VOLUME 7, ISSUE 2, FEBRUARY 2018
E-Waste Menace in Nigeria and the Way Out of it
Engr. Fidelis Chukwujekwu Obodoeze, Dr. Fidelia Ndidi Ugwoke, Edith Angela Ugwu
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Saranya. R, Padmapriya. R
Smart Garbage Collection
Sachin Siuadasan, Mukul Shah, Alok Singh, Dhruvit Lakhla
An IoT Enabled Assistant for Vehicular Emergency
Abhishek Paygonde, Sachin Sapkal, Moulshree Dhanavade
To Design and Develop an Semi-Automated Rotor Winding Cutting Machine for Wind Generator
G.Kishore Balaji, J.Ragavi, M.Fedrick John, D. Gnanaprakasam
Event Registration System
Manav Limbachiya, Varun Kankaria, Rutt Desai, Yuvraj Jadhav, Hemlata Ohal
Monitoring Cyber Thread Behaviors in Cloud Environment using Honeypot Technique
M.Umamaheswar and V.Arulmozhi
Miniaturized L- Slotted Rectangular Patch Antenna for LTE and RFID Applications
Andleeb Gul Khurshid*, Ruchi
Wireless Sensor Network (WSN): Applications in Oil & Gas and Agriculture Industries in Nigeria
Tochukwu Chijindu Asogwa, Engr. Fidelis C. Obodoeze, Ifeyinwa Nkemdilim Obiokafor
Deadstock Management System
Aniket Bable, Samarth Shelke, Chetan Narkhede, Ms.Shweta.R.Gaikwad
A Post Evaluation Framework to Evaluate ERP Project’s Acceptance and Success in Saudi Arabia: Literature Review
Hossain A. Alghamdi, Farrukh Saleem, Abdullah AL-Malaise AL-Ghamdi
A Survey on the Existing Arabic Optical Character Recognition and Future Trends
Lutfieh S. Alhomed and Kamal M. Jambi
Vehicle Control Using Hand Gestures
Subramanya U S, Tarun Verma, Krishna R Dixit
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
Mrs.R.Suganya, Ms.S.Saranya
Rumour Source Identification in Social Networks with Time-Varying Topology
Ms.M.Narmatha, Ms.S.Aruna Devi
A Comparitive Analysis of Data Deduplication in Cloud Storage
Reena Johnson, Prof M.V. Bramhe
Optimum Scheduling to Mitigate Inter-Wireless Body Area Network’s Interference
Laila Nassef, Rasha Almarshdi
Identification Rice Grains Using Image Processing Techniques
Mrutyunjaya M S
A Study of Impact of Responsive Web Design in E-commerce Websites
Mrs. Vaishali Kadu , Mr. C. P. Kadu
Recommendation of Product using Sentiment Analysis of Product Reviews
Vikas S. Keskar, Manisha V. Pansare, Priyanka B. Katkade, Suchita B. Jadhav
Android Based Society Management System
Shraddha Kamble, Mayur Dharashivkar, Mohit Ubhe, Shubhankar Shetti, Sulakshana Malwade
Enhancement of Network Lifetime in Routing Protocols of Wireless Sensor Networks
Sonam Gaddi, Brij Kishore, Gunjan Pareek
Ambulance Service
Ahmed Shaikh, Soham Joshi, Yash Bhosale, Mrs. Pallavi Nehte
Low Power and High Speed Multiplier Designs using FinFET Technology
Ayushi, Er. Kailash Chandra
Building Automated Detection and Correction System for Syntax Program Error Using Development One Hot Vector Method
Dr. Buthainah F. AL-Dulaimi, Hameed Taha Khaleel
Career Guidance System
Prof. Rajan Singh, Ronit Pandita, Kaushik Kalyanaraman, Gursimran Singh Chhabra
Virtualization in High Interaction Honeypots
Jaber Karimpour, Maryam Mohammadzad
Survey on IPv4 and IPv6 Using Dual Stack, Tunneling and Translation
Dr.Jitendranath Mungara, Prof Shobha M S, Satish Raj, T Sudarshan Rao, Yashish Thacker, Saurabh Sunny
Automated Static Body Language Identification System for Human-Robot Interaction: A Review
Vaibhav A. Gawhale, Prashant M. Kakde
A Cyber-Physical System for Monitoring Geological Parameters: A Review
Rucha N. Chunade, Prashant M. Kakde
Survey on Navigational Shoes for Biker to Avoid Obstacles
Prof. A.N. Pawar , Shivali Nath, Sharvari Shinde, Shweta Satao , Priyanka Gore
Population Diagnosis System
T Jashwanth Reddy, Voddi Vijay Kumar Reddy, T Akshay Kumar
Cloud Scheduling Optimization Based on Greedy Algorithm for Cloud Simulation
Suganya Gladies A.X, Ashika Fathima. M, Sanofer Parveen. S, Sithara. V
Efficient Distance Based Continuous Outlier Detection for Unsupervised Dataset
Manochitra. S, Reshma. R, Safeedha P.K, Saranya R
An Efficient Learning with Sparse Regularized Kernel for One-Class Classification
S. Bhuvanesh, Arun Mathew, P.M. Ashfaq Ahmed, A. Muhammed Rafi
An Efficient K-N Secret Sharing Image and AES Encryption Algorithm in Visual Cryptography
Vignesh. M, Raihana. P.A, Shahadha Hakkim, Sukanya. S
A Non-Overlap based Cluster using Canopy and Parallel K-Means for MapReduce Framework
Summia Parveen, Amirjohn BeeBee, Thoufiya. M, Safana Jasmine
Attendance Management System for College Student using Fingerprint Scanner
Shifa N Shaikh, Ajinkya Jawadwar, Umesh Hargane, Prof Kranti Kolambe
Automatic Pick and Place Robotic Arm Vehicle
Prof. Vijay Matta, Namita Mendole, Leena Lengule, Nidhi Hatwar, Pragati Manohare, Neha Meshram, Shilpa Nagdeote
Interactive Transition Screen Using OpenGL
Shubham Deshpande, Atharva Dongare, Vilas Rathod
Survey Website
Atharva Rajguru, Ashutosh Khatavkar, Saurabh Panchal, Saurav Sonawane, Mrunal Fatangare
A Review Underwater Optical Image Quality Enhancement based on Guided Filter
Poonam Singh, Dr. Rabindra Kumar Singh
Abstract
E-Waste Menace in Nigeria and the Way Out of it
Engr. Fidelis Chukwujekwu Obodoeze, Dr. Fidelia Ndidi Ugwoke, Edith Angela Ugwu
DOI: 10.17148/IJARCCE.2018.721
Abstract: Nigeria, with a huge population of about 170 million people, has become a dumping ground for both brand-new and fairly- used imported electrical and electronic products and equipment such as ICT , telecom and household appliances � monitors, computers, TVs, mobile handsets, refrigerators, washing machines, DVD/CD Players, Computer storage media but to mention a few. These electrical and electronic products and equipments become technologically obsolete in a matter of months or years and they become very close to the end of their shell life. Most of the obsolete products and equipment find their way into developing countries like Nigeria, as fairly-used or tokunbos, because of the hunger of Nigerians for IT and technological products. At the end of their shell life, they eventually find their way into landfills or dump sites as Electronic Waste (E-Waste) which may pose serious health and environmental hazards to humans, livestock and ecology if not properly managed. This paper reviews the issues relating to E-Waste management in Nigeria. It identifies the sources of E-Waste as well as their components and the dangers in them. This paper finally proffers far-reaching recommendations to the major stakeholders � the regulators (government), the manufacturers (industries), the recyclers, the resellers, and the end-users ,etc. on the best internationally recognised practises on how to handle and manage e-waste in order to make the environment safe for all of us.
