Top Banner

of 28

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

EXODUS 2K12PROCEEDINGS OF NATIONAL LEVEL TECHNICAL SYMPOSIUM MARCH 15-3-2012 TO 16-3-2012

ORGANIZED BYDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CAUVERY COLLEGE OF ENGINEERING AND TECHNOLOGY PERUR, TRICHIRAPALLI-639103

CAUVERY COLLEGE OF ENGINEERING & TECHNOLOGY PERUR, TRICHIRAPALLI-639 103

MESSAGEThiru. N.Nallusamy, B.A.,B.L., Former Minister of Govt. of Tamilnadu is the founder chairman and Managing Trustee of Rana Educational Trust. Having visited various Institutions in various countries, he has an avowed interest in providing education to our younger generation, The pillars and leaders of our shining India.His only aim in establishing this acclaimed reputation is to impart Quality professional education to the society. The Trust, besides educational, engages itself in various health and charitable programmes and activies. Calm, noble and straightforward, our chairman has a strong determination and conviction in making our college a temple of highly professional institution on par with other best institutions.PREFACE A non-profit organization, Rana Educational Trust has established CAUVERY COLLEGE OF ENGINEERING & TECHNOLOGY at perur (kulumani Road), Tiruchirapalli.

Chairman, Thiru. N. NALLUSAMY,B.A., B.L., Former Minister, Govt. of Tamilnadu, CACET, Trichy.

CAUVERY COLLEGE OF ENGINEERING & TECHNOLOGY PERUR,TRICHIRAPALLI-639103

MESSAGE

Dr D. Nagarathinam, a former senior project officer of IIT madras and a Ph.D scholar from NIT is the principal, guiding the learned staff and college with his rich experience of ten years. The experienced and dedicated faculty members with Ph.D/Master degrees and the supporting staff members take in off care to enlighten our students so as to excel in their co curricular and extra-curricular activities.

Dr. D.NAGARATHINAM, M.E., Ph.D., CACET, Trichy

NATIONAL COORDINATOR FOR ADOLESCENT HEALTH PROGRAMME

Having completed graduation in medicine at Thanjavur Medical College, Thanjavur, Dr. V. Ilakkumi pursued her Post Graduation in Paediatrics at Madras Medical College, Chennai. Upon completion of studies, undertook State Government Medical Service in the field of Medical education in the college where from she got graduated. She served in different capacities before laying down the office as Professor and Head of the Department in Paediatrics. During her state government service, she served as National coordinator for adolescent health programme and State coordinator for Integrated management of neonatal& Child Health programme etc., Presently employed in Chennai Medical College, Irungalur as Professor of Paediatrics

Dr. V. ILAKKUMI, Professor of Paediatrics

NR IAS ACADEMYTRICHY

MESSAGEMr. R.VIJAYALAYAN, M. Sc.,(agri) PGDCA, Director of NR IAS academy is conducting centre institute for the past 10 years. He has placed 2000 memebers in government jobs. He has created 2 IAS officers. He has created got SADHANAI SIGARAM award. He is doing effective coaching on IAS for students with least cost. Three students who are placed as IAS, IPS officers are coached by him. Those three students had not forgetten their staff. The students are Ms. Lalitha, IAS officer who got 12th rank, Mr. Varun Kumar, IPS officer got 3rd rank and Ms. Vimala who got 268th rank. He provided tamil materials for the easily understandity of students.

Mr. R. VIJAYALAN, M. Sc., (agri) ,P.G.D.C.A NR IAS ACADEMY

PREFACEThe objective of the Present Symposium is to provide a common Platform for the Researches, Practitioners to come out with innovative ideas based on the interdisciplinary explorative research. Convener would like to thank the researchers who have made praise worthy commotions the conference through the Research Papers and Valuable Suggestions. I Hope and expect that the Symposium will be Exciting and Interactions will be Stimulating and Informative.

Convenor Mrs. M. HARIMATHI,M.E.,MBA HOD/CSE, CACET, Trichy.

