past issues

Welcome to IJLERA! International Journal of Latest Engineering Research and Applications

Volume 02 - Issue 12 (December 2017)


Title:
An Exploration of Continence of Impact Using GPS& GSM Tracking System
Authors:
Judy Simon, Sabiya Begum M, Saranya B, Vinodhini S
Source:
International Journal of Latest Engineering Research and Applications, pp 01 - 06, Vol 02 - No. 12, 2017
Abstract:
As population is procreate,it results to the monstrous slat of the vehicle on the road and hence leads to an augmentation in the problems concord with traffic management.In this paper,urge the tracking system based on various concepts like intelligent transport system(ITS),satellite modem,RFID(radio frequency identification),Raspberry pi,GPS,GPRS,GSM,etc. By inducting this we can guide the tracking system of the vehicles using GPS system. The main impulsion of this work is to bring out with an above mentioned conceit of tracking system which is an inventive additional device that can permit individual to enjoy the flexibility in motion and develops an advanced sense of confidence and self-reliance.
Keywords:
GPS,GPRS,GSM,ITS,RASPBERRY PI,RFID,SATELLITE MODEM
Download Full Article

Title:
Smart Door Lock Opening In Cars Using Face Recognition
Authors:
Vinil Kumar.V, Divya.N, Mr. K.S.Vairavel
Source:
International Journal of Latest Engineering Research and Applications, pp 07 - 11, Vol 02 - No. 12, 2017
Abstract:
This paper explains the use of Biometric such as face recognition in automobiles such as cars. Nowadays the door lock in cars is released using keys, and then they can also be accessed using fingerprint, RFID etc. The use of keys to unlock the doors in cars is not efficient sometimes. Because the keys may be sometimes used by the wrong person. Hence this proposed system uses the face recognition for unlocking the doors in cars. This system is an efficient method to unlock the cars and at the same time provides security for the cars. Here raspberry pi is used for storing and processing.
Keywords:
Biometric, face recognition, security, automobile, raspberry pi.
Download Full Article

Title:
Medical Image Encryption by Using Crypto-Data hiding and Segmentat
Authors:
Vinay Pandey, Dr. Sudhir Kumar Meesala, Nilesh Gupta
Source:
International Journal of Latest Engineering Research and Applications, pp 12 - 14, Vol 02 - No. 12, 2017
Abstract:
This paper presents the problem of protecting the transmission of medical images. The presented algorithms will be applied to images .This work presents a new method that combines image encryption, data hiding and segmentation technique for safe medical image transmission purpose. This method is based on the combination of public and private keys ciphering. The medical image and patient information is embedded then we segment the embedded image into two parts using segmentation. The encryption algorithm with public and private key is applied to the two parts of embedded image. We segment the embedded message into two parts and then first part is encrypted by receiver public key using RSA algorithm and second part is encrypted by sender private key using RSA algorithm and then we desegment the encrypted parts and send the message to the receiver . In receiver side when message is arrived then receiver segment the message in two parts and decrypt the first part by receiver private key using RSA algorithm and second part by sender public key using RSA algorithm. Then apply desegmentation and extraction so that we can find original message. So message is more secured because in single image we use two different key in two parts of image using segmentation without key sharing .We have applied and showed the results of our method to medical images.
Keywords:
Encryption, Data hiding, Decryption, segmentation, Steganography.
Download Full Article

Title:
Potential of Nannochloropsis sp. Algae oil to be used as Engine Fuel: a Review
Authors:
N. Vinothkumar, R. Arularasan and S. V. Baranidharan
Source:
International Journal of Latest Engineering Research and Applications, pp 15 - 18, Vol 02 - No. 12, 2017
Abstract:
The continuous increasing demand for energy and the depletion petroleum resources has led to the search for new alternative fuel which is renewable and sustainable. Biodiesel has gained much attention in recent years due to its eco-friendly, non-toxic, biodegradability and reduced or zero net carbon cycle compared to conventional diesel fuels. The quality and efficiency of Biodiesel fuel was found to be more when compared to petroleum diesel. In the current review, algal Nannocholoropsis sp. is being verified for potential for biofuel production. This species has been need to be analysed for its suitability of algal biofuel production because of its ease of growth and high oil content, mainly unsaturated fatty acids and a significant remarkable percentage of palmitic acid. It also contains enough unsaturated fatty acid linolenic acid and polyunsaturated acid for a quality biodiesel, the quality of Biodiesel depends on the type of feed oils.
Keywords:
Algae Alageoil BioOil Biodiesel Fuel Nannochloropsis
Download Full Article

