Download as pdf or txt
Download as pdf or txt
You are on page 1of 68

Proceeding of 5 th International

Conference on Recent Trends in


Engineering and Technology
ICRTET’2016 Volume 2 Electronics &
Telecommunication Engineering
Mechanical Engineering M. M. Rathore
Visit to download the full and correct content document:
https://ebookmass.com/product/proceeding-of-5-th-international-conference-on-recent
-trends-in-engineering-and-technology-icrtet2016-volume-2-electronics-telecommunic
ation-engineering-mechanical-engineering-m-m-rathore/
Proceeding of
5th International Conference on Recent Trends in
Engineering and Technology

ICRTET’2016
Volume 2

Electronics & Telecommunication Engineering


Mechanical Engineering
About ICRTET’2016
5th International Conference on “Recent Trends in Engineering & Technology”
ICRTET’2016 held during April 28-30, 2016 in Chandwad, Nashik, (Maharashtra) India.
ICRTET’2016 helps to bring together researchers, academician and Industrial experts in the field of
Civil Engineering, Computer Engineering, Electronics & Telecommunication Engineering,
Information Technology and Mechanical Engineering to a common forum.

The primary goal of the conference is to promote research and developmental activities in
Engineering & Technology. Secondly, it provides a platform to exchange the knowledge & scientific
information amongst academicians, researches, developers, engineers, students, and practitioners
working in India and abroad.

The conference held every year to make it an ideal workstation for people to share views
and experiences in all the relevant areas. English is considered as an official language of the
conference.

ICRTET’2016 i s organized by SNJB’s Late Sau. Kantabai Bhavarlalji Jain College of Engineering
and technically co-sponsored by McGraw Hill Publication. The Proceeding of the ICRTET’2016 is
slated to publish by McGraw Hill Publication with ISBN Numbers.
Proceeding of
5th International Conference on Recent Trends in
Engineering and Technology

ICRTET’2016
Volume 2

Electronics & Telecommunication Engineering


Mechanical Engineering

Editors
M. M. Rathore, Prof. Y. L. Bhirud
Associate Editors
Dr. V. A. Wankhede, R. C. Patil, S. D. Sancheti, M. A. Mechkul,
G. S. Pawar, H. S. Deore, Y. S. Kulkarni, S. U. Patil

McGraw Hill Education (India) Private Limited


New Delhi

McGraw Hill Education Offices


New Delhi New York St louis San Francisco Auckland Bogotá Caracas
Kuala lumpur lisbon london Madrid Mexico City Milan Montreal
San Juan Santiago Singapore Sydney Tokyo Toronto
McGraw Hill Education (India) Private Limited
Published by McGraw Hill Education (India) Private Limited,
P-24, Green Park Extension, New Delhi 110 016.
Proceeding of 5th International Conference on Recent Trends in Engineering and Technology (ICRTET’2016) Vol-2
Copyright © 2016, by McGraw Hill Education (India) Private Limited
No part of this publication may be reproduced or distributed in any form or by any means, electronic, mechanical, photocopying, recording,
or otherwise or stored in a database or retrieval system without the prior written permission of the publishers. The program listing (if any)
may be entered, stored and executed in a computer system, but they may not be reproduced for publication.
This edition can be exported from India only by the publishers,
McGraw Hill Education (India) Private Limited.
ISBN (13): 978-93-5260-181-3
ISBN (10): 93-5260-181-5

Managing Director: Kaushik Bellani


Director—Products (Higher Education and Professional): Vibha Mahajan
Manager (Product Development)—B&E-BGR: Hemant K Jha
Senior Researcher—Product Development: Navneet Mehra
Head—Production (Higher Education and Professional): Satinder S Baveja
Assistant Manager—Production: Anuj K Shriwastava
General Manager—Production: Rajender P Ghansela
Manager—Production: Reji Kumar

Information contained in this work has been obtained by McGraw Hill Education (India), from sources believed to be reliable. However, neither
McGraw Hill Education (India) nor its authors guarantee the accuracy or completeness of any information published herein, and neither McGraw
Hill Education (India) nor its authors shall be responsible for any errors, omissions, or damages arising out of use of this information. This work
is published with the understanding that McGraw Hill Education (India) and its authors are supplying information but are not attempting to render
engineering or other professional services. If such services are required, the assistance of an appropriate professional should be sought.

Typeset at Text-o-Graphics, B-1/56, Aravali Apartment, Sector-34, Noida 201 301, and printed at

Cover Printer:
Cover Designer: Kapil Gupta
Organizing Committee

Chief Patrons
Shri. Bebilalji K. Sancheti
Shri. Ajitkumarji S. Surana
Shri. Jawaharlalji S. Abad
Shri. Zumbarlalji H. Bhandari
Shri. Dineshkumarji B. Lodha
Shri. Sunilkumarji M. Chopda
Patron
Prof. M. M. Rathore
Principal, SNJB's Late Sau. K. B. Jain College of Engineering, Chandwad
Advisory Committee
Dr. D. P. Nathe, Joint Director, DTE Dr. Mrs. S. N. Madhekar, COE Pune
Dr. G. K. Kharate, MERC, Nashik Dr. Mrs. A. M. Rajurkar, MGM’s COE, Nanded
Dr. R. Kapuno, Jr., CIT Philippines Dr. R. M. Warkhedkar, Govt. COE, Karad
Mr. Mayur Shah, AMA,USA Dr. N. P. Futane, Govt. COE, Avsari
Dr. R. Kolandaisamy ,Uni. of Malaya Dr. S. V. Bonde, SGGS’s IET, Nanded
Mr. Anirban Haldar, L&T ,Denmark Dr. D. S. Bormane RSCOE, Pune
Prof. Amit Agrawal, IIT Bombay Dr. V. J. Kakhandki, Trinity Academy of Engg, Pune
Prof. S. Balasubramanian ,IIT Bombay Dr. V. J. Gond, G. N. Sapkal COE, Nashik
Dr. D. C. Jinwala, SVNIT, Surat Dr. S. Y. Kute, KKWIEER COE, Nashik
Dr. Upena Dalal, SVNIT, Surat Dr. A. J. Patil, BOS Chairman, NMU, Jalgaon
Dr. S. G. Bhirud, VJTI, Mumbai Dr. S. S. Sane , KKWIEER COE, Nashik
Dr. K. K. Sangale, VJTI, Mumbai Dr. Mrs. V. H. Patil, MCOERC, Nashik
Dr. A. G. Chandak, Consultant, MNRE, GoI Dr. M. U. Kharat, MET, COE, Nashik
Dr. D. G. Regulwar, Govt. COE, Aurangabad Dr. N. G. Bawane, SBJIJMR, Nagpur
Dr. R. K. Shrivastava Govt. COE, Aurangabad Dr. G. K. Patnaik, SSBT COET, Jalgaon
Dr. R. R. Manthalkar, SGGS’s IET, Nanded Dr. P. R. Suresh, NSS COE, Palakkad

Conference Secretary
Prof. Mrs. K. M. Sanghavi, Head, Computer Department
Prof. Dr. V. A. Wankhede, Head, E & TC Department
Prof. P. R. Bhaladhare, Head, IT Department
Prof. U. S. Kasar, Head, MBA Department
Prof. S. B. Chavan, Head, Applied Science Department
Program Director
Prof. Yuvaraj L. Bhirud
Associate Professor, Civil Department,
SNJB's Late Sau. K. B. Jain College of Engineering, Chandwad – 423 101.
Dist. Nasik.(M.S.) India
Website: www.snjbcoe.org
Tel: +91-2556-253750
Fax:+91-2556-253811
Program Committee

Program Committee
Sr. No Committee Name of faculty Departments Roles
1 Program Director Prof. Y. L. Bhirud Civil Engineering Super Chair

Prof. M. A. Mechkul E & TC Engineering Track Chair


Prof. G. S. Pawar E & TC Engineering Track Chair
Prof. H. S. Deore Mechanical Engineering Track Chair
Prof. Y. S. Kulkarni Mechanical Engineering Track Chair
2 Track Chairs Prof. D. S. Rajnor Computer Engineering Track Chair
Prof. A. J. Shakadwipi Computer Engineering Track Chair
Prof. V. K. Wani Information Technology Track Chair
Prof. Mrs. K. R. Nirmal Information Technology Track Chair
Prof. V. M. Pandit Civil Engineering Track Chair
Prof. T. H. Sonawane Civil Engineering Track Chair
Prof. Mrs. D. P. Pawar Computer Engineering Coordinator
Ms. S. B. Memane E & TC Engineering Member
3 Ms. B. S. Lalwani Computer Engineering Member
Reception
Ms. P. D. Randhawane E & TC Engineering Member
Prof. Mrs. M. S. Dhomse Civil Engineering Member
Prof. R. U. Pawar Information Technology Coordinator
Prof. D. D. Aher Civil Engineering Coordinator
Prof. N. C. Mutha Computer Engineering Member
4 Registration Prof. Ms. K. D. Chopra Computer Engineering Member
Prof. V. N. Bagul Civil Engineering Member
Prof. N. K. Sancheti E & TC Engineering Member
Prof. D. D. Sancheti Mechanical Engineering Member
Prof. S. U. Patil Mechanical Engineering Member
Prof. S. D. Sancheti Mechanical Engineering Coordinator
5 Invitation Prof. G. S. Pawar E & TC Engineering Member
Mr. S. Y. Burkule Establishment Section Member
Prof. R. R. Bhandari Computer Engineering Coordinator
Prof. P.N. Achaliya Information Technology Member
Certificate Mr. S. Y. Burkule Establishment Section Member
6 Printing & Kit
Mr. A. S. Mokal Store Member
Selection
Mr. P. D .Bagmar Mechanical Engineering Member
Mr. S. J. Gaikwad Civil Engineering Member
Paper Editing & Prof. G.P. Dhomse Computer Engineering Coordinator
7 Proceeding Prof. P. S. Desai Information Technology Member
Preparation Prof. V. K. Wani Information Technology Member
Prof. Mrs. S. V. Sinha Information Technology Member
Program Committee vii

Prof. Mrs. K. R. Nirmal Information Technology Member


Prof. Mrs. S. A. Chavan Information Technology Member
Prof. P. N. Achaliya Information Technology Member
Prof. A. R. Bramhecha Information Technology Member
Prof. R. U. Pawar Information Technology Member
Prof. R. P. Bafana Information Technology Member
Prof. M. D. Kawade Information Technology Member
Prof. N. V. Sharma Information Technology Member
Prof. Y. K. Desai Information Technology Member
Prof. Ms. S. B. Memane E & TC Engineering Member
Prof. P. D. Randhawane E & TC Engineering Member
Prof. Ms. P. P. Chopda E & TC Engineering Member
Prof. Mutha Hemant E & TC Engineering Member
Prof. R. A. Gawande E & TC Engineering Member
Prof. D. J. Pawar E & TC Engineering Member
Prof. H. R. Thakare Mechanical Engineering Member
Prof. S. U. Patil Mechanical Engineering Member
Prof. P. B. Bagmar Mechanical Engineering Member
Prof. D. D. Sancheti Mechanical Engineering Member
Prof. Y. S. Kulkarni Mechanical Engineering Member
Prof. R. R. Kankaria Mechanical Engineering Member
Prof. S. P. Ingale Mechanical Engineering Member
Prof. D. H. Darekar Mechanical Engineering Member
Prof. R. M. Chandore Mechanical Engineering Member
Prof. S. S. Aher Mechanical Engineering Member
Prof. Ms. R. A. Binayake Civil Engineering Member
Prof. R. S. Sonawane Civil Engineering Member
Prof. H. A. Shirsath Civil Engineering Member
Prof. Mrs. M. S. Dhomse Civil Engineering Member
Mr. S. J. Gaikwad Civil Engineering Member
Prof. A. R. Bramhecha Information Technology Coordinator
Prof. H. A. Shirsath Civil Engineering Member
Prof. P. S. Desai Information Technology Member
8 Accommodation
Prof. R. R. Bhandari Computer Engineering Member
Prof. Nilesh Sharma Information Technology Member
Prof. Ram Gawande E & TC Engineering Member
viii Program Committee

Prof. M. A. Ahire Mechanical Engineering Coordinator


Prof. K. B. Gore Mechanical Engineering Member
Prof. R. A. Geete E & TC Engineering Member
Prof. V. C. Jadhav Mechanical Engineering Member
9 Food Prof. D. H. Darekar Mechanical Engineering Member
Management Prof. S. B. Ambhore Computer Engineering Member
Prof. M. A. Kulkarni Civil Engineering Member
Mr. A. B. Mawal Mechanical Engineering Member
Mr. P. M. Shirsath Civil Engineering Member
Ms. S. B .Jondhale Information Technology Member
Ms. Desai Madhuri Information Technology Member
Prof. S. S. Thakare E & TC Engineering Manager
Prof. Mrs. B. A. Khivsara Computer Engineering Coordinator
Prof. R. R. Bhandari Computer Engineering Coordinator
Prof. Mrs. K. R. Nirmal Information Technology Coordinator
Session Prof. Mrs. S. V. Sinha Information Technology Coordinator
10 Management Prof. Mrs. S. M. Pawar Civil Engineering Coordinator
Prof. P. M. Yeole Civil Engineering Coordinator
Prof. M. A. Mechkul E & TC Engineering Coordinator
Prof. G. S. Pawar E & TC Engineering Coordinator
Prof. R. C. Patil Mechanical Engineering Coordinator
Prof. R. M. Shinde Mechanical Engineering Coordinator

Prof. K. S. Tated E & TC Engineering Coordinator


Prof. Ms. L. R. Lasi MBA Member
Prof. M. D. Kawade Information Technology Member
Prof. N. D. Bhandari MBA Member
Prof. Deepali Pawar Computer Engineering Member
Prof. H. S. Deore Mechanical Engineering Member
11 Stage Prof. H. R. Thakare Mechanical Engineering Member
Management
Prof. H. K. Padmanabhan MBA Member
Prof. Swati Sinha Information Technology Member
Prof. P. M. Bora Mechanical Engineering Member
Prof. Mrs. R. K. Jain Information Technology Member
Mr. S. S. Wadnere Computer Engineering Member
Mr. S. A. Wagh Information Technology Member
Mr. J. G. Rahane E & TC Engineering Member
Mr. A. V. Bhamare E & TC Engineering Member

