Volume 8 Issue 8
Design and Development of a Secured Smart Home Automation System Using IoT and Raspberry Pi
Author's Name: Harish Ilango, Kavin

Abstract—This paper deals with the design and implementation of Raspberry pi based IOT concept it means internet of things. In this present generation everything is going on internet itself. So in this project we concentrate totally on the present generation life how they can get security to their home or office and control the devices by using android app just by using internet in there smart phones. The main security is provided by camera module which captures the images and uploads into the internet and also stores the same images in Raspberry pi module SD card. Raspberry pi acts like a small minicomputer it is totally a Linux platform. By just connecting mouse and keyboard we can operate it as minicomputer where we can play games, play videos etc just like our personal laptop work. And also the WI-FI module is used in this project to control the devices from remote location also by getting the status of the devices into smart phone android app everything is going on internet itself our day to day life. Future generation will work on internet itself by sitting in one place we can do anything on internet. Keywords: IOT, Wi-Fi, automation, camera, cloud, android,Raspberry pi

Analysis of Power Consumption and Propagation Delay in Double-Tail Comparators
Author's Name: Mathan Malarventhan

Abstract— This paper presents the comparison of proposed double tail comparator with conventional double tail and existing double tail comparator. The low power and high-speed analog to digital converters used are of dynamic regenerative comparators to maximize speed. Presenting different architectures for calculating delay and power consumption in dynamic double tail comparator. The power gating technique is used to design the proposed comparator. By using this technique, delay and power consumption is reduced compared to the conventional double tail comparator and the existing double tail comparator. The important parameters are speed and power consumption. Cadence design tools used to simulate the comparator in the 90nm technology with the supply voltage of 0.6v.

Implementation of Power-Efficient Reversible Combinational and Sequential Circuits
Author's Name: Raghunathan, Sivananthan

Abstract— This paper presents the comparison of proposed double tail comparator with conventional double tail and existing double tail comparator. The low power and high-speed analog to digital converters used are of dynamic regenerative comparators to maximize speed. Presenting different architectures for calculating delay and power consumption in dynamic double tail comparator. The power gating technique is used to design the proposed comparator. By using this technique, delay and power consumption is reduced compared to the conventional double tail comparator and the existing double tail comparator. The important parameters are speed and power consumption. Cadence design tools used to simulate the comparator in the 90nm technology with the supply voltage of 0.6v.

Mitigation of Interference in Cognitive Femtocell NetworksUsing Low-Power 3T Gain Cell eDRAM Techniques
Author's Name: G. Siru Najgesh, V. Abhinaya

Abstract— Logic compatible gain cell (GC)-embedded DRAM (eDRAM) arrays are considered an alternative to SRAM because of their small size, non rationed operation, low static leakage, and two-port functionality. But traditional GC-eDRAM implementations require boosted control signals in order to write full voltage levels to the cell to reduce the refresh rate and shorten access times. The boosted levels require an extra power supply or on-chip charge pumps, as well as nontrivial level shifting and toleration of high voltage levels. In this paper, we present a novel, logic compatible, 3T GC-eDRAM bit cell that operates with a single-supply voltage and provides superior write capability to the conventional GC structures. The proposed circuit is demonstrated in 0.25μm CMOS process targeted at low power, energy efficient application. Keywords: DRAM, GC, VLSI, SRAM, 3T, Cell.

Application of an Optimized Design Approach for Transient Heat Wave Analysis
Author's Name: Gaja Malyani Kaddha, Shanvika

Abstract— : The Engine cylinder is one amongst the main automobile parts that is subjected to warmth variations and thermal stresses. So as to chill the cylinder, fins area unit provided on the surface of the cylinder to extend the speed of warmth transfer. By doing thermal analysis on the engine cylinder fins, it's useful to grasp the warmth dissipation within the cylinder. The principle enforced within the project is to extend the warmth dissipation rate by victimization the invisible operating fluid, nothing however air. we all know that, by increasing the extent we will increase the warmth dissipation rate, therefore planning such an oversized advanced engine is extremely tough. The most purpose of victimization these cooling fins are to chill the engine cylinder by air. The main aim of the project is to investigate the thermal properties by varied pure mathematics, material and thickness of cylinder fins. Transient thermal analysis determines temperatures and alternative thermal quantities that fluctuate over time. The variation of temperature distribution over time is of interest in several applications like in cooling. The correct thermal simulation might allow essential style parameters to be known for improved life. Presently Material used for producing cylinder fin body is atomic number 13 Alloy A6082 that has thermal conduction of 110- 150W/mk. we tend to area unit analyzing the cylinder fins victimization this material and conjointly victimization atomic number 13 alloy 6082 and Graycast iron that have higher thermal conductivities.

A case study of Insurance Companies Quality Leadership Style in Relation to Enterprise Commitment in India
Author's Name: Grihidhar Menon, Nivitha D

Abstract— This paper presents the comparison of proposed double tail comparator with conventional double tail and existing double tail comparator. The low power and high-speed analog to digital converters used are of dynamic regenerative comparators to maximize speed. Presenting different architectures for calculating delay and power consumption in dynamic double tail comparator. The power gating technique is used to design the proposed comparator. By using this technique, delay and power consumption is reduced compared to the conventional double tail comparator and the existing double tail comparator. The important parameters are speed and power consumption. Cadence design tools used to simulate the comparator in the 90nm technology with the supply voltage of 0.6v.

