0% found this document useful (0 votes)
60 views50 pages

Ncirsem 2018

This document contains a table of 68 titles across various topics ranging from computer science to engineering. The titles cover areas such as data mining, social networks, routing protocols, image processing, power electronics, mechanical engineering, and human resources. They indicate research papers or projects related to techniques for tasks such as fault detection, encryption, clustering, and network optimization.

Uploaded by

karthikkumaren
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views50 pages

Ncirsem 2018

This document contains a table of 68 titles across various topics ranging from computer science to engineering. The titles cover areas such as data mining, social networks, routing protocols, image processing, power electronics, mechanical engineering, and human resources. They indicate research papers or projects related to techniques for tasks such as fault detection, encryption, clustering, and network optimization.

Uploaded by

karthikkumaren
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

i

PAGE
S.NO TITLE
NO.

THROUGHPUT OPTIMAL MULTIPATH ROUTING


1 1
ARCHITECTURE

OPTIMAL PATH IN ROUTING ADDITIVE MULTI-HOP


2 1
NETWORKS

ANALYSIS AND SPECIFYING TEXTCATEGORIZATION USING A


3 1
BAYESIAN CLASSIFICATION APPROACH

MINING OF RECENT TRENDS IN SOCIAL NETWORK USING


4 2
LINK ANOMOLY DETECTION

DETECTION AND NEUTRLIZING MULTIPLE SPOOFING


5 2
ATTACKERS USING PRR AND IAT

APRIORI VERSIONS BASED ON MAPREDUCE FOR


6 3
MINING FREQUENT PATTERNS ON BIG DATA

MULTIPLE NODE FAULT DIOGENES SYSTEM IN EXTERNALLY


7 3
MANAGED NETWORKS

IMPLEMENT HIGH BANDWIDTH DATA TRANSMISSION IN


8 MOBILE SENSOR USING DISTRIBUTE THREE HOP ROUTING 4
PROTOCOL

INCREMENTAL SEMI-SUPERVISED CLUSTERING ENSEMBLE


9 4
FOR HIGH DIMENSIONAL DATA CLUSTERING

UNAUTHORIZED OS DETECTION USING OS FINGERPRINTING


10 5
SUBMITTED

ACHIEVING VERIFIABILITY FOR PRIVACY-PRESERVING


11 5
MULTI-KEYWORD SEARCH OVER ENCRYPTED CLOUD DATA

LYMPH NODE DETECTION USING SOFT COMPUTING


12 6
TECHNIQUES

13 TOLL PLAZA ESTIMATION USING RASPBERRY PI 6

GLAUCOMA DETECTION WITH ANNOTATED DIGITAL IMAGE


14 7
PROCESSING

FUZZY BASED IMAGE FORGERY LOCALIZATION USING


15 7
BLOCKING ARTIFACTS
ii

PAGE
S.NO TITLE
NO.

ROUTING THE QUERIES WITH IMMUTABLE ACCESSION IN THE


16 8
UNSTRUCTURED P2P NETWORKS

ENHANCEMENT OF NETWORK LIFETIME AND EFFICIENCY OF


17 9
WIRELESS SENSOR NETWORK USING ORPA

WIRELESS OPTICAL DATA TRANSFER IN UNDERWATER


18 9
SYSTEM USING M-ARY OMASK MODULATION

ENVIRONMENTAL MONITORING AND CONTROLLING IN


19 GRAIN GRANARY BASED ON EMBEDDED SYSTEM 10

REAL TIME SENSOR DATA ENCRYPTION WITH EFFICENT


20 10
ENCRYPTION AND DECRYPTION

ELECTRONIC HEALTH RECORD (EHR) FOR HEALTH


21 INFORMATION INTEROPERABILITY BETWEEN HOSPITALS 11
USING CLOUD COMPUTING SYSTEM

SECURE BASED COLLABORATIVE DATA TRANSFER WITH


22 SPLITTING AND EFFICIENT MATCHING TECHNIQUES 12

NOISELESS DATA LOCALIZATION IN MULTI BASE STATION


23 ENVIRONMENT USING FUZZY GRID PREDICTION SCHEME 13

ENHANCED FIREWALL USING DISTRIBUTED


24 13
DENIEL OF SERVICE ATTACK (DDOS)

RECOVERING FINGER-VEIN AUTHENTICATION BASED ON


25 FEATURE EXTRACTION 14

DYNAMIC SECURITY SCHEME WITH MULTIPLE KEY


26 15
GENERATION FOR DATA PROTECTION

WEB SERVICE DEPLOYMENT FOR SELECTING A RIGHT


27 15
STEGANOGRAPHY SCHEME

DESIGN OF BORE WELL RESCUE SYSTEM USING


28 MORPHOLOGICAL CHART 16
iii

PAGE
S.NO TITLE
NO.

DESIGN AND OPTIMIZATION OF NOZZLE USED IN DIESEL


29 ENGINE 16

INVESTIGATION OF TRIBOLOGICAL AND MECHANICAL

30 PROPERTIES OF FLY ASH-B4C REINFORCED Al 5083 17


COMPOSITES

31 DESIGN OF HIGH CONTACT GEAR RATIO (SPUR GEAR) 17

32 DESIGN AND ANALYSIS OF CENTRIFUGAL PUMP 18

33 STRUCTURAL ANALYSIS OF A DISC BREAK 18

FLEXURAL BEHAVIOUR OF GLASS FIBER REINFORCED HIGH


34 19
PERFORMANCE CONCRETE BEAMS

35 A STUDY ON EMPLOYEE EMPOWERMENT 19

A STUDY ON WORKING ATMOSPHERE AND PERFORMANCE


36 20
MEASURES OF AN EMPLOYEE

A STUDY ON CUSTOMER SATISFACTION AT “DREAM IDEA


37 20
PRINTING INDUSTIRES” IN BANGALORE CITY.

A STUDY ON EMPLOYEE RELATIONSHIP MANAGEMENT AT


38 21
DDCMPU- KRISHNAGIRI

A STUDY ON FUNCTION AND ITS EFFECTIVENESS OF HUMAN


39 22
RESOURCE AT SRI RAM TOOLS IN HOSUR

40 A STUDY ON EMPLOYEE WORK STRESS 22


iv

PAGE
S.NO TITLE
NO.

41 A STUDY ON EMPLOYEE ABSENTEESM 23

42 A STUDY ON EMPLOYEE RETENTION 23

A STUDY ON PERFORMANCE APPRAISAL WITH REFERENCE


43 24
TO TITAN ENGINEERING AND AUTOMATION LIMITED", Hosur

44 A STUDY ON EMPLOYEE ATTRITION 24

45 A STUDY ON EMPLOYEE MORALE IN STAHLLFORM TECHNICK 25

A STUDY ON EMPLOYEES SATISFACTION LEVEL TOWARDS


46 25
WELFARE MEASURE

47 A STUDY ON WORKING CAPITAL MANAGEMENT AT DDCMPU 26

A STUDY ON EMPLOYEE COMPENSATION AT GLOBAL


48 27
SOLUTIONS

A STUDY ON COST CONTROL IN KEF INFRASTRUCTURE INDIA


49 27
PVT LTD

50 A STUDY ON ORGAANIZATIONAL CLIMATE 28

A STUDY ON INVENTORY MANAGEMENT IN PMPV NATURAL


51 28
STONES

A STUDY ON WORK LIFE BALANCE AMONG FEMALE


52 29
EMPLOYEES

A STUDY ON EMPLOYEE JOB SATISFACTION IN UNIQ


53 29
TECHNOLOGIES
v

PAGE
S.NO TITLE
NO.

A STUDY ON EMPLOYEE MOTIVATION IN HYUNDAI MOTOR


54 30
INDIA PVT LIMITED

55 A STUDY ON EMPLOYEE REMUNERATION 30

56 A STUDY ON RECRUITMENT AND SELECTION 31

57 A STUDY ON EMPLOYEE COMPETENCY MAPPING 31

58 A STUDY ON EMPLOYEE SAFETY MEASURES 32

TO PERFORM DEVELOPMENT OF COLLISION ALLEVIATING


59 DCF PROTOCOL WITH EFFICIENT BACK OFF ALGORITHM FOR 32
WIRELESS AD HOC NETWORKS

ANALYSIS OF FRAUD DETECTION MECHANISM IN HEALTH


60 33
INSURANCE USING STATISTICAL DATA MINING TECHNIQUES

FINDING FRAUD AND MALWARE DETECTION IN GOOGLE


61 33
PLAY STORE USING FAIRPLAY TECHNOLOGY

62 A 4-SWITCH MULTI-STAGE SINGLE-PHASE CUK INVERTER 34

COMMUTATION TORQUE RIPPLE REDUCTION IN BLDC MOTOR


63 USING MODIFIED SEPIC CONVERTER AND THREE-LEVEL NPC 34
INVERTER
A MEDIUM FREQUENCY TRANSFORMER-BASED WIND
64 ENERGY CONVERSION SYSTEM USED FOR MFT CONVERTER 35
BASED OFFSHORE WIND FARM
A HARMONIC SUPPRESSION SCHEME FOR
FULL SPEED RANGE OF A THREE-LEVEL INVERTER FED
65 35
INDUCTION MOTOR DRIVE USING SWITCHED CAPACITIVE
FILTER
vi

PAGE
S.NO TITLE
NO.

AN INNOVATIVE MODULAR MULTILEVEL CONVERTER


66 36
TOPOLOGY SUITABLE FOR UNBALANCED GRID

A DUAL SEPIC AC/DC CONVERTER FOR DC NANO-GRID WITH


67 36
THREE TERMINAL OUTPUTS

IMPLEMENTATION OF ADAPTIVE FUZZY LOGIC CONTROLLER


68 FOR IMPROVEMENT OF POWER QUALITY AND POWER 37
FACTOR CORRECTION IN THREE PHASE ACTIVE DEVICE
COMPREHENSIVE DESIGN AND OPTIMIZATION OF SOFT
69 SWITCHING AC-DC CONVERTER TO MEET STANDBY POWER 37
REGULATION

70 A STUDY ON EFFECTIVENESS OF EMPLOYEE COUNSELING 38

71 A STUDY ON EMPLOYEE INVOLVEMENT IN PRODUCTIVITY 38

A STUDY ON GRIEVANCE HANDLING IN UNITED DRY


72 39
GOODS. PVT. LTD. JEENUR

73 A STUDY ON TRAINING AND DEVELOPMENT 39

EXPERIMENTAL STUDY ON SELF COMPACTING CONCRETE


74 40
WITH BAGASSE ASH AND POLYPROPYLENE FIBRE

MIVAN CONSTRUCTION TECHNOLOGY (ALUMINIUM


75 40
FOMWORK)
1

THROUGHPUT OPTIMAL MULTIPATH ROUTING ARCHITECTURE


P. Ramya, Prof. S. Chandra Sekaran, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Legacy networks are often designed to operate with simple single path routing, like
the shortest path ,which is known to be throughput sub-optimal. On the other hand previously
proposed throughput optimal policies (i.e,back pressure) require every device in the network
to make dynamic routing decisions .In this paper we study an overlay architecture for
dynamic routing ,such that only a subset of devices(overlay nodes)need to make the dynamic
routing decisions. We determine the essential collections of nodes that must bifurcate traffic
for achieving the maximum multi-commodity network throughput . We apply our optimal
node placement algorithm to several graphs and the results show that a small fraction of
overlay nodes is sufficient for achieving maximum throughput. Finally ,we propose a
threshold based policy(BP-T)and a heuristics policy(OBP),which dynamically control traffic
bifurcations at overlay nodes. Policy BT-P is proved to maximize the throughput for the case
when underlay paths do no overlap. In all studied simulation scenarios OBP not only
achieves full throughput but also reduces delay in comparison to the throughput optimal
Backpressure routing.

