2015-16 - sri krishna arts and science · pdf file2015-16 sri krishna arts and ... kavitha.m...
TRANSCRIPT
2015-16
Sri Krishna Arts and Science College (An Autonomous College)
Affiliated to Bharathiar University Reaccredited with “A” Grade by NAAC An ISO 9001:2008 Certified Institution
Coimbatore 641 008
DEPARTMENT OF COMMERCE (CA)
INDEX
S. No. Title of the abstract Page no
1. LASER AND SENSOR DEDUCTED CAMERA (SPEED
CAMERA) 2
2. STUDY ON CUSTOMER PEFERENCE ON RADIO CALL TAXI
WITH SPECIAL REFERENCE TO COIMBATORE CITY 4
3. AN EMPIRICAL STUDY OF GST ON VARIOUS SECTORS IN
INTERNATIONAL TRADE 6
4. ANALYZING THE FINANCIAL PERFORMANCE AND
SOUNDNESS OF SELECT INDIAN PUBLIC SECTOR AND
PRIVATE SECTOR BANKS: AN APPLICATION OF
BANKOMETER MODEL
8
5. A STUDY ON CONSUMER RESPONSE TO UNETHICAL PRACTICE OF RETAILERS IN A PRE-OCCUPIED SOCIETY.
10
6. CARD-LESS ATM TECHNOLOGY 12
7. A STUDY ON CONSUMER PREFERENCE TOWARDS
HIMALAYA BABY PRODUCTS 14
8. STUDY ON CONSUMER SATISFACTION ON USING
ONLINE WEBSITES FOR ORDERING FOOD 16
9. TO STUDY ON CONSUMER AWARENESS AND
USAGE OF E-BANKING TRANSACTION THROUGH
MOBILE PHONES
18
10. FACTORS AFFECTING THE CREDIT SUPPLY
NETWORK OF KNITWEAR EXPORT UNITS IN
TIRUPUR
20
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 2
1. LASER AND SENSOR DEDUCTED CAMERA (SPEED CAMERA)
Archana.K
Tharani.C
SRI KRISHNA ARTS AND SCIENCE COLLEGE, COIMBATORE
ABSTRACT
The automated speed enforcement technologies is now wide spread throughout many
parts of the world and the research reports has consistently demonstrated the positive road
safety benefits that has been achieved by using these technologies. Fixed and mobile speed
camera system measures the time taken by a vehicle to travel between two or more distinct
sites are called Automatic Number Plate Recognition (ANPR). The name is derived from the
fact that the technology uses Infrared camera linked to a computer to read a vehicle
registration number and identify it in the real time. From this mobile speed camera technique
which works on the principle of mobility is updated to a version of speed camera that is
located at a specific place. The camera in this makes use of the RADAR technology that
involves electromagnetic waves to detect objects. It gives information about the speed,
distance and objects. It makes use of DOPPLER EFFECT to determine the vehicular speed.
A speed camera is also known as automated ticketing machine. This device includes a camera
mounted invariably behind the road signs or trees or any part of the road side. It is extremely
handy and helpful to monitor the vehicle and its speed. Thus this new method has been
emerged to detect the speed of the car. DOPPLER EFFECT says that the apparent change in
pitch due to relative motion between source and destination. In today’s fast and busy moving
world, the accidents are increasing at a very fast rate and the detection becomes rare. One of
the major causes of these accidents is considered as over a speeding and misdetection of
vehicles. A major step that has been taken rather to increase the road safety, and also so as to
minimize the accidents in roads which led to the invention of speed camera. Speed camera
that has been placed on the side of urban and rural roads, usually to catch those who violate
the stipulated speed limit on specific areas. The speed camera, that are placed are solely to
identify the suspected drivers who pass the road with excess speed.
BIBLIOGRAPHY
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 3
1. Nalini.K (2013). A study on Consumer Behaviour Towards Micro packs (FMCG) in rural
Areas of Coimbator City. Internat.
2. Anbumalar.S (2016). Green Marketing es and opportunities and challenges. Conference levelnce
proceedings coimbatore.
3. SenthilKumar.K (2015). A Market Study about Laser Toner in Chennai City. International
Journal of Science & Research , 4 (3)
4. SenthilKumar.K (2015). Dynamic Factors for the Growth of Rural Entrepreneurs. Vanijya
Vimarsh - Journal of Commerce , 1 (1).
5. Anbumalar.S (2016). Role of MSMES and indian Economy. one day national
seminor on MSMEs in India: challenages and opportunities, 1, pp. 133-135. Trichy.
6. Prakash.L (2015). Emerging Trend of E-Commerce in International Business - Prospects and
Challenges in India. E-Commerce in International Business. Hikey Media.
7. Kavitha.M (2013). Consumer Awarness towards E-Marketing. Redefining Business Horizons.
2, pp. 481-489. Chennai: Semmoodhai Pathipagam.
8. Anbumalar.S (2015) The Effect of Online Advertising on College
Student Buying Habit; INDO Global Journal of Commerce and Economics;
ISSN:2393- 9796; Pp141- 145.
9. Nalini.K (2013). Impact of Sales Promotional Activities of Airtel Broadband. National
Conference NCIBPTE. Erode.
10. SenthilKumar.K (2015). A Market Study about Laser Toner in Chennai City. International
Journal of Science & Research , 4 (3).
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 4
2. STUDY ON CUSTOMER PEFERENCE ON RADIO CALL TAXI
WITH SPECIAL REFERENCE TO COIMBATORE CITY
Marry.P.T
Kavitha.M
Sri Krishna Arts And Science College, Coimbatore
ABSTRACT
The study on customer preference on Radio call taxi with special reference to
Coimbatore city undertaken to find the customer satisfaction and preference towards Radio
call taxi in the city. Few years ago, a taxi passenger in India had to wait for a long time to
board a Maruti Omni or Tata Indica, without accepting a courteous treatment from the driver
and above all, the passenger had to bargain with a taxi dive over the bill. This was the case of
an un organised taxi in the city. But today the scenario had turned the other way around. In
the recent years the taxi industry in India has witnessed dramatic changes. This study gives
an insight about the different business models used by the radio taxi companies for their
operations, the various value propositions offered to the customer to satisfy them, and the
role of government in regulating the radio taxi industry.
BIBLIOGRAPHY
1) Gnanakumar, Baba; Contagion Effect in Infrastructure companies’ IPO
International Finance for Infrastructure Development ;2012; Bloomsbury Publishing
Ltd
2) Gnanakumar, Baba; Customizing Enterprise Brand Resonance Through
Private Labels; International Journal of Research in Commerce and Management;
2010; IJRCM
3) Kowsalya.S (2015). Tax Evasion in India. National Conference on Tax Reforms in
India (pp. 4-6). Sivakasi: Sri Kaleeswari College.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 5
4) Amudha.S (2015). Emerging Trend of E-Commerce in International Business -
Prospects and Challenges in India. E-Commerce in International Business. Hikey
Media.
5) Preethi.S (2015). Cyber Crie Management. Bonfring International Journal of
Industrial Engineering and Management Sciences , 5 (3), 124-130.
6) Sumathy.N (2015). Effectiveness of online Marketing. Journal of Intercontinental
Management Research Consortium , 3 (3), 93-103.
7) Sivakumar.N (2014). A Study on Innovation Marketing Strategies as a Sustainable
Competitive Advantage. Management Innovation & Intervention for Sustainable
Development. Excel Publishers.
8) ArunPrakash.P (2015)An Empirical Study on Dividend policy of select Cement
companies in India; Conference Proceedings; ISBN: 978-1-943844-53-1;Pp742-750.
9) Chandradevi.P (2016). Role of micro finance in deconomic development. Edited
Book - financial inclusion for sustainble economic growth - strategies and
challenges, pp. 238-245.
10) Anbumalar.S (2015) Service Marketing in Hotel Industry ; INDO Global Journal of
Commerce and Economics; ISSN:2393- 9796 ; Pp95-97
11) SenthilKumar.K (2016, January). A Study on Association Between Intellectual
Capital & Corporate Performance of Listed Fertilisers Co. in India - A Multivariate
Approach. Primax International Journal of Commerce & Management Research ,
57-64.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 6
3. AN EMPIRICAL STUDY OF GST ON VARIOUS SECTORS IN
INTERNATIONAL TRADE
Sabana Yasmin.S
Mrs.P.Geetha
Sri Krishna Arts & Science College, Coimbatore
Abstract
The impact of introducing goods and service tax (GST) on various sector in international
trade to make changes in rewards to the factors of production and output prices in capital and
international trade at sector level. The multiple tax regime across sectors of production . This
leads to lack of international competitiveness of the sector. Effective allocation of production
resources and providing full tax off sets in expected to results in gain of GDP. Return to the
factors of production and export of the economy. The additional gain in GDP originating
from GST reform GST make a efficient allocation of factors of production. The overall price
level will be go down. It is expected that the real returns to the factors of production would
go up. Implementation of GST across goods & services expected to provide gains to India
and make opportunities in future.
BIBLIOGRAPHY
1) Sivakumar.N (2013). Competition Policy & Consumer Welfare. Consumer Protection &
Welfare. Pradag Print.
2) Sumathy. N(2015). A Study on Changing Consumer Habits of Mall Mania among Students.
Indo Global Journal of Commerce and Economics , 2 (4), 107-113.
3) Sumathy.N (2014). A Study on Stress Management Among Employees in IT Cycles of India.
Managing Human Resources in the Knowledge of Era. Vijay Nicole Imprint Private Ltd.
4) Gnanakumar, Baba; Effect of bank rate variability on Rupee value and Bankex in
India; Journal of Applied Research and Social Sciences,2014
5) Asha.S (2016). Customer Adoption & Satisfaction on Internet Banking Services - An
Analytical Study on Banks in Coimbatore City. International Journal of Multidisciplinary &
Current Research , 4, 93-98.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 7
6) Kowsalya.S (2014). A Study on Consumer Preference towards Herbalife Weight
Management Products in Tirupur City. International journal of Functional Management , 2
(2), 123-127.
7) SenthilKumar.K. (2016). An Empirical Study on Nexus between Credit Risk of Nationalised
Banks in India and Macro Economic Factors - An Economic Perspective. International
Journal of Advance Research and Innovative Ideas in Education , 2 (3).
8) Kowsalya.S (2015). Teacher's Effectiveness of Teaching Process through the Smart Class.
Indo Global Journal of Commerce & Economics , 2 (2), 22-26.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 8
4. ANALYZING THE FINANCIAL PERFORMANCE AND
SOUNDNESS OF SELECT INDIAN PUBLIC SECTOR AND
PRIVATE SECTOR BANKS: AN APPLICATION OF
BANKOMETER MODEL
Josy Mathew
Dr.K.Senthilkumar,
Sri Krishna Arts And Science College, Coimbatore
Abstract
Banking sector plays a major role in the economic development of the country. Banks
acting as financial intermediary to all industries, ranging from agriculture, infrastructure,
textiles, production etc,. Evaluating and monitoring the financial soundness and solvency of
banks is more important. The present study attempts to pragmatically explore the financial
soundness of the top five public sector and private sector banks in India during the post
reforms period 2007-08 to 2011-12 by applying Bankometer model. Bankometer model is
developed according to the guidelines of International Monetary Fund (IMF) to evaluate the
vulnerability of financial agony of the banks. This method is better than the conventional
methods to evaluate the financial soundness of banks. Bankometer has helped to assess the
solvency of banks on the basis of Capital Adequacy Ratio, Capital to Assets Ratio, Equity to
total Assets Ratio, Non-Performing Loans to Total Loans Ratio, Loans to Assets Ratio and
Cost to Income ratio.
The study found that all sample banks are financially solvent. The study revealed that
private sector banks are performed well and are financially more sound as compared to
Indian Public Sector Banks. The study concluded that Bankometer will help the banks
internal management to avoid insolvency issues and improve the financial soundness with
proper control over their operations.
The study considered only the top five PSBs and Private Sector banks in India. Due to
its limitations the present study can be extended in many ways. One of the major limitations
of this methodology is choice of input and output variables. Future research into the financial
soundness and solvency of Indian banks could also consider the efficiency factors also.
Keywords: Public Sector banks, Private Sector Banks, Bankometer, Financial
Soundness.
BIBLIOGRAPHY
1) Amudha.S (2015). Emerging Trend of E-Commerce in International Business -
Prospects and Challenges in India. E-Commerce in International Business. Hikey
Media.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 9
2) Preethi.S (2015). Cyber Crie Management. Bonfring International Journal of
Industrial Engineering and Management Sciences , 5 (3), 124-130.
3) Sumathy.N (2015). Effectiveness of online Marketing. Journal of Intercontinental
Management Research Consortium , 3 (3), 93-103.
4) Sivakumar.N (2014). A Study on Innovation Marketing Strategies as a Sustainable
Competitive Advantage. Management Innovation & Intervention for Sustainable
Development. Excel Publishers.
5) ArunPrakash.P (2015)An Empirical Study on Dividend policy of select Cement
companies in India; Conference Proceedings; ISBN: 978-1-943844-53-1;Pp742-750.
6) Chandradevi.P (2016). Role of micro finance in deconomic development. Edited
Book - financial inclusion for sustainble economic growth - strategies and
challenges, pp. 238-245.
7) Anbumalar.S (2015) Service Marketing in Hotel Industry ; INDO
Global Journal of Commerce and Economics; ISSN:2393- 9796 ; Pp95-97.
8) SenthilKumar.K. (2016). An Empirical Study on Nexus between Credit Risk of Nationalised
Banks in India and Macro Economic Factors - An Economic Perspective. International
Journal of Advance Research and Innovative Ideas in Education , 2 (3).
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 10
5. A STUDY ON CONSUMER RESPONSE TO UNETHICAL PRACTICE OF RETAILERS IN A PRE-OCCUPIED SOCIETY.
Bhuvaneshwari.G,
Dr.N.Sumathy,
Sri Krishna Arts and Science College, Coimbatore
ABSTRACT
The research is on dissatisfaction and complaining behaviour has largely ignored
instance of unethical behaviour on the part of marketers three biases have led to this outcome.
Research has focused on outcomes rather than processes. It has largely ignored possible
ethical problems in interactions with sellers after purchase.And, economic costs have been
emphasised over emotional and psychological costs. Policing systems do not appear likely to
correct unethical seller behaviour.
Profit being the foremost object of the business enterprise, entrepreneurs is finding all
the possible ways to earn profit. The most easiest & common way of swindling profit is to
involved in unethical practices. India being the largest country by population is also
unfortunately notorious for various unethical practices prevailing in the retail industry, not
every unethical practice is reported to the legal authorities. This is because of the tolerance &
ignorance of the Indian consumers. Hence it is the need of hour to analyze the various
reasons that are put in Indian consumers, into such situation.
BIBLIOGRAPHY
1) Prakash. L(2015). Emerging Trend of E-Commerce in International Business - Prospects and
Challenges in India. E-Commerce in International Business. Hikey Media.
2) Sivakumar. N (2014). A Study on Consumer Awareness & Satisfaction towards Selected Mid
Segment Costs. Emerging Paradigms in Management Research. Shanlax Press.
3) Nalini. K (2013). A study on Consumer Behaviour Towards Micro packs (FMCG) in rural
Areas of Coimbator City. International Conference on Global Vision 2020. Excellent
Publishing House .
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 11
4) Sumathy. N (2015). A Study on Changing Consumer Habits of Mall Mania among Students.
Indo Global Journal of Commerce and Economics, 2 (4), 107-113.
5) Geetha. P (2015). Training and Development in HR. Bonfring International Journal of
Industrial Engineering and Management Sciences, 5 (1), 109-114.
6) Asha. S (2016). Customer Adoption & Satisfaction on Internet Banking Services - An
Analytical Study on Banks in Coimbatore City. International Journal of Multidisciplinary &
Current Research, 4, 93-98.
7) Kowsalya. S (2014). A Study on Consumer Preference towards Herbalife Weight
Management Products in Tirupur City. International journal of Functional Management, 2
(2), 123-127.
8) Amudha. S (2015). Emerging Trend of E-Commerce in International Business - Prospects and
Challenges in India. E-Commerce in International Business. Hikey Media.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 12
6. CARD-LESS ATM TECHNOLOGY
ABSTRACT
Bank offers this new card less ATM facility and transfer of cash facility called cash –
on –mobile”. The facility enables you to withdraw cash from an ATM without using your
ATM /debit card. The customers will have to registered, the customers will receive a four –
digit MPIN (mobile personal identification number), just like you get a pin to use your card at
an ATM. The MPIN will ensure the security of your transaction and work as an authorization
code.
The customers can use a GSM phone or CDMA phone after the customers goes to
card-less ATM the customers have to enter the mobile number (which is registered in the
bank) and the customer will receive a onetime password(which will be used once) after that
the customers can proceed the transaction and can also transfer the cash for non bank
customers by entirely their mobile number and it will be transferred to that person .that
person has t fo to the nearest card –less ATM centre after the customer enter the mobile
number the customer will also receive that password he can proceed the transaction.
BIBLIOGRAPHY
1) Kowsalya. S (2015). Teacher's Effectiveness of Teaching Process through the Smart Class.
Indo Global Journal of Commerce & Economics, 2 (2), 22-26.
2) Preethi . S (2015). Cyber Crie Management. Bonfring International Journal of Industrial
Engineering and Management Sciences, 5 (3), 124-130.