Mitigation of Interference in Cognitive Femtocell Networks Using Low-Power 3T Gain Cell eDRAM Techniques
Author's Name: G. Siru Najgesh, V. Abhinaya

Abstract— Logic compatible gain cell (GC)-embedded DRAM (eDRAM) arrays are considered an alternative to SRAM because of their small size, non rationed operation, low static leakage, and two-port functionality. But traditional GC-eDRAM implementations require boosted control signals in order to write full voltage levels to the cell to reduce the refresh rate and shorten access times. The boosted levels require an extra power supply or on-chip charge pumps, as well as nontrivial level shifting and toleration of high voltage levels. In this paper, we present a novel, logic compatible, 3T GC-eDRAM bit cell that operates with a single-supply voltage and provides superior write capability to the conventional GC structures. The proposed circuit is demonstrated in 0.25μm CMOS process targeted at low power, energy efficient application. Keywords: DRAM, GC, VLSI, SRAM, 3T, Cell.

Execution of Concurrent Data Operations in Cloud Computing Using Encryption Techniques
Author's Name: Charulatha Babu, Subramaniyan

Abstract— Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.

12 Design and Implementation of an Autonomous Farm Covering System for Harsh Environments Using Machine Learning and IoT
Author's Name: Dilip Knaiker, Nauya Narayan

Abstract— India is the country where 70% of the population depends on farming. Farming is the primary resource income in rural parts of India. As the population is increasing day by day, the need for huge Raw materials is also required for processing food. So there will be a huge constraint on the farming sector. Nowadays, due to global warming and other drastically changing environmental conditions like heavy rains, the crops get damaged at the yielding stage and cause a significant loss to the farmers. There is also a need for advanced farming adaption techniques in the fast-changing technology world. Every farmer believes in good results at yielding stage and excellent quality. For fulfilling the above conditions, an Automatic farm covering system in unfavourable Conditions and parallel a Smart irrigation system is developed. These will help to reduce effects at the yielding stage also provides irrigation smartly. The project consists of Raspberry Pi as a controller, three different sensors (DHT 11, humidity, moisture, soil) as input. The output is connected to Raspberry Pi which consisting Driver IC and high torque DC motor, valve. The output is activated by the developed App. It takes required inputs from the user, uploads them to the server. It has a client-server architecture. The raspberry pi processes data as per intelligence given to it by the Machine Learning model. Machine Learning algorithm (Random forests Classifier) works on sensor data for predicting the mechanism of automatic ON / OFF system. The predicted result is given as output to the Motor driver and Valve for Automatic ON and Off purposes. The farmer can able to do an Automatic Shut/Open system by using an App (Mobile application controlled through Internet). All processes such as irrigation, covering the system in unfavourable conditions can be held remotely with the help of App and a Smart automation system..

Analysis of Traffic Optimization in Video Streaming Through Image Processing Techniques
Author's Name: Hjwal Hussian, Ali Hussian

Abstract— In this study, we have investigated the prospects of predicting traffic based on video surveillance. We have used the following image processing algorithms: object detection and counting it, pathway analysis. The process is designed to analyze images obtained from a surveillance camera. The model uses server-client architecture.

Distributed Clustering Approach for Ad-Hoc Networks using EAR Protocol
Author's Name: Abhikam Mishra, Sunil Joshi

bstract— : The Cluster creation in MANET has paying attention in recent times and clustering as defined in Mobile ad hoc network partitioning of mobile nodes into different groups, and each group contains ordinary node, cluster head and getaway .The basic need to create cluster is to save the energy consumption, simplicity of routing, extending capability and to improve the network efficiency .In MANET the energy consumption of each node is key element, when the energy of node is drained, the node become fails to sense the data or forward the data, if the cluster head energy drained then not only fails cluster head it will leads entire cluster is collapse ,So after we can reconstruct new cluster with remaining nodes, called as Re-clustering, but Reclustering needs high energy consumption, but nodes have limited resource constraints, In order to overcome clustering problems we need design new energy clustering protocol, in this work we are proposing Intra-balanced LEACH (IBLEACH) protocol to achieve life span of WSN.

Voice Biometric Authentication System Using DWT-Based Color Image Steganography
Author's Name: RamGopal, Chitradevighose

Abstract— Voice recognition is a process of identifying the identity of an unknown speaker on the basis of individual information that contain in the speech signal. Voice recognition is one of the biometric technologies used in a security system to reduce cases of fraud and traits. Voice biometric is an easy and cost effective biometric technique which requires minimalistic hardware and software complexity. General voice biometric needs a voice phrase by user which is processed with Mel Filter and Vector Quantized features are extracted. Vector quantization reduces the codebook size but decreases the accuracy of recognition. Therefore we propose a voice biometric system where voice file's non quantized code books are matched with spoken phrase. In order to ensure security to such direct voice sample we embed the voice file in a randomly selected image using DWT technique. Imposters are exposed to only images and are unaware of the voice files. We show that the technique produces better efficiency in comparison to VQ based technique..