OPTIMAL PATH IN ROUTING ADDITIVE MULTI-HOP NETWORKS


S. KALAISELVI, Prof . B. Sakthivel
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
The problem of finding optimal path in single source to a single destination
accumulative multi hop networks. If single source that communicates to a single destination
assisted by several relays through multiple hops. Advanced energy accumulation
transmission/Reception techniques, such as maximal ratio combining reception of repetition
codes, or information accumulation with rate less codes. Accumulation technique increase
communication reliability, reduces energy consumption, and decrease latency.

ANALYSIS AND SPECIFYING TEXTCATEGORIZATION USING A


BAYESIAN CLASSIFICATION APPROACH
PAVITHRA, Prof . B. Sakthivel
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Traditional cluster ensemble approaches have three limitations: (1) They do not make
use of prior knowledge of the datasets given by experts. (2) Most of the conventional cluster
ensemble methods cannot obtain satisfactory results when handling high dimensional data.

3rd National Conference on Innovative Research in Science, Engineering and Management


2

(3) All the ensemble members are considered, even the ones without positive contributions.
In order to address the limitations of conventional cluster ensemble approaches, we first
propose an incremental semi-supervised clustering ensemble framework (ISSCE) which
makes use of the advantage of the random subspace technique, the constraint propagation the
proposed incremental ensemble member selection process, and the normalized cut algorithm
to perform high dimensional data clustering. The incremental ensemble member selection
process is newly designed to judiciously remove redundant ensemble members based on a
newly proposed local cost function and a global cost function, and the normalized cut
algorithm is adopted to serve as the consensus function for providing more stable, robust and
accurate results. Then, a measure is proposed to quantify the similarity between two sets of
attributes, and is used for computing the local cost function in ISSCE.

MINING OF RECENT TRENDS IN SOCIAL NETWORK USING LINK ANOMOLY


DETECTION
B. Chitra, S. Chandra Sekaran, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Detection of emerging topics is now receiving renewed interest motivated by the rapid
growth of social networks. Conventional-term-frequency-based approaches may not be
appropriate in this context, because the information exchanged in social-network posts
include not only text but also images, URLs, and videos. We focus on emergence of topics
signaled by social aspects of these networks. Specifically, we focus on mentions of user links
between users that are generated dynamically (intentionally or unintentionally) through
replies, mentions, and retreats. We propose a probability model of the mentioning behavior of
a social network user, and propose to detect the emergence of a new topic from the anomalies
measured through the model.

DETECTION AND NEUTRLIZING MULTIPLE SPOOFING ATTACKERS USING


PRR AND IAT
N. SARASPRIYA, Prof. C. Prakash Narayanan, M.E
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
DDOS attack is the main problem in all ad hoc scenario i.e. in MANAT and as well as
in wireless sensor networks. In the Paper has an intrusion detection system in wireless sensor
network which uses the anomaly intrusion detection system in which IDS uses two intrusion
detection parameters, packet reception rate (PRR) and inter arrival time (IAT). But only these
two parameters are not completely sufficient for intrusion detection in wireless sensor
network and as well as in MANET.. In our proposal we use different intrusion detection
parameters in mobile Ad hoc networks. We assume that a mobile ad hoc network contains
two or more than two mobile devices that are communicate from each other through

3rd National Conference on Innovative Research in Science, Engineering and Management


3

intermediate nodes, each node contain routing table , in our proposal we use AODV routing
protocol in all normal module attack module and IDS (intrusion detection system) for
prevention through attack. In this paper we simulate the three different condition results
normal time, Attack time and IDS modules attackers. This project is developed by using
Dotnet as Front end.

APRIORI VERSIONS BASED ON MAPREDUCE FOR


MINING FREQUENT PATTERNS ON BIG DATA
A. Nandhini, Prof. B. Sakthivel, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Pattern mining is one of the most important tasks to extract meaningful and useful
information from raw data. This task aims to extract item-sets that represent any type of
homogeneity and regularity in data. Although many efficient algorithms have been developed
in this regard , the growing interest in data has caused the performance of existing pattern
mining techniques to be dropped. The goal of this paper is to propose new efficient pattern
mining algorithms work in big data.

MULTIPLE NODE FAULT DIOGENES SYSTEM IN EXTERNALLY MANAGED


NETWORKS
P. Saranya, Prof. C. Prakash Narayanan, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
This paper, analyze the impact of network coding (NC) configuration on the
performance of adhoc networks with the consideration of two significant factors, namely, the
throughput loss and the decoding loss, which are jointly treated as the overhead of NC.
Furthermore, we characterize the goodput and delay/goodput tradeoff in static networks,
which are also analyzed in MANETs for different mobility models and transmission
schemes.. To our best knowledge, this is the first work to investigate the scaling laws of NC
performance and configuration with the consideration of coding overhead in ad hoc networks.

3rd National Conference on Innovative Research in Science, Engineering and Management


4

IMPLEMENT HIGH BANDWIDTH DATA TRANSMISSION IN MOBILE SENSOR


USING DISTRIBUTE THREE HOP ROUTING PROTOCOL
S. NITHYA, Prof. C. Prakash Narayanan, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Hybrid wireless networks combining the advantages of both mobile ad-hoc networks
and infrastructure wireless networks have been receiving increased attention due to their
ultra-high performance. An efficient data routing protocol is important in such networks for
high network capacity and scalability. However, most routing protocols for these networks
simply combine the ad-hoc transmission mode with the cellular transmission mode, which
inherits the drawbacks of ad-hoc transmission. This paper presents a Distributed Three-hop
Routing protocol (DTR) for hybrid wireless networks. To take full advantage of the
widespread base stations, DTR divides a message data stream into segments and transmits the
segments in a distributed manner.

INCREMENTAL SEMI-SUPERVISED CLUSTERING ENSEMBLE FOR


HIGH DIMENSIONAL DATA CLUSTERING
G. KALAIMAGAL, Prof. B. Sakthivel, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Traditional cluster ensemble approaches have three limitations: (1) They do not make
use of prior knowledge of the datasets given by experts. (2) Most of the conventional cluster
ensemble methods cannot obtain satisfactory results when handling high dimensional data.
(3) All the ensemble members are considered, even the ones without positive contributions.
In order to address the limitations of conventional cluster ensemble approaches, we first
propose an incremental semi-supervised clustering ensemble framework (ISSCE) which
makes use of the advantage of the random subspace technique, the constraint propagation
approach,the proposed incremental ensemble member selection process, and the normalized
cut algorithm to perform high dimensional data clustering. The experiments on 18 real-world
datasets, which include 6 UCI datasets and 12 cancer gene expression profiles, confirm that
ISSCE works well on datasets with very high dimensionality, and outperforms the state-of-
the-art semi-supervised clustering ensemble approaches.

3rd National Conference on Innovative Research in Science, Engineering and Management


5

UNAUTHORIZED OS DETECTION USING OS FINGERPRINTING


SUBMITTED
A. S. REVATHY, Prof. B. Sakthivel, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Operating System (OS) Fingerprinting is the practice of determining the OS of a
remote host on a network. This may be accomplished either passively by sniffing and
analyzing network packets traveling between hosts or actively by sending carefully crafted
packets to the target host and analyzing the responses. Similar to the way a human fingerprint
serves as a tool to uniquely identify a person; an OS can be uniquely identified on a network
by its packet fingerprint.
In this work, an approach to passively fingerprint OSs using the information available
from TCP packets is presented as well as a system to use this approach to detect unauthorized
OSs in an enterprise network is described. The enterprise network connects to the Internet
through a firewall that is typically combined with a router. The enterprise router captures
outgoing TCP SYN packets from the network, which are forwarded to an OS fingerprinting
analyzer that extracts and analyzes their headers. The OS fingerprinting analyzer described
here applies a Euclidean distance estimation algorithm using specific header fields and
determines the OS of the machine generating the packet. The system also contains an OS
database that includes information about all the authorized OSs installed in an enterprise’s
machines. Any new outgoing TCP SYN packet from the enterprise network is used to create
an n-dimensional vector using the fields in the packet header (such as TTL, Window Size,
etc.). The Euclidean distance between two vectors is computed for every set of OSs and the
one with the least distance (ideally zero) is chosen as the OS generating that TCP SYN
packet. The fingerprinted OS result is compared with the listed OS in the enterprise database
of OSs; if a match fails to occur, an alert is generated indicating the presence of an
unauthorized or unregistered OS in the enterprise.

ACHIEVING VERIFIABILITY FOR PRIVACY-PRESERVING MULTI-KEYWORD


SEARCH OVER ENCRYPTED CLOUD DATA
A. Sugandar, Prof. S. Chandra Sekaran, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Although cloud computing offers elastic computation and storage resources, it poses
challenges on verifiability of computations and data privacy. In this work we investigate
verifiability for privacy-preserving multi-keyword search over outsourced documents. As the
cloud server may return incorrect results due to system faults or incentive to reduce
computation cost, it is critical to offer verifiability of search results and privacy protection for
outsourced data at the same time. To fulfill these requirements, we design a Verifiable

3rd National Conference on Innovative Research in Science, Engineering and Management


6

Privacy-preserving keyword Search scheme, called VPSearch, by integrating an adapted


homomorphic MAC technique with a privacy-preserving multi-keyword search scheme.

LYMPH NODE DETECTION USING SOFT COMPUTING TECHNIQUES


S. Preethiga, Prof B.Ramesh, M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Analysis of primary lung tumors and disease in regional lymph nodes is important for
lung cancer staging, and an automated system that can detect both types of abnormalities will
be helpful for clinical routine. In this project, we present a new method to automatically
detect both tumors and abnormal lymph nodes simultaneously in Computerized
tomography(CT) thoracic images. We perform the detection in a multistage approach, by first
detecting all potential abnormalities, then differentiate between tumors and lymph nodes.
Then lung tumors are classified as benign and maligant using Fuzzy logic and Neural
Networks.
KEYWORDS
Convolutional neural networks, interstitial lung diseases, texture classification.

TOLL PLAZA ESTIMATION USING RASPBERRY PI


K. Kaviya, Prof. M.Deepa, M.E,
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Many highway toll collection systems have already been developed and are widely
used in India. Some of these include Manual toll collection, RF tags, Barcodes, Number plate
recognition. All these systems have disadvantages that lead to some errors in the
corresponding system. This project presents a brief review of toll collection systems present
in India, their advantages and disadvantages and also aims to design and develop a new
efficient toll collection system which will be a good low cost alternative among all other
systems. The system is based on Computer Vision vehicle detection using OpenCV library in
Embedded Linux platform. The system is designed using Embedded Linux development kit
(Raspberry pi).In this system, a camera captures images of vehicles passing through toll
booth thus a vehicle is detected through camera. Depending on the area occupied by the
vehicle, classification of vehicles as light and heavy is done. Further this information is
passed to the Raspberry pi which is having web server set up on it. When raspberry pi comes
to know the vehicle, then it access the web server information and according to the type of
the vehicle, appropriate toll is charged. This system can also make to count moving vehicles
from pre-recorded videos or stored videos by using the same algorithm and procedure that we
follow in this project.
KEYWORD: Raspberry pi 3 model, camera, image processing, kernel algorithm.