R.Deepak Balaji
N.Sivakumar
Sri Krishna Arts and Science College, Coimbatore
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 13
3) Amudha. S(2015). A Study on Export Procedure and Documentation n needle Industries
Private Ltd, Nilgiris. International Journal of Science and research, 4 (9)
4) Geetha. P (2015). Training and Development in HR. Bonfring International Journal of
Industrial Engineering and Management Sciences, 5 (1), 109-114.
5) Asha. S (2015). A Study on Best Business Strategies Adopted by Supermarket on Buying
Behviour with special reference to Selected Super Markets in Coimbatore City. Indian
Journal of Applied Research, 5 (12), 342-345.
6) Sumathy.N (2016). A Study on Effectiveness of Organic Products in the Modern Scenario.
International Journal of Management and Social Science Research Review, 1 (3), 157-161.
7) Sivakumar.N (2014). A Study on Innovation Marketing Strategies as a Sustainable
Competitive Advantage. Management Innovation & Intervention for Sustainable
Development. Excel Publishers.
8) Kavitha. M(2013). Consumer Awarness towards E-Marketing. Redefining Business
Horizons.2, pp. 481-489. Chennai: Semmoodhai Pathipagam.
9) Nalini.K (2013). Impact of Sales Promotional Activities of Airtel Broadband. National
Conference NCIBPTE. Erode.
10) SenthilKumar. K(2015). A Market Study about Laser Toner in Chennai City. International
Journal of Science & Research, 4 (3).
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 14
7. A STUDY ON CONSUMER PREFERENCE TOWARDS
HIMALAYA BABY PRODUCTS
Dinesh.M
Sivakumar. N
Sri Krishna Arts and Science College, Coimbatore
ABSTRACT
This research aim is to study how much the customers are aware about the Himalaya
Baby products. The results of the study help the company to identify the satisfaction level of
the customers and demand of the products. This research identifies the factor that influences
the customers to purchase Himalaya Baby products. This study also analyse the consumers
satisfaction level towards Himalaya Baby products. The reason for undertaking this project
work to study about the consumer’s perception level towards baby products. Unlike other
products, baby products will have different problems in marketing because the buyer and
customer are totally different.
BIBLIOGRAPHY
1) Sumathy.N (2016). A Study on Effectiveness of Organic Products in the Modern Scenario.
International Journal of Management and Social Science Research Review, 1 (3), 157-161.
2) SenthilKumar. K(2015). A Market Study about Laser Toner in Chennai City. International
Journal of Science & Research, 4 (3).
3) Preethi . S (2015). Cyber Crie Management. Bonfring International Journal of Industrial
Engineering and Management Sciences, 5 (3), 124-130.
4) Amudha. S(2015). A Study on Export Procedure and Documentation n needle Industries
Private Ltd, Nilgiris. International Journal of Science and research, 4 (9)
5) Kowsalya. S (2015). Teacher's Effectiveness of Teaching Process through the Smart Class.
Indo Global Journal of Commerce & Economics, 2 (2), 22-26.
6) Geetha. P (2015). Training and Development in HR. Bonfring International Journal of
Industrial Engineering and Management Sciences, 5 (1), 109-114.
7) Sivakumar.N (2014). A Study on Innovation Marketing Strategies as a Sustainable
Competitive Advantage. Management Innovation & Intervention for Sustainable
Development. Excel Publishers.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 15
8) Kavitha. M(2013). Consumer Awarness towards E-Marketing. Redefining Business
Horizons.2, pp. 481-489. Chennai: Semmoodhai Pathipagam.
9) Nalini.K (2013). Impact of Sales Promotional Activities of Airtel Broadband. National
Conference NCIBPTE. Erode.
10) Asha. S (2015). A Study on Best Business Strategies Adopted by Supermarket on Buying
Behviour with special reference to Selected Super Markets in Coimbatore City. Indian
Journal of Applied Research, 5 (12), 342-345.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 16
8. STUDY ON CONSUMER SATISFACTION ON USING ONLINE
WEBSITES FOR ORDERING FOOD
Kavitha.S
Dr. M. Kavitha
Sri Krishna Arts and Science College, Coimbatore
ABSTRACT
This research is conducted in order to analyze the impact smartphone apps technology
in food ordering by comparing two objects study. It is expected to become innovation and
unique value-added for restaurant business when ordering can be done through smartphone
apps particularly for delivery and take-away services. This is meant to analyze what are the
opportunity, obstacles, chances, and aspects that an entrepreneur must consider if this typical
technology would be applied. This research took place in Coimbatore, where there are
already two smartphone apps that exist for food ordering-foodpandaand justeat. The result
shows that, the smartphone apps would be adding more value for business, it could help
service improvement; faster accessible, reduce error that waiters might make and become
interactive marketing. And it could also become opportunity for business to sustain and
compete by realizing the trend. Nevertheless, there are several aspects that must be
considered to apply smartphone apps in the restaurant; those are organizational readiness
(infrastructures, equipments and human resources) customer behavior, and other aspects such
as product and service quality. BIBLIOGRAPHY
1) Sumathy. N (2014). A Study on Stress Management Among Employees in IT Cycles of
India. Managing Human Resources in the Knowledge of Era. Vijay Nicole Imprint Private
Ltd.
2) Prakash. L (2015). Study on Recent Factors Affecting Global Human Resources
Management. International Conference on Innovative HR Practices in Corporate World
(pp. 175-177). Hikey Media.
3) Amudha. S(2015). A Study on Export Procedure and Documentation n needle Industries
Private Ltd, Nilgiris. International Journal of Science and research, 4 (9).
4) Nalini. K (2013). A Study on Quality of Work life of Employess in Craftsman Automation
Pvt. Ltd. International Journal of Management & Development Studies .
5) Kavitha. M (2013). Consumer Awarness towards E-Marketing. Redefining Business
Horizons.2, pp. 481-489. Chennai: Semmoodhai Pathipagam.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 17
6) Gnanakumar, P Baba; Marketing Problems Faced by Self Help Groups (SHG) in Tamil
Nadu
7) Kowsalya. S (2014). A Study on Consumer Preference towards Herbalife Weight
Management Products in Tirupur City. International journal of Functional Management, 2
(2), 123-127.
8) Preethi. S (2015). Cyber Crie Management. Bonfring International Journal of Industrial
Engineering and Management Sciences, 5 (3), 124-130.
9) Sivakumar. N (2013). Competition Policy & Consumer Welfare. Consumer Protection &
Welfare. Pradag Print.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 18
9. TO STUDY ON CONSUMER AWARENESS AND USAGE OF E-
BANKING TRANSACTION THROUGH MOBILE PHONES
B.Roselin Anna Mary
Dr. M. Kavitha
Sri Krishna Arts and Science College, Coimbatore
ABSTRACT
The previous generation used banking as a way of a traditional process. But, Todays
world uses the Modern trends of E-Banking. In current affairs, Electronic Banking
transaction is done through tablets or smart phones. Electronic Banking is otherwise called
Mobile Banking which underlies not only in the determinantsof the banking business, but
also the special conditions of mobile commerce.The major banks have developed the latest
and modern innovation is increasingly providing services through Electronic Channels such
as ATMs, Internet banking, Telebanking and Mobile banking. This is an Attempt to make an
analysis on the consumer awareness on usage of E-Banking and a survey research is
conducted among the consumers who are residing in Coimbatore. Consumers can use the
transaction anywhere and at any time. A large scale population consisting of en number of
people is using this. BIBLIOGRAPHY
1) Baba Gnanakumar, Arun; Stratifying CSR Values to enhance Branding; Marketing
Metamorphosis; 2013KJ Somaiya Institute of Management;
2) Baba Gnanakumar, P; Modelling the Nested Mark Modelling the Nested Markets' Prices
during ' Festival Season; Listening to consumers of emerging markets; 251; 2014
3) Sivakumar.N (2013). Competition Policy & Consumer Welfare. Consumer Protection &
Welfare. Pradag Print.
4) Sumathy. N(2015). A Study on Changing Consumer Habits of Mall Mania among Students.
Indo Global Journal of Commerce and Economics , 2 (4), 107-113.
5) Sumathy.N (2014). A Study on Stress Management Among Employees in IT Cycles of India.
Managing Human Resources in the Knowledge of Era. Vijay Nicole Imprint Private Ltd.
6) Gnanakumar, Baba; Effect of bank rate variability on Rupee value and Bankex in
India; Journal of Applied Research and Social Sciences,2014
7) Asha.S (2016). Customer Adoption & Satisfaction on Internet Banking Services - An
Analytical Study on Banks in Coimbatore City. International Journal of Multidisciplinary &
Current Research , 4, 93-98.
8) Kowsalya.S (2014). A Study on Consumer Preference towards Herbalife Weight
Management Products in Tirupur City. International journal of Functional Management , 2
(2), 123-127.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 19
9) SenthilKumar.K. (2016). An Empirical Study on Nexus between Credit Risk of Nationalised
Banks in India and Macro Economic Factors - An Economic Perspective. International
Journal of Advance Research and Innovative Ideas in Education , 2 (3).
10) Kowsalya.S (2015). Teacher's Effectiveness of Teaching Process through the Smart Class.
Indo Global Journal of Commerce & Economics , 2 (2), 22-26.
11) Subha.S. (2014) “New investment Avenues in Service Sector” Edited book The
Indian Corporate Conundrum – Panacea for the Menace – Start or Stagnate Pg.42-
47. ISBN : 978-93-81992-11-1.
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 20
10. FACTORS AFFECTING THE CREDIT SUPPLY NETWORK OF
KNITWEAR EXPORT UNITS IN TIRUPUR
Yuvaraj.V
Dr.BabaGnanakumar. P
Sri Krishna Arts and Science College, Coimbatore [email protected]
Abstract
Tirupur - the knitwear capital of India, accounting for 90% of India's cotton knitwear
exports. However, they are facing credit crunch during last two years. In this context the
research has been motivated with the aim of identifying the short supply problems and
financial crunch created due to credits derived from sourcing partners. The primary data are
collected from 72 knitwear units using Snowball sampling technique. The result indicates that
the knitwear units are facing hurdles which include virtual networking problems, technology
upgradation problems and working capital crunch in operational cash flows. The credit
supply bottlenecks lead to create a lag time variance of 60 days. We conclude that the
derivative instrument in payables management and receivables managements system be
integrated with the supply chain network to solve the problems in operational finance.
BIBILIOGRAPHY
1. Bonfield, e., &speh, t. (1977). “Dimensions of purchasing’s role in industry.” Journal of
purchasing and materials management, 13, 15
2. Chao, C., Scheuing, E., Dubas, K., &Mummalaneni, V. (1993). “An Assessment of Supplier
Selection: Chinese Purchasing Managers’ Criteria and Their Implications for Western
Marketers.” International Journal of Physical Distribution & Logistics Management, 23(8),
31-37.
3. India Textile News Apparel/Garments News (2007, August 31–September 1). Africa Focus
Bulletin
4. Irving, H. (2003). Check the currency trap By Supply Management. Joan Publication, 121-
146.
5. Gnanakumar, Baba; Fostering Transportation through Customer Service Level Matrix;
International Journal of Engineering Science and Research; 2012; IJESR
Research Article SKASC Working Papers 2016
Sri Krishna Arts and Science College Page 21
Research Article SKASC
Sri Krishna Arts and Science College Page 1
DEPARTMENT OF ELECTRONICS & COMMUNICATIONS
INDEX
S. No. Title of the abstract Page no
1. MICROCONTROLLER BASED PATIENT MONITORING SYSTEM
3
2. MICROCONTROLLER BASED SECURED CIRCUIT BREAKER USING PASSWORD FOR ELECTRICITY BOARD
4
3. UNDERGROUND CABLE FAULT DISTANCE LOCATER 5
4. AN INTELLIGENT CONTROL SYSTEM FOR AUTOMATIC CAR
6
5. VEHICLE ACCIDENT PREVVENTION SYSTEM USING EYEBLINK DETECTION
8
6. WIRELESS INDUSTRIAL MONITORING SYSTEM 9
7. COCKPIT WHITE BOX SYSTEM DESIGN FOR AIRCRAFT SAFETY MONITORING
11
8. IMPLEMENTATION OF CAN PROTOCOL FOR THE DESIGN AND DEVELOPMENT OF CAR AUTOMATION
12
9. IMPLEMENTATION OF I2C MASTER BUS CONTROLLER ON FPGA
14
10. PLC BASED BOILER AUTOMATION SYSTEM 15
11. PC BASED ELECTRICITY BILLING USING EMBEDDED SYSTEM
16
12. COLOR SENSING ROBOT USING ARDUINO 17
13. SOLAR TRACKING SYSTEM WITH HOME AUTOMATION 18
14. ANDROID INTEGRATED VIRTUAL KEYBOARD WITH VOICE OUTPUT
20
15. BASIC DIGITAL IC TESTER USING MICROCONTROLLER 21
16. DESIGN AND IMPLEMENTATION OF AN UNMANNED VEHICLE USING ANDROID APP VIA BLUETOOTH
22
17. IGNITION AND SECURITY SYSTEM IN AUTOMOBILES USING FINGER PRINTSENSOR
23
18. INTELLIGENT MULTI ID BUSE’S MOVEMENT MONITORING SYSTEM
24
Research Article SKASC
Sri Krishna Arts and Science College Page 2
19. STUDY ON –EFFECTS OF LIGHTNING ON ELECTRONIC CIRCUITS OF AIRCRAFTS
25
20. OFFICE POWER SAVING SYSTEM 26
21. DESIGN OF IrDA CONTROLLER USING Verilog HDL 27
22. HIGH SPEED VLSI ARCHITECTURE FOR WAVELET TRANSFORM
28
23. TRUNCATED BINARY MULTIPLIERS WITH VARIABLE CORRECTION AND MINIMUM ERROR
29
24. SMART ZEBRA CROSSING MECHANISM FOR PEDESTRIAN TRAFFIC
30
Research Article SKASC
Sri Krishna Arts and Science College Page 3
1. MICROCONTROLLER BASED PATIENT MONITORING SYSTEM
S.Karthikeyan1, K.Karthikeyan1, T.Veeramanikandasamy2, K.Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
ABSTRACTThis implementation of a heart monitor involves low cost amplifier and filter
components coupled with a sophisticated microcontroller and LCD screen. Because the device is most useful if it is portable it was designed with use of 9V batteries. The amplifier and filter stage of the implementation were successful with an ECG signal which is successfully detected and counted. The calculation and displaying of an actual heart beat rate from the peak of the ECG signal would cross the threshold and trigger the timer module. The timer is incremented for every heart beat pulse.
This project successfully implemented an ECG while the Digital Heart Rate counter was only partially successful. The weak signal heart rate signal was amplified in the presence of noise from other muscles electrical signals and the filter circuit used to remove the unwanted portions which could take ECG signal, and calculate the heart rate. A reliable and continuous vital sign monitoring system targeted towards individuals has been successively built. This monitoring device is easy to use and provides accurate measurements. Tests have shown excellent agreement with actual heartbeat rates. This device could be used in clinical and nonclinical environments. It can also be easily used by individual users, Athletes during sport activities and so on.
References[1] U. Patel, C. Babbs, Journal of Medical Systems 16 (1992) pp. 101-112.[2] G. Coyle, L. Boydell, L. Brown, Journal of Telemedicine and Telecare 1 (1995) pp.
183-185.[3] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of
Engineering and Technology 3 (2016) 686-689.[4] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[5] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[6] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2 (2015) pp. 14-17.
[7] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[8] Rizzi Maria, WSEAS Transactions on circuits and systems 5 (2006) pp. 652-657.
Research Article SKASC
Sri Krishna Arts and Science College Page 4
2. MICROCONTROLLER BASED SECURED CIRCUIT BREAKER USING PASSWORD FOR ELECTRICITY BOARD
J.Anupa Grace1, S.Priyanka1, T.Veeramanikandasamy2, K.Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
ABSTRACTNowadays, electrical accidents to the line man are increasing, while repairing the electrical lines
due to the lack of communication between the electrical substation and maintenance staff. This project gives a solution to this problem to ensure line man safety. In this proposed system the control (ON/OFF) of the electrical lines lies with line man. The password based circuit breaker system is fully controlled by the 8 bit microcontroller from 8051 family which has a 8KB of ROM for the program memory. A matrix keypad is interfaced to the microcontroller to enter the password while a relay driver IC is used to switch ON/OFF the loads through relays. The complete circuit is built with on-board power supply. The power supply consists of a step down transformer 230/12v, Bridge rectifier, capacitive filter and it is than regulated to +5v using a voltage regulator 7805. This project is arranged in such a way that maintenance staff or line man has to enter the password to ON/OFF the electrical line. If there is any fault in the electrical line, the lineman will switch off the power supply to the line from the substation by entering the password. Then the lineman comfortably repair the electrical line and after coming back to the substation the lineman will switch on the supply to the particular line by reentering the same password.
References[1] Narendra Khandelwal, TanujManglani, Ganpat Singh, Amit Kumar, Dilip Khatri,
International Journal of Recent Research and Review 3 (2015) pp. 16-25.[2] J.Veena, G.Srivani, Afreen, M.Sunil Kumar, J.Santhosh, S.R.Subrahmanyam,
International Journal of Current Engineering and Scientific Research 2 (2015) pp. 44-49.
[3] M.Sravan Kumar, M.Mounika, L.Ramya Pavani, E.Ranadeep, B.Siddhartha, K.B.V.S.R.Subramanyam, International Journal of Current Engineering and Scientific Research 2 (2015) pp. 33-38.
