You are on page 1of 92

LIST OF PAPERS

PAGE
S.NO TITLE
NO.
EFFICIENT CLUSTERING ALGORITHM USING BIRCH
1 1
CLUSTERS
A VOLTAGE CONTROLLED DSTATCOM FOR POWER
2 2
QUALITY IMPROVEMENT
MONITORING AND CONTROLLING OF POWER LOSS IN
3 3
A TRANSFORMER
PERFORMANCE ASSESSMENT (DECEMBER TO
4 4
FEBRUARY ) OF 15KW SOLAR PHOTO VOLTAIC PLANT
EFFICIENT ENERGY CONSERVATION TECHNIQUE FOR
5 5
WSN
RELIABLE AND ENERGY EFFICIENT FOR STATIC
6 WIRELESS AD-HOC NETWORKS WITH UNRELIABLE 5
LINKS
JOINT ACCESS POINT AND USER LOCALIZATION
7 6
USING UNLABELED WIFI RSS DATA

THREE PHASE 19 LEVEL MODULAR MULTI LEVEL


8 6
INVERTER FOR RENEWABLE ENERGY RESOURCE

DETERMINANTS OF MOBILE BANKING ADOPTION


9 7
BEHAVIOR IN VELLORE DISTRICT, TAMIL NADU

A NEW RESONANT BIDIRECTIONAL DC–DC


10 7
CONVERTER TOPOLOGY
ANALYSIS AND TESTING OF COMPOSITE WALL
11 8
PANELS
AN EXPERIMENTAL INVESTIGATION ON SPLICING OF
12 REINFORCEMENT IN REINFORCED CONCRETE BEAM 9
BY BAR COUPLER
STUDY ON INFLUENCE OF PROFILES IN THE
13 BEHAVIOUR OF SHEAR 10
CONNECTORS
PAGE
S.NO TITLE
NO.

EXPERIMENTAL INVESTIGATION ON LOAD CARRING


14 10
CAPACITY OF COLD FORM STEEL BY VARING ANGLE.

COMPARISON OF FLEXURAL MEMBER WITH


15 11
COMPOSITE FLEXURAL MEMBER

SEAMLESS ACCESS INTERNET USING WI FI IN


16 12
DYNAMIC VEHICLES

NEIGHBOR ROUTING INFORMATION BASED


17 EFFICIENT PATH SELECTION IN WIRELESS SENSOR 13
NETWORK

LEAST SQUARE PREDICTION USING DIFFERENCE


18 14
EXPANSION REVERSIBLE WATERMARKING

PROTECT GIRLS – BEAST CAR: USER BEHAVIOR


PATTERN ANALYSIS FOR GIRLS PROTECTIVE
19 15
MECHANISM WITH EMERGENCY COMMUNICATION &
UNLOCKING SYSTEM
JOINT ACCESS POINT AND USER LOCALIZATION
20 USING 15
UNLABELED WIFI RSS DATA
LOSSLESS IMAGE COMPRESSION ALGORITHMWITH
21 JPEG 16
FROM SCALE-INVARIANT KEYPOINTS

LOGIC OPTIMIZING TRANSISTOR NETWORKS IN


22 16
COMBINATIONALCIRCUITS

MULTISPECTRALIMAGE RESTORATION
23 17
FOR IMAGE PAIR FUSION

HIGHLY ROBUST DOMAIN TRANSFORM


24 BASEDHEURISTICS WEIGHT 17
AGE METHOD FOR IMAGE
PAGE
S.NO TITLE
NO.

25 FLOOD DETECTION SYSTEM USING IOT 18

A MASSIVE MIMO TERMINAL CONCEPT BASED ON


26 18
SMALL SIZE MULTIMODE ANTENNA

LOW POWER CLOCK DISTRIBUTION USING CURRENT


27 19
PULSED CLOCKED FLIPFLOP

DG MOSFETS FOR ULTRA LOW POWER , LOW


28 VOLTAGE RFID IN SUPERVISORY 19
CIRCUITSIMPLEMENTEDWITHSOITECHNOLOGY

COMPLEXVIDEO OBJECT COSEGMENTATION FOR


29 20
IRRELEVANT FRAMES INVOLVED VIDEOS

GEO-SOCIAL DISTANCE-BASED DATA DISSEMINATION


30 20
FOR SOCIALLYAWARE NETWORKING

COMPUTATIONALLY EFFICIENT MARK COMPLETION


31 21
PRECODER FOR OFDM COGNITIVE RADIO

A CLUSTERING-BASED APPROACH FOR FINDING


32 COHERENT MOTIONS AND UNDERSTANDING CROWD 22
SCENES USING IMAGE PROCESSING
SECURITY IMPROVEMENT FOR IOT
33 COMMUNICATIONS 22
EXPOSED TO EAVESDROPPERS

A GSM BASED DRIP IRRIGATION SYSTEM FOR


34 23
AGRICULTURE LAND

IDENTIFYING THE ROBUST BLUR UNIQUE ID FROM


35 23
OVER SPEED VECHICLE

36 DC MOTOR CONTROL USING ARM WITH GSM 24


PAGE
S.NO TITLE
NO.

DESIGN AND IMPLEMENTATION OF HYBRID SOLAR


37 24
AND WIND CHARGER FOR DOMESTIC APPLIANCES

DESIGN AND IMPLEMENTAION OF SINGLE PHASE 31


38 LEVEL INVERTER USING 8 SWITCHES TOWARDS THD 25
REDUCTION

SMART REAL-TIME HEALTHCARE MONITORING AND


39 25
TRACKING SYSTEM USING GSM /GPS TECHNOLOGIES

IMPLIMENTATION OF SUPER FAST ELECTRONIC


40 26
CIRCUIT BREAKER

IMPLEMENTATION OF MICROCONTROLLER BASED


41 PROTECTION OF PWM CONTROLLER THREE-PHASE 26
INDUCTION MOTOR DRIVES

Z SOURCE NETWORK BASED SENSORLESS BLDC


42 27
MOTOR WITH FUZZY LOGIC BASED SPEED CONTROL

REAL-TIME PEDESTRIAN DETECTION AND TRACKING


43 27
AT NIGHTTIME FOR DRIVER ASSISTANCE SYSTEMS

IMPLEMENTATION OF HIGH VOLTAGE DC USING


44 28
CAPACITORS AND DIODES LADDER

IMPLEMENTATION OF AUTOMATIC FOREST FIRE


45 28
DETECTION AND CONTROL SYSTEM USING PIC
MICRO-CONTROLLER

MONITORING AND CONTROLLING OF GREEN HOUSE


46 29
GASES USING WIRELESS SENSOR NETWORK

ELECTRICITY GENERATION USING MICRO-


47 29
CONTROLLER BASED AUTOMATIC WASTE DISPOSER
PAGE
S.NO TITLE
NO.

DESIGNING OF THREE WINDING COUPLED


48 INDUCTOR BASED STEP UP CONVERTER FOR 30
RENEWABLE ENERGY

A BL-CSC CONVERTER–FED BLDC MOTOR DRIVE


49 30
WITH POWER FACTOR CORRECTION

WIRELESS CHARGING SYSTEM FOR PORTABLE


50 31
DEVICE USING INDUCTIVE COUPLING

IMPLEMENTATION OF MICRO CONTROLLER BASED


51 31
SOLAR CELL CAR

BOOST - DERIVED HYBRID CONVERTER WITH


52 32
SIMULTANEOUS DC AND AC OUPUTS

VOLTAGE STABILITY IN LARGE MARINE INTEGRATED


53 32
POWER SYSTEMS USING DQ BASED INJECTION

SECURITY ENHANCED SIMPLEX COMMUNICATION


54 AND CONTROL VIA 33
DC MICRO GRIDS

DC MICROGRID OPERATING MODES WITH LOAD


55 34
BALANCE AND ENERGY STORAGE

REAL-TIME TEMPERATURE ESTIMATION AND FAULT


56 MITIGATION 35
DUE TO THERMAL RUN AWAY

VARIABLE LOAD-DAMPING COEFFICIENT FOR


57 36
INDUSTRIAL VOLTAGE-SENSITIVE LOAD

POWER SYSTEM STABILITY IN HVDC TRANSMISSION


58 36
LINKS USING ICA

REDUCED NUMBER A SINGLE – PHASE CASCADED


59 MULTILEVEL INVERTER BASED ON A NEW BASIC 37
UNIT WITHOF POWER SWITCHES
PAGE
S.NO TITLE
NO.

A NEW RESONANT BIDIRECTIONAL DC–DC


60 37
CONVERTER TOPOLOGY

61 PFC CUK CONVERTER-FED BLDC MOTOR DRIVE. 37

THREE PORT DC –DC CONVERTER FOR STAND-ALONE


62 38
PHOTO VOLTAIC SYSTEMS

INDIVIDUAL MINING AND PREDICTION OF PATTERNS


63 38
FOR IMPROVING MOBILE COMMERCE

SURVEY ON CLOUD COMPUTING: BIG DATA


64 39
CONCEPT, PRIVACY AND PROTECTION

META-ANALYSIS OF GENOMIC DATA: BETWEEN


65 40
STRENGTHS, WEAKNESSES AND NEW PERSPECTIVE

A SECURED APPROACH TO CREDIT CARD FRAUD


66 41
DETECTION USING HIDDEN MARKOV MODEL

A SURVEY ON INTRUSION DETECTION SYSTEM USING


67 42
ANDROID SPY

A SURVEY ON HONEYPOT AS AN INTRUSION


68 43
DETECTION SYSTEM ABSTRACT

KEY BASED POLICY FOR SECURE DATA


69 44
DISTRIBUTION OVER THE CLOUD

CREATING THE JOY OF SIGHT FOR THE BLIND BY


70 45
ARTIFICIAL INTELLIGENCE

HANDOFF SCHEMES FOR WIMAX/WLAN NETWORKS


71 46
WITH QOS
PAGE
S.NO TITLE
NO.

A INSPECTION ON WIRELESS SENSOR NETWORKS


72 46
RESTRAIN TECHNIQUES

AN ENHANCED GROUP MOBILITY PROTOCOL BASED


73 47
WIRELESS BODY AREA NETWORKS

FACE LIVE DETECTION METHOD BASED ON


74 47
PHYSIOLOGICAL MOTION ANALYSIS

DEVELOPMENT OF HUMAN MOBILITY TRACKING


75 48
SYSTEM FOR ANDROID BASED DEVICES

DATA MINING FOR SENTIMENT ANALYSIS IN SOCIAL


76 49
MEDIA

DEVELOPMENT OF HOP BY HOP COMPUTING FOR


77 50
GREEN INTERNET ROUTING

DEVELOPMENT OF P3-EFFICIENT PRIVACY POLICY


78 ON USER-UPLOADED IMAGES ON CONTENT SHARING 51
SITES

DEVELOPING A DISCOVERY OF RANKING FRAUD


79 52
DETECTION SYSTEM FOR MOBILE APPS

IMPLEMENTATION OF INFORMATION HIDING


80 53
TECHNIQUE FOR MOBILE DEVICES

IMPLEMENTATION OF CUSTOMER DATA


81 54
CLUSTERING USING DATA MINING

TRIBOLOGICAL ANALYSIS OF ALUMINIUM (LM4)


82 COMPOSITES 54
REINFORCED WITH ALUMINA PARTICULATES

REVERSE ENGINEERING USING COORDINATE


83 55
MEASURING MACHINE
PAGE
S.NO TITLE
NO.

IMPROVEMENT OF SPRING FATIGUE STRENGTH BY


84 55
SHOT PEENING AND NITRIDING PROCESS

LI-FI(LIGHT FIDELITY) THE FUTURE TECHNOLOGY IN


85 56
WIRELESS COMMUNICATION

86 A STUDY ON HUMAN RESOURCE AUDIT 56

87 A STUDY ON TRAINING AND DEVOLOPMENT 57

A STUDY ON GRIEVANCES HANDLING PROCEDURE


88 58

A STUDY ON ORGANIZATION OVERVIEW BRAND


89 59
AWARENESS IN COMPETITIVE MARKET

A STUDY ON THE REWARDS AND RECOGNITION OF


90 60
EMPLOYEE

91 A STUDY ON ANALYSIS OF CASH MANAGEMENT 61

A STUDY ON EMPLOYEE ATTITUDE TOWARDS WAGES


92 61
AND SALARY ADMINISTRATION

93 A STUDY ON DIGITAL MARKETING 62

94 A STUDY ON EMPLOYEE RETENTION 63

95 A STUDY ON EMPLOYEE MOTIVATION 64


PAGE
S.NO TITLE
N6O.

A STUDY ON WORK SCHEDULING AND COST


96 65
MANAGEMENT USING PRIMAVERA SOFTWARE

97 A STUDY ON CAREER PLANNING & DEVELOPMENT 66

98 A STUDY ON EMPLOYEE WELFARE 66

A STUDY ON EMPLOYEE RELATIONSHIP


99 67
MANAGEMENT

100 A STUDY ON MANUFACTURING COST 68

101 A STUDY ON STRESS MANAGEMENT 69

102 A STUDY ON FINANCIAL LEVERAGE 70

A STUDY ON ONLINE TELECOM CUSTOMER SERVICE


103 71
SYSTEM

104 A STUDY ON JOB ANALYSIS 72

105 A STUDY ON EMPLOYEE ENGAGEMENT 72

106 A STUDY ON PERFORMANCE APPRAISAL SYSTEM 73

107 A STUDY ON EMPLOYEE ABSENTEEISM 74


PAGE
S.NO TITLE
NO.

108 A STUDY ON CONSUMER SATISFACTION 74

109 A STUDY ON EMPLOYEE STATIFICATION 75

110 A STUDY ON RECRUITMENT & SELECTION 76

111 A STUDY ON WORKING CAPITAL MANAGEMENT 77


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

EFFICIENT CLUSTERING ALGORITHM USING BIRCH CLUSTERS


G.Abdulkalamazad, Dr.J.Jeba Emilyn M.E., Ph.D.
Department of Information Technology
Sona College of Technology, Salem.

ABSTRACT
The search for useful patterns in large data sets has recently attracted considerable
interest, and one of the most common problems in this area is the identification of clusters or
densely populated regions in a multidimensional data set. Premature work does not
adequately address the problem of large data sets and minimize 1/0 costs. Clustering is a
widely used technique in data mining. At present, there are many clustering algorithms, but
most existing clustering algorithms are either limited to handle the single attribute or can
handle both types of data, but are not efficient when clustering large data sets. Only a few
algorithms can do both well. Clustering is the process of grouping of data, where the
grouping is established by finding similarities between data based on their characteristics.
Such groups are termed as Clusters. A comparative study of clustering algorithms across
different data items is performed here. The performance of the various clustering algorithms
is compared based on the time taken to form the estimated clusters. The experimental results
of various clustering algorithms to form clusters are depicted as a graph. Thus it can be
concluded as the time taken to form the clusters increases as the number of cluster increases.
The BIRCH clustering algorithm takes very few seconds to cluster the data items whereas the
simple KMeans takes the longest time to perform clustering. The experimental results suggest
that the BIRCH algorithm is effective when compared to k-means algorithm.The results show
that the BIRCH algorithm is efficient and produces better quality of clusters.
Keywords – Clustering, Clustering algorithms, K-means, BIRCH (Balanced Iterative
Reducing and Clustering using Hierarchies)

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 1


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A VOLTAGE CONTROLLED DSTATCOM FOR POWER QUALITY


IMPROVEMENT

Mahesh K. Mishra

ABSTRACT
This paper proposes a new algorithm to generate reference voltage for a distribution
static compensator (DSTATCOM) operating in voltage-control mode. The proposed scheme
exhibits several advantages compared to traditional voltage-controlled DSTATCOM where
the reference voltage is arbitrarily taken as 1.0 p.u. The proposed scheme ensures that unity
power factor (UPF) is achieved at the load terminal during nominal operation, which is not
possible in the traditional method. Also, the compensator injects lower currents and,
therefore, reduces losses in the feeder and voltage-source inverter. Further, a saving in the
rating of DSTATCOM is achieved which increases its capacity to mitigate voltage sag.
Nearly UPF is maintained, while regulating voltage at the load terminal, during load change.
The state-space model of DSTATCOM is incorporated with the deadbeat predictive
controller for fast load voltage regulation during voltage disturbances. With these features,
this scheme allows DSTATCOM to tackle power-quality issues by providing power factor
correction, harmonic elimination, load balancing, and voltage regulation based on the load
requirement. Simulation and experimental results are presented to demonstrate the efficacy of
the proposed algorithm

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 2


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

MONITORING AND CONTROLLING OF POWER LOSS IN A TRANSFORMER


Ms.R.Srilekha, Mrs.R.Rajeswari,M.Tech,(Ph.D)
M.E(Power System Engineering)
Priyadarshini Engineering College,vaniyambadi.

