IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Abstract: Dot product is an advanced subject of applications in many areas. It is known that the dot product is inadequate for many applications. In this paper, we introduce a new type of dot product, Image Dot Product or Idot Product. In particular, an L-factor for the Idot product is introduced. We also investigate both the binary Idot product, and the Idot product. In addition, there are many open questions to be answered about the Idot product.
A solution to shadow attacks based on password reuses
T.V.S.Srivatsava, P.Sudheer Kumar
DOI: 10.17148/IJARCCE.2018.742
Abstract: The expansion of internet connectivity has increased development of many websites. There are several means of authentication mechanisms for every user to use those web applications. Of them password based authentication is widely used. User may show interest in working with other different applications but it becomes inconvenient for a user to remember several different passwords. So he/she uses same password in one domain to another domain. This leads to one of the cyber security threat called as shadow attacks.
Bhushan P. Kalegore, Priyanka S. Mane, Maithili N. Palshikar, Aishwarya S. Dhore , Prof. SushmaShinde
DOI: 10.17148/IJARCCE.2018.743
Abstract: Medical information area unit an ever growing supply of data generated from hospitals consisting of patient records within the variety of copies which might be created easier and convenient by mistreatment QR code of the patient details. Our aim is to create a Healthcare vascular system which is able to offer the options like clinical management, patient records, wellness prediction and generate QR code for each patient as per there updated wellness data. Keylogging or keyboard capturing is that the activity of recording (or logging) the keys stricken on a keyboard, commonly during a incommunicative manner so the individual utilizing the keyboard is unconscious that their activities area unit being discovered. It likewise has exceptionally authentic uses in investigations of human-computer interaction. There are a unit numerous Keylogging techniques, extending from hardware and software package primarily based methodologies to acoustic examination. As well as human in authentication protocols, whereas guaranteeing, isn't easy in light-weight of their restricted capability of calculation and remembrance. We tend to exhibit however careful image define will improve the safety additionally because the convenience of authentication. We tend to propose to visual authentication protocols: one may be a one-time-password protocol, and also the different may be a password-based authentication protocol. Our Project approach for real arrangement: we tend to have the capability attain to an abnormal state of simple use whereas fulfilling tight security wants.
Keywords: Keylogging, QR Code, Medical Data, Health-care Portal system.
Efficient and Noiseless Mining of Software Engineering Data with Optimized Effort using TLBO: A Novel Approach
Gurtej Singh Ubhi, Jaspreet Kaur Sahiwal
DOI: 10.17148/IJARCCE.2018.744
Abstract: The domain of software engineering has been emerging as a challenging field in other domains of expertise. With the rapid evolution and the presence of software based tools have proved the applicability of data mining in the field of software engineering. This field is linked with the application of data mining methods to offer valuable insights into how to advance software engineering processes and software itself, supporting decision-making. The main rationale here is to convey the role of software engineering as a method so as to grab the attention of our community that can prove as an attractive leeway for data mining applications and to show how data mining can considerably add to software engineering research. Utilizing entrenched information mining strategies, professionals and analysts can investigate the capability of this important information keeping in mind the end goal to better deal with their activities and to create higher-quality programming frameworks that are conveyed on time and within spending plan or budget. This paper offer an approach that how data mining can make a noteworthy involvement to the success of current software engineering efforts and will tend to provide some set of recommendations that is meant to increase the success of experts participation and model satisfactoriness
Keywords: Software Mining, Teaching Learning Based Optimization, MMRE, Artifacts.
Implementation of Mask Estimation & ANN for Speech Enhancement in Non-Stationary Noise Environment
Suresh Kumar, Mr. Santosh Kumar
DOI: 10.17148/IJARCCE.2018.745
Abstract: In conventional single-channel speech enhancement, typically the noisy spectral amplitude is modified while the noisy phase is used to reconstruct the enhanced signal. It provides speech enhancement under different noisy conditions. The speech power spectrum varies greatly for different types of speech sound. The energy of voiced speech sounds is concentrated in the harmonics of the fundamental frequency while that of unvoiced sounds is, in contrast, distributed across a broad range of frequencies. To identify the presence of speech energy in a noisy speech signal we have therefore developed two detection algorithms. The first is a robust algorithm that identifies voiced speech segments and estimates their fundamental frequency. The second detects the presence of sibilants and estimates their energy distribution. The use of speech enhancement algorithm removes or reduces the presence of noise. The aim of the noise reduction algorithms is to estimate the clean speech signal from the noisy recordings in order to improve the quality and intelligibility of the enhanced signal. Due to this, it presents a method for speech enhancement using mask estimation iteratively.
Keywords: Speech Enhancement, Speech Processing, Noise Filtering, Sparse Representation etc.
Abstract: Money has given birth to numerous types of crime, one of which is Money Laundering. Money laundering is the method by which criminals disguise the illegal origins of their wealth and protect their asset bases, so as to avoid the suspicion of law enforcement agencies and prevent leaving a trail of incriminating evidence. To deal with this issue, the Reserve Bank of India (RBI), has introduced various guidelines to identify any sort of suspicious transactions. Once identified, they are forwarded to Financial Intelligence Unit (FIU). FIU studies the transaction and verifies its authenticity. However, this process is long, time consuming and not suitable to identify a certain type of transactions that occur in the system. To overcome this problems we propose an efficient Anti Money Laundering technique which is a composition of data mining approach and rule based engine. Data mining approach makes use of frequent association mining and graph analysis whereas Rule based engine works on the principle of rules getting fired whenever a suspicious transaction comes into main memory.
