VOLUME 10, ISSUE 3, MARCH 2021
Comparative Study of Text Mining Algorithms
Abhishek P, Abhishek K.S, Radhika B
Breast Cancer Detection Using Machine Learning Algorithms
Gaurav Kachwaha, Kajal Jaiswal, Ruchika Mahajan, Madhuri Maske, S.B.Ware
IMPACT OF WEIGHT TRAINING AND PRANAYAMA ON SHOOTING ABILITY IN HANDBALL WITH RESPECT TO CENTRAL BACK
Dr. Dilip D Bhadke
A Survey On Secure Data Group Sharing And Distribution With Multiowner Using Multicloud Storage Services
Mr. Dipak G. Hotkar, Prof. B.R.Solunke
Applying Machine Learning Techniques for Early Prediction of Breast Cancer
Ms. R. ManjulaDevi, Dr. Saranya C P
Handwritten Math Problem Solver Using Convolutional Neural Network
Mohini Lokhande, Kirti Murudkar, Arbaaz Nadaf, Niyati Shah
Performance Analysis and Simulation of Dual-Band PIFA Antenna for WCS applications
Mousumi Aktar, Md. Bakul Hossain
QUICK PARK: AN EFFECTIVE PARKING SYSTEM
Qais Nadkar, Chinmay Chaudhari, Alan D’souza and Kavita Shelke
HEALTHCARE WORKER READINESS TO ADOPT AND USE E-HEALTH TECHNOLOGY APPLICATIONS IN WESTERN KENYA
ONDULO Jasper, ADUDA Dickens, RAMBIM Dorothy, OENGA Laban, KIMANZI Samuel
AN EFFICIENT WIRELESS ENERGY TRANSFER SYSTEM FOR CONVERTING RADIO FREQUENCY SIGNAL INTO DC SIGNAL
B.Gothavari,P.Durugadevi and Mr.R.Ravi
RESOURCE ALLOCATION USING HYBRIDCLUSTER IN PD-NOMA BASED COGNITIVE RADIO NETWORK
P.Jayalakshmi, V.Lavanya, MR.R.Rajendran,M.E.,MISTE.,
Sentimental Analysis in R and Python
Jasneet Singh Parmar, Hritike Singh Rawat, Ishaan Nirmal
Real Time Health Monitoring System In Military Application Using In IOT
B.Nantheni Devi, J.Jagadeeswari, E.Iniya
Replaced ASCII table to encode-decode secret messages
Hatim Ghazi Zaini
Home Security System Using Raspberry Pi
Rohit Kumar Yadav, Heerak Jyoti Malakar, Ikramuddin Hamidi, Yazdan Shenas Gardizi, Prof. Sudeep Varshney
A HYBRID PRIVACY PRESERVING SCHEME IN CLOUD FOR ENCRYPTED IMAGES USING CRYPTOGRAPHY AND STEGNOGRAPHY
Mr.R.Rajendran, K.Sheela, S.Simni Dhushitha
Assessment of Noise Filtering Techniques on Color Images
Dr. Senthil Vadivu M
Crop Yield Estimation Using Machine Learning Algorithm
Dr. Shilpa Abhang, Nikhila W
Cloud Data Auditing using Hashing Algorithm
Prof.Biju Balakrishnan, Arathi U, Harihar S, Joshitha M, Muhammed Shahinsha T K
Credit Card Fraud Detection Using Machine Learning
Mr.G.Deeban Chakkarawarthi, Irfana K V, Naseela K T, Akshay Sivaraj
PLANT LEAF DISEASE DETECTION SYSTEM USING CONVOLUTIONAL NEUTRAL NETWORKS
Mr. M Ravikumar, Afaf Kuppanath, Dharsith N S, Syam Krishnan P K, Muhammed Shibin C H
Brain Tumour Prediction System
Prof.Biju Balakrishnan, Meldone Jose, Muhammed Shemeem P, Muhammed Jasir C, Dileep D
DETECTING FAKE ONLINE REVIEWS USING SUPERVISIED LEARNING
Mr. M. Ravikumar,Aparna R, Jinu T Benu, Jindo K Joy, Sandra P
Data storage and scheduling of blood donation management through web application
K.Indhumathy, Y.Reshma, V.Sindhuja
Creating Desktop Speech Recognization Using Python Programming.
Mrs.A.M.Sermakani.,M.E.,(Ph.D), J.Monisha, G.Shrisha, G.Sumisha
BOUTIQUE WITH ONLINE CUSTOMIZATION THROUGH WEB APPLICATION
Sai Sowmya Donthu, Lavanya T, Subhashini S
Data Acquisition and Real Time Monitoring Using Sensor Network for Efficient Usage of Water
Kamatchi P.M, Priyadharshini G, Sangeetha A, Saranya A, Sathia buvaneswari K
INTERACTIVE E_COMMERCE SHOPING SITE FOR VISUALLY IMPAIRED PEOPLE
Sneha G, Swetha K, Sruthi R, Sneha Sree S
Recommendation System for Analyzing the Preference Data of the Multimedia Software Tools in Education
Manal S. F. Alharbi, El-Sayed M. El-kenawy
Web Based Online Music Portal
Shraddha Jadhav, Santosh Gharat, Prof.Vijaya Chavan
An Improve Framework for hate speech detection using Machine Learning Approach
J. Palimote, F. Gaage
Emission Control System in Urban Environment Using IoT
Raghu Ramamoorthy, Magesh. M, Sathiyamoorthy. M, Sentamil .S & Siva. P
Multicloud Storage with Enhanced Security in Cloud Environment
Ms. Amruta Vedpathak, Prof. V. V. Pottigar
Data Visualization and Analytics Tools for Enhanced Covid-19 Communication – A systematic Review
Rumiza Shaikh, Shweta Pawar, Renuka Bhanage, Rupali Gajare
Implementation of Series Capacitors for Controlling Voltage Reversal by using Thyristors
KM Seema, Anup Kumar
Online Travel and Tourism Website
Sanika Tirmare N, Neha Gaikwad B, Shruti Pansare D, Prof. Shobhna Gaikwad
Survey Paper on Credit Risk Management using Machine Learning and User Personalization
Hrutvik Desai, Heet Savla, Rahil Vithalani, Prachi Pradhan
INTELLIGENCE CAR PARKING SYSTEM USING INTERNET OF THINGS
S.Ragupathy, B.Ravikumar, M.Vasanth, Mrs.D.Nithya M.E
AWS WEBSITE HOSTING
Amish Pawar, Prathamesh Kadam, Nikhil Warekar, Prof. Vijaya Chavan
Adaptive Traffic Control System For Smart Cities Using Computer Vision and Deep Learning
Shyam Shankaran R*, Logesh Rajendran
ERP Software for College Management System with REST Web APIs
Danish Shaikh, Smita Chavan, Supriya Deshmukh, Shruti Karad
Preventing Cyber Attacks: A Multi-Layered Approach
Swapnil B. Kolambakar, Dr. Praveen Kumar
Abstract
Comparative Study of Text Mining Algorithms
Abhishek P, Abhishek K.S, Radhika B
DOI: 10.17148/IJARCCE.2021.10302
Abstract: Text mining has become an energizing exploration field as it attempts to find important data from unstructured texts. The unstructured texts which contain huge measure of data can't just be utilized for additional preparing by computing devices. Subsequently, definite handling strategies, calculations and methods are imperative to remove this significant data which is finished by utilizing text mining. In this paper, we have examined general thought of text mining and examination of its strategies. In expansion, we momentarily talk about various text mining algorithms which are utilized at present and in future. They are K-means clustering, Decision tree, Neural Network.