Publicity- Web Prof. P. N. Achaliya Information Technology Member


12 Site Press Mr. S. Y. Burkule Establishment Section Member
Program Committee ix

Prof. P. M. Bora Mechanical Engineering Coordinator


Prof. R. M. Gavande E & TC Engineering Member
Mr. S. B. Arote Establishment Section Member
13 Transportation
Mr. K. S. Vyas Civil Engineering Member
Mr. S. S. Sonawane Student Section Member
Mr. Pansare Kiran Student Section Member
Mr. S. P. Landge Account Section Coordinator
Mr. S. D. Bafana Account Section Member
Mr. S. V. Thorat Account Section Member
14 Finance
Mr. P. B. Aher E & TC Engineering Member
Mr. R. S. Sonawane Civil Engineering Member
Mr. S. S. Patil Computer Engineering Member
Mr. N. C. Khairnar Mechanical Engineering Member
Prof. P. N. Achaliya Information Technology Member
15 Animation & Prof. H. R. Thakare Mechanical Engineering Member
Design Prof. P. D. Bagmar Mechanical Engineering Member
Prof. V. N. Bagul Civil Engineering Coordinator
16 Post Conference Prof. K. B. Gore Mechanical Engineering Member
Communication Prof. H. A. Shirsath Civil Engineering Member
Mr. M. B. Kedar Library Section Member
Mr. A. S. Mokal Store Section Member
Mr. U. P. Ingle Workshop Section Member
Mr. S. M. Patil Workshop Section Member
Mr. A. R. Desale Workshop Section Member
Mr. S. D. Aher Workshop Section Member
Mr. S. S. Tandale Workshop Section Member
Mr. H. B. Jadhav E & TC Engineering Member
17 Supporting Mr. P. R. Jadhav Computer Engineering Member
Committee Mr. S. J. Gaikwad Civil Engineering Member
Mr. P. N. Jadhav Mechanical Engineering Member
Mr. S. B. Pardeshi Library Section Member
Mr. R. C. Thoke E & TC Engineering Member
Mr. P. J. Bagul Office Member
Mr. S. B. Jadhav Computer Engineering Member
Mr. S. V. Gade Mechanical Engineering Member
Mr. B. V. Nikam Office Member
Mr. N. S. Raut Workshop Section Member
Mr. S. S. Nikam Civil Engineering Member
Mr. S. B. Gangurde Library Section Member
Mr. K. D. Wagh Applied Science Member
x Program Committee

Mr. S. N. Ghuge Office Member


Mr. N. M. Kale Account Section Member
Mr. B. S. Kokande Library Section Member
Mr. K. V. Pawar MBA Member
List of Reviewer E & TC Track

Prof. Anant More (RMD Sinhgad School Of Engineering (RMDSSOE) Warje Pune )

Dr. Sunil Pawar (JNEC Aurangabad)

Prof. Sahebrao Bagal (Late G.N.Sapkal College of Engineering )

Prof. PatangeVishwas (Shree TulajaBhavani College of Engineering Tulajapur)

Dr. Dinesh Chandwadkar (KKWIER Nashik)

Dr.M Satone (KKWIER Nashik)

Prof. Rahul Dhapatkar (PICT Pune)

Prof. DevidasLokhande (Sanjeevani College of Engineering Kopargaon)

Dr. Sunil Morade (KKWIER Nashik)

Prof. Deepak Mishra

Prof. PravinDhulekar (SITRC Nashik)

Dr. Vishal A. Wankhede (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Rajesh K. Agrawal(SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Manoj A. Mechkul(SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Yogita S. Hon(SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Sushilkumar S. Thakare(SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Kavita S. Tated(SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Ganesh S. Pawar(SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. KalpeshK. Bamb (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Prajakta D. Randhawane (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)


List of Reviewer Mechanical Track

Dr. Swarup Bag (IIT Guwahati)

Dr. Satyajit Panda (IIT Guwahati)

Dr. K. Arunkumar (Sri Ramakrishna Engineering College)

Dr .K. Subbaiah (SSN College of Engineering Chennai, Tamil Nadu)

Prof. J. Saiganesh (Kumaraguru College of Technology, Coimbatore, Tamil Nadu)

Dr. Bhaarathi Dhurai (Kumaraguru College of Technology, Coimbatore, Tamil Nadu)

Dr. V. Ramesh Babu (Kumaraguru College of Technology, Coimbatore, Tamil Nadu)

Prof. Gaikawad Nilesh (NDMVP COE Nasik)

Prof. Kawale Prashant ( KKW COE Nasik)

Mr. Prasad Deore (Godrej & Boyce, Mumbai)

Prof. Nitin Ahire (MET BKC Institute of Engineering, Nashik)

Prof. S B Patil (MET BKC Institute of Engineering, Nashik)

Prof. Harshal Chavan (MET BKC Institute of Engineering, Nashik)

Prof. Amol Chaudhari (MET BKC Institute of Engineering, Nashik)

Prof. Rajmal Jain (MET BKC Institute of Engineering, Nashik)

Prof. Shubham Suryawanshi (MET BKC Institute of Engineering, Nashik)

Prof. Sachin Kakade (MET BKC Institute of Engineering, Nashik)

Prof. Vishal Chaudhari (MET BKC Institute of Engineering, Nashik)

Prof. Dhiraj Deshmukh (MET BKC Institute of Engineering, Nashik)

Prof. M. M. Rathode (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. R. C. Patil (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. J.S. Pagar (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. S.D. Sancheti (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. R.M. Sonar (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. R.S. Chaudhari (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. H.S. Deore (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. H.R. Thakare (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. S U Patil (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. P. M. Bora (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)

Prof. Kulkarni Y.S. (SNJB’s LSKBJ COE, Chandwad, Nashik, Maharashtra)


Message from Editor
It gives me immense pleasure to welcome you all for the 5th International conference on
Recent Trends in Engineering & Technology being organized at SNJB’s Late Sau. K. B. Jain college of
Engineering, Chandwad, Maharashtra on 28th -30th April 2016.

The main objective of this conference is to bring academicians, technocrats and researchers
to discuss sunrise technologies in core engineering branches. It also provides a comprehensive
forum to discuss recent advances and futuristic trends in Civil Engineering, Mechanical Engineering,
Electronics and Telecommunication Engineering, Computer Engineering and Information Technology.
This conference would provide the participants a unique opportunity to exchange knowledge and to
identify solutions to global engineering challenges.

I am confident that this conference will provide an ideal opportunity for the delegates to
deliberate on technological challenges and road maps in above said areas. I am sure that this
Conference will ignite the young minds, enrich the experience and benefit the industries with new
emerging possibilities.

I wish all the authors and participants a successful meeting, fruitful interactions with
eminent personalities and an enjoyable stay at Chandwad, India.

Prof. M. M. Rathore,
Principal(I/c),
SNJB’s Late Sau. K. B. Jain College of Engineering, Chandwad.
Message from Program Director
I am delighted to welcome you for the International Conference on Recent Trends in
Engineering & Technology – ICRTET’2016 (April 28-30, 2016). I am very providential to have so
many talented Professors, Scholars and Industry inhabitants implicated in the process of submitting
their research papers. Hard working track chairs and veteran reviewers done their work
enormously. Moreover I am gratified for the publishing support put forth by McGraw Hill
publication. I am thankful to our beloved Principal Prof. M. M. Rathode for his everlasting support. I
also take this opportunity to thanks all Heads of Department and my senior colleagues Dr. M. R.
Sanghavi, Prof. Mrs. K. M. Sanghavi, Dr. V. A. Wankhede, Prof. P. R. Bhaldhare, Prof. R. C. Patil and
Prof. S. D. Sancheti.

A remarkable response is received from all over the world. All the papers are accepted after
stringent review process. This was attributed to very strong technical committee that worked so
hard to make conference advertisement reach to so many aspirants. The strong commitment shown
by all track chairs was stupendous. After submission dead line, they worked very hard to get review
process done from expert reviewers to turn around a very high standard review that led to the
strong technical program before you.

On behalf of ICRTET’2016 organizing committee, we wish to thank all the members


of advisory committee, authors and presenters for their contributions. We would also like to extend
sincere thanks and appreciations to all individuals and organizations those who have supported and
helped us to make this conference a grand success. We also take this opportunity to put sincere
gratitude towards our Management, Administration and all section heads who extended all the
facilities and full cooperation during the preparation phase of the conference. Sincere thanks to
SNJB Team who have been involved directly/indirectly for producing this good quality and
wonderful ICRTET-2016 proceeding publication by McGraw Hill Publication and make this event as a
grant success.

We wish and will be very delighted to see you again in the ICRTET’ 2017.

Bhirud Y. L.
Program Director,
ICRTET’2016
Contents


About ICRTET’2016 ii
Organizing Committee v
Program Committee vi
List of Reviewer E & TC Track xi
List of Reviewer Mechanical Track xii
Message From Editor xiii
Message From Program Director xiv
1 Biomedical Images Hiding Based on Integer Transform 1
RuchitaPatil, Prof. H. T. Patil
2 Content Based Lecture Video Retrieval Using OCR and ASR techniques 7
Anil S.Gavhane,Sachin B. Borse
3 Diabetic Retinopathy Detection using Random Forest 10
J D Labhade , L K Chouthmol
4 Visible light underwater communication using different light sources 15
Pranav Medhekar, Sumeet Mungekar, Vinayak Marathe, Vijay Meharwade
5 Measurement of NPK from PH value 19
Mr. Khakal V.S., Mr. Deshpande. N. M , Mr. Varpe P. B.
6 Rice Grain and Stone Sorting Using ARM 24
Rahul A. Chavhan, Roshan A.Deore, Rahul S. Rathore,Prof. K. S. Tated
7 Design of Fiber-to-the-home (FTTH) Architecture using Flexible WDM-PON for 28
Long Haul Optical Fiber Communication
Jitesh D. Chauhan, Shailesh B. Khant, Mayur R. Parmar
8 Copy Move Image Forgery DetectionTechniques: Survey 34
RakshitaSingh, Mehul Thakkar
9 Foot Step Power Generation Using PIC Microcontroller 38
Manisha B. Kanawade,Amruta N. Jadhav,Rohini B. Jadhav,Prof. Kalpesh K Bamb
10 Removal of over Segmentation Problem in MRI Spine Images Segmentation 43
using Watershed Algorithm
Sandhya Prajapati, Heena R. Kher
11 Feature Extraction of Fingerprints for Brain Mapping 48
Simeen R. Khan, Heena R. Kher
12 For Fiber-to-the-home (FTTH) Architecture using Passive Optical Network 53
(PON): A Review
Jitesh D. Chauhan, Shailesh B. Khant, Mayur R. Parmar
13 A Smart Sensor Interface for Industrial IOT Environment 58
Rohini k.Chaudhari, Dr.B.G.Gawalwad
14 Power factor improvement using Arm11 microcontroller 62
Ravindra.S.Solunke,Prof.M.A.Mechkul
15 Implementation of Sketch Based and Content Based Image Retrieval 67
Prachi A. Gaidhani, Prof. Bagal S. B.
16 Green Building Automation 72
Priyanka A. Pagar, Poonam S.Nikam, Mamata S. Suryawanshi, Dr. V. A.
Wankhede, Dr. Abhay E .Wagh
17 Printed Circular Patch Antenna 77
Priyanka T. Chaudhari
xvi Contents

18 Image Enhancement Techniques for Ultrasound Abdominal Images for the 82


Analysis of Kideny
Prof.Nilkanth Mukund Deshpande, Prof.Vikas Shivaji Khakal
19 Design of H Shaped Antenna 87
Sandip U.Patil
20 Design of ALU Using Reversible Logic Gates 93
Ramprasad M. Gawande, Vishal A. Wankhede
21 Removal of Ocular Artifacts From electro-Encephalogram by Adaptive Filtering 97
and Independent Component Analysis
Mangesh G. Tuplondhe, Rajesh K. Agrawal
22 Up gradation of Supfina Grinding Machine from Siemens (S5) PLC to Fanuc 102
CNC
Prasad R. Darwade,Priyanka A. Sali, Kalyani S. Jadhav
23 Automated Oiling System For Engine Assembly 108
Manish K. Jain, Nikhil G. Kothari, Mahesh R. Surana
24 Prototype Of Fingerprint Based Licenincing System For Driving 112
Shubham S Jain, Chinmay M Jain , Yatin R Kasliwal
25 Adaptive Traffic Signalling System 117
Mayuri R. Jain,Ashvini V. Khairnar, Himani N. Shah, Prof. M. A. Mechkul
26 Lung Cancer Analysis by Quality Measures 121
Vaishnaw G. Kale
27 ZIGBEE Based Wireless Sensor Node Design using FPGA for Fire Monitoring 126
and Control
Shital S. Gangurde, Kavita S. Tated
28 IoT Based Water Quality Monitoring 130
Poonam J. Chavan, Manoj A. Mechkul
29 Data Transmission Through Visible Light 135
Harshada Deore , Priyanka Khandelwal, Supriya Bogawat
30 Design of Automated Tablet Filling and Counting Machine 138
Krishna.N.Goverdhane,Nitesh.M.Sasne , Tushar .B.Kamankar
31 PIC Microcontroller based Efficient Baby Incubator 142
Divya S.Patil,Amita S.Aher, Aditya S. Nahata
32 An Effective Wind Energy System based on Buckboost Controller 146
Ansari Nabila AAH, Prof. R.K. Agrawal
33 Design of FPGA’s High Speed Configurable Logic Units 152
Gayatri Duberkar, Prof. Y. S. Hon
34 Automatic Ambulance Rescue System 156
Miss.Vidya L. Desale, Mr.Sagar E. Pansare, Mr.Rahul S. Lahane
35 An Embedded System Based Agricultural Spraying Robotic System 160
Aditya Jain1, Dr. Vishal Wankhede
36 Matlab Controlling Colour Sensing Robot 164
Dhiraj S.Dhondage,Kiran N.Nikam, Tejashri P.Suryawanshi,Dr. V. A. Wankhede,
Dr.Abhay E .Wagh
37 Resolving Vehicle Emissions in Cities by maximum spanning Tree Algorithm 168
based on Internet of Things
Priya Y. Bhore, Prof. M.A.Mechkul
38 Temperaments In The Design of Low-voltage Low-power Double Tail 173
Comparator
Gaurav Joshi, Vishal Wankhede
Contents xvii

