{"title":"Renewable energy source selection using analytical hierarchy process and quality function deployment: A case study","authors":"Ajitesh Das, Shabbiruddin","doi":"10.1109/ICONSTEM.2016.7560966","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560966","url":null,"abstract":"Selection of renewable energy sources is an important strategic decision making problem for both private and public sectors. In general varied factors affect the appropriate source selection problem which adheres to uncertain and imprecise data. In this paper the integrated Analytical Hierarchy Process (AHP) - Quality Function Deployment (QFD) model is used to determine the most viable renewable energy source for the state of Maharashtra. The QFD method has been used to determine the most preferred energy source from the customer's point of view considering the technical factors. Six technical factors have been considered for the case study in ranking the sources of renewable energy. The purpose of using the AHP criteria was to have a holistic selection procedure to aid in the justification of selection of renewable energy source. The proposed integrated approach provides more truthful and steadfast results, and facilitates the decision maker to manage multiple opposing decision perspectives through eliminating the limitations of AHP and QFD method.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relay coordination for distribution system","authors":"K. Anupreyaa, T. C. Sabari Karthiga","doi":"10.1109/ICONSTEM.2016.7560973","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560973","url":null,"abstract":"In power system protection relay and circuit breakers is the major instrument for large interconnected power system. We need proper protection to isolate the faulted region from healthier network. When two protective apparatus installed in series have certain characteristics, which provide a specified operating sequence, they are said to be coordinated or selective. The objective of protective relay coordination is to achieve selectivity without loosening sensitivity and quick fault clearance time. Relay coordination is an important aspect in the protection system design as coordination schemes must guarantee fast, selective, and reliable relay operation to isolate the power system faulted sections. Thus the relay coordination problem is formulated, for a real time distribution system is simulated using ETAP.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Palm print recognition using liveness detection technique","authors":"D. Aishwarya, M. Gowri, R. Saranya","doi":"10.1109/ICONSTEM.2016.7560933","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560933","url":null,"abstract":"Biometric based identification (or biometric authentication) is one of the fields emerging recently, used as a form of identification and access control in various places. Biometric authentication uses many different aspects of human behavior and physiology. History of threats, failures and spoofs have been recorded for biometric authentication, that seems to indicate that their authentication quality has not yet met the expectation. There are various threats known, of which the so called direct or spoofing attacks, have motivated the need to study the vulnerable points against this type of fraudulent actions. Number of systems exist for biometric detection with anti spoofing methods. But due to increase in spoofing techniques these anti spoofing methods become less efficient. This paper presents a system, that is based on palm print recognition. Palm Print is chosen since it is feature rich and less likely to destruction. The system presented detects the bio metric traits using Liveness detection method and after enhancing the trait using weber's local descriptor algorithm. The proposed system is not specific to any spoofing method. It assess the image quality to detect if the trait is real or fake one. And Euclidean distance formula is used for authentication to reduce both false rejection and false acceptance rate.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved discovery of rating fake for cellular apps","authors":"Navdeep Singh, Prashant Pandey, Srinivasan","doi":"10.1109/ICONSTEM.2016.7560938","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560938","url":null,"abstract":"Improvising the capability of searching fake rating for mobile applications. Basically the process done is completely based on reviews and rating but while the process is going on each and every review is important so that we can get a good qualitative application. In such a situation a comprehensive view of ranking fake is provided as well as suggests a ranking fake detection for cellular applications. Specifically the initial suggestion would be to appropriately locate the fake ranking by the means of mining of the active intervals, specifically leading classes, of cell apps. The rating of a particular application is basically given by the app user reviews which may be good or bad, post which the bad as well as good reviews are measured and observed in terms of originality post which the positive rating apps will be shown at the top on the leader board. In the meanwhile finding the fake reviews, the near estimation of the reviews and rating percentage is calculated based on a systematic procedure. In such main sessions can be taken as advantage for detecting the near by abnormality rather than international abnormality of App ratings. Furthermore while making an analysis three types of evidences are found which include ranking primarily based authentication, rating based authentication and evaluate primarily based authentication by modelling Applications rating and evaluation behaviour via statistical hypotheses exams. In the same manner endorsement of an optimization based aggregation is done by the method of combining all the evidences for fake detection. Thus in the rating on reviews are calculated by the best reviews given by the user while that same app user used that particular app and they know about the minute details of the working of the app and the structural behaviour of that application. The calculation of the proposed machine with the real time Global App information is collected from the IOS App keeping for a long period. While doing the practical's where ever the user reviews are fake it may cause for a user to select a bad as well as a useful app for reducing the disadvantage could be used in this process.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126202591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space vector pulse width modulation for DC-AC converter","authors":"H. Sathishkumar, S. Parthasarathy","doi":"10.1109/ICONSTEM.2016.7560968","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560968","url":null,"abstract":"This paper deals about the concept of space vector pulse width modulation for DC-AC converter. Converter used here is nothing but a three phase inverter. Six pulses are generated for triggering switching devices used in the inverter. Based on these pulses inverter is delivering its three phase output voltage in the load terminals. Star connected resistive and capacitive load is used here in the inverter output. Two sinusoidal signals are used as input for this svpwm unit. Svpwm technique is one of the most recent trends in the pulse generation. Compared to conventional pwm and sinusoidal pwm this svpwm generates the precise pulses which is required for the three phase inverters. This svpwm generates the pulses based on the sector formation. Moreover output voltage of this inverter is formed with the reduced value total harmonic distortion.