Keywords: Text mining, K-means clustering, Decision tree, Neural Network.
Abstract
Breast Cancer Detection Using Machine Learning Algorithms
Gaurav Kachwaha, Kajal Jaiswal, Ruchika Mahajan, Madhuri Maske, S.B.Ware
DOI: 10.17148/IJARCCE.2021.10303
Abstract: The classification of carcinoma has been the topic of interest within the fields of aid and bioinformat-ics, as a result of it's the second main reason of cancer-related deaths in ladies carcinoma may be analyzed em-ploying a diagnostic test wherever tissue is eliminated and studied beneath magnifier. The identification of draw-back relies on the qualification and fully fledged of the histopathologists, WHO will attention for abnormal cells. However, if the histopathologist isn't well-trained or fully fledged, this could result in wrong diagnosing. With the recent proposition in image process and machine learning domain, there's AN interest in experiment to devel-op a robust pattern recognition primarily based framework to enhance the standard of diagnosing. during this work, we tend to will use the image feature extraction approach and machine learning approach for the classifica-tion of carcinoma mistreatment microscopic anatomy pictures into benign and mistreatment ,Using Histopatho-logical image we can preprocess this image after that apply feature extraction and classify the final result using CNN Classification techniques. Keyword: Histopathological image classification, breast cancer diagnose, feature extraction, CNN classification.
Abstract
IMPACT OF WEIGHT TRAINING AND PRANAYAMA ON SHOOTING ABILITY IN HANDBALL WITH RESPECT TO CENTRAL BACK
Dr. Dilip D Bhadke
DOI: 10.17148/IJARCCE.2021.10304
Abstract: The objectives of the study were to determine the effects of weight training and pranamya on shooting ability of handball players with respect to Central Back . Two groups were targeted experimental & control, fifty handball players consider as a experimental group and 50 other players as a control group would be selected as subject for present study and their age ranged between 14-19. Only training was given to the experimental groups. This study involves the effects of Pranayama and weight training on the performance of handball players in an experimental design. Weight Training program would be planned as 12 weeks 4 days a week and 60 min. Training programme that use large muscles groups that can be maintained continuously and are aerobic in nature. The Pranayama and Weight training the demonstration was given to the Players. Data was taken from the 50 handball players as a experimental group of similarly Pre and Post Test was taken from 50 other players as a control group. The training was given to the experimental group only. Mean, Standard Deviation and Analysis of Covariance (ANCOVA) was utilized by the investigator. The results of the study reveals that there was significant effects of weight training and pranamya was found in shooting ability of handball players with respect to Central Back (P>.05).
Abstract
A Survey On Secure Data Group Sharing And Distribution With Multiowner Using Multicloud Storage Services
Mr. Dipak G. Hotkar, Prof. B.R.Solunke
DOI: 10.17148/IJARCCE.2021.10305
Abstract: With the fast development of cloud services, immense volume of knowledge is shared via cloud computing. Although cryptographic techniques are utilised to supply information confidentiality in cloud computing, current mechanisms cannot enforce privacy issues over ciphertext related to multiple house owners, which makes co-owners unable to fitly control whether or not information disseminators will truly air their information. during this paper, we have a tendency to propose a secure information cluster sharing and conditional dissemination theme with multi-owner in cloud computing, within which information owner will share personal information with a group of users via the cloud during a secure means, and information propagator will air the info to a replacement cluster of users if the attributes satisfy the access policies within the ciphertext. We have a tendency to additional gift a multiparty access management mechanism over the disseminated ciphertext, within which the info co-owners will append new access policies to the ciphertext thanks to their privacy preferences. Moreover, 3 policy aggregation methods, as well as full allow, owner priority and majority allow, are provided to solve the privacy conflicts drawback caused by totally different access policies. The safety analysis and experimental results show our theme is sensible and economical for secure information sharing with multi-owner in cloud computing.
Keywords: Multi-Cloud storage, Proof of Storage, Cloud Computing, Third Party Auditor.
Abstract
Applying Machine Learning Techniques for Early Prediction of Breast Cancer
Ms. R. ManjulaDevi, Dr. Saranya C P
DOI: 10.17148/IJARCCE.2021.10306
Abstract: Women are the major strengths for world and family. Around 15 percent of the women are affected by breast cancer in various stages of their lives. It has become very common to find women with breast cancer nowadays. Though there are various treatments for breast cancer, the treatment gets effective only if it is identified at an earlier stage. It will be better if the cancer is diagnosed at the initial stage. Machine Learning provides a way in which the disease can be predicted at an early stage. There are various classification algorithms which can be used to classify the type of cancer mainly in terms of medical diagnosis. Using Breast Cancer dataset, classification algorithms like Linear Discriminant Analysis, Logistic Regression, KNN, SVM and Naïve Bayes are applied, and the data is analyzed for prediction. The classification algorithm determines the accuracy, recall, precision and F1 Score. SVM and Logistic regression has better performance than all other classification algorithms.
Keywords: Classification, Machine Learning, KNN, Logistic Regression, SVM, Recall.
Abstract
Handwritten Math Problem Solver Using Convolutional Neural Network
Mohini Lokhande, Kirti Murudkar, Arbaaz Nadaf, Niyati Shah
DOI: 10.17148/IJARCCE.2021.10307
Abstract: The main objective of this project to develop an Website which calculates the presents a Handwritten Equation Solver trained by handwritten digits and mathematical symbol using Convolutional Neural Network with some image processing techniques to achieve a decent accuracy of 98.46%.
Keywords: Machine learning, Python,Handwritten Equation, Simplification, Preprocessing, Segmentation, Implementation, Recognition, CNN, Polynomial expressions, Image processing.