3rd National Conference on Innovative Research in Science, Engineering and Management


7

GLAUCOMA DETECTION WITH ANNOTATED DIGITAL IMAGE PROCESSING


R. Karuthammal, Prof. E. Punitha, M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Blood vessel segmentation of fundus imageshas obtained considerable importance
during the past few years since it facilitates the early detection of eye diseases.A method
based on low pass filtering and morphological operation is introduced in the proposed
method for vessel segmentation.
The blood vessel segmentation in turn helpsto provide a method for the detection of
Glaucoma. In many of the earlier detection methods, analysis of cup to disc ratio is
performed. But here the glaucoma is detected by means of ISNT ratio. The analysis is
performed on Glaucomatous and normal eye. Ten images of each are collected from the
database and ISNT ratio is calculated on each. The advantage of the method is that by
calculating the area of blood vessels in each of the four quadrant of the eye, glaucoma can be
detected with less complexity in a simpler manner.
KEYWORDS—Glaucoma; Annotated; Datasets; Cup to disc ratio; Optic nerve head;
Fundoscopy; Optical Coherence Tomography

FUZZY BASED IMAGE FORGERY LOCALIZATION USING BLOCKING


ARTIFACTS
N.Kavitha, Prof.J.Krishnan,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Over the past decade, many efforts have been madein passive image forensics.
Although it is able to detect tampered images at high accuracies based on some carefully
designed mechanisms, localization of the tampered regions in a fake image still presents
many challenges, especially when the type of tampering operation is unknown. Some
researchers have realized that it is necessary to integrate different forensic approaches in
order to obtain better localization performance. However, several important issues have not
been comprehensively studied, for example, how to select and improve/readjust proper
forensic approaches, and how to fuse the detection results of different forensic approaches to
obtain good localization results. In this paper, we propose a framework to improve the
performance of forgery localization via integrating tampering possibility maps. In the
proposed framework, we first select and improve two existing forensic approaches, i.e.,
statistical feature based detector and copy-move forgery detector, and then adjust their results
to obtain tampering possibility maps. After investigating the properties of possibility maps
and comparing various fusion schemes, we finally propose a simple yet very effective
strategy to integrate the tampering possibility maps to obtain the final localization results.
The extensive experiments show that the two improved approaches used in our framework

3rd National Conference on Innovative Research in Science, Engineering and Management


8

significantly outperform the state-of-the-art techniques, and the proposed fusion results
achieve the best F1-score in the IEEE IFS-TC Image Forensics Challenge.
KEYWORDS—Image forensics, Forgery localization, Statisticalfeature, Copy-move
detection, Fusion of detection results.

ROUTING THE QUERIES WITH IMMUTABLE ACCESSION IN THE


UNSTRUCTURED P2P NETWORKS
M.Sowmiya, Prof. S. Shanmugam, M.E,
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
In general, Unstructured peer-to-peer networks do not impose a particular structure on
the overlay network by design, but rather are formed by nodes that randomly form
connections to each other. Hence Finding a document or resource in an unstructured peer-to-
peer network can be an exceedingly difficult problem. In order to overcome this issues, the
conventional P2P uses the process of querying in which it adapts the mechanism of
scheduling and routing. But routing the queries is a tedious task in P2P and Unstructured P2P
network due to its potential decentralization behavior.Hence a query routing approach that
accounts for arbitrary overlay topologies, nodes with heterogeneous processing capacity is
proposed and validated. Heterogeneous class-based likelihoods estimation with query
resolution at nodes which may reflect query loads and the manner in which files/resources are
distributed across the network (decentralization). This makes the model with uncertainty in
terms of multiple locations where a query may be resolved depending upon where the
file/object of interest are placed.Hence to overcome the above addressed issue a novel P2P
routing scheme is proposed. The proposed scheme uses Randomized Placement with
Anonymous Routing (RPAR) approach where it solves the issue of query routing in nodes
(with heterogeneous processing capacity) that accounts for arbitrary overlay topologies.
Further, to minimize the cost and energy the proposed RPAR scheme uses P2P query route
setting where the destination of a query is not known a priori, instead it routes based on
sending the query results to the nearer hops, resulting in reducing the delays. Additionally,
Grade of Service (GoS) constraint on resource scheduling and routing queries validates each
nodes in order to ensure that the delay in the network is well balanced and reduced via a
simple ‘work conserving’ policy.
KEYWORD: Backpressure , peer to peer, random walk, search, stability.

3rd National Conference on Innovative Research in Science, Engineering and Management


9

ENHANCEMENT OF NETWORK LIFETIME AND EFFICIENCY OF WIRELESS


SENSOR NETWORK USING ORPA
S. Shuaa Sharmeen, Prof. R. Elavarsi, M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Wireless sensor network topology offers an intelligence-led, cost effective solution
for monitoring vulnerable points on the international borders. A WSN is a set of resource-
constrained devices that monitor the environmental conditions. A network of unattended self
-organizing sensors can significantly cut the number of personnel in a border agency.
Additionally the continuous monitoring reduces the chances of missing any potential criminal
activity. The ability of WSN to operate without human involvement and in situations where
other surveillance technologies are impractical has made it favorite for deployment in hostile
hazardous environments.
KEYWORDS: WSN routing protocol, media access control, border security and
surveillance, network coverage, strong barrier, weak barrier

WIRELESS OPTICAL DATA TRANSFER IN UNDERWATER SYSTEM USING


M-ARY OMASK MODULATION
S.Sivashankari, Prof.C.Thamilarasi
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
The performance of M-ary orbital angular momentum-shift keying (OAMSK)
modulation-based underwater wireless optical communication (UWOC) system is
investigated over oceanic turbulence with Laguerre-Gauss (LG) beam considered. On the
basis of Rytov approximation, the detection probability and power distribution among the
received signals are derived. The conditional probability and symbol error rate (SER) are then
achieved by the maximum likelihood estimation. With Blahut-Arimoto algorithm, the
channel capacity for this UWOC system is obtained. The results show that the optimal
transmitted OAM mode set S is mainly restricted by the interfering energy and decaying
effective energy. With the optimal mode interval achieved, the SER performances for
different modulation orders M and the minimum required transmitting power to reach the
SER of Pe = 10-9 are sensitive to the variation in oceanic turbulence conditions. Additionally,
the value of capacity will shift to a higher value with the increasing M, and a suitable M
should be selected to balance the transmitting power consumption and capacity gain. This
work is beneficial to M-ary OAMSK modulation-based UWOC system design.
KEYWORDS:
Oceanic turbulence, underwater wireless optical communication, modulation, orbital angular
momentum.

3rd National Conference on Innovative Research in Science, Engineering and Management


10

ENVIRONMENTAL MONITORING AND CONTROLLING IN GRAIN GRANARY


BASED ON EMBEDDED SYSTEM
S. Sandhiya
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Agriculture is the backbone of any nation’s economy and there is a dependency
between agricultural growth and economic prosperity. As India is an Agriculture country
where 70% of the population depends on farming, the storage of grains plays a crucial role in
national economy. Due to the seasonality of grain production, the storage of grain is the top
priority task for restoring and reusing. In the process of grain storage, temperature, humidity
and carbon dioxide concentration (CO2) are major ecological factors that can influence
directly on the quality of the Grain. Hence, there is a necessity to monitor the vital parameters
continuously during storage and communicate the status to the manger in real time which
becomes a challenging. The traditional methods are limited to simple manual temperature and
humidity testing which are relatively backward since grain situation analysis are made
without any effective means of processing and regulation hence there is a need for smart
grain management system with automation which can also avoid hidden security risks. The
design processes of the embedded environmental monitoring platform for grain granary,
especially including its hardware structure and software components, are introduced in detail.
The final experimental results show that it satisfies the real-time monitoring requirements of
the granary environmental parameters such as the grain temperature, humidity, video image
and other important sensor information.

REAL TIME SENSOR DATA ENCRYPTION WITH EFFICENT


ENCRYPTION AND DECRYPTION
T.Durga, Prof. S. Shanmugam
Department of Electronics and Communication Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Traditional broadcast encryption (BE) schemes al- low a sender to securely broadcast
to any subset of members but require a trusted party to distribute decryption keys. Group
key agreement (GKA) protocols enable a group of members to negotiate a common
encryption key via open networks so that only the group members can decrypt the ciphertexts
encrypted under the shared encryption key, but a sender cannot exclude any particular
member from decrypting the ciphertexts. In this paper, we bridge these two notions with a
hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new
primitive, a group of members negotiate a common public encryption key while each member
holds a decryption key. A sender seeing the public group encryption key can limit the
decryption to a subset of members of his choice. Following this model, we propose a ConBE
scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under
thedecision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard

3rd National Conference on Innovative Research in Science, Engineering and Management


11

model. Of independent interest, we present a new BE scheme that is aggregatable. The


aggregatability property is showntobeusefultoconstructadvancedprotocols.
KEYWORDS—Broadcast encryption, group key agreement, contributory broadcast
encryption, provable security.

ELECTRONIC HEALTH RECORD (EHR) FOR HEALTH INFORMATION


INTEROPERABILITY BETWEEN HOSPITALS USING CLOUD COMPUTING
SYSTEM

C. Menaga. M.Nandhini, M.E., Prof. R. Srinivasan, M.E.,


Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri
ABSTRACT

Successful deployment of Electronic Health Record helps improve patient safety


and quality of care, but it has the prerequisite of interoperability between Health
Information Exchange at different hospitals. The Clinical Document Architecture (CDA)
developed by HL7 is a core document standard to ensure such interoperability, and
propagation of this document format is critical for interoperability. Unfortunately,
hospitals are reluctant to adopt interoperable Health Information System (HIS) due to its
deployment cost except for in handful countries. More problem arises when all hospitals
start using the CDA document format because the data scattered in many documents are
difficult to manage.

In this proposed work, CDA document generation and integration which is an


Open API service based on cloud computing, through which hospitals are enabled to
conveniently generate CDA documents without having to purchase software is described.
It is providing security to the CDA document and a unique identity (id) is generated
and given to the patients for avoiding the interchanging and duplication of medical reports.
Our CDA document integration system integrates multiple CDA documents per patient into a
single CDA and physicians and patients can browse the clinical data in chronological order.
Developers using different platforms thus can use our system to enhance interoperability.

Key words: Health Information System, Clinical Document Architecture

3rd National Conference on Innovative Research in Science, Engineering and Management


12

SECURE BASED COLLABORATIVE DATA TRANSFER WITH SPLITTING AND


EFFICIENT MATCHING TECHNIQUES
V. Priyadharsini,. R.L.Indu Lekha, M.E Prof. R. Srinivasan, M.E.,
Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Idea of Firewall is the most essential thing in arrange and the movement which is
going through system edge needs to be separating the activity that will go through it. In this
way there is potential hazard in this procedure. As every bundle should be checked with
every firewall manage to locate the coordinating tenets. 'Geometric Efficient Matching
Algorithm ' is one of the computational geometry calculation which gives for all intents and
purposes better answer to find the control which precisely coordinates. Considering the fact
that firewalls need to filter all of the visitors crossing the internet work perimeter, they need
to be capable of maintain a completely high throughput, or threat becoming a bottleneck.
Firewall packet matching may be considered as a point area trouble: each packet (point) has
five fields (dimensions), which want to be checked towards each firewall rule so that you can
locate the primary matching rule. Hence, algorithms from computational geometry can be
implemented. in this paper we bear in mind a classical set of rules that we tailored to the
firewall domain. We name the resulting algorithm “Geometric Efficient Matching” (GEM).
The GEM set of rules enjoys a logarithmic matching time performance. But, the set of rules’
theoretical worst-case space complexity is O(n4 ) for a rule-base with n policies.