CONTENTS

S. NO 1.

TITLE WIMAX-The Emerging Technology in Wireless Communication

PAGE NO. 1

2. 3. 4. 5. 6. 7. 8. 9. 10.

3D Internet Wireless Network Security Android (Operating Systems) Brainport Vision Device Brain Machine Interface Brain Controlled Artificial Legs Cloud Computing Impact of Cloud Computing and Security Issues NIR: Content Based Image Retrieval On Cloud Computing

1 2 2 ` 3 3 4 4 5

5 5 6 6

11. 12. 13. 14.

Cloud Computing Cross-Domain Data Sharing in Distributed Systems Mobile Operating System (ANDROID) Developing an Integrated Time-Series Data Mining Environment for Medical Data Mining

7

15.

Evolutionary Nano-Robots To Cure and Diagonise A Disease 7

16. 17. 18. 19.

Grid Computing Hacking and Network Security Cloud Computing A Wormhole Intrusion Detection Algorithm For Mobile Ad-hoc Networks

8 8 8

9

20. 21. 22. 23. 24. 25.

Mobile Communication (Android OS) Mobile Computing Nano Technology Network Security Artificial Intelligence Message Authentication in Mobile Ad-hoc Networks using Enhanced Tree Scheme 11 11 12 12 13 13 9 10 10 11

26. 27. 28. 29. 30. 31.

Digital Image Processing Recovery Of Decayed Substances Robotics Treatment of Brain Tumour Using Nano Robots Android Efficient Adaptation of Large Webpage Accessing in

Small Screen Wireless Devices Based On Cloud Computing 14 32. 33. 34. 35. WIFI Cloud Computing Android OS The Latest Mobile Phone Technology 14 15 15 16

WIMAX THE EMERGING TECHNOLOGY IN WIRELESS COMMUNICATION C. Prasanna Devi, R. Amuthavalli, Sudharsan Engineering College, Pudhukkottai.

ABSTRACT: WiMax has helped to push the wireless communication scenario into hyperdrive. For many years cables ruled the world. Optical fibers played a dominant role for its higher bit rates and faster transmission. But the installation of cables caused a greater difficulty and thus led to wireless access. The foremost of this is Bluetooth which can cover 9-10mts. Wi-Fi followed it having coverage area of 91mts. No doubt, introduction of Wi-Fi wireless networks has proved a revolutionary solution to last mile problem. However, the standard's original limitations for data exchange rate and range, number of channels, high cost of the infrastructure have not yet made it possible for Wi-Fi to become a total threat to cellular networks on the one hand, and hard-wire networks, on the other. But the mans continuous quest for even better technology despite the substantial advantages of present technologies led to the introduction of new, more up-to-date standards for data exchange rate i.e., WIMAX, meaning Worldwide Interoperability for Microwave Access. 3D INTERNET S. KUVEENA, R.VIJAYA RAMYA, Syed Ammal Engineering College, Ramanathapuram.

ABSTRACT: The World Wide Web, which has started as a document repository, is rapidly transforming to a fullfledged virtual environment that facilitates services, interaction, and communication. Under this light, the Semantic Web and Web2.0 movements can be seen as intermediate steps of a natural evolution towards a new paradigm, the 3D Internet. We provide an overview of the concept 3D Internet and discuss why it is a goal worth pursuing, what it does entail, and how one can realize it. With the advent of increased computational power in all types of devices and the multimedia solutions they support, we are starting to see a shift in information use and how it is presented. The World Wide Web gives us a platform for global access to content, however the way information is currently presented to end-users is restricted.