Keywords: Anti-money laundering, online payment, multi-agent, data mining, rule base agent.
Mr. Akash Gorle, Mr. Akash Patil, Mr. Ajay Wahane, Mr. Abhishek Bagde, Prof V.P. Yadav
DOI: 10.17148/IJARCCE.2018.747
Abstract: Now a days Students life is very challenging and the college schedules are very active. In busy schedule, it is not possible for students to remained there activities. Sometimes, it is difficult for student to remember important tasks for example: attending lectures, submitting assignment, etc. And this process keep going on repeatedly. The human brain is not designed to remember multiple activities. To make student life easy we try to design this application.
Abstract: CONTROLLER Area Network (CAN)-based networked system. In these systems, the network is the central information hub, on which time critical data are transmitted. CAN provides an inexpensive, durable network that helps multiple CAN devices communicate with one another. An advantage to this is that electronic control units (ECUs) can have a single CAN interface rather than analog and digital inputs to every device in the system. This decreases overall cost and weight in automobiles. An energy efficient clustering algorithm with optimum parameters is designed for reducing the energy consumption and prolonging the system lifetime. Here we approach an Energy Efficient Clustering Mechanism (EECM) with Firefly algorithm. And also present a Cluster key Management for secure transmission in WSN. A Firefly Algorithm (FA) is a recent nature inspired optimization algorithm that simulates the flash pattern and characteristics of fireflies. Clustering is a popular data analysis technique to identify homogeneous groups of objects based on the values of their attributes. And we propose an efficient Cluster Key Management (CKM) scheme for secure communication in dynamic WSNs characterized by node mobility. The CKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. We plan to improve the performance of the proposed security protocol with an implementation of the encryption to optimize our security technology. And demonstrated it through simulation experiments.
Chetna Sahu, Ekta Thakre, Gunjan Kawale, Harshini Urmale, Prof. Uma Thakur
DOI: 10.17148/IJARCCE.2018.749
Abstract: An application is a software program that is designed to perform a specific function directly for users or in some cases for another application program. So we are making an application for college students where they can ask their queries about any subject and the teachers of college will guide them with answers. Students will ask their queries to teachers by tagging them and teacher will answer queries of students by tagging them back. Login page for students and teachers will be provided for security purpose.
Intelligent Feedback System Using Latent Semantic Analysis
Tejesh Gaikwad, Shantanu Mirashi, Rahul Shinde, Pradip Shinde, Prof. S. A. Deshpande
DOI: 10.17148/IJARCCE.2018.7410
Abstract: Feedback is most important for any organization to analyse and improve. Getting accurate feedback within time is important for an organization to grow. The purpose of this project is to get online feedback from the students� comments. The comments will be analyzed using the latent semantic analysis and then show the summarized results in the text format. The system takes a student�s comment given on the lecture and analyses it to provide better performance of the lectures. The feedback system uses the semantic analysis to understand the meanings of the comments, after finding the Sentiment of student�s comments and summarizes the result. After the analysis, summarization is done and the result is shown. After the process is done system shows the quality of the lectures.
Abstract: Wheelchair is a device used to move physically challenged people or patients from one place to another who are unable to walk by themselves. The main aim of this paper is to prepare a Head-Motion Controlled Wheelchair for physically disabled people who cannot move by their own. Electric wheelchair are very expensive and costs more than 60000 Rupees. Standard wheelchairs are controlled manually by means of other persons or self-propelling. Head-Motion Controlled Wheelchair is an electric wheelchair which can be controlled by head movements of the patients or physically challenged people and does not require any effort as it works electric motors. Accelerometer is used to sense the forward and backward movement of head which can be used to control the wheelchair forward or backward respectively.
Generation of Compressed Air using Vehicle Suspension System
Ritesh B. More, Sushil S. Daware, Akash A. Shinde, Jome Josh, Prof. G. B. Salunke
DOI: 10.17148/IJARCCE.2018.7412
Abstract: Pneumatic energy is the readily available and low cost energy. Non-conventional energy system is very essential at this time to our nation. So the pneumatic energy is considered for our project. In this project compressed air can be produced with the help of to and fro motion of suspension. Then this compressed air is stored in air tank and further utilized in other application the vehicle, such as pneumatic jacks, dense air in air conditions and carburetor with the help of battery operated solenoid valve. Compressed air production using vehicle suspension needs no extra fuel input power to generate the compressed air. This air operated four wheeler is the new innovative concept to run vehicle accessories by using the compressed air system within the vehicle itself. Begins with an introduction to pneumatic it�s various applications and units and briefly explains a few devices capable of utilizing air effectively and their relative merits, we have taken a solenoid valve for showing the pneumatic jack application in prototype. The pneumatic operated vehicle is very useful for drive the four wheel drives suspension. Air is the working substance of our project. The aim of our project is to gives smooth operation and smooth movement for vehicle�s integral part of application. Our project model consists of air tank, suspension, Pneumatic Actuator, solenoid valve and total prototype model.