39 Ultra Wideband Slotted Antena Analysis with Different Parameter 177


Prof. R. G. Gupta, Prof. K. A.Wadile, Prof. L. P. Bhamare, Prof. D. A. Doshi
40 Estimation of Shelf Life Of Mango and Automatic Separation 181
Dhananjay Pawar, Dr. Vishal Wankhede
41 SMART BLIND WALKING STICK 186
Vipul V. Nahar, Jaya L. Nikam, Poonam K. Deore
42 Wireless Smart Metering System 189
Ashwini B. Waghchaure, Kavita S .Tated
43 Review on Efficiency Improvement in Bufferless NOC 193
Sonali Vilas Jadhav, Prof. Miss Yogita Hon
44 Implimentation Of Multiplication Algorithm Using Vedic Multiplication: A 197
Review
Oswal S.M, Hon Y.S
45 Hybrid Driver Safety Vigilance and Security System for Vehicle 202
Sunil Pimpare
46 Development of Embedded PLC with the application of Irrigation System 207
Purva N. Authankar, Manoj A.Mechkul
47 Design and Implementation of CAN based Automobile Control System 214
Nakade M. J., A. A. Somani
48 Touchscreen Based Character Interpretation Plotter 219
Manish Patil,Siddhant Chaskar, Vivek Mahalpure
49 A Literature Survey on Character Recognition of Indian Scripts for New 224
Researchers
Bamb Kalpesh K.
50 Image Enhancement For Satellite Image 230
Shital G. More, Lata K. chouthmol
51 Some Studies on Machined Surface Integrity in Precision Turning of Nylon 234
K. A. Jagtap, A. G. Waghulde, S. A. Kulkarni, S. P. Muley and P. G. Kochure
52 Factors Affecting Surface Finish of Abrasive Water Jet Machining - A Review 239
K. Arunkumar, M. Navaneethbalaji, G. Praveenkumar, R. Venkatesan
53 Design and Analysis of Oil Seal Finishing Machine 244
Mr. V. R. Panchal, Mr. V. U. Dharane, Mr. S. S. Pande, Mr. M. A. Kala, Prof. H. S.
Deore
54 Springback Prediction Analytical Model for V-Bend Process 249
Sumit A. Paithankar, Prof. B. V. Varade
55 Failure Analysis of A Helical Compression Spring 254
Amitesh, Prof. V. C. Kale, Prof. K. V. Chandratre
56 Stress Analysis of Connecting Rod of Two Wheelers 259
Mahesh Nikam, Rahul Vishwakarma, Nishank Parab, Rahul Nikam
57 Furnace Nozzle Cleaning Standardization 263
Magdum Manoj, Shukla Tushar, Khated Aniket
58 Treadmill Bike 266
Adeel Ansari, Noman Raza, FarooquiSameer, Zohaib Shaikh, Prof. Arshad Rashid
59 Study of Sloshing Phenomenon in an Automotive Irregular Shaped Fuel Tank 271
Using CFD
Vilas P. Ingle, M. V. Shetty, S. M. Chopda
60 Design of Head Light Moving Mechanism With Steering 279
Mangesh A. Jadhav ,Tushar S.Borkar, Nilam B. Narote, Pratik D.More, Rajendra
S. Chaudhari
xviii Contents

S. Chaudhari
61 Health Monitoring and Fault Diagnosis of Gearbox 285
Raghavendra Rajendra Barshikar, Amol Bharat Varandal, Nitin Bapurao Ahire
62 Performance Analysis Of Multi Chamber Reactive Silencer For Different 290
Configurations Of Tuning Chamber For Acoustic Control
Sameer S. Shaikh
63 Performance of Diesel Engine with Jatropha Biodiesel Blends 294
Amol Bharat Varandal ,RaghavendraRajendra Barshikar,NitinBapurao Ahire
64 Transmission Noise and Gear Rettle in Automotive Driveline 299
Tejaswini Kulkarni, Sudhir Takalkar, Digambar Chaudhari
65 Development of Lateral Cock Valve Considering its Needs and Problems Using 304
3D Printing Technology
Shirsath P.S, Suryawanshi S.R
66 Design of Stationary IC Engine’s Exhaust Valve and Optimization Based on 309
Finite Element Analysis
Snehal S.Gawale, Dr.S.N.Shelke, Prof.M.A.Ahire
67 A Review on Corrosion Behavior of Duplex Stainless Steel in Severe Working 314
Condition
A. Y. Chaudhari, S. K. Dahake, D. D. Deshmukh
68 Application of Different Cutter Materials in Gear Hobbing to Improve the 319
Productivity
S. V. Shewale, Prof. S. R. Suryawanshi
69 Study on Development of Rotary Desiccant Dehumidification from Air 324
Conditioning Point of View
Dipak A Warke, Dr. Samir J Deshmukh
70 Effect of Castor Oil as Bio Lubricant on Tribological Characteristics of EN31 330
Steel
Manik S.Nathe, Prof.V.L.Kadlag, Prof.V.P.Chaudhari
71 Development and Fabrication of Sheet Metal Cutting Machine Using 335
Pantograph Mechanism
Mr. Bhor Akshay Ramhari, Mr. Churi Vishal Madhukar, Mr. Shinde Avinash
Haribhau, Mr. Chaudhari Bhushan Bhagwant, Prof. V. P. Chaudhari
72 Autoclaved Aerated Concrete (AAC) Solar Cooker 340
Baviskar Pratiksha, Desale Rashmi, Deshmukh Shweta, Gaikwad Diksha Prof.Dr.
Sanjeev Suraywanshi
73 An experimental and numerical study of thermal performance of a radial heat 344
sink under natural convection
Mangesh D. Shende, Dr. Ashish Mahalle
74 To Avoid the Bursting of Distributor Pipe and Base Structure by Using Analysis 352
Nitin B. Ahire, Raghavendra R. Barshikar Amol B. Varandal
75 Design Modification and Analysis of Electrically Operated Screw Jack for Light 357
Motor Vehicles
Shashikant A. Pekhale, Prof. S. V. Karanjkar
76 Design & Fabrication of Automatic-Pneumatic Pipe Cutting Machine 363
Mr. Pandit Mandar Bipinchandra, Mr. Pathan Arfat Sherkhan,Mr. Kasar Pavan
Prakash, Mr. Gajbhar kunal prakash. Guide:- Prof. V. P. Chaudhari
77 Study of Automotive Manufacturing and Material Handling Systems for 367
Assembly Line Simulation: A Research Perspective
J.H.Bhangale, Dr. A. M. Mahalle
Contents xix

78 Analysis and Inverse Design using Computational Fluid Dynamics 380


Raju Kumar, Avinash Kumar, Dr. K. B. Waghulde, H.D.Chaudhari
79 Design of Multi sliding Tool to Increase in Productivity of Lock Plate- A Review 388
Sagar R. Ghuge Sachin P. Kakade
80 Design Of Delinter Machine Grate for High Removal Lint- A Review 393
Pramod R. Mahale, Dinesh P. Panchve
81 “Tie Rod Analysis Using FEA and use of buttress & acme threads”Tie rod 398
analysis in automobile
Prof. Saiprasad R.Mandale, Prof. Arshad Rashid, Prof. Karan Sharma
82 Modification of Grub Screw and Cam Plate for Reduction of Failure in PMC 403
Threading Machine
Sujoy Deb Barma, Ravi Kumar, Atul Kashyap, Donel Patel, A. Y. Chaudhari
83 Improving Stereolithography Resolution 408
Yogesh D. Patil, Richa A. Patil, Prof. N. S. Chandrashekhar
84 Microstereolithography: Concepts and Methods 413
Richa Patil, Yogesh Patil, Prof. N. S. Chandrashekhar
85 Numerical Analysis of Fluid Flow Induced Vibration of Pipes – A Review 419
Amol E. Suradkar, Shubham R Suryawanshi
86 Review: SWOT Function Deployment To Maintenance Strategy 424
Dhanshri B. Pawar, Prof. Pradyumna M. Bora
87 Indian Energy Scenario and Role of Renewable Sources for Sustainable 429
Development
Yogesh kulkarni,Jitendra Satpute, Nikhil Purwant
88 Exergy Analyses of Irreversible Cycle 434
Mahesh M. Rathore, Yogesh S. Kulkarni
89 A Review on Internally Cooled Liquid Desiccant Air Dehumidifier 441
Jignesh R Mehta, Niyati M Shah, Krunal N Patel
90 FEA of Titanium Helical Gear Set 447
Vinaykumar C. Jadhav Rahulkumar M. Sonar, Santosh D. Sancheti
91 Design and Manufacturing of Bicar 457
Prof. Prashant Bagmar, Prof. Dahake Sachin
92 Design of Pneumatic Circuit for Automatic Circular CO2 Welding Machine 461
Kalyani P Dhage Harshal A Chavan
93 CO2 Welding Process Optimization by using SPM 465
Harshalkumar Gangurde Harshal A Chavan
94 Numerical Modelling of Friction Stir Welding- A Review 471
Harshal Deore, Devendra Deore, Rajendra Chaudhari
95 Vibration Analysis of Propeller Shaft of Automotive 475
Ganesh Jadhav,Rushikesh Mhaske, Pritam Chavanke, Amol Wabale, Chaudhari
R. S.
96 Design and Fabrication of ‘SPM’ to Check Welding Strength of Shock Absorber 479
Outer Tube
Dipak D. Sancheti, Sandip B. Patil
97 Review of Leak Detection Methods for Shock Absorber:A Comparative Study of 484
Techniques
Dipak D. Sancheti, Sandip B. Patil
98 Optimization of Turning Parameters for Better Surface Finish and Material 489
Removal Rate on EN9: A Literature Review
Sharad K. Nirgude, Amol Y. Chaudhari
Biomedical Images Hiding Based on Integer
Transform
RuchitaPatil1, Prof. H. T. Patil2
1
Dept. of Instrumentation Engg., M.E., Cummins COE, Pune, ruchita.patil0702@gmail.com1
2
Dept. of Instrumentation Engg., Professor, Cummins COE, Pune, harish.patil@cumminscollege.in2

Abstract—In this paper, a currently projected steganography is the approach of hiding confidential facts
within any disclosure. Steganography and cryptography are two techniques these are similar in the way that
they both are used to safeguard private facts. But because of deficiency in characteristic of original image we
recommend a generalized form of Reversible Contrast Mapping (RCM) is a in complex integer transform that
applies to pairs of pixels. RCM is invertible procedure, because even if the least significant bits (LSBs) of the
transformed pixels are forfeit. The data space occupied by the LSBs is expedient for biomedical images
hiding. The embedded biomedical information bit-rates of reversible watermarking scheme are highest bit-
rates till date. The scheme does not require additional data compression, and, in terms of mathematical
complexity, it comes into sights to be the lowest complexity one proposed up to now. A very fast lookup table
exercise is recommended. Also robustness against cropping can be guaranteed.
Keywords-Copyright protection; data compression; distortion control; information hiding;least significant
bit; LSB embedding;pixel pairs; reversible contrast mapping.

I. INTRODUCTION
Reversible contrast mapping (RCM) is one of the easy integer transform procedure that is applied to
the pairs of pixels which can be row wise or column wise. RCM having the high embedding bit rate and the
other benefit is it is having low mathematical complexity. Effective adaptation over previously scheduled RCM
is suggested here that offers a better trade-off in optical quality-embedding rate-security of the hidden
biomedical data. For reversible watermarking the paths proposed so far incorporate a lossless data compression
stage. The benefit of a convoluted data compression stage upturn the mathematical complexity of the
watermarking. In this paper, we discuss a contrast mapping procedure which is reversible watermarking
technique that gain high data embedding bit rate beyond any additional data compression stage. This proposal
is based on the reversible contrast mapping (RCM), a walkover integer transform defined on pairs of pixels.
RCM is the invertible procedure, because there is no effect on this procedure though least significant bits
(LSB) of the pairs of pixel are misplaced. The data space confiscation by the LSBs is reasonable for biomedical
data concealing. Here, a mutated translation that admits robustness in opposition to cropping is proposed.
Contrast mapping procedure having very low mathematical complexity. Finally, RCM system is correlate with
difference expansion system with respect to the bit rate hiding volume and to the mathematical complexity.

II. BIOMEDICAL DATA HIDING SCHEME

Let [0, M] be image graylevel spectrum (M=255 for eight-bit graylevel images), and let (u, v) be a pair of
pixels.

FORWORD TRANSFORM STEP-

For forward transform use below variables

u‟=2u-v, v‟=2v-u (1)


2 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

For preventingoverflow and Under flow policy, the transform is confined to below levels

0<= 2u-v<=M (2)

0<= 2v-u<=M

INVERSE TRANSFORM STEP-

Inverse transform procedure is shown by

u= [2/3 (u‟) + 1/3(v‟)] (3)

v= [1/3 (u‟) + 2/3(v‟)]

If u‟ and v‟ are not swapped, even without the ceil functions, exactly inverts. Using image watermarking
technique, the LSBs of u‟, v‟ are obscured. Let the LSBs of u‟ and v‟ set to “0”. It without delay make the
LSB of a‟ was “1,” the values in the middle the ceil functions for the summing of u and v decrease with 2/3
and 1/3, respectively. Likewise, if the LSB of v‟ was “1,” the coterminous standards downturn with 1/3 (for
the calculation of u) and 2/3 (for the performing arithmetic of v). Omitting when both LSBs are “1,” the ceil
function recapture the flawless executions. Odd integer number measures by using LSB of “1”. From, this
measure it tracks that (u‟, v‟) are both odd numbers only if (u, v) are odd numbers, too. D be the odd pairs set.
Here u‟+ v‟= u+ v and u‟-v‟=3(u-v), respectively in this manner. RCM having the graylevel averages.
Consequently, image contrast increases is stated here.

Figure 1. Flow for embedding and extraction process.

III. INTEGER TRANSFORM MAPPING


At detection of the LSBs we get the, the LSB of the first pixel of exclusive pair is used to manifest if a pair
was transformed or not is showing here: “1” for transformed pairs and “0” otherwise described here.
The inverse transform contrast mapping deteriorates to recoup the pair of pixels with odd values like
(u, v) D. In unmasking procedure, set both the LSBs to “1” and keep account (2). If (2) are delighted, this
pair was constituted of odd pixels here. For deflecting decoding uncertainties, certain odd pixel pairs should
be phase out, those pairs stationed on the borders of D. The pairs prone to ambiguity are commencing by
answering in odd numbers the calculations: 2u-v=1, 2v-u=1,2u-v=M and 2v-u=M. When M=255, then 170
pairs are presented here.
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 3

IV. INTEGER TRANSFORM FUNCTION

Here entire image divides into pairs of pixels like we can say that (for specimen, on rows, on columns is
used here in RCM method).

1) For each pair (u‟, v‟) of pixels we go through the following conditions like we can say that here:
a) (u, v) D if this is not an adjunct of odd pixel integrity, change this pair by means of the (1), fixed the
LSB of u‟to “1,” and consider the LSB of v‟ as procurable for data embedding fashion is stated here.

b) If (u, v) D and if it is adjunct of odd pixel values, set the LSB of u to “0,” and revolve the LSB of v as
procurable for data embedding fact is stated here.

c) If, (u, v) D then in this fact fixed the LSB of u to “0,” and save the true value for further for
consideration here.

V. STEGANOGRAPHY PROCESS HOW WORKS


Steganography is the craft of concealing information in ways that restrict the detection of unseen
messages. It has usage in various fields like in military, diplomatic, personal and intellectual property
applications. In this paper steganography is explored from its earliest instances through potential future
utilization.
Following elements are needed to conceal information into a media which can be any type like text, image
etc.:
1) The hidden information in the cover media(C).
2) The text like account number, password, image or any type of data be the Secret message (M).
3) The steganography function (Fg) and its inverse (Fg-1).
Above steganography elements operates as shown in below steganographic operation diagram: -

Figure 2. Steganographic operation.