Abstract
Performance Analysis and Simulation of Dual-Band PIFA Antenna for WCS applications
Mousumi Aktar, Md. Bakul Hossain
DOI: 10.17148/IJARCCE.2021.10301
Abstract: This paper proposed a upturned T shape PIFA Antenna for wireless communication system (WCS) applications. This PIFA antenna is composed of ground plane , feeding post, shorting, plate patch antenna, connected to the ground plane.This desined antenna has been simulated by CST 2018 software. The proposed simulated antenna simulation results for the resonant frequency, return loss, radiation pattern and gain are presented and discussed. The performance analysis T shape PIFA antenna for various operating frequency are presented in this paper. . The proposed simulated antenna simulation results for the resonant frequency, return loss, radiation pattern and gain are presented and discussed. The performance analysis upturned T shape PIFA antenna for operating frequency of 2.368 GHz and 6.677 GHz is presented in this paper. There a gain of 2.03dB and 5.09dB is obtained in lower and higher frequency respectively.
Keywords: PIFA, WCS, UPTURNED, HFSS
Abstract
QUICK PARK: AN EFFECTIVE PARKING SYSTEM
Qais Nadkar, Chinmay Chaudhari, Alan D’souza and Kavita Shelke
DOI: 10.17148/IJARCCE.2021.10308
Abstract: One of the unresolved issues in today's smart world is the inefficient parking system. It becomes difficult for a driver to find an empty spot, resulting in a waste of time, money, and fuel, as well as the worst-case scenario of failing to seek out any car parking zone. Many problems, such as being stuck in traffic and having a limited number of parking spaces, can be solved by IoT. To address this issue, we propose a system that would save drivers time by allowing them to see where there are parking spots with available free spots in the surrounding area. Our project will make use of low-cost sensors and wi-fi modules to provide real-time data. This data will be updated in the database and retrieved by our Android application, allowing people to accurately locate where the available places are. This project, once implemented, will reduce pollution in metropolitan centres while still saving time and money.
Keywords: IoT (Internet of Things), Android Application
Abstract
HEALTHCARE WORKER READINESS TO ADOPT AND USE E-HEALTH TECHNOLOGY APPLICATIONS IN WESTERN KENYA
ONDULO Jasper, ADUDA Dickens, RAMBIM Dorothy, OENGA Laban, KIMANZI Samuel
DOI: 10.17148/IJARCCE.2021.10309
Abstract: Healthcare sector in general, more so in the developing world, is characterized by a number of constraints. Notably, available resources are always several paces behind the demands on healthcare. Adoption of e-health, however, enables increased access to health information and management of service delivery. While this is significant towards improving coordination and quality of health services, on the other hand, it increases the complexity of healthcare managements, resource needs as well as challenges of health information security. In Kenya, one of the recently introduced policy objective is to plan, design and install Information and Communications Technology (ICT) infrastructure, and software for the management and delivery of essential healthcare [1]. There is still dearth of information on the e-health readiness of health service providers to engage in actualizing this objective. The aim of this study was to investigate the underlying factors that affect healthcare workers readiness to adopt and use e-health technology applications in Kenya. Three County-referral health facilities located in 3 Counties in Western Kenya were identified based on availability, organization and functional scope of the e-health solutions. Using a cross-sectional descriptive design, quantitative data was collected from a total of 100 health service providers, through close-ended questionnaires and qualitative data from 21 key informants using interview guides and observation check lists. Available eHealth infrastructure and technical support were largely through donor funding. The study investigated staffs ease and comfort of use of the systems available, need for a management support in the organization providing strong leadership and coordination; e-health system as an additional workload burden, also studied was if the staff had requisite skills needed for full-scale use and need to learn. The investigation, revealed that there is need for management support providing a learning environment, hence the staff developing the requisite skills for full-scale use. These findings indicate that while basic e-health infrastructure exists, most workers still lacked the skills necessary for full-scale use and exploitation of eHealth advantages. There was a general unmet need for training and capacity building in eHealth among healthcare workers, particularly among the clinical cadres (frontline health workers). Implementation of eHealth should integrate ongoing competency and skills improvement activities mainly for clinical teams.
Abstract
AN EFFICIENT WIRELESS ENERGY TRANSFER SYSTEM FOR CONVERTING RADIO FREQUENCY SIGNAL INTO DC SIGNAL
B.Gothavari,P.Durugadevi and Mr.R.Ravi
DOI: 10.17148/IJARCCE.2021.10310
Abstract: This paper presents a reconfigurable radio frequency to direct current (RF-DC) converter operating at 902 MHz frequency designed to efficiently harvest RF signals and convert into useable DC voltages for RF energy harvesting applications. The proposed scheme employs a dual-path, a series (low- power) path and a parallel (high-power) path, to maintain high power conversion efficiency (PCE) over wide input power range. The dual-path is composed of two identical rectifier blocks utilizing internal threshold voltage cancellation (IVC) technique to efficiently compensate the threshold voltage of the transistors used as rectifying devices. An adaptive control circuit (ACC) consisting of a comparator, an inverter and three switches is used in the proposed scheme. The ACC activates the series path or the parallel path to maximize the harvested power based on the input power range. The proposed scheme is designed and fabricated in a 180 nm complementary metal-oxide semiconductor (CMOS) technology. The measurement results show that PCE of the proposed circuit is above 20% from −18 dBm to −5 dBm, maintaining 13-dB input power range with peak PCE of 33% at −8 dBm for 200 k▲ load resistance. The proposed circuit demonstrates−20.2 dBm sensitivity across 1 M▲ load resistance while producing 1 V output DC voltage. INDEX TERMS CMOS technology, dual path, power conversion efficiency, reconfigurable, RF-DC power converter, RF energy harvesting.
Abstract
RESOURCE ALLOCATION USING HYBRIDCLUSTER IN PD-NOMA BASED COGNITIVE RADIO NETWORK
P.Jayalakshmi, V.Lavanya, MR.R.Rajendran,M.E.,MISTE.,
DOI: 10.17148/IJARCCE.2021.10311
Abstract: A novel resource allocation scheme for non-orthogonal multiple access (NOMA) based cooperative cellular networks where in each cell, two pairs of transmitter–receiver want to communicate via the base station (BS) which serves as a decode-and-forward (DF) relay.In the first hop, the transmitters simultaneously transmit their information and the BS applies joint decoding method. The BS transmits the received information towards the receivers based on NOMA technique. The receivers apply the successive interference cancellation (SIC) where the SIC ordering of receivers is determined based on the direct channel gain. Finally, the performance of our scheme by simulations and compare it with existing transmission schemes like the orthogonal frequency multiple access (OFDMA) and the case where both of the first hop and the second hop adopt PD-NOMA as well as the case where a special sort of subcarrier pairing is performed between the first and second hops.