Due to this perceived excessive space complexity, GEM-like algorithms had been
rejected as impractical with the aid of in advance works. Contrary to this end, this paper
suggests that GEM is certainly an awesome desire. Primarily based on records from real
firewall rule-bases, we create d a perimeter guidelines model that generates random, but non-
uniform, rule-bases. We evaluated GEM through extensive simulation using the perimeter
guidelines model. Our simulations show that on such rule-bases, GEM uses close to linear
space and most effective needs about 13MB of area for rule-bases of 5,000 guidelines.
Moreover, with use of extra area enhancing heuristics, we have been able to lessen the space
requirement to 2-3MB for 5,000 policies. But most importantly, we included GEM into the
code of the Linux iptables open-supply firewall, and examined it on real site visitor’s masses.
Our GEM-iptables implementation controlled to filter out over 30,000 packets-according
tosecond on a widespread pc, despite 10,000 policies. Therefore, we consider that GEM is a
good, and sensible, algorithm for firewall packet matching.

Key words: Network Communication, Network-level Security and Protection

3rd National Conference on Innovative Research in Science, Engineering and Management


13

NOISELESS DATA LOCALIZATION IN MULTI BASE STATION ENVIRONMENT


USING FUZZY GRID PREDICTION SCHEME
M. Marial, R. Jayasudha, Prof. R. Srinivasan, M.E.,
Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
The hub restriction issue in versatile sensor systems has gotten noteworthy
consideration. As of late, molecule channels adjusted from apply autonomy have delivered
great restriction correctness in customary settings. Regardless of these triumphs, best in class
arrangements endure essentially when utilized as a part of testing indoor and portable
situations portrayed by a high level of radio flag abnormality. New arrangements are
expected to address these difficulties. We propose a fuzzy rationale based approach for
portable hub restriction in testing conditions. Restriction is planned as a fuzzy multi alteration
issue. For inadequate systems with couple of accessible grapples, we propose a fuzzy lattice
forecast conspire. The fuzzy rationale based limitation plot is actualized in a test system and
contrasted with cutting edge arrangements. Broad recreation comes about show
enhancements in the restriction precision from 20 to 40 percent when the radio anomaly is
high. An equipment usage running on Epic bits and transported by iRobot versatile hosts
affirms reproduction comes about and extends them to this present reality.

Keywords—Node localization, wireless sensor networks, mobility, fuzzy logic

ENHANCED FIREWALL USING DISTRIBUTED


DENIEL OF SERVICE ATTACK (DDOS)
M. Bhuvaneshwari. R.Jayasudha, Prof. R. Srinivasan, M.E.,
Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Wireless spoofing attacks are easy to launch and can significantly impact the
performance of networks. Although the identity of a node can be verified through
cryptographic authentication, conventional security approaches are not always desirable
because of their overhead requirements. In this paper, we propose to use spatial information,
a physical property associated with each node, hard to falsify, and not reliant on
cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of
attackers when multiple adversaries masquerading as the same node identity; and 3)
localizing multiple adversaries. We propose to use the spatial correlation of received signal
strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then
formulate the problem of determining the number of attackers as a multiclass detection
problem. Cluster-based mechanisms are developed to determine the number of attackers.
When the training data are available, we explore using the Support Vector Machines (SVM)
method to further improve the accuracy of determining the number of attackers. In addition,

3rd National Conference on Innovative Research in Science, Engineering and Management


14

we developed an integrated detection and localization system that can localize the positions
of multiple attackers. We evaluated our techniques through two test beds using both an
802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our
experimental results show that our proposed methods can achieve over 90 percent Hit Rate
and Precision when determining the number of attackers. Our localization results using a
representative set of algorithms provide strong evidence of high accuracy of localizing
multiple adversaries.

Key words: Wirless Netwok, Cluster, Cryptography

RECOVERING FINGER-VEIN AUTHENTICATION BASED ON FEATURE


EXTRACTION
E. Elamathi, Prof. R. Srinivasan, M.E.,
Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Finger-vein biometrics has been extensively investigated for personal verification.
Despite recent advances in finger vein verification, current solutions completely depend on
domain knowledge and still lack the robustness to extract finger-vein features from raw
images. A deep learning model to extract and recover vein features using limited a priori
knowledge. Firstly, based on a combination of known state of the art handcrafted finger-vein
image segmentation techniques ,so automatically identify two regions: a clear region with
high separability between finger-vein patterns and background, and unambiguous region with
low separability between them. The first is associated with pixels on which all the
segmentation techniques above assign the same segmentation label (either foreground or
background), while the second corresponds to all the remaining pixels.This scheme is used to
automatically discard the ambiguous region and to label the pixels of the clear region as
foreground or background. A training dataset is constructed based on the patches centered on
the labeled pixels. Secondly, a Convolution Neural Network (CNN) is trained on the
resulting dataset to predict the probability of each pixel of being foreground (i.e. vein pixel)
given a patch centered on it. The CNN learns what a finger vein pattern is by learning the
difference between vein patterns and background ones. The pixels in any region of a test
image can then be classified effectively. Thirdly, we propose another new and original
contribution by developing and investigating a Fully Convolution Network (FCN) to recover
missing.

Keyword:Hand bio metrics,support vector machine(SVM),Fully convolution


network(FCN),Convolutiion netural network(CNN).

3rd National Conference on Innovative Research in Science, Engineering and Management


15

DYNAMIC SECURITY SCHEME WITH MULTIPLE KEY GENERATION FOR


DATA PROTECTION
A. Meena, M.Nandhini, Prof. R. Srinivasan, M.E.,
Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Recent developments on Wireless sensor networks have made their application used
in a wide range of applications, such as, military sensing and tracking, health monitoring.
Wireless sensor nodes have restricted computational resources, and are always deployed in a
harsh, unattended or hostile environment. Therefore, network security represents a
challenging task. This work presents a public-key based pre-distribution scheme with time-
position nodes for simultaneous exchange of secure keys. In this paper, we proposed a
general three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes
. The proposed defend attack and key management mechanism for sensor network
applications can successfully handle sink mobility and can continually deliver data to
neighboring nodes and sinks. Simulation results indicate that the proposed mechanism can
reduce energy consumption and extend the average network lifetime by about 25%.
Key words: Wireless Sensor Network, Network Security

WEB SERVICE DEPLOYMENT FOR SELECTING A RIGHT STEGANOGRAPHY


SCHEME
R. Pavithra, M.Nandhini, Prof. R. Srinivasan, M.E.,
Department of Information Technology
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT

The primary objective of this project is to deploy a web service to hide the secret
information in an image file without disturbing it’s originality. In the literature lot of
algorithms are there to hide the information in an image file but most of it consumes high
resource for completing the task which is not suitable for light weight mobile devices. Few
basic algorithms like 1LSB, 2LSB and 3LSB methods in the literature are suitable for mobile
devices since the computational complexity is very low. But, these methods either lack in
maintaining the originality of the source image or in increasing the number of bits to be
embedded. Furthermore, every algorithm in the literature has it’s own merits and demerits
and we cannot predict which algorithm is best or worst since, based on the parameters such as
size of the cover image, content of the cover image, size of the plain text, content of the plain
text, and encryption algorithm used to generate the cipher text the steganography schemes
may produce best or worst result with respect to computational complexity, capacity, and
detectable distortion.

3rd National Conference on Innovative Research in Science, Engineering and Management


16

In our proposed work, we have developed a web service that takes cover image and plain text
as the input from the clients and returns the steganoimage to the clients. The stegano image
will be generated by our proposed work by analyzing the above said parameters and by
applying the right steganography scheme. The proposed work helps in reducing the
detectable distortion, computational complexity of the client device, and in increasing the
capacity. The experimental result says that, the proposed system performs better than the
legacy schemes with respect to capacity, computational complexity, and detectable distortion.
This proposed work is more useful to the client devices with very low computational resource
since all the computational tasks are deployed in the server side.

Keyword: Steganography, Encryption algorithm, Steganoimage

DESIGN OF BORE WELL RESCUE SYSTEM USING MORPHOLOGICAL CHART


B.Myle Samy, Prof. N. Jeyashankar., M.E
Department of Mechanical Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT

In past few years, children get trapped into the bore well hole which is left uncovered.
The rescue process to save the child from bore well is long and complicated. To avoid this,
there have been several rescue robot designs available currently. Even now the existing
robots are not satisfactorily used to rescue the child from bore hole. For this reason, a
morphological chart is designed from existing and new robot designs. From a morphological
chart, various combinations of rescue robot design are formulated. Those designs are
analyzed for several factors by using TRIZ principle. Finally, the designs are compared for
the bester performance. An additional component like digital oxygen supply system, digital
integrated camera, strain measuring pressure sensors, rope and pulley drive are added to the
design to improve rescue operation. A lot of other hassles are avoided by this alternative
technique. The proposed design is to rescue trapped child from bore well within short period
and with safely.

DESIGN AND OPTIMIZATION OF NOZZLE USED IN DIESEL ENGINE


K.Baskar, Prof. D.Saravanan
Department of Mechanical Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
The aim of this project deals with evaluation and optimisation of nozzle used in diesel
engine on which CATIA V5 is used for solid model of nozzle and ANSYS software is used
for analyzed the internal flow can be checked and fuel flow can be done in CFD for structural
flow analysis performance on the nozzle for thermal loading nd performance CFD analysis
on the existing model of the surface of nozzle for velocity inlet to find out the mass flow rate,
heat transfer rate and pressure drop.

3rd National Conference on Innovative Research in Science, Engineering and Management


17

The nozzle is used to convert the chemical thermal energy generated in the
combustion chamber into kinetic energy. The nozzle converts the low velocity, high pressure,
high temperature gas in the combustion chamber into high velocity gas of lower pressure and
temperature. Nozzle is a device designed to control the rate of flow, speed, direction, mass,
shape, and the pressure of the stream that exhaust from them. Nozzles come in a variety of
shapes and sizes depending on the mission of the rocket, this is very important for the
understanding of the performance characteristics of rocket. Convergent divergent nozzle is
the most commonly used nozzle since in using it the propellant can be heated in combustion
chamber. In this project the convergent divergent nozzle changing the different nozzle
diameters and different fluids at different velocities.

INVESTIGATION OF TRIBOLOGICAL AND MECHANICAL PROPERTIES OF


FLY ASH-B4C REINFORCED Al 5083 COMPOSITES
D. Muthukumar, Prof.G.Chakkaravarthi
Department of Mechanical Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
This project deals with the tribological and mechanical investigation of Al 5083, fly
ash and boron carbide (B4C) metal matrix composites. Here, the fabrication is going to be
done by stir casting process which involves mixing the required quantities of additives into
stirred molten aluminium. After solidification, the samples are prepared and tested to find the
various mechanical properties like hardness, tensile, compressive and tribological properties.
The microstructure of the composite is observe using Scanning Electron Microscope (SEM).
Aluminium alloys have been gaining great importance as structural materials, but for many
applications it is necessary to improve their wear resistance. In particular, uses of aluminium
alloys in automotive applications have been limited due to their inferior strength, rigidity and
wear resistance, as compared to those of ferrous alloys. Particle reinforced aluminium
composites, nevertheless, offer reduced mass, high stiffness and strength and improved wear
resistance.

DESIGN OF HIGH CONTACT GEAR RATIO (SPUR GEAR)


M.SURENDAR, Prof. V.P.VENKATTAMUTHU
Department of Mechanical Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
The aim of this project deals with high contact gear ratio on which CATIA V5 is
used for design of solid model of high contact gear ratio for spur gear using to 4 teeth and
gear. The software ANSYS used for analysis. The main objective of this project is to
analyze the bending stress, contact stress variation on complete mesh for loading
condition, static and dynamic transmission error. The bending stress is contact stress
variation to completed mechanical loading condition.Hcr is one such gearing concept
used for achieving high load carrying capacity with less volume and weight contact ratio

3rd National Conference on Innovative Research in Science, Engineering and Management


18

2 in high contact gear ratio. Gearing result in lower bending and contact stress. The gear
used in the vehicle should also have lesser noise and vibration. All results depend on
analysis not theoretical.