Hiding a secret message into a digital image is most widely technique today. The brightness and Chroma
etc. components digitally expressed in terms of 1‟s and 0‟s.
Digital image in bitmap format as well as the compressed image format like JPEG, this procedure can be
directly applied. The carriers of the unseen messages are the LSB of encoded Discrete Cosine Transformation
(DCT) components.
Above procedures details is elaborated in below section:Bitmap format‟s modification of LSB of a cover
image.In this approach, in LSBs of each pixel, binary equivalent of the message. Let‟s see we will attempt to
conceal the character of „A‟ into an 8-bit color image.
4 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

Figure 3. Pixel of an image described by 8-bit binary numbers

From top left corner of the image take eight consecutive pixels here. Those pixels equivalent binary bit
pattern may be like this we can say: -

00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111

Then each bit of binary equivalence of letter 'A' i.e. 01100101 are copied serially (from the left hand side) to
the LSB's of equivalent binary pattern of pixels, resulting the bit pattern will become like this: -

00100110 11101001 11001001 00100110 11001000 11101001 11001000 00100111

While at the discovery end extract the last bit of every pixel to get the equivalent binary impression of unseen
data.

Masking procedure can be used to perform this movement. Mask the data with 0x1 so that we can get the last
bit of each pixel. The mask procedure is as follows -

00100110& 00000001 = 0

11101001& 00000001 = 1

11001001& 00000001 = 1

00100110& 00000001 = 0

11001000& 00000001 = 0

11101001& 00000001 = 1

11001000& 00000001 = 0

00100111& 00000001 = 1

In this way unseen data 'A' i.e. 01100101 can be extracted.By using steganography method we cannot
get the original image pixel values in the decoding procedure so that this method becomes the vulnerable to
attacks. But we can get the secret image data as it is. So by comparing Steganography method with the RCM
we get best result by using the method RCM.

VI. PROPOSED INTEGER TRANSFORM WORK

The PSNR block computes the peak signal-to-noise ratio, in decibels, between two images. This ratio
is often used as a quality measurement between the original and a compressed image. The higher the PSNR,
the better the quality of the compressed or reconstructed image.
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 5

The Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR) are the two error metrics used to
compare image compression quality. The MSE represents the cumulative squared error between the
compressed and the original image, whereas PSNR represents a measure of the peak error. The lower the
value of MSE, the lower the error. To compute the PSNR, the block first calculates the mean-squared error.

Figure 4. Carrier biomedical images sized 512*512.

Figure5. Secretbiomedical images sized 50*50.

Figure6. Encoding process by integer transform method.


VII. CONCLUSION

This paper examines a spatial domain reversible watermarking providing high biomedical data or images
embedding bit-rate at a very low mathematical complexity. As there is loss in quality of original biomedical
image by steganography we propose a Reversible Contrast Mapping (RCM) is a simple integer transform that
6 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

applies to pairs of pixels. The proposed scheme does not need additional data compression. In Reversible
Contrast Mapping there is no loss in quality of original biomedical image. In terms of mathematical
complexity, the proposed reversible watermarking appears as being the lowest complexity scheme proposed
so far. The computational complexity is reduced for both coding and decoding by using LUT access for each
pair of pixels and some low complexity bit manipulation. This makes our scheme very appropriate for real-
time applications. Finally, by distributing the location map and by storing the saved true values close to the
corresponding pixel pairs, the RCM scheme provides robustness against cropping.

REFERENCES

[1] Dinu Coltuc and Jean-Marc Chassery, “Very Fast Watermarking by Reversible Contrast Mapping”, IEEE SIGNAL
PROCESSING LETTERS, vol. 14, pp. 255–258, Apr. 2007.
[2] Gouenou Coatrieux, Wei Pan, Nora Cuppens and Christian Roux, “Reversible Watermarking Based on Invariant
Image Classification and Dynamic Histogram Modification,” IEEE Tran. on Information Security, vol. 8, pp. 111–
120, Jan. 2013.
[3] Seung-Won Jung, Le Thanh Ha, and Sung-Jea Ko, “A New Histogram Modification Based Reversible Data Hiding
Algorithm Considering the Human Visual System,” IEEE Signal Process. Lett., vol. 18, pp. 95–98, Feb. 2012.
[4] Bo Ou, Xiaolong Li, Yao Zhao, Senior Member, Rongrog Ni and Yun-Qing Shi, “Pairewise Prediction-Error
Expansion for Efficient Reversible Data Hiding,” IEEE Image Process. Lett., vol. 22, pp. 5010–5021, Dec. 2013.
[5] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari and Wei Su, “Reversible Data Hiding,” IEEE Trans. Circuits and
Video. Lett., vol. 16, pp. 354–362, Mar. 2006.
[6] Xinpeng, Shanghai, “Separable Reversible Data Hiding in Encrypted Image,” IEEE Trans. Informaion Forensics.
Lett., vol. 7, pp. 826–832, Apr. 2012.
[7] Lingling An, Xinbo Gao, Xuelong Li, Dacheng Tao, Cheng Deng and Jie Li, “Reversible Data Hiding,” IEEE
Transactions on image processing., vol. 21, pp. 3598–3611, Aug. 2012.
Content Based Lecture Video Retrieval Using
OCR and ASR techniques
Anil S.Gavhane1,Sachin B. Borse2
1
PG Student, Department of ETC Engineering, Kalyani Charitable Trust’s- Late G. N. Sapkal College of Engineering.
2
Assistant Professor, Department of ETC Engineering, Kalyani Charitable Trust’s- Late G. N. Sapkal College of Engineering.

________________________________________________________________________________________________________

Abstract- The conventional video retrieval is based on available data such as speech recognition using voice of
person. In this paper we present the approach of System Automated video indexing and video search in large lecture
video archives. Lecture videos contain text information in the visual as well as audio channels the presentation slides
and lecturer's speech. To extract the visual information, we apply video content analysis to detect slides and (OCR)
Optical Character Recognition to obtain their text and (ASR) Automatic Speech Recognition is used to extract
spoken text from the recorded audio. By applying video Optical Character Recognition (OCR) technology on key-
frames and Automatic Speech Recognition (ASR) on lecture audio tracks, we extract textual metadata. For keyword
extraction, by which both video- and segment-level keywords are extracted for content-based video browsing and
search, the OCR and ASR transcript as well as detected slide text line types are adopted.
Keywords- video retrieval; system automated; visual information; textual metadata; content based
______________________________________________________________________________

I. INTRODUCTION

Access video independent of time and location, a number of universities and research institutions
are taking the opportunity to record their lectures and publish them online for students. On the Web, there
has been a huge increase in the amount of multimedia data. To find desired videos without a search
function within a video archive, for a user it is nearly impossible. Due to the rapid development in
recording technology, improved video compression techniques and high-speed networks in the last few
years its becoming very popular in universities to capture and record live presentations of lectures. E-
lecturing is used so that students would be able to quickly access and review their required presentations
independent of location and time. As a result, there is a huge increase in the amount of multimedia data on
the Web. Hence it becomes nearly impossible to find desired videos without a search function within a
video data. Also when the user found related video data, it is still difficult for him to judge whether a
video is useful by only glancing at the title and other global metadata which are often brief and high level.
By applying appropriate analysis techniques, we extract metadata from visual as well as audio resources
of lecture videos automatically. Which can guide both visually and text-oriented users to navigate within
lecture video, for evaluation purposes we developed several automatic indexing functionalities in a large
lecture video portal. To verify the research hypothesis and to investigate the usability and the
effectiveness of proposed video indexing features, we conducted a user study intended. For slide video
segmentation and apply video OCR to gather text metadata, for visual analysis, we propose a new method.
Furthermore, lecture outline is extracted from OCR transcripts by using stroke width and geometric
information. search function has been developed based on the structured video text. Which fills the gap in
open-source ASR domain; we propose a solution for automatic German phonetic dictionary generation.
The dictionary software and compiled speech corpus are provided for the further research use.
8 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

II. SYSTEM ANALYSIS

For visual analysis, we propose a new method for slide video segmentation and apply video OCR to
gather text metadata. Furthermore, lecture outline is extracted from OCR transcripts by using stroke width
and geometric information. A more flexible search function has been developed based on the structured
video text.We propose a solution for automatic German phonetic dictionary generation, which fills the gap
in open-source ASR domain. The dictionary software and compiled speech corpus are provided for the
further research use. In order to overcome the solidity and consistency problems of a content-based video
search system, we propose a keyword ranking method for multimodal information resources. In order to
evaluate the usability, we implemented this approach in a large lecture video portal. Fig. 1 shows the
workflow of system.The developed video analysis methods have been evaluated by using compiled test
data sets as well as opened benchmarks. All compiled test sets are publicly available from our website for
the further research use.

Fig. 1 System Architecture.

2.1 Content-Based Video Search

Several content-based video search engines have been proposed recently. Adcock et al. proposed
a lecture webcast search system in which they applied a slide frame segmenter to extract lecture slide
images. The system retrieved more than 37.000 lecture videos from different resources such as YouTube,
Berkeley Webcast, etc. The search indices are created based on the global metadata obtained from the
video hosting website and texts extracted from slide videos by using a standard OCR engine. Since they
do not apply text detection and text segmentation process, the OCR recognition accuracy of their approach
is therefore lower than our system’s. Furthermore, by applying the text detection process we are able to
extract the structured text line such as title, subtitle, key-point, etc., that enables a more flexible search
function. In the CONTENTUS project, a content based semantic multimedia retrieval system has been
developed. After the digitization of media data, several analysis techniques, e.g., OCR, ASR, video
segmentation, automated speaker recognition, etc., have been applied for metadata generation. An entity
recognition algorithm and an open knowledge base are used to extract entities from the textual metadata.
As mentioned before, searching through the recognition results with a degree of confidence, we have to
deal with the solidity and the consistency problem. However the reviewed content-based video search
systems did not consider this issue. A lot of content for tele-teaching portals was produced in the last
decade. But metadata to filter and search through the content was not generated adequately. That is why it
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 9

is a new challenge to find solutions how to filter the large amount of data with a small base of metadata
available. To engage the user community to generate metadata is one option. Due to the small size of tele-
teaching user communities this approach needs to be enhanced with automatic methods. This paper
describes community rating and tagging as two widely used social web functionalities and motivates their
usage in the tele-teaching context. Furthermore approaches to extend and enhance this user-generated
meta- data are explained. The potential of other social web features is explained afterwards. Finally the
need to activate more users and the opportunity to connect the social with semantic web features in tele-
teaching are motivated.

2.2 Video OCR for Lecture Videos

Texts in the lecture slides are closely related to the lecture content, can thus provide important information
for the retrieval task. In our framework, we developed a novel video OCR system for gathering video text.
For text detection, we developed a new localization verification scheme. In the detection stage, an edge-
based multi-scale text detector is used to quickly localize candidate text regions with a low rejection rate.
For the subsequent text area verification, an image entropy-based adaptive refinement algorithm not only
serves to reject false positives that expose low edge density, but also further splits the most text- and non-
text-regions into separate blocks. Then Stroke Width Transform (SWT) -based verification procedures
are applied to remove the non-text blocks. Since the SWT verifier is not able to correctly identify special
non-text patterns such as sphere, window blocks, garden fence, we adopted an additional SVM classifier
to sort out these non-text patterns in order to further improve the detection accuracy.

III. CONCLUSIONS

Video retrieval automatically, we developed a video OCR system and applied ASR
technology.The segment- and video-level keywords are further extracted from OCR and ASR transcripts
by extending the original TFIDF algorithm. We proposed a novel concept for content-based video search
systems. A user study was conducted to investigate the effectiveness of proposed indexing methods. As
future work, we will implement the proposed video search function in our lecture video portal. As the
future work, the usability and utility study for the video search function in our lecture video portal will be
conducted. Automated annotation for OCR and ASR results using Linked Open Data resources offers the
opportunity to enhance the amount of linked educational resources significantly.

REFERENCES

[1] H. Sack and J. Waitelonis, “Integrating social tagging and document annotation for content-based search in
multimedia data,” in Proc. 1st Semantic Authoring Annotation Workshop, 2006.
[2] C. Meinel, F. Moritz, and M. Siebert, “Community tagging in tele-teaching environments,” in Proc. 2nd Int.
Conf. e-Educ., e-Bus., e-Manage. and E-Learn., 2011.
[3] S. Repp, A. Gross, and C. Meinel, “Browsing within lecture videos based on the chain index of speech
transcription,” IEEE Trans. Learn. Technol., vol. 1, no. 3, pp. 145–156, Jul. 2008.
[4] A. Haubold and J. R. Kender, “Augmented segmentation and visualization for presentation videos,” in Proc.
13th Annu. ACM Int. Conf. Multimedia, pp. 51–60 2005.
[5] W. H€urst, T. Kreuzer, and M. Wiesenh€utter, “A qualitative study towards using large vocabulary automatic
speech recognition to index recorded presentations for search and access over the web,” in Proc. IADIS Int. Conf.
pp. 135–143,2002,.
[6] C. Munteanu, G. Penn, R. Baecker, and Y. C. Zhang, “Automatic speech recognition for webcasts: How good is
good enough and what to do when it isn’t,” in Proc. 8th Int. Conf. Multimodal Interfaces, 2006.
[7] S. Repp, A. Gross, and C. Meinel, “Browsing within lecture videos based on the chain index of speech
transcription,” IEEE Trans. Learn. Technol., vol. 1, no. 3, pp. 145–156, Jul. 2008.
Diabetic Retinopathy Detection using Random Forest

J D Labhade 1, L K Chouthmol2
1
E&TC (Signal Processing) Department, SKH Late G N Sapkal COE, Anjaneri, Nasik, jyoti.labhade@gmail.com
2
E&TC (Signal Processing) Department, SKH Late G N Sapkal COE, Anjaneri, Nasik, lata_51105@rediffmail.com

Abstract- A great challenge in the biomedical engineering is the non-invasive assessment of the physiological
changes occurring inside the human body. Specifically, detecting the abnormalities in the human eye is extremely
difficult due to the various complexities associated with the process. Retina is the significant part of the human eye
which can reflect the abnormal changes in the human eye. Hence, retinal images captured by digital cameras can be
used to identify the nature of the abnormalities affecting the human eye. Retinal image analysis has gained sufficient
importance in the research arena due to the necessity for disease identification techniques. Abnormality detection
using these techniques is highly complex since these diseases affect the human eye gradually. Conventional disease
identification techniques from retinal images are mostly dependent on manual intervention. Since human
observation is highly prone to error, the success rate of these techniques is quite low. Since treatment planning
varies for different abnormalities, the accuracy of the identification techniques must be significantly high. Lack of
accuracy in these techniques may lead to fatal results due to wrong treatment. Hence, there is a significant necessity
for automation techniques with high accuracy for retinal disease identification applications. One of the techniques
used in this paper is Random Forest with and without sampling. With sampling the accuracy is increased and is
74.93% and without sampling it is 52.05%.
Keywords- Diabetic Retinopathy (DR), microaneurysms, hemorrhage, hard exudates, soft exudates, sensitivity,
specificity, accuracy.
I. INTRODUCTION

