VOLUME 10, ISSUE 2, FEBRUARY 2021
A Deep Learning Framework for Human Activity Recognition Using Smartphone Data
J. Palimote, O.M.D. Georgewill, L. Atu
Adaptive-Multi Parameter MAC Protocol for Reliable Communication in the Smart Grid Environment
Ruqiah Fallatah, Etimad Fadel, Laila Nassef
Evaluating and Improving the User Experience (UX) of Organization Workflow
Abrar Mubarak Munef, Wajdi Al Jedaibi, Emad AlBassam
A Fine Tune Neural Network for Smart Home Automation System Using Internet of Things (IoT)
O. E. Taylor, P. S. Ezekiel
Prediction of Fish Production in Tamil Nadu Reservoirs Using Artificial Neural Network (ANN)
D. Karunakaran, M. Balakrishnan
Auto-Driving Robot: Powered by Neural Networks
Pratik Gupta, Santosh Panchal, Mayank Tiwari
Scrumbanfall: A Hybrid Blend of Agile & Waterfall in IT Projects
Pratik Gupta, Santosh Panchal, Karan Gaur
Atmanirbhar Mahila ~Saheli Ehaat
Ms. Sanjana Pawar, Ms. Ankita Shringare, Ms. Shweta Nimbolkar, Mrs. Vandana Dixit
Prevention of ATM-Robbery using Machine Learning
Ankit Shukla, Rohit, Aditya Kumar
Short Message Service (SMS) Classification
Gitanjali Eknath Gangurde, Komal Bhika Mandal, Payal Sudhakar Suryanwanshi,Saniya Sadique Shaikh, Prof.D.R.Thakare
AR Teaching Using QR Code
Sharayu Mahale, Sejal Sali, Jyot Ladani, Geeta Divekar
An overview of ethical hacking and its impact on society
Ms. Athira Raj
A Framework for Diagnosis of Covid-19 Infection using Deep Learning Approach
J. Palimote, E. Osuigbo L. Atu
Detection of Copy-Paste Forgery in CCTV Footages
Sana Shamsudheen, Reesha P.U
Review on applications of Artificial Intelligence in financial services
Mr. Satish Kale, Mr. Sandeep Shinde
Simulation Metamaterial Based FSS with Internal Boundary Split Ring
Reeta Saini and Parbhjot Kour
MOBILE SMS CALL SPAM FILTERING TECHNIQUES
Sreelakshmi C, Reesha P U
Malicious User Detection Using Honeyword and Honeypot
Unnimaya V. S, Jasmine Jose
Design and Analysis of Bromine Doped Conducting Polymer Based Microwave Absorber
Roopali Bhagat and Simranjit Kaur
Card less ATM Using 3-Level Authentication System
Velasiri Dwarakamayi Amareswari, Gopi Manoj Vuyyuru
AN EXPLORATORY & QUALITATIVE STUDY OF DEVOPS USAGE IN PRACTICE
Mukul Kumar, Rahul Arya, Ehsanullah Nayeemuddin, Prof. Renu Chaudhary
Classification Techniques in Data Mining
Nita J Goswami, Asst. Prof Ketan Patel
Home automation (Controlling electrical home appliances by mobile, google assistant and ultrasonic sensors)
Dr. Deepak Sonker, Dr.Vishal Khatri
APPLICATION OF DENSITY BASED CLUSTERING ALGORITHM IN E-PHARMACY
P. Vijaya kumar, R. Vadivel
Diabetes Prediction System Using Machine Learning Algorithm
R. S. Badodekar, Arymann Sharma, Ujjwal Thakur, Atique Aziz Chaudhary
TRAFFIC DATA PREDICTION IN INTELLIGENT TRANSPORTATION SYSTEM USING m-KNN ALGORITHM AND PRINCIPLE COMPONENT ANALYSIS
P.Pavithra, R.Vadivel*
A HYBRID MODEL FOR LOAD BALANCING IN CLOUD USING DYNAMIC HASH TABLE FILE FORMATTING
R. Arivumani, R.Vadivel*
SECURE CLOUD DATA SHARING USING DIGITAL SIGNATURE BASED TRIO ACCESS CONTROL WITH KEY SHARES
P. Maalini, R. Vadivel*
Abstract
A Deep Learning Framework for Human Activity Recognition Using Smartphone Data
J. Palimote, O.M.D. Georgewill, L. Atu
DOI: 10.17148/IJARCCE.2021.10201
Abstract: Smart phones are the most helpful apparatuses of our day-by-day life and with the propelling innovation; they get fit systematically to address user’s issues and desires. To make these contraptions more useful and amazing, originators add new modules and gadgets to the equipment. Sensors has a major part in making cell phones more practical and mindful of the climate subsequently most smart phones accompany distinctive inserted sensors and this makes it conceivable to gather tremendous measures of data about the client's day by day life and exercises. The goal of Human Activity Recognition is to identify the activities performed by an individual from a given set of the information about him/her and his general environment. A great deal of exploration is being done in the field of Human Activity Recognition which human conduct is deciphered by reasoning highlights got from development, place, physiological signs and data from environments. The propose system presents a deep learning framework for human activity recognition using a smartphone data. The dataset was downloaded from kaggle.com. The dataset contains accelerometer and gyroscope data gotten from a Samsung Galaxy S2 smartphone. The accelerometer and gyroscope data is made up of different activities performed by an individual. The propose system uses keras framework and Theano as backend in build our model. After successful training, the proposed method had an accuracy of 99.06% on the 120th epoch. Keyword: Deep Learning Algorithm, Theano, Keras, Smartphone, Activities Recognition
Abstract
Adaptive-Multi Parameter MAC Protocol for Reliable Communication in the Smart Grid Environment
Ruqiah Fallatah, Etimad Fadel, Laila Nassef