Keywords: e-waste, shell life, tokunbo, management, hazards, environment, health, ICT, Telecomm, Nigeria.
Abstract
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Saranya. R, Padmapriya. R
DOI: 10.17148/IJARCCE.2018.722
Abstract: The Mobile Ad-hoc Network (MANET) is a moveable wireless network that can transfer the information from source to destination. The recent research this network is widely used all around the wireless network because it does not require any fixed wired network to establish communication between the source and the destination. The major problem in MANET is black hole attack, a malicious node utilizes its routing protocol in order to announce itself for having the direct path to the destination node. The problem in open communication broadcasting the mobile ad-hoc network has some security limitations there are the option of information leakage in the wireless network. The propose system to identify and prevent the both blackhole & grayhole attack in MANET grayhole attack more than one node collude to each other hence this attack is more challenging to recognize. The main target of propose algorithm is to measure the impact of black hole attack and gray holeattack detection on the MANET�s using secure algorithm combine with AODV routing protocol. The proposed system investigates the effects of the cooperative gray and black hole attack against AODV. The gray hole and black hole identification based on control packet algorithm. The Proposed method will combine secure Ad hoc On-demand Distance Vector (SAODV) with Elliptic Curve Cryptography (ECC) routing protocol. The experimental result shows the better performance compare with existing routing protocol.
Keywords: Mobile ad-hoc network, secure Ad hoc On-demand distance Vector, Elliptic Curve Cryptography, Ad hoc On-demand distance Vector.
Abstract
Smart Garbage Collection
Sachin Siuadasan, Mukul Shah, Alok Singh, Dhruvit Lakhla
DOI: 10.17148/IJARCCE.2018.723
Abstract: The waste collection process is a critical aspect for the service providers. The traditional way of manually monitoring the wastes in waste bins is a complex, cumber some process and utilizes more human effort, time and cost which is not compatible with the present day technologies. This idea is compatible mainly with the concept of smart cities. The smart waste management mainly avoids the congested collection of waste generated domestically which creates difficulty to manage its disposal. In this GPS system is used which would detect the garbage level according to the location of the society and level sensors are used which would detect the level of the garbage.
Keywords: GPS System, Level Sensors.
Abstract
An IoT Enabled Assistant for Vehicular Emergency
Abhishek Paygonde, Sachin Sapkal, Moulshree Dhanavade
DOI: 10.17148/IJARCCE.2018.724
Abstract: Internet of things (IoT) deals with billions of intelligent objects which can be connected to sense and collect the data and also communicate with surrounding people using mobile, wireless and sensor technologies. We present a vehicular emergency service based on cloud computing. In a situation, unfortunately if a car meets with an accident, the device implemented in the car will immediately notify the cloud database. It will send information such as car details, location and type of emergency to the cloud server. The server then based on the location of the car will find the nearest help centre and will notify about the emergency occurred along with its location. An interactive communication and real-time location tracking system prototype has been designed with Raspberry Pi Model B along with GPS and GSM technology.
Keywords: Internet of Things, Vehicle Emergency System, Raspberry Pi, Emergency Location Tracking, GPS, Cloud Computing.
Abstract
To Design and Develop an Semi-Automated Rotor Winding Cutting Machine for Wind Generator
G.Kishore Balaji, J.Ragavi, M.Fedrick John, D. Gnanaprakasam
DOI: 10.17148/IJARCCE.2018.725
Abstract: This project is used to cut the wind generator rotor winding in a semiautomatic manner. Nowadays the rotor winding cutting machine where manually hand operated one in medium and large scale industries, due to this the production and income gain by that industry may get less and also it leads to consume huge manpower and more time to complete the process. In order to overcome this issue, the semi-automatic rotor winding cutting machine for wind generator is needed. This machine consists of motors, conveyor bed, blades, switches, lamps, relays, contactors, limit-switches etc., to perform the cutting process. According to the material to be cut, the cutting tool can be changed. This machine can be widely applied in almost all type of production and assembly based industries, because there the cutting process where concerned most important one. Our project prototype model was initially simulated in PLC Ladder Logic by using INDRALOGIC software and further implemented to the industry in Relay Logic mechanism. The machine is exclusively intended for the mass production and they represents faster and in more efficient way to cut the rotor winding for wind generator. The overall system is compact in size, light weight, modular and flexible to be used in small works jobs who need batch production. The setup overall configuration can be adopted by a semi-skilled worker easily and can vary the operations by making certain small changes. This system has the potential to adopt higher level of automation if desired in future.
Keywords: Motors, Gear-Box, Conveyor Bed, Blades, Switches, Lamps, Relays, Limit-Switches.
Abstract
Event Registration System
Manav Limbachiya, Varun Kankaria, Rutt Desai, Yuvraj Jadhav, Hemlata Ohal
DOI: 10.17148/IJARCCE.2018.726
Abstract: Book Vent is a web based application which provides a user friendly environment for event booking and registration. There are three modules added: admin, organiser and participant. The organiser can add the events very easily into the system and the participant can easily subscribe to any event he/she likes. The admin monitors all the working and maintains the easy going of the system. Any event can be added in Book Vent with no boundaries of entry fee and number of minimum entries.
Keywords: Web based application; booking; registration; modules; admin; organiser; participant; subscribe; Monitors; no boundaries.
Abstract
Monitoring Cyber Thread Behaviors in Cloud Environment using Honeypot Technique
M.Umamaheswar and V.Arulmozhi
DOI: 10.17148/IJARCCE.2018.727
Abstract: A cloud computing is one of the upgrading technology, it provide the data access mechanism through cloud provider. User can accomplish a useful and economical advance for information sharing between group members in the cloud. Cyber thread is one of the critical factors in cloud computing. To provide a safe transaction network faces the many issues. The safety critical systems that need to provide a high-level of confidence in their safety and functionalities under multiple operating in network. With the support of the SDN network play a major role. According to the cyber threads, cyber-physical systems testbed based on cloud computing and Software Defined Network (SDN) were used. And Cyber physical Monitoring System is proposed to monitor the attacks.
Keywords: Cloud Computing, Cyber thread, Security, SDN and Attack monitoring.