Figure 1 Normal Eye and Diabetic Retinopathy


Diabetic retinopathy occurs in patients suffering from diabetes, which causes damage to the retina
of the eye. This eventually leads to total vision loss. Diabetes is caused due to the body’s inability to store
and make use of the sugar level in the blood .Usually there are no early visible symptoms of the disease
and as the disease progresses the presence of micro aneurysms, exudates both hard and soft and new
blood vessels can be observed. The main anatomical features in the image, notably the optic disc and the
macula. The optic disk is a circular shaped anatomical structure with a bright appearance. The fovea is the
very center of the macula, the site of our sharpest vision. The diabetes may cause abnormalities in the
retina (diabetic retinopathy), kidneys (diabetic nephropathy), and nervous system (diabetic neuropathy).
The diabetes is also a major risk factor in cardiovascular diseases. The diabetic retinopathy typically
begins as small changes in the retinal capillaries.
Diabetic retinopathy is of two types namely non proliferative and proliferative type. Non
proliferative is the early stage of the disease characterized by the presence of micro aneurysms. As the
disease progresses the retina is deprived of oxygen and new blood vessels are formed in the retina. These
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 11

vessels eventually leak and leads to clouding vision. The first detectable abnormalities are
mircroaneurysms (Ma) which are local distensions of the retinal capillary and which cause intraretinal
hemorrhage (H) when ruptured [7] [8]
Micro aneurysms are small red dots on the retinal surface, which occur due to capillary occlusion
leading to lack of oxygen and progression of the disease. They are less than the diameter of the optic vein
.Accumulation of proteins and lipids occur in the form of exudates. Vision loss occurs when they occur in
the macula.
Exudates appear as yellow or white structures in the retina. There are two types of exudates based
on their appearance and occurrence. Hard exudates have well defined boundaries and the soft exudates
have unclear boundaries also know as cotton wool spots.
Haemorrhages in the retina occur due to bleeding. Dot haemorrhages lie deep within the retina
and reflect leakage of the veins and capillaries. Dot haemorrhages are an indication of diabetic
retinopathy.
II. LITREATURE REVIEW
Some of the first automated detection methods for diabetic retinopathy were published by
Baudoin et al. [1] to detect microaneurysms from fluorescein angiograms. By using a morphological top-
hat transform with linear structuring element at different orientations small round shaped microaneurysms
were distinguished from connected elongated structures such as vessels. Although the top-hat transform
was very sensitive to microaneurysms, it introduced too many false alarms. Spencer et al. [2] exploited
this feature and used the top-hat transform to produce candidate microaneurysms. The true
microaneurysms were then pruned by using post-processing based on their earlier work [3] and
classification. The candidate microaneurysms segmentation was conducted using a combination of top-hat
transform and matched filtering with region growing. To improve the sensitivity of the candidate search a
shade correction and dynamic range normalization steps were introduced in the pre-processing. After
detection and segmentation of the candidate microaneurysms, the true microaneurysms were pruned from
the spurious responses using a rule-based classifier with a number of shape and intensity based features.
Kanika Verma et al [4] classification of the different stages of eye disease was done using Random
Forests technique based on the area and perimeter of the blood vessels and hemorrhages. Accuracy
assessment of the classified output revealed that normal cases were classified with 90% accuracy while
moderate and severe NPDR cases were 87.5% accurate.
RF is a powerful machine learning method for classification and regression. The strengths of the
RF approach are that: 1) it does not overfit; 2) it is robust to noise; 3) it has an internal mechanism to
estimate error rates, called out-of-the-bag (OOB) error; 4) it provides indices of variable importance; 5) it
naturally works with mixes of continuous and categorical variables; and 6) it can be used for data
imputation and cluster analysis. These properties have made RF increasingly popular in the last few years,
especially in the field of genetics and imaging [4].
III. AUTOMATIC DETECTION OF DR
3.1 Feature Extraction Using MaZda
The totals of 778 images are used. For feature extraction MaZda software is used. MaZda load
images in the form of Windows Bitmap, DICOM and unformatted grey-scale image files (raw images)
with pixels intensity encoded with 8 or 16 bits. Additionally, there is an option for reading details of
image acquisition protocol extracted from the image information header. Image normalization. There are
three options: "default" (analysis is made for original image); "+/-3 sigma" (image mean m value and
standard deviation sigma is computed, then analysis is performed for grey scale range between [m-
3sigma, m+3sigma]; "1%-99%" (grey scale range between 1% and 99% of cumulated image histogram is
taken into consideration during analysis). Defining regions of interest (ROI), then analysis is performed
within these regions. Up to 16 regions of any shape can be defined; they can be also edited, loaded and
saved as disk files. Additionally, a histogram of defined ROI may be visualized and stored. Image
analysis, which is computation of texture feature values within defined ROIs. The feature set (almost 300
12 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

parameters) is divided into following groups: histogram-, co-occurrence matrix-, run-length matrix-,
gradient, autoregressive model- and Haar wavelet derived features. Displaying image analysis reports,
saving and loading reports into disk files. Feature reduction and selection in order to find a small subset of
features that allows minimum error classification of analyzed image textures. This is performed by means
of two criterions: Fisher coefficient maximization and minimisation of probability of classification error.
Selected features can be transferred to B11 program for further processing and/or classification. Image
analysis automation by means of text scripts containing MaZda language commands. Scripts allow
loading analyzed images and their ROI files, running the analysis and saving report files on disk [6].
Dataset
From the the total 778 images 287 features are extracted using MaZda. After extraction classes
are formes as class 0, class 1, class 2, class 3 having 360, 88, 142, 188 respectively. We observe from the
above details the data is imbalanced.Imbalanced data sets are a special case for classification problem
where the class distribution is not uniform among the classes. Imbalanced data set problem occurs in
classification, where the number of instances of one class is much lower than the instances of the other
classes. The main challenge in imbalance problem is that the small classes are often more useful, but
standard classifiers tend to be weighed down by the huge classes and ignore the tiny ones. In machine
learning the imbalanced datasets has become a critical problem and also usually found in many
applications such as detection of fraudulent calls, bio-medical, engineering, remote-sensing, computer
society and manufacturing industries. After upsampling the dataset the images in all the classes are now
360. The final dataset is 1440 X 287 and Class is 1 X 1440.
3.2 Random forest
The Random Forests algorithm is one of the best among classification algorithms - able to
classify large amounts of data with accuracy. Random Forests are an ensemble learning method (also
thought of as a form of nearest neighbor predictor) for classification and regression that construct a
number of decision trees at training time and outputting the class that is the mode of the classes output by
individual trees (Random Forests is a trademark of Leo Breiman and Adele Cutler for an ensemble of
decision trees). Random Forests are a combination of tree predictors where each tree depends on the
values of a random vector sampled independently with the same distribution for all trees in the forest. The
basic principle is that a group of “weak learners” can come together to form a “strong learner”. Random
Forests are a wonderful tool for making predictions considering they do not overfit because of the law of
large numbers. Introducing the right kind of randomness makes them accurate classifiers and regressors.
Single decision trees often have high variance or high bias. Random Forests attempts to mitigate the
problems of high variance and high bias by averaging to find a natural balance between the two extremes.
Considering that Random Forests have few parameters to tune and can be used simply with default
parameter settings, they are a simple tool to use without having a model or to produce a reasonable model
fast and efficiently.
Random Forests grows many classification trees. Each tree is grown as follows:
1. If the number of cases in the training set is N, sample N cases at random - but with replacement,
from the original data. This sample will be the training set for growing the tree.
2. If there are M input variables, a number mM is specified such that at each node, m variables are
selected at random out of the M and the best split on these m is used to split the node. The value
of m is held
3. Constant during the forest growing.
4. Each tree is grown to the largest extent possible. There is no pruning.
IV. RESULTS
Total images used : 778
Total features extracted from MaZDA =287
Before upsampling
Imbalanced dataset shown in the Table 1
Data matrix : 778 X 287
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 13

Class : 1 X 778
Table 1
Classes Images
Class 0 360
Class1 88
Class 2 142
Class 3 188
Total 778
After upsampling
Final dataset
Data matrix : 1440 X 287
Class : 1 X 1400
Table 2
Classes Images
Class 0 360
Class1 360
Class 2 360
Class 3 360
Total 1440

Table 3
Before upsampling After upsampling
Accuracy 52.05 74.93
Mtry 16 16
Ntree 500 500

CONCLUSION
MaZda package is an efficient and reliable set of tools for analysis of image textures. It provides a
complete analysis path for texture images, including feature estimation, statistical analysis of feature
vectors, classification and image segmentation. Additional information which includes the list of features
produced by MaZda. Use of sampling technique affects the accuracy from the random forest method.
However, the scope and direction for further work are to include more instances of retinal images to
construct a robust classifier for detecting different stages of diabetic retinopathy (i.e. for training and
testing) to achieve higher accuracy. The efficiency of the correct classification can also be improved by
extracting more number of features from the images.
REFERENCES
[1] Baudoin, C. E., Lay, B. J., and Klein, J. C. “Automatic detection of microaneurysms in diabetic fluorescein
angiography”, Revue D´ Epid´emiologie et de Sante Publique 32 (1984), 254 – 261.
[2] Spencer, T., Olson, J. A., Mchardy, K. C., Sharp, P. F., and Forrester, J. V. “An image-processing strategy
for the segmentation and quantification of microaneurysms in fluorescein angiograms of the ocular
fundus”, Computers And Biomedical Research 29 (1996), 284 – 302.
[3] Spencer, T., Phillips, R. P., Sharp, P. F., and Forrester, J. V, “Automated detection and quantification of
microaneurysms in fluorescein angiograms”. Graefe’s Archive Ior Clinical and Experimental
Ophthalmology 230 (1992), 36 – 41.
[4] Kanika Verma, Prakash Deep and A. G. Ramakrishnan “Detection and Classification of Diabetic
Retinopathy using Retinal Images”, India Conference (INDICON), 2011 Annual IEEE,
10.1109/INDCON.2011.6139346, Page(s): 1 - 6
14 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

[5] Ramon Casanova1*, Santiago Saldana1, Emily Y. Chew2, Ronald P. Danis3, Craig M. Greven4, Walter T.
Ambrosius1, “Application of Random Forests Methods to Diabetic Retinopathy Classification Analyses”,
PLOS ONE June 2014 Volume 9 Issue 6 e98587
[6] Piotr M. Szczypinski, Michal Strzelecki, Andrzej Materka, Artur Klepaczko, “MaZda – A software
package for image texture analysis”, Elsevier, Computer Methods and Programs in Biomedicine, Volume
94, Issue 1, April 2009, Pages 66-76, ISSN 0169-2607, DOI: 10.1016/j.cmpb.2008.08.005.
[7] T. Kauppi, V. Kalesnykiene, J.K. Kamarainen, L. Lensu, I. Sorri, H. Uusitalo, H. Kalviainen, J. Pietila:
“Diaretdb0: Evaluation database and methodology for diabetic retinopathy algorithms”, Technical report,
Lappeenranta University of Technology, Lappeenranta, Finland, 2006.
[8] T. Kauppi, V. Kalesnykiene, J.K. Kamarainen, L. Lensu, I. Sorri, A. Raninen, R. Voutilainen, J. Pietilä, H.
Kälviäinen, H. Uusitalo: “DIARETDB1 diabetic retinopathy database and evaluation protocol”, In Proc. of
the Medical Image Understanding and Analysis, Aberystwyth, UK, pp. 61–65, 2007
Visible Light Underwater Communication Using
Different Light Sources
Pranav Medhekar1, Sumeet Mungekar2, Vinayak Marathe3, Vijay Meharwade4
1
Department of E&TC, SSJCE, pranav.medhekar19@@gmail.com
2
Department of E&TC, SSJCE, smungekar7@gmail.com
3
Department of E&TC, SSJCE, vinmarathe100@live.com
4
Department of E&TC, SSJCE, vmluffy@gmail.com

Abstract— We all know that light can be used for communication through air. We extended this technology and use
this for underwater communication using different light sources. We use LEDs as a light source because LEDs have
longer lifespan, low power consumption, lower heat generation, fast switching characteristics and energy efficient. It
can be used for high speed data transfer. We use LASERs as another light source because it is highly directional,
travels longer range, Monochromatic, highly coherent and it also has faster switching characteristics. We know that
the bandwidth of Radio frequency spectrum is limited. Nowadays the demand for communication has drastically
increased and the bandwidth of radio frequency spectrum is limited. Therefore the radio frequency spectrum is
depleted. Successful underwater communication is achieved at the speed of 115kbps.

Keywords- Laser, VLC, LED, Microcontroller, Photodiode.

I. INTRODUCTION

The visible light communication (VLC) refers to the communication technology which utilizes the
visible light source as a signal transmitter, the air as the transmission medium, and the proper photodiode
as a signal receiving component. VLC or Li-Fi (Light Fidelity) is a high speed and fully networked optical
wireless communication technology which is similar to Wi-Fi. This term was proposed by Prof. Harald
Haas and is a form of visible light communication and a subset of optical wireless
communications (OWC). It could be a complement to RF communication (Wi-Fi or Cellular). It is
measured to be about 100 times faster than some Wi-Fi implementations, reaching with high speeds. It is
wireless and uses visible light spectrum for communication (instead of radio frequency waves), part of
optical wireless communications technology, which carries much more information, and has been
proposed as a solution to the RF-bandwidth limitations.
Li-Fi is advantageous in electromagnetic sensitive areas such as in aircraft cabins, hospitals and nuclear
power plants without causing electromagnetic interference. Both Wi-Fi and Li-Fi transmit data using
electromagnetic spectrum, but whereas Wi-Fi utilizes radio waves, Li-Fi uses visible light. Li-Fi has
almost no limitations on capacity. The visible light spectrum is 10,000 times larger than the whole radio
frequency spectrum. Using VLC we can reach data rates of over 10Gbps, which is much faster than
typical fast broadband RF networks.
In undersea or ocean exploration the data obtained by the sensors or unmanned systems are need to be
measured accurately. Thus there is great need for establishing good communication links in seas and
oceans. Radio waves do not propagate underwater. Acoustic methods can be used but is limited. Also
acoustic waves face difficulty to penetrate the water-air interface. Thus optical communication has high
potential to augment other methods.
16 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

II. PROPOSED METHODOLOGY

A) Experimental setup
User will send the data from PC or Laptop, and then it will be passed to the circuitry. The micro controller
will drive the light source. The light source is fitted inside the water tank. The source is fully protected
from water by proper waterproof coating. We also used Gas and temperature Sensor. Temperature sensor
will detect the present temperature at the source. Here we have used two types of light sources. They are
LED panel and LASER. LED panel consists of 90 LEDs. We can switch between LEDs and LASER
depending upon our requirement.
Figure1:- Setup of VLC underwater

The tank that we have used is of average length such as 1 foot. The tank is filled by water. At the other
side the photodiode is also fitted inside the water tank similar to the source. The photodiode is properly
aligned with the light source. Photodiode senses the data and it is passed to the microcontroller, and
further is obtained on PC or Laptop which is at the other end.
B) Hardware and Software
Microcontroller ATmega 16 is used to convert original signal into data at transmitter and vice
versa at the receiver side. It is a CMOS 8-bit microcontroller based on the enhanced RISC architecture. It
executes powerful instruction in single clock cycle. The system can be designed optimizing power
consumption versus processing speed using AVR ATMega16.
Sensor MQ-6 is used as a Gas sensor. It has sensitivity for LPG, iso-butane and propane. It is fast, stable
and has long life. Thermistor TTC-103 is used to measure temperature. It is small and operates in the
range of -40C to 125C.
The microcontroller AVR ATmega16 is programmed using C language.
XCTU is used as interfacing software between the circuit and PC/Laptop. XCTU is a free multi-platform
application designed to interact with RF modules through a simple graphical interface. XCTU includes all
of the tools a developer needs to quickly get up and running with any RF module. XCTU includes a set of
embedded tools that can be executed without having any RF module connected.