DOI: 10.17148/IJARCCE.2021.10202
Abstract: The wide range of smart grid applications rely on wireless sensor networks to monitor and control the smart grid. Each one of these applications has their own quality of service requirements that should be met by these sensor networks. The different communication technologies share the same spectrum band that is used by wireless sensor networks which, may interfere with it and cause network performance degradation. Thus, there is a need to automatically adapt to connectivity changes induced by wireless communications in the smart grid environment. This paper proposes a new adaptive-multi parameter MAC protocol to achieve reliable communications. Three performance parameters of channel quality, packet delivery ratio, and average remaining energy are combined using a weight cost function to adapt the back off time to dynamically select the best communication channels. The proposed MAC protocol is simulated using the MiXiM simulator- based OMNET++ platform to evaluate the network performance. The results indicate the effectiveness of the proposed MAC protocol to mitigate the interference and satisfy the quality of service requirements of the diverse smart grid applications. The results show that the proposed protocol has improved the network performance of about of 25% increase in successful transmission with lower delay and less energy consumption compared to the basic standard protocol.
Keywords: Smart grid, wireless sensor networks, MAC, reliability, IEEE802.15.4.
Abstract
Evaluating and Improving the User Experience (UX) of Organization Workflow
Abrar Mubarak Munef, Wajdi Al Jedaibi, Emad AlBassam
DOI: 10.17148/IJARCCE.2021.10203
Abstract: User Experience (UX) is becoming popular as a necessary success factor across many sectors and organizations, including the software development industry such as a workflow management system. This system is important to deal with complex needs of organizations to control and organize their routine processes and to manage it in a better way. To assess the performance and the quality of the workflow system, it is essential to evaluate UX using different criteria as UX tries to fulfil the user’s needs. This research aims to provide a framework to assess the user experience of using workflow management system from multiple perspectives such as (i) Ease of Use, (ii) Ease of Learning, (iii) System Usefulness, (iv) Informational Quality, (v) Interface Quality, and (vi) Overall experience. In addition, the framework validated using real case scenarios to assess the current state of UX for the organization’s workflow systems. The collected responses analysed using different statistical techniques to understand the performance of the proposed model. The results suggested a high level of correlation among evaluation criteria, whereas Cronbach Alpha, and Split-Half Reliability Test shows the excellent performance of the model in evaluating the UX criteria. The research is helpful for the organizations to assess the quality and use of workflow management system from the user's perspective.
Keywords: User Experience, Organization Workflow, User Experience Evaluation, User Experience Criteria.
Abstract
A Fine Tune Neural Network for Smart Home Automation System Using Internet of Things (IoT)
O. E. Taylor, P. S. Ezekiel
DOI: 10.17148/IJARCCE.2021.10204
Abstract: A coincide of technologies in Artificial Intelligence and inescapable computing as well as the development of powerful sensors and actuators has gotten interest in the development of smart mediums to transpire and uphold important functions in Daily Living Activities (ADLs). This system proposes an intelligent system for home automation using Internet of things. First, we propose a model using fine tune neural network algorithms. This fine tune neural network has to do with transfer learning. By transfer learning, we mean transferring a knowledge of an existing model into the new model for faster training and for better training performance. This transfer learning was implemented in python by importing mobileNetv2 from keras.applications using tensorflow framework. Secondly, we proposed an emotion expression dataset from which our proposed model will learn to recognize the emotion of a person in the home by means of facial recognition. The model will be able to tell how the person feels, if the person is happy, sad, angry and so on. From the person’s emotional expression, the model will be able to automate any home appliances according to how the person feels. The emotional dataset used in our work is the FER 2013 dataset, which was downloaded from kaggle.com. After successfully training, we had an accuracy of about 88% on all the classes, and had an accuracy of 97% on two of the image classes. Our trained model was saved and exported to web using python flask, were we carried out our testing on a live we camera video.