ABSTRACT
In this paper, power transformer has to keep the temperature within limits according
to international agreement standards. Two of the limits are a maximum temperature rise and
a maximum oil temperature. The main purpose of this study was to learn about the
temperature distributions and oil velocity inside the coil of the power transformer and to
model and develop a program using MATLAB that can modulate the suitable parameter that
not exceeds maximum temperature rise in disk coil transformer. Two methods have been
used to study the velocity and temperature parameters affecting the oil flow through the
transformer. The first approach focused on equation derived from previous worked about oil
flow and temperature distribution. The second approach was to handle the problem as a
global optimization problem solved by numerical methods. The optimization was done
using predictions from a program used for velocity and temperature calculation. The
numerical method result was successful; on all the designs tested. It gave a lower
temperature rise value according to international agreement standards. The study has shown
that a geometrical detail approach provided for better design solutions in reasonable time
and therefore it has shown its potential for practical use. Both the methods could be
combined and used for further investigation. Large power transformers belong to the most
valuable and important assets in electrical power systems. The ageing of the used oil/paper-
insulation primarily depends on the hot-spot temperature of the solid insulation system.
Hence it is the dominant factor limiting the lifetime of the transformer. Therefore a
prototype of a stand alone thermal monitoring system was developed and installed on a 350
MVA transformer to observe the hot-spot temperature. The experiences of successfully
operation during the last years encouraged us to update the system to the newest stage. The
paper describes the state-of-the-art of the thermal transformer monitoring system based on
new field bus technology The advantages of a networked system and the usage of a
centrally managed data base shared between multiple monitoring systems are exposed. The
intention to implement new features exceeding the conventional monitoring system
philosophy is discussed on an intelligent multifunction criteria Fuzzy algorithm for the
control of fans of the heat exchanger units. It permits a more cost-effective long-time
transformer operation management.

Keywords: power transformer, numerical methods, Matlab, oil cooling.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 3


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

PERFORMANCE ASSESSMENT (DECEMBER TO FEBRUARY ) OF 15KW SOLAR


PHOTO VOLTAIC PLANT

B.Vijay, C.Bhuvaneswari,
Priyadarshini Engineering College, Vaniyambadi,

ABSTRACT

The objective of this paper is to assess the performance of 15KW solar power plant
installed in Priyadarshini Engineering College (PEC) campus, Vaniyambadi, Vellore District,
Tamil Nadu. A 15 KW solar PV plant is installed on the library roof top building in PEC and
the load is connected to internet laboratory, library (Lighting Load). The total capacity of the
plant is 15kW. There are 60 solar PV panels each one can produce 250 Watts, 24V capacity.
Sun is the main source of energy which convert light energy to electrical energy without
using of additional energy. This electrical energy can be stored in battery for their utilization
during the change of climate.The performance characteristics can be assess from 9.00AM to
4.30PM for 6days a week from Monday to Saturday(Dec-Feb2016) and the characteristics
has been plotted in graph. The graph is drawn between Generated power vs consumed power.
Key words: Off grid connected SPV System,solar photovoltaic energy.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 4


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

EFFICIENT ENERGY CONSERVATION TECHNIQUE FOR WSN

G.Yazhini
Department of Communication system,
Varuvan Vadivelan Institute Of Technology College, Dharmapuri, Tamilnadu, India.

ABSTRACT
In recent years, the main research challenge is the issues in wireless sensor networks
(WSN). Energy conservation and coverage of the sensor nodes considered as major metrics
for the long time survival of sensor networks. In this paper work, proposed an efficient
energy conservation routing technique for WSN. Furthermore, in this proposed routing
technique, two algorithms developed. Namely, Selectively Turning ON/OFF the Sensors
(STOS) and Ongoing Routing Table (ORT). Moreover, in STOS, the sensor nodes divided
into several sets of scheduling modes (active, standby, hibernate) and let them to perform
alternatively, by which conserves extra energy. Consequently, in ORT Ongoing (up to date)
data maintained to update and know the detailed information regarding mobile sensor nodes
including the factors such as hop count, residual energy (current energy level), threshold
energy with the status of the sensor nodes. In connection with ORT, the next sensor node will
identified for forwarding the information. Herein concentrated on dynamic network, where
all the deployed sensor nodes are in-mobile except base station (BS) or sink node.
Nevertheless, the absence or failure of BS, nearest mobile sensor node to the BS will act as
BS. Provided, Simulation result shows that the proposed technique will be enough competent
for maximizing the energy conservation.
Key words: Wireless Sensor Networks (WSN) Ongoing Routing Table (ORT).

RELIABLE AND ENERGY EFFICIENT FOR STATIC WIRELESS AD-HOC


NETWORKS WITH UNRELIABLE LINKS
Ms.S.AADHITHYA [1] Mrs. C.THAMIARASI. [2]
ABSTRACT
The aim of this work is to reduce the energy consumed by processing elements of
transceivers and limit the number of retransmissions allowed per packet sizes and to consider
the impact of acknowledgment packets. We propose two novel energy-aware routing
algorithms for wireless ad hoc networks called reliable minimum energy cost routing
(RMECR) and reliable minimum energy routing (RMER). RMECR addresses three important
requirements of ad hoc networks energy efficiency, reliability, and prolonging network
lifetime. It considers the energy consumption and the remaining battery energy of nodes as
well as quality of links to find energy-efficient and reliable routes that increase the
operational lifetime of the network. RMER, on the other hand, is an energy-efficient routing
algorithm which finds routes minimizing the total energy required for end to end packet
traversal. RMER and RMECR are proposed for networks in which either hop-by-hop or end-
to-end retransmissions ensure reliability.
Keyword: Energy-aware routing, battery-aware routing, end-to-end and hop-by-hop
retransmission, reliability.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 5


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

JOINT ACCESS POINT AND USER LOCALIZATION USING


UNLABELED WIFI RSS DATA
Almas.B Krishnan.S
ABSTRACT

This paper investigates the problem of joint estimation of a pedestrian user


path and the available WiFi access point locations. The observations are limited to
unlabeled WiFi received signal strength (RSS) values. The problem is formed as a partially
observable Markov decision process and RSS gradients are integrated to estimate and
update the user locations along the path. The RSS data is modeled as a Gaussian process and
gradient vectors are updated for each step based on the motion dynamics. Realistic
assumptions and constraints are introduced to model the user’s movement and reduce
the computational complexity.

THREE PHASE 19 LEVEL MODULAR MULTI LEVEL INVERTER FOR


RENEWABLE ENERGY RESOURCE

Mr.M.Selvaperumal, Dr.D.Kirubakaran Mr.M.Sankarganesh


Priyadharshini Engineering College,
St.Joseph’s Institute of technology Chennai.
ABSTRACT

Generation of electricity from renewable energy sources like wind, sun, fuel cell,
biomass etc., are increased day by day due to the increase in demand. To interface these
green energy sources with the utility grid, power electronics based converter is needed. In
this article 19 level modular multilevel converter is used and each inverter use DC as its
source. This DC source can be obtained from photovoltaic cell.The proposed 19 level
modular multi Level Inverter (MMI) can be switched on either for 50 HZ or for 60 Hz
frequency. The proposed system is investigated using MATLAB/Simulink environment.
The results proven that there is an increase in the RMS value of output voltages, so total
required Volt Ampere ratings of the inverters is reduced greatly over wide load conditions.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 6


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DETERMINANTS OF MOBILE BANKING ADOPTION BEHAVIOR IN VELLORE


DISTRICT, TAMIL NADU

K. Srinivasan 1 and Dr. S. Srividhya 2


Department of Management Studies,
Priyadarshini Engineering College,Vaniyambadi (V D),
Anna University Regional Centre, Maruthamalai Main Road,
Navavoor, Coimbatore, Tamilnadu, India.
ABSTRACT
The intention of this paper is to explore factors affecting mobile banking (m-banking)
adoption behavior consumers. Data were collected through survey of mobile banking users. A
total of 300 utilizable cases were collected from m-banking users. Review of previous
literature has been analyzed to identify the various factors. The researchers used purposive
sampling technique, to analysis the data statistical tools data exploratory factor analysis and
multiple regression analysis were used. The study provides a complete understanding of the
factors which affect m-banking adoption behavior of consumers which may help banks to
understand consumer intention and make strategy accordingly to ensure financial inclusion.
Keywords: M-banking, Adoption Behaviour.

A NEW RESONANT BIDIRECTIONAL DC–DC CONVERTER TOPOLOGY


Ross P. Twiname Duleepa J. Thrimawithana
ABSTRACT

This paper presents a new resonant dual active bridge (DAB) topology, which uses a
tuned inductor-capacitor-inductor (LCL) network. In comparison to conventional DAB
topologies, the proposed topology significantly reduces the bridge currents, lowering both
conduction and switching losses and the VA rating associated with the bridges. The
performance of the DAB is investigated using a mathematical model under various operating
conditions.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 7


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

ANALYSIS AND TESTING OF COMPOSITE WALL PANELS

Mr.D.Alaguraj
Department of Civil Engineering
P.S.V College of Engineering and Technology

ABSTRACT

Sandwich construction has become so widespread in buildings, and its


development is being pressed hard by so many diverse organizations that it is difficult to keep
in touch with current progress. Composite sandwich panels are incredibly useful materials to
form strong lightweight structures used in everyday life. In modern times sandwich panels
tend to replace the conventional wall and roof elements. This is more so since their capacity
to insulate thermally and being sound proof than any other conventional materials in spite of
their relatively higher cost. The objective of the study is to investigate the behaviour of wall
panels subjected to point load and uniformly distributed load by both analytically and
experimentally. In analytical investigation is to be carried out by linear finite element
modelling in SAP2000. The sandwich panel is compared with conventional brick masonry
and concrete wall elements. Based on the displacement values the stiffness of the various
materials subjected to the two loading conditions are found and the principal stress values of
each model were studied. The stiffness variation is very less when the load reaches to the
core material (polyurethane foam) which carries only less load. Hence it is advisable to use
sandwich panel as wall panel / infill in practice which leads to reduce the self-weight,
increase in strength, more elegant, faster construction, and reduces the plastering work
(labour and material) cost.
Keywords: Sandwich construction, conventional wall, strong lightweight structures, two
loading conditions.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 8


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

AN EXPERIMENTAL INVESTIGATION ON SPLICING OF REINFORCEMENT


IN REINFORCED CONCRETE BEAM BY BAR COUPLER

Mr. B.Annadurai
Department of Civil Engineering
P.S.V College of Engineering and Technology

ABSTRACT

Reinforced cement concrete is the concrete with certain percentage of steel


reinforcement embedded in it. This reinforcement is provided mainly to take care of the
tensile stresses developed in the member. Reinforcement also limits the size of cracks in
concrete due to shrinkage and temperature variation. Splicing of reinforcement bars in R.C
members since the manufacturing length of reinforcement bar is 12m only in the market does
not suit always to the exact dimensions of the members. The common types of splices
adopted are lap splice and welded splice. The lapped joints are not always an appropriate
means of connecting reinforcing bars. The use of laps can be time consuming in terms of
design and installation and can lead to greater congestion within the R.C member because of
the increased amount of rebar used. The cost of reinforcement also increased. The cost of
reinforcement can be reduced and increase the load carrying capacity of RCC beam by using
coupler to join the end of reinforcement. The investigation reported in this paper was carried
out the behavior of splicing of reinforcement by bar coupler in beam. Test the flexural
strength of M25 grade coupler reinforced concrete beam. The mix proportions of M25 grade
concrete are designed by using Indian standard method and Fe 415 grade steels are used.
Two numbers of RC beams casted (conventional lap and coupler reinforcement) for flexural
strength test. The results showed that comparison of the flexural strength of conventional lap
RC beam and coupler reinforced beam and analysis of cost of reinforcement. Comparison
between conventional RCC beam and bar coupler used RCC beam. Tensile strength of
coupler used reinforcement bar. Ultimate load carrying capacity of conventional RCC beam.
Ultimate load carrying capacity of bar coupler used RCC beam is analyzed in phase-II
project work.

Key words: splicing, bar coupler, Mechanical Splice, Reinforcing Bar, RCC beam

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 9


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

STUDY ON INFLUENCE OF PROFILES IN THE BEHAVIOUR OF SHEAR


CONNECTORS
Mrs.K.Karthiga
Department of Civil Engineering
P.S.V College of Engineering and Technology
ABSTRACT

Shear connectors are used in steel-concrete interface of composite beams to


transfer the longitudinal shear force. The part that ensures the transfer of shear in the steel-
concrete interface is generally termed as shear connector. This paper presents an analytical
and experimental verification of behaviour of various shear connectors. Various shear
connectors such as Channel, Angle, Z and Tee sections with welded connection are tested.
Finite element models are analyzed using ANSYS and the same is validated by experiments.
Totally 8 specimens are tested under monotonic loading. The failure is found either due to
split failure or concrete-crush failure. The shear capacity of the connections, failure mode and
ductility are analyzed and discussed. Concrete cracks are noticed in the specimen after the
failure of shear connectors. The obtained results are compared with those suggested by the
design codes.
Key words: Shear connectors, Channel, Angle, Z and Tee sections, ANSYS.

EXPERIMENTAL INVESTIGATION ON LOAD CARRING CAPACITY OF COLD


FORM STEEL BY VARING ANGLE.
Ms.R.Varalakshmi
Department of Civil Engineering
P.S.V College of Engineering and Technology
ABSTRACT
The use of cold formed steel structures is increasing throughout the world as they are
efficient in terms of stiffness and strength. The use of thinner sections and high strength steel
leads to design problems for structural engineers which may not normally encountered in
routine structural steel design. Structural instability of the section is more likely to occur. To
improve their strength and to eliminate local buckling of web elements, trapezoidal
corrugated web is designed. the beam models having angle of corrugation varies from 15°,
30°, 45°, 60°, and the other parameters such as length of span (3000mm), flange width
(100mm), thickness of flange (2mm), thickness of web (1.2mm), lip size (15mm) , depth of
web (300) are kept constant. Using a finite element package ANSYS all beams having
various angle of corrugation were designed and analyzed. Non linear analysis was carried
out. From the analysis critical load was calculated by using the Load Vs Deflection curve.
Theoretical analysis and design are carried out by North American Specification of cold
formed structural steel members AISI S100:2008 the results from numerical & Theoretical
investigation were compared and presented.

Key words: Cold formed steel, Trapezoidal corrugated web, ANSYS.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 10


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

COMPARISON OF FLEXURAL MEMBER WITH COMPOSITE FLEXURAL


MEMBER
Mr. P.B.Vigneshwaran
Department of Civil Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This paper deals with comparison of flexural member and composite flexural
member. Comparison deals with a property can equally adopting and evaluating both flexural
member and composite flexural member. In structural field having strength and stability can
attained by natural and or some artificial methods. Whereas all structural properties will be
obtained by laboratory experiments to flexural member and composite flexural member. To
compare a laboratory data and analyse technically to ensure a better component to compare
both flexural member and composite flexural member. It can clearly explains the structural
difference and ability from composite flexural member (composite construction using both
concrete and steel) to reinforced cement concrete flexural member. Currently India does not
use large amount of steel in construction industry to compare too many other developing
country. There is great potential for increasing the volume of steel in construction, especially
in the current development needs India and not using steel as an alternative construction
material and not using it where it is economical is a heavy loss for the country. Normal RCC
construction and steel structure having its normal structural stability, were it is make
composite gives ultimate results. Composite construction is not famously adopted in India as
a developing country because, lack of awareness. So this paper deals with creating clear
awareness to composite construction and explains difference between flexural member and
composite flexural member by comparison.

Keywords:
Comparison, Flexural Member, Composite Flexural Member, Structural Engineering

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 11


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

SEAMLESS ACCESS INTERNET USING WI FI IN DYNAMIC VEHICLES


Kiruthika A.M 1,Chandra Sekran .S 2
Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

In wireless communication, the connections will be either unstable or dynamic. Hence


the connections will be easily disturbed by the interrupts like noise. Now-a-days mobile
networks provide the internet connections with expensive cost. Cellular networks suffer from
offloading and overloading problem due to the explosive growth of mobile users in moving
vehicles. WIFI technology is used to provide the efficient internet connectivity for the
moving vehicles. WIFI technology has some advantages compared with the cellular
networks, such as, low cost and high peak throughput. To avoid the offloading problem and
delays in the internet access over moving vehicles, the access point diversity technique is
used. For example multiple access points can be fixed in the road side. When the client can
enters that environment, it can communicate with the group of access point through the up
link. Each access point may have different ranges. So, when the client is moving from one
access point to another access point, the delays may be occurred due to the hand off
technique. Hence the virtual access point is created in order to avoid the delays. Virtual
access point is the one, in which all the access points are configured with the same MAC and
IP address. If the transmission is succeed access point send the information to the client
through the multi cast communication. Then the access points dynamically follow the client
and deliver the packets.

Keywords: Acknowledgment, Detection, Internet access,Vehicle, WI FI

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 12


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

NEIGHBOR ROUTING INFORMATION BASED EFFICIENT PATH SELECTION


IN WIRELESS SENSOR NETWORK
Vigneshwari.S, Prakash Narayanan .C
Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

In Mobile Adhoc Network, routing is a difficult task and it is an important research


area of work due to its unpredictable network topology changes. The challenging task is to
make the wireless network communication as best as the wired ones. Routing could be made
efficient by knowing the topological information of the wireless network and thus the packets
can be transmitted efficiently which results in high packet delivery ratioThe shortcut tree
routing is fully distributed and compatible with ZigBee standard in which it utilizes the
addressing scheme and neighbor table without any changes of specification. The
mathematical analysis proves that the 1-hop neighbor information improves overall network
performances by providing an efficient routing path and distributing the traffic load
concentrated on the tree links. In the performance evaluation, we show that the shortcut tree
routing achieves the comparable performance to AODV with limited overhead of neighbor
table maintenance as well as overwhelms the ZigBee tree routing in all the network
conditions such as network density, network configurations, network traffic and the traffic
type.