[4] Jay Kumar, Surya Kumar, Vivek Yadav, Naveen Kr. Singh, Prashant Kr. Gaur, Praveen, Kr. Tyagi, International Journal of Recent Research 3 (2016) pp.80-85.
[5] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of Engineering and Technology 3 (2016) 686-689.
[6] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital Library, (2014) pp.1-4.
[7] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[8] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2 (2015) pp. 14-17.
[9] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 5
3. UNDERGROUND CABLE FAULT DISTANCE LOCATER
T.Jeevitha1, N.Manikandan1, R.Prabhu1, U.Sri Hari1, T.Veeramanikandasamy2, K.Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
ABSTRACTGenerally, Cable faults affect the resistance of the cables. If allowed to persist, this can lead to
voltage breakdown. To locate a fault in the cable, the cable must first be tested for faults. This prototype uses the simple concept of OHMs law. The current would vary depending upon the length of the fault in the cable. This prototype is assembled with a set of resistors representing cable length in kilo meters and fault creation made by a set of switches at every known kilo meters to cross check the accuracy of the same. The fault occurring at what distance and which phase is displayed on a LCD interfaced with the microcontroller. The program is burned into ROM of microcontroller.
It intended to detect the location of fault in underground cable lines. It is actually not feasible to keep a check on the fault of the cables. This project gives a digital way to detect the location. The distance of the fault from the feeder end, it is easy to rectify that fault. When any fault like a short circuit occurs, the voltage drop varies as the resistance between that distance changes since the current varies. A set of resistance are used to represent the cable and a dc voltage is fed at one end. An analog to digital converter 0804 with AT89S51 microcontroller is used to find the fault location with respect to voltage changes from the necessary calculation and the fault distance is displayed on the LCD display.
References[1] P.M.Dhekale, S.S.Bhise, N.R.Deokate, R.R. Suryawanshi, International Journal of
Innovations in Engineering Research and Technolog 2 (2015) pp.1-7.[2] E. C. Bascom, Proceedings of the 1994 IEEE Power Engineering Society, (1994) pp.
376–382.[3] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford:
Clarendon, 1892, pp.68–73.[4] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[5] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp.2208-2214.
[6] Zheng Gongming, Sensors & Transducers, 183 (2014) pp. 8-12.[7] J. Densley, IEEE Electrical Insulation Magazine 17 (2001) pp. 14–22. [8] T. S. Sidhu, Z. Xu, IEEE Transactions on Power Delivery 25 (2010) pp.1363–1371.[9] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary
Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 6
4. AN INTELLIGENT CONTROL SYSTEM FOR AUTOMATIC CAR
R.Jayaram1, T.Veeramanikandasamy2, K.Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
ABSTRACTThe aim of “An Intelligent Control for Automatic Car” project is to develop and
implement an automatic driving and parking of a car that will increase convenience and security for the user. The eight IR sensors can be used to track the vehicle lane which is managing the automatic car driving on the road. If the car is moving out of the actual lane, the microcontroller (ATMEGA16) sends control signals to the motor drivers of front and back wheel of the vehicle. In addition to that the four ultrasonic sensors placed in four sides of the car that prevents the vehicle from collision with any other vehicles and obstacles. The ultrasonic sensor used in security technology such as car collision avoidance and distance measurement, is the best device can be used in detecting obstruction behind the car.
The next task of this project is automatic parking the vehicle. It has parking guidance system that can sense a free parking slot and guide the vehicle towards that free space. The system used an android application and Infrared sensors for vehicle parking. The usage of Bluetooth will help the user to know the current status of their vehicle and an android application is used in this process to park and drive back the vehicle to the user. In our proposed system the user is informed about the parking slot availability at a particular parking location. The RFID card is used to identify that a user is legal or not. According to the short- distance wireless signal, the RFID tag users can be monitored within the specific area. However, most of these applications are based on the indoor environments or be a tiny area service and independent of the existed system.
References[1] N.Van Nes, M.Houtenbos, I.Van Schagen, IET Intell. Transp. Syst. 2 (2008) pp.323–
330.[2] J.E.Naranjo, C.González, J.Reviejo, R.Garcia, T.de Pedro, IEEE Trans. Intell. Transp.
Syst. 4 (2003) pp.132–143.[3] C.Bechtel, T.Takagi, M.Sugeno, IEEE Transactions on Systems, Man, and Cybernetics
15 (1985) pp. 116–132.[4] M. B. Satheesh, B. Senthilkumar, T. Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering; Vol. 5, Issue 4, pp 2208-2214, April 2016.
[5] R.Garcia, T.de Pedro, Mathware and Soft Computing 7 (2000) pp.265–273.[6] J-Y Wang, M.Tomizuka, Proceeding of the ASME Dynamic Systems and Control
Division 20 (1998) pp. 729-735.[7] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[8] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2
(2015) pp. 14-17.
Research Article SKASC
Sri Krishna Arts and Science College Page 7
[9] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp. 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 8
5. VEHICLE ACCIDENT PREVVENTION SYSTEM USING EYEBLINK DETECTION
V.S.Aiswarya1, T.Veeramanikandasamy2, K.Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
ABSTRACTA vehicle accident prevention system has been developed, using motion detection
based concepts. The system uses a small monochrome security camera that points directly towards the driver’s eyes and monitors the driver’s eyes in order to detect fatigue. In such a case when fatigue is detected, a warning signal is issued to alert the driver. If the driver not wakes up with in the predefined time, the vehicle stops. In this system for proto type model the DC motor is connected to the device that stops running.
Using MATLAB software, the eye blink has been detected through monochrome camera and it is counted. If the fatigue is detected based on the count, the MATLAB sends the alarm signal to the AT89C51 microcontroller unit through RS232 serial port interface. The L293D is interfaced with the microcontroller to drive the alarm and DC motor. This project has been successfully developed and verified which can prevent sleep related accidents.
References[1] B.Praveenkumar, K.Mahendrakan, International Journal of Innovative Research in
Science, Engineering and Technology 3 (2014) 12610-12616.[2] G.Yang, Y.Lin, P.Bhattacharya, Information Sciences 180 (2010) pp.1942-1954.[3] Q Ji, Z Zhu, P Lan, IEEE Transactions on Vehicular Technology 53 (2004) pp.1052-
1068.[4] M.Lenne, T.Triggs, J.Redman, Accident Analysis & Prevention 29 (1997 pp.431-437.[5] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2
(2015) pp. 14-17.[6] P.Thiffault, J.Bergeron, Personality and Individual Differences 34 (2003) pp.159-176.[7] Qiang Ji, Zhiwei Zhu, PeilinLan, IEEE Transactions on Vehicular Technology 53
(2004) pp.1052-1068.[8] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[9] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[10] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 9
6. WIRELESS INDUSTRIAL MONITORING SYSTEM
R.Ragupathi1, T.Veeramanikandasamy2, K.Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
ABSTRACTThis project is designed to monitor the various parameters such as temperature and
object counter wirelessly in PVC manufacturing companies and in industries where human monitoring is not possible in hazardous environments. In this project LM35 is used as the temperature sensor which varies linearly for every degree centigrade (ºC). For the object counter, proximity sensor (Metal sensor) is used to sense the metal that occurs in case for the object counting. Both sensors are connected to PIC Microcontroller. The PIC 16F877A Microcontroller is used in FIELD UNIT to read the temperature value and counter value from sensors with the help of in-built ADC and interrupts respectively. The measured parameters are sent to the MONITORING UNIT through the RF transmitter. In monitoring unit, the RF receiver used to receives the temperature value and counter value and is fed to the PIC 16F877A Microcontroller. The microcontroller sent the data to user interface through the Serial Port (RS-232). The user interface is created in a Visual Basic 6.0 where the temperature and the object counter values are displayed in text boxes.
The temperature is measured and displayed in a degree Celsius (ºC) and counter value as a decimal number. In VB MSComm control is used to get the serial data and to process it. When the serial data is received, it is separated as temperature value and counter value with the help of string parsing and displayed in respective text boxes. Thus the project can be implemented in PVC manufacturing companies and also in all the industries where remote monitoring is necessary.
References[1] R. Wynn, Machine Design 75 (2003) pp. S10.[2] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[3] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[4] H. Ramamurthy, B. S. Prabhu, R. Gadh, and A. Madni, 4th IEEE Sensors2005, Irvine, California, Oct 31 – Nov3, 2005.
[5] W. B. Heinzelman, A. L. Murphy, H. S. Carvalho, M. A. Perillo, IEEE Network 18 (2004) pp. 6 - 14.
[6] K. Romer, O. Kasten, F. Mattern, ACM SIGMOBILE Mobile Computing and Communications Review 6 (2002) pp.59-61.
[7] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of Engineering and Technology 3 (2016) 686-689.
[8] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2 (2015) pp. 14-17.
Research Article SKASC
Sri Krishna Arts and Science College Page 10
[9] A.Sithara, S.R.Umamageswari, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 11
7. COCKPIT WHITE BOX SYSTEM DESIGN FOR AIRCRAFT SAFETY MONITORING
A.P.Rajesh A.P1, T.Veeramanikandasamy2, K.Sambath3
1M.Phil Scholar, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractIn this project, Flight parameters like speed, flight-level, direction and temperature
are automatically send to the base station at Air Traffic Control(ATC) through GSM. At present the cockpit voice recorder (black box) used to record the audio environment in the Flight deck. This audio part examine only during investigation of accidents and incidents. So far there is no automated system to obtain the instantaneous reports happening there. This project work proposes a system that automatically sends the informations to be available to the base station. The Flight parameters measured are communicated with microcontroller and transmit to the base station using GSM. By monitoring the Flight parameters or bad weather such as cyclone on the way of flight, base station can track the Flight and alert the pilot in critical condition. Pilot can take safety measures such as path diversion or safe landing.
References[1] Olja Cokorilo, Mario De Luca, Gianluca Dell Acqua, Journal of Risk Research 17
(2014) pp.1325-1340.[2] J.Hever Moncayo, Johannio Marulanda, Peter Thomson, Journal of Aerospace
Engineering 23 (2010) pp.99-104.[3] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of
Engineering and Technology 3 (2016) 686-689.[4] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[5] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[6] Nilesh Dhawale,Mahesh Garad, Tushar Darwatkar, Nilesh Shende, Internati onal Journal of Innovations & Advance me nt in Computer Science 3b(2014) pp.5-10.
[7] O. Aloquili, A. Elbanna, A. Al-Azizi, IET Software 3 (2009) pp. 255 - 263.[8] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues
in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 12
8. IMPLEMENTATION OF CAN PROTOCOL FOR THE DESIGN AND DEVELOPMENT OF CAR AUTOMATION
S.Sudheesh1, T.Veeramanikandasamy2, K.Sambath3
1M.Phil Scholar, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThis project provides the highly sophisticated automation for automobiles. The main
objective deals with the communication of different modules/nodes of the car dashboard through the CAN bus. The modules include engine control, anti-lock breaking, pre-crash safety, airbag control, vehicle navigation, headlight dimmer control, wiper control and climate monitoring. All these sections are communicating through CAN bus and controlled by a CAN Controller. CAN is one of the field bus control system type used in networking. It is a message based protocol device. The communication can be achieved between various devices using CAN protocol. The CAN bus can be used to connect the control unit, transmitting and receiving unit. In this project, CAN bus is used in automation environment, which is primarily due to low cost. The multi-master node CAN is able to send and receive messages but not simultaneously.
To achieve the above purpose, developed system has eight units: Engine management system calculates the fuel injection rate and ignition timing. Anti-lock breaking system provides steering control during slippery conditions. When obstacle is detected, Pre-crash safety system retracts the seat belts and applies the break. When detecting collision, Airbag control system inflates airbag by triggering gas propellant. Navigation system gives the current location of the vehicle. Headlight dimmer control is used to adjust the headlight beam when encountering oncoming vehicles during night drive. Wiper control system operates wiper during rain. Climate monitoring system regulates the temperature inside the vehicle. This proposed method is more reliable to derive the desired parameters.
References[1] Wei LunNg, Chee Kyun Ng, BorhanuddinMohd. Ali, Nor KamariahNoordin, Fakhrul
Zaman Rokhani, Proceedings of the Asia-Pacific Advanced Network 30 (2010) pp.14-21.
[2] BibhashRanjan, Mayank Gupta, International Journal of Computer Applications 67(2013) pp.34-38.
[3] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital Library, (2014) pp.1-4.
[4] Divya Sharma, Mayank Gupta, International Journal of Innovative Technology and Exploring Engineering 2 (2013) pp.287-292.
[5] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[6] A.Mohammad Al-Khedher, International Journal of Computer Science & Information Technology 3 (2011) pp.74-85.
[7] Archana S Wagh, Sneha D Joshi, NTERNATIONAL Journal of Current Engineering
Research Article SKASC
Sri Krishna Arts and Science College Page 13
and Scientific Research 2 (2015) pp.114-118.[8] Guangyi Shi, Cheung Shing Chan, Wen Jung Li, Kwok-Sui Leung, Yuexian Zou, and
Yufeng Jin, IEEE Sensors Journal 9 (2009) pp. 495-503.[9] M. N. Nyan, F. E. H. Tay, T. H. Koh, Y. Y. Sitoh, K. L. Tan, Electron. Components
Technol. 1 (2004) pp. 956-960.[10] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary
Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[11] A.Sithara, S.R.Umamageswari, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 14
9. IMPLEMENTATION OF I2C MASTER BUS CONTROLLER ON FPGA
A.Kaliraj1, O.M.Saravanakumar2, K.Sambath3
1Research Scholar, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThis paper implements serial data communication using I2C (Inter-Integrated Circuit)
master bus controller using a field programmable gate array (FPGA). The I2C master bus controller was interfaced with MAXIM DS1307, which act as a slave. This module was designed in Verilog HDL and simulated in Modelsim 10.1c. The design was synthesized using Xilinx ISE Design Suite 14.2. I2C master initiates data transmission and in order slave responds to it. It can be used to interface low speed peripherals like motherboard, embedded system, mobile phones, set top boxes, DVD, PDA’s or other electronic devices. It is discussed I2C protocol of our proposed design which also presents module description for our proposed system. This project presents the software implementation along with algorithm and flow chart. The detailed description of hardware implementation of I2C master bus controller is Spartan 3AN FPGA, design kit using Xilinx software. Finally, concluded with future scale up.
References[1] Regu Archana,J.V.Rao, Regu Archana Int. Journal of Engineering Research and
Applications 4 (2014) pp.06-10. [2] Madhuri Hanumanta Daware, A. S. Patil, INTERNATIONAL JOURNAL OF
CURRENT ENGINEERING AND SCIENTIFIC RESEARCH 2 (2015) pp.7-10.[3] O.M.Saravanakumar, N.Kaleeswari, K.Rajendran, International Journal of Emerging
Technology and Advanced Engineering 4 (2014) pp. 192-195.[4] S.R.Umamageswari, V.Nandhini, V.Gunachitra, International Journal of Emerging
Technology and Advanced Engineering 5 (2015) pp. 464-467[5] A.Sahu, R. Mishra, P.Gour, International Journal on Computer Science and
Engineering 5 (2011) pp.1857-1865.[6] J. J Patel, B. H. Soni, Journal of Information, Knowledge and Research in
electronics and Communication Engineering 02 (2013) pp.520-522.[7] Arvind Sahu,Ravi Shankar Mishra,Puran Gour, Int. J. Comp. Tech. Appl. (2) 2013
pp.531-536.
Research Article SKASC
Sri Krishna Arts and Science College Page 15
10. PLC BASED BOILER AUTOMATION SYSTEM
P.Rajkumar1, O.M.Saravanakumar2, K.Sambath3
1Research Scholar, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThis paper outlines the various stages of operation involved in the conversion of a
manually operated boiler towards a fully automated boiler. Over the years the demand for high quality, greater efficiency and automated machines has increased in this globalised world. The initial phase of the paper focuses on passing the inputs to the boiler at a required temperature, so as to constantly maintain a particular temperature in the boiler and the paper mainly focuses on level at the various stages of the boiler plant. PLC applications are extensively used in industries to control and facilitate repetitive processes such as manufacturing cell management, fly-by-wire control, or nuclear plant systems. One of these applications is industrial automation which includes numerous automated processes. This again includes boiler automation which demands determination of certain physical parameters & utilizing these parameters to make the boiler start-stop or function in any manner we want, but automatically, without involvement of any human. Nowadays, every new industry before stepping into the production line, never gives up thinking about ways of automating it`s production process, so as to reduce it`s overall expenditure in terms of wages, wastage of material due to inaccurate manual work and to reduce the overall time taken for production.
References[1] S. S. Dhavale, T. H. Salunke, S. R. Ranaware, H. M. Sakhare, S. Bodhe, International
Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp.84-88.
[2] Chuntanman, Jia Li,Lanying Wang,Yantao Chi, IEEE International Conference 2 (2011) pp. 967-970.
[3] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2 (2015) pp. 14-17.
[4] S.Kalaivani, M.Jagadeeswari, International Journal of Advanced Research in Computer Engineering & Technology 4 (2015) pp.1653-1657.
[5] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[6] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of Engineering and Technology 3 (2016) 686-689.