Keywords: Fine tune Neural Network, Home Automation, Internet of Things, Home Appliances
Abstract
Prediction of Fish Production in Tamil Nadu Reservoirs Using Artificial Neural Network (ANN)
D. Karunakaran, M. Balakrishnan
DOI: 10.17148/IJARCCE.2021.10205
Abstract: Fish is nutritious, cheap and healthy source of protein. Fishery sector plays a very important role for nation building by providing nutritional health security. India has very vast inland resources like rivers and canals (1,71,334 km), reservoirs (3.15 million ha), floodplain wetlands (0.24 million ha), estuaries (0.27 million ha) and ponds and tanks (2.25 million ha)[15]. Fourteen million inland farmers are getting employment and livelihood support from these resources. Among Inland resources, reservoirs are considered a main resource both in terms of surface area and offer immense scope for increasing fish production. More than 3 million ha of manmade reservoirs in the country has a potential for increase the fish production. As populations are increasing in many fold there is a greater need to obtain as much fish as possible from these resources to meet the demand. Estimation of reservoir yield is a critical component for fisheries managers to adopt suitable scientific management practices to enhance the fishery production in these resources.
Keywords: Artificial Neural Network, Inland Fisheries, Reservoir
Abstract
Auto-Driving Robot: Powered by Neural Networks
Pratik Gupta, Santosh Panchal, Mayank Tiwari
DOI: 10.17148/IJARCCE.2021.10206
Abstract: In this paper, the combination of machine learning & neural networking is described, a self-driving toy robot. The body of the robot is built with Lego Mindstorms. An Android smartphone is used to capture the view in front of the robot. A user first teaches the robot how to drive; this is done by making the robot go around a track a small number of times. The Image data, along with the user action is used to train a Neural Network. At run-time, Images of what is in front of the robot are fed into the neural network and the appropriate driving action is selected. The following vehicle will follow the target (i.e., Front) vehicle automatically. The other application is automated driving during the heavy traffic jam, hence relaxing driver from continuously pushing brake, accelerator or clutch. The Idea described in this paper has been taken from the Google car, defining the one aspect here under consideration is making the destination dynamic. This project showcases the poi of python’s libraries, as they enabled me to put together a sophisticated working system in a very short amount of time. Specifically, I made use of the Python Image Library to down sample Images, as Ill as the Pyran neural network library. The robot was controlled using the NXT-python library. This paper further Improves as near technologies Ire used as compared to previous projects, which significantly helps In Improving execution time & runtime memory.
Keywords: auto-driving; self-driving; neural networks; robotics; machine learning; supervised learning; artificial intelligence; python.
Abstract
Scrumbanfall: A Hybrid Blend of Agile & Waterfall in IT Projects
Pratik Gupta, Santosh Panchal, Karan Gaur
DOI: 10.17148/IJARCCE.2021.10207
Abstract: The Software industry has been growing with the advent of automation technology and is looking for a change in their software development practices to reap the benefits of automated technology to achieve their business objectives. Agile Business Process Reengineering (ABPR) is a trending software for Engineering Management (SEM) in the software industry, which assists software development in the transformation of software development practices. Scrum and Kanban are popular Agile solutions acquired by Software Engineering Management staff. Scrumban, a combination of both Scrum and Kanban, has gained strength from both parties, building a strong framework that addresses the challenges of Agile Software Engineering (ASE) methods such as workflow control, lead time, unresolved product delivery by Scrum or Kanban as an independent framework. However, some of the challenges, outside of Scrumban such as project documentation, planning, planning, evaluation and clear product vision in the first phase of the project. Such issues have prompted an application for research by Software Process Reengineering (SPR) in Scrumban by customizing its design to build the next level of hybrid framework. The traditional SDLC 'Waterfall' approach has the answers to those problems. An artistic analysis, solution to these problems, with the help of 'Waterfall' and its life cycle processes is the main objective of this study by combining Scrum with Kanban and Waterfall to form the hybrid framework 'Scrumbanfall' which aligns Kanban's central integration under the Scrum rules.
Keywords: Scrum, Kanban, Scrumban, Scrum Challenges, AM - Agile Methodology, ABPR - Agile Business Process Reengineering, BPR - Business Process Reengineering, ESE - Empirical Software Engineering, SPR - Software Process Reengineering, SEM - Software Engineering Management.
Abstract
Atmanirbhar Mahila ~Saheli Ehaat
Ms. Sanjana Pawar, Ms. Ankita Shringare, Ms. Shweta Nimbolkar, Mrs. Vandana Dixit
DOI: 10.17148/IJARCCE.2021.10208
Abstract: To strengthen the economy of women from all strata of the society after facing COVID-19 pandemic situation leading to economic crisis all over. One should take inspiration of ‘Atmanirbhar Bharat ‘viz. self –dependent India [7], concept of our honorary PM. Shri Narendra Modiji. So, to make a try, like bud in huge garland we would like to make a project to strengthen the economy of women [7]. Our motive is to promote women empowerment. Hence, we are creating online digital platform for Mahila Bachat Gats (Self-Help Groups) of under-privileged and any strata's of society, urban or rural women to empower them by giving opportunity to market their own products and services and enhance their talent and skills to strengthen economy. We are using a balance of gamification concepts to maintain the encouragement and modern social-enhancement interface.