Key words: ZigBee, tree routing, shortcut tree routing (STR), neighbor table,
MANET, WSN, IEEE 802.15.4

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 13


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

LEAST SQUARE PREDICTION USING DIFFERENCE EXPANSION REVERSIBLE


WATERMARKING
Indhupriya. D Sakthivel. B
Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The security and authenticity issues of images are becoming popular then ever, due to
the rapid growth of multimedia and internet technology For many cases, the delivered
information may contain secret image such as confidential personal information, military
satellite images, etc. The mainstay of this project is to investigate the use of the least square
prediction in different expansion reversible watermarking for hiding secret image. Reversible
watermarking not only extracts the embedded data from the watermarking but also retrieve
exactly the original image from that watermarking without any distortion. For each pixel least
square predictor is computed on square blocks.
The proposed system is to hide two secret images, when an Image is sent to un trusted
third parties, the image should not be visible. The original secret image is accessed only by
trusted parties by using least square prediction method .The result of least square prediction
is to provide quality such as reduction in image distortion , improvement in quality and
efficiency .In this paper, a set of basic pixels is employed to improve the prediction accuracy,
thereby increasing the payload. To further improve the image quality, a threshold is used to
select only low-variance blocks to join embedding process.

Key Words: Reversible watermarking, difference expansion, adaptive prediction, least


square predictors.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 14


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

PROTECT GIRLS – BEAST CAR: USER BEHAVIOR PATTERN ANALYSIS FOR


GIRLS PROTECTIVE MECHANISM WITH EMERGENCY COMMUNICATION &
UNLOCKING SYSTEM
Suganya Prakash Narayanan . C
Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

In the existing system, Unfortunately, most smart phone users tend to choose simple
and weak pass codes for the sake of convenience and memorability, In the proposed system,
investigates the reliability and applicability on the usage of users’ touch-interaction behavior
for active authentication on smart phones. Smartphone users have their own unique
behavioral characteristics when performing touch operations. These personal characteristics
are reflected on different rhythm, strength, and angle preferences of touch interaction
behavior. Android Application is developed in which user’s Hand Waving Pattern is recorded
& Stored as User’s Pattern. We are using SVM Algorithm for User Identification.
MODIFICATION of the project which is our implementation, is same waving pattern is used.
We deploy three applications based on the android device mobility pattern. 1st one is normal
phone unlocking, 2nd is Girls / children safety application, 3rd is Emergency support to the
user. Girl’s safety / emergency Pattern is matched both GPS & Camera are initiated to fetch
Location and Photos. Voice is Recorded and uploaded to the Server. Both GPS & Audio Link
are sent as SMS Alert to both Police & Guardian.

JOINT ACCESS POINT AND USER LOCALIZATION USING


UNLABELED WIFI RSS DATA
Mrs.B.Almas Mr.S.Krishnan,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT

This paper investigates the problem of joint estimation of a pedestrian user path
and the available Wi-Fi access point locations. The observations are limited to unlabeled
Wi-Fi received signal strength (RSS) values. The problem is formed as a partially observable
Markov decision process and RSS gradients are integrated to estimate and update the
user locations along the path. The RSS data is modelled as a Gaussian process and gradient
vectors are updated for each step based on the motion dynamics. Realistic assumptions and
constraints are introduced to model the user’s movement and reduce the computational
complexity.
Keywords: Personal Management, Evaluation, Effectiveness, Verification Activities,
External Consultant.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 15


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

LOSSLESS IMAGE COMPRESSION ALGORITHMWITH JPEG


FROM SCALE-INVARIANT KEYPOINTS
Mrs.B.Veni Mrs.C.Thamilarasi,M.E.,

Department of Electronics and Communication Engineering


P.S.V College of Engineering & Technology
ABSTRACT
The explosion of digital photos has posed a significant challenge to photo storage and
transmission for both personal devices and cloud platforms. In this paper, we propose a novel
lossless compression method to further reduce the size of a set of JPEG coded correlated
images without any loss of information. The proposed method jointly removes inter/intra
image redundancy in the feature, spatial, and frequency domains. For each collection, we first
organize the images into a pseudo video by minimizing the global prediction cost in the
feature domain. We then present a hybrid disparity compensation method to better exploit
both the global and local correlations among the images in the spatial domain. Furthermore,
the redundancy between each compensated signal and the corresponding target image is
adaptively reduced in the frequency domain. Experimental Results demonstrate the
effectiveness of the proposed lossless compression method. Compared to the JPEG coded
image collections, our method achieves average bit savings of more than 31%.

LOGIC OPTIMIZING TRANSISTOR NETWORKS IN


COMBINATIONALCIRCUITS
S.Renuka
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
Transistor network optimization represents an effective way of improving VLSI
circuits. The number of transistors required for implementing a logic function is an essential
consideration in digital VLSI design. While the generation of a series-parallel network can be
straightforward once a minimized Boolean expression is available, this may not be an
optimum solution. This paper proposes a graph-based algorithm for minimizing the number
of transistors that compose a network. This method is able to automatically generate networks
with minimal transistor count, starting from an irredundant sum-of-products expression as the
input.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 16


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

MULTISPECTRALIMAGE RESTORATION
FOR IMAGE PAIR FUSION
M.Anitha
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
The full dynamic range of a real world scene is generally much large than that of the
sensing devices used to capture it, as well as the imaging devices used to reproduce it. When
a large dynamic range must be processed using a limited range device, one is forced to split
the dynamic range into several smaller “strips”, and handle each of them separately. This
process produces a sequence of images of the same scene, covering different portions of the
dynamic range. When capturing a high dynamic range (HDR) scene, the sequence is obtained
by varying the exposure settings of the sensor. When reproducing an HDR scene, the
sequence is obtained by splitting the full range of the image into several sub-ranges, and
displaying each separately.

HIGHLY ROBUST DOMAIN TRANSFORM BASEDHEURISTICS WEIGHT


AGE METHOD FOR IMAGE
G.Kalaivani, Mr.B.Ramesh,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
We proposed weighted average Fourier domain approach, with accumulated weights
in Fourier spectrum magnitude for kernel estimation and to solve an inverse problem of
image deconvolution.In most cases the main inconvenience of tackling this problem as a de-
convolution and high computational burden, since the convolution model is not accurate or
the kernel is not accurately estimated, the restored image will contain strong artifacts.
Numerous recent approaches attempt to remove image blur due to camera shake, either with
one or multiple input images, by explicitly solving an inverse and inherently ill-posed de-
convolution problem. If the input takes a burst of images, which is generic in all modern
digital cameras, we show that it is possible to combine them to get a clean sharp version. This
is done without explicitly solving any blur estimation and subsequent inverse problem.
Experiments with real time input data, we proved that the proposed Fourier burst
accumulation algorithm achieves state of-the-art results an order of magnitude faster and
yields better MSE and PSNR quality metrics..

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 17


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

FLOOD DETECTION SYSTEM USING IOT


Mrs.M.Padmavathi Mr.B.Ramesh,M.E., Mrs.S.Gayathri,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
This project a forecasting model designed using WSNs (Wireless Sensor
Networks) to predict flood in rivers using simple and fast calculations to provide real-time
results and save the lives of people who may be affected by the flood. Our prediction model
uses multiple variable robust linear regression which is easy to understand and simple and
cost effective in implementation, is speed efficient, but has low resource utilization and yet
provides real time predictions with reliable accuracy, thus having features which are desirable
in any real world algorithm. Our prediction model is independent of the number of
parameters, i.e. any number of parameters may be added or removed based on the on-site
requirements. When the water level rises, we represent it using a polynomial whose nature is
used to determine if the water level may exceed the flood line in the near future. We compare
our work with a contemporary algorithm to demonstrate our improvements over it. Then we
present our simulation results for the predicted water level compared to the actual water level.

A MASSIVE MIMO TERMINAL CONCEPT BASED ON


SMALL SIZE MULTIMODE ANTENNA

Mrs.M.Sowmiya Mrs.E.Punitha,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT

In this project present a concept for a compact ultra-wideband multi element antenna
(MEA) for massive MIMO indoor base stations. The antenna concept is based on the
simultaneous excitation of different characteristic modes on each element of the MEA. This
enables an effective 484 port antenna using only 121 physical antenna elements. Thereby, a
size reduction of 54%compared to a generic MEA based on crossed dipoles is achieved. The
antenna operates in the ultra-wide frequency band of 6–8.5 GHz with a reflection coefficient
of sii < −10 dB and the inter element and intra element mutual coupling of the antenna ports
is sji ≤ −20 dB.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 18


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

LOW POWER CLOCK DISTRIBUTION USING CURRENT PULSED


CLOCKED FLIPFLOP

Ms.M.Bhuvana Priya
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT

Portable electronic device times which can only be obtained by utilizing low-power
require long battery life components. Recently, low-power design has become quite critical in
synchronous application specific integrated circuits (ASICs)and system-on-chips (SOCs)
because interconnect in scaled technologies is consuming an increasingly significant amount
of power. Researchers have demonstrated that the major consumers of this power are global
buses, clock distribution networks.

DG MOSFETS FOR ULTRA LOW POWER , LOW VOLTAGE RFID IN


SUPERVISORY CIRCUITSIMPLEMENTEDWITHSOITECHNOLOGY
Ms.S.Mohanamathi Mrs.A.Saranya,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
The reasons why state-of-the-art vertical bipolar circuits dissipate very high power
are explained. The recent advent of SOI symmetric lateral bipolar transistors invites us to
rethink bipolar as a high-speed but low-power technology. Integrated Injection Logic (I2 L)
and complementary bipolar (analogous to CMOS) circuits in SOI lateral bipolar offer huge
design windows for power versus performances trade-off, suggesting the possibility of ultra-
low-power systems with embedded high-speed cores. I2L SRAM cells could be more than
twice as dense as CMOS SRAM cells. The SOI substrate offers a fourth device terminal that
can be used to induce narrow-gap-base HBT-like I–V characteristics, which should further
improve the power-performance of circuits in SOI lateral bipolar. Fin-structure devices
enable significant improvement in f max for RF and high-frequency applications. The process
technology for SOI lateral bipolar is compatible with CMOS. The Si-OI version is definitely
much less complex than CMOS.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 19


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

COMPLEXVIDEO OBJECT COSEGMENTATION FOR


IRRELEVANT FRAMES INVOLVED VIDEOS
Ms.P.SivaRanjani
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
Even though there have been a large amount of previous work on video segmentation
techniques, it is still a challenging task to extract the video objects accurately without
interactions, especially for those videos which contain irrelevant frames (frames containing
no common targets). In this essay, a novel multivideoobject co segmentation method is raised
to co segment common or similar objects of relevant frames in different videos, which
includes three steps: 1) object proposal generation and clustering within each video; 2)
weighted graph construction and common objects selection; and 3) irrelevant frames
detection and pixel-level segmentation refinement. We apply our method on challenging
datasets and exhaustive comparison experiments demonstrate the effectiveness of the
proposed method.

GEO-SOCIAL DISTANCE-BASED DATA DISSEMINATION


FOR SOCIALLYAWARE NETWORKING
Mr.A.Prakash Mrs.M.Deepa,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
This paper Internet of Things (IoT), which could connect everything in the world, is
promising for the realization of smart cities. However, vehicles connected in the
IoTchallenges data collection and transmission. Socially aware networking is an emerging
paradigm for high-efficiency data dissemination. Existing protocols take advantage of mobile
nodes' social characteristics (e.g., user interest) to improve dissemination performance.
However; they have not exploited enough of what relations are valuable between user
interests and how these relations can affect the dissemination of socialists. This paper takes
advantage of interest inclusion and intersection to solve the dissemination problem in a
conference scenario. By constructing the structure of the Interest Tree to solely represent the
relations of interest inclusion and interest intersection, we integrate vehicles' social factors
into their geographical information, and introduce the concept of geo-social distance (GSD)
as the basis of the proposed strategy. Simulation results demonstrate the superiority of our
presented method by comparing with two other existing protocols in terms of four
objective metrics, which include delivery ratio, overhead, hop-count, and average latency.

Keywords: Internet of Things; Ubiquitous sensing; Cloud Computing; Wireless Sensor


Networks

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 20


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

COMPUTATIONALLY EFFICIENT MARK COMPLETION


PRECODER FOR OFDM COGNITIVE RADIO
Mrs.R.Narmada Devi Mrs.S.KaviPriya,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
Cognitive radio (CR) has been regarded as a promising technique for enhancing the
spectrum utilization. Orthogonal frequency division multiplexing (OFDM) has proven itself
as a suitable candidate for various well-known broadband wireless services (LTE, WiMAX
etc.) due to numerous advantages such as high spectral compactness, robustness toward
multi-path fading environments, high data rates, etc. The major drawback of OFDM based
CR is its high side lobe leakage which has the tendency to interfere with neighboring
systems. The major challenge before an OFDM based Cognitive Radio is to keep interference
level input band below prescribed mask while maximizing the quality-of service (QoS) of the
cognitive user (CU). The existing techniques are either computationally intensive or
spectrally inefficient. This paper presents a low complexity spectral precoder which
minimizes error-vector-magnitude (EVM) of secondary user while constraining the
transmitted waveform below the prescribed spectral mask. The optimal precoding matrix can
be computed off-line for a given mask, thus limiting the online computations to only linear
matrix-to-vector multiplication. The paper also presents a suboptimal approach for obtaining
recoding matrix, which significantly reduces both online and offline complexity. Moreover,
we discuss a trade-off between complexity and EVM. We also investigate the performance of
the proposed technique in multiuser scenario. Simulation results show that the proposed
scheme outperforms existing techniques in terms of BER, complexity and spectral
characteristics.
.
Keywords: CFO,OFDMA,QOS,CU.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 21


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A CLUSTERING-BASED APPROACH FOR FINDING COHERENT MOTIONS AND


UNDERSTANDING CROWD SCENES USING IMAGE PROCESSING
Ms.Baby Shyala Mr.Vishnu Prasanna
Anna University Chennai
ABSTRACT
The problem of detection coherent motions in crowd scenes and presents its two
applications in crowd scene understanding: linguistics region detection and repeated activity
mining. It processes input motion fields (e.g., optical flow fields) and produces a coherent
motion field named thermal energy field. The thermal energy field is in a position to capture
each motion correlation among particles and therefore the motion trends of individual
particles, that area unit useful to find coherence among them.
We any introduce a ballroom dance agglomeration method to construct stable linguistics
regions from the extracted time-varying coherent motions. These linguistics regions are wont
to acknowledge pre-defined activities in crowd scenes. Finally, we have a tendency to
introduce a cluster-and-merge method, that mechanically discovers repeated activities in
crowd scenes by agglomeration and merging the extracted coherent motions. Experiments on
varied videos demonstrate the effectiveness of our approach.

SECURITY IMPROVEMENT FOR IOT COMMUNICATIONS


EXPOSED TO EAVESDROPPERS
M. Arthi, K. Karthick, S. Gayathri
Department of Electronics and Communication Engineering
Priyadarshini Engineering College, Vaniyambadi-635751
ABSTRACT
The Internet of Things (IoT) is a novel paradigm that is rapidly gaining ground in the
scenario of modern wireless telecommunications. In IoT, any devices having sensors and
computers can interact with each other. Among all present technologies, the techniques for
the fth generation (5G) systems are the main driving force for the actualization of IoT
concept. But the security assurance against eavesdropping in the 5G network is a challenging
task, because of the heterogeneous environment and the broadcast nature of radio
propagation. In the present study, transmission design for secure relay communications in IoT
networks was analysed in presence of eavesdroppers with unknown number and locations. A
specially designed randomizeandforward relay strategy for secure multi-hop communications
was used in this study. During the study, the eavesdroppers and devices were first equipped
with single antenna and the secrecy outage probability expression for two hop
communications was derives. Then the devised were connected with multiple antennas and
the secrecy rate maximization issues with respect to secrecy outage probability constraint
were formulated. The results reveals that proper utilization of relay transmission can extend
the secure coverage range improve the security level.
Keywords: IoT, 5G, secrecy outage probability, secrecy rate maximization.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 22


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A GSM BASED DRIP IRRIGATION SYSTEM FOR AGRICULTURE LAND


S. Alaguvairavasundaram [1], S. Ananth [2],
UG Student
G. Balaji [3],M. Surekha [4], R. Madhanraj [5]
AssistantProfessor
Knowledge Institute of Technology, Salem – 637504.
ABSTRACT
As the water requirement in irrigation is being large, there is a need for a smart
irrigation system that can save about 80% of the water. This prototype aims us to save time
and avoid problems like water wastage. It also helps in water conservation by automatically
providing water to the plants/gardens depending on their water requirements with help of soil
moisture sensor. It helps to control the pumping of water to the plants through GSM. It can
also detect the water leakage (Breakage in the pipes) and over flow of water in agricultural
fields, Lawns & Parks and intimate us through GSM. This system also helps in switching
OFF the pump when the water level comes to minimum and it can be achieved by using
water flow sensor. This system works with the help of microcontroller. This controller will
monitor each and every data of the system and it will intimate us through GSM.
Keywords: Moisture sensor, Humidity sensor, Water flow sensor, Microcontroller and GSM.