1

WIRELESS NETWORK SECURITY S. BHARATHI, K. SARANYA, K.S.R. COLLEGE OF ENGINEERING, THIRUCHENGODE. ABSTRACT: In the future the computing environment can be expected based on the recent progress and advancement in computing and communication technologies. Next generation of wireless network security with include both prestigious infrastructure wireless network. The collection of wireless nodes that can dynamically from a network to exchange information without using any pre-exiting fixed network infrastructure. The special features of wireless network bring these technologies great opportunities together with severe challenges. This paper describes the fundamental problem of wireless network by giving its related research background including the concept and features of network. Some of this network technical challenges poses are also present based on which the paper points out some of the key research issues for networking technology that are expected to promote the development and accelerate the commercial application of wireless network. Special attention is paid on network layer and advanced schemes. ANDROID (OPERATING SYSTEM) M.BALASUBRAMANI, A.SATHIYASEELAN, MIET ENGINEERING COLLEGE, TRICHY. ABSTRACT: Android is a Linux based operating system for mobile devices such as smartphones and tablet computers. It is developed by the Open Handset Alliance led by Google. Google purchased the initial developer of the software, Android Inc., in 2005. The unveiling of the Android distribution in 2007 was announced with the founding of the Open Handset Alliance, a consortium of 84 hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. Google releases the Android code as open-source, under the Apache License. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android. Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. Developers write primarily in a customized version of Java. As of October 2011 there were more than 400,000 apps available for Android, and the estimated number of applications downloaded from the Android Market as of December 2011 exceeded 10 billion.

2

BRAINPORT VISION DEVICE R. SANGEETHA , S.PHILOMINA STEFFY , RVS COLLEGE OF ENGINEERING AND TECHNOLOGY, COIMBATORE. ABSTRACT: For all the wonderful uses of technology, none is more wonderful than when it can be used to improve the lives of the handicapped. A device called the Brain Port is a sixth sense for the blind, translating images from a video camera to electrical impulses that are transmitted via the tongue to the brain of a blind person. The Brain Port is the strangest gadget for the blind of them all, translating visual images into electrical impulses, sent to a plate that rests on the tongue. In other words, youre actually seeing the world around you with your mouth. Early tests show that people are able to read large writing and understand whats around them. The technique, called echolocation, uses reflected sound to help subjects "see" their surroundings by measuring the distance, size, and density of the objects around them, it is reported. Unfortunately, author did not explore scientific basics of this technology and missed a further perspective even for the current device for the blind. There is at least theoretical perspective for future development of color and stereoscopic vision for the blind; it is also very intriguing to explore combination of this technology with existing methods and tools developed for artificial visual systems BRAIN MACHINE INTERFACE Akbar Basha.KM Parthiban.S Pavendar Bharathidasan College of Engineering & Technology, Trichy-24 ABSTRACT: A brain-machine interface is a communication system that does not depend on the brains normal output pathways of peripheral nerves and muscles. It is a new communication link between a functioning human brain and the outside world. These are electronic interfaces with the brain, which has the ability to send and receive signals from the brain. BMI uses brain activity to command, control, actuate and communicate with the world directly through brain integration with peripheral devices and systems. The signals from the brain are taken to the computer via the implants for data entry without any direct brain intervention. BMI transforms mental decisions and/or reactions into control signals by analyzing the bioelectrical brain activity. While linking the brain directly with machines was once considered science fiction, advances over the past few years have made it increasingly viable. It is an area of intense research with almost limitless possibilities. The human brain is the most complex physical system we know of, and we would have to understand its operation in great detail to build such a device.