Keywords: Uploading product and details, viewing the products, skill development, social media, responsive, subtitles, user-friendly, image, motivation encouragement, computer, strengthen economy, HTML, CSS, Python-Flask.
Abstract
Prevention of ATM-Robbery using Machine Learning
Ankit Shukla, Rohit, Aditya Kumar
DOI: 10.17148/IJARCCE.2021.10209
Abstract: The idea that the design and implementation of a real-time ATM robbery project came from a standpoint of real-time ATM robberies. This project provides a warning at a time when the thief is about to break the ATM.so machine, overcoming obstacles in the existing systems in our society. Whenever a thief brings robbery tools to an ATM or when a thief tries to use a tool to break in, the CCTV camera at the ATM detects whether the person is coming with tools using in-depth learning and machine learning methods. Here OpenCV is used as a speaker and the python language is used for in-depth learning strategies with Haar Cascade, the Yolo V4 and for object detection. A warning message is also sent to the bank and an alarm is sounded to alert local authorities.
Keywords: ATM, Deep learning, Open CV, Haar Cascade, Python, Yolo V4, CCTV, Alert message
Abstract
Short Message Service (SMS) Classification
Gitanjali Eknath Gangurde, Komal Bhika Mandal, Payal Sudhakar Suryanwanshi,Saniya Sadique Shaikh, Prof.D.R.Thakare
DOI: 10.17148/IJARCCE.2021.10210
Abstract: Short Message Service (SMS) is an integral service of the mobile phone for users to communicate with people which is faster and convenient way to communicate. However, it has some limitations like incapability of searching and categorization of SMS, scheduling, marking SMS and there is scope to improve it. To overcome various limitations, we have proposed a mobile application with title MojoText - Text Messenger which solves real time problems of text messaging. Our system provides core functionalities of text messaging and beside tothat various facilities like categorization of messages based on personal, social, transactional and user defined categories with color codes, searching with customized date, scheduled text delivery, hiding of messages inside the app, reminders for due dates of billers, validity of texts, starred messages, pinned chats, signature, backup and recycle bin. Key Words- Text Messaging App, SMS,Messanger, Categorization, Android SMS APP.
Abstract
AR Teaching Using QR Code
Sharayu Mahale, Sejal Sali, Jyot Ladani, Geeta Divekar
DOI: 10.17148/IJARCCE.2021.10211
Abstract: In this paper, we present an Augmented Reality (AR) system using Quick Responsible (QR) code for Android Smartphone. QR code has many advantages to be a marker. It can encode relatively larger amount of marker information in an easy and standard way, also it has the capability of error correction. Basically the system detects the marker, decodes its information and overlays a 3D object on the marker. As QR code is widely used today, our idea of combining QR code and AR to develop an application in handheld smart device can extends to many fields.This research focuses on the use of Quick Response (QR) codes, as a part of the Augmented Reality (AR) technology, in an educational intervention for early childhood education in Music. The educational methods employed are game-based and collaborative learning within a framework that uses Information and Communication Technologies (ICT) and mobile devices in indoors and outdoors activities.
Keywords: (AR) Augmented Reality,QR(Quick Response) code, Learning Outcomes.
Abstract
An overview of ethical hacking and its impact on society
Ms. Athira Raj
DOI: 10.17148/IJARCCE.2021.10212
Abstract: Hacking is the process of find out the vulnerabilities in a computer system or a computer network. Hacking is done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Legal hacking is called Ethical hacking. This paper discusses Ethical hacking and its impact on society.
Keywords: Ethical hacking, Types of Hackers, Types of hacking, Impact on society
Abstract
A Framework for Diagnosis of Covid-19 Infection using Deep Learning Approach
J. Palimote, E. Osuigbo L. Atu
DOI: 10.17148/IJARCCE.2021.10213
Abstract: Coronavirus is a respiratory sickness that is impelled by a novel Covid. The basic indications show up in the contaminated individual are fever, cough, sore throat, and trouble in relaxing. Disappearing of taste, sluggishness, throbs, and nasal blockage can likewise be seen in certain patients. The length among tainting and the principal sign of manifestations might be reached out to 14 days [4]. The disease of this infection is communicated through the beads of patients, for example, coughing and sniffling. In the event that the individual comes by implication or in a roundabout way contact with a contaminated individual, at that point the reached individual gets tainted. The antibodies/medications of this sickness are not accessible as of not long ago. Segregation and social distancing are the lone answers for this disease. Hence, the early recognition of tainted people is needed to stop the spread of contamination. This paper presents a framework for diagnosis of covid-19 infection using Deep Learning approach. The proposed system starts by making use of a covid-19 dataset, which is made up of 6 columns and 48 rows. The dataset comprises of most covid-19 symptoms ranging from dry cough, sore throat, high fever and difficulty in breathing of 48 patients and also the results which shows if the patients is infected with covid-19 or not. We made use of a feed forward neural network in training our model and we had an accuracy of about 92%. The trained model was saved and deployed to web using python flask so that users can enter in most covid-19 symptoms and check if they have been tested positive to the virus or not.