DESIGN AND ANALYSIS OF CENTRIFUGAL PUMP


N.Thirumalai Devan, N.Suresh
Department of Mechanical Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT

The aim of this project deals with design and performance analysis of centrifugal
pump on which CATIA V5 is used for design of solid model of the impeller. ANSYS
software is used for Analysis. The main objective of this project is to analyse flow analysing
of a centrifugal pump. Impeller friction, volume friction losses, disk friction losses and
recirculation losses of centrifugal pump are also considered in performance analysis. It is
most useful of mechanical hydro dynamic machine in fluid works which widely used in
domestic irrigation and industry purpose. The pump is driven by one horse power electric
motor and the design is based on the barmen method.

STRUCTURAL ANALYSIS OF A DISC BREAK


A.Vishnu, Prof. T.Bhuvaneshkumar
Department of Mechanical Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
ANSYS is a dedicated finite element package used for determining the temperature
distribution, across the disc brake profile. In the present work, an attempt has been made to
investigate the suitable hybrid composite material which is lighter then cast iron and has good
Young’s modulus, Yield strength and density properties. The transient thermo elastic analysis
of disc brake in repeated brake applications has been performed and the results were
compared. The suitable material for the braking operation is selected and all the values
obtained from the analysis are less than their allowable values. Hence the Disc design is safe
based on the strength and rigidity criteria. By identifying the true design features, the
extended service life and long term stability assured.

3rd National Conference on Innovative Research in Science, Engineering and Management


19

FLEXURAL BEHAVIOUR OF GLASS FIBER REINFORCED HIGH


PERFORMANCE CONCRETE BEAMS
M. Dhanasekaran, Prof. P. Karthikeyan,M.E.,
Department of Civil Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
Concrete is one of the used construction material. It is usally associated with Portland
cement as the main component for making concrete. Ordinary Portland cement (OPC) is
conventionally used as the primary binder to produce concrete. Production of Portland
cement is currently exceeding 2.6 billions tons per year worldwide and growing at 5 percent
annually.
Five to eight percent of all human-generated atmospheric carbon-di-oxide worldwide
comes from the concrete industry. Fibre reinforced concrete (FRC) is a concrete made
primarily of hydraulic cements, aggregates and discrete reinforcing fibres. FRC is a relatively
new material. This is a composite material consisting of a matrix containing a random
distribution or disperision of small fibres,either natural or artificial ,having a high tensile
strength .

A STUDY ON EMPLOYEE EMPOWERMENT


Ms.E.Abinaya, Prof. R.Murugesan MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
This article is to be discussing about the study on employee empowerment and
practices throughout the public and private sector. A growing body of evidence suggest that
employee empowerment can be used improve job satisfaction, organization commitment,
innovativeness and performance. Nearly all previous empirical studies have analyzed the
direct effect of employee empowerment on these outcomes variables without taking into
account the mediating of the role of employee attitude. The article contributes to the growing
literature on employee empowerment by proposing and testing a casual model that estimate
the direct effect of employee empowerment on a performance as well as its indirect effect as
mediated by job satisfaction and innovativeness. The empirical analysis relies on the year
data from human capital survey, employee viewpoints survey, structural equation modeling
approach include the lagged variables. The result support the hypothesis casual structure
employee empowerment seem to have direct effect on performance and indirect effect on job
satisfaction and innovativeness to key casual pathways by which empowerment practices
influences behavior incomes.
KEYWORDS: Job satisfaction, organization commitment, innovativeness and performance.

3rd National Conference on Innovative Research in Science, Engineering and Management


20

A STUDY ON WORKING ATMOSPHERE AND PERFORMANCE MEASURES OF


AN EMPLOYEE
Ms.E.Archana, Prof. R.Murugesan MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT

This article is based on the discussion of the role of working atmosphere and
performance measures of the employees working in shri Devaraj granites especially focusing
on how the working atmosphere influences the availability, productivity, competence and
responsiveness combined as they affect the performance measures elements. The objective of
this study reveals to find out the relationship between physical working atmosphere and
performance measures of the employees, to identify the factors which influence the
performance of employees. The scope of this study can help the management to the
parameters that contribute to enhance the performance of employees in this organization
through analyzing dissatisfaction factors faced in the organization and also help to find out
the problems. The study looked at the effect of working atmosphere on the performance of
the employees taking into consideration the four indicators of performance which are
availability, competence, productivity and responsiveness. The work atmosphere has the
great effect on the performance level of employees. Indicators like absence of comfort level,
level of interaction, noise distraction, and equipment facility can affect the performance of
the employees. Hence the work place should be provided with good working atmosphere to
its employees, so as to enable them to perform better.
KEY WORDS: Working atmosphere, Performance measures, Availability,
Productivity, Competence, Response

A STUDY ON CUSTOMER SATISFACTION AT “DREAM IDEA PRINTING


INDUSTIRES” IN BANGALORE CITY.
MR. N.Ashraf Ahamed, Prof. R.Murugesan MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
This article is to be discusses the modern world the ultimate aim of every business is
to make profit and To get that companies are introduce new strategies. One of the easiest
ways to attain success is that Customer satisfaction. The essence of being in business by any
business outfits is to produce for sales and profit. In order to remain in business an
organization must generate enough sales from its products to cover operating cost and post
reasonable profits. Customers’ satisfaction is a tool used by organization to understand the
effectiveness of their performance. Customer satisfaction refers to the power or ability to
choose one thing over another with the anticipation that the choice will result in greater
satisfaction or improved performance the analysis of customer satisfaction helps the
organization to find out the weakness in the activities. Organization are increasingly

3rd National Conference on Innovative Research in Science, Engineering and Management


21

interested in retaining customer while targeting non customer measuring customer


satisfaction provides an indication of how successfully the organization is at product and
service to the market place. To understand the effectiveness of customer satisfaction we use
various satisfaction tools like Chi-square test and Correlation analysis. After conducting this
analysis we found the customer satisfaction is very important for the success of the company
and they are very much cautious about the customer satisfaction. So that they get good result
in the form of profit and good will. Sample size 100.

KEY WORDS: Ultimate, Effectiveness, Performance, Increasingly, Targeting.

A STUDY ON EMPLOYEE RELATIONSHIP MANAGEMENT AT DDCMPU-


KRISHNAGIRI
Ms. S.Ashwini, Prof. R.Murugesan MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The study entitled “EMPLOYEE RELATIONSHIP MANAGEMENT” was
conducted at DHARMAPURI DISTRICT COOPERATIVE MILK PRODUCERS UNION
Krishnagiri. Employee Relationship Management constitutes an emerging trend of managing
human resource by building and maintaining individualized and mutually valuable
relationship with employees. Focused on enabling to collaborate on typical managerial tasks
with their employees. Employee relationship management has Here the paper attempts to
clarify the concept and derive research implication. The main objective of this research is to
study the relationship between the employee and the management and to identify the
importance of employer employee relations. The primary data collection method is used and
the data are collected through well-structured questionnaire. The size of the sample was 100.
Descriptive method of research design is used. Statistical tools such as Chi-Square and
Correlation are used to test the formulated hypothesis. And it has been found that there is a
significant relationship between the employee relations and communication. It has been
found that good employee relation have a positive impact on employee performance.
Through that the organization can improve transparency in communication and to improve
the employer employee relations. From this study it has been concluded that good employee
relations have an positive impact on employee performance.
KEYWORDS: Employee, Relation, Communication, Performance, Transparency, Positive

3rd National Conference on Innovative Research in Science, Engineering and Management


22

A STUDY ON FUNCTION AND ITS EFFECTIVENESS OF HUMAN RESOURCE


AT SRI RAM TOOLS IN HOSUR
Mr. K. Chandrasekar, Prof. R.Murugesan MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
This article is be disuses about the study aimed to assess the effectiveness of an HR
function operating in a public utility, against current trends in HR transition. Different
evaluation methodologies are explored to develop a theoretical evaluation model for the
effectiveness of a HR function. Midst contextual themes of new technologies and
globalization are challenged to attract, develop and retain suitable skills in a labor market that
will continue to suffer shortages. The HR function of today is required to partner with
organizations at a strategic level in response to this challenge. Successful organizations
understand that transforming the HR function require regular in-depth analyses of its
effectiveness. The results confirmed that the HR function is not effective in its role as
strategic partner, and highlights significant differences in perception between the stakeholders
and the HR function regarding its effectiveness. Recommendations were made on future
transformation actions for the specific HR function.Sample method can be used in descriptive
method and sample size 100 through questionnaires and statistical tools can be used chi
squares and correlation analysis and hypothesis testing .based upon suggestion and
conclusion about my project .
Key words: Effectiveness, Evaluation, Contextual, Analyses, Recommendations.

A STUDY ON EMPLOYEE WORK STRESS


Ms.S. Chevanthi, Prof. N. Yogambal
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The introduction of Employee Work Stress in an organization is potentially complex
and requires careful planning which takes into account possible values to dealing with stress.
This study about “Stress in Balaji Match box industry Krishnagiri. The data was collected
through questionnaire method from 100 respondents. Statistical tools such as Chi-Square,
Percentage analysis and Correlation are used. Suggestions and findings were generated. It has
been found that pay packages providing respondents headache inconvenience, personally
manage work stress. Respondents ensure in work at stress routine work developing for
organization. Organization should follow up for strategy. Suggestion were given to improve
their physical working condition in organization, increase flexible working condition,
increase salary of employees, reduce employee stress in organization.
KEYWORDS: Stress potentially, headache, routine stress.

3rd National Conference on Innovative Research in Science, Engineering and Management


23

A STUDY ON EMPLOYEE ABSENTEESM


Ms. V. Gayathri, Prof. N. Yogambal
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The study on employee absenteeism was conducted in Indraprasta Engine Parts Pvt
Ltd, Hosur. The main objective of this study is to find out the absenteeism rate in Indraprasta
Engine Parts Pvt Ltd, and the causes for absenteeism. Absenteeism will disturb the
production and positive environment it’s the responsibilities of find out reason and eliminates
if for the development of the organization .The sample size is 100 and the research study
comes under descriptive research study. The study highlights that absenteeism was high in
the second half of the calendar year. the reason for absenteeism Limited leave, sickness and
accident, Nightshift. the suggestion regularity in attendance can be encourage to some extent
by the offer of a bonus and awards there medical facilities should be provide every month to
the workers to check the fitness of the workers. The research was conducted with full
confidence. The findings and control measures of this study will help the organization to
avoid the problem of absenteeism in future. The statistical tools for the study used were, chi-
square test and correlation, charts and diagrams.
Keyword: Employee absenteeism, reasons, turnover, measures for control absenteeism

A STUDY ON EMPLOYEE RETENTION


Ms.D. LOGAEASWARI, Prof. N. Yogambal
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
Retention of employees is becoming a real challenge in today’s operating
environment as Employers begin to realize the value of people that make up the organization
this study examines the human resource (HR) practices that promote employee retention in
RB notebook industry. Retaining employees is most important function for human resource
.Effective HR practices can reduce employee turnover and increase retention.. Key
employees are the instrument for overall growth and development of an organization. 100
employees have been taken as sample for the present study .The purpose of this study is to
find the factors leading to employee retention in organization. The data was analyzed using
descriptive statistics. This study collected pertained primary data using a well constructed
questionnaire. Data analysis was carried out using Chi-square test, correlation to bring the
valid output and inferences. The data was analyzed using spss software to find out the result
according to hypotheses formulated. The results indicate that there is no significant difference
between socio-economic factors and employee retention. The salary, compensation, career
development are positively and significantly influences the commitment of employees finally
to conclude that in order to improve and retain commitment of employees organization
should provide fair and adequate compensation and create opportunities for growth and

3rd National Conference on Innovative Research in Science, Engineering and Management


24

development of their employees through effective training programmes and increase the
salary for the employees.