IDENTIFYING THE ROBUST BLUR UNIQUE ID FROM OVER SPEED


VECHICLE
R. Madhivadhani Mr.N.Ramki, M.E.
Er. Perumal Manimekalai College of Engineering Hosur.
ABSTRACT
The main of this paper is License Plate. It is the unique ID of each vehicle and plays a
significant role in identifying the trouble maker vehicle. Nowadays, there are lots of auto
over-speed detection and capture systems for traffic violation on the main roads of cities and
high-ways. In this paper, We propose a novel scheme based on sparse representation to
identify the blur kernel. By analysing the sparse representation coefficients of the recovered
image, we determine the angle of the kernel based on the observation that the recovered
image has the most sparse representation when the kernel angle corresponds to the genuine
motion angle. Then, we estimate the length of the motion kernel with Random transform in
Fourier domain. Our scheme can well handle large motion blur even when the license plate is
unrecognizable by human. We evaluate our approach on real-world images and compare with
several popular state-of-the-art blind image deblurring algorithms.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 23


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DC MOTOR CONTROL USING ARM WITH GSM

Ajithkumar. V Jayaprakash. S Sivamurugan. C


Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This Project is an easy method to control the speed of DC motor by sending SMS
(Short Message Service) message from mobile phone. This system is designed to bring
convenience to the user to control the motor speed from anywhere by using SMS application.
SIM 900 RS232 GSM module has been used as a SMS receiver and is connected with ARM
processor. ARM is connected to The DC Motor in order to control the speed of the motor
where PWM method is used. The Speed of the DC motor is predefined and then the resistors
are connected to the relay point in order to limit the flow of current to the motor. The
Suitable resistors are used to limit the flow of current. In this project we can achieve the
Three speed level of the motor. The hardware is developed and practically the process is
successfully achieved.

DESIGN AND IMPLEMENTATION OF HYBRID SOLAR AND WIND


CHARGER FOR DOMESTIC APPLIANCES
Bhuvaneshwari.V.M Archana.Y
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
In recent years, hybrid solar wind energy has become one of the most significant and
promising sources of renewable energy, which requires an additional transmission capability
and safer means of maintaining system voltages and reliability. These hybrid energy systems
have become common in remote space power generation applications as a result of
advancements in renewable energy technologies. This system will be designed in efforts to
develop a power solution for remote locations such as rural and research areas as well as
improve the general well-being of individuals in developing countries affected by natural
disasters. The aim of this project is to review this state of the planning, operation and
management demand of the complete PV solar-wind hybrid energy systems with standard
backup supply i.e. diesel or grid. This Project additionally highlights the longer term
developments, which have the potential to extend the economic attractiveness of such
systems and their acceptance by the user. The purpose of this work is the development of a
solar-wind hybrid power system that harnesses the renewable energies in the Sun and Wind
to generate electricity.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 24


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DESIGN AND IMPLEMENTAION OF SINGLE PHASE 31 LEVEL


INVERTER USING 8 SWITCHES TOWARDS THD REDUCTION
Arun Kumar M Palani K Vinoth Kumar S
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This project proposes a single-phase thirty one level inverter with reduced switches,
with a novel pulse width-modulated (PWM) control scheme. The Proposed multilevel
inverter output voltage level increasing by using eight numbers of switches driven by the
multicarrier modulation techniques. The inverter is capable of producing thirty one levels of
output-voltage from the dc supply voltage. The configuration used in this inverter is
asymmetrical configuration. Multilevel inverter output voltage level increasing by using less
number of switches driven by the multicarrier modulation techniques. A digital multi
carrier PWM algorithm is implemented in a MATLAB simulation and hardware is developed
by using DSPIC30F2010 Controller.

SMART REAL-TIME HEALTHCARE MONITORING AND TRACKING


SYSTEM USING GSM /GPS TECHNOLOGIES
Arunhonest A Prabagaran K Rajaappavoo R
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
Health monitoring systems have rapidly evolved recently, and smart systems have
been proposed to monitor patient current health conditions, in our proposed and implemented
system, we focus on monitoring the patient’s blood pressure, and his body temperature.
Based on last decade statistics of medical records, death rates due to hypertensive heart
disease, shows that the blood pressure is a crucial risk factor for atherosclerosis and ischemic
heart diseases; Thus, preventive measures should be taken against high blood pressure which
provide the ability to track, trace and save patient’s life at appropriate time is an essential
need for mankind. The objective of this work is providing an effective application for Real
Time Health Monitoring and Tracking. The system will track, trace, monitor patients and
facilitate taking care of their health; so efficient medical services could be provided at
appropriate time.“Man loses his health to earn money and then loses money to restore his
health.” In this process some time we will not even have the time to inform what the health
condition is so for this situation we have a project called “Patient Health monitoring of
Cough & Heart Beat using GSM”.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 25


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

IMPLIMENTATION OF SUPER FAST ELECTRONIC CIRCUIT BREAKER


Dinesh Kumar.N Nithinkishore.C Vinoth.S
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
The project is designed to shut down a power supply when it is overloaded by using a
super-fast electronic circuit breaker. The concept of electronic circuit breaker came into focus
realizing that the conventional circuit breakers such as MCBs take longer time to trip.
Therefore, for sensitive loads, it is very important to activate a tripping mechanism at the
shortest possible time, preferably instantaneously. The electronic circuit breaker is based on
the voltage drop across a series element proportional to the load current, typically a low-value
resistor. This voltage is sensed and rectified to DC, and then is compared with a preset
voltage by a level comparator to generate an output that drives a relay through the MOSFET
to trip the load. The relay use in place of a semiconductor switch is preferred because such
solid state switches would invariably fail in case of accidental short circuits. A circuit breaker
is automatic operated switch designed to shut down the power supply when overloaded. The
tripping depends on the current passing through the CT’s which is connected in series with
load. It uses the PIC- microcontroller into which program is dumped for the operation. The
unit is extremely fast and over comes the drawback of thermal type circuit breaker like MCB
based on a thermal bimetal lever-trip mechanism which is very slow.

IMPLEMENTATION OF MICROCONTROLLER BASED PROTECTION OF


PWM CONTROLLER THREE-PHASE INDUCTION MOTOR DRIVES
Aishwarya.B Menaga.P Renuka.R
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This project deals with the realization of a proposed system involving the speed
control of induction motor and monitoring of its parameters coupled with overload and over
current protection. The applications of induction motors are almost too numerous to mention
and hence functioning of these machines at proper speed is necessary to ensure good
productivity and safety at affordable costs. Monitoring simplifies the outcomes of complex
analysis through detailed diagnosis thereby preventing unscheduled downtimes that result in
lost production. Speed control is carried out using Direct Torque Control Space Vector
Modulation (DTC-SVM) and monitoring is achieved using Lab VIEW software. This project
profoundly explains the vector control diagram of SVM as well as the Lab VIEW software
which generates flexible and scalable design, control and test applications at minimal cost
supplemented with overload and over current protection, This proposed system improves the
adaptability of prevailing systems.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 26


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

Z SOURCE NETWORK BASED SENSORLESS BLDC MOTOR WITH


FUZZY LOGIC BASED SPEED CONTROL

Kishore.R Nagaraj.S Prabakaran.K Ravi Kumar.V


Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This paper presents a novel self-correction method of commutation point for high-
speed sensor less brushless dc (BLDC) motors with low inductance and non-ideal back
electromotive force (EMF) in order to achieve low steady-state loss of magnetically
suspended control moment gyro (MSCMG).The commutation point before correction is
obtained by detecting the phase of EMF zero-crossing point and then delaying 30 electrical
degrees. Since the speed variation is small between adjacent commutation points, the
difference of the non-energized phase’s terminal voltage between the beginning and the end
of commutation is mainly related to the commutation error. A novel control method based on
model-free adaptive control is proposed, and the delay degree is corrected by the controller in
real time. Both the simulation and experimental results show that the proposed correction
method can achieve ideal commutation effect within the entire operating speed range.

REAL-TIME PEDESTRIAN DETECTION AND TRACKING AT NIGHTTIME FOR


DRIVER ASSISTANCE SYSTEMS
Kumar. P kumaresan. A ravichandran.s
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
Pedestrians are the most vulnerable traffic participants, because they are often
seriously injured in traffic accidents, particularly at night. Pedestrian detection for driver-
assistance systems aims to detect these potentially dangerous situations with pedestrians in
advance to either warn the driver by giving alarm sound. In this project, we propose passive
radiating system for real-time pedestrian detection and tracking during nighttime driving with
a PIR(Passive Infra Red) sensor using which we can detect human beings. In this project we
are going use ATMEL (ARM7) based microcontroller, which the current dominant
microcontroller in mobile based products and software development Tool as Keil, flash
magic for loading hex file in to the microcontroller.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 27


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

IMPLEMENTATION OF HIGH VOLTAGE DC USING CAPACITORS AND


DIODES LADDER
Lokeshwari. S Padmapriya. K Pavitha. N
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

The main concept of the project here is to generate a high voltage DC from a single
phase AC with the help of the capacitors and diodes connected in a ladder network. This
concept is often used in electronic appliances like the CRTs, TV picture tube, and
oscilloscope and also in industrial appliances.It is also possible to generate up to 10KV DC
from this single phase supply, but owing to safety concerns and reasons, this system limits
the generating voltage to a 2KV output by limiting the capacitor and diode multiplication
factor to about 9. This project uses a number of silicon diodes and a set of electrolytic
capacitors wherein each stage, 1 capacitor is connected in series to withstand the peak
voltage. Thus, the output from a 9-stage voltage multiplier can generate up to 2KV. With the
help of standard multi-meter, it is not possible to measure the output, therefore, we are using
a potential divider of 10:1 for measuring the output make some change based on the meaning
eg: with that such as 230V low voltage AC reading will get the 2KV high voltage DC. The
project can be implemented by generating a high voltage DC up to the range of 30-50 KV by
increasing the number of stages. Then it can be used for the required industrial and medical
applications.

IMPLEMENTATION OF AUTOMATIC FOREST FIRE DETECTION AND


CONTROL SYSTEM USING PIC MICRO-CONTROLLER
K.Madevan R.Manigandan N.Santhosh
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This project develops automatic wireless forest fire alarm system using PIC. The fire,
smoke and climate parameters are monitored and sent through the receiver using wireless
GSM module. The Pump motor is turned ON and OFF through temperature and smoke
sensor signal. This project is implemented using DSPIC30F2010 controller. Forests play an
important role in the global, ecological, environmental and recreational system. It greatly
impacts the amount of greenhouse gases, atmospheric carbon absorption, and reduces soil
erosion. It can moderate the temperature, and regulate rainfall. To a large extent, Forest fires
are among the most dangerous natural accidents that occur practically in all countries.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 28


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

MONITORING AND CONTROLLING OF GREEN HOUSE GASES USING


WIRELESS SENSOR NETWORK
Mohan.A Munusamy.M Thirumalai.B
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

In traditional method of farming, human labors were required to visit the green house
at specific time need to check the humidity level, CO2 and temperature level manually.
Therefore this project focuses on developing a system that can automatically monitor and
predict changes of temperature , and CO2 level in the greenhouse. The objective of the
research is to develop automatic temperature monitoring system using sensors and short
message service (SMS) technology. This system also has a mechanism to alert farmers
regarding the parameter changes in the green house so that early precautions steps can taken.
This project is implemented using ARDUINO UNO Controller.

ELECTRICITY GENERATION USING MICRO-CONTROLLER BASED


AUTOMATIC WASTE DISPOSER
Naveen. N Nandha kumar.V Muthamil selvan. J
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology

ABSTRACT

In our city many times we see that the garbage bins or dustbins placed at public places
are overflowing. It creates unhygienic conditions for people. Also it creates pollution to the
atmosphere. At the same time bad smell is also spread. To avoid all such situations we are
going to implement a project called Automatic waste disposer. In this project we are going to
place a weight sensor under the dustbin chamber. When the weight reaches to the threshold
value, automatically the dustbin burns the waste and spread water to clean the ash. By using
the heat developed in it, a considerable amount of electric power can be generated and it can
be used to operate the same disposer. We have thus proposed an automatic waste disposer
that aims at segregating and burning the waste at the disposal level itself.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 29


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DESIGNING OF THREE WINDING COUPLED INDUCTOR BASED


STEP UP CONVERTER FOR RENEWABLE ENERGY
P.Sakthi Kapoor V.Vijay Kumar M.Murali
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This paper presents a high step-up converter for solar energy source applications. The
proposed high step-up dc–dc converter is devised for boosting the voltage generated from
solar cell to be a 400-V dc-bus voltage. Through the three-winding coupled inductor and
voltage doubled circuit, the proposed converter achieve high step-up voltage gain without
large duty cycle. Finally, the fuel cell as input voltage source 60–90 V integrated into a 2-kW
prototype converter was implemented for performance verification. Under output voltage
400-V operation, the highest efficiency is up to 96.81% , and the full-load efficiency is
91.32%

A BL-CSC CONVERTER–FED BLDC MOTOR DRIVE WITH POWER FACTOR


CORRECTION
M.Premalatha K.Sathiyapriya S.M.Sathyapriya
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

BL-CSC converter operating in a discontinuous inductor current mode is used to


achieve a unity power factor at the ac mains using a single voltage sensor. The VSI operates
in fundamental frequency switching for reduced switching losses. The bridgeless
configuration of the CSC converter offers low conduction losses.Power quality is achieved at
the ac mains for a wide range of control speeds and supply voltages. A diode bridge rectifier
(DBR), followed by a high value of the dc link capacitor feeding a voltage source inverter
(VSI)-based BLDC motor, draws peaky current from supply and injects a high amount of
harmonics in the supply system.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 30


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

WIRELESS CHARGING SYSTEM FOR PORTABLE DEVICE USING INDUCTIVE


COUPLING
Thangamani A Pugalenthi K Rajkumar M
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

Wireless charging system described by using the method of inductive coupling. In this
project, oscillation circuit converts DC energy to AC energy(transmitter coil) to transmit
magnetic field by passing frequency and then induce the receiver coil. The properties of
Induction coupling are wave(magnetic field-wideband), range(very short~cm),
efficiency(hight) and operation frequency(LF-band~several handred kHz).The project shows
as a small charging for 5V battery of phone in this method. The system bases on coupling
magnetic field, then designed and constructed as two parts. There are transmitter part and
receiver part. The transmitter coil (transmitter part) transmits coupling magnetic field to
receiver coil (receiver part) by passing frequency at about 1.67MHz. The Ampere’s law,
Biot-Savart law and Faraday law are used to calculate the inductive coupling between the
transmitter coil and the receiver coil. The calculation of this law shows how many power
transfer in receiver part when how many distance between the transmitter coil and the
receiver coil. The system is safe for users and neighbouring electronic devices.

IMPLEMENTATION OF MICRO CONTROLLER BASED SOLAR CELL CAR


Karuppiah L Kalaiselvan K Abdulkaleem A
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This project represent the performance evaluation of a microcontroller based solar –


powered car which can be used for transportation . A PIC microcontroller is programmed to
control the duty cycle of the dc motor .When the sunlight falls on the solar panel than the
solar energy gets converted into electrical energy and stored in the battery. Since petrol and
diesel is not required it uses solar energy which is abundant in nature. With the help of
this technology we aim to make solar and electrical energy powered car. Preliminary our
objective would be to improve our idea on a sensor control and afterwards with the help of
this prototype we can extend our future work on building an actual car powered by the solar
and electrical energy. Which is both cost effective and of course environment free.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 31


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

BOOST - DERIVED HYBRID CONVERTER WITH SIMULTANEOUS DC


AND AC OUPUTS
ABINAYA.R
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This paper per pose a family of hybrid converter topologies which can supply
simultaneous dc and ac loads from a single dc input .The resulting hybrid converters
require lesser number of switches to provides dc and ac output with an increased
reliability, resulting from its inherent shoot – through protection in the inverter stage .
the proposed converter is able to sopply dc and ac load 100v and 110v (rms)
,respectively from a 48.v dc input .The performance of the converter is demonstrated
with inductive and non liner loads.