Keywords: Deep Learning, Covid-19, Feed Forward Neural Network, Diagnosis System
Abstract
Detection of Copy-Paste Forgery in CCTV Footages
Sana Shamsudheen, Reesha P.U
DOI: 10.17148/IJARCCE.2021.10214
Abstract: Video forgery detection aims at checking the authenticity of videos by recovering information about their history. Copy-paste forgery is done by replacing a region from a video with another region from the same video. By copying a part from the same video , its important properties, such as noise, colour palette and texture, will be fit with the rest of the video and thus will be more difficult to distinguish and detect these parts. In this paper DWT (Discrete Wavelet Transform) is used to compress the frame and optical flow technique is used to detect the flow of the moving objects and the forgery object. But the SIFT (Smart Information Flow Technology) is used to detect the key features of the original frame and the forgery frame. OpenCV is used for image processing.
Keywords: Copy Paste forgery Detection in videos, Optical flow, ROI masking, DWT, SIFT.
Abstract
Review on applications of Artificial Intelligence in financial services
Mr. Satish Kale, Mr. Sandeep Shinde
DOI: 10.17148/IJARCCE.2021.10215
Abstract: Now day's every sector enhancing their services by adapting digitization, everyone has witnessed fastest growth in the adaption of digitized financial services also. There is a consistently inventing and research on machine intelligence to enhance operational model, business model and revenue model of firms. Artificial intelligence on of sub branch of computer science which provides linguistics, psychology, mathematics, and philosophy, it today mainly utilized as powerful and effective tools for finance sector. Artificial intelligence has a great potential for enhancing positive impacting on financial firms, if it is implemented as a positive approach. In these paper, we focus on addressing crucial, powerful and beneficial tools providing by artificial intelligent for financial firm as well as end user.
Keywords: Artificial Intelligent, financial sector, machine learning, artificial neural network.
Abstract
Simulation Metamaterial Based FSS with Internal Boundary Split Ring
Reeta Saini and Parbhjot Kour
DOI: 10.17148/IJARCCE.2021.10216
Abstract: Frequency selective surface (FSS) is a periodic surface with identical two-dimensional arrays of elements arranged on a dielectric substrate. An incoming plane wave will either be transmitted (passband) or reflected back (stopband), completely or partially, depending on the nature of array element. This occurs when the frequency of electromagnetic (EM) wave matches with the resonant frequency of the FSS elements. Set of simulation optimization were carried out with single split FSS, split with internal boundary and dual split FSS with internal boundary. Metamaterial based substrate with perfect electric conductor (PEC) layer was used to make the FSS design. It was observed from the results that with internal boundary and dual split ring based FSS has higher resonance frequency.
Keywords: FSS, S-parameter, resonance, planar.
Abstract
MOBILE SMS CALL SPAM FILTERING TECHNIQUES
Sreelakshmi C, Reesha P U
DOI: 10.17148/IJARCCE.2021.10217
Abstract: SMS spam, also referred to as mobile spam, has become a prevalent and an ever growing issue thanks to the supply of bulk SMS services at nominal costs. These spam messages might not only be commercial but also pose an excellent deal of monetary threats to the users. To fight against SMS spam, a spread of solutions are proposed including content-based filtering, semantic indexing, machine learning classifiers, etc. However, during this regard evolutionary algorithms haven't been utilized. Since the character of SMS is contemporary, the representation of text messages keep evolving with the assistance of slangs, symbols, misspelled words, abbreviations and acronyms. Hence, such an answer is required which may accommodate these changes, also keeping the length of SMS in consideration. The model proposed during this paper generates regular expressions as individuals of population, using Genetic Programming Approach. These regular expressions so generated are used for the classification purpose. The application of Genetic Programming in the domain of SMS spam filtering has not been explored widely. It is able to eliminate False Positive errors, thus saving legitimate messages from being misclassified. The performance tends to enhance with higher number of generations.
Keywords: Short Message Service, Spam, Genetic algorithm.