III. WORKING
User sends the Data through PC/Laptop. The microcontroller is not compatible with USB
port, so we used USB to TTL converter. It converts the data from USB logic to TTL logic, the data
from PC gets transmitted to the microcontroller. Thus the file is converted into bits with the help of
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 17

USB to TTL convertor & ATMEGA-16 Microcontroller. In our project we used two different light
sources depending upon our requirement we select the source (either LED or LASER) with the help
of switch. Microcontroller forms the driving circuitry of visible light source. The light get intensity
modulated which contains the data.

Data from USB to TTL Microcontroller Switch


PC/Laptop Converter

LED LASER

Water

Data into TTL to USB Microcontroller


PC/Laptop Converter Photo detector

Figure2:- Block Diagram of Visible Light Underwater Communication


In VLC communication the communication is achieved when transmitter and receiver are
properly aligned. There is a sensing element at the receiver side called as Photodiode. Photodiode senses
the illumination from the light source (either LED or LASER). It converts the optical signal to electrical
signal which is passed to microcontroller which is nothing but the regenerated data. Microcontroller
identifies the data and route it to the receiver PC through the TTL to USB converter which converts the
data from TTL logic to USB logic. Therefore the original data is successfully received at receivers PC. In
our project we use two different types of modes viz. 1) PC mode & 2) Sensor Mode. In PC mode, user
selects the multimedia file such as image, text, audio or video file. This is fed to the circuitry using
interfacing software. Thus the data is transmitted to the receiver. In Sensor mode, the gas sensor senses
the LPG, iso-butane gas and thermistor is used to detect the temperature. The sensed data is converted into
appropriate units and this data from the sensors (Temperature sensor and Gas Sensor) is transmitted. Thus
communication is achieved between to different computers. We can achieve underwater long distance
communication underwater using directional high powered visible light sources.

IV. CONCLUSION

 We get accurate underwater communication when the alignment between the transmitter and receiver
is achieved properly.
 Successful underwater communication is achieved at the speed of 115kbps.
18 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

 Light source is switched between LEDs and LASER. Both the type of sources gives accurate
communication, however long distance communication is achieved using LASER.
 When small obstacle blocked the LASER light, so by switching the source to LEDs panel
communication is maintained because small obstacle doesn’t completely block LED light.
 Gas and temperature sensor data is successfully measured and is transmitted to the receiver side.

REFERENCES

[1] Sridhar Rajagopal, Samsung ElectronicsRichard D. Roberts, IntelSang-Kyu Lim, ETRI “IEEE
802.15.7Visible Light Communication: Modulation Schemes and Dimming Support” Communications Magazine,
IEEE, (Vol: 50, Issue: 3) March 2012 ISSN: 0163-6804
[2] WANG Yuanquan and CHI Nan “A High-Speed Bi-Directional Visible Light Communication System Based on
RGB-LED”Communications, China IEEE (Vol: 11, Issue: 3) Page 40 – 44,March 2014 ISSN: 1673-5447
[3] Yang Aiying ; Li Yankun ; FengLihui“Separate Dimming Controlling and Data Transmissionfor an Indoor
Visible Light Communication System”,Communications, China (Volume:12 , Issue: 3 ) Page 71 – 76 ISSN 1673-
5447 Mar. 2015 IEEE
[4] Jiaheng Wang ; Rong Zhang ; Hong Shen ; Chunming Zhao ; Hanzo, L. :”Multiuser MISO Transceiver Design
for IndoorDownlink Visible Light Communication UnderPer-LED Optical Power Constraints”,Photonics Journal,
IEEE (Volume:7 , Issue: 4 ) ISSN :1943-0655 Aug. 2015
[5] Wang Lang ; Chi Xuefen ; Liu Shuangxing ; Shi Wenxiao ; Deng Jing,“The Research of Indoor Positioning
Based on Visible Light Communication” Communications, China (Volume:12 , Issue: 8 ) Page(s): 85 – 92 ISSN
:1673-5447 August 2015
[6] XiaotaoFeng ; Pengfei Hu ; Mohapatra, P., “Visible Light Communication, Networking andSensing: A Survey,
Potential and Challenges” Communications Surveys & Tutorials, IEEE (Volume:17 , Issue: 4 ) Page(s): 2047 –
2077 ISSN :1553-877X Fourth quarter 2015
[7] DoKy Son, EunByeol Cho, Inkyu Moon, ZabihGhassemlooy, Soeun Kim and Chung Ghiu Lee, “Simultaneous
transmission of audio and videosignals using visible light communications” EURASIP Journal Wireless
Communivcations and Networking, 2013
[8] Amrutha. S, Ansu Mathew, Rajasree. R, SwathySugathan, “A Visible Light Communication System for Indoor
Application”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 3, Issue 12, June
2014
[9] Jacqueline J. George, Mohammed Hayder Mustafa, Nada Mahjoub Osman, NuhaHashim Ahmed, Da’ad
Mohammed Hamed, “A Survey on Visible Light Communication”, International Journal Of Engineering And
Computer Science, Volume 3 Issue 2, February 2014 Page No. 3805-3808
[10] M..Saadi, Wattisuttikulkij, Y. Zhao, P. Sangwongngam," Visible light communication opportunities, challenges
and communication models", International Journal of Electronics and Informatics, Vol. 2, No.1, 2013.
“Measurement of NPK from PH value”
Mr. Khakal V.S.1, Mr. Deshpande. N. M 2 , Mr. Varpe P. B. 3

1
Department of E &TC , PDVVP COE Ahmednagar, vikaskhakal@gmail.com
2
Department of E &TC , PDVVP COE Ahmednagar, deshpande.nilkanth@gmail.com
3
Department of E &TC , PDVVP COE Ahmednagar, prashvarpe@gmail.com

Abstract- This system is useful to recognize and detect motion automatically around a robot's environment in order to
equip a mobile robot for a surveillance task for farm. It helps to manage and measure agricultural micro-parameters .The
robot design has been partitioned into camera work, sensor part, controlling part, On-line video and image transmitter
system and planning subsystems .This measurement of N,P,K Element in soil is further useful to decide fertilizer
requirement and combinations for soil. It can be helpful for chemical industries to manage content of same in chemical
mixing during formation of fertilizer. We can minimize no of required nodes used to measure overall field area.
In conventional method of farming, human labors were required to visit the greenhouse at specific time and
need to check the humidity level and temperature level and all other micronutrient level manually. This technique is
considered time consuming and needs a lot of work and effort. Therefore this research focuses on developing a system
that can remotely monitor and predict changes of parameter level in agricultural greenhouse. The objective of the
research is to develop a “Measurement of NPK from Ph value”. The proposed system has a measurement which capable
of detecting the level of temperature, Element contents in soil(N,P,K) , Humidity , Soil moisture Soil , Ph. This system
also has a mechanism to alert farmers regarding the temperature changes in the greenhouse so that early precaution steps
can be taken. In this research, several tests had been conducted in order to prove the viability of the system.

Keywords- Robot, X-bee; LPC2131/2132/2138 ARM7 Temperature measurement; Humidity measurement ,NPK .

I. INTRODUCTION

In traditional method of farming, human labors were required to visit the greenhouse at specific time and
need to check the humidity level and temperature level manually. This conventional method is considered
time consuming and needs a lot of work and effort.
2) In traditional method we have to use more no of nodes to measure parameters from various part of the
agricultural area. It increase total cost as well as it is somewhat time consuming case to collect the data from
each node.
Therefore this research focuses on developing a system that can remotely monitor and predict
changes of temperature level in agricultural greenhouse. The objective of the research is to develop a“
Measurement of NPK from soil pH. The proposed system has a measurement which capable of detecting the
level of temperature, Element contents in soil(N,P,K), Humidity , Soil moisture Soil , Ph. This system also
has a mechanism to alert farmers regarding the temperature changes in the greenhouse so that early precaution
steps can be taken. In this research, several tests had been conducted in order to prove the viability of the
system. Test results indicated that the reliability of the system in propagating information directly to the
farmers could be gained excellently in various conditions. increases the value of resistance. But it not happens
in capacitance behavior as firmness change. The capacitances were decreased as firmness improved.
According to the past development [1] system based only for the surveillance system ,but this system
is now useful to both surveillance and the parameter measurement. Further one more system is designed [2]
for only the parameter measurement which is not sufficient. Third system[4] is developed for the water level
measurement in soil which is by using moisture sensor but this covers smaller area . Now which overcomes
by using this system. Next to this [5] one system is comes which is helpful to measure potassium effectively
but it is only up to potassium hence we have decided to include all the parameters.
20 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

II. PROPOSED SYSTEM

Following are the block diagram of transmitter , receiver end as well as overall block diagram of
robot and user end which having ARM Controller at the center and motor control drives to manage the
movements of robot through the agricultural land surface. All needful sensors are mounted on one arm which
is placed properly on the robot. Whose motions are managed with help of program . Data can be share in
between the robot and user end with help of RF trans receiver. Video Camera is placed over the robot which
is also movable according to need. At the receiver end system have CPU with graphical user interface and
data storage provision. With the help of DC motors this robot is free to move anywhere in agricultural surface
towards the required direction and then collect the amount of content of available parameters and
simultaneously it will pick the real time video monitoring which is further useful to find the problems
occurred in crops and other elements. Video monitoring is further useful to complete video monitoring,
quality inspection. At the receiver end this system have GUI which is capable to display each parameter
uniquely along with the real time video. User can manage the required movement from user side by using
available provision from movement manager. One can manage the movement of robot towards right, left,
forward and Backward.

Figure 1.Block Diagram of Project

This system required following sensors to measure the various parameters as

2.1 Humidity Measurement


Humidity is one of the important parameter of any green house. As there are so many types of humidity
sensors, here P-Hs-220 humidity sensor is used. The output of this humidity sensor is proportional to output
voltage. At 20% relative humidity, the output is 660 mV, while at 90% relative humidity; the output is 2970
mV, i.e. 2.97 V. The output of the Humidity is connected to the ARM processor at pin no.35, which is the
analog input (AD 1.2) of the ARM processor.
2.2 pH Measurement
A pH measurement is actually, a precise voltmeter that measures the generated voltage of a pH electrodes
.Here Alpha pH 500 Transmitter with pH Electrode (EC100GTSO05B) The requirement of such
measurement is an amplifier with high input impedance and has the gain of voltage-pH conversion. The
standard pH probe is responsible to generate voltage of the range 59mV/pH .So a pre-amplifier is required
with high input impedance input and with gain = 16.7 to give 1 Volt per pH . The schematic diagram of the
pH measurement circuit is as shown below.
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 21

2.3 LM35 Temperature sensor


LM35 Temperature sensor is the temperature sensor used to sense the temperature from field .It having
Linear + 10 mV/°C Scale Factor ,Calibrated Directly in °Celsius (Centigrade) ,0.5°C Ensured Accuracy (at
+25°C) ,Rated for Full −55°C to +150°C Range , Operates from 4 to 30 V.
2.4. NPK Microsensors(PHEC 04)
The use of micro-sensors for in-field monitoring of environmental parameters is of great interest,
particularly semiconductor-based micro-sensors. These sensors have many advantages over other sensors. The
advantages includes smaller size, robustness, less output impedance, fast response.

Figure 2 .Working Diagram of PHEC 04

Above fig is shows the PHEC sensor whose range in between 0 to 7 , we can predict specific value
for the N,P,K . Following chart shows some ideas about this relations.

Figure 3. Reference Chart

2.5 Hardware Requirements

1. ARM7 board (LPC2138 Processor)


2. Temperature sensor
3. Humidity Sensor
4. NPK Sensor
5. LCD monitor
6. USB mouse
7. USB Keyboard
8. Laptop
9. Robotic Arm
2.6 Software Requirements

1. Software: Keil 3.0


2. Operating System: Windows XP.
22 Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016)

3. Visual Studio 2008


4. Visual Basic 6.0
III. EXPERIMENTAL ANALYSIS

Finally every quantity is displayed over a GUI created at the user end .This part having visual basic studio
support at the backend. It includes calibration part as well as displaying part. Following are some steps and
results which obtained during the analysis.
Step 1:- log in

In this step user have to log in by using password and login ID allotted.

Step 2:- Select particular computer port used to connect serial port.

Step 3:- Reset the controller and click over sensor data mode using GUI.

Step 4:- Move Robot as well as robotic arm to pick appropriate location.

Step 5:- Final results.


Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 23

Step 6:- Report generation with time and date.

IV. CONCLUSION

This System deals with the design, optimization and development of a practical solution for application to
the agricultural monitoring and control. The proposed system utilizes sensor for Micro parameter
measurement (N,P,K),temperature level detection, Motion detection , Humidity , Soil moisture ,Soil Ph For
management of Agricultural environment. It included Real-time Video Monitoring and Agricultural
Parameters measurement using Sensor Networks for Precision Agriculture. After the proper measurement of
N,P,K content from soil it will become simple to judge about the fertilizer combinations.