Keywords: NOMA , SR , AR, 5G , IoT, QOS
Abstract
Sentimental Analysis in R and Python
Jasneet Singh Parmar, Hritike Singh Rawat, Ishaan Nirmal
DOI: 10.17148/IJARCCE.2021.10312
Abstract: Twitter sentiment analysis has become very popular because of its usage. Having said that, the stable, optimized Twitter sentiment classification remains elusive due to several issues: heavy class imbalance, domain restrictions of the learning algorithms, the representational richness issues for sentiment cues, and the use of diverse loops. These issues are problematic since many forms of social media analytics rely on accurate underlying Twitter sentiments. Accordingly, a simple yet effective method is proposed for Twitter sentiment analysis. This also does a comparison in both R an python and uses the new code to cover up the existing issues. Experiment results reveal that the proposed approach is more accurate and balanced in its predictions across sentiment classes, as compared to various comparison tools and algorithms. Consequently, this method is better able to reflect strong positive and negative sentiments from users. Considering the importance of Twitter as one of the premier social media platforms, the results have important implications for social media analytics and social intelligence.
Keywords: Python, R, Sentimental Analysis, Twitter.
Abstract
Real Time Health Monitoring System In Military Application Using In IOT
B.Nantheni Devi, J.Jagadeeswari, E.Iniya
DOI: 10.17148/IJARCCE.2021.10313
Abstract: War Soldier’s tracking is done using GPS and IoT is used to provide wireless communication system. For monitoring the health parameters of soldier we are using bio medical sensors such as sound sensor , Co2 Sensors and heart beat sensor it is essential for the base station to determine the exact location and the health status of the soldier and hence more emphasis should be given to navigation and health monitoring technology for the soldiers in the war torn zone. In this project the exact location and the health status parameters of the soldier can be sent to the base station in real time so that the appropriate actions can be taken in case of crisis automatically with the help of deep learning algorithms using MQTT protocol. This technology helps to minimize the rescue, time and search operation effort of army rescue control unit. This is a wearable technology which is the most important factor of this project.
Keywords: , CO2 Sensor, Location Tracking GPS, MQTT,Machine Learning,IOT
Abstract
Replaced ASCII table to encode-decode secret messages
Hatim Ghazi Zaini
DOI: 10.17148/IJARCCE.2021.10314
Abstract: Messages are circulated very widely through social media, and some of these messages may be confidential or have a personal character, which requires protection of this type of messages from people who are intrusive or have nothing to do with the message. In this paper, we will discuss a new method for encoding short and long text messages, which depends on the use of a special table modified for ASCII table, which includes the locations of the different symbols in a specific image. The proposed method is based on the use of the modified table, noting that `this schedule changes from one image to another, which makes the process of understanding the encrypted text message impossible. The proposed method will be implemented and tested, and the obtained experimental results will be evaluated to show the efficiency and reliability of the proposed method. Key words: Digital image, secret message, ASCII table, Updated table, encryption, decryption, throughput, efficiency, reliability.
Abstract
Home Security System Using Raspberry Pi
Rohit Kumar Yadav, Heerak Jyoti Malakar, Ikramuddin Hamidi, Yazdan Shenas Gardizi, Prof. Sudeep Varshney
DOI: 10.17148/IJARCCE.2021.10315
Abstract: Home Security is most important in today’s world, Peoples are making their home secure by using security CCTV cameras. But there comes one downside along with CCTV Camera i.e. CCTV cameras have cost attached to it. Security Cameras are though effective we need more cost-effective System. This project aims to replace the security cameras from our Home security space and replace it with system that uses Raspberry pi. This project is designed for low to medium income segment of our society which usually lives in buildings. This system uses a combination of sensors that detects motion, Faces and heat that could be accidental fire etc. Existing Security Cameras stores the data on cloud that could be a breach to our privacy. Our System uses a Small debit card sized chip along with a PI Camera. Images are captured using camera and each frame is processed using Raspberry pi. The databases of all known humans are stored in OpenCV. When image is captured using PI Camera it is compared to the database stored, if the visitor human is known or unknown(stranger) an audio output is generated and user is notified on Email. By the use of this security surveillance we can keep track on our houses from anywhere in the world by using our mobile devices.
Keywords: Raspberry Pi, Pi Camera; OpenCV, PIR sensors,etc.
Abstract
A HYBRID PRIVACY PRESERVING SCHEME IN CLOUD FOR ENCRYPTED IMAGES USING CRYPTOGRAPHY AND STEGNOGRAPHY
Mr.R.Rajendran, K.Sheela, S.Simni Dhushitha
DOI: 10.17148/IJARCCE.2021.10316
Abstract: We consider a method for preventing e-Fraud in which an image is encrypted using a floating point cipher and then output is generated in image cipher text. To hide the encrypted information, the output is ‘embedded' in a host image. In principle, any cipher generator can be used for this purpose and the method has been designed to operate with images. The approach has a variety of applications and in this paper, we focus on the authentication and self-authentication of edocuments (letters and certificates, for example) that are communicated over the Internet and are thereby vulnerable to e-Fraud (e.g. modification, editing, counterfeiting etc.).
Keywords: - Watermarking, Medical Images, Stegnography
Abstract
Assessment of Noise Filtering Techniques on Color Images
Dr. Senthil Vadivu M
DOI: 10.17148/IJARCCE.2021.10317
Abstract: Digital images are used in different applications such as military, medicine, geoscience, ecology, etc. The quality of the images ensures accuracy and precision of results. The raw digital images we work with everyday are generally stored, transmitted and progressed in many ways which results in addition of noise to the image. Raw digital images carries the different types of noises during capture, due to various formats of storage, transmission, resolution of cameras. These noises affects the content, quality and creates the loss of necessary details .So it is essential to eliminate these noises with preserving the fine details of image quality for processing. This paper focuses on reviewing and analysing existing noise reduction filters by implementing them on color images degraded by the noise. Performance of noise filters are evaluated to find the suitability.
Keywords: Filtering techniques, PSNR, MSE, Denoising
Abstract
Crop Yield Estimation Using Machine Learning Algorithm
Dr. Shilpa Abhang, Nikhila W
DOI: 10.17148/IJARCCE.2021.10318
Abstract: Estimation of crop yield former to harvest is a significant concern in agriculture, as the changes in crop yield from year-to-year impact international business, food demand, and global market prices. Also, initial estimation of crop yield renders beneficial report to policy planners. Appropriate estimation of crop productivity is required for proficient planning of land usage and economic policy. The estimation will also help the farmers to make decisions such as the selection of alternative crops or in-order-to discard crops at an initial step in case of crucial situations. Further, estimating crop yield can ease the farmers to have a more-desirable perception on cultivation. Thus, it is essential to simulate and estimate the crop yield before cultivation for effective crop management and expected result. As there exists an affinity between crop yield and the factors influencing crop, machine learning methods may be efficient for yield estimations. In this research work, the Decision tree is applied for the crop yield prediction. The Decision tree is compared with binary SVM classifier and Naïve Bayes. Decision tree performs well for the crop production analysis.