[7] T.Karuppiah, Sivasankaran V, Azha , Periasamy, Muruganand S, IJARCCE 2 (2013) [8] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[9] Shital S. Chopade, Pradhuman Verma, Prashant Verma, IJEAT 3 (2013)[10] A.nabik Shome, S.Denis Ashok , International Journal of Scientific & Engineering
Research 3 (2012)
Research Article SKASC
Sri Krishna Arts and Science College Page 16
11.PC BASED ELECTRICITY BILLING USING EMBEDDED SYSTEM
C.P.Shibin1, O.M.Saravanakumar2, K.Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThe electricity office has send employees for taking meter reading every month, which
is an expensive and time consuming job. This project provides a convenient and efficient method to avoid this problem. This is an embedded tariff calculation project, it uses microcontroller GSM modem and RF based communication technique. In this system an energy unit measuring system is interfaced at each consumer end, is connected with the microcontroller through an optical interface. This measured unit and calculated bill amount from each consumer is transmitted to the office end through the RF transmitter. PC display placed at the office end displays the measured units from each consumer. The officers can disconnect the supply to a particular consumer through the line interfacing relay connected at the consumer end this communication possible through GSM modem. The measured energy unit and the bill amount are also transmitted to the user’s mobile number through the GSM modem. GSM modem is connected with the MCU through a serial interface. The popular microcontroller PIC 16F877A from MICROCHIP CORPORATION is used here. PIC microcontrollers are widely used now because of their low cost and rich peripheral features. LCD display interfaced at the consumer side displays the measured consumed unit and the calculated bill amount.
References[1] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[2] Van Nes, Houtenbos, Van Schagen, IET Intell. Transp. Syst. 2 (2008) pp. 323–330.[3] Naranjo, González, Reviejo, Garcia, de Pedro, IEEE Trans. Intell. Transp. Syst. 4
(2003) pp.132–143.[4] Bechtel, Takagi, Sugeno, IEEE Trans. Syst. Man Cybern. 15 (1985) pp. 116–132.[5] R.Garcia, T.de Pedro, Mathware Soft Comput. 7 (2000) pp. 265–273.[6] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2
(2015) pp. 14-17.[7] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary
Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[8] A.Sithara, S.R.Umamageswari, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 17
12.COLOR SENSING ROBOT USING ARDUINO
K.S.Gokul1, P. KandavelSriram1, M.VimalRaj1, O.M.Saravanakumar2, K.Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThe project using Arduino UNO ATmega328 (microcontroller) the color of the object is
identified and proceeds as per the instruction. By identifying the color (red, blue, green) using color sensor with the help of Arduino 4-bit data is generated and transmitted through RF (ASK 433 MHz). The data that received by the receiver of RF (ASK 433 MHz) which is decoded and with the help of motor driver the robot is controlled.The color sensing circuit of the project contains three different colored LED emitter and the three separate receivers. The light reflected of the target such as a red piece of paper and returns the sensor. The light sensors are able to record the components of the reflector light and its intensity. The sensor then compares these values to the setting on the computer to determine the necessary movement. Many of the color sensors today have the ability to recognize red, yellow and green. Programmable tolerance settings in the sensor also make it possible to tightly control the match of the target to the programmed value. The more exact there required match, the more tight the color tolerance level.
References[1] Mohamed Fezari, MounirBousbia-Salah, and MouldiBedda, The International Arab
Journal of Information Technology 5 (2008).[2] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2
(2015) pp. 14-17.[3] U. Patel, C. Babbs, Journal of Medical Systems 16 (1992) pp. 101-112.[4] G. Coyle, L. Boydell, L. Brown, Journal of Telemedicine and. Telecare 1(1995) pp.183-
185.[5] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of
Engineering and Technology 3 (2016) 686-689.[6] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[7] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[8] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[9] A.Sithara, S.R.Umamageswari, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 18
13. SOLAR TRACKING SYSTEM WITH HOME AUTOMATION
C.Rishinandha1, O.M.Saravanakumar2, K.Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractSolar-tracking system is proposed, implemented and tested. It can operate as
independent of the geographical location of the site of setting up. The system checks the position of the sun and controls the movement of a solar panel. So that radiation of the sun comes normally to the surface of the solar panel. The fundamental of solar-energy conversion is solar cell component. Conventional solar panels, fixed with a certain angle, limit their area of exposure from the sun during the course of the day Solar tracking systems are essential for many applications such as thermal energy storage systems and solar energy based on power generation systems in order to improve system performanceIt deals with controlling the solar panel at two axes by using LDRs as sensors, DC motors as actuators and microcontroller as a controller. In order to keep the design as simple and cheap we have chosen PIC16F877 as a micro-controller-unit (MCU).
To observe position of the solar panel, the tracker control system contains a control board, a control program, a power supply board, one motor interface board and a set of sensors. The main idea of design of the solar-tracking system is to sense the sun light by using four light dependent resistors (LDRs). Each LDR is fixed inside solar panel tracking Model. The system is based on PIR Sensors. Used to detect whether a human has moved in or out of the sensors range and send input to microcontroller As such, a means of tracking the sun is required. This is a far more cost effective solution than purchasing additional solar panels. It has been estimated that the yield from solar panels can be increased by 30 to 60 percent by utilizing a tracking system instead of a stationary array.
References[1] P.J. Hession and W.JBonwick, Solar Energy 32 (1984) pp. 3-11.[2] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[3] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2 (2015) pp. 14-17.M.J. Cliford and D. Eastwood, Solar Energy 77 (2004) pp.269-280.
[4] B.J. Huang, W.L. Ding and Y.C. Huang, Solar Energy 85 (2011) pp. 1935-1944.[5] C.S. Chin, A. Babu, and W. McBride, Renewable Energy 36 (2011) pp. 3075-3090.[6] M.S. Al-Soud, E.Abdulla, A. Akeylah, S. Adallah and E.S.Hrayshat, Applied Energy 87
(2010) pp. 463-470.[7] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital
Library, (2014) pp.1-4.[8] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary
Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 19
[9] R. Abu-Malouh, S. Abdallah and L.M. Muslih, Energy Conversion and Management 52 (2011) pp.615-620.
Research Article SKASC
Sri Krishna Arts and Science College Page 20
14. ANDROID INTEGRATED VIRTUAL KEYBOARD WITH VOICE OUTPUT
M. Aarabhi1, A.Sithara2, K. Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThis project is designed to provide an alternative input mechanism for users with
disabilities who cannot use a physical keyboard. Virtual Keyboard is just another example of today’s computer trend of ‘smaller and faster’. It is used in some cases to avoid keystroke logging. The project involves three main areas, research, development\programming, testing and the writing of the report. In computer systems, the actual processors, are more likely to become outdated than to actually wear out. But there are parts of a computer system that are more susceptible to wear and tear. Understandably, these are the parts that receive the most use – the parts that you pound on each day. Yes, keypad is likely to wear out long before the rest of your computer system.
As the technology advances, more and more systems are introduced which will look after the user’s comfort. Few years before hard switches were used as keys. Now-a-days soft touch keypads are much popular in the market. These keypads give an elegant look, they give a better feel. They are dust-proof and has got much more life than the other keypads. Thus we see that the new technology always has more benefits and is more user-friendly. I am presenting here a next generation technology in this area, which is the Virtual Keypad. As the name suggests the virtual keypad has no physical appearance.
References[1] Khanna Samrat, Vivekanand Omprakash, International Journal of Advanced Research
in Computer Science and Software Engineering, ISSN: 2277 128X, January 2012.[2] A. Sithara, S. R. Umamageswari, National Conference on Contemporary Issues in
Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
[3] Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Archana LomteInternational Journal of Electrical and Computer Systems 3 (2014) pp. 3991-3995.
[4] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
[5] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 21
15.BASIC DIGITAL IC TESTER USING MICROCONTROLLER
P. Lavanya1, K. Subashini1, T.R.Vaishnavi1, S. Veena1, A. Sithara2, K. Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3. Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThe digital IC tester is implemented by using 89s52.The process of input and output is
controlled by the microcontroller. The displaying part on the microcontroller board is modeled by LCD Display. After testing the IC the result is displayed on the LCD. The basic function of the digital IC tester is to test a digital IC for correct logical functioning as described in the truth table. It can test IC maximum of 24 pins. Since it is programmable, any number of ICs can be tested within the constraint of the memory available. This model applies the necessary signals to the inputs of the IC, monitoring the outputs at each stage and comparing them with the outputs in the truth table. Any discrepancy in the functioning of the IC results in a fail indication, displays the faulty and good gates on the LCD. The testing procedure is accomplished with the help of keys present on the main board.
At this stage we had completed to test the most common used digital IC's used in our laboratories, mainly belonging to the 74TTL series and successfully completed writing assembly code for four IC’s. This tests various types of IC's like OR,NAND, AND, XOR, GATES.
Reference[1] M.A.Tarkunde, A.A.Shinde, International Journal of Computational Engineering Research
2 (2012) pp. 24-27.[2] A.Sithara, S.R.Umamageswari, National Conference on Contemporary Issues in Social
Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
[3] Anindya Bhattacharya, International Journal of Emerging Technology and Advanced Engineering 3 (2013) pp. 175-178.
[4] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[5] M.Arun Prasad, O.M.Saravanakumar, International Journal of Research in Electronics 2 (2015) pp. 14-17.
[6] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of Engineering and Technology 3 (2016) 686-689.
Research Article SKASC
Sri Krishna Arts and Science College Page 22
16.DESIGN AND IMPLEMENTATION OF AN UNMANNED VEHICLE USING ANDROID APP VIA BLUETOOTH
Amol Ramchandra Sait1, M.B. Satheesh1, B. Senthilumar1, A.Sithara2, K. Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3. Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThe design and implementation of an unmanned vehicle is the most trending technology
in today’s world. Unmanned vehicle can either be remote controlled or remote guided vehicle, or they can be autonomous vehicles which are capable of sensing their surroundings and navigateon their own. Where remote controlled vehicle can be done through various techniques like RF, Bluetooth, GSM based etc. But the new implementation of an android app can enhance the usage with much interest and easy access. This needs a Bluetooth interface, which is connected with the vehicle and accessed through android app via Bluetooth, where the control keys for every direction will have a control word that is dumped already in microcontroller. For this application an unmanned vehicle can be assembled so that it can be enhanced with some of the components like a 8051 Microcontroller project board and other essential components in making a working model of this project. The assembled vehicle for this project can be operated with the help of android application designed to operate with specified comments. These comments are carried through the Bluetooth enabled android phone to the Bluetooth module enhanced in the vehicle and it works according to the command sent by the user who specified it earlier in program dumped into the desired microcontroller used in this project. When this project comes to exist with proper working process, this can be a trending technique when it comes in real time application.
Reference[1] Jun Pyo Lee, International Journal of Control and Automation 5 (2012) pp.173 – 186.[2] Panayiotis Fofilos, Kyriakos-Isaak Xanthopoulos, Emmanuel-Athanasios Romanos,
Konstantinos Zikidis, Nikolaos Kanellopoulos, Journal of Computations & Modelling 4(2014) pp.223-236
[3] Pingakshya Goswami, International Journal of Computer Applications, Special Issue on 2nd National Conference-Computing, Communication and Sensor Network CCSN, (2011)pp.15-21.
[4] A. Sithara, S. R. Umamageswari, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
[5] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 23
17. IGNITION AND SECURITY SYSTEM IN AUTOMOBILES USING FINGER PRINTSENSOR
A.Vijayakumar1, A. Sithara2, K. Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractA vehicle engine starts the ignition system. This is the unit that supplies the energy to get the
motor going. The ignition system begins with a key, which you insert and turn, and ends with a spark that ignites combustion in the cylinders. This combustion starts the engine. It is important to note that everything up until the moment of combustion in the car cylinders is part of the ignition system. When you start the vehicle by turning the key, several parts are set into motion. First the starter motor comes to life, then the engine begins to turn and the spark plugs fire. When the key is turned, the starter motor "turns the engine over," which means it turns the crankshaft which in turn gets the pistons moving in the cylinders. This starts the engine cycle. Air and fuel is drawn into the cylinders, it is compressed and the then the spark plugs fire. This begins combustion.
In this project the finger print is used as the key. So losing the key is impossible. No duplicate key can be produced. If any unmatched finger prints detected by scanner, buzzer will begin to alert by delivering sound. Easy way of ignition without high power or fuel consumptions.
References[1] Abhinav Ray and Pratosh Deepak Rajkhowa, World Academy of Science, Engineering and
Technology 6 (2005) pp.70-73.[2] HuaqunGuo, H.S. Cheng, Y.D. Wu, Eight International Conference on Networks, 2009,
ISBN: 978-1-4244-3470-1, 26 May 2009.[3] Matthew Truk and Alex Pentaland, Journal of Cognitive Neuroscience 3 (1991) pp.487-
493.[4] A. Sithara, S. R. Umamageswari, National Conference on Contemporary Issues in Social
Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
[5] Xiaozheng Zhang, YongshengGao, Pattern Recognition 42 (2009) pp.2876-2896.[6] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in
Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[7] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of Engineering and Technology 3 (2016) 686-689.
[8] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
Research Article SKASC
Sri Krishna Arts and Science College Page 24
18. INTELLIGENT MULTI ID BUSE’S MOVEMENT MONITORING SYSTEM
S. Krishnaraj1, A. Sithara2, K. Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College,Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractThe project entitled “Intelligent Multi Id Buse’s Movement Monitoring System” provides
a complete solution for the waiting of the travellers for their desired bus at the bus stations. Nowadays it is easily observed many passengers footed at the bus station coming up for their most wanted bus. But significant increase in vehicles inside the city areas results in adding more trouble to that section of people using Public Transport as their Primary Source of travelling. This causes them a huge waste of time because of not having proper information about the current position of the required bus.
This problem will not only results in wastage of time but also mentally Un-happy and tensed citizens. So the passengers want to get the clear information of their desired bus at the bus stations, like their position and the estimated time of arrival of the bus. The project considers this Performance issues in public transport by having a monitoring system which combines with the GPS and Embedded RF chips. The proposed system will surely provide smooth and linear transmission of location information of different buses at the bus stations which will help people to take decisions either to wait for bus or not. The Base and the Bus Station hardware are responsible for receiving the GPS data transmissions and making them available for computer and display at bus stations. This will display the position details of the desired bus.
Since implementing of GPS modules are very costly and it is not affordable, and also because of the fact that GPS values will get changed if the object moves 1 - 2 Km’s. So it is difficult to implement as a working model. So to avoid these, the GPS values are provided manually through software known as Terminal. According to the provided value, corresponding location details will be displayed.
Reference[1] M. A. Hannan, A. Musthafa, H. Hussain, Basri Proceedings of the World Congress on
Engineering and Computer Science 2 (2012) pp. 1019-1024.[2] C. Aliaga. C, Ferreira. B, Hortal. M, Pancorbo. M. A, Lopez. J. M, Navas. F. J, Waste
Management 31 (2011) pp. 1133-1138. [3] A. Cangialosi, J.E. Monaly, S. C. Yang, Leveraging, IEEE Communications Mag, 40
(2007) pp. 18-23. [4] A. Sithara, S. R. Umamageswari, Data Logger for Industrial Automation in “CISSR’13,
National Conference on Contemporary Issues in Social Science and Science Research; SNR sons College, Coimbatore. ISBN: 978-93-5104-411-6, 28 January 2013.
[5] S. Min Chen, Gonzalez, V. Leung, Qian Zhang, A. Ming Li, IEEE Wireless ommunications 17 (2010) pp. 37-43.
[6] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 25
19.STUDY ON –EFFECTS OF LIGHTNING ON ELECTRONIC CIRCUITS OF AIRCRAFTS
Neethumol1, A. Vidhya Suresh Menon1, S. Sudheesh2, K. Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractAviation transportation has been growing since the early forties and has become today a
massive and unique transport system for people across continents and large countries. First age propeller airliners flew at low altitude and were often subjected to dangerous atmospheric and cloud hazards. Low visibility, heavy precipitation, severe turbulence, wind shear, icing and lightning are common weather hazards that are a challenge for flight safety. Among those weather hazards, lightning was the most unrecognized and misunderstood. Damages to aircraft due to lightning strike were frequently noticed; they range from arc spots on metal to centimeter-size holes in the fuselage, and dielectric radome and antenna destruction. Some cases of catastrophic events are directly attributed to lightning. Lightning can cause considerable damage.
With the advancements in science and technology, the modern aircrafts are equipped with various flight critical electronic systems like fly-by-wire. However, care has to be taken to protect the avionics and flight control systems from the effects of naturally occurring phenomenon of lightning. The effects of lightning on aircraft are broadly classified into categories namely: Direct effects and indirect effects. The direct effects are the physical damages caused at lightning attachment points and conduction paths. These include local burn-through, splintering/shattering, puncture of electrical insulation, etc. Indirect effects are those caused because of the electromagnetic fields of lightning which can damage and/or upset functioning of electronic systems in the aircraft. Aircraft can experience indirect effects even if a lightning strike occurs nearby without even attaching to it. Hence, it becomes mandatory to understand the phenomenon of lightning and its effects on the electronic circuitry of aircraft becomes inescapable before design of any circuit for aircraft.
In view of this, the present report provides a detailed study on the lightning, types of lightning experienced by aircrafts, standards to be catered during the design of protection circuits against indirect lightning and probable ways of protecting the electronic circuits from the indirect effects.