3

BRAIN CONTROLLED ARTIFICIAL LEGS C. RAJASEKAR, T. RAJESHWARAN, SYED AMMAL ENGINEERING COLLEGE, RAMANATHAPURAM. ABSTRACT: This paper describes a brain controlled robotic leg which is designed to perform the normal operations of a human leg. After implanting this leg in a human, the leg can be controlled with the help of users brain signals alone. This leg behaves similar to a normal human leg and it can perform operation like walking, running, climbing stairs etc. The entire system is controlled with the help of advanced microcontrollers and digital signal processors. The signals are taken out from the human brain with the help of electroencephalography technique. The person can perform operations like walking, running etc just by their thought. This system will be very much suitable for those who lost their legs in accidents and the proposed system is hundred percent feasible in the real time environment with the currently available technology. The Brain Controlled Artificial Legs are very much cost effective when compared to the normal Artificial legs which is available in the market. CLOUD COMPUTING S.SADHANA, P.SANGEETHA, K.RAMAKRISHNAN COLLEGE OF ENGINEERING, SAMAYAPURAM,TRICHY. ABSTRACT: Cloud computing is a term for a new mechanism of delivering resources such as computing, storage, application database or other services on demand. It is not really a new technology by itself. it is the primarily a new business models wrapped around new business models wrapped around new and upcoming technologies such as system virtualization, which covers compute, storage and network environment. Obviously such business models becomes attractive to organization which are drawn towards per use pricing models as they provide a significant advantage over the typical models of acquisition, deployment and management of equipment. These models also enable application developers to develop application, which can scale seamlessly horizontally and yet provide concurrency throughput of traditional vertical compute and acquire models. Cloud computing also trends to encourage a lot of outsourcing of the risk aspects of deployment models and reduce the time to market for business with application to be supported in their environment. We envision a world of many clouds, both public and private that are open and compatible. 4

IMPACT OF CLOUD COMPUTING AND SECURITY ISSUES Gayathri.T , Aparna.S , Jayaram College of Engineering and Technology. ABSTRACT: Cloud computing is clearly one of todays most enticing technology areas due, at least in part, to its costefficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. As well as this paper describes advantages and disadvantages of the cloud computing and suggests to improve of cloud computing. NIR: CONTENT BASED IMAGE RETRIEVAL ON CLOUD COMPUTING.. S. VIGNESHWARAN, K. VIGNESHWARAN, Syed Ammal Engineering College, Ramanathapuram. ABSTRACT: NIR is an open source cloud computing enabled content based image retrieval system. With the development and popularization of cloud computing, more and more researchers from different research areas do research with the help of cloud computing. Nowadays content based image retrieval as one of the challenging and emerging technologies is high computation task because of the algorithm computation complexity and big amount of data. As based on cloud computing infrastructure, NIR is easy to extent and flexible for deployment. As an open source project, NIR can be improved on demand and integrated to other existing systems. This paper presents our ideas, findings, design and the system from QWT work of NIR. CLOUD COMPUTING J. Tharun, J. Mani, Sri Angalamman College of Engineering, Trichy.

5

ABSTRACT: Cloud computing is the fifth generation of computing. This concept is used to sharing the resources through internet. Though the concept of clouds is not new, it is undisputable that they have proven a major commercial success over recent years Cloud systems are not to be misunderstood as just another form of resource provisioning infrastructure and in fact, as this report shows, multiple opportunities arise from the principles for cloud infrastructures that will enable further types of applications, reduced development and provisioning time of different services. Companies can maximize the use of their existing hardware to plan for and serve specific peaks in usage. Thousands of virtual machines and applications can be managed more easily using a cloud-like environment. CROSS DOMAIN DATA SHARING IN DISTRIBUTED SYSTEMS K. AARTHI, K. KANCHANA DEVISudharsan Engineering College, Sathiyamangalam, Pudukkottai-622 501.

ABSTRACT: Cross-organization or cross-domain cooperation takes place from time to time in Electronic Health Record (EHR) system for necessary and high-quality patient treatment. Cautious design of delegation mechanism must be in place as a building block of cross-domain cooperation, since the cooperation inevitably involves exchanging and sharing relevant patient data that are considered highly private and confidential. The delegation mechanism grants permission to and restricts access rights of a cooperating partner. MOBILE OPERATING SYSTEM (ANDROID) M. AARTHI, S. DEEPIKA, DHANALAKSHMI SRINIVASAN ENGG. COLLEGE, PERAMBALUR.