VOLTAGE STABILITY IN LARGE MARINE INTEGRATED POWER SYSTEMS


USING DQ BASED INJECTION
K. Nandhini
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This project aims to design and modeling of Dynamic Voltage Restorer (VOLTAGE
INJECTOR) for maintaining the Power quality of the system. Power quality problem is an
occurrence standard voltage, current or frequency that result in a failure of end use
equipment. One of the major problems Deal the reis the power sag and swell. To solve this
problem, custom power devices are used. One of those devices is the Dynamic Voltage
Restorer (VOLTAGE INJECTOR), which is the most efficient and effective modern
custom power device used in power distribution networks. In this project fuzzy optimized PI
controller with integrated function of active power transfer, reactive power compensation
and voltage conversion is proposed as an hybrid system. A new control technique is
proposed to control the capacitor-supported VOLTAGE INJECTOR. The control of a
VOLTAGE INJECTOR is demonstrated with a reduced-rating VSC. The reference load
voltage is estimated using the unit vectors. The synchronous reference frame theory is used
for the conversion of voltages from rotating vectors to the stationary frame. The
compensation of the voltage sag, swell, and harmonics is demonstrated using a reduced-
rating VOLTAGE INJECTOR.The proposed hybrid system can effectively suppress the
voltage fluctuation. The simulation of proposed work is carried out using MATLAB.
Hardware implementation has been done with a micro controller 89s52, whose assembly
programming had been done with ASEM 5113 software and flashed using willar software
and downloaded the hex files using a flash programmer connected to a personal computer
via USB port. Both simulation and hardware implementation shows the compensation well.
The following objectives need to be fulfilled in this research work.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 32
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

SECURITY ENHANCED SIMPLEX COMMUNICATION AND CONTROL VIA


DC MICRO GRIDS

G.Srilaka
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

Power talk is a novel ultra narrow-band power line communication (UNB-PLC)


technique for communication. Among control units in Micro Grids (MGs). Unlike the
existing UNB-PLC solutions, power talk does not require installation of additional dedicated
communication hardware and, instead, uses only the power electronic converters through
which the control units interface the common bus. This way the communication system has
practically the same reliability as the power system. The information is transmitted by
modulating the parameters of the primary control, incurring subtle power deviations that can
be detected by other units. We develop power talk communication strategies for Direct-
Current (DC) MG systems with arbitrary number of control units that carry out all-to-all
communication. We apply the concepts of signaling space, where the power talk symbol
constellations are constructed, and detection space, where the demodulation of the symbols is
performed. The proposed communication technique is challenged by the random changes of
the bus parameters due to load variations. The presented evaluation shows that power talk has
a potential to offer an effective and inexpensive solution for reliable communication among
units in DC MGs.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 33


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DC MICROGRID OPERATING MODES WITH LOAD BALANCE AND ENERGY


STORAGE

S.Bharathi
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This project proposes a unified distributed control strategy for DC micro grid
operating modes, without bus voltage signaling or mode detection mechanisms that are
normally required for decentralized control strategies. The proposed control strategy is based
on the novel integration of distributed controllers for energy balancing between DC micro
grid energy storage systems with distributed controllers used to regulate the average DC
micro grid bus voltage, and a new method for controlling the grid connected rectifier that
maintains the distributed control structure. Under the proposed control strategy, seamless
mode transitions are achieved between qualitatively different operating modes, namely, 1)
grid connected operation with the rectifier providing load balancing, 2) grid connected
operation with the rectifier charging the energy storage systems, and 3) islanded operation. In
all operating modes, the average DC micro grid bus voltage is regulated to the micro grid
voltage reference, and the energy storage systems are controlled independently of the
operating mode to achieve and maintain a balanced energy level. Simulations are presented
demonstrating the performance of the proposed control strategy for a 380 VDC datacenter
with intermittent photovoltaic generation and communication delays expected from a Wi-Fi
control network implementation.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 34


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

REAL-TIME TEMPERATURE ESTIMATION AND FAULT MITIGATION


DUE TO THERMAL RUN AWAY

M.MUTHUKUMAR

Department of Electrical and Electronics Engineering


P.S.V College of Engineering and Technology
ABSTRACT

This project presents a technique to estimate the temperature of each power


electronic device in a thermally coupled, multiple device system subject to dynamic cooling.
Using a demonstrator system, the thermal transfer impedance between pairs of devices is
determined in the frequency domain for a quantized range of active cooling levels using a
technique based on pseudorandom binary sequences. The technique is illustrated by
application to the case temperatures of power devices. For each cooling level and pair of
devices, a sixth order digital IIR filter is produced which can be used to directly estimate
temperature from device input power. When the cooling level changes, the filters in use are
substituted and the internal states of the old filters are converted for use in the new filter. Two
methods for filter state conversion are developed—a computationally efficient method which
is suited to frequent changes in power dissipation and cooling, and a more accurate method
which requires increased memory and processing capacity. Results show that the
temperature can be estimated with low error using a system which is suitable for integration
on an embedded processor. In this work, we compare the performance of the system with
both infinity controller and fuzzy based control and it is identified that, fuzzy control systems
performs better than other controllers.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 35


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

VARIABLE LOAD-DAMPING COEFFICIENT FOR INDUSTRIAL VOLTAGE-


SENSITIVE LOAD
P.Shanthi
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

Load-damping characteristic models the load response to the frequency deviation,


which has important impact on system frequency response. The load-damping coefficient is
normally considered as a constant, obtained from operational experiences in large-scale
power systems or from detailed load models in isolated power systems. An industrial
isolated power system for aluminum production driven by coal-fired power and large scale
wind power is studied in this paper. Since the electrolytic aluminum load is driven by direct
current, it is one type of voltage-sensitive load and does not respond to the frequency
deviation. This paper proposes a load-damping characteristic control method for such isolated
industrial power system with voltage-sensitive load. To decrease the maximum frequency
deviation during transient process, a time-varying load-damping coefficient control scheme is
presented. Simulation is done on real-time digital simulator (RTDS) and the results verify the
effectiveness of the proposed control method. Further, a circuit model has been proposed
using 89s52 whose program is written in assembly language ASEM 5113, using flash
programmer using a driver software namely willar software via USB interface.

POWER SYSTEM STABILITY IN HVDC TRANSMISSION LINKS USING ICA

Vijayakumar.S
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

A general platform is introduced to study the dynamics of power systems with high
voltage dc (HVDC) transmission links. Small-signal stability, voltage stability, and
interaction phenomena of power systems with both line-commutated-converter HVDC (LCC-
HVDC) and voltage-source-converter HVDC (VSC-HVDC) are addressed using the
proposed platform. In this platform, the entire power system is modeled as a multivariable
feedback control system (FCS) which consists of three interconnected blocks. The contents as
well as the inputs and outputs of the blocks are selected such that the conventional analysis
tools for power system stability are applicable, both in the time and frequency domains. In
the FCS model, the relationships between different instabilities are clear, and participant
agents of each instability can be determined. The model is developed in a modular and hybrid
style, to make it feasible for a large power system. The proposed model is validated using
MATLAB simulation using a data mining method of ICA (Independent component analysis)

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 36


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

REDUCED NUMBER A SINGLE – PHASE CASCADED MULTILEVEL


INVERTER BASED ON A NEW BASIC UNIT WITHOF POWER SWITCHES
Saranya
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

In this paper a new single phase cascaded multilevel inverter is proposed. In order
to generate all voltage levels (even and odd) at the output, four different algorithms are
proposed reduction in the number of power switches, driver circuits and dc voltage sources is
the advantage of the developed single – phase cascaded multilevel inverter the ability of the
proposed inverter to generate all voltage is again conformed by using the experimental results
of a is level inverter

A NEW RESONANT BIDIRECTIONAL DC–DC CONVERTER TOPOLOGY


Subramani
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This paper presents a new resonant dual active bridge (DAB) topology, which uses a
tuned inductor-capacitor-inductor (LCL) network. In comparison to conventional DAB
topologies, the proposed topology significantly reduces the bridge currents, lowering both
conduction and switching losses and the VA rating associated with the bridges. The
performance of the DAB is investigated using a mathematical model under various operating
conditions.

PFC CUK CONVERTER-FED BLDC MOTOR DRIVE.


Suganthi
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

This paper deals with a power factor correction (PFC) based cuk converter fed
brushless DC motor (bldc)drive. A diode bridge rectifier followed by a cuk converter
working in a discontinuous conduction mode (DCM) is used for control of dc-link voltage
with unity power factor at ac mains.the performance of the proposed system is simulation and
a hardware prototype to validate its performance over a wide range of speed.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 37


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

THREE PORT DC –DC CONVERTER FOR STAND-ALONE PHOTO VOLTAIC


SYSTEMS
Tamilvani
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT

System efficiency and cost effectiveness are critical importance for photovoltaic (pv)
system. This paper addresses the two issues by developing a novel three port dc .dc converter
for stand-alone pv system based on improved fly back- forward topology. This paper is
focused on a comprehensive modulation strategy utilizing both pwm and phase – shifted
control that satisfies the requirement of pv power system to achieve mppt and output voltage
regulation.

INDIVIDUAL MINING AND PREDICTION OF PATTERNS FOR IMPROVING


MOBILE COMMERCE

Ms. M. Bhuvaneshwari1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Due to a wide range of potential applications, research on mobile commerce has


received a lot of interests from both of the industry and academia. Among them, one of the
active topic areas is the mining and prediction of users’ mobile commerce behaviors such as
their movements and purchase transactions. In this paper, we propose a novel framework,
called Mobile Commerce Explorer (MCE), for mining and prediction of mobile users’
movements and purchase transactions under the context of mobile commerce. The MCE
framework consists of three major components: 1) Similarity Inference Model (SIM) for
measuring the similarities among stores and items, which are two basic mobile commerce
entities considered in this paper; 2) Personal Mobile Commerce Pattern Mine (PMCP-Mine)
algorithm for efficient discovery of mobile users’ Personal Mobile Commerce Patterns
(PMCPs); and 3) Mobile Commerce Behavior Predictor (MCBP) for prediction of possible
mobile user behaviors. To our best knowledge, this is the first work that facilitates mining
and prediction of mobile users’ commerce behaviors in order to recommend stores and items
previously unknown to a user. We perform an extensive experimental evaluation by
simulation and show that our proposals produce excellent results.

Keywords: Mobile Commerce, Purchase Transactions, Similarity Inference, Pattern Mine.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 38


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

SURVEY ON CLOUD COMPUTING: BIG DATA CONCEPT, PRIVACY AND


PROTECTION

Ms. E. Elamathi1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

In recent years, big data have become a hot research topic. The increasing amount of
big data also increases the chance of breaching the privacy of individuals. Since big data
require high computational power and large storage, distributed systems are used. As multiple
parties are involved in these systems, the risk of privacy violation is increased. There have
been a number of privacy-preserving mechanisms developed for privacy protection at
different stages.

This paper focus on big data concepts, characteristics and to how to protect big data.
and how to accesses of big data. Big data is a term for huge data sets having large, varied and
complex structure with challenges, such as difficulties in data capture, data storage, data
analysis and data visualizing for further processing. It requires new technologies and
architectures so that it becomes possible to extract valuable data from it by capturing and
analysis process. Big Data is a collection of massive data sets with a great diversity of types
and it is difficult to process by using traditional data processing platforms. We analyze the
challenges, tools and techniques for big data analysis and design. In particular, in this paper,
we illustrate the infrastructure of big data and the state-of-the-art privacy-preserving
mechanisms in each stage of the big data life cycle.

Now a day’s Big data is most preferably used in enterprises, organizations, companies
and business etc…So Big data as so much of applications in various fields such as banking,
agriculture, chemistry, data mining, cloud computing, finance, marketing, stocks, BDA,
health care etc…This paper presents the detailed explanation of these applications. In these
fields every field has their concept and gave their usage related to big data. These are more
efficiently used in various sectors like government sectors, corporate sectors like that. This
paper presents an overview of both cloud and big data technologies describing the current
issues with these technologies.

Key words: Colud Computing, Hadoop, Big Data Issuses, Big Data Characteristics.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 39


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

META-ANALYSIS OF GENOMIC DATA: BETWEEN STRENGTHS,


WEAKNESSES AND NEW PERSPECTIVE

Ms. B. Keerthi1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT
The rapid advances in high-throughput technologies, such as microarrays have
revolutionizing the knowledge and understanding of biological systems and genetic
signatures of human diseases. This has led to the generation and accumulation of a large
amount of genomic data that need to be adequately integrated to obtain more reliable and
valid results than those from individual experiments. Meta-analysis of microarray data is one
of the most common statistical techniques used for combining multiple data sets. Despite its
remarkable successes in discovering molecular subtypes, underlying pathways and
biomarkers for the pathological process of interest, this method possesses several limitations.
Here, we provided a briefly overview of current meta-analytic approaches together with the
basic critical issues in performing meta-analysis of genomic data, with the aim of helping
researchers to evaluate the quality of existing, published data and obtain more detailed
information on what will be the best strategy to adopt to execute a good meta-analysis.

Keywords: Microarrays, Biological Systems, Genetic Signatures, Human Diseases

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 40


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A SECURED APPROACH TO CREDIT CARD FRAUD DETECTION USING


HIDDEN MARKOV MODEL

Ms. C.Menaga1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The usage of credit card has increased the credit card fraud has also increased
dramatically. Instead of carrying huge amount in hand it is easier to keep credit card. But now
a days that too becomes unsafe. Existing fraud detection techniques are not capable to detect
fraud at the time when transaction is in progress. Improvement in existing fraud detection is
necessary. In this paper Hidden Markov model is used to detect the fraud when transaction is
in progress. Here is shown that hidden markov model is used to detect credit card fraud with
reduced false positive transaction.
HMM categorizes customers profile as low, medium and high and based on spending
profile set of probability for amount of transaction is assigned to each cardholder. Amount of
new transaction is checked against the profile of card holder, if it justifies a predefined
threshold value then transaction is accepted else it is considered fraudulent. But still HMM is
not secured for initial some transaction during training so HOTP is used as secured approach
with HMM to reduce the fraud and to increase the security. HOTP is one time password
which is used one once and it is send to the client mobile when HMM detects that amount is
more than threshold value if the user enters valid HOTP then only transaction is allowed to
progress else it is detected as fraud.

keywords: Hidden Markov Model, Credit Card, Fraud Detection, HMAC.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 41


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A SURVEY ON INTRUSION DETECTION SYSTEM USING ANDROID SPY

Ms. R. Pavithra1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

In Today’s world security of data is prime concern at everywhere so it is mandatory to


protect the data from leaking outside. Nowadays Android mobile phones are everywhere such
as company, school, colleges, institutes and organizations, In such a company’s security of
the confidential data such as future plans, revenue report, decision making report , product
plans , students record and many other. Anyone can leak this data and misuse it in illegal
manner in order to track over this we are implemented the system “intrusion Detection
System using Android Spy” which will keep track on user’s mobile such call, SMS, and its
current Location through GPS.

Keywords: Android, GPS, SMS, Intrusion, Spy.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 42


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A SURVEY ON HONEYPOT AS AN INTRUSION DETECTION SYSTEM


ABSTRACT

Ms.V. Priyadharsisni1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Honeypots are decoy computer resources set up for the purpose of monitoring and
logging the activities of entities that probe, attack or compromise them. Honeypot does work
as an Intrusion Detection System which detect the attacker in a network. Activities on
honeypots can be considered suspicious by definition, as there is no point for users to interact
with these systems. In this paper, we proposed a honeypot system in the wireless network to
attract the attackers. We have used different fake websites to do so. Honeypot helps in
detecting intrusion attacking on the system. The information gathered by watching a
honeypot being probed is invaluable. The honeypot act as a normal system in the network
having fake detail or invaluable information. It gives information about attacks and attack
patterns. The Honeypot will make the attacker to attack the particular sites and side by side
monitor its illegal steps to confirm about its identity. This proposed work will make the IP
address of attacker to be blocked for further access of any site in the network. The proposed
model has more advantages that can response accurately and swiftly to unknown attacks and
lifetime safer for the network security. In future the network can be preserved by getting the
information regarding the attacker from the Honeypot system

Keywords: Honeypot, Network, Security, Wireless.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 43


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

KEY BASED POLICY FOR SECURE DATA DISTRIBUTION OVER THE CLOUD

Ms. A.Meena 1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Cloud computing is currently emerging as a promising next-generation architecture in


the Information Technology (IT) industry and education sector. The encoding process of state
information from the data and protection are governed by the organizational access control
policies. An encryption technique protects the data confidentiality from the unauthorized
access leads to the development of fine-grained access control policies with user attributes.
The Attribute-Based Encryption (ABE) verifies the intersection of attributes to the multiple
sets. The handling of adding or revoking the users is difficult with respect to changes in
policies. The inclusion of multiple encrypted copies for the same key raised the
computational cost. This paper proposes an efficient Key Derivation Policy (KDP) for
improvement of data security and integrity in the cloud and overcomes the problems in
traditional methods. The local key generation process in proposed method includes the data
attributes. The secret key is generated from the combination of local keys with the user
attribute by a hash function. The original text is recovered from the ciphertext by the
decryption process. The key sharing between data owner and user validates the data integrity
referred MAC verification process. The proposed efficient KDP with MAC verification
analyze the security issues and compared with the Cipher Text–Attribute-Based Encryption
(CP-ABE) schemes on the performance parameters of encryption time, computational
overhead and the average lifetime of key generation. The major advantage of proposed
approach is the updating of public information and easy handling of adding/revoking of users
in the cloud.
Keywords: Attribute-Based Encryption, Key Derivation Policy, Attribute-Based Encryption.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 44


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

CREATING THE JOY OF SIGHT FOR THE BLIND BY ARTIFICIAL


INTELLIGENCE

Ms. M. Marial1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Blindness is more feared by the public than any other ailment. Artificial vision for the
blind was once the stuff of science fiction. But now, a limited form of artificial vision is a
reality .Now we are at the beginning of the end of blindness with this type of technology. In
an effort to illuminate the perpetually dark world of the blind, researchers are turning to
technology. They are investigating several electronic-based strategies designed to bypass
various defects or missing links along the brain's image processing pathway and provide
some form of artificial sight. This paper is about curing blindness. Linking electronics and
biotechnology, the scientists has made the commitment to the development of technology that
will provide or restore vision for the visually impaired around the world. This paper describes
the development of artificial vision system, which cures blindness to some extent. This paper
explains the process involved in it and explains the concepts of artificial silicon retina,
cortical implants etc. The roadblocks that are created are also explained clearly. Finally the
advancements made in this system and scope of this in the future is also presented clearly.
Keywords: Blindness, Artificial Vision, Biotechnology, Restore Vision, Visually Impaired.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 45


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

HANDOFF SCHEMES FOR WIMAX/WLAN NETWORKS WITH QOS

Ms. V. Kiruba1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The latest technology that provide broadband access with large coverage area is
Worldwide Interoperability for Microwave Access (WiMAX), Since Mobile WiMAX has an
important advantage to serve large coverage areas per base station, Mobile WiMAX has
become a popular technology for handling mobile users. As we know that for serving a large
number of Mobile Users in practice requires an efficient handover scheme. Currently, mobile
WiMAX has a long handover delay that contributes to the overall end-to-end communication
delay. Recent research is focusing on increasing the efficiency of handover schemes. In
existing system whenever stations are out of range of all APs and BSs then there is no
communication for that particular stations. In this paper we present whenever stations is out
of range of all APs and BSs, then it can communicate through any other station which are in
range based on ad-hoc network technology.