References[1] P. Lalande, A. Bondiou-Clergerie, P. Laroche - Proceedings of the International
Conference on Lightning and Static Electricity (Icolse) 1999 – pp. 344[2] S. Sudheesh, A. P. Rajesh, V. Pradeepkumar, National Conference on Contemporary Issues
in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp. 99-101, January 2013.
[3] H. L. Hagenguth - Transactions of the American Institute of Electrical Engineers, 2(1949)pp.1036-1046.
[4] A. Kaddani, C. Delalondre, O. Simonin, H. Minoo, High Temp. Chem. Processes 3(1994) pp. 441.
[5] T.Veeramanikandasamy, K.Sambath, K.Rajendran, D.Sangeetha, IEEE Xplore Digital Library, (2014) pp.1-4.
Research Article SKASC
Sri Krishna Arts and Science College Page 26
20. OFFICE POWER SAVING SYSTEM
C. H. Shamseerali1, S. Sudheesh2, K. Sambath3
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
Abstract -100%UThe fast development of technologies in all fields of science changes our life and life
styles. The project includes the development of the hardware and software for“Office Power Saving System”. The heart of the system is a PIC 16F877A microcontroller alongside an IR transmitter and an IR receiver. The system will control the electrical equipment in an office room according to the presence of an authorized personal.
While the card is inserted, the micro controller reads the card and process the information. And if the card is valid, then the sub-light of the office room get on and main power units are turned off.When the officer enter the room and sit in his position, the Infra-Red detectors will sense the person if the detector output is low. Suddenly, the light will be turned on and after a small delay, the fan will be turned on. When the sensor output is high, then the light will be turned off and after a small delay, the fan will be turned off. It isassumed that this project plays an effective role in the present scenario as a remedy for the rising energy crises, as the electrical systems will shut down automatically when the person leaves the office room.
References[1] Konstantinos Papamichael, Michael Siminovitch, Jennifer A. Veitch , Lorne Whitehead,
The Journal of the Illuminating Engineering Society of North America, pp. 1-12, February 2015.
[2] S. Sudheesh, A. P. Rajesh, V. Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp. 99-101, January 2013.
[3] Inji Ibrahim Attia, Dr. HamdyAshour, The Online Journal on Power and Energy Engineering 2 (2005) pp. 223-227.
[4] G.Lavanya, K.Sambath, S.Sudha, S.Sindhu, International Research Journal of Engineering and Technology 3 (2016) 686-689.
[5] M.B.Satheesh, B.Senthilkumar, T.Veeramanikandasamy, O. M. Saravanakumar, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 5 (2016) pp 2208-2214.
Research Article SKASC
Sri Krishna Arts and Science College Page 27
21.DESIGN OF IrDA CONTROLLER USING Verilog HDL
K. B. Sooraj1, S. R. Umamageswari2,K. Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractIrDA is the abbreviation for Infrared Data Association, a non- profit organization for
setting standards in IR serial computer connections. IrDA core enables infrared wireless serial communication between various devices up to 1 meter distance using standard IR transceivers. It implements the physical level of OSI structure. The IrDA controller works in three logics and SIR logic is designed and implemented. The Association’s charter is to create an interoperable, low cost, low power, half duplex, serial data interconnection standard that supports a walk- up, point to point user model that is adaptable to a wide range of applications and devices.
This project leads to an idea about the infrared data communications based on the standards from the infrared data association widely available on personal computers and peripherals, a timely opportunity exists for effective and inexpensive short range wireless communication. The IrDA controller is used to transmit and receive data serially and then processed, FIFO is designed and implemented.
References[1] Asawari K.Chinchanikar, R. S. Kawitkar, International Journal of Scientific and Research
Publications, 2 (2012).[2] A. Batra, J. Balakrishnan, A. Dabak, ISCAS '04. Proceedings of the 2004 International
Symposium on Volume 5 (2004), pp.365-368.[3] Wang xiu zing, Hou zhen long, 2nd international conference on Mechanical and Electronics
Engineering 2 (2010) pp. v2-297 – v2-300.[4] S. R. Umamageswari, V. Nandhini, V. Gunachitra, International Journal of Emerging
Technology and Advanced Engineering 5 (2015) pp. 464-467.
Research Article SKASC
Sri Krishna Arts and Science College Page 28
22.HIGH SPEED VLSI ARCHITECTURE FOR WAVELET TRANSFORM
T. Prema1, S. R. Umamageswari2,K. Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractWavelet waveform has proved to be an efficient transform for real time signal processing.
The scalar wavelets have been widely used in applications like signal denoising image compression and in medical fields. Wavelet transform possesses a number of desirable properties such as compact support, regularities, orthogonality and symmetry. Information or data are carried by signals in the field of communication. During a transmission, interference combines with the pure signal to form noise. Even though many algorithms are developed for the removal of noise in the receiver side, the signal to noise ratio is not appreciable to retrieve the original signal from the noise. Due to certain disadvantages in Fourier transform, the researchers concentrated on wavelet transform by which removal of noise was easy. In this, wavelet transform is implemented as circuit and made available in the receiver side.
Thus recent trends aim in forming VLSI architecture, for wavelet transform. If wavelet transform is implemented in VLSI, the speed can be increased and thus latency, area, power of it can be reduced. The first architecture for wavelet transform was named as folded architecture by Parhi. But the architecture found to be disadvantage in terms of speed. Several other architecture were formed to increase the speed and reduce the power. This dissertation with this literature survey aims in the VLSI architecture of wavelet transform by modifying the existing architecture. Since multipliers are available in the architecture of wavelet waveform, the research work reduces the number of multipliers there by reducing the area.
References[1] J. I .Acha, IEEE Transactions on Circuits Systems, 36 (1989), pp.805-812, 1989.[2] T. Acharya.C. Chakrabarti.m, Journal VLSI signal Processing, 42 (2006), pp.321-339.[3] S. R. Umamageswari, V. Nandhini, V. Gunachitra, International Journal of Emerging
Technology and Advanced Engineering 5 (2015) pp. 464-467.[4] O.M.Saravanakumar, N.Kaleeswari, K.Rajendran, International Journal of Emerging
Technology and Advanced Engineering 4 (2014) pp. 192-195.
Research Article SKASC
Sri Krishna Arts and Science College Page 29
23.TRUNCATED BINARY MULTIPLIERS WITH VARIABLE CORRECTION AND MINIMUM ERROR
R. Senthil Kumar1, S. R. Umamageswari2, K. Sambath3
1PG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
AbstractIn this dissertation an innovative solution for the design and characterization of truncated
multipliers is presented. A full-width digital n×n bit multiplier computes the 2n bits output as a weighted sum of partial products. A multiplier with the output represented on n bits output is useful, as example, in DSP data path which saves the output in the same n bit registers of the input. The truncated multipliers are useful not only for DSP but also for digital, computational intensive, ASICs where the bit-widths at the output of the arithmetic blocks are chosen on the basis of system related accuracy issues. Hence 2n bits of precision at the multiplier output are very often more than required.
A truncated multiplier is an n×n multiplier with n bits output. Since in a truncated multiplier the n less-significant bits of the full-width product are discarded, some of the partial products are removed and replaced by a suitable compensation function, to trade-off accuracy with hardware cost. The correction technique proposed in the dissertation are obtained through exhaustive search. This means that the results are only available for small n values and that the proposed approach are not extendable to greater bit widths. Furthermore the analytical characterization of the error is not possible. In this dissertation an innovative solution for the design and characterization of truncated multipliers is presented. The proposed circuits are based on the analytical calculation of the error of the truncated multiplier. This approach allows the description of a multiplier characterized by a minimum error which gives a fast and low power VLSI implementation.
References[1] V. Garofalo, N. Petra, E. Napoli, IEEE Transaction on computers, 47 (2014) pp. 261-271.[2] K. Bickerstaff, M. J. Schulte, E. E. Swartzlander, Journal of VLSI Signal Processing 9
(1995) pp.181–192.[3] Perry and Charles Roth, “Digital system Design using VHDL” McGraw hill.[4] S. R. Umamageswari, V. Nandhini, V. Gunachitra, International Journal of Emerging
Technology and Advanced Engineering 5 (2015) pp. 464-467.[5] O.M.Saravanakumar, N.Kaleeswari, K.Rajendran, International Journal of Emerging
Technology and Advanced Engineering 4 (2014) pp. 192-195.
Research Article SKASC
Sri Krishna Arts and Science College Page 30
24. SMART ZEBRA CROSSING MECHANISM FOR PEDESTRIAN TRAFFIC
C. Ashok Chandran1, D. Guna1, A. P. Rajesh2
1UG Student, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
2Assistant Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamilnadu, India.
3. Professor, Department of Electronics and Communication Systems, Sri Krishna Arts and Science College, Coimbatore, Tamil Nadu, India
AbstractIndia has one of the largest road networks in the world. These roads are used not only
by the motorized forms of transport but also non-motorized forms of transport like pedestrians. As per the report ‘Make Roads Safe: A Decade of Action’ by the Commissionfor Global Road Safety, road accidents lead to the death of about 1.3 million people in the world each year. The Indian Law Commission in its report on ‘Legal Reforms to Combat Road Accidents’ observed that more than one lakh people die every year due to road accidents. India accounts for about 5.4% of the road injuries in the world. About 53% of the people who die in these road accidents are pedestrians. According to the survey held by the Central Road Research Institute nearly 90% of the pedestrians feel unsafe to travel on the roads. The natural conclusion which flows from this data is that the Pedestrian is the most vulnerable road user in India.
This project aims to provide a safety level crossing for pedestrians. The circuit is designed with the microcontroller AT89S51. It serves as the heart of the circuit. In this circuit stepper motor is used as limb. Pedestrian have to press the UP button while planning to cross the road and it will give indication like a “STOP” signal to person who drives the vehicle. After some delay stepper motor will be activated and Table Bridge will go up and act like a speed break. This Table Bridge block the vehicle and allow that pedestrian to cross the road. The other side DOWN button to press once the pedestrian crossed the road and the Table Bridge will get down to the road level. Then “GREEN” signal display will help the drivers to continue their journey.
References[1] Rajesh Kannan Megalingam, Vineeth Mohan, Paul Leons, Rizwin Shooja, M.
Ajay, IEEE Global Humanitarian Technology Conference (GHTC), pp. 528 -533, December 2011,
[2] K. Govindaraju, S. Boopathi, F. Parvez Ahmed, S. Thulasi Ram, M.Jagadeeshraja, international journal of innovative research in electrical, electronics, instrumentation and control engineering 2 (2014) pp. 1841- 1844.
[3] A. P. Rajesh, S. Sudheesh, V. Pradeep Kumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
[4] S. P. Bhumkar, V. V. Deotare, R. V.Babar, International Journal of Engineering Trends and Technology 3 (2012) pp. 1-7.
[5] S.Sudheesh, A.P.Rajesh, V.Pradeepkumar, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, pp: 99-101, January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 31
[6] A.Sithara, S.R.Umamageswari, National Conference on Contemporary Issues in Social Science and Science Research, SNR sons College, Coimbatore, ISBN: 978-93-5104-411-6, 28 January 2013.
Research Article SKASC
Sri Krishna Arts and Science College Page 1
DEPARTMENT OF INFORMATION TECHNOLOGYINDEX
S.NO Title of the abstract PAGE NO.
1. MOBILE COMPUTING – A SURVEY 32. AN ANALYSIS ON DISTRIBUTED COMPUTING 43. AN ANALYSIS ON CYBER SECURITY 54. MOBILE WIMAX: A REVIEW 65. AN OVERVIEW DIGITAL AUDIO WATERMARKING 76. WIRELESS APPLICATION PROTOCOL - A SURVEY 8
7.AN OVERVIEW OF WIRELESS LAND AREA NETWORK AND ITS STANDARDS 9
8. CREDIT CARD FRAUD DETECTION 10
9. AN INTELLIGENT BROADCAST 12
10. FTP CLIENT AND SERVER 14
11. TEXTILE ANALYTICAL CONFIGURATION TOOL 16
12. ONLINE PRODUCT OPINION AND RANKING SYSTEM 17
13.COHESIVE RESILENCY FORMATION IN PACKING CLOUDS
19
14. EMPLOYEE DETAILS MANAGEMENT 21
15. SHOPPING CART 23
16. IMAGE STEGANOGRAPHY IN MMS 25
17.INTEGRATED CUSTOMER ENQUIRY SYSTEM USING STATISTICAL BASED ALGORITHM
27
18. SMART CARD MANAGEMENT 29
19. CAFETERIA MANAGEMENT SYSTEM 30
20. PLANNING AND TECHNICAL MANAGEMENT SYSTEM 31
21. QUICK INTERACTIVE CAPTCHA 33
22. TRAINING AND DEVELOPMENT OF EMPLOYEE 35
23.CONTEXT BASED ACCESS SYSTEM FOR MOBILE DEVICES
37
24. DIGITAL PARKING SYSTEM 38
25. SAPIENT E-LEARNING 39
26. A STUDY ON DESKTOP SPY 41
27. PRO-NET COMMUNICATION USING IP MESSENGER 43
28. ANOMALY DETECTION VIA ONLINE OVERSAMPLING 44
29. PLACEMENT MANAGEMENT SYSTEM 46
30. STUDENT INFORMATION SYSTEM 47
31.DATA ACCESS CONTROL IN CUSTOMER CARE SERVICES
49
32. ODOO SERVER ADMINISTRATION 50
Research Article SKASC
Sri Krishna Arts and Science College Page 2
33. GIFT PRODUCT SYSTEM 52
34. SVS MEDICAL EQUIPMENTS 54
35. COLLEGE TRANSPORT MANAGEMENT SYSTEM 56
36. E-TRAVELLING SYSTEM 57
37. HILLS STATION VEHICLE PROTECTING SYSTEM 58
38. STUDENT ID CARD MANAGEMENT SYSTEM 60
39. BOOK A PANDIT APPLICATION 61
40. QUANTUM KEY DISTRIBUTION 62
41. ELECTRONIC STUDENT LEAVE ORGANIZER 63
42. BAKERY MANAGEMENT SYSTEM 64
Research Article SKASC
Sri Krishna Arts and Science College Page 3
1. Mobile Computing – A Survey
FenziyaParveen.GDepartment of Information Technology
Sri Krishna Arts and Science College, [email protected]
Abstract
“Knowledge is power” is the most know fact in today’s technology world. The development
of information and communication technology (ICT) has been created to address all the
challenges. Making information available from anywhere anytime is one set of challenge.
Mobile computing technology addresses all the challenges, with ubiquitous information.
BIBLIOGRAPHY
1. D.Shobana, M. P. (OCT 2015). Mobile Computing- A Surve. International JKournal of Trend in Research and Development, 2 (5).
2. Ms.K.KetzialJebaseeli ,Mrs.C.Subha, Visalakshi.S. (Oct2015). Mobile computing challenges &solutions:A Study. International Journal of Emerging Research in Management &Technology , ISSN: 2278-9359,351-355.
3. B.KIRTHIKA. (2016).“Billing system for Mobile phones in Diminutive Company”. International Journal of Trend in Research & Development, 94-95.
4. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
5. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
6. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
7. Deepa.B,KavyaPriyaG.V,Liji. (MAR 2016). Gi-FI TECHNOLOGY A REVIEW. International Journal of Research Development, 103-105.
8. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
9. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
10.Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 – 537.
Research Article SKASC
Sri Krishna Arts and Science College Page 4
2. An Analysis on Distributed Computing
Sabari Sowdhanya.J,Sajna.SDepartment of Information Technology
Sri Krishna Arts And Science College, Coimbatore, Tamil [email protected]
Abstract
This paper conducts a survey of the distributed computing architecture, the design issues,
protocols and architecture that have recently taken place to solve problems or integrated the
network. The use of distributed computing technology in any application requires a good
understanding of the network architecture. It also gives details about architecture of WSN,
applications, advantages and disadvantages of wireless sensor networks.
BIBLIOGRAPHY
1. Deepa B ,FenziyaParveen G. (MAR 2016). The Yummy Marshmallow – Android 6.0 Versions. International Journal of Trend in Research and Development, 115-117.
2. Ranjani. (Dec 2014). An Enhancement of Mining Videos based on Annotation reranking method using N Cut algorithms. IJCSIT .
3. K. Ketzial Jebaseeli, C.Subha, M. Benaiah Deva Kumar. (Jan 2016). Port Knocking. International Journal of Advanced Research in Biology, Engineering, Science and Technology , ISSN: 2395-695X ,1-4.
4. B.KIRTHIKA. (2015). ”Android Operating System- A Review ”. International Journal of Trend in Research & Development, 260-264.
5. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 – 537.
7. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research,2.
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10.K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
Research Article SKASC
Sri Krishna Arts and Science College Page 5
3. An Analysis on Cyber Security
Roshni.M and Sajna.S, Department of Information Technology
Sri Krishna arts and science college, Coimbatore,[email protected]
Abstract
This paper conducts a survey of Cyber Security the design issues, protocol and architecture that have recently take place to solve problems or integrated the network. The use of Cyber Security technology in any application requires a good understanding of the network architecture.
BIBLIOGRAPHY1. Deepa B ,FenziyaParveen G. (MAR 2016). The Yummy Marshmallow – Android 6.0 Versions.
International Journal of Trend in Research and Development, 115-117.2. Ranjani. (Dec 2014). An Enhancement of Mining Videos based on Annotation reranking method
using N Cut algorithms. IJCSIT .3. K. Ketzial Jebaseeli, C.Subha, M. Benaiah Deva Kumar. (Jan 2016). Port Knocking. International
Journal of Advanced Research in Biology, Engineering, Science and Technology , ISSN: 2395-695X ,1-4.