Keywords: Compressor Air operation, Actuator, Renewable, Solenoid valve.
Abstract: This paper presents a review of the designs of different voltage reference circuits on the basis of different parameters such as Vref, supply range, power dissipation, temperature coefficient etc. The circuits reviewed are ultra-low power. Recent research in CMOS integrated voltage generators has resulted in the development of components that make possible the design of a high performance linear CMOS voltage reference generators with low output noise. In this paper, few of the designs are reviewed on the basis of the performance of the circuits.
Keywords: Voltage Reference, MOSFET, Current reference.
Real time communication for emergency treatment and nearest hospital searching IOT based system using android application
Prof. Ritika Hirwani, Mr. Swapnil Gawari, Ms. Shweta Gove, Ms. Rohini Pawar, Mr.Rahul narkhede
DOI: 10.17148/IJARCCE.2018.7414
Abstract: The IoT (Internet of Things) has been broadly used to interconnect the accessible medical assets and offer brilliant, reliable and successful social insurance administration to the general population. Health monitoring for dynamic and helped living is one of the standards that can utilize the IoT favourable circumstances to enhance the elderly way of life. Proposed system represents an IoT architecture customized for healthcare applications. This system stores collected data on database server for analysis and processing purpose and send result to the user. This proposed system is able to send emergency information from an ambulance to nearby hospital after searching and availability. Most important feature of system is ambulance admin takes some personal information of accidental person by using thumb scanning device and starts nearest hospital searching as per Patient�s situation and Send request to hospital about availability. If availability is there then send details immediately to the hospital.
Keywords: Wireless Communication, Mobile applications, Hospital system, Finger Print Device, Blood Bank Management.
Abstract: India is primarily an agrarian economy, but still Indian farmers continue to be among the poorest in the world. With presence of abundant raw materials in the form of natural resources, India lags far behind in ensuring food security for its own citizens. So, the aim behind developing this app is to give India�s huge farming community a fair and consistent price for their produce. Farmers can directly connect with the end users and supply the product directly to them by using this app. This will increase the profit of the farmers and also end users can get good quality product in fewer prices as they will directly buy from farmers. This app will be providing the analysis on price trends which will be beneficial to farmers for marketing their commodities. Also, interface will be provided in Marathi language.
Keywords: Market Rate, Farmer/Customer, Regression analysis, Price analysis, Marathi Language
Abstract: A forest consists of different types of trees, herbs shrubs and other verity of vegetation. In different ways this renewable resource is helpful to man. The most common hazard in forests is forests fire. Forests fires are as old as the forests themselves. This fire seriously damages forest wealth as well as the bio-diversity gets disturbed. Since forest is very important natural resource it has a great impact on environment due to which their early detection is very vital. The aim of our project is to continuously monitoring forest condition, detect ion of forest fire and its position and to inform the forest authority. So that necessary action can be taken immediately in case of fire. The two main modules present in the project are the Monitoring Area Module and the Forest Area Module. This paper gives an importance of wireless sensor technology. The DHT 11 sensors collect the data and transmit to the central unit as well as alert is send via call or message using GSM. It also shows that the Optimized Solar Energy Harvester increases the efficiency to about 90%.
Abstract: Identifying the faults in the electronic circuits is a hard process. As the complexity of Very Large-Scale Integration (VLSI) is growing testing becomes complex and harder. A malfunctioning circuit is a result of design flaw, manufacturing defects or both. Testing is used as a measure to estimate the quality of design. Hence detecting a flaw more than one time has high degree of fault coverage. Earlier fault models are used to test the digital circuits at gate level or below that level. This project focus on creating a Register Transfer Level (RTL) modeling for the digital circuit and finding out the fault coverage of given test patterns. Fault models are taken based on the observed failures or by analyzing various types of faults. Fault coverage reflects the quality of test vectors with respect to the fault models. For a VLSI system consisting of different modules the overall coverage is a weighted sum of RTL module coverages[17]. Here a device under test is created and fault modelling and simulation is done to obtain the fault coverage. Device under test taken here is an adder circuit which is used to analyze the process, where single Stuck-at-faults are introduced arbitrarily and the test process is carried out using 3- bit sequence pattern. These patterns, which are generated randomly flow through the entire circuit, and compare it with the faults that are present in the components, either at the input or output. During the comparison if the component response and the pattern response are same, then it is considered as a fault free component. If the response differs, they are considered as fault and are recorded. In this manner many patterns detect the same faults or different faults. The fault coverage is then analyzed for the circuit from the simulated result[13]. This entire testing process is analyzed by using tools like MODELSIM & System Verilog. Analysis can be performed on other high-speed adder and multiplier circuits to get the fault coverage.
Keywords: VLSI, RTL (Register Transfer Level), DDS, Gates.