KEY WORDS: Employee Retention, Salary, Compensation, Career Development, Training


Programmes.

A STUDY ON PERFORMANCE APPRAISAL WITH REFERENCE TO TITAN


ENGINEERING AND AUTOMATION LIMITED", Hosur
V.Manigandan, Prof. N. Yogambal
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
Performance appraisal is vital for the organization to achieve their objective. The
main objectives of this study are to analyze the existing performance appraisal system
followed by the company, to evaluate the effectiveness of the existing appraisal system .Area
of focus in employees are classified in to to two as L-level and E-level. The employees in the
organization are the related data’s where collected through the questionnaire. The data’s are
analyzed through the correlation analysis and chi-square method. From these inference were
drawn, based on the inference it is found that 100 respondents felt that the performance
appraisal system done by the organization is comfortable and satisfactory. From the study it
is found that they are enriching their knowledge with appraisal system and identifying those
who are handling the work more effectively & who are essential for this organization and
necessary findings are made and suggestions were given. Within a short period of time the
employees are aware about the various policies are implemented by the company and also it
gain goodwill in the minds of employees. It is suggested that the company should introduce
new methods like 360° Performance Appraisal and internet assessment Center to enhance
good services promptly and efficiently at the time of employees’ measures. for the effective
functioning in the future period.
Keyword: Performance Appraisal, Work management, Career development growth,
Appraiser, Employee participation, Organization commitment

A STUDY ON EMPLOYEE ATTRITION


Ms. M. Menaga.M, Prof. R.Murugesan MBA, MPhil
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
This article is to discuss about “Employee attrition”. Employee attrition is a situation
faced by an organization or employer when new employees joined or leaves the organization
to join other organization when he gets offers. Generally employee attrition will be very high

3rd National Conference on Innovative Research in Science, Engineering and Management


25

when there is a pressing need of employees in a particular industry due to mass retirement or
expansion of the organization. The objective of this study reveals to find out the level of
dissatisfaction among employees towards their job, to identify remedial measures, to reduce
attrition, scope of this study can help the management to know for which reason employees
tend to change their job in this organization through dissatisfaction factors faced in the
organization and also help to find out the problems, it provides suggestions and it develop a
long term technology strategy while remaining flexible. The size of the sample is 110. The
tool used in this study is correlation, chi square analysis based on the findings, suitable
suggestion in the organization. Hence this study is an attempt for the company to reduce
attrition level.
KEYWORDS: Attrition, Voluntary Attrition, Involuntary Attrition.

A STUDY ON EMPLOYEE MORALE IN STAHLLFORM TECHNICK


M. Monisha, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT

Morale is the depiction of emotions, satisfaction, and overall attitude towards a


workplace. Productivity is directly related to morale. Happy employees have high morale
while dissatisfied and unhappy employees have low morale. It measured employee morale,
using job satisfaction, organization commitment, turnover rates, complaints and employee
strikes as a proxy. A high morale means the employees is satisfied with the job, puts in effort,
is creative, takes initiative, is committed to the organization and focuses on achieving
organizational goals rather than personal goals. In the present study an attempt has been made
to study the employee morale and its impact on employee efficiency at Stahllform Technik.
The questionnaire close end method , sample size 100 , statistical tools used in the
study correlation, chi square analysis hypothesis testing based on the findings, suitable
suggestion in and conclusion of the organization
Keywords: Employee morale, employee efficiency, employee satisfaction.

A STUDY ON EMPLOYEES SATISFACTION LEVEL TOWARDS WELFARE


MEASURE
Ms. Preethi .P, Prof. R.Murugesan MBA, MPhil
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT

This article is based on the discussion of the employee satisfaction involves taking
measures to encourage staff to stay within Sri Devaraja agro industries. Work contentment
and Workers wellbeing deeds are one of the major factor which has to be keep in view as

3rd National Conference on Innovative Research in Science, Engineering and Management


26

they are the dear possessions of an organization. An employee welfare practice plays a very
important role in the overall development of an organization and its employees and provides
motivational rip for the workforce. Most of the times company is facing lot of issues in
worker retention because the expectations of employees are changing day by day and hiring
knowledgeable individuals for the organization are crucial for managers. There’s no dearth of
opportunities for a proficient person to work in organization for a longer period, there are
several organizations that are searching for efficient staff by providing good welfare
measures. If an individual isn't happy by the work he’s doing, he could switch to another
additional appropriate job. In today’s surroundings it becomes important for organizations to
satisfy their staff. Therefore the research objective is to understand various welfare amenities
offer by the business to keep happy workers and also impact of welfare facilities on employee
satisfaction. Preceding scholars need originate the changed factors which influence the
welfare facilities on employee’s completion and potential; it is not produce on fulfillment of
human resources hence this study fills that gap by considering employee welfare facilities to
retain the employees in the organization.

Key words: Employee satisfaction, opportunities, issues, motivational rip

A STUDY ON WORKING CAPITAL MANAGEMENT AT DDCMPU


Ms. M. REVATHI, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
Working capital management is the life blood of finance. It deals with the current
asset and current liabilities finance manager job is to have an ideal balance between current
asset and current liabilities so that to get a proper tradeoff between liquidity and profitability.
In the present research Dharmapuri district cooperate milk producer union limited. krishnagiri
analyzed the data was taken from the annual report of the company listed for the period of
five years (20013-2017). The data collection method was done through secondary data. And
the analytical method of research design was used. Statistical tools such as correlation is used
to test the hypothesis. The present study was conducted on determination of working capital
in this study ratio method taken as current ratio, fixed asset ratio, gross profit ratio, debt
equity ratio
Key words: working capital management, liquidity and profitability.

3rd National Conference on Innovative Research in Science, Engineering and Management


27

A STUDY ON EMPLOYEE COMPENSATION AT GLOBAL SOLUTIONS


Mr. Sakthi.R, Ms.Kayalvizhi .R MBA, MPhil
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
Compensation is a systematic approach to providing monetary value to employees in
exchange for work performed. Compensation may achieve several purposes assisting in
recruitment, job performance, and job satisfaction. Compensation is the remuneration
received by an employee in return for his/her contribution to the organization. It is an
organized practice that involves balancing the work employee relation by providing monetary
and non-monetary benefits to employees. Compensation is an integral part of human resource
management which helps in motivating the employees and improving organizational
effectiveness.
For a long time, Employee Compensation has merely been concerned with employees
sustaining brand loyalty. In order to understand the Employee Compensation stages and
processes in organization, this study will be more helpful to the management as well as the
concern HR team. The main objective of the study is to study on employee compensation.
The study is purely based on the views of 100 respondents only and hence the results may not
be universally applicable. Descriptive research method is used for the study on employee
compensation. This study is adopted by Convenience sampling. Convenience Sampling is a
type of non-probability sampling method in which selection of units from the population is
based on their easy availability and accessibility to the researcher. The sample unit for this
study is comprised of employees from the company. The researcher find out that the
competitive remuneration in isolation would not greatly influence the employees
performance.
Keywords: Compensation, Monetary, Convenience, Remuneration

A STUDY ON COST CONTROL IN KEF INFRASTRUCTURE INDIA PVT LTD


Mr.Sathishkumar.S, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
A study on cost control in KEF Infrastructure India Pvt. Ltd. The total cost of
producing a specific level of output is the cost of all the factors of input used. Conventionally
economist use models with two inputs capital, and labor, Capital is assumed to be the fixed
input meaning that the amount of capital used does not vary with the level of production. The
rental price per unit of capital is denoted. Thus the total fixed costs equal. Labor is the
variable input meaning that the amount of labor used varies with the level of output. In fact in
the short run the only way to vary output is by varying the amount of the variable input.
Labor is denoted L and the per unit cost or wage rate is denoted w so the total variable costs

3rd National Conference on Innovative Research in Science, Engineering and Management


28

is Law. Consequently total cost is fixed costs (FC) , variable cost (VC). Valuation in terms of
money of (1) effort, (2) material, (3) resources, (4) time and utilities consumed, (5) risks
incurred, and (6) opportunity forgone in production and delivery of a good or service. All
expenses are costs, but not all costs (such as those incurred in acquisition of an income-
generating asset) are expenses. . The financial techniques in Inventory turnover ratio, debtors’
turnover ratio, inventory breakeven point, margin of safety, conversion period are very
helpful to know how effectively plays and control in the organization. Research design
method analytical research, secondary data, annual report last 2013-2017 five years in
company balance sheet.
Keywords: Cost Analysis, Cost Concepts, Cost Control Technique, Cost control, ratio
analysis, and financial performance.

A STUDY ON ORGAANIZATIONAL CLIMATE


Mr.Sathiyaraj.R, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
This paper tells about ORGAANIZATIONAL CLIMATE in the company
RAJSRIYA AUTOMOTIVE INDUSTRIES (P) LTD., HOSUR its objectives are to
determine organization climate which refers to set attributes which can be perceived
about a particular organization and it is subsystem that may be induced form the way
that organization and its subsystem to deal with their member and environment . The
research conducted is descriptive in nature and the sample size use for the 100. The method
used is primary data collection methods and structured questionnaire were used. Percentage
analysis chi-square tests were used for analyzing and interpretation. This research mainly
focuses on employee feedback and suggestion that would be useful to RAJSRIYA
AUTOMOTIVE INDUSTRIES (P) LTD., HOSUR to take necessary action to remove them
in a better manner. The finding revealed that most of the respondents are satisfied with the
organization climate.
Keywords: Attributes, environment, perceived, revealed

A STUDY ON INVENTORY MANAGEMENT IN PMPV NATURAL STONES


Ms.Sathya.M, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The study on Inventory Management was conducted in P.M.P.V Natural stones, in
krishnagiri. The purpose of inventory management are to ensure availability of granites in
sufficient qualities company to reduce the level of inventories to a considerable extent
without any adverse effect on production and sales by using simple inventory planning and
control techniques. The research design used for the study is analytical in research. The

3rd National Conference on Innovative Research in Science, Engineering and Management


29

reduction of excessive inventories will create a favorable impact on the company


profitability. The financial techniques in Inventory turnover ratio, debtors turnover ratio,
inventory conversion period are very helpful to know how effectively plays and control in the
organization EOQ analysis will enables the organization to use of EOQ analysis is very
effective and useful tool for classifying, monitoring and control of inventories. The analysis
is based on the 5 years balance sheet of the company.
KEY WORDS: Inventory, adverse effect, favorable, turnover, debtors.

A STUDY ON WORK LIFE BALANCE AMONG FEMALE EMPLOYEES


Ms.Shaheena.N, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT

Work-life balance can be defined as the perfect integration between work and life
both not interfering with each other. To avoid delays and failures, employees are working
hard and giving their heart and soul to achieve work-life balance which is creating an
enormous pressure on them and hence they are forced to finish their jobs irrespective of time
limit. Career and goals are the most important factors in life. Most of the women are coming
forward to work in order to support their family. This change is now natural and dynamic
due to change of environment and economic conditions. Achieving work life balance is
important for employees to have a good quality of life. This paper is an attempt to explore the
tough challenges faced by female employees in maintains a balance between personal and
professional life. The result also indicates that the work life balance of individuals affect their
quality of life.
KEYWORDS: Integration, enormous, dynamic, explore, pressure.