Abstract
FAKE NEWS DETECTION
ANGEL SHIBU, MINLA K S
DOI: 10.17148/IJARCCE.2021.10218
Abstract: Now a day’s Social media for news consumption is a double-edged sword. On the one hand, its low cost, easy access. Because of its wide range of “fake news”, been seen i.e., low quality news with intensity of false information. By the spread of this fake news, it has the potential for extremely negative effects on individuals and society. Therefor the reality of news publishing in the social media became more unfair and un relative. Detection a fake news in social media provide unique challenges that make existing detection algorithms from traditional news in media is ineffective or not applicable. First, fake news mainly written to mislead readers to accept the false information, which makes it difficult to detect based on news content. Second, one is that exploiting its auxiliary information is making more challenging in users by that social engagements with fake news make the data much big, incomplete, unstructured, and noisy.
Keywords: Detecting fake news, Alexa ranking, Google page ranking, protocol, comparison, content matching.
Abstract
Malicious User Detection Using Honeyword and Honeypot
Unnimaya V. S, Jasmine Jose
DOI: 10.17148/IJARCCE.2021.10219
Abstract: In today’s world the important security threat is the disclosure of password files. To prevent such password file breaches, the Honeyword mechanism is introduced. Honeywords are decoy or fake passwords and it is a set of words which are very similar to the real passwords that is submitted by the user for a particular account. For every user’s account, the set of Honeywords are generated. Thus, the attacker get confused to detect the real passwords and Honeywords. The Honeyword concept was introduced to detect the failure and an unauthorized access. The mechanism of Honeypot is basically introduced for confusing the attacker and making difficult to distinguish between the actual data from the decoy data. Through this we can collect the attacker’s details without knowing them. Fake or decoy files are made available only when unauthorized access is detected by the Honeyword generation mechanism.
Keywords: Honeyword, Honeypot, SIM Blocking, Decoy data, Intruder.
Abstract
Design and Analysis of Bromine Doped Conducting Polymer Based Microwave Absorber
Roopali Bhagat and Simranjit Kaur
DOI: 10.17148/IJARCCE.2021.10220
Abstract: Microwave absorber is one of the elements that must have in the anechoic chamber. RF Shielded anechoic chambers are widely used to provide RF isolated test regions to simulate free-space test environment. Microwave absorbing materials and structures have to meet general requirements that can be summarized by the following: (i) it should minimize the reflection of EM waves at the air to absorber interface; (ii) it should have strong absorption of electromagnetic waves; (iii) it is expected to have broad bandwidth and angular response; (iv)it should have low weight and thickness. Based on the above properties of microwave absorber, wide band microwave absorbers are designed and simulated. Conducting polymers were taken as the absorbing materials and pyramidal structure microwave absorber was simulated. The simulation results show wideband frequency absorption.
Keywords: Conducting polymer, absorber, microwave, narrow band.
Abstract
Card less ATM Using 3-Level Authentication System
Velasiri Dwarakamayi Amareswari, Gopi Manoj Vuyyuru
DOI: 10.17148/IJARCCE.2021.10221
Abstract: The automatic teller machine (ATM) was invented back in the 1960s to provide users with 24x7 round the year with baking services likes withdrawing cash, depositing, balance enquiry and many other services. Initially, banks provided users with cards to access these services at atm. But there are many disadvantages associated with using cards. So, many researchers developed various ways of accessing these services without the help of any cards. Some of them used fingerprint-based techniques and while others used OTP based methods to improve security levels. This paper introduces a new way of withdrawal of cash from ATM's by improving the security levels compared to the existing methods. Here we use a 3-level authentication system for withdrawing cash without cards by various authentication techniques.
Keywords: ATM, Cardless transaction, Fingerprint, Security, OTP.
Abstract
AN EXPLORATORY & QUALITATIVE STUDY OF DEVOPS USAGE IN PRACTICE
Mukul Kumar, Rahul Arya, Ehsanullah Nayeemuddin, Prof. Renu Chaudhary
DOI: 10.17148/IJARCCE.2021.10222
Abstract: DevOps is a collaboration of development and operations devised to stress on communication and integration between them. The main of DevOps is to help an organization to grow and excel. With its help an organization can produce software products and services. Continuous development and innovation is required in an organization and DevOps training has been started in the orientation itself. Many researchers have been written about it since 2009 and various blogs are available on the internet. Organizations have associated themselves with DevOps for a lean startup methodology. DevOps aims to aid software application by standardizing development environments.
The main use of DevOps is to streamline the day to day activities of an organization and speed up the process for timely deliveries. Companies are focusing on the automation of processes this way timely delivery and quality results are achieved. Getting the workforce trained with the latest technologies and getting optimum work for them have become the need of the hour. Problems can be more easily solved by this software development method. Documented processes could be devised by it and processes could be made user friendly. Developers are trained and given environmental control and application centric knowledge to sustain. Simple processes are modified to result in optimum development and growth.