Minimizing Penalty in Industrial Power Consumption By Engaging APFC Unit
Arpitha Raju, Jithendra K S, Mithun K S, Sanjay K R
DOI: 10.17148/IJARCCE.2018.7418
Abstract: In the present innovative upset power is valuable. So we have to discover the reasons for control misfortune and enhance the influence framework. Because of industrialization the utilization of inductive load increments and thus control framework misfortunes its productivity. So we have to enhance the power factor with an appropriate strategy.At whatever point we are considering any programmable gadgets then the inserted innovation comes into fore front. The installed is presently a day especially mainstream and most the item are produced with Microcontroller implanted technology. Automatic control factor remedy gadget peruses control factor from line voltage and line current by deciding the deferral in the landing of the present flag as for voltage motion from the capacity generator with high precision by utilizing an inward clock. This time esteems are then adjusted as stage point and relating power factor. At that point the qualities are shown in the 2X16 LCD modules. At that point the motherboard ascertains the remuneration prerequisite and appropriately switches on various capacitor banks. This is produced by utilizing 8051 microcontroller. Automatic power factor correction techniques can be applied to the industries, power systems and also house holds to make them stable and due to that the system becomes stable and efficiency of the system as well as the apparatus increases. The use of microcontroller reduces the costs
Keywords: APFC, Apparent power, Capacitor bank, Power factor and Microcontroller.
Power Transmission Line Fault Detection and Location Using Labview
T.B Dayananda, Akash, Suresh S Ekambe, Varun H N
DOI: 10.17148/IJARCCE.2018.7419
Abstract: At present the field of science, engineers and technology is so dynamic due to recent improvement in computer and other technologies. The advances in computer field developed such programs to solve our traditional and novel problems of practical life. We can solve our complex problems within a few minutes due to high computational abilities, accuracy of computer based programs. For electrical people there are many software programs are currently used in academia to design and analyse different kinds of electrical circuits and models. The main objectives of this project is to find out transmission line fault, overload, unbalanced and power theft using LabVIEW software. Initially we have a balanced circuit then by using relays we will show unbalanced and overload condition and finally how power theft can be detected is also shown in our project. We collect current and voltage values from circuit to computer through data acquisition(DAQ) hardware which digitalises the analog values. This way we can acquire data if any fault occurs it will be displayed on the computer screen.
Keywords: LabVIEW, DAQ, Unbalanced, power theft, unbalanced.
Design and Implementation of Air Mouse using Accelerometer Sensor
Kesthara V, Niveditha Rati Banakara, Pragati, Priyadarshini G N, Vanishree S V
DOI: 10.17148/IJARCCE.2018.7420
Abstract: With the day to day advancements in technology, the interaction between the human and the digital world is diminishing. The main aim of this project is to work with accelerometer sensors and translate the motion or the tilt of the hand into various applications in virtual world. The advancement of technology in the field of wireless made it possible for any applications. Gesture based operation of electrical appliances is becoming increasingly desired technology. Here we are using accelerometer sensor in order to translate the hand motions or tilts into virtual world. The most commonly used hand motion control in a computer is that of a mouse. The mouse will be a hand mounted device. Appropriate gestures, such as hand swipes in which we will be wearing the accelerometer sensor and other interfacing devices as a virtual mouse, are a safer and faster way to control the device.
Anjali Manwani, Sohail khan, Shubham Singh, Prof. R.M.Patil
DOI: 10.17148/IJARCCE.2018.7421
Abstract: In many countries food wastage is big issue in hotels and restaurant. The project Food Management System is implemented to reduce the manual work and enhances the accuracy of work in a restaurant and reduce the wastage of food .This system manages and maintains the record of customers and wastage of food and donor�s record. We propose to build a software project that can efficiently handle and manage various activities of a restaurant and all these activities will be happening under the administrator. This project is designed with full consideration to users in an easy manner without any unnecessary wastage of time. The product aims at satisfying the requirements of needy organizations through donations over the net. It provides information about the motivation to come up with such an application, thereby describing the existing donation system and how the proposed product works for the betterment of society. The product is shown to be an effective means of donating things to organizations, etc. over the internet. It shows the potential for avoiding the wastage of food.
Sustainable E-Agriculture Knowledgebase for Information Dissemination to Develop Indian Agriculture Sector and Empower Rural Farmers
Rahul Singh Chowhan, Purva Dayya, Dr. U.N. Shukla
DOI: 10.17148/IJARCCE.2018.7422
Abstract: The goal of E-Agriculture is to enhance agricultural in addition to rural improvement by using various facts and verbal exchange techniques. The inspiration to use full-fledged potential of ICTs for agriculture capability building, and marketing has existed for a long time. It's far just most currently the dissemination of records started out harnessing ICTs extra efficaciously for better provider delivery to the farmers. ICT has increased sharing of knowledge from various sessions over radio talks and TV castings have stimulated agricultural improvements at some stage in the United States. We've got 29 States and seven Union Territories 644 District, 5,924 sub-districts, 6,50,244 villages and sixty eight.84% of the Indian populace is inhabitated in rural areas as in step with the 15th Indian Census 2011. In this paper, we've got mentioned different factors of E-Agriculture within the Indian context.
Keywords: E-Agriculture; GDP; Communication Technologies.