Keywords: Decision tree, Binary SVM classifier, Naïve bayes.
Abstract
Cloud Data Auditing using Hashing Algorithm
Prof.Biju Balakrishnan, Arathi U, Harihar S, Joshitha M, Muhammed Shahinsha T K
DOI: 10.17148/IJARCCE.2021.10319
Abstract: Cloud computing is an important part of any small or large organization. With cloud storage service users can remotely store their data to the cloud and realize the data sharing with others. Data outsourcing possess the risk of sensitive data getting breached. Remote data integrity auditing is proposed to guarantee the integrity of data stored in the cloud. In some common cloud storage systems such as Electronic Health Records (EHR) systems, the cloud file might contain some sensitive information which must not be altered. This project proposes a novel privacy-preserving mechanism that supports auditing on shared data stored in the cloud. In particular, hashing algorithm are used to compute verification metadata needed to audit the correctness of shared data. A signature is generated for each file by the data owner and then it is uploaded. After a file is uploaded to the database by the data owner, the auditor re-computes it’s signature and compares with the local copy signature of the file in data owner side. If suppose an intruder or a user breaches the security and modifies the public cloud data, the Hashing algorithmisperformed, and the intruder or user is terminated from further accessing of the cloud data. This method ensures data integrity in shared cloud data particularly for EHR systems, much more efficient and less computation cost compared to the existing system. As a result, the data in the cloud are reliable and authentic.
Keywords: Cloud storage; Hashing Algorithm Auditing mechanism; Data Integrity; Storage Auditing
Abstract
Credit Card Fraud Detection Using Machine Learning
Mr.G.Deeban Chakkarawarthi, Irfana K V, Naseela K T, Akshay Sivaraj
DOI: 10.17148/IJARCCE.2021.10320
Abstract: Credit card has an important role in our day- to-day lives. It is now being widely used all over the world for transactions, irrespective of the geographical boundaries People use credit card for their purchase, it allows them to pay it later. Credit card fraud happens when someone steals the information or loses the card. Criminals may be using technologies such as Trojan or Phishing to get card details. Therefore, an effective fraud detection method is important since it can identify a fraud in time when a criminal uses a stolen card to consume. One method is to make full use of the historical transaction data including normal transactions and fraud ones to obtain normal/fraud behavior features based on machine learning techniques, and then utilize these features to check if a transaction is fraud or not. In this paper, Machine Learning algorithm is used to train the behavior features of normal and abnormal transactions. We implement this using Random forest machine learning algorithm in OpenCV and analyze the performance on credit fraud detection.
Keywords: Credit card fraud, Machine learning, Random Forest, openCV
Abstract
PLANT LEAF DISEASE DETECTION SYSTEM USING CONVOLUTIONAL NEUTRAL NETWORKS
Mr. M Ravikumar, Afaf Kuppanath, Dharsith N S, Syam Krishnan P K, Muhammed Shibin C H
DOI: 10.17148/IJARCCE.2021.10321
Abstract: Crop cultivation plays an essential role in the agricultural field. Presently, the loss of food is mainly due to infected crops, which reflexively reduces the production rate. In the field of agricultural information, the automatic identification and diagnosis of diseases in plants is highly desired. To identify the plant leaf diseases at an untimely phase is not yet explored. To improve the identification accuracy of detection Convolutional Neural Network is used. The main challenge is to reduce the usage of pesticides in the agricultural field and to increase the quality and quantity of the production rate. Our paper is used to explore leaf disease prediction at an untimely action. The main aim of this paper is to develop an appropriate and effective method for detection of the disease and its symptoms. A colour-based segmentation model is defined to segment the infected region and place it to its relevant classes. Experimental analyses were done on samples images in terms of time complexity and the area of the infected region. Plant diseases can be detected by image processing technique. Disease detection involves steps like image acquisition, image pre-processing, image segmentation, feature extraction and classification. Our project is used to detect the plant diseases. The detection is done without accessing the internet. It shows the accuracy of detection in percentage. This method will improve the accuracy of disease detection, and also effectively improve the model training and recognition efficiency.
Keywords: Leaf disease detection, Image processing, Image segmentation, machine learning, feature extraction.
Abstract
Brain Tumour Prediction System
Prof.Biju Balakrishnan, Meldone Jose, Muhammed Shemeem P, Muhammed Jasir C, Dileep D
DOI: 10.17148/IJARCCE.2021.10322
Abstract: Brain Tumour segmentation is one of the most crucial and arduous tasks in the terrain of medical image processing as a human-assisted manual classification can result in inaccurate prediction and diagnosis. Moreover, it is an aggravating task when there is a large amount of data present to be assisted. Brain tumours have high diversity in appearance and there is a similarity between tumour and normal tissues and thus the extraction of tumour regions from images becomes unyielding. In this paper, we proposed a method to extract brain tumour from 2D Magnetic Resonance brain Images (MRI) by Fuzzy C-Means clustering algorithm which was followed by traditional classifiers and convolutional neural network. The experimental study was carried on a real-time dataset with diverse tumour sizes, locations, shapes, and different image intensities. In traditional classifier part, we applied six traditional classifiers namely Support Vector Machine (SVM), K-Nearest Neighbour (KNN), Multilayer Perceptron (MLP), Logistic Regression, Naïve Bayes and Random Forest which was implemented in sickest-learn. Afterward, we moved on to Convolutional Neural Network (CNN) which is implemented using Keras and Tensor flow because it yields to a better performance than the traditional ones. In our work, CNN gained an accuracy of 97.87%, which is very compelling. The main aim of this paper is to distinguish between normal and abnormal pixels, based on texture based and statistical based features.
Abstract
DETECTING FAKE ONLINE REVIEWS USING SUPERVISIED LEARNING
Mr. M. Ravikumar,Aparna R, Jinu T Benu, Jindo K Joy, Sandra P
DOI: 10.17148/IJARCCE.2021.10323
Abstract: Online reviews have great impact on today’s business and commerce. Decision making for purchase of online products mostly depends on reviews given by the users. Hence, opportunistic individuals or groups try to manipulate product reviews for their own interests. This paper introduces supervised text mining models to detect fake online reviews as well as compares the efficiency of both techniques on dataset containing hotel reviews.