A STUDY ON EMPLOYEE JOB SATISFACTION IN UNIQ TECHNOLOGIES


Ms.Sharmila.K, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
Job satisfaction is all about how a person likes the job. It is actually more of a journey
than being a destination. It is of a utmost requirement to organization as it will increase
the job involvement level of the employees and decrease the job stress. Job
satisfaction has been a concept for researchers as well as experts since number of decades.
This paper presents the study of past literatures of job satisfaction. The purpose is to find out
the different attributes used for evaluating the job satisfaction. From the review of extant
literature, it has been found that it is always not salary which leads to job satisfaction
rather it is the work environment. The main objective focused on to assess the level of job
satisfaction of employees of regarding works environment and other facilities. The sampling
method adopted by the researcher is random sampling method, tools such as Chi-Square

3rd National Conference on Innovative Research in Science, Engineering and Management


30

test, Correlation and Chart for interrelation based on the interpretation certain valuable
findings are given about the job satisfaction. The present study consists of 100 respondents
only and the respondents are the employee of the Uniq Technology and the data has been
collected from the job satisfaction identifying those who have for handling the work more
effectively are essential for any organization. The Suggestion given to the company was the
employee’s job must be satisfied using the appropriate satisfaction methods and the
performance of the employee can be increased by increment in their salary to improve the
satisfaction level of the employees.
Key words: Job satisfaction, Attributes, Turnover, Work environment.

A STUDY ON EMPLOYEE MOTIVATION IN HYUNDAI MOTOR INDIA PVT


LIMITED
Ms.Sindumathi.G, Prof. Mr.Vasu.R
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The study on Employee Motivation was conducted in Hyundai Motor India Pvt Ltd.
Most employees need motivation to feel good about their jobs perform optimally. Some
employees are money motivated while others find recognition and rewards personally
motivating. The research design used for the study is descriptive research. The descriptive
research study is involves survey and fact findings enquiries of kind of which helps the
researches to describe the present situation that makes the analysis about the effect of
employees motivation easily and helps to reach the objectives. The number of respondent is
100. The questionnaire method is used closed end method. The statistical tools used in the
correlation, chi square analysis used and hypothesis testing two variable based on the
findings, suitable suggestion in the organization.
Key Words: Employee Motivation, Importance, Performance.

A STUDY ON EMPLOYEE REMUNERATION


Ms.Sivaranjani.P, Ms.Kayalvizhi.R MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
This study “ Employee Remuneration” was conducted at DIVYA SREE TOOL
TECH at Bangalore. Employee remuneration refers to the reward or compensation given to
the employees for their performance. Remuneration leads to the employee motivation. The
objective of this study is to analyze the remuneration as a motivation factor for employees
and to evaluate the satisfaction level of employee remuneration. The data was collected
through questionnaire and data are collected from 100 respondents. Descriptive method of

3rd National Conference on Innovative Research in Science, Engineering and Management


31

research method was used. Chi-Square and correlation are used to test the hypothesis.
Findings and suggestions were generated. It has been found that employee remuneration acts
as the motivational factor for employees. And the suggestion is to improve the level of
remuneration provided to them. And it has been concluded that there is a positive impact on
employee remuneration and motivation.
KEYWORDS: Employee remuneration, Motivation, Compensation, Salary.

A STUDY ON RECRUITMENT AND SELECTION


Ms.Vaitheswari.K, Ms.Kayalvizhi.R MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The topic of this paper is Recruitment & Selection in the company FASHION KNITS
PVT LTD., TIRUPUR. Recruitment may be defined as the process of discovering potential
candidate for actual and anticipated organizational vacancies recruitment is the set of
activities used to obtain a pool of qualified job applicants. In other words recruitment gets the
organization in its human resource. Recruitment and selection helps to get the organizational
goals to be attained for this right person for the right job and the right time is essential. All
the above aspect is included in the recruitment process this paper deals with these
organization recruitment process for effective functioning. Research methodology used was
percentage analysis, Chi-Square and Correlation. Suggestion was given to improve the
recruitment process to be carried out in effective ways.
KEYWORDS: Recruitment, Selection, Internal source, External source of recruitment

A STUDY ON EMPLOYEE COMPETENCY MAPPING


Mr.Venkatesan.M, Ms.Kayalvizhi.R MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT

The study entitled “A Study on Employee Competency mapping measure in LIFE


LINE CIRCUITS PVT LTD, HOSUR .In a knowledge economy, people are the heart of any
business organization need to build, sharpen and leverage on their competitive people. In 21 st
century recognize the fact that human resources are the most valuable resource of the
company and key differentiating factor in this competitive scenario. Primary data collection
was done through structured questionnaire. Descriptive research design is used in this study.
The sample size of this project is 100, chi-square and correlation statistical tools are applied
in this study. From this study the researcher identify Competency mapping refers to the
identification of preferred behaviors and personal skills which distinguish excellent and
outstanding performance from the average. The present study narrates the aim to understand
the competency mapping system prevailing in the printed circuits boards in the organization

3rd National Conference on Innovative Research in Science, Engineering and Management


32

and also develop the competency mapping system to identify the level of perception towards
competency mapping among employees.
KEYWORD: Sharpen, Leverage, Prevailing, Performance, Excellent, Scenario, Behavior.

A STUDY ON EMPLOYEE SAFETY MEASURES


Ms.Vinothini.P, Ms.Kayalvizhi.R MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The study entitled “A Study on employee safety measure in TGI PACKING PVT
LTD, SRIPERAMBATTUR”. Safety measures are inevitable to any organization. The
various safety measures provided by the employer will have immediate impact on the health,
physical and mental efficiency alertness, morale and overall proficiency of the worker and
thereby contributing to the higher productivity. Some of the facilities and services which fall
within the preview of employee safety include helmet, gloves, first-aid shoes, fire protection.
Objectives of the study is awareness of workers about safety in work place. The need and
importance of the study highlighted the health and safety measures which imply to improve
the performance of the employees. Primary data collection was done through structured
questionnaire. Descriptive research design is used in this study. The sample size of this
project is 100, chi-square and correlation statistical tools are applied in this study. From the
study the researcher identify how to improve the safety measures in the organization.

KEYWORDS: Health, Safety, Accident, productivity, alertness, contributing, helmet.

TO PERFORM DEVELOPMENT OF COLLISION ALLEVIATING DCF


PROTOCOL WITH EFFICIENT BACK OFF ALGORITHM FOR
WIRELESS AD HOC NETWORKS
Aathiraja.G1, K.Kamali And Dr.K.Selvakumar
Department of Computer Science and Engineering1
Government College of Engineering, Dharmapuri1
Department Of Computer Science And Information Science
Annamalai University Annamalai Nagar

ABSTRACT

Ad hoc networks have been proposed for emergency communication where in the
required infrastructure is unavailable. However, a major concern in Ad hoc networks is
collisions. Even in infrastructure based wireless networks, when the number of contending
nodes is high, more number of frame collisions occur which leads to drastic reduction in
network performance. In all IEEE 802.11 based wireless and Ad hoc networks, the back off
algorithm dynamically controls the contention window of the nodes experiencing collisions.
Even though several algorithms such as Binary Exponential Back off, Double Increment
Double Decrement back off, Exponential Increase Exponential Decrease back off, Hybrid
Back off, Binary Negative Exponential Back off etc. have been proposed in the literature to

3rd National Conference on Innovative Research in Science, Engineering and Management


33

enhance the performance of IEEE 802.11 Distributed Coordination Function (DCF) protocol,
most of them have not been developed for real- traffic scenarios. Also the packet collision
rate is high using these algorithms. So, in this paper, a history based increment backoff
algorithm (HBIB) is proposed for the DCF protocol to alleviate the number of collisions.
Furthermore, the packet transmission procedure of the DCF protocol is modified to avoid
channel capture effect and this is represented with a Markov chain model. A simple
mathematical model is developed for transmission probability considering the non-saturated
traffic and channel errors. Results show that the proposed HBIB- algorithm provides superior
quality-of-service parameters over existing backoff algorithm.

ANALYSIS OF FRAUD DETECTION MECHANISM IN HEALTH INSURANCE


USING STATISTICAL DATA MINING TECHNIQUES
Senkuttuvan R, Prof. C.Prakash Narayanan, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering & Technology

ABSTRACT

Healthcare delivery is one of the most important functions of government. Hoax is


widespread and very costly to the healthcare insurance system. Hoax involves intentional
deception made for personal gain or to damage another individual and a false statement
(misrepresentation) is intended to result in an unauthorized benefit. Hoax and abuse in
medical claims have become a major concern within health. It is shocking because the
incidence of health insurance hoax keeps increasing every year. In order to detect and avoid
the hoax, data mining techniques are applied. This includes some preliminary knowledge of
health care system and its fraudulent behaviors, analysis of the characteristics of health care
insurance data. Data mining which is divided into two learning techniques viz. supervised
and unsupervised is employed to detect fraudulent claims. The existing system has a
drawback in accuracy of finding the fraudulent person in claiming health insurance were the
drawback has overcome in the paper we proposed. This paper proposes two levels of aspects.
First aspect uses genetic algorithm that does a systematic classification to detect the
fraudulent claims. Secondly, it does an auditing process to check the health conditions of
patient to find out diseases are fake or not. it is more efficient than existing paper and also
provides us more accuracy.

FINDING FRAUD AND MALWARE DETECTION IN GOOGLE PLAY STORE


USING FAIRPLAY TECHNOLOGY
M. Tamilselvi, Prof. S. Chandra Sekaran, M.E.,
Department of Computer Science and Engineering
P.S.V College of Engineering & Technology

ABSTRACT
Fraudulent behaviors in Google Play, the most popular Android app market, fuel
search rank abuse and malware proliferation. To identify malware, previous work has focused

3rd National Conference on Innovative Research in Science, Engineering and Management


34

on app executable and permission analysis. In this paper, we introduce FairPlay, a novel
system that discovers and leverages traces left behind by fraudsters, to detect both malware
and apps subjected to search rank fraud. FairPlay correlates review activities and uniquely
combines detected review relations with linguistic and behavioral signals gleaned from
Google Play app data (87 K apps, 2.9 M reviews, and 2.4M reviewers, collected over half a
year), in order to identify suspicious apps. FairPlay achieves over 95 percent accuracy in
classifying gold standard datasets of malware, fraudulent and legitimate apps. We show that
75 percent of the identified malware apps engage in search rank fraud. FairPlay discovers
hundreds of fraudulent apps that currently evade Google Bouncer’s detection technology.
FairPlay also helped the discovery of more than 1,000 reviews, reported for 193 apps, that
reveal a new type of “coercive” review campaign: users are harassed into writing positive
reviews,and install and review other apps.

A 4-SWITCH MULTI-STAGE SINGLE-PHASE CUK INVERTER


M.Karthick, Prof.M.Murugan, M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT

This paper proposes a single-phase, single-stage buck-boost inverter for photovoltaic


(PV) systems. The presented topology has one common terminal in input and output ports
which eliminates common mode leakage current problem in grid connected PV applications.
Although it uses four switches, its operation is bi-modal and only two switches receive high
frequency PWM signals in each mode. Its principle of operation is described in detail with
the help of equivalent circuits. Its dynamic model is presented, based on which a bi-modal
controller is designed. Experimental results, in standalone and grid connected mode, obtained
with a 300 W laboratory prototype are presented to validate its performance.

COMMUTATION TORQUE RIPPLE REDUCTION IN BLDC MOTOR


USING MODIFIED SEPIC CONVERTER AND THREE-LEVEL NPC INVERTER
S.Krishnamoorthy, Prof.K.Gopinath,M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT

In conventional DC motors with brushes, the field winding is on the stator and
armature winding is on the rotor. The motor is expensive and requires maintenance due to the
brushes and accumulation of brush debris, dust, commutator surface wear, and arcing. The
brushless DC (BLDC) motor could overcome this issue by replacing the mechanical
switching components (commutator and brushes) using electronic semiconductor switches.
The BLDC motor has a permanent magnet rotor and a wound field stator, which is connected

3rd National Conference on Innovative Research in Science, Engineering and Management


35

to a power electronic switching circuit. BLDC motor drives have high efficiency, low
maintenance and long life, low noise, control simplicity, low weight, and compact
construction. Due to these features, the BLDC motor has become a very popular and viable
product in the market. In fact, the BLDC motor has more advantages compared with other
types of AC motors in the market . Based on the shape of the BEMF brushless motors can be
trapezoidal or sinusoidal. In the BLDC motor, permanent magnets produce an air gap flux
density distribution, which is trapezoidal, resulting in trapezoidal BEMF waveforms.