4. B.KIRTHIKA. (2015). ”Android Operating System- A Review ”. International Journal of Trend in Research & Development, 260-264.
5. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 – 537.
7. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research,2.
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10.K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
Research Article SKASC
Sri Krishna Arts and Science College Page 6
4. Mobile WiMAX: A Review
Radhika J,Swetha Sree B,Tharani A, Department of Information Technology
Sri Krishna College of Arts and Science,[email protected]
AbstractWiMAX (Worldwide Interoperability for Microwave Access) is a family of wireless communications standards initially designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 GBit/s for fixed stations. The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to promote conformity and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL".IEEE 802.16m or Wireless MAN-Advanced is a candidate for the 4G, in competition with the LTE Advanced standard. WiMAX refers to interoperable implementations of the IEEE 802.16 family of wireless-networks standards ratified by the WIMAX Forum.
BIBLIOGRAPHY
1. Deepa B ,FenziyaParveen G. (MAR 2016). The Yummy Marshmallow – Android 6.0 Versions. International Journal of Trend in Research and Development, 115-117.
2. Ranjani. (Dec 2014). An Enhancement of Mining Videos based on Annotation reranking method using N Cut algorithms. IJCSIT .
3. K. Ketzial Jebaseeli, C.Subha, M. Benaiah Deva Kumar. (Jan 2016). Port Knocking. International Journal of Advanced Research in Biology, Engineering, Science and Technology , ISSN: 2395-695X ,1-4.
4. B.KIRTHIKA. (2015). ”Android Operating System- A Review ”. International Journal of Trend in Research & Development, 260-264.
5. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 – 537.
7. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research,2.
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10.K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
Research Article SKASC
Sri Krishna Arts and Science College Page 7
5. An Overview Digital Audio Watermarking
Seetha Lakshmi.K, Mohit.R and Aravind.K, Department of Information Technology
Sri Krishna Arts and Science College, [email protected]
Abstract
Digital watermarking is a very recent research area. Digital audio watermarking is a method to embed or hide the Watermark (Information signal) into a digital signal i.e. Image, audio, text or video data. The watermark is difficult to remove from the audio signal. If the signal is copied, the information or watermark is also carried in the copy. This paper makes a tutorial in general digital watermarking principles and focus on describing digital audio watermarking techniques.
BIBLIOGRAPHY
1. Deepa B ,FenziyaParveen G. (MAR 2016). The Yummy Marshmallow – Android 6.0 Versions. International Journal of Trend in Research and Development, 115-117.
2. Ranjani. (Dec 2014). An Enhancement of Mining Videos based on Annotation reranking method using N Cut algorithms. IJCSIT .
3. K. Ketzial Jebaseeli, C.Subha, M. Benaiah Deva Kumar. (Jan 2016). Port Knocking. International Journal of Advanced Research in Biology, Engineering, Science and Technology , ISSN: 2395-695X ,1-4.
4. B.KIRTHIKA. (2015). ”Android Operating System- A Review ”. International Journal of Trend in Research & Development, 260-264.
5. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 – 537.
7. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research,2.
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10.K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
Research Article SKASC
Sri Krishna Arts and Science College Page 8
6. Wireless Application Protocol - A Survey
K Anitha and G.Fenziya Parveen, Department of Information Technology
Sri Krishna Arts and Science College, [email protected]
Abstract
WAP is an open specification that offers a standard method to access Internet based content and services from wireless devices such as mobile phones. The WAP model is very similar to the desktop internet module. WAP is an enabling technology that will bridge the gap between the mobile world and the internet, bringing sophisticated solutions to mobile users, independent of the user and network. Through this paper we have given a overall view of Wireless Application Protocol- its history, features, architecture, benefits and disadvantages.
BIBLIOGRAPHY
1. Deepa B ,FenziyaParveen G. (MAR 2016). The Yummy Marshmallow – Android 6.0 Versions. International Journal of Trend in Research and Development, 115-117.
2. Ranjani. (Dec 2014). An Enhancement of Mining Videos based on Annotation reranking method using N Cut algorithms. IJCSIT .
3. K. Ketzial Jebaseeli, C.Subha, M. Benaiah Deva Kumar. (Jan 2016). Port Knocking. International Journal of Advanced Research in Biology, Engineering, Science and Technology , ISSN: 2395-695X ,1-4.
4. B.KIRTHIKA. (2015). ”Android Operating System- A Review ”. International Journal of Trend in Research & Development, 260-264.
5. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
7. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research,2.
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
Research Article SKASC
Sri Krishna Arts and Science College Page 9
7. AN OVERVIEW OF WIRELESS LAND AREANETWORK AND ITS STANDARDS
Durga kani.v kalaivani.r kishore kumar.bDepartment of information technology
Sri krishna arts and science college,[email protected]
ABSTRACTThis article presents about the overview of thelow-cost IEEE standards for wireless landarea network which is a wi-fi standard, and itsapplications, advantage and future of the802.11 standard . The main advantage of usingthese standards are low cost, providing longrange connection,network flexibility for workgroups, campus environmentand it is suitablefor many applications in suits Ad hocnetworks.
BIBLIOGRAPHY
1. Deepa B ,FenziyaParveen G. (MAR 2016). The Yummy Marshmallow – Android 6.0 Versions. International Journal of Trend in Research and Development, 115-117.
2. Ranjani. (Dec 2014). An Enhancement of Mining Videos based on Annotation reranking method using N Cut algorithms. IJCSIT .
3. K. Ketzial Jebaseeli, C.Subha, M. Benaiah Deva Kumar. (Jan 2016). Port Knocking. International Journal of Advanced Research in Biology, Engineering, Science and Technology , ISSN: 2395-695X ,1-4.
4. B.KIRTHIKA. (2015). ”Android Operating System- A Review ”. International Journal of Trend in Research & Development, 260-264.
5. B.Suchitra,C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
7. D.Shobana, V.Subramaniayam, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research,2.
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016.coimbatore.Jan 2016
Research Article SKASC
Sri Krishna Arts and Science College Page 10
8. CREDIT CARD FRAUD DETECTION
P.HARINISubramaniyan V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
ABSTRACT
The most accepted payment mode is credit card for both online and offline in today’s world,
it provides cashless shopping at every shop in all countries. It will be the most convenient
way to do online shopping, paying bills etc. Hence, risks of fraud transaction using credit
card has also been increasing. In the existing credit card fraud detection business processing
system, fraudulent transaction will be detected after transaction is done. It is difficult to find
out fraudulent and regarding loses will be barred by issuing authorities. Hidden Markov
Model is the statistical tools for engineer and scientists to solve various problems. In this
paper, it is shown that credit card fraud can be detected using Hidden Markov Model during
transactions. Hidden Markov Model helps to obtain a high fraud coverage combined with a
low false alarm rate.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
Research Article SKASC
Sri Krishna Arts and Science College Page 11
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 12
9. AN INTELLIGENT BROADCAST DISPLAY
SS.KAVIARASUSubramaniyan V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
The project titled “AN INTELLIGENT BROADCAST DISPLAY”, is used to pass message to the employees to their workplace. The main objective of this project is to display the Broadcast messages in the production environment which will reach the people more fast than to convey the message for every one working there. The implementation of this project is used to convey the important message, to wish the employee's birth date, anniversary date etc. To show the live production details, to show the emergency messages and to show the employee's regular working schedule etc. This project mainly focuses on improving the performance of the workers and to increase the production. It makes it possible for us to control the employees in the field. This project is computerization of wireless display techniques with fine user-friendly interactive modules. The various data generated by this system will save lot of time, valuable cost for the management. It’s a platform independent, currently developed software would minimize the time to deliver the messages to the workers. As this system is computerized it avoids natural human errors occurring in this management.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
Research Article SKASC
Sri Krishna Arts and Science College Page 13
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 14
10.FTP CLIENT AND SERVER
BENAIAH DEVA KUMAR. MSubramaniyan V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
ABSTRACT
This project of ‘FTP Client and Server’ is designed using Java allows the Clients to establish connection with the Server in order to upload a file to the Server or to download a file from the Server. It is the implementation of File Transfer Protocol in Java. This protocol is used for the transfer of files from the remote system to the Server.
File transfer is a generic term for the act of transmitting files over a computer network. There are numerous ways and protocols to transfer files over a network. Computers which provide a file transfer service are often called File Servers.
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. FTP is built on client-server model architecture and uses separate control and data connections between the client and the server.
There are numerous ways of file transferring. One of the most common and popular way is transferring through mail service. But the limitation in that is we can only send the data to a restricted size. So, to send huge volume of files we can use File Transfer Protocol.
In current times if you want to transfer a file to a friend, you can just attach it in an email and send it off. With high speed bandwidth being so cheap and plentiful to the home user, transferring a file in this manner is usually more than adequate. What if you needed to transfer the file to someone immediately; there could be no delays, it has to be fast, and the files you are transferring may be very large. In a scenario like this, email will most likely not be adequate. This is because most email providers limit the size of your mailbox on their servers, the size of attachments you may receive, and that there is no guarantee when you send email how long it will take for the recipient to receive it or if it will even get there. This is where FTP comes in.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
Research Article SKASC
Sri Krishna Arts and Science College Page 15
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal ofMultidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 16
11. TEXTILE ANALYTICAL CONFIGURATION TOOL
M.ASWINKUMARSubramaniyan V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
The application TACT is used to configure themachine process in single web page. To make a smarter way of configure the machine process.To provide the all facilities in the single screen to configure the machine. In the single screen the user can configure the machine process, how the machine is going to do the work. This tool is divided into three modules in single screen to configure and save the machine process.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 17
12.ONLINE PRODUCT OPINION AND RANKING SYSTEM
GOWTHAM.DSubramaniyan V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
The system entitled “ONLINE PRODUCT OPINION AND RANKING SYSTEM” is a web based application project. The project is mainly developed to analyse the market research for each products purchased through online for the selected company.
The software is mainly used as a brand perception study focused on opinion market research. The software is monitored though administrator control where the user can sign up with the basic details and start purchasing through online, where the software ask for customer feedback of each product in star rating scaled from 1 to 5. Once the user input the star rating, then the product is allowed to add in the order list. Once all the products are properly selected and the feedback received for each product from the user side, an automatic message is sent to the customer mobile number. In the meanwhile the payment gateway PayPal is connected to settle down the payment through debit or credit card, or through net banking.
The website is being developed based upon the management request. The website is more flexible as it is maintained in webserver. The system also facilitates a provision to make orders online and the goods are delivered at the customer’s doorstep on time. Understanding every customer urgency and requirement their products are delivered quickly. They also ensure the follow-up that the customers’ orders get delivered on timeThe main goal of the project is to reduce the time taken in purchasing products by the customer and reduce the manual works. And also to show the product opinion and raking of all listed products.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
Research Article SKASC
Sri Krishna Arts and Science College Page 18
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 19
13.COHESIVE RESILENCY FORMATION IN PACKING CLOUDS
Nandhini.ASubha.C, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
Storage clouds use economics of scale to host data for diverse enterprises. However, enterprises differ in the requirements for their data. In this work, it is investigated that the problem of resiliency or disaster recovery (DR) planning in a storage cloud. The resiliency requirements vary greatly between different enterprises and also between different datasets for the same enterprise. In thisResilient Storage Cloud Map(RSCMap).
A generic cost-Minimizing optimization framework for disaster recovery planning, where the cost function may be tailored to meet diverse objectives. It is presented fast algorithms that come up with a minimum cost DR plan, while meeting all the DR requirements associated with all the datasets hosted on the storage cloud. The proposed algorithms have strong theoretical properties: 2 factor approximation for bandwidth minimization and fixed parameter constant approximation for the general cost minimization problem. It perform a comprehensive experimental evaluation for RSCMap using models for a wide variety of replication solutions and show that RSCMap outperforms existing resiliency planning approaches.
Based on virtualization, takes a very different approach to disaster recovery. With virtualization, the entire server, including the operating system, application, patches and data is encapsulated into single software bundle or virtual server. The entire virtual server can be copied or backed up to an offsite data center and spun up on a virtual host in a matter of minutes. Since the virtual server is hardware independent, the operating system, applications, patches and data can be safely and accurately transferred from one data center to a second data center without the burden of reloading each component of the server. This can dramatically reduce recovery times compared to conventional (non-virtualized) disaster recovery approaches where severs need to be loaded with the OS and application software and patched to the last configuration used in production before the data can be restored.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
Research Article SKASC
Sri Krishna Arts and Science College Page 20
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 21
14.EMPLOYEE DETAILS MANAGEMENTRAMYA.R
Subha.C, Assistant ProfessorDepartment of Information Technology
Sri Krishna Arts and Science College, [email protected]
ABSTRACT
The Employee management details are about the designation and the department of the employees who works in an organization. Once if the admin login the page they can view the complete details about the employees. The admin logins by using admin user ID and password so others cannot be able to access the login page. After the login page, the department and the designation page will be displayed. The department page is used to display the details about the employee’s department details by clicking the button as department. It contains department_id and department name. The same procedure follows for the employee designation. In the designation page there will be designation and also the details about the designation id and designation name.
The study involved the analysis of the EMPLOYEES MANAGEMENT DETAILS about their own company. It is over the details about the department and their designations of the company. It is the details about the IT. By using the programming language such as PHP and Mysql.Also by database as phpMyadmin. The programming technics runs only in the web browser.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and InformaticsICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
Research Article SKASC
Sri Krishna Arts and Science College Page 22
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
Research Article SKASC
Sri Krishna Arts and Science College Page 23
15.SHOPPING CART
Priskey.A Subha.C, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
A “Shopping Cart” is a piece of e-commerce software on a web server that allows visitors to an Internet site to select items for eventual purchase, analogous to the American English term “Shopping Cart”. Ecommerce (or electronic commerce) refers to the buying and selling of goods and services via electronic channels, primarily the Internet. Unlike traditional marketing methods that only reach a limited number of people, online marketing has an unlimited audience. A well conceived internet marketing plan can increase your brand recognition and attract a whole group of new customers. The system does all of the work foryou. Customers simply browse your online store and purchase the items.
The Shopping Cart is a virtual store on the Internet where customers can browse the catalog and select products of interest. It provides the user a catalog of different products available in the system. In order to purchase, a Shopping Cart is provided to the user. The selected items may be collected in a Shopping Cart. At checkout time, the items in the Shopping Cart will be presented as an order. At that time, more information will be needed to complete the transaction. Usually, the customer will be asked to fill or select a billing address, a shipping address, a shipping option, and payment information such as credit card number. Upon checkout, the software typically calculates a total for the order, including shipping and handling (i.e., postage and packing) charges and the associated taxes, as applicable.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
Research Article SKASC
Sri Krishna Arts and Science College Page 24
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal ofMultidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 25
16. IMAGE STEGANOGRAPHY IN MMS
R.BHUVANESHWARI Subha.C, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
Image Stegnography in MMS is Android-based mobile application. Image Stegnography in MMS is a mobile application that is capable of hiding the data inside the image. The image containing the data can then be sent via MMS (Multimedia Messaging Service). Image Stegnography in MMS can be used by various users who want to hide data inside an image without revealing the data to other parties. Implementing steganography algorithm in Android-based application makes the usability of steganography increased since mobile is more convenient for user to be brought anywhere and use anywhere. By sending the stego image through MMS, the user is able to get announcement instantly once the stego image received. The technique cryptography and steganography for securing information over mobile in MMS is used. F5 algorithm for image steganography and tiny encryption algorithm for cryptography is used. Tiny encryption algorithm is block cipher algorithm. It is simple and fast but best for mobile application. It is very secure for MMS in Android Smart Phones.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
Research Article SKASC
Sri Krishna Arts and Science College Page 26
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 27
17. INTEGRATED CUSTOMER ENQUIRY SYSTEM USING STATISTICAL BASED ALGORITHM
VIGNESH.MSubha.C, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
The system entitled “INTEGRATED CUSTOMER ENQUIRY SYSTEM USING STATISTICAL BASED ALGORITHM” is a Web Application software used to manage the resource of a Company to the full extend. The project has been designed and developed using ASP.Net 2010 as front end and MS SQL Server 2008 as back end tool. The project maintains the relationship with the customers and providing services to them in the field of sales and service. The details about the Vehicles, color, location, sales person and follow-up are stored in the centralized database. The database administrator can make all the changes in the database and he can give control to other users to access the data base. Security is the main feature in the field of organization. Thus it prevents illegal users from viewing unauthorized information. The second one is the authentication procedures on the client as well as administrator side.