Keywords: Handoff, WIMAX, WLAN, Networks.

A INSPECTION ON WIRELESS SENSOR NETWORKS RESTRAIN TECHNIQUES

Ms. J.Sathya Sri 1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

One issue in wireless sensor organize innovation is confinement issue. In the most
applications, the information gathered by the system without area data isn't helpful. Area data
has an imperative part in both systems administration and application spaces of wireless
sensor arrange. This paper overviews the confinement calculations what's more, proposes an
alternate scientific categorization in light of key components. In extra, it acquaints the vital
variables with approve the execution of confinement systems.

Keywords: Wireless Sensor Networks, Restrain Algorithm, Learning, Range, Anchor.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 46


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

AN ENHANCED GROUP MOBILITY PROTOCOL BASED WIRELESS BODY


AREA NETWORKS

Ms. R.Indhu1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The IPv6 over low power wireless personal area network (6LoWPAN) has attracted
lots of attention recently because it can be used for the communications of Internet of things.
In this paper, the concept of group-based network roaming in proxy mobile IPv6 (PMIPv6)
domain is considered in the 6LoWPAN-based wireless body area networks. PMIPv6 is a
standard to manage the network-based mobility in all-IP wireless network. However, it does
not perform well in group-based body area networks. To further reduce the handoff delay and
signaling cost, an enhanced group mobility scheme is proposed in this paper to reduce the
number of control messages, including router solicitation and router advertisement messages
as opposed to the group-based PMIPv6 protocol. Simulation results illustrate that the
proposed handoff scheme can reduce the handoff delay and signaling cost. The packet loss
ratio and the overhead can also be reduced.

Keywords: Wireless Personal Area Network, Internet of Things, Handoff Delay.

FACE LIVE DETECTION METHOD BASED ON PHYSIOLOGICAL MOTION


ANALYSIS

Ms. V.Kanimozhi1, Prof. V.Saravanan2, Prof. R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

In recent years, face recognition has often been proposed for personal identification.
However, there are many difficulties with face recognition systems. For example, an imposter
could login the face recognition system by stealing the facial photograph of a person
registered on the facial recognition system. The security of the face recognition system
requires a live detection system to prevent system login using photographs of a human face.
This paper describes an effective, efficient face live detection method which uses
physiological motion detected by estimating the eye blinks from a captured video sequence
and an eye contour extraction algorithm. This technique uses the conventional active shape
model with a random forest classifier trained to recognize the local appearance around each
landmark. This local match provides more robustness for optimizing the fitting procedure.
Tests show that this face live detection approach successfully discriminates a live human face
from a photograph of the registered person's face to increase the face recognition system
reliability.
Keywords: Face Live Detection; Eye Contour Extraction; Eye Blink Estimation.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 47
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DEVELOPMENT OF HUMAN MOBILITY TRACKING SYSTEM FOR ANDROID


BASED DEVICES

G.Sathya1, S.Sharada2, R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The place tracking functionality of current mobile devices provides extraordinary


opportunity to the understanding of individual mobility in daily life. As an alternative of
studying raw geographic coordinates and understanding human mobility patterns based on
sequences of place visits which encode, at a coarse resolution, most daily activities. This
application presents on place characterization in people’s everyday life based on data
recorded continuously by smart phones. Monitor human mobility from sequences of place
visits, including visiting patterns on different place categories. Speak to the problem of
automatic place labeling from Smartphone data without using any geo-location information.
Our revise on a large-scale data collected from multiple Smart phone users over long term
entity of confirm many intuitions, and also reveals findings regarding both regularly and
novelty trends in visiting patterns. Considering the problem of place labeling with place
categories and frequently visited places can be recognized reliably while it is much more
challenging to recognize infrequent places.

Keywords: Tracking, Mobile, Smart phone, Monitor, Patterns.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 48


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DATA MINING FOR SENTIMENT ANALYSIS IN SOCIAL MEDIA

R.Narasimman1, B.Sureshs gopi2, R.Vishnu prabhu3, S.T.Munusamy4, R.Srinivasan5


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Recently, social media is playing a vital role in social networking and sharing of data.
Social media is favored by many users as it is available to millions of people without any
limitations to share their opinions, educational learning experience and concerns via their
status. Twitter API is processed to search for the tweets based on the geo-location. Student’s
posts on social network gives us a better concern to take decision about the particular
education systems learning process of the system. Evaluating such data in social network is
quite a challenging process.

In the proposed system, there will be a workflow to mine the data which integrates
both qualitative analysis and large scale data mining technique. Based on the different
prominent themes tweets will be categorized into different groups. Naïve Bayes classifier will
be implemented on mined data for qualitative analysis purpose to get the deeper
understanding of the data. It uses multi label classification technique as each label falls into
different categories and all the attributes are independent to each other. Label based measures
will be taken to analyze the results and comparing them with the existing sentiment analysis
technique.

Keywords: Social Media, Twitter, Prominent, Classification Technique

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 49


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DEVELOPMENT OF HOP BY HOP COMPUTING FOR GREEN INTERNET


ROUTING

K.Gayathiri1, M.Rooba2, R.Jayasudha3, R.Srinivasan4


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The project shows the study of energy conservation in the Internet. It observe the
different traffic volumes on a link can result in different energy consumption; this is mainly
due to such technologies as trunking (IEEE 802.1AX), adaptive link rates, etc. It designs a
green Internet routing scheme, where the routing can lead traffic in a way that is green. It
differ from previous studies where they switch network components, such as line cards and
routers, into sleep mode. They do not prune the Internet topology and it develop a power
model, and validate it using real commercial routers. Instead of developing a centralized
optimization algorithm, which requires additional protocols such as MPLS to materialize in
the Internet, thus hop-by-hop approach has been chosen. It is thus much easier to integrate the
scheme into the current Internet. Therefore it progressively develops three algorithms, which
are loop-free, substantially reduce energy consumption, and jointly consider green and QoS
requirements such as path stretch.

To further analyze the power saving ratio, the routing dynamics, and the relationship
between hop-by-hop green routing and QoS requirements. It comprehensively evaluate the
algorithms through simulations on synthetic, measured, and real topologies, with synthetic
and real traffic traces. We show that the power saving in the line cards can be as much as 50
percent.

Keywords: Internet, Trunking, Hop-By-Hop, Qos Requirements, Real Traffic Traces

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 50


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DEVELOPMENT OF P3-EFFICIENT PRIVACY POLICY ON USER-UPLOADED


IMAGES ON CONTENT SHARING SITES

R.Amaresan1, N.Muzamil2 , B.Sheeraz3, T.Raghunathan4, R.Srinivasan5


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

With the increasing volume of images users share through social sites, maintaining
privacy has become a major problem, as demonstrated by a recent wave of publicized
incidents where users inadvertently shared personal information. In light of these incidents,
the need of tools to help users control access to their shared content is apparent. Toward
addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help
users compose privacy settings for their images. We examine the role of social context, image
content, and metadata as possible indicators of users’ privacy preferences.In this system
propose a two-level framework which according to the user’s available history on the site,
determines the best available privacy policy for the user’s images being uploaded. Our
solution relies on an image classification framework for image categories which may be
associated with similar policies, and on a policy prediction algorithm to automatically
generate a policy for each newly uploaded image, also according to users’ social features.
Over time, the generated policies will follow the evolution of users’ privacy attitude. We
provide the results of our extensive evaluation over 5,000 policies, which demonstrate the
effectiveness of our system, with prediction accuracies over 90 percent.

Keywords: Adaptive Privacy Policy Prediction, Metadata, Prediction, Uploaded Image

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 51


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

DEVELOPING A DISCOVERY OF RANKING FRAUD DETECTION SYSTEM FOR


MOBILE APPS

B.Divya Bharathy1, M.Uma Mageshwari2, R.Jayasudha3, R.Srinivasan4


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Ranking fraud in the mobile App market refers to fraudulent or deceptive activities
which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more
and more frequent for App developers to use shady means, such as inflating their Apps’ sales
or posting phony App ratings, to commit ranking fraud. While the importance of preventing
ranking fraud has been widely recognized, there is limited understanding and research in this
area. To this end, in this paper, a holistic view of ranking fraud and a ranking fraud detection
system for mobile Apps is proposed. Specifically, accurate location of the ranking fraud by
mining the active periods, namely leading sessions, of mobile Apps is proposed first. Such
leading sessions can be leveraged for detecting the local anomaly instead of global anomaly
of App rankings. Furthermore, three types of evidences, i.e., ranking based evidences, rating
based evidences and review based evidences are investigated, by modeling Apps’ ranking,
rating and review behaviors through statistical hypotheses tests. In addition, an optimization
based aggregation method is proposed to integrate all the evidences for fraud detection.
Finally, the proposed system is evaluated with real-world App data collected from the iOS
App Store for a long time period. In the experiments, the effectiveness of the proposed
system, and show the scalability of the detection algorithm as well as some regularity of
ranking fraud activities is evaluated.

Keywords: Ranking, Preventing, Mobile Apps ,Modelling, Scalability.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 52


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

IMPLEMENTATION OF INFORMATION HIDING TECHNIQUE FOR MOBILE


DEVICES

B.Imrankhan1, A.Jaya Prakash1, V.Saravanan2, R.Srinivasan3


Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

The primary objective of this project is to hide the secret information in an image file
without disturbing it’s originality. In the literature lot of algorithms are there to hide the
information in an image file but most of it consumes high resource for completing the task
which is not suitable for light weight mobile devices. Few basic algorithms like 1LSB, 2LSB
and 3LSB methods in the literature are suitable for mobile devices since the computational
complexity is very low. But, these methods either lack in maintaining the originality of the
source image or in increasing the number of bits to be embedded.

The proposed project reduces the detectable distortion in an image file during data
hiding process, by introducing new bit embedding scheme. Based on the frequency of the
characters in the English dictionary the plain text is encrypted and the resultant cipher text is
then embedded in JPEG image. Before embedding the cipher text, each pixel in the image
can be multiplied in to four pixels (Zoom) and every pixel is classified in to three groups
namely dark range, light range and mid range. The light range pixel can be decremented, the
dark range pixels can be incremented and the midrange can be incremented or decremented to
represent a cipher text. The experimental result says that, the proposed system hides 65%
(approximately) of secret information in addition to the existing legacy methods without
affecting the originality of the image and without increasing the computational complexity.

Keywords: Detectable Distortion, Data Hiding, Cipher Text, Secret Information.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 53


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

IMPLEMENTATION OF CUSTOMER DATA CLUSTERING USING DATA


MINING
A.Gayathri1, D. Reshma 2, M.Rizvana3, R.Srinivasan4
Department of Information Technology
P.S.V. College of Engineering & Technology, Krishnagiri.

ABSTRACT

Classification and patterns extraction from customer data is very important for
business support and decision making. Timely identification of newly emerging trends is very
important in business process. Large companies are having huge volume of data but starving
for knowledge. To overcome the organization current issue, the new breed of technique is
required that has intelligence and capability to solve the knowledge scarcity and the
technique is called Data mining. The objectives of this work are to identify the high-profit,
high-value and low-risk customers by one of the data mining technique - customer clustering.
In the first phase, cleansing the data and developed the patterns via demographic clustering
algorithm using IBM I-Miner. In the second phase, profiling the data, develop the clusters
and identify the high-value low-risk customers. This cluster typically represents the 10-20
percent of customers which yields 80% of the revenue.

Keywords: Identification, Capability, Demographic, Customers

TRIBOLOGICAL ANALYSIS OF ALUMINIUM (LM4) COMPOSITES


REINFORCED WITH ALUMINA PARTICULATES
G.Mohan
Department Of Mechanical Engineering,
P.S.V. College Of Engineering And Technology,Krishnagiri

ABSTRACT

Aluminium is one of the less weight Metal having 1:3 weight ratio to mild steel taken
as a base metal and one of the famous ceramic metal Aluminium oxide having high hardness
and melting temperature is chosen as a reinforcing material. Aluminium Alloy (LM4)
reinforced with 1 and 1.5 Wt. % of nano particle aluminium oxide (Al2O3) were fabricated by
using stir casting method in two different preheated temperatures.Nano composites preheated
into two different temperatures like 8500C and 9500C then combined with aluminium alloy
(LM4) and the Al-composites are casted to analysis the Al-Al2O3 nano composite
microstructure, Strength and the tribological properties. To fabricate the Al-Al2o3 matrix
composites reinforced with various proportions of nano particle are fabricated using stir
casting method. To analysis the fabricated nano composites using the following test
 Pin on disc wear test
 Rockwell hardness test
 Strength Analysis Using ANSYS 10.0
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 54
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

REVERSE ENGINEERING USING COORDINATE MEASURING MACHINE


P.Gokulakannan
Department of Mechanical Engineering,
P.S.V. College of engineering and technology ,Krishnagiri

ABSTRACT

Reverse engineering using Coordinate measuring machines (CMMs) deals with the
critical evaluation for Reverse Engineering (RE) technique using Coordinate Measuring
Machine (CMMs) by using a mechanical artefact for demonstrating the scanning and
designing in the software CREO. A part is physically examined with the help of Coordinate
Measuring Machine (CMM) & Point data of a part is generated through scanning. Point data
is then exported to CAD software CREO to generate CAD model of a part. Thus, this report
describes the processes of Reverse Engineering, from object digitization to CAD model
reconstruction and error analysis. This project also investigates the applications,
developments, advantages and the limitation of this technique.

IMPROVEMENT OF SPRING FATIGUE STRENGTH BY SHOT PEENING AND


NITRIDING PROCESS
R.Suresh
Department of Mechanical Engineering,
P.S.V. College Of Engineering And Technology,Krishnagiri

ABSTRACT

Springs are generally used in automobile industry for different applications. Foremost
requirements of the spring material are high yield strength, high proportional limit, and high
fatigue strength. Steel springs are used in hard & high strength condition. To attain these
properties, springs are shot peening and nitriding. During the manufacturing process of
springs, high tensile residual stresses are generated which reduces considerably the spring
strength and service life. In the present study, the effect of shot peening with nitriding on
fatigue strength of high
out on a plane –N curves were established for shot peened with
nitriding and shot peened with out nitrogen conditions. The major results were as follows:
the surface layer of the workpieces was suitably deformed by shot peening with nitriding.
The residual stress was added in the surface locality on all shot peened with nitriding spring
.As the peening time increased, the region with residual stress extends in the intensity
direction.At a large number of cycles to fracture, shot peening with nitriding could more
effectively enhance the fatigue strength As a result of combining the simplified processes, a
new technology was developed guaranteeing to accomplishment of the fatigue strength. The
project describes the methodology and the experimental work, as fine as the obtained values
of fatigue strength. Other surface parameters are also given, such as roughness, hardness,
state and distribution of residual stresses.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 55
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

LI-FI(LIGHT FIDELITY) THE FUTURE TECHNOLOGY IN WIRELESS


COMMUNICATION
Taqveem Ronisha
Department of Science and Humanities
P.S.V. College Of Engineering And Technology,Krishnagiri

ABSTRACT
There are many devices access wireless network , clogged airwaves are going to make
it. One German physicist ,Harald Hass has come up with a solution he calls “data through
illumination”-taking the fibber out of fiber optics by sending data through and LED light bulb
that varies in intensity faster than the human eye can follow. Li-Fi is a VLS , visible light
communication ,technology developed by a team of scientists including Dr Gordon Povey ,
Prof . Harald Hass and Dr Mostafa Afgani at the university of Edinburgh . The term Li-Fi
was coined by Prof . when he amazed people by streaming high -definition video from a
standard LED lamp . Li-fi is typically implemented using white LED bulbs . Unseen by the
human eye ,this variation is used to carry high speed data.