ABSTRACT: The unveiling of the Android platform on was announced with the founding of the Open Handset Alliance, a consortium of 48 hardware, software, and telecom companies devoted to advancing open standards for mobile devices. Google has made most of the Android platform available under the Apache free-software and open source license. Android is a freely downloadable open source software stack for mobile devices that includes an operating system, middleware and key applications based on Linux and Java. 6

Google developed Android collaboratively as part of the Open Handset Alliance, a group of more than 30 mobile and technology companies working to open up the mobile handset environment. DEVELOPING AN INTEGRATED TIME-SERIES DATA MINING ENVIRONMENT FOR MEDICAL DATA MINING M.KRISHNAMOORTHY, K.ARUNKUMAR, SYED AMMAL ENGINEERING COLLEGE, RAMANATHAPURAM. ABSTRACT: In this paper, we present an integrated time-series data mining environment for medical data mining. Medical time-series data mining is one of key issues to get useful clinical knowledge from medical databases. However, users often face difficulties during such medical time-series data mining process for data pre-processing method selection/construction, mining algorithm selection, and post-processing to refine the data mining process as shown in other data mining processes. To get more valuable rules for medical experts from a time-series data mining process, we have designed an environment which integrates time-series pattern extraction methods, rule induction methods and rule evaluation methods with visual human-system interface. After implementing this environment, we have done a case study to mine time-series rules from blood/urine biochemical test database on chronic hepatitis patients. EVOLUTIONARY NANO - ROBOTS TO CURE AND DIAGONISE A DISEASE T. SUGANYA, C. SINDHIYA, SASTRA UNIVERSITY, THIRUMALAISAMUDHRAM, THANJAVUR. ABSTRACT: Imagine , you are getting up one morning and started getting ready to go to your office suddenly you feel some uneasiness in your body and you plan to visit the nearby hospital on your way to office .But to your surprise you here that the doctor said that your have cancer cells in your body in the beginning stage. Do you know what you did? You just took your cell phone and rang up to office and requested just a mere one day medical leave to your M.D. . And you came home in the evening just as usual as you would do , with all the medical reports , saying that you have undergone a treatment to destroy the cancer cells , which was completed successfully and with ease. Interesting? This can bring into reality with the invention of NANOROBOTS. 7

GRID COMPUTING THE HASTY COMPUTING TO ACCESS INTERNET B. KIRUTHIKA, N. KARTHIKA, M.I.E.T COLLEGE OF ENGGINEERING, TRICHY. ABSTRACT: Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious problems that need the attention of the researchers. So we have taken this problem for our research and in this paper we are providing a layout for implementing our proposed Grid Model that can access the Internet very fast. By using our Grid we can easily download any number of files very fast depending on the number of systems employed in the Grid. We have used the concept of Grid Computing for this purpose. HACKING AND NETWORK SECURITY A. Subha, J.S. Suganya, Pavendhar Bharathidasan College of Engineering and Technology, Trichy-24. ABSTRACT: The pejorative sense of hacker is becoming more prominent largely because the popular press has coopted the term to refer to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data. Hackers, themselves, maintain that the proper term for such individuals is cracker. Hacking is unauthorized use of computer and network resources. A computer hacker is a person who finds out weaknesses in the computer and exploits it. It must also be said that not all hackers are bad. Government and huge companies use hackers to maintain their security systems. People normally confuse hackers with crackers. While hackers crack the code of passwords to hack into a security system, crackers crack the code of software to bypass its security mechanisms like copyright protection etc. Hacking and cracking are two different methods, but hackers normally possess cracking skills and crackers, hackings skills. Also note that not all hackers are humans. CLOUD COMPUTING S. THARANIYA DEVI, SANGEETHA, M.I.E.T ENGINEERING COLLEGE, TRICHY-07.