Keywords: Supervised learning, random forest algorithm
Abstract
Data storage and scheduling of blood donation management through web application
K.Indhumathy, Y.Reshma, V.Sindhuja
DOI: 10.17148/IJARCCE.2021.10324
Abstract: The title project is Blood Bank Management System. The Front end used is HTML,CSS with PHP and the back end is SQL Server. In this project there are several modules such as Donor’s site, Receiver’s site, Demand list. These modules are further divided into name, age, gender, blood group ,contact, address are in the donor’s site. These modules gives a way in managing the data efficiently. So, this project helps in efficient management of the data for long time. Also, it consumes less time consumption. The main and important benefit of this proposed system is that it is very much user friendly and accurate .So, the user feel so much comfortable to work with it. Also in all the modules the regularly updated information are very much useful when they are extracted. The main aim of this system is to make the availability of blood easier. This system mainly reduces the work task and it is easy to maintain the records for the long time. The user can check the demand for blood by clicking the demand list. With the help of this system registration can be done very easily. In receiver’s site the person who needs blood can give the necessary details and find their appropriate match. So, the maintenance and management of registration became very easy.
Keywords: Online Blood Bank Management System, Blood donation, Web-Based System.
Abstract
Creating Desktop Speech Recognization Using Python Programming.
Mrs.A.M.Sermakani.,M.E.,(Ph.D), J.Monisha, G.Shrisha, G.Sumisha
DOI: 10.17148/IJARCCE.2021.10325
Abstract: As a personal assistant, this project is built with AI technologies, Artificial intelligence technologies are beginning to be actively used in human life, this is facilitated by the appearance and wide dissemination of the Internet of Things (IOT). Autonomous devices are becoming smarter in their way to interact with both a human and themselves. The advancement in technology over time has been unmeasurable. In such an era of advancement if people are still struggling to interact with their machine using various input devices then its not worth it. For this reason, many voice assistants were developed and are still being improved for better performance and efficiency. The main task of a voice assistant is to minimize the use of input devices like keyboard, mouse, touch pens, etc. This will reduce both the hardware cost and space taken by it.
Abstract
BOUTIQUE WITH ONLINE CUSTOMIZATION THROUGH WEB APPLICATION
Sai Sowmya Donthu, Lavanya T, Subhashini S
DOI: 10.17148/IJARCCE.2021.10326
Abstract: Programming applications are utilized as a part of all aspects of our everyday life, however, there are a couple of territories like showrooms, material stores still there is have to utilize administration programming for dealing with charging subtle elements, clients data, stock points of interest. Keeping in mind the end goal to full fill this hole we composed boutique administration programming application for material stores.
Keywords: Customized clothing, Online Shopping , Women’s Clothing, e-commerce website
Abstract
Data Acquisition and Real Time Monitoring Using Sensor Network for Efficient Usage of Water
Kamatchi P.M, Priyadharshini G, Sangeetha A, Saranya A, Sathia buvaneswari K
DOI: 10.17148/IJARCCE.2021.10327
Abstract: In Agriculture is the basic source in all around the world the farmer can process the field conceptual model to produce the crops. Each and every action in the field can have some measurement such how to spread the seed in the field, how much of chemical and physical parameter can be used in the field like manure, water etc. The water is the most available source in today lifestyle of the all the living things.
In this project, IOT modernization helps in get together data on condition like atmosphere, protection, temperature and productivity of a surrounding area. Harvest online assessment enables level of water. In addition to that water level sensor is placed in this field, if it is excess water the motor gets automatically pumps the water into the outer area. Internet of the things(IOT) is an ecosystem of connected physical objects that are accessible through the internet. Real time monitoring data can be utilized and performance can be tracked.
Hence high yield can be achieved. This project is mainly focused on improving the agriculture fields’ yield by providing a monitoring system with effective and efficiency usage of water resources. Thus further development in this project will lead to a greater efficiency in the field of agriculture.
Keywords: Arduino board, soil moisture sensor, humidity and temperature sensor, Wi-Fi module, motor etc.
Abstract
INTERACTIVE E_COMMERCE SHOPING SITE FOR VISUALLY IMPAIRED PEOPLE
Sneha G, Swetha K, Sruthi R, Sneha Sree S
DOI: 10.17148/IJARCCE.2021.10329
Abstract: The basic idea of this project is to develop an e-commerce site which can be used by all kind of peoples. This website will be useful to anyone who wants to purchase items using internet. The main thing in this idea is all kind of customer will get the service of online shopping and home deliveries from their favourite stores. This was the best way of shopping without any physical difficulties. One of the main purposes of online purchasing is we can buy any products from almost any country in the world, there are no borders in the online world. It is designed for the customer satisfaction, and for the better shopping experience than the traditional offline shopping.
Keywords: shopping site for visually impaired, Online Shopping, interactive shopping, e-commerce website
Abstract
Recommendation System for Analyzing the Preference Data of the Multimedia Software Tools in Education
Manal S. F. Alharbi, El-Sayed M. El-kenawy
DOI: 10.17148/IJARCCE.2021.10330
Abstract: In this article, we suggest an online course recommendation framework that aids and encourages learners in taking awareness tests and selecting the right curriculum for them. Multimedia is the discipline dealing with the computer-assisted integration of text, graphics, drawings, still and moving images (Video), animation, audio, and all other medium in which any Every kind of digital information may be interpreted, stored, distributed, and treated. Multimedia can be stored and played back, interpreted, worked with, or controlled by information retrieval systems such as high-tech and automated computers, but it can also be used in real time during a show. Digital media techniques for preserving and communicating with multimedia materials are known as multimedia devices. Multimedia stands out from the many media used in fine art; for example, when it includes audio, it has a wider scope. In the early days of multimedia, "rich media" meant collaborative multimedia, and "hypermedia" meant a multimedia technology.
Keywords: Recommendation System, Video, Graphics, Multimedia, Education.
Abstract
Web Based Online Music Portal
Shraddha Jadhav, Santosh Gharat, Prof.Vijaya Chavan
DOI: 10.17148/IJARCCE.2021.10331
Abstract: This have a look at is geared toward growing a Web Based Music Portal which may be used to manage a musical library and a picture gallery. It is aimed to update the manual machine of getting musical CDs considering the generation development. The have a look at discusses the World Wide Web (www) as an Internet carrier that lets in the distribution of pages. Familiarity with internet based application; net programming and internet improvement as an enterprise also are mentioned.It also consist the system analysis and design which include the numerous download and add mechanisms. The gadget design, document and database design is given primarily based at the designated of the proposed device. The implementation and renovation of the device contains the software program improvement, software program trying out and debugging as well as software program implementation. The implementation of the gadget is achieved the usage of Apache as net server with prolonged assist for PHP and MYSQL.