Title:
Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system
Authors:
Nidhi Sindhwani
Source:
International Journal of Latest Engineering Research and Applications, pp 19 - 26, Vol 02 - No. 12, 2017
Abstract:
In MIMO system, there are several number of users to communicate in a network. This may include signal noise and traffic in that network in channel usage. For channel allocation, there are several methods to predict available channel and to select optimal usage of channel to users. For this process, optimization algorithms like, PSO, ACO, etc. were used for selection of channel to the user for communication. In this process, there are many users communicate at a time which can combine these signal by multiplexing it and demultiplexing at receiving. But while during communication process this may effect in mixing of signals. This may add noise at receiver stage and may result in BER rate and due to mismatching of sender and receiver state, throughput will be reduced. To improve the performance level in MIMO communication system algorithm is proposed to implement optimization technique for selection of antenna according to communication parameters.Hence various scheduling technique to increase through-put parameter by allocating sleeping time to communicate source and destination enabling time implement are. In this technique, spectrum management is implemented to handle minimum delay for communicating source with destination. By using both configuration of optimization of antenna selection and scheduling technique, level of performance rate is improved. This will result in enhancing our communication performance. This proposal method can be compare with existing system for the parameters of transmission time, Bit error rate, Through-put, MMSE value, CIR and SNR
Keywords:
MIMO,FA, SNR, BER and Through-Put value
Download Full Article

Title:
Generalized Differential Transform Method to Space- Time Fractional Non-linear Schrodinger Equation
Authors:
Deepanjan Das
Source:
International Journal of Latest Engineering Research and Applications, pp 27 - 32, Vol 02 - No. 12, 2017
Abstract:
In the present paper, Generalized Differential Transform Method (GDTM) is used for obtaining the approximate analytic solution of Space-Time Fractional Non-linear Schrodinger Equation. The fractional derivatives are described in the Caputo sense.
Keywords:
Fractional differential equation; Caputo fractional derivative; Generalized Differential transform method; Analytic solution.
Download Full Article

Title:
Review of Different Approaches for Face Detection
Authors:
Susamma Mathew, Shiwani Vashist, Shallu Sharma, Rajesh Mehra
Source:
International Journal of Latest Engineering Research and Applications, pp 33 - 42, Vol 02 - No. 12, 2017
Abstract:
Due to size, location and intensity variations, it is provocative and computationally vigorous task for a computer to capture face from the given image, but for human beings it provides minor complications. The distinctiveness of facial biometrics are comparatively low as there are different number of factors like variation in posture, delicate face, temporarily deferred, changed illumination etc. which have little or no control. In this paper we are discussing a review of different approaches for detection of human face. The skin color segmentation of color image in combination with identification of facial features, neural network classifiers, HOG with SVM classifiers, AdaBoost algorithm with cascade classifiers, Eigen face images and approach based on heuristic algorithms are some of the techniques that are discussing in this paper. These approaches include image processing for extracting some meaningful data. It also discusses different challenges associated with human face detection and proposes some solutions. There are number of practical applications like authentication, criminal face detection, intelligent human- machine interfaces, e-commerce etc. for human face detection.
Keywords:
AdaBoost algorithm, ANN, Eigen, face, HOG, Segmentation, SVM
Download Full Article

Title:
Low Density Distribution of 3-PrimeFactors Numbers till 1 Trillion
Authors:
Neeraj Anant Pande
Source:
International Journal of Latest Engineering Research and Applications, pp 43 - 56, Vol 02 - No. 12, 2017
Abstract:
After generalizing prime numbers to 'k-PrimeFactors numbers', the first of its kind with non-trivial value 2 of k has been recently analyzed in detail. 3-PrimeFactors numbers also deserve such deep analysis and this work is the beginning of that saga. First number of 3-PrimeFactors numbers is increasing ranges are determined. There the smallest and largest such number is also noted. Then main focus is shifted to the minimality with determination of minimum count of these numbers in blocks of various sizes of powers of 10 till 1 trillion, first and last blocks containing minimum 3-PrimeFactors numbers, and total number of such blocks. Then keeping block-size fixed, increasing ranges are inspected for the study of the same kind for different block sizes.
Keywords:
Prime number, k-PrimeFactors number, 3-PrimeFactors number, Low density distribution
Download Full Article

Title:
Influence of different conditions on Surface Roughness in Hard Turning of AISI4340 Steel
Authors:
Vipan Bansal, Palwinder Singh, Rishi Sharma
Source:
International Journal of Latest Engineering Research and Applications, pp 57 - 65, Vol 02 - No. 12, 2017
Abstract:
In the present study, an attempt has been made to investigate the effect of different conditions (dry condition, wet and solid lubricant condition) on surface roughness in finish hard turning of AISI 4340 steel with hardness 60HRC using CBN tool. Its applications have been found in making dies and mould, roller and ball bearings, automobile and aircraft parts. Water based lubricant used as wet lubricant and boric acid in powder form is used as a solid lubricant. Three factors speed, feed and depth of cut were taken at three levels low, medium and high. The machining experiments were conducted based on RSM (Response Surface Methodology) and sequential approach using face CCD (Central Composite Design).The result indicated that there is significant improvements in a surface finish with the use of solid lubricants.
Keywords:
Cutting Conditions, Hard Turning, Response Surface Methodology, Solid Lubricants, Surface Roughness.
Download Full Article