8

ABSTRACT: Computers have become an indispensable part of life .We need computers everywhere, be it for work, research or in any such field. As the use of computers in our day-to-day life increases, the computing resources that we need also go up. Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application server to a cloud of computers. A cloud is a virtualized server pool which can provide the different computing resources of their clients. Users of this system need only be concerned with the computing service being asked for. The underlying details of how it is achieved are hidden from the user. The data and the services provided reside in massively scalable data centers and can be ubiquitously accessed from any connected device all over the world. A WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS K. SRIDHAR, J. SARAVANAN, Jayaram college of Engineering and Technology, Trichy. ABSTRACT: In this paper, we have proposed an algorithm where intrusion detection has been done in a cluster based approach to detect the wormhole attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. This paper explains how the wormhole attack can hardly be defeated by crypto graphical measures, as wormhole attackers do not create separate packets. They simply replay packets already existing on the network, which pass the cryptographic checks. Existing works on wormhole detection have often focused on detection using specialized hardware, such as directional antennas, etc. The aim is to represent a cluster based countermeasure for the wormhole attack that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. Our main objective of this paper is to find out the malicious node that performs the wormhole attack in network. MOBILE COMPUTING R. MANJUNATH, R. FELIX, MIET ENGINEERING COLLEGE, TRICHY-7.

9

ABSTRACT: This world of computers has grown to such an extent that today its possible for a person to work on a run and yet be connected to his organization through various technologies of wireless communication. One of the fastest grown wireless technology is mobile computing; it has changed the entire pattern of human technological existence .A technology that allows transmission of data, via a mobile device also called as the mobile phone or cell phone, without having to be connected to a fixed physical link. The first step towards the convergence between telecommunication and IT happened in1965.When AT&T used computers to do the switching in the electronic switching system. Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. NANO TECHNOLOGY S. KAVIARASAN, S. SOUNDHARRAJAN, K.S.R COLLEGE OF ENGINEERING, TIRUCHENGODE 637 215. ABSTRACT: When we enter the enchanting world of electronics we have pleasant routes. The path we have chosen is the union of robotics & medicine. The integration of nanotechnology into medicine is likely to bring some new challenges in medical treatment. Let us peep inside the real world of NANOTECHNOLOGY. Nanorobot is a wonderful vision of medicine in the future. The most advanced nano medicine involves the use of nanorobots as miniature surgeons. An advancement in nanotechnology may allow us to build artificial red blood cells called Respirocytes capable of carrying oxygen and carbon dioxide molecules (i.e., functions of natural blood cells). Respirocytes are nanorobots, tiny mechanical devices designed to operate on the molecular level. Respirocytes can provide a temporary replacement for natural blood cells in the case of an emergency. Thus respirocytes will literally change the treatment of heart disease. NETWORK SECURITY B. KANNEGA, B. GOWSALYA, ANNA UNIVERSITY OF TECHNOLOGY, TRICHY. ABSTRACT: System security is one of the most critical aspects of any network. The computer network is only strong as its weakest link. Computer security becomes more important than ever. We hear of malicious individuals breaking into corporate and government computer system around the world. The media calls these people as hackers. This description is not entirely accurate. 10

ARTIFICIAL INTELLIGENCE R. NIBATHRA, S. RAMYA, Ponnaiyah Ramajayam College of Engineering, Tanjore. ABSTRACT: Artificial intelligence research has foundered on the issue of representation. When intelligence is approached in an incremental manner, with strict reliance on interfacing to the real world through perception and action, reliance on representation disappears. In this paper we outline our approach to incrementally building complete intelligent Creatures. The fundamental decomposition of the intelligent system is not into independent information processing units which must interface with each other via representations. Instead, the intelligent system is decomposed into independent and parallel activity producers which all interface directly to the world through perception and action, rather than interface to each other particularly much. The notions of central and peripheral systems evaporate everything is both central and peripheral. MESSAGE AUTHENTICATION IN MOBILE AD-HOC NETWORKS USING ENHANCED TREE SCHEME V. SINDHUPRIYA, M. MANJUPRIYA, Pavendhar Bharathidasan college of Engineering and technology, Trichy-24. ABSTRACT: A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. These characteristics make it vulnerable to security attack, so protecting the security of the network is essential. As wireless ad-hoc networks become feasible, the security issues have been important. Because taping and the falsification are easy in a wireless network, and it is difficult to find the attacker, defenses are more difficult than networks of cable. Authentication, integrity and encryption are key issues pertaining to network security. Traditional authentication schemes cannot be effectively used in such decentralized networks. Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as authentication. DIGITAL IMAGE PROCESSING M. SUKANYA, T. LOGAPRIYA, R V S COLLEGE OF ENGINEERING TECHNOLOGY COIMBATORE. 11