Keywords: Web Based Music Portal
Abstract
An Improve Framework for hate speech detection using Machine Learning Approach
J. Palimote, F. Gaage
DOI: 10.17148/IJARCCE.2021.10332
Abstract: Hate Speech is any correspondence that decries an individual or a gathering based on some trademark, for example, race, identity, sex, sexual direction, ethnicity, religion, or other trademark. Harmful language (e.g., scorn discourse, damaging discourse, or other hostile discourse) principally targets individuals from minority gatherings and can catalyze genuine savagery towards them. The paper proposes an improve framework for hate speech detection using machine learning approach. This system uses a twitter dataset that contains tweeted messages of both hate speech, offensive language, and also messages that is neither hate speech nor offensive language. The dataset was downloaded from kaggle.com, the dataset contains a total of 24,784 twitted messages. The dataset is made up of 8 columns which we later reduced it to two columns by means of feature_extraction. The reduced columns are the tweet columns which contain the twitted messages and the class columns which contains 0,1 and 2, where 0 is classified as hate speech, 1 is classified as offensive language and 2 is classified as neither hate speech or offensive language. we trained our model using support vector machine and random forest classifier and had an accuracy of 95% and 99%. We then deployed our model to web using python flask for easy evaluation and testing. Our experimental results show that our proposed system had better performance in terms of classifying text as hate speech.
Keywords: Hate Speech, Offensive Language, Random Forest Classifier, Support Vector Machine, Machine Learning
Abstract
Emission Control System in Urban Environment Using IoT
Raghu Ramamoorthy, Magesh. M, Sathiyamoorthy. M, Sentamil .S & Siva. P
DOI: 10.17148/IJARCCE.2021.10333
Abstract: Vehicles have become the main part of regular life. Situations and circumstances demand the usage of vehicles in this urban life. Transportation carbon emission is a significant contributor to the increase of greenhouse gases, which directly threatens the change of climate and human health. Under the pressure of the environment, it is very important to measure transportation carbon emissions on a real-time basis. We get the transportation carbon emission information by calculating the combustion of fossil fuel in the transportation sector. In this paper, we predict the vehicle's real-time carbon emission using an MQ2 Gas sensor based on the Support Vector Machine (SVM) algorithm to observe datasets in the city, and the GPS data helps to locate the vehicle's current location. An initial warning is given to the driver regarding the amount of CO2 gas with the help of an LCD, buzzer, and later the same information is transferred to the Police Control Room in case of negligence. Here the hardware (carbon emission sensor) device which connected to the android application, and the application sends the data to the cloud server (RTO) through the Global System of Mobile Communication (GSM). When there is an excess amount of CO2 release from the vehicle, an alert message is sent to the vehicle owner.
Keywords: CO2, GSM, MQ2 Gas Sensor, GPS, Support Vector Machine (SVM).
Abstract
Multicloud Storage with Enhanced Security in Cloud Environment
Ms. Amruta Vedpathak, Prof. V. V. Pottigar
DOI: 10.17148/IJARCCE.2021.10328
Abstract: Multi-Cloud Storage infers the use of varied appropriated stockpiling organizations employing a singular web interface instead of the defaults given by the circulated stockpiling shippers during a single heterogeneous plan. This Multi-Cloud accumulating model empowers customers to store cut mixed data in various cloud drives. Right now, offers assistance for various appropriated stockpiling organizations using the only interface as against using single circulated stockpiling organizations. Cloud security objective basically focuses on issues that relate to information insurance and security parts of dispersed processing. Likewise, the info in clients' information is often spilled e.g., by methods for malignant insiders, indirect accesses, pay off and pressure. This latest data accumulating organization and data control model specialise in vindictive insider's passageway on put aside data, affirmation from malignant archives, removal of united dissemination of knowledge storing and clearing of out of date records or downloaded records once during a while. Data owner doesn't generally got to worry over the destiny of the info put aside within the Multi-Cloud server could also be removed or ruined. The opposite is entrance control of knowledge. The exploratory results exhibit that the suggested show is suitable for essential authority process for the info owners within the more sensible choice of multi-disseminated capacity advantage for sharing their information securely.
Keywords: Multicloud storage, information leakage, system attackability ,remote synchronization, distribution and optimization
Abstract
Data Visualization and Analytics Tools for Enhanced Covid-19 Communication – A systematic Review
Rumiza Shaikh, Shweta Pawar, Renuka Bhanage, Rupali Gajare
DOI: 10.17148/IJARCCE.2021.10334
Abstract: COVID-19, an infectious disease caused by the SARS-CoV-2 virus, was declared a pandemic by the World Health Organization (WHO) in March 2020. By mid-August 2020, more than 21 million people have tested positive worldwide. Infections have been growing rapidly and tremendous efforts are being made to fight the disease. In this paper, the authors attempt to systematize the various COVID-19 research activities leveraging data science, from statistics, modeling, simulation, and data visualization-that can be used to store, process, and extract insights from data. In addition to reviewing the rapidly growing body of recent research, the authors survey public datasets and repositories that can be used for further work to track COVID-19 spread and mitigation strategies for authenticity and comparison purposes. As part of this, they present a bibliometric analysis of the papers produced in this short span of time. Finally, building on these insights, they highlight common challenges and pitfalls observed across the surveyed works.
Keywords: Coronavirus, COVID-19, Data Science, Data Visualization, Modeling, Pandemic, Simulation, Statistics
Abstract
Implementation of Series Capacitors for Controlling Voltage Reversal by using Thyristors
KM Seema, Anup Kumar
DOI: 10.17148/IJARCCE.2021.10335
Abstract: Set payment in television broadcasting queues is an efficient and even less expensive process of helping the energy television broadcasting structure performance. Set capacitors basically cuts the duration of the road making it simpler to help keep each of the parts in the energy structure going throughout synchronism as well as to continue to keep a relentless electric potential level all over the system. Found in Sweden fractional treatments have been around work with due to the fact almost 70 years.
Typically the possible ways to enhance the overall performance belonging to the AC television broadcasting system by using energy electronics has become outlined quite a lot due to the fact around ten years. Newer and more effective semiconductor cantered thoughts have been completely created anyway, they the due to the fact rather long started HVDC and even SVC technologies. Typically the Thyristor Controlled Set Capacitor (TCSC) will be the kind of concept. By means of differing all the placed reactance a fast and even well-defined affect all the energetic energy amount throughout the television broadcasting lines are obtained. Many opportunity software programs, especially power oscillation damping, reap some benefits because of this capability. The reasoning behind recommended the need to develop a good semiconductor device, and these can be placed exclusively in all the high-voltage energy circuit. This specific clearly written a good complex test but all the uncomplicated deal with seemed as being a host cost-effective alternate with smaller losses. This have also been pointed out that all the TCSC illustrates somewhat totally different thinking by using respect in order to sub synchronous number elements throughout the road up-to-date along with the mounted show capacitor bank. This specific would have been a worth it to read facet for the reason that hazard of sub synchronous sonority (SSR), of which basically comprises many of these wire current elements, comes with distracted the usage of show payment throughout energy systems applying winter bringing in plants. Typically the dissertation specials when using the modelling and even manage issues with TCSC.