Abstract
Miniaturized L- Slotted Rectangular Patch Antenna for LTE and RFID Applications
Andleeb Gul Khurshid*, Ruchi
DOI: 10.17148/IJARCCE.2018.728
Abstract: The article presents a very compact dual band microstrip patch antenna for Long Term Evolution (1.7-1.8 GHz) and Radio Frequency Identification (2.45 GHz) applications. The proposed antenna has been designed using Fire Resistant FR4 Epoxy substrate. The patch antenna dimensions are 44.2 x 25.8 x 1.6 mm and have a 50 ohm Microstrip Line feed. The antenna has a low return loss of about -23.2 dB with VSWR of almost 1.14 and a good directivity of 2.52 dBi at 1.82 GHz and it has return loss of -32.13 dB, VSWR of 1.05 and directivity of 4.36 dBi at 2.459 GHz. The proposed antenna operates between 1.65-1.86 GHz and 2.38-2.54 GHz with resonating frequencies 1.82 GHz and 2.46 GHz. The performance of the proposed antenna is analyzed using CST Microwave Studio software.
Keywords: Microstrip patch antenna, Long Term Evolution (LTE), Dual Band, RFID, CST Microwave Studio.
Abstract
Wireless Sensor Network (WSN): Applications in Oil & Gas and Agriculture Industries in Nigeria
Tochukwu Chijindu Asogwa, Engr. Fidelis C. Obodoeze, Ifeyinwa Nkemdilim Obiokafor
DOI: 10.17148/IJARCCE.2018.729
Abstract: This paper x-rays the various possible deployments of smart micro wireless sensors in industrial applications especially in Nigeria. This paper focuses more on wireless sensor applications in oil & gas industry and agriculture in Nigeria. In Oil & Gas industry, International Oil and Gas Companies (IOCs) have already massively deployed this technology since 2005 to monitor vast oil and gas installations in Nigeria Niger Delta region. In agriculture, these devices can be used in Nigeria to monitor greenhouse temperature conditions for crop growth, in field monitoring to measure temperature, relative humidity and soil moisture to prevent fungi infections and in livestock to detect the pH-value of the rumen of dairy cows as well as monitor movement of cows. Also they can be applied to monitor the micro-climate in the woods. This paper finally identified the several benefits of applying these micro devices as well the key challenges facing their deployment of these devices in the industries in Nigeria. The paper finally suggested some solutions to some of the identified challenges.
Keywords: ICT, WSN, IWSN, wireless sensor, cattle colony, rumen, greenhouse, transducer, oil well, pipeline, sensing, terrestrial, underwater, control, base station, multi-hop, adhoc, IOCs, Nigeria, Niger Delta.
Abstract
Deadstock Management System
Aniket Bable, Samarth Shelke, Chetan Narkhede, Ms.Shweta.R.Gaikwad
DOI: 10.17148/IJARCCE.2018.7210
Abstract: Equipment management is an important issue for the safety and cost in an institute. In addition, the use of an efficient information system effectively promotes the processing performance. The maintenance of deadstock�s information using paperwork is very difficult in terms of time. Deadstock management system to be used for inhouse computer engineering department. The system is web based and uses intranet approach for communication between different users of the system. Through the related application, it has efficiently improved operation such as addition, modification and deletion of dead stock information. The system also generates report useful for arranging equipment�s for different purpose like practical exam and workshops. System also sends notification to users for effective and consistence maintenance of data. The system can be used to improve the work quality, reduce the maintenance cost and promote the safety of all equipment.
Keywords: Html,CSS3, Database (MySQL), PHP Wampserver, Notepad++
Abstract
A Post Evaluation Framework to Evaluate ERP Project’s Acceptance and Success in Saudi Arabia: Literature Review
Hossain A. Alghamdi, Farrukh Saleem, Abdullah AL-Malaise AL-Ghamdi
DOI: 10.17148/IJARCCE.2018.7211
Abstract: Nowadays, the innovative technologies are the main part of the business organizations, which always support their business culture and processes. In recent years, several tools has been introduced. Enterprise Resources Planning (ERP) system is one of the information systems, which highly support business ideas and assist in their strategies. This paper focuses on ERP, a brief overview on its usage, acceptance, benefits and evolution. The paper presented comprehensive review on previous researches. Synthesis and structured report on previous researches presented to highlights the weaknesses in ERP, which further leads to collect the Critical Success Factor (CSF) of ERP.
Keywords: Enterprise Resources Planning (ERP), Critical Success Factor (CSF)
Abstract
A Survey on the Existing Arabic Optical Character Recognition and Future Trends
Lutfieh S. Alhomed and Kamal M. Jambi
DOI: 10.17148/IJARCCE.2018.7213
Abstract: Optical Character Recognition (OCR) is a computer system designed to transform images of typewritten text (typically captured by a scanner) into machine-processed text. Arabic OCR has been developed and enhanced over decades leading to the presence of enormous number of approaches with robust results that approaching accuracy, in some cases, of approximately 99%. However, existing OCRs exhibit shortages, or at least only sub-sets of them, when they were implemented with new applications, such as low-resolution inputs and video-based inputs. Accordingly, there is a need to review the existing approaches that showed robust results, analyses its mechanism and list its advantages and disadvantages in-order to ease the adaptation and extension of these systems into the new applications in this field. This paper presents a literature review on the existing systems for Arabic OCR, draw a common mechanism out of them, list the differences, advantages and disadvantages that helps in adaptation or extension of these systems to fit the recent demands.
Keywords: Optical Character Recognition, OCR, Pre-processing Operations, Segmentation, Optical Font Recognition.
Abstract
Vehicle Control Using Hand Gestures
Subramanya U S, Tarun Verma, Krishna R Dixit
DOI: 10.17148/IJARCCE.2018.7214
No abstract available.
Abstract
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
Mrs.R.Suganya, Ms.S.Saranya
DOI: 10.17148/IJARCCE.2018.7215
Abstract: Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, I take a probabilistic approach and propose two node failure detection schemes that systematically combine localized monitoring, location estimation and node collaboration. Extensive simulation results in both connected and disconnected networks demonstrate that our schemes achieve high failure detection rates (close to an upper bound) and low false positive rates, and incur low communication overhead. Compared to approaches that use centralized monitoring, our approach has up to 80% lower communication overhead, and only slightly lower detection rates and slightly higher false positive rates. In addition, our approach has the advantage that it is applicable to both connected and disconnected networks while centralized monitoring is only applicable to connected networks. Compared to other approaches that use localized monitoring methods.
Keywords: Wireless Networks, Ad hoc Networks, failure detection, monitoring.
Abstract
Rumour Source Identification in Social Networks with Time-Varying Topology
Ms.M.Narmatha, Ms.S.Aruna Devi
DOI: 10.17148/IJARCCE.2018.7216
Abstract: I explore the problem of rumour source identification in time-varying social networks that can be reduced to a series of static networks by introducing a time-integrating window. I borrow an idea from criminology and propose a novel method to overcome the challenges. First, I reduce the time-varying networks to a series of static networks by introducing a time-integrating window. Second, instead of inspecting every individual in traditional techniques, I adopt a reverse dissemination strategy to specify a set of suspects of the real rumour source. This process addresses the scalability issue of source identification problems, and therefore dramatically promotes the efficiency of rumour source identification. Third is to determine the real source from the suspects. Information that propagates through social networks can carry a lot of false claims. For example, rumours on certain topics can propagate rapidly leading to a large number of nodes reporting the same (incorrect) observations. In this paper, I describe an approach for finding the rumour source and assessing the likelihood that a piece of information is in fact a rumour, in the absence of data provenance information. I model the social network as a directed graph, where vertices represent individuals and directed edges represent information flow. A number of monitor nodes are injected into the network whose job is to report data they receive.