ABSTRACT: Recent days the traffic accident has increased in great scale. Some of the major factors are Driver drowsiness and fatigue. The purpose of this paper is to advance a system to detect fatigue symptoms in drivers and produce timely warnings that could prevent accidents. This presents a real-time approach for detection of drivers fatigue. The algorithm developed is unique to any currently published papers, which was a primary objective of this paper. Here the eyes are located by a camera and the intensity changes in the eye area (including the effect of red pupil) determine whether the eyes are open or closed. If the eyes are found closed for 5 consecutive frames, the system draws the conclusion that the driver is falling asleep and issues a warning signal. The advantage in this system is capable of working under reasonable lighting conditions also. The image acquisition system acquires images with consistent photometric property under different climatic ambient conditions using near-infrared (NIR) illuminator and CCD camera. RECOVERY OF DECAYED SUBSTANCES M.ALEXANDER, Saranathan College Of Engineering, Trichy. ABSTRACT: The problem of rebuilding a face from human remains has been, until now, especially relevant in the ambit of forensic sciences, where it is obviously oriented toward the identification of otherwise unrecognizable corpses; but its potential interest to archaeologists and anthropologists is not negligible whose aim is reconstructing, through Spiral Computed Tomography data and virtual modelling techniques, 3-D models of the possible physiognomy of ancient egyptian mummies using Soft tissues

reconstruction and textures application. Moreover we hope to reduce time consuming phases like features tracking, that could improve Experimenting. This work is carried out through a multidisciplinary approach, involving different competences: image processing, marching cubes algorithm and adaptive marching cubes algorithm, warpping.ROBOTICS: A FRIEND FOR ASSISTING HANDICAPPED PEOPLE P. Poornima, K.S.R COLLEGE OF ENGINEERING, TIRUCHENGODE 637 215. ABSTRACT: This article presents the Robotic system FRIEND, which was developed at the University of Bermens Institute of Automation(IAT). This system offers increased control functionality for the disabled users. FRIEND consists of an electric wheel-chair, equipped with the robot arm MANUS. 12

A computer controls both the devices the man-machine interface (MMI) consists of a flat screen and a speech interface. FRIENDs hardware and software are described first. The current state of development is then presented, as well as research results that will be integrated soon. After a short explanation of speech interface, the methods developed for semiautonomous control are described. These are programmed by demonstration, visual servoing and configuration planning based on the method of imaginary links. We also described the state of integration and our experience to date. TREATMENT OF BRAIN TUMOR USING NANOROBOTS FAHMEETHA FATHIMA.M, MEENU KRISHNA, PSNA COLLEGE OF TECHNOLOGY, DINDIGUL. ABSTRACT: The increased anticipation of the industries to manufacture quality based and cost efficient products, consuming very less amount of raw materials, could be reached with the help of the newly emerging nanotechnology. This paper covers about how this technology could be implemented in the field of medicine. Brain is the most important and complicated organ of the human being. Hence making a surgery in the brain is not an easy factor to implement for all the patients. The doctors may not be that much efficient to kill all the tumor cells in the brain. The conventional medical system could not find a way for complete elimination of tumor cells from the brain and it just extends the lifetime of the patients temporarily. Also this system causes many side effects. The nanotechnology provides the sophisticated way to eliminate the brain tumor completely by using the nanorobots without any side effects. These nanorobots are programmed in order to perform the operation efficiently. These nanorobots are injected into the body of the patient. ANDROID R.S. Vithya, V. Nandhini, M.I.E.T Engineering College, Trichy. ABSTRACT: Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to write managed code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code. 13