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of flooded areas from multitemporal SAR images","authors":"N. Kalpana, A. Sivasankar","doi":"10.1109/ICONSTEM.2016.7560951","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560951","url":null,"abstract":"Multi temporal synthetic aperture radar images are available, precise calibration and perfect spatial register are required to get a useful image for displaying changes that contain occurred. SAR calibration is a extremely complex and sensitive problem; a few errors may persist after calibration that interferes with subsequent steps in the data fusion and visualization process. Because of the non-Gaussian model of radar backscattering, traditional image pre processing procedures cannot be used here. To solve this problem “cross-calibration/normalization,” method can be used. In image enhancement and the numerical comparison of many image takes together with data fusion and visualization processes. The proposed processing which contain filtering, histogram truncation, and equalization steps and region growing and merging algorithm applied in an adaptive way to the images. RGB composition is used to combining an pre & post flood image or identify an flooded areas.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"16 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA based filters for EEG pre-processing","authors":"K. Sundaram, Marichamy, Pradeepa","doi":"10.1109/ICONSTEM.2016.7560958","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560958","url":null,"abstract":"The EEG pre-processing steps involve removing noise and artifacts from EEG. The noise from the main source like electro-oculogram, electrocardiogram, electromyogram and other sources should be eliminated to increase accuracy in classification. As these artifacts may be misinterpreted as originating from the brain, there is a need to minimize or remove them from recorded EEG signals. The artifacts are undesirable potentials of non-cerebral origin and eye blinking that contaminate the EEG signal. EEG artifacts originate from two sources namely, physiological and technical. Technical artifacts are mainly due to equipment malfunction; result from poor electrode contact or line interference. Offset, filter settings, or incorrect gain of the amplifier will cause distortion clipping or saturation of the recorded signals. Technical artifacts can be avoided through consistent monitoring, meticulous inspection of equipment and proper apparatus setup. Physiological artifacts arise from a variety of body activities that are either due to movements, skin resistance fluctuations or other bioelectrical potentials. Proper filters need to be designed to filter these artifacts. Moving average filter and Median filters are easy to implement and these filters acts as best pre-processing stage for noise removal. In this paper filters such as Moving average and Median filter are implemented in FPGA (Virtex-5) and compared in terms of area, power and delay. Though Moving average is fast when compared to Median filter. Median filter is the best for pre-processing since it occupies less area and power.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126325072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Jayashree, K. Farhath, R. Amruthavarshini, S. Pavithra
{"title":"Voice based application as medicine spotter for visually impaired","authors":"D. Jayashree, K. Farhath, R. Amruthavarshini, S. Pavithra","doi":"10.1109/ICONSTEM.2016.7560923","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560923","url":null,"abstract":"This paper proffers an application in order to expedite easy and innate way to find the medicine for the visually impaired people and to take it according to their Doctor's prescription. Visually impaired people need not be dependent and seek others help to find the medicine to be taken. This android application is used to overcome the difficulties they face in this scenario. In this application, a reminder is set which tells the user when to take the medicines, as voice output. The pictures of the medicine strip held in the hand are captured by the inbuilt camera of the mobile. The image is processed and consequently text localization and extraction is done by which the name of the medicine is identified. A spotter section is also consolidated with this application which checks the prescription which has been already uploaded in the user's mobile, compares with the name of the medicine identified and if the medicine has to be taken at that time, then it tells the quantity of medicine to be taken to the user as voice output. On receiving the voice output from the mobile, the user intakes their medicines according to their prescription. It can also be useful for uneducated people who suffer to find which medicine must be taken. Especially elder people who are not educated usually suffer to read their medicine names on their own. This idea would achieve good results in practice.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake biometric detection using image quality assessment: Application to iris, fingerprint recognition","authors":"S. Saranya, S. V. Sherline, M. Maheswari","doi":"10.1109/ICONSTEM.2016.7560931","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560931","url":null,"abstract":"Image Quality Assessment (IQA) is one of the statistical techniques used in image processing to determine whether the biometric sample is real or fake. The objective of the system is to enrich the biometric recognition security. This paper deals with two distinct measures of IQA. The first measure is Full-Reference(FR) IQA consists of a 2D image extracting different image quality features using a reference image which is filtered by a technique called Gaussian filtering. The second measure is No-Reference (NR) IQA used to estimate the quality level of an image. Eventually, 26 image quality features are exacted to minimize the degree of complexity. Quality of test sample implies to results of the following process of classification based on IQA. Presented paper briefly introduces the IQA theory and its measures. Results are documented for the selected real and fake pictures.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal biometrics security system for authentication","authors":"A. Maheshwari, M. A. Dorairangaswamy","doi":"10.1109/ICONSTEM.2016.7560940","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560940","url":null,"abstract":"Recently biometrics based authentication system provides security from attacks. This paper presents to implement the biometric system based on the combination of graphical image and palm print with steganographic technique for authentication purpose. Here before the concealing of the voice data, the palm print is processed using Weber Local Descriptor. Here the voice data hiding approach involves concealing of individual voice data within their biometric to enhance the privacy protection. The voice data is being converted into text data using voice to text convertor. Before the data is hidden it is being encrypted using Chaos encryption. The data is being hidden inside the palm print using bits wrap algorithm. The features of the Graphical Image are extracted using Lifting Wavelet Transform.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}