Keywords: Source identification, Time Varying, Static Networks, Social Networks.
Abstract
A Comparitive Analysis of Data Deduplication in Cloud Storage
Reena Johnson, Prof M.V. Bramhe
DOI: 10.17148/IJARCCE.2018.7217
Abstract: With an increase in the usage of cloud storage, effective methods need to be employed to reduce hardware costs, meet the bandwidth requirements and to increase storage efficiency. This can be achieved using Data Deduplication. Data Deduplication is a method to reduce the storage need by eliminating redundant data. Thus by storing less data you would need less hardware and would be able to better utilize the existing storage space. Based on this idea, we design an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data. This way, data deduplication can be effective for popular data, whilst semantically secure encryption protects unpopular content. We show that our scheme is secure under the Symmetric External Decisional Diffie-Hellman Assumption in the random oracle model.
Keywords: Cloud, Deduplication, Security, Bandwidth.
Abstract
Optimum Scheduling to Mitigate Inter-Wireless Body Area Network’s Interference
Laila Nassef, Rasha Almarshdi
DOI: 10.17148/IJARCCE.2018.7218
Abstract: Wireless Body Area Network (WBAN) consists of various biomedical sensors to monitor different vital signs of patient�s health. MAC layer is responsible for scheduling data transmissions, and coordinating nodes� channel access that avoids an possible collisions during data transmissions. The coexistence of multiple WBANs introduce interferences and increases the probability of collisions. A cognitive MAC, which utilizes the concept of cognitive radio, is proposed to optimally assign unique timeslots to interfered sensor nodes using Hungarian minimum matching algorithm to mitigate inter-WBAN interference. The performance of the proposed protocol is evaluated, analyzed, and compared with the standard MAC protocol using different performance metrics and scenarios. From the simulation results, we show the effectiveness of our proposed protocol in terms of throughput, latency, and energy consumption.
Keywords: WBAN; IEEE 802.15.4; MAC; Inter-Interference Mitigation
Abstract
Identification Rice Grains Using Image Processing Techniques
Mrutyunjaya M S
DOI: 10.17148/IJARCCE.2018.7219
Abstract: Agriculture is the backbone of a nation, in India the majority of the population mainly depends on agriculture as their main source of income. Some of the major crops grown in India are rice, wheat, maize, jowar etc. In developing countries like India, the increasing standard of living in society leads to high expectation of food products having high quality and healthy standards because of these reasons there is a demand for finding accurate, fast and objective methods to determine the quality of food grains. The capability to identify and describing features of rice grains for identification is desirable so that problems such as fraudulent adulteration and mislabelling of rice grain varieties can be identified and eliminated. This paper presents a solution for identifying different varieties of rice grains on visual features hence can be very fast, inexpensive and it also explores the possibility of determining the quality of the rice grains by using texture features. Commercially identification of rice grains is done by using biological methods (DNA technique etc...) and chemical methods (alkaline tests etc...) for the identification of rice grain seed varieties and quality. The methods used are very expensive and very time consuming. On the other hand the machine vision or the digital image processing is a non-destructive method, it is very fast and inexpensive process compared to the biological methods.
Keywords: Rice grains, mislabelling, identification, machine vision.
Abstract
A Study of Impact of Responsive Web Design in E-commerce Websites
Mrs. Vaishali Kadu , Mr. C. P. Kadu
DOI: 10.17148/IJARCCE.2018.7220
Abstract: Current age is an age of e-commerce, every business wants to become online, as customers are preferring online purchasing and online product information. we cannot be sure which platform a user will be using for browsing e-commerce website. There are different platforms to browse internet ranging from PC, notebook, tablet, iPhone, iPad to mobile phones. Recently, mobile device and computer screen designers have been trying to provide users with qualified web-browsing but this hasn�t been able to afford adequately users� needs that are exposed to traditional website layouts. we believe that it is also important to explore and discuss how to provide a fluent and consistent user experience for the same webpage across various devices. Therefore, there is a need to switch to Responsive Web Design which is capable of reshaping itself depending on various screen sizes and resolutions from largest screen sizes to smallest on mobile devices. In this paper, the authors will explore how to improve user experience fluency for the same webpage across various devices with responsive web design.
Keywords: Responsive Web Design, e-commerce, Features of Responsive Web Design.
Abstract
Recommendation of Product using Sentiment Analysis of Product Reviews
Vikas S. Keskar, Manisha V. Pansare, Priyanka B. Katkade, Suchita B. Jadhav
DOI: 10.17148/IJARCCE.2018.7221
Abstract: Online shopping is trend amongst youngster. To purchase a product from online shopping site and give the reviews about products, is common in current era. But while purchasing product, sometimes it become difficult to choose between two products. So, to overcome this problem, there is need of such a system which will help user to decide which product he/she should buy. In this paper, we proposed such system which helps user to decide between two products. This approach is based on sentiment analysis and takes into consideration 1. Users reviews about product and 2. Price of product.
Keywords: Sentiment analysis, product reviews, product recommendation, product feature, natural language processing, sentiwordnet
Abstract
Android Based Society Management System
Shraddha Kamble, Mayur Dharashivkar, Mohit Ubhe, Shubhankar Shetti, Sulakshana Malwade
DOI: 10.17148/IJARCCE.2018.7222
Abstract: This paper represent the working system of Residential Society Management with the help of Android application. It makes the working in the society simple and efficient. As we know there is an increase in population and also the residential society complexes. Generally in various Residential society�s communication regarding activities takes place through traditional means of communication like meeting in person or notices displayed on board. This may lead to improper conveying of information due to missing of transparency. To avoid such complexes and to manage day to day society functions an automatic detailed generation of these tasks is required Society management system reduces the complexes that occur within the society by providing facilities such as maintenance generation details,, permanent and rental flats details, complaint forum ,society meeting details ,events of society etc. It generates all the activities that occur within the society and makes it easy for the members of the society an easy access to the society happenings and updates.
Keywords: Society Management, android, database, events, maintenance generation, Residential society, emergency contacts, transparency.
Abstract
E-Learning
S. Jambunathan, Suriyaprabha. J
DOI: 10.17148/IJARCCE.2018.7223
Abstract: E-Learning is defined as all forms of electronic supported learning and teaching, which are procedural in character and aim to effect the construction of knowledge with reference to individual experience, practice and knowledge of the learner. Information and communication systems, whether networked or not, serve as specific media to implement the learning process. E-learning is essentially the computer and network enabled transfer of skills and knowledge. E-learning refers to using electronic applications and processes to learn. E-learning applications and processes include Web-based learning, computer-based learning, virtual classrooms and digital collaboration.