Abstract: In all the cities or societies the water is supplied by the municipal corporations. Still, there are certain cities where the water supply is done manually by the operator. The operator opens the valve for a particular period of time and the water is being supplied to all the houses. The water supply is provided at a fixed flow rate. Certain consumers/users draw excess water by connecting motor-pump sets to the water lines which is considered as water theft. Also issues occur when the user requires additional water in his tank, but the water supplied to the houses is at fixed timings of the day. To solve the above issues we came up with this idea of developing an embedded system for monitoring the water supply system. In this project, we are developing an embedded based remote water monitoring and theft prevention system by recording the flow rates at the consumer/user end. To implement the proposed water supply system, each consumer end should be provided with a web-based application consisting of various options for the user to record the flow rate using a level sensor(ultrasonic sensor) and to transmit the same to a remote monitoring station using IoT and it is also provided with an electrically operated solenoid valve to supply water to the consumers. The valve turns on/off by the central processing unit Raspberry Pi to stop the water supply whenever the flow rate exceeds a predefined limit. Also the user has the option to request for additional water whenever required. This eases up the task both of the operator as well as the user.
Keywords: Water Supply System; IOT; Water Level Sensor; Flow Sensor; Turbidity Sensor; Raspberry Pi; Moisture Sensor.
Abstract: The Government of India provides the Ration Cards as an official document authorizing the holder to a ration of food, fuel, or other goods. An Indian Citizen holding the Ration Card primarily uses it for purchasing subsidized ration like wheat, rice, sugar and kerosene. They are an important subsistence tool for the poor, providing documented proof of identity and a connection with the Indian government databases. All the people must have valid ration card to buy any material from the ration shops. This material has to be taken from the shopkeeper once in a month. In this paper we are trying to explore some monitoring systems which are to be linked with government offices, shopkeeper and the ration card holder.
Keywords: RFID Tag/Card, RFID Reader, AVR Microcontroller, Load-Cell.
A Literature Survey on Adaptive Approach for Mobile Wireless Sensor Network with Dynamic Cluster Head Selection
Abhinav R.B, Mr.Prasad A.M
DOI: 10.17148/IJARCCE.2018.7425
Abstract: Wireless Sensor Networks (WSN) is the key resource of perception and is widely used trends now a days. In wireless sensor network clustering, Efficient clustering and proper Cluster Head (CH) selection schemes are required, in order to improve energy saving of sensor nodes. In this paper, Dynamic CH Selection Method (DCHSM) is used where CHs are selected dynamically to solve the problem of the unreasonable cluster head selection that may lead to the overlapping coverage and unbalanced energy consumption in the cluster communication. By comparing it with the other existed algorithms, Here the network lifetime is increased by 50%, higher than that of Low Energy Adaptive Clustering Hierarchy (LEACH), and increased by 30%, higher than that of Distribute Energy -Efficient Clustering Algorithm (DEEC). The survival time of the network is longer than that of energy-balanced deterministic clustering algorithm and adaptive energy optimized clustering algorithm. The effectiveness of the network energy consumption, and it has the longest network lifetime which can be achieved.
Abstract: This paper shows an approach for remote information correspondence between two frameworks through unmistakable light. This approach makes a way which can make information transmission quicker than current remote correspondence innovation. Utilization of noticeable light for remote correspondence can fathom issue of absence of radio wave range space that will build the information transmission rate. The proposed framework exhibits transmission and gathering of information by turning LED on and off at high force which is too quick to possibly be seen by human eye. We can encode different information by fluctuating the rate at which LEDs flash also, transmit it. This paper depicts the plan, manufacture, and abilities of unmistakable light based information correspondence, and in addition the improvement of the LED and photograph sensor based optical remote correspondence framework. The information is to be send from one PC to another PC utilizing COM serial correspondence.
Keywords: Wi-Fi, Radio Spectrum, Li-Fi, Visible Spectrum
Abstract: Bug is a very essential factor which is occur in software. Almost every company facing problem to solve issues related bug, software companies spends over 40-45 percent of cost in dealing with software bugs. Very important step to handle bug is bug triage, which aims to correctly assign a developer to a new bug. To lower the time price in guide work, text category strategies are implemented to behavior computerized bug triage. In this paper, we address the problem of facts reduction for bug triage, i.e., a way to reduce the scale and enhance the satisfactory of bug records. We integrate instance selection with feature selection to simultaneously lessen facts scale on the malicious program dimension and the word measurement. To determine the order of making use of example selection and function choice, we extract attributes from historic malicious program information units and build a predictive model for a new computer virus information set.
Keywords: Mining software repositories, application of data preprocessing, data management in bug repositories, bug data reduction, feature selection, instance selection, bug triage, prediction for reduction orders.