A STUDY ON HUMAN RESOURCE AUDIT


Mrs.P.Ameena Mr.S.Vignesh.MBA.
Department of Management studies
P.S.V College of Engineering and Technology- Krishnagiri
ABSTRACT

Human resource audit also called personnel management audit is well practiced in
western developed countries. Audit is evaluation, examination, review and verification of
complete activities, to see whether they represent a true state of affairs of the activities in the
department audit. Human resources audit is an important management control device it is a
tool to judge comprehensive method (or means) to review current human resources policies,
procedures documentation and system to identify need for improvement and enhancement of
the HR function as well as to assess compliance with ever changing rules and regulation.The
purpose of a Human Resources audit is to assess the effectiveness of the Human Resources
function and to ensure regulatory compliance. The audit can be conducted by anyone with
sufficient Human Resources experience.There's an advantage to having the audit conducted
by an external consultant. Because the external consultant has fewer biases about the
organization and has less personal interest in the outcome than an employee of the company,
the external consultant may be more objective.
Keywords: Personal Management, Evaluation, Effectiveness, Verification Activities,

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 56


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON TRAINING AND DEVOLOPMENT


Ms.R.Bharathi,Ms.Yogambal.N MBA,MPhil.
Department of Management studies
P.S.V College of Engineering & Technology -Krishnagiri
ABSTRACT

Training has implications for productivity, health and safety at work and personal
development. The global competition and swiftness of changes emphasize the importance
of human capital within organizations, as well as the swiftness and ways of knowledge
gaining of that capital. In the economy where uncertainty is the only certainty,
knowledge is becoming a reliable source of sustained competitive advantage. Knowledge
is becoming basic capital and the trigger of development. Modern organizations therefore use
their resources (money, time, energy, information, etc.) for permanent training and
advancement of their employees. Organizations which are constantly creating new
knowledge, extending it through the entire organization and implementing it quickly
inside the new technologies, develop good products and excellent services. These
activities determine the company as a learning organization with constant innovation being
its sole business. These are organizations which realize that learning and new knowledge
are becoming the key of success, and that education is crucial for abundance.
Employees tends to become absolute, and therefore making the need to adapt to the
continuous learning and updating of the skill and knowledge invaluable, due to the
organizational, technological and social dynamics. Thus, in order for organizations to achieve
optimum returns from their investment, there is imperative need to effectively manage
training and development programmers. Training and development is an instrument that aid
human capital in exploring their dexterity. Therefore training and development is vital to the
productivity of organization’s workforce. Instruments: performance appraisal, potential
appraisal, feedback counseling, career planning, training, organization development, rewards,
employee welfare and quality of work life .
Key words: Employee Training, Employee Development, employee Productivity.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 57


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON GRIEVANCES HANDLING PROCEDURE


Ms.W.Deboral,Mrs.J.Ramya MBA.,(Ph.D)
Department of Management studies
P.S.V College of Engineering & Technology- Krishnagiri
ABSTRACT

Any employee who has a complaint arising out of his or her employment should seek to
have that complaint addressed by using the appropriate university's procedure for his or her
staff group. It is expected that the majority of such complaints will not develop into formal
grievances but will be dealt with and satisfactorily resolved through informal discussion, as
described below. However, whenever the formal procedures are used, the employee has a
right to have his or her complaint carefully and impartially considered and to receive, after
appropriate consideration and discussion, to provide details of an alternative solution which is
acceptable to the employee and which is considered by his or her line manager and
department to be appropriate, taking account of the complaint raised and the impact of the
proposed solution on any other affected party. Where two or more employees within the same
department have identical complaints about a particular situation, their complaints should be
dealt with simultaneously by means of the individual grievance procedure described below.
This procedure is not available where employees have a grievance affecting more than one
department. As explained in the specialty doctrine, procedures form the set of principles and
rules from and with the help of which, employment relations should be conducted, but they
also represent operational mechanisms used by the parties in treating various problems that
arise every day. It is common that large organization have a set of procedures which draw
most, if not, all areas of interest for both parties, such as: union recognition, individual
representation, negotiation and dispute settling procedures, consulting procedures, settling
grievances procedures, dismissal procedures, disciplinary procedures, performance appraisal
procedures, promotion and transfer procedures, also. In many countries there are laws that
require the existence of such procedures, although it is unlikely that the law will apply in all
cases mentioned above. This material addresses only one of these procedures and that is
forming and solving employee complaints procedure and a practical review for this procedure
applied in some Romanian organizations.
Key Word: Nature of grievances, scopes of grievances, objectives of grievances, grievances
handling procedure.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 58


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON ORGANIZATION OVERVIEW BRAND AWARENESS IN


COMPETITIVE MARKET
Mr.D.Deepanraj,,Mrs.J.Ramya,
Department of Management studies
P.S.V.College of Engineering and Technology
ABSTRACT

The study of IDBI Federal Life Insurance, its origin and history provides glimpse
about company growth and expansion. This training provides an in depth study about the
company‘s policy, procedure and processes. It also provides the practical knowledge about
the functioning of various departments. As we come across the Personnel Department,
Marketing Department, we learnt number of things related to these departments. My training
is focusing on the area of Brand Awareness in competitive Market. I have made the survey on
―Brand Awareness”. I have done project in IDBI Federal Life Insurance, which is one of the
famous Insurance Company in India. IDBI Federal Life Insurance is covering huge market
share in the Insurance Market. Insurance market of Rajkot is very huge and continuous
growing. It is leading in insurance market and doing continuous growth.

Key words : Life insurance, child insurance ,income insurances , micro insurance

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 59


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON THE REWARDS AND RECOGNITION OF EMPLOYEE


Mrs.K.G.Deepa,Mr.G.Murugan MBA.,M.Phil.,
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

The general objective of the research was to study the impact of rewards and
recognition on employee motivation of Titan Company Limited. And the specific objectives
were to identify the most effective means of rewards and recognition, to study the
behavioural differences between appreciated and non-appreciated employees, to understand
the extent to which motivation enhances employee’s performance, to identify if the
motivation has an effect on individual and organizational growth and to study if rewards and
recognition results in emotional conflicts between employees. The descriptive research
design was adopted for this rewards and recognition. Various employees from the companies
were the respondents. It is evident from Titan Company Limitedthat a variety of factors
influence employee motivation and satisfaction. It was also significant to discover that there
is a direct and positive relationship between rewards and recognition and job satisfaction and
motivation. The direct translation of this could be that the better the rewards and recognition,
the higher the levels of motivation and satisfaction, and possibly therefore, the greater the
levels of performance and productivity. In the event of major inconsistencies, especially for
emotional conflicts between performers and non- performers, the organisation should make
an effort to reassess and rectify this situation. In the event that the organisation does not re-
assess this situation, it could have a resultant negative impact on job performance and
productivity as well as on the retention of minorities. In accordance with Maslow’s hierarchy
of needs, the lower level needs such as salary and benefits must first be met before the higher
level needs, which impacts motivation can be satisfied. The research study has shown that
managers can employ different strategies to motivate employees, but that it is important that
managers keep in mind that different strategies would have a different motivational impact on
different people. To get optimum results from a motivational strategy, the manager has to
realise and understand issues, which requires recognition of each individual’s unique values,
beliefs and practices.
Keywords: Rewards, Recognition, Employee, motivation, Work performance, Incentive,
Recognition Awards, Promotional marketing, Global solutions.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 60


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON ANALYSIS OF CASH MANAGEMENT


Mrs. M.Gomathi, Ms Yogambal.N.MBA,MPhil.,
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

Cash is the important current asset for the operations of the business. Cash
management is a broad term that refers to the collection, concentration, and disbursement of
cash. The goal is to manage the cash balances of an enterprise in such a way as to maximize
the availability of cash not invested in fixed asset or inventories and to do so in such a way as
to avoid the risk of insolvency. Factors monitored as a part of cash management include a
company’s level of liquidity, its management of cash balances, and its short-term investment
strategies. Through this analysis Cash managements concerned with the managing of: (i)
Cash flows into and out of the firm, (ii) Cash flows within the firm, and (iii) Cash balances
held by the firm at a point of time by financing deficit or investing surplus cash. The firm’s
need tohold cash may be attributed to the following three motives are transactions motive,
precautionary motive and speculative motive. Cash planning protects the financial condition
of the firm by developing a projected cash statement from a forecast of expected cash inflows
and outflows for a given period. Cash plans are very crucial in developing the overall
operating plans of the firm.
Keywords: Cash Flow, Firm, Concentration, Operation Plan, Current Asset, Motives,
Investment, Liquidity, Inventories, Collection, Enterprise, Disbursement and Forecast.

A STUDY ON EMPLOYEE ATTITUDE TOWARDS WAGES AND SALARY


ADMINISTRATION
Mr.R.Govindaraj, Mr.S.Vignesh.,MBA
Department of Management studies
P.S.V. College of Engineering & Technology
ABSTRACT

Wages and salary is a practical study performance of a company practically adopted.


Among the four most important ms, men play a dominant role. The only way by which men can be
gained, Retained and satisfied is through wages and salaries. A study is made to know how the
employees are graded and how they paid wage and salaries. Wages are paid by hourly or daily,
whereas salaries are paid monthly basis. Wages and salaries for particular employee or employer
depends upon the various factors like his grade, position, qualifications, place, inflation, type of
organization, industry and etc. Wages is the compensation an employee receives and returns for his
or her contribution to the organization. Wages occupies an important place in the life of an
employee .his or her standard of living, status in the society; Motivation, loyality and productivity
depend upon the wages he or she receives. Employee wage is a significant because of its
contribution to the cost of production besides. Many battles are fought the employer and employee
on issues relating to wages of bonus. For HRM too employee wages is the major function. The HR
specialist has a difficult task of fixing wages and wage differential acceptable to employees and
their leaders since, employee wage is such an important subject, considerable space is devoted in
books and periodicals discussion of wage related and salary related problems
Keywords: Wages, salaries, motivation, employer, employee, compensation
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 61
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON DIGITAL MARKETING


Mr.R.Guganesh., Mrs.J. Ramya.MBA. (Ph.D)
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

Digital media is so pervasive that consumers have access to information any time and
any place they want it. Gone are the days when the messages people got about your products
or services came from you and consisted of only what you wanted them to know. Digital
Marketing is so important and gives us so many benefits, because via electronic channels and
by posting positive comments, feedbacks about company/product can attract new customers
and build long-lasting relationship. SEM is a type of Internet marketing associated with the
researching, submitting and positioning of a website within search engines to achieve
maximum visibility and increase your share of paid and/or organic traffic referrals from
search engines. Search engine optimization (SEO) is the process of affecting the visibility of
a website or a web page in a search engine's "natural" or un-paid ("organic") search results.
SEO may target different kinds of search, including image search, local search, video search,
academic search, news search and industry-specific vertical search engines. Pay per
click (PPC), also called cost per click, is an internet advertising model used to direct traffic to
websites, in which advertisers pay the publisher (typically a website owner) when the ad is
clicked. It is defined simply as “the amount spent to get an advertisement clicked”. Social
media has become a platform that is easily accessible to anyone with internet access.
Increased communication for organizations fosters brand awareness and often, improved
customer service. Additionally, social media serves as a relatively inexpensive platform for
organizations to implement marketing campaigns. Broadly, the term is usually used to refer
to sending email messages with the purpose of enhancing the relationship of a merchant with
its current or previous customers, to encourage customer loyalty and repeat business,
acquiring new customers or convincing current customers to purchase something
immediately, and adding advertisements to email messages sent by other companies to their
customers.
Keywords: Search engine marketing, Digital marketing, Search engine optimization, Pay-per
click, Social media marketing, E-mail marketing:

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 62


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON EMPLOYEE RETENTION


Mr. A.Henry Prasanth, Mrs.Yogambal.N Mba.,M.Phil,
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

In this era of globalization employees are blessed with good opportunities. As


soon as they feel dissatisfied with the current employer or with the job they switch
over. It is becoming hard on the employer to retain employees, as the organization
would not be left with good employees. Being HR personnel one should know how to
attract and retain its employees. A company, which wants to strengthen its bond with
its employees, needs to invest in their developments. This involves the creation of
opportunities for role enhancement within the company as well as training & skill
development that allow employees to enhance their employability in the
internal/external employable market. Employee Retention refers to the techniques
employed by the management to help the employees stay with the organization for a
longer period of time. Employee retention strategies go a long way in motivating the
employees so that they stick to the organization for the maximum time and contribute
effectively. Sincere efforts must be taken to ensure growth and learning for the
employees in their current assignments and for them to enjoy their work.
Keywords: job retaining, employee relationship, benefits.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 63


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON EMPLOYEE MOTIVATION


Ms K.KanimozhiMr G.Murugan MBA,MPhil.
Department of Management studies
P.S.V. College of Engineering & Technology
ABSTRACT

The purpose of this paper is to identify the factors that effects employee
motivation and examining the relationship between organizational effectiveness and
employee motivation. A model was designed based on the literature, linking factors of
employee motivation with employee motivation and organizational effectiveness.
Motivation implies that one person, in organization context a manager includes another, say
on employee, to engage in action by ensuring that a channel to satisfy those needs and
aspirations become available to the person. In addition to this, the strong needs in a
direction that is satisfying to the latent needs in employees and harness them that would be
functional for the organization. Empowerment and recognition have positive effect on
employee motivation training. More the empowerment and recognition of employees in an
organization is increased. More will their motivation to work will enhance. Also there
exists a positive relationship between employee motivation and organizational
effectiveness. The more the employees are motive to tasks accomplishment higher will the
organizational performance and success. The study focuses on the practice and observance
the two central factors, empowerment and employee recognition for enhancing employee
motivation which leads to organizational effectiveness of the training program. The
organizations should design their rules, policies and organizational structures that give
space to the employee to work well and appreciate them on their tasks fulfillment and
achievements.
Key words: Employee Motivation, Relationship, Empowerment, Recognition
Effectiveness, Accomplishment, Structures, Achievements

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu


64
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON WORK SCHEDULING AND COST MANAGEMENT USING


PRIMAVERA SOFTWARE
Ms. S.Karpagapriya,Mr. G.Murugan MBA,MPhil.
Department of Management studies
P.S.V. College of Engineering & Technology
ABSTRACT

Cost–benefit analysis (CBA), sometimes called benefit–cost analysis (BCA), is a


systematic approach to estimating the strengths and weaknesses of alternatives that satisfy
transactions, activities or functional requirements for a business. It is a technique that is used
to determine options that provide the best approach for the adoption and practice in terms of
benefits in labor, time and cost savings etc. In olden days efforts to reduce accidents in the
construction industry have failed to examine the application of CBA for accident prevention.
Detailed information about the application of CBA for accident prevention on construction
projects is deemed necessary to achieve high productivity. The CBA was proposed as the
method to guide decisions on accident prevention in the Indian construction industry. A
quantitative method was used to collect data from health and safety managers in the Indian
construction industry for the survey. The method used benefit-cost ratio (BCR) to determine
if the benefits of accident prevention outweigh the costs of accident prevention and also by
using Primavera software. The research found that total benefits of accident prevention
outweigh costs of accident prevention by a ratio of approximately 3:1 (62% benefit gain to
38% benefit loss). The method has the potential to improve decision-making process on
accident prevention and contribute to a reduction in costs, deaths and injuries in the
construction industry. The collected data has been scheduled with Primavera software to find
out the cost benefit analysis the result of this investigation forms part of a study of cost and
benefits of accident prevention in the construction industry.
Keywords: Cost Benefit Analysis, Benefit Cost Ratio, Primavera Software, Work
Scheduling

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu


65
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON CAREER PLANNING & DEVELOPMENT


Ms S.Lakshmi,Mr.S.Vignesh.,MBA
Department of Management studies
P.S.V. College of Engineering & Technology
ABSTRACT

The career planning process is often illustrated as the last step in an ever-changing
work environment. The technical, professional, managerial, and interpersonal skills to
successfully perform and succeed in this rapidly changing work environment are essential.
There is a very real and immediate threat that many of the professional skills that we have
learned yesterday and today will be obsolete and insufficient to cope with the inevitable
changes in the future. This paper addresses specific questions on career planning, activity
which plays an increasingly representative role in the human resources management. People
were always concerned about choosing and building careers to meet their needs and
aspirations. Career planning process involves both individual and organization responsibility.
In the contemporary business environment, highly competitive, we find that career
management responsibility rests increasingly on the individuals. This study helps to
understand the career planning and development and measure the current level of career
planning and development in service sectors industry and to measure and improve career
planning and development of among employees and to understand the techniques used for
career planning and development across the industry.
KEY WORDS: Planning activities; Career management; Human resource; System

A STUDY ON EMPLOYEE WELFARE


Mr. M.Manojalapathy,Mrs. J.Ramya.,MBA.,(Ph.D).
Department of Management studies
PSV College of Engineering and Technology
ABSTRACT

The present study is made an attempt to identity the employee welfare measures
adopted in electronic industries. Employee welfare means anything done for the comfort and
improvement of the employees over and above the wages paid which is not a necessity of the
industry. The basic purpose of the employee welfare is to enrich the life of employee and
keep them happy. Employees spend at least half their time at work or getting to it or leaving
it. They know that they contribute to the organization when they are reasonably free from
worry and they feel that when they are trouble/ problems they are due to get something back
from the organization. People are entitled to be treated as fully human being with personal
needs hopes and anxieties. To know that whether welfare facilities play an important role on
working of employees and need to know the employees are dissatisfied welfare facilities will
help them to get motivated. Employees play an important role in the industrial production of
the country. Hence, organizations have to source the cooperation of employees in order to
increase the production and to earn high profits. The cooperation of employees is possible
only when they are fully satisfied with their employer and the working condition on the job.
Keywords: Welfare measures, Safety, Human relationship

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 66


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON EMPLOYEE RELATIONSHIP MANAGEMENT


Ms. V.Meenakshi, Mr. G.Murugan MBA,MPhil.
Department of Management studies
P.S.V College of Engineering & Technology
ABSTRACT