Keywords: e-Learning, collaborative learning.
Abstract
Enhancement of Network Lifetime in Routing Protocols of Wireless Sensor Networks
Sonam Gaddi, Brij Kishore, Gunjan Pareek
DOI: 10.17148/IJARCCE.2018.7224
Abstract: WSN or Wi-fi sensor networks are potentially one of the most important technology of this century. current advancement in wi-fi communications and electronics has enabled the development of low-value, low-energy, multifunctional miniature devices for use in remote sensing applications. The mixture of these elements have stepped forward the viability of using a sensor community which includes a huge variety of clever sensors, allowing the gathering, processing evaluation and dissemination of precious facts amassed in a selection of environments. Sensor community protocols and algorithms have to own self-organizing abilities. every other specific function of sensor networks is the cooperative attempt of sensor nodes. Sensor nodes are appropriate with an onboard processor. as opposed to sending the uncooked records to the nodes accountable for the fusion, they use their processing talents to domestically perform easy computations and transmit handiest the specified and in part processed records.
Keywords: WSN, LEACH, Dead Nodes.
Abstract
Ambulance Service
Ahmed Shaikh, Soham Joshi, Yash Bhosale, Mrs. Pallavi Nehte
DOI: 10.17148/IJARCCE.2018.7225
Abstract: As in India every minute�s one person dies because he is not able to reach the hospital in time so we are developing an application which will reduce the time. The main function of these project will reduce the time between ambulance driver and the Patients and it will save someone�s life. When the patient or user will open the user application on his smartphone and when he click on emergency button given on application it will directly send its location to the ambulance driver which are available nearby him. We will require two smartphones one for user and other for ambulance driver. Global Positing System (GPS) hardware and uses Google Map Application Programming Interface (API) to plot details of the user and driver on Google Map of the Smartphone. Because of these application we save time as well as we save a life of a human.
Keywords: API, GPS, Ambulance services, IoT
Abstract
Low Power and High Speed Multiplier Designs using FinFET Technology
Ayushi, Er. Kailash Chandra
DOI: 10.17148/IJARCCE.2018.7226
Abstract: The preference to optimize the layout metrics of overall performance, strength, area, fee, and time to market (opportunity cost) has now not changed for the reason that inception of the IC enterprise. In truth, Moore�s law is all about optimizing those parameters. however, as scaling of producing nodes progressed in the direction of 20-nm, some of the tool parameters couldn't be scaled any in addition, specifically the strength deliver voltage, the dominant component in figuring out dynamic electricity. This research is to lessen the strength and put off at the FinFET based array multiplier. The backend device synopsys HSPICE is selected for the analysis of power dissipation and put off of multiplier. in this paper, four- enter multiplier is designed and simulated in 32 nm era the usage of FinFET technology. Simulation end result imply that the proposed technique offer improvement in term of strength consumption and delay over MOSFET.
Keywords: FinFET, Average Power, Multiplier
Abstract
Building Automated Detection and Correction System for Syntax Program Error Using Development One Hot Vector Method
Dr. Buthainah F. AL-Dulaimi, Hameed Taha Khaleel
DOI: 10.17148/IJARCCE.2018.7229
Abstract: The aim of these papers is to propose a system that helps novice programmers to overcome the syntax errors by using automatic detection and correction technique. This technique is one of the important challenges facing researchers. The proposed system uses Hopfield neural network technic as an associated memory and the one hot vector as a method to represent the data. Where the number of iterations is adopted to reach of the stable state of the network to detect the syntax error and then correct them. The method of representation helps to increase the efficiency of the Hopfield technic and we will discuss this through two experiments. In the first experiment used the development one hot vector method as the matrix to represent the data. While used development one hot vector method as the one vector in the second experiment. The system is trained by using a case study containing a valid syntax statement. While it is tested by generating a set of errors in the statement for the case study. The case study is consists of several examples (Classes and Method) written in the Java programming language. These (Classes and Method) contains statement about the process of the multiplication and the arithmetic summation of the matrix. In the evaluation and testing process, random errors are created that related to a sequence of the tokens in the For-loop, If and While statements. The case study contains (205) statements that include (90) statements of the (For-loop statements) divided into (45) syntax error in the sequence of tokens and (45) correct statement.
Keywords: Correction syntax error, Detection syntax error, One Hot Vector Method, Java.
Abstract
Career Guidance System
Prof. Rajan Singh, Ronit Pandita, Kaushik Kalyanaraman, Gursimran Singh Chhabra
DOI: 10.17148/IJARCCE.2018.7230
Abstract: Guidance systems have widespread applications in both academics and industry. Traditionally performance of guidance system has been measured by the precision. The proposed system is focused on specializations that can be undertaken by engineers through reliable and flexible online tests that are adaptive in nature. The test will start with aptitude questions related to the field and then based on the inputs from the user and accuracy of the input, the user will be provided with the next set of questions and this adaptive nature continues throughout the test. On completion of the test, the users shall get a report of their performance based on which the system will provide a career path in which the user is more likely to succeed. The adaptive nature and the end result report using tableau are the two major components that will be the highlight of our project.
Keywords: Recommendation System, questions, tests, career, students, report generation, website.
Abstract
Virtualization in High Interaction Honeypots
Jaber Karimpour, Maryam Mohammadzad
DOI: 10.17148/IJARCCE.2018.7231
Abstract: Nowadays, High Interaction (HI) Honeypot is the hottest area for research because of the major issues such as monitoring the attacker, and also its detectability in computer network. When we talk about the honeypot technology and its characteristics like capturing data secretly or even when we talk about different instances in data capture tools, we should not forget that how it can achieve in honeypot technology. The virtualization is not a new concept in hardware and software development. Virtual Machine Monitor (VMM) is very useful tool for implementing honeypots. In this paper, first, we review the various implementations of VMM-based monitoring systems that are developed to collect information about attacks on HI honeypots. Finally, a comparison is made between each of them.
Keywords: Computer Network Security, High Interaction Honeypot, Virtualization, Virtual Machine Monitor
Abstract
Recognizing Fingerprints in ATM
Afroz.B, G.Tejaswani, Sunitha.S
DOI: 10.17148/IJARCCE.2018.7232
Abstract: The main theme of this system to propose a application which is helpful for the society in order to reduce the frauds in ATM machine. When users open a new account in bank for his transaction the bankers will collect all information regarding to the account holders like name, phone number and also fingerprints to enroll. When user wants to do transactions in ATM machines, first process is user has to give fingerprints on the fingerprint module then automatically 4 digit number will be generated to the authorized customer phone number through GSM modem which is connected to the microcontroller. The 4-digit number is received by authorized customer, then has to give input to the ATM machine. After giving input, the ATM machine will verify whether it is valid or not if it is valid further transaction can be continued if not ATM machine shows invalid alert message.
Keywords: ATM, fingerprint biometric, PIN, security.