Title:
Implementation of Advanced encryption Standard using Reversible Logic Gate
Authors:
D Srinivas, Boda Aruna, Ravi Boda
Source:
International Journal of Latest Engineering Research and Applications, pp 66 - 72, Vol 02 - No. 12, 2017
Abstract:
The Rijndael cryptosystem is a new Advanced Encryption Standard (AES) till now many hardware implementations of AES have been reported. Some of these implementations are optimized for speed, some for area, some for reconfigurability, and some for low-power applications. Again, reversible logic synthesis methodologies have drawn the attention of researchers in recent times, mainly with the prospect of quantum computing becoming a reality, and the potential of reversible logic circuits for providing ultra low-power implementations. The implementation strategy of Encryption and Decryption includes the Verilog HDL coding for each block in a synthesizable way. Test benches are to be written for each module and simulated using Xilinx simulation environment. After satisfactory functioning of each block, these blocks are combined to form the top level module. The top level modules are then tested by generating appropriate test vectors through test bench. The Verilog HDL code is compiled using Xilinx ISE 13.2. The synthesis of the architecture is carried out on VIRTEX-V devices.
Keywords:
Advanced Encryption Standard, Reversible Logic Synthesis, Top level Module,Virtex-V.
Download Full Article

Title:
Advanced Audit-based Misbehaviour Detection in Networks
Authors:
Shivani Nikam, Shweta Joshi, Vaishali Sakhare, Divya Jagtap, Prof. Jitendra Musale
Source:
International Journal of Latest Engineering Research and Applications, pp 73 - 81, Vol 02 - No. 12, 2017
Abstract:
We address the problem of identifying and isolating misbehaving nodes that refuse to forward packets in multi-hop ad hoc networks, we develop a system called Advance Audit-based Misbehavior Detection in network that effectively and efficiently isolates both continuous and selective packet droppers. Advance Audit-based Misbehavior Detection in network System integrates reputation management, trustworthy route discovery and identification of misbehaving node based on behavioral audits. Advance Audit-based Misbehavior Detection in network detects selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multi channel networks or networks consisting nodes, even when large portion of network refuses to forward packets.
Keywords:
Misbehaviour, Packet dropping, Reputation System, Recovery.
Download Full Article

Title:
An Analytical Study of Customer's perception and level of contentment about LIC products in Nagpur District
Authors:
Dr. Snehal Godbole
Source:
International Journal of Latest Engineering Research and Applications, pp 82 - 92, Vol 02 - No. 12, 2017
Abstract:
Man‟s life and property are open to risks of various kinds and in varying degrees. Premature death of the bread-winner of a family may push his family into deep financial crisis, anybody‟ s house can be devastated due to earthquake or may be destroyed by fire, a ship may face sea perils, ornaments can be stolen by burglars, and pirates can attack the cargo and so on. These leads to incurring of losses which may be beyond the capacity of an individual to bear. There are many financial alternatives to diffuse the risk but the most important and the best alternative is INSURANCE. Insurance is essential for every individual for his /her well being. Today in the competitive world there exist number of insurance companies offering their services to their clients with different features and rate of returns. It protects man from uncertainty and risks in his personal as well as business life. The main function of insurance is to spread these losses over a large number of persons through a co-operative mechanism which would have fallen on an individual. All the persons who are exposed to a particular risk co-operate t share the loss cause by that risk, whenever it takes place. It is to be noted that insurance does not avert risk but only the loss is minimized. In other words, insurance provides protection against a peril, but does not eliminate the risk. The aim of this contribution is to provide a better insight of the customer‟s perception, his satisfaction level while choosing a particular life insurance product of a particular company. This paper includes primary data collection through survey conducted by us and the analysis of the same, gauging the perception and satisfaction level of the customers (target customer‟s) hold about the insurance companies. It is always said that Life Insurance is never bought- it is always sold. This contribution highlights on the various factors that are considered while buying of insurance for an individual or for a group.
 Every company can aspire in the rural market so high avenues of employment are generated.
 Trust of the customers on the insurance company.
Keywords:
Co-operative mechanism, Customer‟s perception, Customer‟s satisfaction
Download Full Article

Title:
Factors Influencing on Buying Behaviour of Softdrink Products- A Percptual Study
Authors:
Dr. G. Somasekhar, Mr. T. Kishore Kumar
Source:
International Journal of Latest Engineering Research and Applications, pp 93 - 98, Vol 02 - No. 12, 2017
Abstract:
In the highly competitive environment, companies must protect the long-term interest of the customers to enhance their profitability by means of long-lasting relationships with the customers. This study examines the factors influencing on buying soft drink products with special reference to Coco Cola brand in Chittoor district of Rayalaseema region, Andhra Pradesh. The opinion has been collected from 224 customers of coco brand and study is confined to five brands of Coco Colo brands such as Coco-Cola, Thumps up, Limca, Sprite and Maaza. It is to observe that most of the respondents are 36-45 age group and majority of the respondents are between Rs. 20001 to 30000 income group. Majorityof the respondents are influenced with taste, quality and friends‟ circle and these three are most significant factors towards buying of soft drinks in Chittoor district of Rayalaseema Region, Andhra Pradesh.
Keywords:
Behaviour, Brand, Buying, Factors, Influence, Soft drinks etc
Download Full Article