Distracted Driver Detection using CNN and Data Augmentation Techniques
Vasanti Sathe, Neha Prabhune, Anniruddha Humane
DOI: 10.17148/IJARCCE.2018.7428
Abstract: One of the critical problems prevailing in India is the deaths caused by road accidents. Almost 80% of the accidents are caused by the inattentiveness of the driver. Usage of mobile phones, talking to passengers, reaching behind to grab something and drinking while driving are some of the reasons due to which driver may lose attention. Distractions are of numerous types, out of which we focus on the manual distraction which is based on the posture of the driver. In this paper, we propose a system where we make use of Convolutional Neural Networks and data augmentation techniques. Data augmentation techniques are used to increase the variability of the dataset and decrease overfitting. We have used the first publicly available dataset as input for our model. Our aim is to categorize a test image into one of the nine distinct distracted states of the driver that we have considered. Conclusively, the experimental analysis has shown that applying data augmentation techniques, the proposed model gives better results.
Keywords: Convolutional neural networks, data augmentation techniques, deep learning methods, distracted driver.
Securing Cloud from Intrusion Attacks using Intrusion Detection System in Virtual Machine Environment
Prof. Mr. M. K. Nivangune, Ms. Kanchan Bairagi, Ms. Archita Kotkar, Mr. Vishnukant Salunke
DOI: 10.17148/IJARCCE.2018.7429
Abstract: In a public cloud computing environment, consumers cannot always just depend on the cloud provider�s security infrastructure. They may need to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Traditional Intrusion Detection Systems (IDSeS) are not suitable for these environments due to their openness and limited essence. Intrusion Detection System as a Service (IDSaaS), monitors a system or a network for illegal activities in public cloud (IaaS) by providing intrusion detection technology that is portable, secure and fully controlled by the cloud service providers (CSPs). A prototype of IDS is described.
Abstract: In our country 6% of people are visually impaired person and 2.78% of people are not able to speak. The vision and voice are the major defect for these two persons. Sign way of communication indicates sign languages used by dumb person. Sign language is the language of communication for deaf and dumb people. Most of these physically impaired communities are dependent on sign language translators to express their thoughts to rest of the world. This causes isolation of these people in society. Hence, Sign language recognition is one of the most growing fields of research today. A sign language is composed of various gestures formed by physical movement of body parts i.e. hand, arms or facial expressions. In this project, a method is proposed that makes the use of hand gestures for recognition of indian sign language. Hand gesture recognition system provides us an innovative, natural, user friendly way of interaction with the computer which is more familiar to the human beings. The communication between the dumb and visually impaired person are made only by their expressions and their hand gestures. This project presents various methods of hand gesture and sign language recognition for blind and dumb person.
Speed Synchronization of Multiple Motors in Industries
M. Karthigeyan, K. Namashivayam, B. Sunil Shaajan, S. Sivasami, Dr.M.Subba
DOI: 10.17148/IJARCCE.2018.7431
Abstract: In our country 6% of people are visually impaired person and 2.78% of people are not able to speak. The vision and voice are the major defect for these two persons. Sign way of communication indicates sign languages used by dumb person. Sign language is the language of communication for deaf and dumb people. Most of these physically impaired communities are dependent on sign language translators to express their thoughts to rest of the world. This causes isolation of these people in society. Hence, Sign language recognition is one of the most growing fields of research today. A sign language is composed of various gestures formed by physical movement of body parts i.e. hand, arms or facial expressions. In this project, a method is proposed that makes the use of hand gestures for recognition of indian sign language. Hand gesture recognition system provides us an innovative, natural, user friendly way of interaction with the computer which is more familiar to the human beings. The communication between the dumb and visually impaired person are made only by their expressions and their hand gestures. This project presents various methods of hand gesture and sign language recognition for blind and dumb person.
Human Detection System using Drone for Earthquake Rescue Operation
A. Shobika, N. Thenkuzhali, S. Suganya, G.R. Nivedha, R.Hiemaja
DOI: 10.17148/IJARCCE.2018.7432
Abstract: Many areas of the world get affected by natural calamity. Disasters are unstoppable and leave behind a great loss of life. Disasters like earthquake, floods, etc. cause mass destruction and often lives get buried or trapped in debris. In such situations detection by rescue workers becomes time consuming and due to the vast area that gets affected it becomes more difficult. In this system, we are proposing a human detection quad-copter which can detect alive humans in debris so that timely help can be made available to the victims. The proposed alive human being detection system contains Passive Infrared sensor (PIR) which gives the information about the presence of alive human body. Radio Frequency Technology is used to control the quad-copter. ATMEGA8A microcontroller will give an alerting message to the rescue operator of the affected sites and they will give proper rescue to the affected victims. In disaster sites, it will be a great help to rescuers in detection of more alive human beings at the proper time. This system is also user friendly, economical, semi-autonomous and efficient for detection.
Keywords: PIR sensor, ATMEGA8A microcontroller, quad-copter, Brushless DC motor, Buzzer, RF transmitter and receiver.
Solid State Transformer Interfaced Squirrel Cage Induction Generator Wind Turbine using Interleaved SEPIC Converter
S. B. Sharon Paul, ME
DOI: 10.17148/IJARCCE.2018.7433
Abstract: In ac/dc Power Factor Correction (PFC) applications, wherever a good vary dc link voltage is needed, boost derived topologies are not any longer the foremost appropriate circuit topologies for universal grids. During this paper associate degree interleaved SEPIC device and SST capable of providing a good vary dc link voltage is investigated. The interleaved converter is able to process more power with reduced circuit ripples and harmonics distortion, and current stresses. Additionally, because the coupled inductors share a common magnetic core, the count of magnetic devices is kept the same as the single-phase topology. Moreover, using coupled inductors effectively solves the current sharing problems caused by the duty cycle mismatch. The SVM provides the phase of gate signals among different phases can be artificially shifted by a certain degree which would contribute to reduce the circuit harmonics as well as the current ripples. The output is optimized by BCO algorithm for better response from SST model.