This project is suitable for two wheeler showrooms and it is involved in performing the processes under the Heading Menus, Masters and Reports. A typical application integrates and co-ordinates the operations such as Vehicles, color, location, sales person and follow-up details using statistical based algorithm.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
Research Article SKASC
Sri Krishna Arts and Science College Page 28
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal ofMultidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 29
18.SMART CARD MANAGEMENT
SOWNDARYA VShobana. D, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
shobanad @skasc.ac.inABSTRACT
The topic of the project is smart card integration. This project deals with the smart card reader. The employees will be given a primary smart card separately. The smart card will be detected by the smart card reader placed in the food court whenever swiped. This project also includes the payment module, inventory management, rating and review. The respective accounts will be maintained in the database.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal ofMultidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 30
19. CAFETERIA MANAGEMENT SYSTEMS. VAISHNAVI
Shobana. D, Assistant ProfessorDepartment of Information Technology
Sri Krishna Arts and Science College, Coimbatoreshobanad @skasc.ac.in
ABSTRACT
The project is Cafeteria Management System. This project is nothing but to maintain the cafeteria accounting for employees working in the company. The project starts from the user profile management and ends with accounting and database management. Each employee working in the company will have an individual account and the screen displays the dishes available, ordered, delivered and payment information. The software and hardware specifications used are mentioned. In this the front-end is connected to back-end so that database is updated and maintained. Customer satisfaction is the key to success for any business. In a cafeteria, the traditional hand-waving method for calling services is inefficient often leading to many complaints. The Cafeteria Management System increases operational efficiency through use of an internal wireless communications system and a statistical data processing unit. The communications system increases customer satisfaction by leaving a transmitter at each table which the customer can use to request for a server. A data processing unit allows managers and owners to easily monitor cafeteria functions and employee progress.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
Research Article SKASC
Sri Krishna Arts and Science College Page 31
20. PLANNING AND TECHNICAL MANAGEMENT SYSTEMGOMATHI.M
Shobana. D, Assistant ProfessorDepartment of Information Technology
Sri Krishna Arts and Science College, Coimbatoreshobanad @skasc.ac.in
ABSTRACT
The main aim of the Planning & Technical Management System project is to reduce the
paperwork and duration of work process and to maintain the data of employee details and
work schedule efficiently the maintenance of all details is undergoing manually in the
existing system. So it is becoming very difficult for the communication between the various
departments of Employees and also to maintain & refer to the Loco information.
To overcome these drawbacks, computerizing the details of the Locos related to a
particular Employee details is needed. So this system is built to access the information of the
loco in an easier way. The system also provides information regarding the staff attendance so
that the top management can have an easy way to handle the staff members’ regularity.
I am going to describe in this project is general and sectional allotment of the employee
.Every employee have to do the project in the respected time.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
Research Article SKASC
Sri Krishna Arts and Science College Page 32
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 33
21. QUICK INTERACTIVE CAPTCHA
Manjubhashni.SShobana. D, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
shobanad @skasc.ac.in
ABSTRACT
A CAPTCHA is a type of challenge-response test used in computing as an attempt to
ensure that the response is generated by a person .CAPTCHA (Completely Automated Public
Turning Test to Tell Computers and Humans Apart) is a simple test that is easy for humans
but extremely difficult for computers to solve.
CAPTCHA has been widely used in commercial websites such as web-based email
providers, Ticketmaster, GoDaddy, and Facebook to protect their resources from attacks
initiated by automatic scripts. CAPTCHAs are also used to minimize automated posting to
blogs, forums and wikis, whether as a result of commercial promotion, or harassment and
vandalism. CAPTCHAs also serve an important function in rate limiting.
A New technology of CAPTCHA was introduced which was based on interaction
between the legitimate user and server. As per the future work of existing iCAPTCHA
technologies we develop a new streamlined of QiCAPTCHA requires a user to solve a
CAPTCHA test via a series of user interactions. The QiCAPTCHA is worked for quick
response time and giving more possibilities in order to increase timing from 3rd party human
attacks. A performance and usability study of QiCAPTCHA shows the proposed scheme is
effective in attack detection, is easy to use and quick validation via test.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
Research Article SKASC
Sri Krishna Arts and Science College Page 34
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 35
22. TRAINING AND DEVELOPMENT OF EMPLOYEE
Krithikaa.MShobana. D, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
shobanad @skasc.ac.in
ABSTRACT
Employee Training is distinct from management or Executive Development. While the former refers, training is given to employees in areas of operations, techniques and allied areas, while the latter refers to developing an employee in areas of important techniques of the Management Administration, Organization and allied areas.
Training means to continuously nurture the employees or workers towards better performance in a systematic way. This can be either at the work spot or at the workshops. This is mainly to improve the technical skills of the employees or workers.
Development means bringing out the actual potentialities and thus willing to high motivation and commitment standards towards work. This will be generally with regard to improvement in the behavioral skills.
Every organization needs to have well-trained and experienced people to perform the activities that have to be done. So, every modern Management has to develop Human Resources Development. In a rapidly changing society, employee training is not only an activity that an organization must arrange if it is to maintain a viable and knowledgeable workforce. Training is thus a practical and vital necessity.
This research provides me with an opportunity to explore in the field of Human Resources. This research also provides the Feedback of people involved in the Training and development process. Apart from that it would provide me a great deal of exposure to interact with the high profile managers of the company.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
Research Article SKASC
Sri Krishna Arts and Science College Page 36
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 37
23. CONTEXT BASED ACCESS SYSTEM FOR MOBILE DEVICES
LijiDeepa .B, Assistant Professor
Department of Information Technology Sri Krishna Arts and science college
Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. The implementation of context differentiates between closely located sub-areas within the same location. The process done has modified the Android operating system so that context-based access control restrictions can be specified and enforced.BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open 5. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A
Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
6. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
7. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
8. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
9. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
10. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 38
24. DIGITAL PARKING SYSTEM
Nandhini.SDeepa.B,Assistant Professor
Sri Krishna Arts and Science [email protected]
ABSTRACTDigital parking system is very popular because they allow extra services like immediate parking space, availability check, etc. The purpose is to allow immediate parking space availability check for an incoming vehicle and clear the allocation for the existing vehicle. The employees can login with their username and password to work with the system. The details of the members, their validity and amounts paid etc. are maintained. Once a vehicle enters, a ticket exists only as a digital record in the computers. Customers take out a copy of their ticket which contains the location detail and the ticket number. The parking lot employee details are maintained and managed by the admin. The parking lots and their numbers are managed as well.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
25. SAPIENT E-LEARNING
Research Article SKASC
Sri Krishna Arts and Science College Page 39
Kerthye.SDeepa .B, Assistant Professor
Department of Information Technology Sri Krishna Arts and science college
ABSTRACTThe e-learning has become a widely used term in academia and the industry.
Education has not remained unaware of this trend, and several educational solutions based on e-learn technologies are already in place, especially for self-learning websites and downloadable PDF’s. However, an evaluation of the educational potential of infrastructure and platform has not been explored yet. An evaluation of which type of e-learning system would be the most beneficial for students to learn, depending on the technical knowledge required for its usage, is missing. Here, the first systematic evaluation on different types of e-learning is the advancement of course and their type of features extra which they give for the users is very prominent. This evaluation tries to answer the question whether e-learning technology present in the current educational scenario is efficient for the students to excellence in their education and also in their concept clarification. This study demonstrates the platform independent methodology, where the students can learn themselves in an efficient manner by executing the learning language(for example, if we are learning about SQL Server and we do not have SQL Server installed into our system but even then the execution of SQL queries can be done through our Sapient E-Learning system). These results most strongly apply to courses in which students interact with resources that are non-self-contained but could apply to disciplines that involve programming and also performing virtual experiments of the things that are learned by them. Based on the test scores by the student after learning, the improvement materials required for the students is also given to them in order to expertise the student in the area being learned through our application.BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
Research Article SKASC
Sri Krishna Arts and Science College Page 40
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 41
26. A STUDY ON DESKTOP SPY
S. Madhumathi,B. Deepa,
Sri Krishna Arts and Science College, [email protected]
AbstractDesktop Spy is a powerful computer surveillance program which can be used in the home, school or office to monitor every detail of PC. Desktop spy is a software that use to monitor our system activities. It records all the activities of other person in our system. It watches the particular secure folder and monitor the particular folder activities.
System Spy can also be run in the stealth mode making it completely invisible to computer users. It shows if the user delete, modify, rename or create a file in a particular folder what the admin want to watch.
1) It Keep an eye on employees who spend too much time on web or chatting. See what they really do.
2) Keep an eye on your better half incases she/he is cheating on you.Admin has the full rights of this project, admin give username and password to the
users.The object of this project is monitor and tracks all aspects of your computer in
windows forms using VB.NET and MS SQL SERVER.BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
Research Article SKASC
Sri Krishna Arts and Science College Page 42
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 43
27. PRO-NET COMMUNICATION USING IP MESSENGERB.Sri Nivetha
Suchitra B, Assistant ProfessorDepartment of Information Technology
Sri Krishna Arts and Science College, [email protected]
Abstract
Pro-net communication is which handles the offline, online or LAN communication using any application. For an execution, IP messenger is used in LAN. This is a java based application for mailing, chatting and sending files in LAN manner. IP messenger in pro-net service is used for an easy communication. Internet protocol is an instant messenger that has its own protocol and uses Secure Socket Layer (SSL) as opposed to regular sockets. Internet Protocol is responsible for end to end transmission and sends data in individual packets. It also contains maximum size of packets which is determined by the networks. IP Messenger is one of the awesome tools which allows to chat on LAN or network.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 44
28. Anomaly Detection via Online OversamplingPrincipal Component Analysis
G.B.SaranyaSuchitra B, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
Abstract
Web-delivered services and applications have increased in both popularity and complexity over the past few years. Daily tasks, such as banking, travel, and social networking, are all done via the web. Malicious data injections over Internet services and applications have become a most vulnerable activity which is a part of intrusion. The intruders are mainly focusing to intrude through the web server. Many real-world applications such as intrusion or credit card scam detection and money transfer and mail transactions require an effective and efficient support to identify the data instances. Many intrusion detections systems are proposed to identify the irregularity, which are usually implemented in batch mode, and thus cannot be easily extended to large-scale problems without sacrificing computation and memory requirements. In this project, an online oversampling principal component analysis to address this problem, and it aims to detect the intruders from a large online data set. By means of oversampling the data instance, it defines and characterizes the correct and acceptable static form and dynamic behaviour of the system, which can then be used to detect abnormal Changes or anomalous behaviours. Depends on the abnormality, our system finds the malicious data and it blocks to reduce the network traffic over the web.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
6. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
7. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
Research Article SKASC
Sri Krishna Arts and Science College Page 45
8. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
9. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 46
29. Placement Management System
P.PraveenSuchitra B, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
Abstract
Placement Management System is a online website which is used to help the students,staffs and also the college organization to know about the placement details..The main aim of the website is to monitor placement details of the student and also to train the students regarding to their placement by conducting online test for students and also to maintain their personal and academic details and generating the total report of placement details of college and department on year wise.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 47
30. STUDENT INFORMATION SYSTEMKaviya.S
K.Ketzial Jebaseeli, Assistant ProfessorDepartment Of Information Technology
Sri Krishna Arts And Science [email protected]
Abstract
The project Student Information System (SIS)is proposed in importance to an IT organization which has a training department of its own. This system is based on application that can be accessed throughout the organization perspective.
This system can be used to automate the workflow of requests that come from various students for specific trainings and their approvals. It manages the manual work of the admin by automated works. The computerized workflow creates a greater accuracy in comparison with system oriented features. The SIS project updates the serviced request to the admin automatically.
The training department has to cater to the training of the fresh recruits with attendance and fee structure. It has a regular calendar and schedule to train the fresher’s. In addition to this it has to handle the fees details in accordance with appropriate courses the students subjected. The whole process starting from logging the request by a student to servicing the request is automated. There are features like logging the request, to check the existing training calendar and checking the availability of respective course timings, if the preferred course is available for the student the fees for that course is shown .Finally ,the student details with their preferences is updated to the admin.The admin allocates the course selected by recruits by specifying the fees and course schedule.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research &Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
Research Article SKASC
Sri Krishna Arts and Science College Page 48
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal ofMultidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 49
31. DATA ACCESS CONTROL IN CUSTOMER CARE SERVICES
P.PavithradeviK.Ketzial Jebaseeli, Assistant ProfessorDepartment Of Information Technology
Sri Krishna Arts And Science [email protected]
AbstractProject entitled as “DATA ACCESS CONTROL IN CUSTOMER CARE SERVICES”.It is
designed using Microsoft visual studio.Net 2010 as frontend and Microsoft SQL server 2005 as backend which works in .Net framework version 1.1 .The coding language used is c#.net. This project is designed for the purpose of data access control designed to the admin and service engineer in customer care services.Mainly it covers the authentication, create user , create data set,publish data set,creating service engineer profile.Detecting and preventing data leakage and data misuse poses a serious challenge for organizations, especially when dealing with insiders with legitimate permissions to access the organization’s systems and its critical data. To propose a new measure, the M-score, assigns a misuseability weight to tabular data, discuss some of its properties, and demonstrate its usefulness in several leakage scenarios. One of the main challenges in applying the M-score measure is in acquiring the required knowledge.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 50
32. ODOO SERVER ADMINISTRATION
Tamilarasi.S Kirthika B, Assistant Professor
Department of Information Technology,Sri Krishna Arts and Science College, Coimbatore
Modern hand held devices such as smart phones and PDAs have become increasingly power in recent years. Dramatic break thoughts in processing power along with the number of extra features include in these devices have opened the doors to wide range of commercial possibilities. In particular most cell phones includes cameras, processor comparable to PCs from only a few years ago, and internet access. However, even with all these added abilities, there are few applications that allow much passing of environmental information and location based services.As mobile devices become more likely PCs they will come to replace objects we tend tocarry around such as checkbooks, credit cards, cameras, planners, MP3 players, etc. In short we will be using them to accomplish over daily tasks. One application that fall into this category is the “ODOO SERVER ADMINISTRATION “for android phones. The main objective of this project (ODOO SERVER ADMINISTRATION) is to bring mobility. As, this company (AXCENSA TECHNOLOGIES PVT. LTD) is providing servers to different companies. The admin has to check the status of the server each time through computer or laptop. It is difficult to carry laptops to everywhere so, to overcome such type of situation this project, ODDO SERVER ADMINISTRATION helps us to check the status of the server through mobiles. Not only to check the status but also to update, add user, deleteuser, configure etc.., .The main advantage of this app is it is cost efficient i.e. 2G data is enough to access it.The project is developed in Java programming language by using Android Studio Integrated Development Environment (IDE). We use the Android software development kit (SDK) which includes variety of custom tools that help us to develop mobile application on the Android platform. The most important of these are Android Emulator and Android Development Tools (ADT) plug-in for Android studio. BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey.International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
Research Article SKASC
Sri Krishna Arts and Science College Page 51
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 52
33. GIFT PRODUCT SYSTEM
Visalakshi SKirthika B, Assistant Professor
Department of Information Technology,Sri Krishna Arts and Science College, Coimbatore
Online gift product system provides an alternative option for customer to have a look over all the products through online thus it reduces time and energy; it provides a friendly environment for customers. Customers can only view the products through this site.
The project“GIFT PRODUCT SYSTEM “is designed using PHP (front end), SQL (backend), Xampp server allows a customer to have a look over all the categories. Customer can send their queries to the admin which will be rectified by the admin for later view.
Admin can view the message sent by the customer by logging in the website.Admin can adds the product or removes the product accordingly.The input data is also used to calculate the necessary functions. Different forms are used to data screens in order to set the input data into the system.
Gift Product system is developed for the in the process of their activities to automate their operations. The system is dealing with the gift Products. Admin has access to add the products. Gift Product System deals with products added to the gift solutions shop. The application is designed to add the products dynamically & access it in an easy manner. The main aim of the project is reducing the bulk amount of paper work and time .This electronic system is more efficient and secured too. Only the Admin can maintain and access the record whereas it is denied for other users and employees.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types andProtection. International Journal of Trend in Research and Development, II(5), 351-355.
Research Article SKASC
Sri Krishna Arts and Science College Page 53
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 54
34. SVS MEDICAL EQUIPMENTS
Sri Bharathi NKirthika B, Assistant Professor
Department of Information Technology,Sri Krishna Arts and Science College, Coimbatore
Online medical product system provides an alternative option for customer to have a look over all the products through online thus it reduces time and energy; it provides a friendly environment for customers. Customers can only view the products through this site.
The project“SVS MEDICAL EQUIPMENTS “is designed using PHP (front end), SQL (backend), and Xampp server allows a customer to have a look over all the categories. Customer can send their queries to the admin which will be rectified by the admin for later view.
Admin can view the message sent by the customer by logging in the website.Admin can adds the product or removes the product accordingly.The input data is also used to calculate the necessary functions. Different forms are used to data screens in order to set the input data into the system.
Medical Product Equipment’s is developed for the in the process of their activities to automate their operations. The system is dealing with the medical Products. Admin has access to add the products. Medical Product System deals with products added to the medical system. The application is designed to add the products dynamically & access it in an easy manner. The main aim of the project is reducing the bulk amount of paper work and time .This electronic system is more efficient and secured too. Only the Admin can maintain and access the record whereas it is denied for other users and employees. BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
Research Article SKASC
Sri Krishna Arts and Science College Page 55
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 56
35. COLLEGE TRANSPORT MANAGEMENT SYSTEM
Ashwini.BValarmathi.V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
valarmathiv @skasc.ac.in
ABSTRACTThe project entitled “College Transport Management System” can designed and
developed by using Microsoft Visual Studio Dot Net as Front End tool and SQL Server 2008 as back end tool. The proposed system is mainly designed to automate the college transport system.
It is designed with a set of modules such as Areas, Routes, Buses, Pick up points, Drivers, Users, Students-Bus allocation, Set pickup point, Payment details.
