two machine system will be
presented. The theoretical predictions are verified
experimentally on a test bed with three
compensators connected in parallel.
67 SMIPS132 Voltage
SAG/SWELL
Mitigation using AC
2013 A new topology is proposed here to compensate
voltage sags in power systems. One of the major
power quality issues encountered by industries is

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

157

Chopper the voltage sag. To compensate sag, a new topology
is designed without storage device. This sag
adjuster is capable of compensating deep and
long duration voltage sag. The sag adjuster of
each phase derives power from other two phases.
The sag occurring in single-phase is compensated
by sag adjuster; it is realized with two ac
chopper circuits. By controlling the firing angle
of each ac chopper, the required voltage is
obtained to compensate for the voltage sag.
Simulation of proposed topology is done. The
results are comply with IEC standard
68 SMIPS136 Modular Multilevel
Cascade Converter
Based Stator for
Reactive Power
Compensation
2013 The design and implementation of multilevel
voltage source converter based static synchronous
compensator (STATCOM) is dealt with in
MATLAB Simulink. The objective of this study
is to stabilize the voltage by compensating the
reactive power in the system. Cascaded
Multilevel Converter (CMC) based Static
Compensator (STATCOM) is used for reactive
power control. A cascaded multilevel converter
is a three phase VSC which comprises of three
single phases and each phase consists of H-
bridges connected in series. Each single phase H-
bridge converter has two arms consisting of two
pairs of GTO and diode connected in anti-
parallel. Each H-bridge has its own capacitor,
acting as a voltage source. Individual capacitors of
same capacitance are selected to meet the
economic and harmonies criteria. This work
proposes the enhancement of power transfer
capability and maintaining unity power factor.
Relative Harmonies analysis is also discussed
based on the total harmonies distortion (THD)
calculations. MATLAB/SIMULINK tool is used for
evaluating the performance of the proposed control
scheme.
69 SMIEM39 Sensorless Speed
Control Of Dc
Machine
2013 In this paper a Kaman filter based state feedback
controller of a DC machine is designed and
implemented in hardware. A Kalman filter is used
to estimate the speed and armature current from
noisy measurement of armature current. A state
feedback control is designed and simulated in
Matlab. The controller designed is implemented in
dSPACE. A chopper circuit is designed and
fabricated to drive a DC motor. Sensor less speed
control is implemented in real time. Experimental
results show satisfactory speed and load response.
70 SMIEM14
6
Sensorless Induction
Motor Drive Using
Indirect Vector
2013 This study presents a Sensorless control system for
the electric vehicle (EV) induction motor (IM) drive
embedded with an indirect vector controller and a

No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

158

Controller and
Sliding Mode
Observer for Electric
Vehicle
fixed-boundary-layer sliding mode (FBLSM)
observer. No speed or even voltage measurements
are required. This novel FBLSM observer could
accurately estimate the speed and flux even without
known load torque, where chattering on estimations
due to switching functions in normal sliding mode
observers is almost completely eliminated. The
proof of observability in wide speed range
(including very low speeds) is given. The indirect
vector controller with feedforward compensations is
responsible for tracking motor speed or torque
commands, which manages to accelerate algorithm
processing and enhance transient performance. The
experimental results based on a high-power driver-
load motor configuration validate observer
accuracy and controller dynamical performance
under multi-trapezoidal speed and vehicle driving
cycle torque-speed commands, taking into
consideration unexpected parameter disturbances.


No-66 1
st
Floor, Rogini Nagar, Near Thavalakuppam Govt. Hospital, Poornankuppam, Pondy-07.Phone: 0413-2618850, Cell: 9381775781,
7667052212.E-mail: spectrumpondicherry@gmail.com BlogSpot: spectrumpondicherry.blogspot.in

159

Potrebbero piacerti anche