Abstract: In the present day scenario, many times we see that the garbage bins or dust bin are placed at public placed in the cities are overflow due to increase in the waste every day. It creates unhygienic condition for the peoples and creates bad smell around the surroundings this leads in spreading some deadly diseases and human illness , to avoid such a attenuation we are planning to design �GSM based garbage monitoring system for smart cities� .In this proposed system there are multiple dustbins located throughout the city or the campus ,these dustbins are provided with low cost embedded device which helps in tracking level of garbage bins and an unique ID will be provided for every dustbin in the city so that it is easy to identify which garbage bin is full. When the level reaches threshold limits ,the device will transmit the level along with unique ID provided. These details can be accessed by the concern authorities from their place with the help of GSM and an immediate action can be made to clean the dustbins.
A Review of Localization Algorithm in Wireless Sensor Networks
Vaishnavi Shukla, Dr. Awadhesh Kumar
DOI: 10.17148/IJARCCE.2018.7435
Abstract: Wireless Sensor Network consist of number of nodes that are spatially distributed and deployed in area where we want control on physical or environmental condition such as in military, disaster management and in automated warehouses. Manually configuration of nodes is difficult in case of crowded environment. In order to get the location of nodes in wireless sensor network we use localization technique. There are mainly two technique used in wireless sensor network, first is range free and second is range based. Range free technique based on relatedness between nodes and topological information of nodes while in case of range based technique we calculates distance between nodes. In this paper we will do a review different localization schemes and make a comparison for different application.
Keywords: Localization, Wireless sensor network, range based methods, range free approach, anchor nodes.
Abstract: Our paper illustrates design and implementation of prototype car that is controlled through Smartphone. In this work Smartphone is used for controlling a prototype car. Android application helps in providing graphical interface to the user. The prototype car consist of two DC motor with motor driver, Bluetooth module, Arduino microcontroller, some wires, batteries etc. Two motors are used for controlling speed and direction of car and one motor is just a general purpose. Bluetooth module receives signals from android application and sends data to the Arduino microcontroller unit. This Arduino unit operates the received data and sends control signal to DC motor. Android studio software is used for Arduino programming and android application is downloaded from play store.
Keywords: Android Remote control , Advanced Driving version for Car through Android phone.
Studies on Breakdown Voltages of Liquid Dielectrics
S Vasudevamurthy, Girisha, Shubham Shah, Varun kumar B L , Uday N
DOI: 10.17148/IJARCCE.2018.7437
Abstract: Our paper illustrates design and implementation of prototype car that is controlled through Smartphone. In this work Smartphone is used for controlling a prototype car. Android application helps in providing graphical interface to the user. The prototype car consist of two DC motor with motor driver, Bluetooth module, Arduino microcontroller, some wires, batteries etc. Two motors are used for controlling speed and direction of car and one motor is just a general purpose. Bluetooth module receives signals from android application and sends data to the Arduino microcontroller unit. This Arduino unit operates the received data and sends control signal to DC motor. Android studio software is used for Arduino programming and android application is downloaded from play store.
Keywords: Android Remote control , Advanced Driving version for Car through Android phone.
Digital Watermarking System for Video Authentication
Pallavi M.Sawant
DOI: 10.17148/IJARCCE.2018.7438
Abstract: Due to rapid growth in use of networked multimedia system created need for copyright protection of digital media like image, video, audio. The watermarking techniques used to solve the problem of protecting digital media. This paper implements digital watermarking by inserting invisible watermark into compressed video stream in real time on an FPGA platform. The watermark is embedded using Haar wavelet Transformation and least significant bits algorithm. The idea behind the least significant bits algorithm is to insert the bits of the secret information into the least significant bits of the pixels. This algorithm helps to replace the random noise by using the lowest bits where secret information is inserted to avoid noise and attacks. The results indicate that the proposed algorithm has a very good hidden invisibility, good security and robustness for hidden attacks.
Keywords: Digital watermarking, FPGA, Haar wavelet transform,Least significant bits algorithm.
Abstract: The GSM innovation is utilized with the goal that the shopper would get messages about the utilization of energy (in watts) and in the event that it achieves the base sum, it would consequently caution the purchaser to energize. This innovation holds useful for all power dispersion organizations, private groups, IT parks and self-containing lodging ventures. The execution of this paper will help in better vitality administration, protection of vitality and furthermore in getting rid of the superfluous problems over wrong charging. The computerized charging framework will monitor the constant utilization and will leave little extension for contradiction on utilization and billing. A plan of power charging framework called "prepaid vitality meter with duty pointer" can encourage in enhanced trade stream administration out vitality utilities and can diminishes issue related with charging customer living in detached territory and lessens sending of labor for taking meter readings.