REFERENCES

[1] A.Sivasoundari,S.Kalaimani, Wireless Surveillance Robot with Motion Detection and Live Video Transmission ,
International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-I, Issue-6 April 2013 .
[2] Iqbal Singh, Meenakshi Bansal, Monitoring Water Level in Agriculture Using Sensor Networks, International
Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-1, Issue-5, November 2011.
[3] Siuli Roy1, Somprakash Bandyopadhyay, A Test-bed on Real-time Monitoring of Agricultural Parameters using
Wireless Sensor Networks for Precision Agriculture .
[4] Syed Mahfuzul Aziz, Senior Member, Energy Efficient Image Transmission in Wireless Multimedia Sensor
Networks IEEE, and Duc Minh Pham, Student Member, IEEE , IEEE communications letters, Vol. 17, No. 6, June 2013.
[5] DI Walter H. Mayer , Agricultural Ict Infrastructue – Also Requisite For Precision Farming .
[6] P. A. Kulkarni, S. G. Karad Robotics And Remotely Operated Vehicles , MAE, Alandi, Pune, India. 412105.
[7] Tejbanta Singh Chingtham1, G. Sahoo2, M.K. Ghose1 ,An Unmanned Aerial Vehicle as Human-Assistant Robotics
System, IEEE International Conference on Computational Intelligence and Computing Research2010.
[8] Syed Mahfuzul Aziz, Senior Member, IEEE, and Duc Minh Pham, Student Member, IEEE , Energy Efficient Image
Transmission in Wireless Multimedia Sensor Networks, IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 6,
JUNE 2013.
[9] Awati J.S., Patil V.S.And Awati S.B. , Application Of Wireless Sensor Networks For Agriculture Parameters,
International Journalof Agriculture .
[10] Kevin J. Sibley, Gordon R. Brewster, Tessema Astatkie, John F. Adsett , In-field measurement of soil nitrate
using an ion-selective electrode Nova Scotia Agricultural College ,Canada .
RICE GRAIN AND STONE SORTING USING
ARM
Rahul A. Chavhan1, Roshan A.Deore2, Rahul S. Rathore3,Prof. K. S. Tated4
1
E&TC, SNJB’S KBJ college of Engineering, Chandwad, rahulachavhan@gmail.com
2
E&TC,SNJB’S KBJ college of Engineering, Chandwad, roshandeore786@gmail.com
3
E&TC, SNJB’S KBJ college of Engineering, Chandwad, rahulsrathore1994@gmail.com
4
E&TC, SNJB’S KBJ college of Engineering, Chandwad, kavita.tated@gmail.com

Abstract-Today’s world is the world of technology and science. Due to automation, life has become fast and
luxurious. Rice is one of the most common sources of food consumed in the world. With the improving living
standards of human being, huge amount of rice with higher quality than before is required today. Therefore we are
going to Develop a system for farmers & industries for rice grain and stone sorting from mix grain efficiently or
faster sorting of rice. To design a system for rice grain and stone sorting based on colour recognition by using colour
sensor, microcontroller and nozzle compressor unit. Microcontroller makes decision based on colour sensed by
sensor and activates the nozzle compressor unit to sort the stones from rice grain.
Keywords-Colour sensor; Electromagnetic Multivibrator; Microcontroller P89LPC938H; Nozzle Compressor Unit;
Switching nozzle.

I. INTRODUCTION

The quality of rice is based on a variety of properties such as cooking texture, colour (whiteness
or chalkiness), size, shape and the number of broken rice kernels, stones, earth granules, yellow, immature
grains. Rice quality inspection by humans (relying upon naked eyes) is neither objective nor efficient.
Error increases sometimes due to inexperience or the inspection may be deliberately shifted out of
sympathy for the producers. Traditional mechanical process could only eliminate tiny particles that are
smaller than rice, such as crude bran. This kind of purely mechanical method is useless in recognizing and
separating rice with different impurity but the same size.
Most of the rice sorting machines available on the market are still based on the technologies of the
20th century, such as centralized control, and programmable logic device. Major shortcomings of such
systems are 1) very simple functions, limited software adaptability whereas high design complexity 2)
signal attenuation resulting from long distance transmission of the optical sensors output signal connected
to the controller by long wire. MVS was developed by Wan, Lin and Chiou to sort rice with an accuracy
ranging from 87% to 90%.These methods use a CCD video camera with illumination source for image
acquisition and a PC with frame grabber and specially designed software for image processing and
analysis. For on line measurement a transport system is used to position the rice kernels below the camera
and for sorting a discharging device is used to collect the classified kernels in different containers. MVS is
relative expensive, influenced by external light conditions and needs an experienced person to setup the
system.
In the conventional rice sorter, colour of fallen rice from a shoot is captured, and then rice colour-
stone is compared with some threshold value. If the rice colour-stone is below the threshold value, the rice
is rejected as damaged rice. For this conventional rice sorter, when percentage of paddy in polished rice
exceeds 1%, it is difficult to exclude all paddies. Furthermore if rice flow exceeds a few thousands [kgh],
the recognition percentage is below 90% and recognition ability is not always guaranteed. While small
flow of rice guarantees recognition ability, this matter leads a low efficiency for rice sorting. So the
efficient system needs to be developed.
Proceeding of 5th International Conference on Recent Trends in Engineering & Technology (ICRTET’2016) 25

II. BLOCK DIAGRAM

Fig. 1 Block diagram of system

2.1.Microcontroller P89LPC938H

The P89LPC938 is a single-chip microcontroller, available in low cost packages, based on a high
performance processor architecture that executes instructions in two to four clocks, six times the rate of
standard 80C51 devices. Many system-level functions have been incorporated into the P89LPC938 in
order to reduce component count, board space, and system cost.

2.2.True colour sensor (MTCS-iCS)

This color sensor identifies color and gives serial output of RBG value. It can identify 16.7 million color
shades giving RGB value for the detected color. The detected color is identified as amount of three
primary color values namely Red, Green & Blue with 8 bit accuracy for each primary color. Any color
can be separated or combined into three primary colors Red, Green and Blue using the RBG values.

Fig. 2 True Colour Sensor

2.2. Fast switching nozzle (MHE2-MS1H-3/2G-QS-4)

 MH- fast switching valve


 E- individual valve
 2- flow rate 90 to 100l/m
 M- solenoid switching
 S- 2ms
 24VDC
 H- Non detenting
 3/2- 3/2way valve
 G- Closed
 QS4- Push in connector for 4mm 0.D tubing
Another random document with
no related content on Scribd:
With smoke of sighs sometyme I might beholde,
The place all dimde, like to the morning mist:
And strait agayne the teares how they downrold
Alongst his cheekes, as if the riuers hyst:
Whose flowing streames ne where no soner whist,
But to the stars such dreadfull shouts hee sent,
As if the throne of mighty Ioue should rent.

87.

And I the while with sprits[1638] welny bereft,


Beheld the plight and pangs that did him strayne,
And how the bloud his deadly colour left,
And straight retournde with flaming red againe:
When sodaynly amid his raging payne
Hee gaue a sigh, and with that sigh hee sayed:
“Oh Banastaire:” and strait agayne hee stayed.

88.

Dead lay his corps, as dead as any stone,


Till swelling sighes storming within his brest,
Upraysde his head, that downeward fell anone,
With lookes vpcast, and sighes that neuer ceast:
Forth stremde the teares records of his vnrest,
When hee with shrikes thus groveling on the ground,
Ybrayed these words with shrill and dolefull sounde.

89.

“Heauen and earth, and ye eternall lamps


That, in the heauens wrapt, wyll vs to rest,
Thou bright Phœbe, that clearest the night’s damps,
Witnes the playnts that in these pangs opprest,
I, wofull wretch, vnlade out of my brest,
And let mee yeelde my last words, ere I parte,
You, you, I call to record of my smarte.
90.

And thou, Alecto, feede mee with thy foode,


Let fall thy serpents from thy snaky heare,
For such releife well fits mee in this moode,
To feede my playnt with horrour and with feare,
While rage afresh thy venomde worme areare:
And thou Sibilla, when thou seest mee faynte,
Addresse thy selfe the guide of my complaynt.

91.

And thou, O Ioue, that with the[1639] deepe fordoome


Dost rule the earth, and raygne aboue the skies,
That wreakest wrongs, and geu’st[1640] the dreadfull
doome
Agaynst the wretch that doth thy name despise,[1641]
Receiue these words, and wreake them in such wise,
As heauen and earth may wytnesse and beholde,
Thy heapes of wrath vpon this wretch vnfolde.

92.

Thou Banastaire, gainst thee I clepe and call


Unto the gods, that they iust vengeaunce take
On thee, thy bloud, thy stayned stocke and all:
O Ioue, to thee aboue the rest I make
My humble playnt, guide mee, that what I speake,
May be thy will vpon this wretch to fall,
On thee, Banastaire, wretch of wretches all.

93.

O would to God, the[1642] cruell dismall day,


That gaue mee light fyrst to behold thy face,
With foule eclipse had reft my sight away:
Th’vnhappy[1643] hower, the tyme, and eke the place,
[1644]
The sunne and moone, the stars, and all that was
In theire aspects helping in ought to thee,
The earth and ayre, and all, accursed bee.

94.

And thou caytyfe, that like a monster swarued


From kinde and kindnes, hast thy maister lorne,
Whom neyther trueth, nor trust wherein thou serued,
Ne his deserts could moue, nor thy fayth sworne,
How shall I curse, but wish that thou vnborne
Had beene, or that the earth had rent in tway,
And swallowed thee in cradle as thou laye.

95.

To this did I, euen from thy tender youth,


Witsaue[1645] to bring thee vp? did I herefore
Beleue the oth of thy vndoubted troth?
Aduaunce thee vp, and trust thee euermore?
By trusting thee that I should dye therefore?
O wretch, and worse then wretch, what shall I say?
But clepe and curse gaynst thee and thine for aye.

96.

Hated be thou, disdaynde of euery wight,


And poynted at where euer that thou goe:
A trayterous wretch, vnworthy of the light
Bee thou esteemde; and to encrease thy woe,
The sounde be hatefull of thy name also:
And in this sort with shame and sharp reproche,
Lead thou thy life, tyll greater griefe approche.

97.
Dole and despayre, let those be thy delight,
Wrapped in woes that cannot bee vnfolde,
To wayle the day, and weepe the weary night,
With rayny eyne and sighes cannot be tolde,
And let no wight thy woe seeke to withholde:
But count thee worthy (wretch) of sorrowe’s store,
That suffering much, oughtst still to suffer more.

98.

Deserue thou death, yea bee thou deemde to dye


A shamefull death, to end thy shamefull life:
A sight longed for, ioyfull to euery eye,
When thou shalt bee arraigned as a theefe,
Standing at bar, and pleading for thy life,
With trembling tongue in dread and dolour’s rage,
Lade with white lockes, and fourscore yeares of age.

99.

Yet shall not death deliuer thee so soone


Out of thy woes, so happy shalt not[1646] bee:
But to th’eternall[1647] Ioue this is my boone,
That thou mayst[1648] liue thine eldest sonne to see
Reft of his wits, and in a foule bore’s stye
To end his dayes, in rage and death distrest,
A worthy tombe where one of thine should rest.

100.

Yet[1649] after this, yet pray I more, thou may


Thy second sonne see drowned in a dyke,
And in such sort to close his later day,
As heard or seene erst hath not been the like:
Ystrangled in a puddle, not halfe[1650] so deepe
As halfe a foote, that such hard losse of life,
So cruelly chaunst, may bee the[1651] greater griefe.
101.

And not yet shall thy hugie[1652] sorrowes ceasse,


Ioue shall not so witholde his wrath, from thee,
But that thy plagues may more and more encrease,
Thou shalt still liue, that thou thy selfe maist see
Thy deare daughter stroken with leprosye:[1653]
That shee, that erst was all thy whole delight,
Thou now mayst loth to haue her come in sight.

102.

And after that, let shame and sorrowes griefe


Feede forth thy yeares continually in woe,
That thou maist lieue in death, and dye in life,
And in this sort forwaylde and weried so,
At last thy ghost to part thy body fro:
This pray I, Ioue, and with this later breath,
Vengaunce I aske vpon my cruell death.”

103.

This sayde, he flong his retchlesse armes abroade,


And, groueling, flat vpon the grounde he laye,
Which with his teeth hee all to gnasht and gnawde,
Deepe groanes hee fet, as hee that would awaye:
But, loe, in vayne hee did the death assay:
Although I thinke was neuer man that knewe
Such deadly paynes, where death did not ensue.

104.

So stroue hee thus a while as with the death,


Now pale as leade, and cold as any stone,
Now still as calme, now storming forth a breath
Of smoky sighes, as breath and all were gone:
But euery thing hath end: so hee anone
Came to himselfe, when, with a sigh outbrayed,
With woefull chere, these woefull words hee sayed:

105.

“Ah, where am I, what thing, or whence is this?


Who reft my wits? or how doe I thus lye?
My lyms do quake, my thought agasted is,
Why sigh I so? or whereunto do I
Thus grovle[1654] on the grounde?” and by and by
Upraysde hee stoode, and with a sigh hath stayde,
When to himselfe retourned thus hee sayde:

106.

“Suffiseth now this playnt and this regrete,


Whereof my heart his bottom hath vnfraught:
And of my death let peeres and princes wete
The world’s vntrust, that they thereby be taught:
And in her wealth, sith that such chaunge is wrought,
Hope not too much, but in the mids of all
Thinke on my death, and what may them befall.

107.

So long as fortune would permit the same,


I liu’d[1655] in rule and ryches with the best:
And past my time in honour and in fame,
That of mishap no feare was in my brest:
But false fortune, whom[1656] I suspected least,
Did tourne the wheele, and with a dolefull fall
Hath mee bereft of honour, life, and all.

108.

Loe, what avayles in riches, flouds that flowes?


Though she so smylde, as all the world were his,
Euen kings and kesars, byden[1657] fortune’s throwes,
And simple sort, must beare it as it is:
Take heede by mee that blithde in balefull blisse,
My rule, my riches, royall bloud and all,
When fortune frounde the feller made my fall.

109.

For hard mishaps, that happens vnto such


Whose wretched state erst neuer fell no chaunge,
Agreeue them not in any part so much
As theyr distresse: to whom it is so straunge
That all theyr liues, nay passed pleasures raunge,
Theyr sodayne woe, that aye wielde welth at will,
Algates theyr hearts more pearcingly must thrill.

110.

For of my byrth, my bloud was of the best,


First borne an earle, then duke by due discent,
To swinge the sway in court among the rest,
Dame fortune mee her rule most largely lent,
And, kinde with courage, so my corps had blent,
That, loe, on whom but mee did shee most smyle?
And whom but mee, loe, did shee most begyle?

111.

Now hast thou heard the whole of my vnhap,[1658]


My chaunce, my chaunge, the cause of all my care:
In welth and woe, how fortune did mee wrap,
With world at will, to win mee to her snare:
Bid kings, bid kesars, bid[1659] all states beware,
And tell them this from me that tryde it true:
Who reckles rules, right soone may hap to rue.”