Abstract
Survey on IPv4 and IPv6 Using Dual Stack, Tunneling and Translation
Dr.Jitendranath Mungara, Prof Shobha M S, Satish Raj, T Sudarshan Rao, Yashish Thacker, Saurabh Sunny
DOI: 10.17148/IJARCCE.2018.7233
Abstract: The introduction of IPv6 has opened up several questions with reference to its adaption and transition from IPv4 to IPv6 and is one of the crucial issues being frequently discussed in networking community today. IPv6 provides many seamless features that makes it far better protocol as compared to its predecessor IPv4. It is a well-known fact that IPv4 is a standard at present and is currently been deployed in almost all the Internet architecture, hence the transition process from IPv4 to IPv6 is very challenging. In order to avoid the transition, or in actual sense to delay it, many techniques have been introduced such as Dual stack, Tunneling and NAT. The objectives of this survey paper are twofold. Firstly, to highlight the issues related with the transition from IPv4 to IPv6. Secondly, to find the transition mechanism that can be provided seamlessly to end users where they will be able to use all the services of IPv4.The purpose is to tackle the issues and challenges that are likely to be faced during the transition from IPv4 to IPv6. Cisco Packet Tracer is used for simulation and Dual Stack has been chosen as the transition mechanism for the test bed. Dual Stack allow both protocols to run simultaneously and the results show that it also provide seamless transition from IPv4 to IPv6.
Keywords: IPV4, IPV6, Dual stack Server, Tunneling, Translation.
Abstract
Automated Static Body Language Identification System for Human-Robot Interaction: A Review
Vaibhav A. Gawhale, Prashant M. Kakde
DOI: 10.17148/IJARCCE.2018.7234
Abstract: For social robots to be successfully integrated and accepted within society, they need to be able to interpret human social cues that are displayed through natural modes of communication. Service robots directly interact with people, so finding a more natural and easy user interface is of fundamental importance. In particular, a key challenge in the design of social robots is developing the robot�s ability to recognize a person�s affective states (emotions, moods, and attitudes) in order to respond appropriately during social Human�Robot Interactions (HRIs). In this project development of a social robot which will be able to autonomously determine a person�s degree of accessibility is proposed. The work will determine the performance of our automated system in being able to recognize and classify a person�s accessibility levels and investigation of how people interact with an accessibility-aware robot which determines its own behaviours based on a person�s accessibility levels.
Keywords: Rehabilitation, Recognizes a body gesture, Face expressions, Modelling of body gestures.
Abstract
A Cyber-Physical System for Monitoring Geological Parameters: A Review
Rucha N. Chunade, Prashant M. Kakde
DOI: 10.17148/IJARCCE.2018.7235
Abstract: A remote real-time Carbon Dioxide (CO2) concentration monitoring system is developed, in such a way that it will utilize less memory and less processing configuration so as to have better results as compared with the others work on high memory with high processing power. The remote real-time CO2 monitoring system consist of monitoring equipment and clients PC and concern system based on technology of wireless sensor network. The monitoring equipment collects air environmental information. The CPU automatically stores the collected data and displays on the LCD display module in real-time. The GPRS module continuously transmits the collected information to the clients PC. The resulted solution provides the possibility of logging measurements from locations all over the world and of visualizing and analyzing the gathered data from any device connected to the Internet. This work encompasses the complete solution, a cyber physical system, starting from the physical level, consisting of sensors and the communication protocol, and reaching data management and storage at the cyber level. The experimental results show that the proposed system represents a viable and straightforward solution for environmental and ambient monitoring applications.
Keywords: CO2 Capture and Storage (CCS), Wireless Sensor Networks (WSN), Liquid Crystal Display (LCD).
Abstract
Device Tracking & Monitoring the Usage
Dr. S. Yamini
DOI: 10.17148/IJARCCE.2018.7236
Abstract: An identity management system refers to an information system that can be used for identity management within or across enterprise�s environment. Identity management includes managing digital identifications, their authentication, authorization, roles & permissions within environment of their operation. Digital identity is a set of attributes that uniquely describes a subject that can be a person, system, phone, tablet device, printer, server, group of users, etc..., Through this research paper, employees and their devices, can access to a different information systems, for instance to the internal web page, e-mail system, CRM (Customer Relation Management) system, VPN service and other internal applications [4]. Many of these applications require users to claim their identity usually carried out through login form where users pass their username and password. For a purpose of increasing security and usability, authentications and authorizations for different applications within an enterprise are carried out through central IDS system.
Keywords: Component; formatting; style; styling; insert (key words)
Abstract
Survey on Navigational Shoes for Biker to Avoid Obstacles
Prof. A.N. Pawar , Shivali Nath, Sharvari Shinde, Shweta Satao , Priyanka Gore
DOI: 10.17148/IJARCCE.2018.7237
Abstract: Voyaging short separation with individual vehicle is presently broadly in slant. For movement evasion and simplicity of driving alongside space sparing/similarity, bike are more favored than four wheeler. When we need to drive on obscure street or we need to discover our goal for this reason we are utilizing GPS for course following yet it is most certainly not advantageous to utilize GPS amid the driving. So to overcome or to fathom this issue we are accompanying new innovation which will fulfill our trip to following the course. Our venture would spin around thinking of a savvy shoe model that could match with advanced cell utilizing Bluetooth and help to give navigational data through vibration unit set all around shoe.
Keywords: Navigation; tactile interface; eyes-free interface; wearable; mobile device.
Abstract
Population Diagnosis System
T Jashwanth Reddy, Voddi Vijay Kumar Reddy, T Akshay Kumar
DOI: 10.17148/IJARCCE.2018.7238
Abstract: Population diagnosis system in Hadoop is a project developed with Apache HIVE, an abstraction of Map reduces. Population diagnosis system provides an introduction to the key concepts and methods required for population analysis. The system will describe the vital of population change and enable people to learn basic methods for measuring population structure and the determinants of population size and change. The system will also provide an introduction to population projections and describe and evaluate how demographic data are collected and used. Prominence is placed on the understanding and elucidation of statistic data, as well as methods of population analysis. The data what you are going to analyze is an semi-structured data. After uploading their data to cluster anyone can access them again provided they got to be in the cluster or can also use virtual machines that contain the right software to analyze them without any need for conversion.
Keywords: Apache Hadoop-1.2.1,Apache hive-0.12.0,Population Diagnosis System, My SQL.
Abstract
Cloud Scheduling Optimization Based on Greedy Algorithm for Cloud Simulation
Suganya Gladies A.X, Ashika Fathima. M, Sanofer Parveen. S, Sithara. V
DOI: 10.17148/IJARCCE.2018.7239
Abstract: Cloud computing provides on-demand computing and storage services with high performance and high scalability. However, the rising energy consumption of cloud data centers has become a prominent problem. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by considering some static and dynamic parameters and restrictions of tasks into consideration. The existing deadline constrained application, meeting the application�s deadline requirement is critical, but there is no incentive to finish the application earlier. The proposed introduce a model of task scheduling for a cloud-computing data center to energy-efficient dynamic task scheduling. Budget-constrained greedy scheduling algorithm (BCGS). As a heuristic algorithm, BCGS dynamically estimates task energy by considering factors including task resource demands, VM power efficiency, and server workload before scheduling tasks in a greedy manner. Simulated a heterogeneous VM cluster and conducted experiment to evaluate the effectiveness of BCGS. Simulation results show that BCGS effectively reduced total energy consumption by more than 20% without producing large scheduling overheads. Finally, the simulation is carried out and its efficiency is analysed with existing scheduling algorithms.