Keywords: ULN2003, relay, LDR, energy meter, ARM 7, GSM.
Design of High Performance and Low Power Content Addressable Memory with Parity Logic and Precharge Free Techniques
A. Ebziba, Dr.L. Jubair Ahmed
DOI: 10.17148/IJARCCE.2018.7440
Abstract: Content-Addressable Memory (CAM) is useful for high-performance forwarding, which performs the search in a single clock cycle. In a CAM, the user supplies the content to be searched, and the CAM gives back the address location or performs association. There are several things needs to be satisfied to extract an efficient CAM from those challenges. So in this era the necessity special design is needed to satisfy the problems which are designed in the proposed system. In proposed framework, used a novel technique named as Hybrid CAM. Hybrid architecture of parity and precharge free logic which is designed with both NAND and NOR type CAM. The NOR type Match Line (ML) is always provide a parallel operation such that the data bits are proceeded into the CAM array with parallel manner. The use of NOR cell makes the drastic reduction of delay in the circuits. At the same time power is also reduced reasonably. The hybrid CAM architecture, the combination of parity logic and precharge free technique will distribute an effective energy level and high speed compared to the previous system.
Capturing Social Networking Privacy Preferences Via Image Contents
Shinde Amol, Pawar Vishal, Kadam Shubham, Karhale Sandip, Phulari S. V
DOI: 10.17148/IJARCCE.2018.7441
Abstract: Now-a-days, the increasing volume of images users share through social networking sites, maintaining privacy has become a problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. The need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of users� privacy preferences. We propose a two-level framework which according to the user�s available history on the sites, determines the best available privacy policy for the user�s images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users� social features. Over time, the generated policies will follow the evolution of users� privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
Keywords: Image processing, NLP, online information services, text mining.
Automatic power supply selection and supervisory predictive control
Adrustavantha R, Aravind D, Chaithra K, Dayananda T B
DOI: 10.17148/IJARCCE.2018.7442
Abstract: As we all are aware of the fact that the demand of electricity is increasing every day and India being the populated country the most commonly problem faced are frequent power cut and low energy resources. The main objective of the work is to solve both these problem by not relying on main supply source and switching into renewable source of energy i.e. solar energy. The work also provide additional advantage i.e. Automation which is done by using microcontroller (8051) family. This paper presents a supervisory model predictive control method for the optimal management of solar energy generation. This work present supervisory control system through model predictive control which calculates the power references for solar subsystems at each sampling time and prediction of the charging and discharge time of the solar battery in hours.
Keywords: Renewable energy source, microcontroller, solar energy, supervisory predictive control.
Bharathi K V, Divya, Raseeda S, Tejaswini N S, Dr.Shankaralingappa C B
DOI: 10.17148/IJARCCE.2018.7443
Abstract: The paper is to illustrate the technology of automatic train control and operation used in metro train movements which are used in most of the developed countries.This train is equipped with a controller that enables the automatic stopping of the train from station to station. This paper presents the development process of a prototype driverless train, implemented using an ARM microcontroller.
Keywords: ARM7 (LPC 2148), Battery, DC Motor, IR Sensors, LCD display, Motor Driver.
Nano Tree based Power Generation for intelligent Street light control, Coin based charger and Garbage Control
Anitha P, Chandrashree J, Divyashree A R, Geethanjali H, Nalini S
DOI: 10.17148/IJARCCE.2018.7444
Abstract: This paper is based on the natural existence of the Flora and replicates it in the form of a Nano Tree consisting of artificial leaves, and also needles from grasses, including water based plants, to generate electrical energy. This method not only foresees an economical and efficient way to harvest solar radiation and wind energy via incorporation of thermo- photovoltaic and piezoelectric materials but also reveals a method for affixing artificial leaves that can harvest and capture solar radiation, wind energy and energy generated from falling rain and hail, providing an aesthetically pleasing and natural looking artificial leaves and needles that can be affixed to trees, plants, shrubs and water based plants. The main advantage of these Solar Nano leaves is that these leaves can convert more energy than the solar panels.
Keywords: Nano tree, Battery, LDR, IR Sensors, Micro controller, Relay, street lights, Wi-Fi.
Design of e-Learning Applications Through Web Mining
T. Gowthami, P. Boopathi
DOI: 10.17148/IJARCCE.2018.7445
Abstract: The E-Learning has become matured learning paradigm with the advent of web based learning and content management tools, and shifted the focus of entire world from instructor centric learning paradigm to learner centric approach. The Web Mining plays a very important role for the E-learning systems. In personalized E-Learning system, user customizes the learning environment based on personal choices. In a general search process, a hyperlink which is having maximum number of hits will get displayed first. For making a personalized system history of every user need to be saved in the form of user logs. The proposed system provides a new approach with combination of web usage mining, HIT algorithm and web content mining. It combines hits results on user logs and web page contents with a clustering algorithm called as Lingo clustering algorithm. In this paper, we will describe an approach aiming to achieve personalization in e-Learning services using web usage and Content mining. This paper discusses about the benefits and usefulness of web mining in e-learning.
Keywords: Web usage mining; web content mining; web personalization; e-learning system, Lingo; HITS.