Keywords: Docker, Container, Docker swarm, Cluster, Devops, Linux, Nodes
Abstract
Classification Techniques in Data Mining
Nita J Goswami, Asst. Prof Ketan Patel
DOI: 10.17148/IJARCCE.2021.10224
Abstract: This paper discusses the data mining and various data mining techniques of classification. The paper also describes the data mining strategies and the limitation of the data mining. Various classification techniques covered in the paper are based on the decision tree. The decision tree based classification J48, CART and ID3 are discussed in the paper. The paper is useful to discuss compares the decision tree based classification techniques and to select the useful classification technique according to requirement.
Keywords: Classification, decision tree, J48, ID3, CART.
Abstract
Home automation (Controlling electrical home appliances by mobile, google assistant and ultrasonic sensors)
Dr. Deepak Sonker, Dr.Vishal Khatri
DOI: 10.17148/IJARCCE.2021.10225
Abstract: This project is based on a proposal for home automation using voice via Google Assistant. We saw many home automation technologies introduced over these years from Zigbee automation to Amazon Echo, Google Home and Home from Apple. It has become a craze these days. Google Home price is around 150$ (USD) with an additional cost of the devices to be connected to, the total cost of the system reaches over 250$ (USD). Apple Home Kit too is pretty more expensive, Siri, voice assistant by Apple is priced around 145$ (USD). Similarly, Belikin’s Wemo light is priced around 44$ (USD) per unit and this can be controlled both by Siri and Google Assistant. So, overall we can see here that to make our home smart we need to invest quite a lot, let’s say some 250$ (USD) for a basic setup. What if we can automate our house within (cost of the Smartphone is not included as it is assumed to be owned by every individual these days) 10$ (USD) and can control up to 8 appliances using Google Assistant? Well, this project describes the implementation of such a system. The system is implemented using ordinary household appliances Natural language voice commands are given to the Google Assistant and with the help of IFTTT (If This Then That) application ,also the Blynk application the commands are decoded and then sent to the microcontroller, the microcontroller in turn controls the relays connected to it as required, turning the device connected to the respective relay On or OFF as per the users request to the Google Assistant. The microcontroller used is NodeMCU (ESP8266) and the communication between the microcontroller and the application is established via Wi-Fi (Internet).and we can also control the electric consumption by using ultrasonic sensor and relay ,when ultrasonic sensors detect an object with a certain distance the electric bulb will glow and till when that object moves away from ultrasonic sensors the bulb will automatically off after certain amount of time and if Ultrasonic sensors will detect an object again it will glow again, so that we can save lot of energy. Key Words: Home Automation, NodeMCU (ESP8266), IFTTT (If This Than That) Application, BlynkApplication,
Abstract
Digital Pill
Sangeetha I, Sowmiyashree K, Swetha K, Maheshwari D
DOI: 10.17148/IJARCCE.2021.10226
Abstract: Digital pill is basically a multichannel sensor used for remote biomedical measurements using micro technology. This is used for the real-time measurement parameters such as pH, conductivity and dissolved oxygen. The sensors are fabricated using electron beam and photolithographic pattern integration and were controlled by an application specific integrated circuit (ASIC). Digital pills are ingestible miniaturized electromechanical devices representing a point of convergence between biomedical technology, medicine and the pharma industry. Electronics, sensors and miniature robotic technology can give access, analyse and manipulate the body from the inside. In particular, smart pills for drug delivery are an emerging technology; many different approaches to local drug delivery have been proposed, including transcutaneous and implantable means. Anyhow, swallow able smart pills for drug delivery are receiving increasing attention as the oral one is still the preferred route for drug administration, due to its high patient acceptance and low cost. Smart pills for drug delivery offer a number of significant opportunities for pharmaceutical industries because they may be used in a wide range of applications and enable therapies not possible with conventional means. Its high patient acceptance and low cost. Smart pills for drug delivery offer a number of significant opportunities for pharmaceutical industries because they may be used in a wide range of applications and enable therapies not possible with conventional means. The changes occur in human bodies are monitored and sent it to nearby monitor for doctor monitoring through wireless.
Keywords: ASIC, Pill, Drug
Abstract
APPLICATION OF DENSITY BASED CLUSTERING ALGORITHM IN E-PHARMACY
P. Vijaya kumar, R. Vadivel
DOI: 10.17148/IJARCCE.2021.10229
Abstract: Online web portals are best source for selling products. In present trend there are various websites which are selling medicine products through online. Using this project we will provide similar type of website through which users can search for various type of products and add products to chart and buy using various online methods. This system is a field concerned with purchasing and selling medicines, maintaining their inventory, generating sales invoices and generating reminders of expiry date about medicines. It requires more time and effort when all procedures are performed manually. Thus, in order to reduce time consumption and human effort the Medical Shop Management System application can be applied in medicals where manual procedure exists. The purpose of this project is to reduce time consumption and human effort. This application provides user friendly interface as well. Whether a user is checking into a social network, looking for a pharmacy in the middle of the night, or located in somewhere and needs help, the key is always the same: location. In this project, an web application is developed.