The existing system is thoroughly analysed and identified the problems faced in the end user side. In order to overcome the existing problem, the proposed system is designed with several objectives planned such as reducing the college management burden in automating the transport system.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 57
36. E-TRAVELLING SYSTEM
Angupriya.BValarmathi.V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
valarmathiv @skasc.ac.in
ABSTRACT
In internet, reservation will be considered as important for our public. They reserve tickets previously to travel whether it is in air or rail. First they reserve tickets on the stations only. Then they do this by agents. After the growth of internet online reservation system is created.
E-Travelling is a computerized system used to store and retrieve information and conduct transactions related to cab travel. A Cab reservation system is part of the so-called Passenger Service Systems (PSS), which are applications supporting the direct contact with the passenger. In this system we implement Registration, Reservation and Cancellation.BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 58
37. HILLS STATION VEHICLE PROTECTING SYSTEM
Anandhi.SValarmathi.V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
valarmathiv @skasc.ac.in
ABSTRACT
The project entitled “Hills Station Vehicle Protecting System” is a web based administrative tool that is developed using ASP.Net as front-end and SQL Server as back-end.
This project helped to the tourist passenger. When the tourist passenger vehicle reached the hills station check post, their vehicle number, number of passengers, passenger names and from, to address are stored in the system and check post officer will provide the allowing entry receipt.
Another hills station check post get that receipt and make system entry for vehicle reached and post officer will check the passenger details. When the vehicle does not reach the next check post, that details will pass to the first check post.
When the passenger is missing or vehicle does not reach to address or destination, this project helped to find out that detail.This project will have different modules passenger detail, first check post detail, second check post detail.BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
Research Article SKASC
Sri Krishna Arts and Science College Page 59
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 60
38. STUDENT ID CARD MANAGEMENT SYSTEM
Anisha Banu.SValarmathi.V, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
valarmathiv @skasc.ac.inABSTRACT
The project entitled “StudentId Card Management System” is designed and developed by using ASP. Net as Front End tool and SQL Server 2008 as back end tool. The proposed system is mainly designed to automate id card apply.
The existing system is thoroughly analysed and identified the problems faced in the end user side. In order to overcome the existing problem, the proposed system is designed.
The proposed system is designed with a set of modules such as student id card form, department HOD approval, id card processing details, delivery details, message alerts and reports.The proposed system is designed to reducing the applying time of student id card. BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 61
39. BOOK A PANDIT APPLICATION
Abinayavishalini.TR.Ranjani, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
ABSTRACT
The objective of my app is to know the temple details of the clients wants to Celebrate or conducting any puja now it is difficult to booking the puja in Temple so this app is very easy to booking puja in temple. By clicking on Sign Up button, user can create profile by giving the required details. The following are the fields which user needs to enter their details at the time of Sign Up. On successful sign up, an email will be sent to user.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 62
40. QUANTUM KEY DISTRIBUTIONDivya Bharathi.S
R.Ranjani, Assistant ProfessorDepartment of Information Technology
Sri Krishna Arts and Science College, [email protected]
Abstract
The key generation problem in the two-way relay channel, in which there is no direct channel between the key generating distributions. We propose an effective key generation scheme that achieves a substantially keys than direct channel. Unlike existing schemes, there is no need for the key generating terminals to obtain. Secure key distribution schemes establish communication between a group manager and group members through an unreliable broadcast channel. The improved efficiency for key management process is realized by periodically refreshing all public private key as well as the multicast keys in all the nodes using one newly generated function. The article classifies and compares the most significant key distribution schemes, key distribution algorithms, at the pre distributed secret data management, and self-healing mechanisms. It consists of polynomial-based algorithms, exponential arithmetic based algorithms and hash-based techniques. Proposed classification is based on the applied cryptographic primitives.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal ofMultidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 63
41. ELECTRONIC STUDENT LEAVE ORGANIZER
Nabela.IR.Ranjani, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
Abstract
The paper entitled Electronic Student leave Organizer is a web based application software which has been designed and developed by using Microsoft Visual Studio Dot Net 2010 as front end tool and Microsoft SQL Server 2008 as back end tool.
It is mainly designed to automate the student leave enquiry process. In the newly designed system, the entire manual process have bring into centralized web server, so that the student can sign up their details and post their leave request any time. In turn, the posted leave details are allowed to display to the higher officials as well the concern department staff. The staff can reject or accept the leave request without meeting the student.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 64
42. BAKERY MANAGEMENT SYSTEM
Karthick.GR.Ranjani, Assistant Professor
Department of Information TechnologySri Krishna Arts and Science College, Coimbatore
ABSTRACT
It is built to manage the bills, orders, client, sales report, stock management and other additional options to increase both customer satisfaction and also the growth of the bakery. Bakery Management System is a flexible and versatile package which is customized to meet customer needs, through 12 hours of call and email availability to order products and thus this application paves the way for the next generation of green computerized baking.
BIBLIOGRAPHY
1. K.S.JEEN MARSELINE (2016). A SOFTWARE QUALITY RISK ASSESSMENT TOOL. International Conference on Computer Communication and Informatics ICIIECS 2016. coimbatore.Jan 2016
2. B. Deepa , M. Benaiah Deva Kumar. ( SEP 2015). Computer Networking: A Survey. International Journal of Trend in Research and Development,, 126-130.
3. D.Shobana, (DEC. 2015) A study on communication Security in Networks. International Journal of Trend in Research and Development, 2 (6).
4. D.Shobana, V.Subramaniayan, B.Deepa, N.Uthra. (MAR 2016). What is an open source: A Review. SS International Journal of Multidisciplinary Research, 2.
5. B.Suchitra, C.Vijayalakshmi. (MAR 2015). A General Overview of Data Security Algorithms for Wireless Sensor Networks. Second International Conference on Advances in Information Technology and Networking,ISBN 978-81-927985-5-4. Coimbatore.
6. K.Ketzial Jebaseeli V.Kaviya , R.Soundarya. (Mar-Apr 2016). Generation of Networks: A Review. International Journal of Trend in Research & Development , ISSN 2394-933,134-135.
7. Reshmi. S, D. M. (AUG 2016). Secured Structural Design for Software Defined Data Center Networks. International Journal of Computer Science and Mobile Computing , 5 (6), 532 –537.
8. Subha. C, Kaviarasu.S, Kavyapriya.G.V. (2015, October). Cyber Crime – Attacks, Types and Protection. International Journal of Trend in Research and Development, II(5), 351-355.
9. Ranjani. (Feb 2016). Congregation of Sickle cell anemia exhausted datamining contrinvance as per classification set of rules. ICAETSD .
10. Kanimozhi. (March 2016). What is clustering:An Overview. SS International Journal of Multidisciplinary Research , 71-77.
11. B.KIRTHIKA, P.HARINI, T.ABINAYA VISHALINI (2016, JAN-FEB). EMERGING TECHNOLOGIES: A SURVEY. International Journal of Trend in Research and Development , 277-280.
Research Article SKASC
Sri Krishna Arts and Science College Page 65
Research Article SKASC
Sri Krishna Arts and Science College Page 66
Research Article SKASC
1
DEPARTMENT OF COMMERCE ABC
INDEX
S. No. Title of the abstract Page no
1. A STUDY ON FUNCTIONAL ANALYSIS OF SALZER ELECTRONICS LIMITED
2
2. A STUDY ON THE IMPORTANCE OF HOLDING A DIVERSIFIED PORTFOLIO OF STOCK WITH REFERENCE TO NILGIRIS
3
3. SOCIAL MEDIA MARKETING 4
4. A CONCEPUTAL STUDY ON ENBEST ENGINEERS PUMPS PRIVATE LIMITED COMPANY
5
5. A STUDY ON IMPLEMENTATION OF LEAN MANUFACTURING IN MICRO, SMALL AND MEDIUM SCALE INDISTRIES WITH SPECIAL REFERENCE TO COIMBATORE
6
Research Article SKASC
2
1. A STUDY ON FUNCTIONAL ANALYSIS OF SALZER ELECTRONICS LIMITED
Hari S.LShobanapriya.P,
Sri Krishna Arts and Science College, [email protected]
Abstract
The purpose of the projects was to understand the company’s problems and encounter the
solution to it and also to study about accounting and its role. Accounting means collecting,
analysing and discussing the economic information. The root of all business analysis and
forecasting is record keeping system. A successful running business will maintain accounting
principles. A short study about organisation helped me with understanding the management
decisions, rules, employee’s satisfactory level and the accounting process. This study
analysed empirically the work of SALZER electronics, a division of SALZER as a case
study. In the training, I identified the problem in the production department and analysed the
finance department. The company corporate goal was tested with the use of telephone
interviews and few discussions and conversations with the staff of the firm and the customer
of its products. This organisation contains various departments. Each one contains its own
role. ‘Quality’ being a main motive, company’s production is increased by time. This study
clarifies how accounting is linked in this company to increase the profits and how they
overcome the difficulties in the production department
Bibliography1) Juliangnanadhas, C. (Jan 2015). Radio Call Taxi- Sustainable Business Models.
Pauline Journal of Research and Studies .
2) Devika.P. (Sep2013). A study on Advertisement and its Effectiveness of Fast moving consumer goods with special reference to Himalaya protein shampoo at Kerala. Bonfring.
3) Dhivya. J (2014). Direct Marketing. Vivekanadha Institute of Information and Management Studies (p. 8). Madurai: Shanlax Publications
4) Shobanapriya, P. (May 2014). Recruitment and Selection. International Journals of research and development- A Management Review .
Research Article SKASC
3
5) Subhashini. S (2014). Cloud Computing for Financial Service Industry. National Conference on Cloud Management. Coimbatore.
2. A STUDY ON THE IMPORTANCE OF HOLDING A DIVERSIFIED PORTFOLIO OF STOCK WITH
REFERENCE TO NILGIRIS
Pavithra.A,Julian Gnana Dhas.C,
Sri Krishna Arts and Science College, [email protected]
Abstract
The report is a result of the research titled “A study on the awareness of stock and
importance of holding a diversified portfolio of stock with reference to Nilgiris. The
objectives of the study were to determine the factors determining diversification of the
portfolio of stock and to prepare a model describing the influence of these factors. The
respondents were mainly the investors who have invested in shares, bonds, debentures etc..,
The sample consisted of 75 investors. The researcher collected the data from the investors by
means of a questionnaire. The study revealed the fact determining the awareness of stock
among the investors and how far the investments have been diversified as portfolios. The
study influences the economic welfare, development, knowledge development, and
experiences to the investors. The researcher checked the right fit towards the investors and
flexibility of the structure provided by the investment holders for the income tax benefits.
Bibliography
1) Juliangnanadhas, C. (march 2015). Impact of CEO’s Involvement in social media on Branding their Business. Recent Trends on Management by Department of Business Studies.
2) Bakiyaraj. K (2013). Recent Advancememet in Business Practices. Emerging Trends in Modern Retailing
3) Devika.P. (Jan 2015). Impact of Capital Market Reforms of Economic Growth: The Indian Scenario. International Journal of Research & Business Innovation.
Research Article SKASC
4
4) KARTHIKA.P. (2015). MARKET PRESENCE AND INVENTORY DECISION OF RETAILERS WITH REFERENCE TO NIRAPARA(A STUDY IN ALAPPUZHA DISTRICT). INTERNATIONAL JOURNAL OF ENGLISH LITERATURE AND HUMANITIES.
5) Shobanapriya, P. (May 2014). Recruitment and Selection. International Journals of research and development- A Management Review .
3. SOCIAL MEDIA MARKETING
Suganya.NBakiyaraj.K,
Sri Krishna Arts and Science College, [email protected]
Abstract
The purpose of this paper is to bring out the various types of social media and the significance of social media marketing to the business in today’s world. Social media allows people to be more connected than ever before and marketing is changing rapidly as new technologies shoot up almost every day. A business which can adopt the technological changes and apply it in its marketing strategy can definitely ripe its benefits. Using new social media marketing techniques, the business can deepen its relationships with its prospective customers and even create new customers. For a business to be technologically upgraded, it is inevitable for a business to make use of the social media. Further, a business has to choose a social media marketing strategy of its own to suit its goals whether they are brand building, link building, an integrated campaign or a long- term social media plan. Social media can be considered the game changer for businesses and it has the ability to overcome the limitations of traditional forms of media. This is due to the reason that social media consists of social networking sites that helps in information sharing across the globe faster than the traditional forms of media like television and print media. Engaging the audience via social media is the best marketing strategy in this age of communication. Two case studies have been presented regarding the marketing strategy of two different companies which helps to have a clear understanding of the significance of social media and the negative consequences to be met by the companies in case of any default in the usage of social media. The study concludes with the point that for catching up with the consumer’s taste, meeting up with the competitors and surviving in the modern day market, social media is inevitable.
Bibliography
1) Juliangnanadhas, C. (Jan 2015). Radio Call Taxi- Sustainable Business Models. Pauline Journal of Research and Studies
2) Bakiyaraj. K (2013). Recent Advancememet in Business Practices. Emerging Trends in Modern Retailing
3) Devika.P. (Sep2013). A study on Advertisement and its Effectiveness of Fast moving consumer goods with special reference to Himalaya protein shampoo at Kerala. Bonfring
Research Article SKASC
5
4) Dhivya. J (2015). Tourism Industry. Adithya Institute of Technology (p. 8). Coimbatore: Adithya Institute of Technology
5) KARTHIKA.P. (MARCH 2015). MAKE IN INDIA AND FOOD PROCESSING. MAKE IN INDIA MISSION. COIMBATORE: HIKEY MEDIA
6) Subhashini. S (2016). Digital transformation of People Management. National conference on HR Technology Trends - A revolution in the world of work. Coimbatore
7) Devika.P. (Sep2013). A study on Advertisement and its Effectiveness of Fast moving consumer goods with special reference to Himalaya protein shampoo at Kerala. Bonfring
8) Shobanapriya, P. (May 2014). Recruitment and Selection. International Journals of research and development- A Management Review
4. A CONCEPUTAL STUDY ON ENBEST ENGINEERS PUMPS PRIVATE LIMITED COMPANY
Vimalraj.GDevika.P,
Sri Krishna Arts and Science College, [email protected]
Abstract
The Project have done by “Enbest Engineers Pumps Private Limited Company” is to study
the complete history of the organization under the guidance of the trainer about the skill is
require, demands of the company and also work ethics. It is also an opportunity to put into
practice and also to engage with the profession to which we can aspire in a realistic work
environment and understand the practical application of their academic program. The
objective of training is to know about the art of learning methodology and industrial training
to refine the skill and knowledge about the company and also to study the complete history of
the company within the period of 60 days. Industry gets a chance to get some work done and
test us for an extended period before making us a permanent employee. The importance and
benefits of industrial training helps to know the technical knowledge and working to develop
the practical skills technically. Various involvements measures must be observed through
their service. The objective of the training is to know about the art of learning methodology
and industrial training to refine the skill and knowledge about the company
Bibliography
1) Juliangnanadhas, C. (Jan 2015). Radio Call Taxi- Sustainable Business Models. Pauline Journal of Research and Studies .
Research Article SKASC
6
2) Devika.P. (Sep2013). A study on Advertisement and its Effectiveness of Fast moving consumer goods with special reference to Himalaya protein shampoo at Kerala. Bonfring.
3) Dhivya. J (2014). Direct Marketing. Vivekanadha Institute of Information and Management Studies (p. 8). Madurai: Shanlax Publications
4) Shobanapriya, P. (May 2014). Recruitment and Selection. International Journals of research and development- A Management Review .
5) Subhashini. S (2014). Cloud Computing for Financial Service Industry. National Conference on Cloud Management. Coimbatore.
5. A STUDY ON IMPLEMENTATION OF LEAN MANUFACTURING IN MICRO, SMALL AND MEDIUM SCALE INDISTRIES WITH SPECIAL REFERENCE TO
COIMBATORE
PrinclysolomonDevika.P,
Sri Krishna Arts and Science College, [email protected]
Abstract
The objective of the study is know the whether the Lean Manufacturing methods are
practiced in the Micro, Small and the Medium Scale Industries in Coimbatore District. In this
era china is at the first position in all the manufacturing products, this is because they are
aware of the Lean Manufacturing practices that make the work easier and effective. So, I took
this topic to bring awareness among the organizations. The term “lean” refers to the waste or
the non-value activities that may occur in the company. “MUDA” is the Japanese word for
the term “WASTE”. There are seven types of waste that is faced at the time of functioning of
the company. This study is done with responses that are given by 25 manufacturing
companies that are located in Coimbatore District. The findings of this study will be like how
many companies use the Lean tools in the Day-to-Day activities and how many companies
know the importance and the benefits of implementing Lean. At last from the study we came
to know that 5S is the top most tool that is used in the Organizations and up next comes the
TPM and the Kaizen. And hope that this study helped the organizations to be aware of the
Lean Manufacturing and its uses and benefits.
Bibliography
Research Article SKASC
7
1) Juliangnanadhas, C. (march 2015). Impact of CEO’s Involvement in social media on Branding their Business. Recent Trends on Management by Department of Business Studies .
2) Bakiyaraj. K (2013). Recent Advancememet in Business Practices. Emerging Trends in Modern Retailing
3) Devika.P. (Nov 2013). Emotional Intelligence. Research Explorer .
4) Karthika.P. (JUNE2013). Change management for human resource. Change management for goal setting. Chennai: hikey media.
5) Shobanapriya, P. (May 2014). Recruitment and Selection. International Journals of research and development- A Management Review
6) Subhashini. S (2014). Cloud Computing for Financial Service Industry. National Conference on Cloud Management. Coimbatore