A MEDIUM FREQUENCY TRANSFORMER-BASED WIND ENERGY


CONVERSION SYSTEM USED FOR MFT CONVERTER BASED OFFSHORE
WIND FARM
S.Suganthi, Prof. R.Kalpana, M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT
On the basis of the connection methods of wind turbines in offshore wind farms and
the characteristics of the power to be delivered, the wind energy conversion system (WECS)
proposed in . Considering reliability and efficiency as main requisites for all onshore
conversion systems, the footprints and weights of the components are particularly important
for offshore infrastructure. The total weight of the system that is dominated by the offshore
substation significantly affects the cost and complexity of the offshore wind farm. Therefore,
the fourth one (series dc connection and HVDC transmission system) is increasingly
emphasized in research because it can save significantly cost given that the bulky and costly
offshore substation can be eliminated.

A HARMONIC SUPPRESSION SCHEME FOR


FULL SPEED RANGE OF A THREE-LEVEL INVERTER FED INDUCTION
MOTOR DRIVE USING SWITCHED CAPACITIVE FILTER
Saranya.S, Prof. .V.Geetha M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT
This paper proposes a novel harmonic suppression scheme for three-level inverter fed
three-terminal induction motor drives using switched capacitive filter. Capacitor fed H-
bridges used as filters are cascaded to conventional three-level inverter to eliminate fifth- and
seventh-order harmonics for the full modulation range including a six-step operation.
Enabling the switched capacitive filtering at low-voltage domain and shifting the high
frequency switching to the switched capacitive filter. A uniform pulse width modulation
technique which charges and maintains the capacitor voltages while eliminating the fifth- and
seventh-order harmonics for the full speed range.

3rd National Conference on Innovative Research in Science, Engineering and Management


36

AN INNOVATIVE MODULAR MULTILEVEL CONVERTER TOPOLOGY


SUITABLE FOR UNBALANCED GRID
M.Subramani, Prof. M.Murugan, M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT
The existing control strategies of modular multilevel converter (MMC) balance the
capacitor voltage on the premise that the active power of ac-side is balanced with that of dc-
bus. Thus, the symmetrical ac-side current references and the unevenly distributed dc current
references in three legs are obtained by complex coordinate transformation, precise
calculation and numerous filters under unbalanced grid condition. However, by controlling
capacitor voltages, the active powers between aside and dc-bus can self-regulate to balance.
Based on this idea, this paper proposed a control strategy which combines the arm current
control with the multi-hierarchy control for MMC under unbalanced grid condition. Within
multi-hierarchy control, aside current references and dc current references in three legs could
be obtained easily by voltage controllers of three legs in abc coordinate, avoiding the
complex coordinate transformation, precise calculation and numerous filters. Besides, the
employment of the arm current control removes the need of the three-sequence ac-side
current controllers and the three-sequence circulating current suppressing controllers. The
proportional regulator with a feed forward steady state duty cycle is designed for arm current
regulator, which can perfectly track its reference and is easy to design.

A DUAL SEPIC AC/DC CONVERTER FOR DC NANO-GRID WITH THREE


TERMINAL OUTPUTS
M.Tamilvani, Mr.K.Gopinath,M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT

Due to the widely used DC characterized loads and more distributed power generation
sources, the DC Nano-grid becomes more and more popular and it is seen as an alternative to
the AC-grid. For safety considerations, the DC Nano-grid should provide reliable grounding
for the residential loads as the low voltage AC power system. There are three typical
grounding configurations for a DC Nano-grid, including the united grounding, the
unidirectional grounding and the virtual isolated grounding. Each grounding configuration
has its own specifications to AC/DC converters. In this paper a dual SEPIC AC/DC converter
for use in the united grounding configuration based DC Nano-grid with three terminal outputs
is proposed.

3rd National Conference on Innovative Research in Science, Engineering and Management


37

IMPLEMENTATION OF ADAPTIVE FUZZY LOGIC CONTROLLER FOR


IMPROVEMENT OF POWER QUALITY AND POWER FACTOR CORRECTION
IN THREE PHASE ACTIVE DEVICE
S.Aishwariya, Prof.A.Vimal, M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT

In this paper, we propose an adaptive control approach with fuzzy logic parameter
tuning (AFLPT) for the energy management of electric vehicles that are using fuel cell
battery hybrid systems. The controller is adaptive to different driving conditions including
normal, regenerative, and overload conditions. Specifically, the power flow between the fuel
cell (FC) and the Li-ion battery is controlled in real time to maintain the battery sate of
charge at an desirable level while satisfying the fuel cell dynamic constraints. For
guaranteeing performance in different driving conditions, the fuzzy logic parameter tuning
(FLPT) is integrated with the adaptive controller. Moreover, theoretical properties of the
designed controller are analyzed. Simulation and experiment results illustrate the
effectiveness of the proposed strategy for fuel cell battery hybrid systems in electric vehicles.

COMPREHENSIVE DESIGN AND OPTIMIZATION OF SOFT SWITCHING AC-


DC CONVERTER TO MEET STANDBY POWER REGULATION
M.Subash, Prof..L.P.Vettrivelan, M.E.,
Department of Electrical and Electronics Engineering
P.S.V College of Engineering & Technology

ABSTRACT
The proposed converter consists of a full-bridge diode rectifier, an isolated resonant dc-
dc converter, and only one controller. The proposed converter provides the soft-switching
technique for all components operating at high frequency, allowing for an improvement in
power density without a cost of power-conversion efficiency. Furthermore, by using a novel
control algorithm that controls both power factor and output power, the converter performs
ac-dc power conversion in only a single-power-processing step. These characteristics enable
the proposed converter to provide high efficiency, high power density, and a high power
factor. A 2-kW prototype was implemented, and its performance and validity were evaluated
based on experimental results.

3rd National Conference on Innovative Research in Science, Engineering and Management


38

A STUDY ON EFFECTIVENESS OF EMPLOYEE COUNSELING


Ms. Chandralala.S, Prof. R.Murugesan MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
The study entitle on “Effectiveness of employee counseling at Titupattur co-operative
sugar mill limited. Employee counseling can be explained as providing help and support to
the employees to face and sail through the difficult times in life. Counseling is guiding,
consoling, advising and sharing and helping to resolve their problems whenever the need
arises. The objectives of the study is explore the key sources of difficulty and review the
individual current strategies and styles of coping. The need and importance of the study is
counseling helps the employees to share and look at his problems from a new perspective, it
help himself and do face and deal with the problems in a better way. The size of the sample is
100 descriptive researches is used in this study and the tools chi-square and correlation is
used to finding and give suitable suggestion in the organization. Hence the study is prove that
significant help to modify the behavior of the employees and more to be reinforcement the
desired behavior, improve and increase the employee productivity.

A STUDY ON EMPLOYEE INVOLVEMENT IN PRODUCTIVITY


MS.Gajalakshmi.G, Prof.Yogambal.N MBA M.Phil.,
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT

This study is about employee involvement in productivity in Ashok Leyland Ltd


Hosur. Employee in productivity is most important function of human resource. The
participation of employee in the development and implementation of an intervention may
help to ensure that changes take place. A sample size of employees taken was 100. The study
is descriptive in nature helps the researcher to find out various characteristics of the
population. The methods of data collection for the study include both primary and secondary
data. The primary data were collected through questionnaire by conducting a personal survey
with the employees. The resource of secondary data was from the company data base and
websites. The statistical tool used for analyze and interpreting was chi-square correlation. The
result was presented with help of pie-charts. The findings of the study are analyzed and
appropriate suggestions were given for the improvement of the productivity level of the
employee.
Keywords: Employee Involvement, Factors Affecting Involvement.

3rd National Conference on Innovative Research in Science, Engineering and Management


39

A STUDY ON GRIEVANCE HANDLING IN UNITED DRY GOODS. PVT. LTD.


JEENUR
Mr.Ganapathy.V, Prof.Yogambal.N MBA M.Phil.,
Department of Master of Business Administration
P.S.V College of Engineering & Technology

ABSTRACT
Grievance means dispute or disconnect or feelings of unfairness arise between
employer and employee in workplace the employees express grievance in term of complaints.
The main objective of this study is to find the effectiveness of grievance handling procedure
of the company. The sampling method adopted by the researcher is simple random sampling
method; tools used are chi-square test and correlation based on the interpretation certain
valuable findings are given about the grievance handling. The study consists of 100
respondents only and it was found Economic, Organizational change, Technological factors
are the main reason for the causes for the grievances and it is has the effect as low
productivity, increase in wastage and the leads to increase in cost of production .It was the
suggested that Managerial Review, Grievance Review Panel, Informal Discussion with the
superiors will help to reduce the grievances effectively
KEY WORDS:
Employee grievance, promotion, grievance handling procedure, wages and salary, working
condition.

A STUDY ON TRAINING AND DEVELOPMENT


Ms.Soniya. S, Prof. Ms.Kayalvizhi.R MBA, MPhil.
Department of Master of Business Administration
P.S.V College of Engineering & Technology
ABSTRACT
In this study says about the training and development of the employees in the Co-
operative Sugar mill limited, Kethandapatti. In this study the main objective to know how
training is important to develop our present and future of the employee promotion , factor
influencing the training needs with the training what are issue to the employees, finding out
the intention towards training needs. In this company what type of training provided to the
employees. Training is the initial step in a cyclical process which contributes to the overall
training and educational strategy of staff in an organization or a professional group. In this
study the research methodology descriptive research and both primary and secondary data
used for the data collection, the method is simple random sampling and the research used
graphical and diagrammatic representation for the study.
Keywords: Promotion, Intention, Graphical, Diagrammatic, Representation

3rd National Conference on Innovative Research in Science, Engineering and Management


40

EXPERIMENTAL STUDY ON SELF COMPACTING CONCRETE WITH BAGASSE


ASH AND POLYPROPYLENE FIBRE
P. Vidhya Kumari , Prof. P. Karthikeyan,M.E.,
Department of Civil Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT

Self-compacting concrete (SCC) is an innovative concrete that does not require


vibration for placing and compaction. It is able to flow under its own weight, completely
filling formwork and achieving full compaction, even in the presence of congested
reinforcement. Cement is replaced by sugarcane waste ash which is called Bagasse Ash.
Polypropylene fiber are added to total volume of concrete to resist the crack, increase tensile
strength, initial shrinkage damages, etc. Viscosity modification agent are added to concrete to
increase the workability and to maintain the fluidity.

MIVAN CONSTRUCTION TECHNOLOGY (ALUMINIUM FOMWORK)


Yuvaraj Deva, Prof. P. Karthikeyan,M.E.,
Department of Civil Engineering
P.S.V College of Engineering and Technology, Krishnagiri

ABSTRACT
The system of aluminum forms (mivan) has been used widely in the construction of
residential units and mass housing projects. It is fast, simple, adaptable and cost – effective.
It produces total quality work which requires minimum maintenance and when durability is
the prime consideration. This system is most suitable for indian condition as a tailor–made
aluminum formwork for cast–in–situ fully concrete structure

3rd National Conference on Innovative Research in Science, Engineering and Management

You might also like