Keywords: - Pharmacy, Assistant,Hospital Pharmacy,Drug Regulation
Abstract
Diabetes Prediction System Using Machine Learning Algorithm
R. S. Badodekar, Arymann Sharma, Ujjwal Thakur, Atique Aziz Chaudhary
DOI: 10.17148/IJARCCE.2021.10231
Abstract: Machine learning is the scientific field dealing with the ways in which machines learn from experience. The purpose of machine learning is the construction of computer systems that can adapt and learn from their experience. With the rise of Machine Learning approaches we have the ability to find a solution to many issues. Furthermore, predicting the disease early leads to treating the patients before it becomes critical. The aim of this research is to develop a system which can predict the diabetic risk level of a patient with a higher accuracy. This research has focused on developing a system based on Logistic Regression. Various machine learning techniques, its application and research papers were studied and reviewed. Logistic Regression was applied in the medical data set and higher accuracy than previous techniques was achieved. Also, Logistic Regression provided more accuracy than numerous other algorithms
Abstract
TRAFFIC DATA PREDICTION IN INTELLIGENT TRANSPORTATION SYSTEM USING m-KNN ALGORITHM AND PRINCIPLE COMPONENT ANALYSIS
P.Pavithra, R.Vadivel*
DOI: 10.17148/IJARCCE.2021.10227
Abstract: Nowadays, the capabilities of roads and transportation systems have not evolved in a way that is efficiently copes with the increasing number of vehicles and growth of population. Traffic congestion is becoming the issues of the entire globe. The traffic congestion issues have some other indirect overseen issues such as noise, pollution and increase travelling time. This project aims to explore and review the data mining and machine learning technologies adopted in research and industry to attempt to overcome the direct and indirect traffic issues on humanity and societies. The study is focusing on the traffic management approaches that were depended on data mining and machine learning technologies to detect and predict the traffic only. Using data mining technology in traffic management provides a powerful analysis and processing function of mass traffic data and directs drivers and systems to make better decisions. Knowledge mining and discovery is an emerging area in traffic management systems focuses on using and analyzing large amount of traffic data to be used for traffic control, route guidance, or route programming. This study is important to the traffic research communities, traffic software companies, and traffic government officials. Additionally, this study will draw general attention to a new traffic management proposition approach.
Keywords: Data Mining, machine learning, Decision TreeTraffic management, KNN.
Abstract
A HYBRID MODEL FOR LOAD BALANCING IN CLOUD USING DYNAMIC HASH TABLE FILE FORMATTING
R. Arivumani, R.Vadivel*
DOI: 10.17148/IJARCCE.2021.10228
Abstract: Cloud computing is a webbased organization advancement that normal a quick improvement in the advances of correspondence innovation by offering support to clients of different prerequisites with the guide of web based computing resources.Redistribute file chunk to such an extent that the chunks can be distributed to the framework as consistently as could be expected while lessening the development cost.Load balancing method is to allot the chunks of files as consistently as conceivable among the nodes with the end goal that no node deals with an excessive number of chunksThe primary goal is to plan a data chunking ofload balancing in cloud computing security to redistribute files pieces with the end goal that the chunks and how it improves and keep up the presentation of cloud systems.DHTs empower hubs to self-coordinate and - fix while continually offering query usefulness in node dynamism, improving on the system arrangement and the management.The benefits and impediments of existing strategies are featured with significant difficulties being tended to create efficient load balancing algorithms in future.
Keywords: Cloud Computing, Load Balancing, Scheduling, Resource Allocation
Abstract
SECURE CLOUD DATA SHARING USING DIGITAL SIGNATURE BASED TRIO ACCESS CONTROL WITH KEY SHARES
P. Maalini, R. Vadivel*
DOI: 10.17148/IJARCCE.2021.10230
Abstract: Cloud computing multitenancy and virtualization features present remarkable security and access control difficulties because of sharing of actual resources. Since a (public) cloud might not have any power over download demand specifically, an assistance client may send limitless quantities of download solicitation to cloud worker, a malicious service user may launch denial-of-service (DoS)/distributed denial-of-service (DDoS) attacks to burn-through the resources of distributed storage administration worker. So the cloud administration couldn't have the option to react genuine clients' administration demands. Apart from economic loss, unlimited download itself could open a window for network attackers to observe the encrypted download data that may lead to some potential information leakage (e.g., file size). In this project, we propose a new mechanism, Digital Signature based Trio Access Control with Key Shares, to tackle the above aforementioned two problems and also Key stealing attacks and network URL attacks. Computerized Signature age utilizing ECC is utilized to produce advanced mark to the clients, that will evades organization and URL based assaults. Key Shares are included this record to maintain a strategic distance from cloud insiders key taking assaults.
Keywords: Cloud-based data sharing, access control, cloud storage service, DDos, ECC