Keywords: Cloud Simulation, Dynamic VM Allocation, Budget-constrained, Greedy Algorithm.
Abstract
Efficient Distance Based Continuous Outlier Detection for Unsupervised Dataset
Manochitra. S, Reshma. R, Safeedha P.K, Saranya R
DOI: 10.17148/IJARCCE.2018.7240
Abstract: Time series data streams are common due to the increasing usage of wireless sensor networks. Such data are often accompanied with uncertainty due to the limitations of data collection equipment. Outlier detection on uncertain static data is a challenging research problem in data mining. Moreover, the continuous arrival of data makes it more challenging. In this paper propose continuous outlier detection is a special class of steam data mining. Typically, stream data mining algorithms assume that each object is inspected at most once. However, in continuous outlier detection need to be capable of reporting, at each time point, the outliers among all the objects in the current sliding window. The propose a sliding window approach of outlier detection, which makes use of the results obtained from the previous state set to efficiently detect outliers in the current state set. These methods are verified using both real data and synthetic data. The results show that they are able to reduce the required storage and running time.
Keywords: Intrusion Detection Systems, Sliding window, MCOD, Event window, sliding window.
Abstract
An Efficient Learning with Sparse Regularized Kernel for One-Class Classification
S. Bhuvanesh, Arun Mathew, P.M. Ashfaq Ahmed, A. Muhammed Rafi
DOI: 10.17148/IJARCCE.2018.7241
Abstract: Speedy abnormal event detection meets the growing demand to process an enormous number of surveillance videos. Although real-time processing is a key criterion to a practically employable system given continuously captured videos, most sparse code methods cannot be performed fast enough. A novel anomaly detection framework with transferred deep Convolutional Neural Network (CNN) is propose. The presents an online learning with sparse regularized kernel based one-class Extreme Learning Machine (ELM) classifier and is referred as �sparse-OC-ELM�. The baseline kernel hyperplane model considers whole data in a single chunk with regularized ELM approach for offline learning in case of One-Class Classification (OCC). The regularized kernel ELM based online learning and consistency-based model selection has been employed to select learning algorithm parameters. The online RK-OC-ELM has been evaluated on standard benchmark datasets as well as on artificial datasets and the results are compared with existing state-of-the art one class classifiers. The proposed method achieves high detection rates on benchmark datasets at a speed of 140-150 frames per second on average when computing on an ordinary desktop PC using MATLAB. The experimental results evaluate the proposed method on two publicly available video surveillance datasets, showing competitive performance with respect to state of the art approaches.
Keywords: Abnormal Event Detection, Outlier Detection, Video Data Stream, Sparse Learning, Dynamic Detection.
Abstract
An Efficient K-N Secret Sharing Image and AES Encryption Algorithm in Visual Cryptography
Vignesh. M, Raihana. P.A, Shahadha Hakkim, Sukanya. S
DOI: 10.17148/IJARCCE.2018.7242
Abstract: Nowadays, many researchers proposed algorithms based on the combination of visual cryptography method with the aim of high secure secrecy, reliability, accuracy and efficiency for the secret message. Visual cryptography provides high security with less computation when comparative with other methods. The proposed system takes any image which is to be shared secretly. This image is encrypted using a key given by the user. Further, the encrypted image is divided into N different shares using K N Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image. After the original image is generated it is still in encrypted form. AES Cryptographic techniques is to protect the image. The image is encrypted using AES algorithm encoding schema has been proposed to convert the key into shares based on Visual Secret Sharing. The key which is used to encrypt the image originally is now required again to decrypt it, thus providing an additional level of security.
Keywords: AES, Visual Cryptography, Image Encryption.
Abstract
A Non-Overlap based Cluster using Canopy and Parallel K-Means for MapReduce Framework
Summia Parveen, Amirjohn BeeBee, Thoufiya. M, Safana Jasmine
DOI: 10.17148/IJARCCE.2018.7243
Abstract: There are very big bottlenecks when traditional data mining algorithms deal with large data sets. A novel technique for clustering the large and high dimensional datasets. The main idea is to use an inexpensive and approximate distance measure in order to efficiently partition the data into overlapping subsets which is called as canopies. After we get these canopies the desired clustering is performed by measuring exact distances only between points that occur in a common canopy. Using canopies, large clustering problems that were formerly impossible become practical and efficient. K-Means is typical distance-based clustering algorithm. Here, the canopy clustering algorithm is implemented as an efficient clustering technique by means of knowledge integration. With the study of the canopy clustering the K-Means paradigm of computing, we find is appropriate for the implementation of a clustering algorithm. This paper shows some advantages of canopy cluster to K-Means clustering mechanism and proposes a pre-clustering approach to K-Means Clustering method. Here we use Hadoop�s MapReduce program model for K-Means clustering with canopy clustering. The experimental results show that Canopy + K-means algorithm has faster operation speed than K-means algorithm, but both of them show good speed-up ratio under Hadoop environment and Canopy + K-means algorithm is even much better K-means algorithm.
Keywords: Abnormal Event Detection, Outlier Detection, Video Data Stream, Sparse Learning, Dynamic Detection.
Abstract
Attendance Management System for College Student using Fingerprint Scanner
Shifa N Shaikh, Ajinkya Jawadwar, Umesh Hargane, Prof Kranti Kolambe
DOI: 10.17148/IJARCCE.2018.7244
Abstract: This project uses a biometric concept to facilitate the attendance system in educational institutes it uses the most reliable way of uniquely identifying students through fingerprint reading. Such type of application is very useful in school as well as in college for daily attendance. Through this application we can keep a systematic track of student's attendance. This project enables the easy way of maintaining class attendance with fewer efforts. In this a smart way of taking attendance is done without wasting paper and time. When teacher enters the classroom, the attendance marking will start. Computer software will start the process after inputting fingerprint of teacher. It will find the Subject ID, and Current Semester using the ID of the teacher or could be set manually on the software. If teacher doesn�t enter classroom, attendance marking will not start. After some time, say 20 minutes of this process, no attendance will be given because of late entrance. This time period can be increased or decreased as per requirements. Here, in this project we aim at designing a student attendance system which could effectively manage attendance of students at institutes, schools and colleges. Attendance is marked after student identification. For student identification, a fingerprint recognition based identification system is used. Fingerprints are considered to be the best and fastest method for biometric identification. They are secure to use, unique for every person and do not change in one�s lifetime. Fingerprint recognition is a mature field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Although we are using this fingerprint identification system for student identification purpose in our project, the matching results are so good that it could perform very well on large databases like that of a country like India. Now a days, every new day SOFTWARE are launched in the market. In today�s life Biometrics is been the most popular among people. Biometrics is the automated identification, or verification of human identity through the measurement of repeatable physiological, or behavioral characteristics. In Attendance Management System project our team got motivation from the wrong things done by the students to increase their attendance so this was making a lot of mis-confusion for the staff so to maintain this we came for a solution on this by taking attendance through their fingerprints.