This project aims to outline the importance of the employer-employee relationship


and describes the role this relationship plays towards the growth of a business. The project
also highlights the role job satisfaction plays towards stimulating good relationships between
these two parties and provides guidelines to business owners on how the relationship can be
managed. A relationship survey was designed for the study. The survey further aimed to
measure job satisfaction of the employees. In the study, job satisfaction was identified as an
accurate indicator of good relationships between employers and employees. The study found
that business owners shared a positive notion that relationships play an important role
towards their business as these contribute to the growth of their business. A good relationship
is necessary for the smooth running of any business. The term industrial relations means the
relationship between employers and employee ,a good communication between an employer
and its employees is imperative for building a positive work place culture, in order to
improve the work performance, an employee must receive feedback, both positive and
critical. Gratitude and appreciation is very important. Discipline that benefits the company
and the employees, employers will treat their employees with respect and vice versa if they
all want to succeed and achieve goals. The negative effects of employer-employee relation,
an employer who fails to understand issues concerning his employees might not achieve
long-term success in his enterprise.
Keywords: Employee Satisfaction, Employee Relation, Employee Benefits, Customer
Relationship, Internal Employee Relationship Management

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 67


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON MANUFACTURING COST


Mrs. R.Priya,Mr.R.Murugesan M,com,MBA,MPhil,(PhD).
Department of Management studies
P.S.V College of Engineering & Technology

ABSTRACT
Manufacturing cost is the aggregate amount of cost incurred by a business to produce
goods in a reporting period. The term can then be defined in two ways, which are. The entire
amount of this cost is charged to expense in the reporting period, which means that
manufacturing cost is the same as the cost of goods sold; or. A portion of this cost is charged
to expense in the period, and some of it is allocated to goods produced in the period, but not
sold. Thus, a portion of total manufacturing cost may be assigned to the inventory asset, as
stated in the balance sheet. Manufacturing cost definition and calculation. The more common
usage of the term is that manufacturing cost follows the first definition, and so is the amount
charged to expense in the reporting period. This includes such costs as production.
Manufacturing cost is the aggregate amount of cost incurred by a business to produce goods
in a reporting period. The calculation of this cost is somewhat different if we use the second
definition, where some of the cost may be assigned to goods that are produced, but not sold.
In this case, use the following steps (assuming that standard costing is used). Assign a
standard materials cost to each unit produced. Assign a standard direct labor cost to each unit
produced. Aggregate all factory overhead costs for the period into a cost pool, and allocate
the contents of this cost pool to the number of units produced during the period. When a unit
is sold, charge to the cost of goods sold the associated standard materials cost, standard direct
labor cost, and allocated factory overhead.
Key words: Direct materials, Direct labor, overhead

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 68


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON STRESS MANAGEMENT


Mrs. V.Pushpa,Mr. S.Vignesh.,MBA
Department of Management studies
P.S.V. College of Engineering & Technology
ABSTRACT

Mental health is an important component of the total positive health and is interwoven
closely with the physical and psychological dynamics of the human body. Worldwide about
500 million people are believed to be suffering from neurotic stress related and psychological
problems. Although stress is unavoidable but minor stress can have an impact. Stress can be
experienced from four basic sources Social stressors: Some examples of social stressors
include deadlines, financial problems, jobs interview, presentation, disagreements, demands
for your time and attention, loss of a loved one, divorce and co-parenting. Environmental
Stressor; It includes weather, noise, crowding, pollution, traffic, and crime. Physiological;
Examples of physiological stressors include illness, giving birth, accidents, lack of exercise,
poor nutrition and sleep disturbances. Every person has a unique response to stress, so there
is no one fixed solution to managing it. No single method works for everyone or in every
situation, so experiment with different techniques and strategies and focus on what makes
you feel calm and in control. Change the situation: Avoid the stressor, alter the stressor.
Change your reaction adapt to the stressor, accept the stressor. Keep a check on your state of
mind throughout the day. Whenever you feel stressed. Build strong relationship exercise
physical activities. Stress is a fact of everyday life, we’ve all felt it. Sometimes it acts as a
positive force and sometimes as a negative force. If you experience stress over a prolonged
period of time, it could become chronic, till you take some action about 500 million people
worldwide are believed to suffering from neurotic, stress related physical problems. The
challenge can however, be tackled by joint action between life science, social science urban
planning, architecture and politics.
KEY WORD: Architecture, neurotic problems, physical problems, stress .

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 69


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON FINANCIAL LEVERAGE


Ms. J.Ramya, Mrs J. Ramya.MBA. (Ph.D)
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

A study on financial leverage in co operative spinning mills Ltd. Uthangarai, One of the ways
to increase the value of impact of resource is to use leverage. Traditionally, discussion on
leverage was view from the perspective of financial leverage which arises from financial
activities. However, operating leverage arising from the operating activities of business is
also used extensively these days. Operating leverage increases the return to limit equity funds
by using the money to control asset rather than own. Financial leverage as well as operating
leverage on the profitability of the selected company. The study investigating the impact of
degree of financial leverage and operating leverage on correlation analysis the finding
suggest that financial leverage had no significant relationship on profitability while operating
leverage had significant relationship on profitability which the exception of few. The
operating &financial leverage from perspective of the financial manager accenting the
relationship to stockholder wealth maximization (SWM), risk & return potential agency
problems. It also covers some of the potential literature related specifically to the implication
of operating & financial risk association measurement dilemmas .the little effect on the
dynamics of stock return volatility of at the market level . Financial leverage contributes
more to the dynamics of stock return volatility for a small firm.
Keywords: Operating Leverage, Financial Leverage, Profitability.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 70


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON ONLINE TELECOM CUSTOMER SERVICE SYSTEM


Mr. C. Sarthkumar, Mr.R.Murugesan M,com,MBA,MPhil(PhD).
Department of Management studies
P.S.V College of Engineering & Technology
ABSTRACT

The project entitled “Online Telecom Customer Service System” helps to


accomplish this task of solving and clarifying the customers’ queries. This product facilitates
the user to submit online complaints independent of the system. This system has been
developed by using Active Sever Page ASP .NET technology with Structure Query Language
(SQL) server 2000 as backend The “Online Telecom Customer Service System” can be used
by a Telecom Company to provide online support to its customers. This may include
questions about their services or even complaints the customers may have customer service
record. Although a manual system can be done, time plays an important role in customer
satisfaction. A customer always expects services to be offered as soon as possible and the
organization is responsible for making sure its customers stay satisfied. Client module is used
for handling the customer complaints and stores it in the database. Customer service Record
(CSR) module is concerned with the processing complaints and giving solution to the
complaints. Quality Assurance module is concerned with verifying and monitoring the
performance the CSR. As most organizations are going, or are already online, the “Online
Telecom Customer Service System” will prove an added advantage to them in this internet
world. The manual submission of complaints and customer servicing has been the most
tedious part of the business. The time delay for a response and accuracy of complaint solving
plays as vital role for customer servicing. This scenarios and objectives play the mandatory
development of application to serve the customer with customer service satisfaction.
KEYWORDS: Online telecom customer service system, Active Server Page ASP.NET,
Structure Query Language (SQL).

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 71


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON JOB ANALYSIS


Ms. S.Selvarasi, Mr.R.Murugesan M,com,MBA,MPhil,(Ph.D).
Department of Management studies
P.S.V College of Engineering & Technology
ABSTRACT

Job analysis is a systematic and organized investigation, exploration, study and


recording of tasks, responsibilities, duties, skills, accountability, competencies, scopes, and
work environment of a specific job. Furthermore, job analysis also relates the physical and
emotional skills of the job. The entire factors mentioned above further explain what
requirement must be met by an employee in order to perform well. Simply put the idea of
putting the right person in the right job shall be accomplished by applying the job analysis.
The successfully job analysis will clarify information needed both about a job and the
personnel. Facts about a job that can be derived are job title, job location, job summary,
duties involved, working condition, possible hazards and machines, tools, equipment and
materials to be used by the present or potential employee. While for the personnel, we will
identify information regarding the qualities and competencies of a qualified person handling
the job. Such information is the level of education, competencies, experience, judgment,
training, initiative, leadership skills, physical skills, communication skills, responsibility,
accountability, and emotional characteristics.
Keywords: Job specification, job description, Managerial skills.

A STUDY ON EMPLOYEE ENGAGEMENT


Ms. M.Sudha,Mr.S.Vignesh.,MBA
Department of Management studies
P.S.V. College of Engineering & Technology

ABSTRACT
Motivated and engaged employees tend to contribute more in terms of organizational
productivity and support in maintaining a higher commitment level leading to the higher
customer satisfaction. Proper attention on engagement strategies will increase the
organizational effectiveness in terms of higher productivity, profits, quality, customer
satisfaction, employee retention and increased adaptability to achieve evaluated life style.
This project focuses on the need for such employees, how their presence can improve the
progress, work efficiency of the organization as a whole, various factors which lead to
employee engagement and what should company do to make the employees engaged This
study helps to understand the perception and to measure the current level of employee
engagement in service sector industry and to measure & improve perception of employee
engagement among employees and to understand the techniques used for employee
engagement across the industry. Also focuses on the challenges faced by the HR managers to
improve employee engagement for the organization’s survival. The dissertation aims to
measure engagement and look at the areas where management interventions can be
implemented to increase the overall level of employee engagement.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 72


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON PERFORMANCE APPRAISAL SYSTEM


Ms. S.Suganthi, Ms. Yogambal.N MBA .,M.Phil
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

This report has been designed to discuss the Performance Appraisal system of IDBI
Federal Life Insurance Co. Ltd. It also discusses about the various ways and methods of
Appraisal systems being followed in the company. The report discusses about the satisfactory
level of the employees of the company, with the existing system. It also highlights on some
of the merits and demerits of this Appraisal system, and also tries to find out if the current
system has helped them improve in the overall productivity of the company. In this paper, I
basically tried to explain why Performance Appraisal system is important in an insurance
industry as such. In the present company, IDBI Federal Life Insurance Co. Ltd. They have
been following an old traditional method of Appraisal System, since their inception. So,
through this paper, I studied about the entire process in detail, and got feedback and
responses from the employees themselves about how they feel about the system. It is also
observed that, though there are several ways, in which the employees are being appraised,
their satisfaction levels as well as motivation levels were not that high. This could be due to
various factors. On the other hand, through this paper I have also tried to figure out if there
are any kinds of errors associated with this kind of system. It is seen that there are a few
loopholes associated with the entire Appraisal process. But on the other hand, there are a
number of merits associated with the Appraisal system as well. In my study, I also tried to
highlight the kind of correlation existing between the Attrition rate as well as the sales
turnover of the company, year by year. This reveals the fact that, the Appraisal system does
play major role in determining the overall productivity of the company. As my primary
objective is to try and develop a new Appraisal System for the company, before proposing a
whole new method of Performance Appraisal System for IDBI Federal Life Insurance Co.
Ltd. Through this paper, I have recommended a new Performance Appraisal System for IDBI
Federal Life Insurance Co. Ltd., and it is likely to reduce the errors and biasness, in contrast
to the current system. This could likely improve on the overall productivity of the company
as well as increase the satisfaction of employees, thus reducing the Attrition rate, for the
upcoming financial year.

Key word: performance appraisal, traditional method ,motivation

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 73


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON EMPLOYEE ABSENTEEISM


Mr. S.Venkatesan, Ms. Yogambal.N MBA.,M.Phil
Department of Management studies
PSV College of Engineering and Technology
ABSTRACT

Absenteeism is a major problem faced by almost all employees of today. it places


huge financial burdens on organization and has a detrimental effect on productivity and
performance. although researchers have attempted to identify a factors that cause, a related
to absenteeism so that appropriate solution can be developed ,staffs themselves, as a result, a
purpose of study was to determine the perceive factors that contribute to a employee
absenteeism in Kenya ports authority. Absenteeism as long as been a major human relation
problem for manager and supervisor .absenteeism is a serious workplace problem and
expensive occurrence, it is a major problem faced by today’s employees. Some of mostly
sited reasons included strict adherence to set down policies on absenteeism, counseling and
rehabilitations of staff who have drug and substance. Problems, improved supervision
attendance of staff fair treatment, motivation and recognition of staff and also rewarding of
good attendance the recommendations where there to adapt the four approaches to managing
attendance as suggested by Bevan(2003)
Keywords: Motivation, Training, Performance Appraisal, counseling

A STUDY ON CONSUMER SATISFACTION


Mr. R.Vigneshwaran,Mr R.Murugesan M,com.,MBA.,MPhil(Ph.D).
Department of Management studies
P.S.V College of Engineering & Technology
ABSTRACT

The main research that followed is to know consumer satisfaction, the survey
involved gathering in wide information about the company it is products customer
satisfactions and impact of various competitive forms on the company from the information
collected various abstracts where identified where the needed to focused more to improved
efficiency of marketing . The research was conducted through collection of primary and
secondary data was collected through visiting various website about fruit product. Good
services and consumer satisfaction are very important for companies for both of small and
big companies, but especially for small companion’s .today competition between companies
growing the time of why good service is becoming more and important. When a company
manager survey it is customer well enough and market them happy company can create long
term customer relations and possibly get free marketing at the same time and satisfied.
Customer tell about the goods and services got the satisfied customer have possible impact on
the company result. it is important and an interesting to investigate. When measuring
customer satisfaction it is possible to get useful information customer and result can be used
to improve a company and it is services. You get an exact idea what your customer want and
you can start developing services measuring to customer satisfaction should be a continuous
process that is carried out regularly not just one if is done regularly result will be more
beneficial.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 74
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON EMPLOYEE STATIFICATION


Ms. N.Vimala, Mr. G.Murugan. MBA.M.Phil
Department of Management studies
P.S.V. College of Engineering and Technology
ABSTRACT

Employee satisfaction is the terminology used to describe whether employees are


happy, contended and fulfilling their desires and needs at work. Many measures support that
employee satisfaction is a factor in employee motivation. Employee goal achievement and
positive employee morale in the work place. Basically employee satisfaction in a measure of
how happy workers are with their job and working environment In this paper various
variables responsible for employee satisfaction has been discussed such as organisation
development factors job securities factors, work task factor, policies of compensation and
benefit factor and opportunities which give satisfaction to employees such as promotion and
career development also has been described. This paper also deals with the various ways by
which one can improve employee satisfaction. The data collection method includes two
sources like primary sources and secondary sources. Which are collected directly from the
respondents through questionnaire? Secondary data were administrated from organisation
internal records, magazines, text book. The implication of this study from the result of the
study are that it is important for managing director to provide recommendation for supporting
the development plan of the organization furthermore when director are the result and
recommendation of this project to support his management plan they should serve the
effectiveness and the responses of their subordinator performance as well Statistical tools
used in this project is percentage analysis, chi-square.
Keywords: Employee satisfaction, Important tolls of employees’ satisfaction.

P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 75


National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON RECRUITMENT & SELECTION


Mrs. M.Vinothini, Mr.R.Murugesan M,com,MBA,MPhil(PhD).
Department of Management studies
P.S.V College of Engineering & Technology
ABSTRACT

Recruitment may be defined as the process of discovering potential candidates for


actual and anticipated organizational vacancies recruitment is the set of activities used to
obtain a pool of qualified job applicants. In other words, recruitment gets the organization its
human resources. The topic of this paper is Recruitment and selection in a the company srgk
industry pvt ltd, hosur recruitment and selection helps to get the organizational goals to be
attained, for this right person for the right job and right time is essential .All the above
aspects are included in the recruitment process this paper deals with this organization
recruitment process ,sources ,the level used and suggestion were given to improve the
recruitment process for effective functioning. Research methodology used were percentage
method, chi-square test, suggestion was given to improve the recruitment process to be
carried out in effective ways. This recruitment and selection project is been prepared to put a
light on recruitment and selection process. The project report includes meaning and definition
of recruitment, evaluation of recruitment process tips sources of recruitment through which
an organization get suitable applications scientific recruitment and selection which an
organization should follow for right manpower. Job analyses which gives an idea about the
recruitment of the job. Next is selection process which includes step of selection type of test,
type of interview, common interview, problem and their solution approaches to selection
scientific selection policy selection in India and problems.
Keywords: Recruitment, Selection Internal sources, External sources of recruitment,
Recruitment and evaluation, selection process.

76
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)

A STUDY ON WORKING CAPITAL MANAGEMENT


Mr V.Yellaiah, Mrs J.Ramya, MBA., (Ph.D)
Department of Management studies .
P.S.V.College of Engineering and Technology
ABSTRACT
This project is based on the study of working capital management in . An insight view of the
project will encompass – what it is all about, what it aims to achieve, what is its purpose and
scope, the various methods used for collecting data and their sources, including literature
survey done, further specifying the limitations of our study and in the last, drawing inferences
from the learning so far. A leading domestic computer hardware and hardware services
company. is engaged in selling manufactured ( like PCs, servers, monitors and peripherals)
and traded hardware ( like notebooks, peripherals) to institutional clients as well as in retail
segment. It also offers hardware support services to existing clients through annual
maintenance contracts, network consulting and facilities management. The working capital
management refers to the management of working capital, or precisely to the management of
current assets. A firm’s working capital consists of its investments in current assets, which
includes short-term assets—cash and bank balance, inventories, receivable and marketable
securities. This project tries to evaluate how the management of working capital is done in
through inventory ratios, working capital ratios, trends, computation of cash, inventory and
working capital, and short term financing
Key Word: Working capital, operating cycle, profitability, operating profit.

77

You might also like