The unveiling of the Android platform on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted to advancing open standards for mobile devices. When released in 2008,most of the Android platform will be made available under the Apache free-software and open-source license. EFFICIENT ADOPTATION OF LARGE WEBPAGE ACCESSING IN SMALL SCREEN WIRELESS DEVICES BASED ON CLOUD COMPUTING Kendra Priyaa. J.S, Fatima Sheerin. S ABSTRACT: With the rapid development of wireless telecommunication technology and increment of bandwidth, more people are using their wireless handheld devices for web surfing. It is difficult for wireless mobile users to browse these large web pages designed for PCs, since they have constrained functionality such as small screen, limited computing power , less storage capacity etc. So it is necessary to adapt these web pages to small screen devices. By referring to huge computing ability and storage resource of cloud computing infrastructure, a new wireless web access mode is proposed. First,we have discussed about the system framework .Subsequently, the two key components of system are described in detail: the one is distributed web page adaptation engine, which is designed for the purpose that the engine can be carried by computing cloud distributed and parallel; the other is distributed web page blocks management based on cloud computing, which is proposed so that the web page adaptation engine can be deployed reasonably. WIFI K.K. PRADEEPA, I. PIRATHEEBAA, Syed Ammal Engineering College, Ramanathapuram. ABSTRACT: While it is quite natural for us to be drawn to the new potentialities Wi-Fi represents, we should give pause and place it within its proper context and take a long-term view of the phenomenon. One of the repeated shortcomings of the research on new technologies has been that the researchers have time and again studied them in isolation. A new technology does not strike roots and grow on a virgin ground. Instead, it encounters a terrain marked by old technologies. The new technology .s growth then is shaped not only by its own potentialities but also the opportunities and restraints created by the systems based on old technologies. In order to expand the perspective beyond Wi-Fi to those that preceded it, this paper draws on the framework provided by Infrastructure Development Model (IDM), which delineates eight stages through which infrastructure networks (railroads, telegraph, telephone, and others) typically go through in their development, to study its emergence. 14

CLOUD COMPUTING

K. Kanmani, K. Divya, Mookambigai College of Engineering, ABSTRACT: Cloud computing is a better way to run your business. Instead of running your apps yourself, they run on a shared data center. The underlying concept of cloud computing dates back to 1960, when John Mc Carthy opined that "computation may someday be organized as a public utility"; indeed it shares characteristics with service bureaus that date back to the 1960s.The actual term "cloud" borrows from telephony in that telecommunications companies, who until the 1990s primarily offered dedicated point-to-point data circuits, began offering VIRTUAL PRIVATE NETWORK (VPN) services with comparable quality of service but at a much lower cost. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider from that of the user. Cloud computing extends this boundary to cover servers as well as the network infrastructure. Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure. Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using. ANDROID OS N. NIRMAL KUMAR, S.PRADEEP. TRICHY ENGINEERING COLLEGE. ABSTRACT: Android is a mobile operating system which is becoming a major competitor to iPhone OS in terms of openness. Android is a complete operating environment based upon the Linux V2.6 kernel. Initially, the deployment target for Android was the mobile-phone arena, including smart phones and lower-cost flipphone devices. However, Android's full range of computing services and rich functional support have the potential to extend beyond the mobile-phone market. Android can be useful for other platforms and applications. In this article, get an introduction to the Android platform and learn how to code a basic Android application.

15

THE LATEST MOBILE PHONE TECHNOLOGY M. R. PRAVEEN BABU, K. V. SUDHANANDHA KUMAR, Syed Ammal Engineering College. ABSTRACT: The latest mobile phone handsets provide a wide range of services and technology that allows the user to be as interactive as possible with the global community. These new mobile technologies offer the user accessibility to the worldwide web via WiFi connectivity, download and transfer large amounts of data via high speed connectivity and find a location via satellite with mobile Global Positioning Systems (GPS) devices. Todays mobile phones have now evolved to incorporate all types of online activity, here is a little breakdown of some of the latest technology to grasp the mobile market.

16

Best Compliments from,

SUJATHA STORES, No: 2, Cinthamani Market, Near Periyasamy Towers, Trichy - 620 002.

Ph. No: 04312700558