Keywords: Biometric system, Finger print scanner, authentication, android mobile.f
Abstract
“Live score of sports”
Vilas Rathod, Shreyan Jain
DOI: 10.17148/IJARCCE.2018.7245
Abstract: There have been several tries at predicting sport games using data from the past, but humans are still superior at predicting sport outcomes. There are multiple commercial services which have sports analysis and prediction as their main business. They use �sophisticated software and statistical algorithms� to aid their data tracking, but at the core they still have experts analysing the games manually. In the present article, we proposed the system to provide switch section for the live updated scores of cricket matches and football matches. We are used API of cricbuzz for cricket score and ESPN for football matches. System shows the live score of all matches like T20, test match, IPL, one day international, also all the football matches. System is implemented by using the java technology and tomcat apache server is used for client server communication.
Keywords: Analysis and Prediction of score; sophisticated design; switch section; multiple commercial services.
Abstract
Automatic Pick and Place Robotic Arm Vehicle
Prof. Vijay Matta, Namita Mendole, Leena Lengule, Nidhi Hatwar, Pragati Manohare, Neha Meshram, Shilpa Nagdeote
DOI: 10.17148/IJARCCE.2018.7246
Abstract: The primary goal of this research and development project is to develop an automatic pick and place robot for material handling systems. This automatic pick and place robot integrates object detection with the pick and place process whereby the detection of an object would power the object gripper; kick starting the pick and place process. With the objective of creating a user friendly and affordable system, the developed model high significantly demonstrates the use of technology in material handling systems. There are many different types of pick and place systems. Examples include portable material handling systems, industrial manipulators .This pick and place robotic arm with wheel scan be easily moved from one place to another. A pick and place robot manipulator can be used to pick an object and place them in an orderly manner to get a final destination. A pick and place requires little operator and provides maximum output with efficiency. It is widely used in different industry to pick a different material and place in desire location.
Keywords: IR Sensor, DC Motor, Microcontroller, Soft catching Arm gripper.
Abstract
Interactive Transition Screen Using OpenGL
Shubham Deshpande, Atharva Dongare, Vilas Rathod
DOI: 10.17148/IJARCCE.2018.7247
Abstract: This paper represent Interactive Transition Screen. Transition with the help of OpenGL. This is those sort from claiming machine representation done which the client control the portraits handled. It includes two-way correspondence the middle of client and PC. Those workstation upon accepting sign starting with those data gadget could change the shown picture suitably. Of the client it gives the idea that the picture transforms promptly because of the opposition to as much commands.
Keywords: OpenGL, Screen Saver, Interactive Transition, Computer Graphic.
Abstract
Survey Website
Atharva Rajguru, Ashutosh Khatavkar, Saurabh Panchal, Saurav Sonawane, Mrunal Fatangare
DOI: 10.17148/IJARCCE.2018.7248
Abstract: Survey is a feedback website where people express their opinion about a particular institute. It is an online customer review service. This web survey is not only about the feedback but also we can give the reviews of institute. Web survey will help the students to know about every college/institute information in detail. This type of web survey does not exist in today�s world. This website will be an online survey in which people will give the feedback. Various questions will be asked in this feedback. This survey website will be open-source to all the people. It will be easy to access this website. Security will be provided from attackers. The verification will be carried via email ID or by OTP number, for identification temporary.
Keywords: Feedback, Report, Online, Register, Analysis, Pie Chart.
Abstract
Survey on Routing Protocols on FANET
B.Mahalakshmi, Dr. A. Nithya
DOI: 10.17148/IJARCCE.2018.7249
Abstract: Flying Ad-hoc Networks (FANETs) are most popular now a days. They are used in the situations of emergency, in the case of a natural disaster, military battle fields. FANETs are the new family member of the mobile ad-hoc networks (MANETs) class. Group of Unmanned Air Vehicle (UAV) are known as Flying Ad-Hoc Networks. It completed their work without human intervention (i.e Driverless Aircraft). There are many problem arises in this kind of networks. The main problem is the communication between (UAVs). In order to solve this problem several routing protocols have been proposed for flying ad-hoc networks they are static, proactive, reactive routing protocols. This paper provides an overview of the protocols, FANET characteristics and design considerations. The main objective is to make observations about the performance of protocols.
Keywords: FANETs, Protocol, proactive, reactive, UAV.
Abstract
A New Approach for Medical Image Fusion Based on Laplacian Pyramid and GA
Narinder Pal
DOI: 10.17148/IJARCCE.2018.7250
Abstract: Medical image fusion is a process which is used to minimize the redundancy while increasing the required information from input images acquired from different medical imaging sensors. Thus, the primary factor of fusion is to acquire a single enhanced and more informative image which can be employed for efficient analysis. This paper presented a hybridization approach used for medical image fusion. Initially, Laplacian Pyramid technique is utilized to extract the relevant features from set of images followed by resize operation. Afterward, Genetic Algorithm based upon swarm intelligence approach has applied over the extracted feature image for fusion. So as to ensure the efficiency of the proposed work, quantitative analysis of fused image is carried out under different performance metrics such as Entropy, Standard Deviation, Peak Signal to Noise Ratio, Structured Similarity and Measure of enhancement using MATLAB software. The experimental study concludes that proposed LP-GA approach outperforms the traditional techniques in terms of high quality and less noise.
Keywords: Medical Image Fusion, Laplacian Pyramid, Genetic Algorithm, DWT techniques, Fusion Metrics.
Abstract
A Review Underwater Optical Image Quality Enhancement based on Guided Filter
Poonam Singh, Dr. Rabindra Kumar Singh
DOI: 10.17148/IJARCCE.2018.7251
Abstract: In underwater location, accuracy of images are degenerated by light absorption and scattering. Underwater image enhancement is use for colour control in the underwater image. There are discussing two method of underwater image. Firstly, the contrast stretching of RGB algorithm is applied to equalize the colour contrast and brightness in images. Secondly, the saturation, hue and intensity of underwater image to increase of real colour and solve to the problem of lighting moves in underwater. Generally Mat lab software are use for underwater image enhancement. A novel method to enhance underwater optical images by dehazing. Scattering and attenuation are two major problems of distortion for underwater imaging. Scattering is caused by large depended particles, like fog or turbid water which contains sufficient particles, plankton etc. attenuation according to the varying degrees of attenuation encountered by light traveling in the water with different wavelengths to the according different underwater colour image. The underwater image enhancements techniques are use for reduced noised level, haze, fog, better possibility of the dark regions, increase global contrast and edges preserving smooth. The quality and visibility of underwater images is damage than atmosphere image and images usually appear foggy and hazy.
Keywords: Underwater optical Image; Underwater visibility enhancement; Guided filter.