T. S.[1660]
[“How like you this my maisters?” quoth[1661] I. “Very well,” sayd
one: “the tragedy excelleth: the inuention also of the induction, and
the descriptions are notable. But wheras hee fayneth to talke with
the princes in hell, that I am sure will bee mislyked, because it is
most certayne, that some of theyr soules be in heauen. And although
hee herein doe follow allowed poets, in their description of hell, yet it
sauoureth so much of purgatory, which the papistes haue digged
thereout, that the ignorant may thereby bee deceiued.” “Not a whit I
warrant you,” sayd I,[1662] “for hee meaneth not by his hell the place
eyther of damned soules, or of such as lye for their fees, but rather
the graue, wherein the dead bodyes of all sorts of people doe rest till
time of the resurrection. And in this sence is hell taken often in the
scriptures, and in the writings of learned christians. And so, as hee
himselfe hath told mee, hee meaneth, and so would haue it taken.”
“Tush,” quoth[1663] another, “what stand we here vpon? it is a poesy,
and no diuinity: and it is lawfull for poets to faine what they list, so it
bee appertinent to the matter: and therefore let it passe euen in such
sort as you haue read it.” “With a good will,” quoth[1664] I. “But
whereas you say a poet may faine what he list: in deede me
thinke[1665] it should bee so, and ought to be well taken of the
hearers: but it hath not at all times beene so allowed.” “Yee say
troth,” quoth[1666] the reader: “for here followeth in the story, that
after the death of this duke, one called Collingbourne was cruelly put
to death for making of a rime.” “I haue his tragedy here,” sayd[1667] I.
For the better perceiuing whereof, you must imagine that you see
him a maruailous well fauoured man, holding in his hand his owne
heart, newely ripped out of his breast, and smoaking forth the liuely
spirite: and with his hand,[1668] beckening to and fro, as it were to
warne vs to auoide: and with his faint tongue and voice, saying as
couragiously as bee may, these words that followe.]
How Collingbourne was cruelly
executed for making a foolish ryme.
1.

Beware, take heede, take heede, beware, beware[1669]


You poets, you, that purpose to rehearce
By any art what tyraunt’s doings are:
Erynnis rage is growne so fell and fearce,
That vicious acts may not be toucht in verse:
The muse’s[1670] freedome, graunted them of elde,
Is barde, slye reasons treasons hye are helde.

2.

Be rough in ryme, and then they say you rayle,


As Iuuenal was, but that[1671] makes[1672] no matter:
With Ieremy you shall bee had to iayle,
Or forc’d with Martial, Cæsar’s faultes to flatter:
Clarkes must bee taught to claw, and not to clatter:
Free Helicon and franke Parnassus’ hylls,
Are helly haunts, and ranke pernicious ylls.

3.

Touch couertly in terms, and then you taunt,


Though praysed poets alway did the like,
Controll vs not, els traytour vile auaunt,
What passe wee what the learned doe mislike?
Our sinnes wee see, wherein to swarme wee seeke:
Wee passe not what the people say or thinke:
Their shittle hate makes[1673] none but cowards
shrinke.

4.

Wee knowe, say they, the course of fortune’s wheele,


How constantly it whirleth still about,
Arrearing now, while elder headlong reele,
How all the riders alway hang in doubt:
But what for that? we count him but a loute
That sticks to mount, and basely like a beast
Liues temperatly, for feare of Blockam feast.

5.

In deede wee would of all be deemed gods


What euer[1674] wee do: and therefore partly hate
Rude preachers, that dare threaten [vs] plagues and
rods,
And blase the blots whereby wee stayne our state:
But nought wee passe what any such do prate:
Of course and office they must say theyr pleasure,
And we of course must heare and mend at leasure.

6.

But when these pelting poets in theyr rymes


Shall taunt, or iest, or paynt our wicked workes,
And cause the people know and curse our crymes,
This ougly fault no tyraunt liues but vrkes:
Wherefore wee loth such taunters[1675] worse then
Turkes,
Whose meaning is to[1676] make vs know our misse,
And so to mend:[1677] but they but doate in this.

7.
Wee know our faults as well as any other,
Wee also doubt the daungers from them due:
Yet still wee trust so right to rule[1678] the rother,
That scape we shall the sourges that ensue:
We thinke we know more[1679] shifts than other knew:
In vayne therefore for vs are counsailes writ:
Wee know our faults, and will not mend a whit.

8.

These are the feats of the vnhappy sort,[1680]


That preace for honours, wealth, and pleasure vayne:
Ceasse therefore, Baldwine, ceasse I thee exhort,
Withdrawe thy pen, for nothing shalt thou gayne
Saue hate, with losse of paper, ynke, and payne:
Fewe hate theyr faults, all hate of them to heare,
And faultiest, from fault would seeme most cleare.[1681]

9.

Thy intent[1682] I know is honest,[1683] playne, and good,


To warne the wise, to fray the fond fro[1684] ill,
But wicked worldlings are so witles wood,
That to the worst they althinges construe still:
With rigour oft they recompence good will:
They racke the wordes till time theyr sinowes burst,
In dolefull[1685] sences strayning still the worst.

10.

A paynfull proofe taught mee the truth of this,


Through tyraunt’s rage, and fortune’s cruell tourne:
They murdred mee, for meetring things amisse:
For wotst thou what? I am that Collingbourne
Which made the ryme, whereof I may well[1686] mourne:
[1687]
“The cat, the rat, and Louell our dog,
Doe rule all England, vnder a hog.”

11.

Whereof the meaning was so playne and true,


That euery foole perceiued it at furst:
Most liked it, for most that most things knewe,
In hugger mugger, muttred what they durst:
The tyraunt prince of[1688] most was held accurst,
Both for his owne, and for his counsayl’s faults,[1689]
Of whom were[1690] three, the naughtyest of all
naughts.

12.

Catesby was one, whom[1691] I called[1692] a cat,


A crafty lawyer, catching all hee could:
The second Ratcliffe, whom I namde a rat,
A cruell beast to gnawe on whom hee should:
Lord Louell barkt and bit whom Richard would,
Whom I therefore did rightly tearme our dog,
Wherewith to ryme I calde the king a hog.

13.

Tyll he the crowne had caught, hee[1693] gaue the bore,


In which estate would God hee had deceased,
Than had the realme not ruined so sore,
His nephue’s raigne should not so soone haue ceased,
The noble bloud had not beene so decreased:
His rat, his cat, and bloudhound had not noyed,
Such liegemen true, as after they destroyed.[1694]

14.

Theyr lawles actes good subiects did[1695] lament.


And so did I, and therefore made the rymes
To shew my wit, how well I could inuent,
To warne withall the carelesse of theyr crymes:
I thought the freedom of the auncient tymes
Stoode still in force: Ridentem dicere verum
Quis vetat? nay, nay. Veritas est pessuma[1696] rerum.
[1697]

15.

Belike no tyraunts were in Horace’ dayes,


And therefore poets freely blamed vice,
Witnesse theyr satyrs[1698] sharp, and traguike playes,
With chiefest princes chiefly had in price:
They name no man, they mixe theyr gall with spice,
No more doe I, I name no man outright,
But riddle wise, I meane them as I might.

16.

When bruite had brought this to theyr gylty eares,


Whose right surnames were[1699] noted in the ryme,
They all conspired, like most greedy beares,
To charge me straight with this most greeuous cryme:
[1700]
And damned mee the gallow tree to clyme,
And then strangled, in[1701] quarters to bee cut,
Which should on high ouer[1702] London gates be put.

17.

This iudgement giuen so vehement and sore,[1703]


Made me exclame agaynst[1704] theyr tyranny:
Wherewith encenst, to make my payne the more,
They practised a shamefull vilany:
They cut mee downe aliue, and cruelly
Ript vp my paunch and bulke, to make me smart,
And lingred long ere they tooke out my hart.

18.

Here tyraunt Richard playde the eager hog,


His grashing tuskes my tender gristles shore:
His bloodhound Louell playde the hungry dog,[1705]
His woluish teeth my giltles carkasse tore:
His rat, and cat, did what they might, and more
Cat Catesby clawed my guts to make me smart,
The rat Ratcliffe[1706] gnawed mee to the hart.

19.

If Iewes had kilde the iustest king aliue,


If Turkes had burnt vp churches, gods, and all,
What greater payne could cruell hearts contriue,
Than that I suffred for this trespasse small?
I was no prince, nor peere, but yet my fall
Is worthy to be thought vpon for this,
To see how cankard tyrant’s malice is.

20.

To teach also all subiects to take heede


They medle not with magistrates affayres,
But pray to God to mend them if it neede:
To warne also all poets that be strayers,
To keepe them close in compasse of theyr chayers,
And when they touch that they would wish[1707]
amended,
To sauce them so, that fewe neede bee offended.

21.

And so to mixe theyr sharpe rebukes with mirth,


That they may pearce, not causing any payne,
Saue such as followeth euery kindely byrth,
Requited strayt, with gladnes of the gayne:
A poet must be pleasaunt, not too playne,
Faults to controll, ne yet to flatter vice,[1708]
But sound and sweete, in all things ware and wise.

22.

The Greekes do paynt a poet’s office whole


In Pegasus, theyr fayned horse with wings,
Whome shaped so Medusae’s bloud did foale,
Who with his feete strake out the muses’ springs,
Fro[1709] flinty rockes to Hellicon that clings:
And then flewe vp into[1710] the starry skie,
And[1711] there abides among the gods on hye.[1712]

23.

For hee that shall a perfect poet bee,


Must first bee bred out of Medusae’s bloud,
He must be chast and vertuous, as was shee
Who to her powre the Ocean god withstoode:
To th’ende also his doome be iust and good,
Hee must, as shee, looke rightly with one eye
Truth to regarde, and write nothing awrye.[1713]

24.

In courage eke he must be like a horse,


He may not feare to register the right:
What though some frowne? thereof he may not force,
[1714]
No bit, nor reyne, his tender iawes may twight:
He must be armde with strength of wit and sprite,
To dash the rocks, darke causes and obscure,
Till hee attayne the springs of truth most pure.
25.

His hooues also must[1715] plyant bee and strong,


To riue the rocks of lust and errours blinde,
In braynlesse heads, that alway wander wrong:
These must hee brise[1716] with reasons playne and
kinde,
Till springs of grace doe gush out of the minde:
For till affections from the fond be driuen,
In vayne is truth tolde, or good counsayle giuen.

26.

Like Pegasus a poet must haue wings,


To flye to heauen, or where him liketh best:[1717]
He must haue knowledge of eternall things,
Almighty Ioue must harbour in his brest:
With worldly cares he may not be opprest,
The wings of wit and skill[1718] must heaue him hyer,
With great delight to satisfie desier.[1719]

27.

He must also be lusty,[1720] free, and swift


To trauayle far, to vewe the trades of men,
Great knowledge oft is gotten by this[1721] shift:
Things that import hee[1722] must bee quicke to pen,
Reprouing vices sharply now and then:
He must be swift when touched tyraunts chafe,
To gallop thence, to keepe his carkas safe.

28.

If I had well these qualityes considered,[1723]


Especially that which I touched last,
With speedy flight my feete should haue deliuered
My feeble body from [a] most boystrous blast,[1724]
They should haue caught mee, ere I had be cast:[1725]
But too much trusting to a tyraunt’s[1726] grace,
I neuer shronke, nor chaunged port or place.

29.

I thought the poet’s auncient libertyes


For pleas had beene allowed at the bar:[1727]
I had forgot how newe found tyrannyes
With truth[1728] and freedom were at open war,
That lust was lawe, that might did make and marre,
That among tyraunts this is[1729] and euer was,[1730]
Sic volo, sic iubeo, stet pro ratione voluntas.

30.

Where lust is[1731] lawe it booteth not to pleade,


No priuelege nor[1732] libertyes avayle:
But with the learnde, whome lawe and wisdome leade,
Although through rashnes poets hap to rayle,
A plea of dotage may all quarels quayle:
Theyr olde licence[1733] theyr writings to expounde,
Doth quit them cleare from faults by Momus founde.

31.

This freedom old ought[1734] not to be debard


From any wight that speaketh ought, or writeth:
The author’s meaning should of right be heard,
He knoweth best to what end he enditeth:
Wordes somtime beare more then the heart behiteth:
Admit therefore the author’s exposition,
If playne, for trueth: if forc’d, for his submission.

32.
In case of slaunder, [the] lawes[1735] requyre no more,
Saue to amend that seemed not well sayde:[1736]
Or to vnsay the slaunder’s sayde afore,
And aske forgiuenes for the hasty brayde:
To heretikes no greater payne is layde,
Then to recant theyr errours, or retract:
And worse then these can be no writer’s acte.

33.

“Yes,” quoth the Cat, “thy rayling words be treason,


And treason is far worse then heresy:”
Then must it follow by this awkewarde[1737] reason,
That kings be more then God in maiesty,
And soules be lesse then bodyes in degree:
For heretikes both soules and God offend,
Traytors but seeke to bring man’s life to end.

34.

I speake not this t’abace[1738] the haynous fault,


Of trayterous actes abhorde by God[1739] and man,
But to make playne theyr iudgement to be naught,
That heresy for lesser sin doe ban:
I curse them both as deepe as any can,
And alway did: yet through my foolish ryme,
They stayned mee with that most hatefull cryme.[1740]

35.

I neuer meant the king or counsayl harme,


Unles to wish them safty were offence:
Agaynst theyr powre I neuer lifted arme,
Nor pen, nor tongue, for any ill pretence:
The ryme I made, though rude, was sound in sence,
For they therein, whom I so fondly named,
So ruled all that they were foule defamed.
36.

This was no treason, but the very troth,


They ruled all, none could deny the same:
What was the cause then why they were so wroth?
What, is it treason in a ryming frame
To clip, to stretch, to adde, or chaunge a name?
And this reserued, there is no ryme nor reason,
That any craft can clout to seeme a treason.

37.

For where I meant the king by name of hog,


I only alluded to his badge the bore:
To Louel’s name I added more our dog,
Because most dogs haue borne that name of yore:
These metaphors I vsde[1741] with other more,
As cat, and rat, the halfe names of the rest,
To hide the sence that they so wrongly wrest.

38.

I pray you now what treason finde you heare?


Enough, you rubd the gilty on the gaule,
Both sence and names doe note them very neare:
I graunt that was the chiefe cause of my faule,
Yet can you finde therein no treason at all:
There is no worde against the prince, or state,
No harme to them whom all the realme did hate.

39.

But sith the gilty alwayes are suspicious,


And dread the ruin that must sue by reason,
They cannot choose but count theyr counsayle vicious
That note theyr faults, and therefore call it treason:
All grace and goodnes with the lewde is geason:
This is the cause why they good thinges doe wrest,
Whereas the good take ill things to the best.

40.

And therefore, Baldwine, boldly to the good


Rebuke their fault, so[1742] shalt thou purchase thankes:
As for the bad, thou shalt but moue their[1743] moode,
Though pleasauntly thou touch their naughty prankes:
[1744]

Warne poets all, no wise to[1745] passe the bankes


Of Hellicon, but keepe within the bound:[1746]
So shall their freedome to[1747] no harme redound.
[1748][1749]

You might also like