Some simplifying idea, all the same, instant electric potential change, will be coming to represent the act of all the thyristor restricted inductive division, that is associated in analogue when using the show capacitor bank or investment company on the TCSC. An excellent electric potential change is widely used on the dissertation as a way to refer to and even demonstrate all the TCSC character, to research it has the very clear impedance within diverse wavelengths, as the software for synthesizing all the supercharge manage structure and because the platform aspect in deriving a additive, small-signal dynamical type of all the three phase TCSC. Quantitative Reviews Principles (QFT) therefore has become hand-applied in the TCSC design so as to music it has the supercharge regulator taking into consideration the common type in parameters that may is actually in a very energy system. Typically the consequence belonging to the supercharge manage structure with regard in order to damping in SSR will be last but not least currently being quickly investigated at. Keywords and phrases: Thyristor Restricted Set Capacitor, TCSC, FACTS, responsive power payment, supercharge manage, phasor evaluation, Quantitative Reviews Principles, sub synchronous sonority, SSR.
Keywords: TCSC, QFT, Phasor, SSR.
Abstract
Online Travel and Tourism Website
Sanika Tirmare N, Neha Gaikwad B, Shruti Pansare D, Prof. Shobhna Gaikwad
DOI: 10.17148/IJARCCE.2021.10336
Abstract: The Main objective of this Travel & Tourism project is to make the travel easy and comfortable for the users right from finding the routes and buses to till the booking of the tickets. In this project, we've two modules, Admin, and user. Admin in this Travel & Tourism Management System project will log in with the default username and password and admin has authority to add the bus routes and add the travel and assign the route id’s and bus id’s and eventually , the admin will add the buses at particular times in several routes. Admin also will add the various travel agencies while adding buses admin will fix the ticket price and therefore the capacity of seats. Finally, the user will register and log in and therefore the find the acceptable routes and use the route id he will search the bus by giving all details like date of journey and type of seat etc. After selecting the knowledge user are going to be headed to pick seats during a view the chosen seats are going to be displayed as red then after successful payment the booking confirmation will be shown.
Keywords: Online Travel And Tourism Website
Abstract
Survey Paper on Credit Risk Management using Machine Learning and User Personalization
Hrutvik Desai, Heet Savla, Rahil Vithalani, Prachi Pradhan
DOI: 10.17148/IJARCCE.2021.10337
Abstract: The banking industry is changing and new trends of using technology in banking are emerging. Credit risk assessment has an important role in the banking sector. Various researches have been done to automate the process of predicting the loan default probability to speed up the process and reduce human errors. In this paper, a comparative study of various methods to identify the rightful customers for the bank. The paper also demonstrates how social media networks can be useful for gathering data which can be used for finding the loan eligibility of the user. The outcome of this paper is to find which method or algorithm gives the most accurate result while prediction loan eligibility of a user.
Keywords: Machine Learning, Credit Risk, Personalization, Social Networks
Abstract
INTELLIGENCE CAR PARKING SYSTEM USING INTERNET OF THINGS
S.Ragupathy, B.Ravikumar, M.Vasanth, Mrs.D.Nithya M.E
DOI: 10.17148/IJARCCE.2021.10338
Abstract: Car parking is a major problem in urban areas in developed and additionally in developing countries. The growing range of vehicles creates a problem with parking spaces mainly in the city center and the surrounding streets. Current parking lot management is depends on either human personnel keeping track of the available car park spaces or a sensor based system that monitors the availability of every parking lot area or the general range of accessible parking lot areas. In both situations, the knowledge available was only the entire number of parking lot spaces available and not the particular location available. In addition, the installation and maintenance cost of a sensor based system depends on the amount of sensors utilized in a parking lot. This paper shows a vision based system that's ready to detect and indicate the available parking spaces during a parking lot. The methods utilized to detect available parking lot spaces were supported coordinates to point the regions of interest and a car classifier.
Keywords: Parking System, Ultrasonic Sensor, QR Code (Quick Response Code), IoT (Internet of Things)
Abstract
AWS WEBSITE HOSTING
Amish Pawar, Prathamesh Kadam, Nikhil Warekar, Prof. Vijaya Chavan
DOI: 10.17148/IJARCCE.2021.10339
Abstract: Amazon Web Services offers cloud web hosting solutions that provide businesses, non-profits, and governmental organizations with low-cost ways to deliver their websites and web applications. Whether you’re looking for a marketing, rich-media, or ecommerce website, AWS offers a wide-range of website hosting options, and it’ll help you select the one that is right for you. It is the simplest form of virtual media. Because of AWS services we can handle all our works or complete our work without investing lot s of money. It is easy to access and user friendly option for business purpose. This system refers to focus on the featured facilities provided by the service provider and because of this we can host our website easily and we can manage all the works from any where just we need to logged in to the server and can get access of all the system. At this platform many huge companies will manages their works because of this features this platform is most valuable for those peoples who wat to build the huge company and industry the owner of the industry will get extra benefits from this i.e. they do not have to invest huge amount of money in their industry they want this services for a few months to complete their works that’s why this system will helpful for them and they also get satisfaction from this, in hosting the website of the customer can be published with the help of AWS
And they also manage all the works of the web content easily from anywhere same they just need to logged in to the server and will get access to the system. This is the innovative and latest services that will help to many peoples who can not afford high end servers and data storages.
Keywords: Amazon Services Used for Website Hosting
Abstract
Adaptive Traffic Control System For Smart Cities Using Computer Vision and Deep Learning
Shyam Shankaran R*, Logesh Rajendran
DOI: 10.17148/IJARCCE.2021.10340
Abstract: In country like India, billions of people start and end each working day stuck in traffic or commuting on congested trains and buses. By 2025, cities that implement smart mobility systems on average, reduce commuting cycles by 15-20 percent, with some individuals experiencing even greater reductions. Depending on each city's density, current transit facilities, and commuting habits, the capacity associated with each application is highly variable. Slowed synchronization of traffic signals leads to traffic congestion and delays. The pre-programmed, regular signal timing patterns are employed in traditional signal systems. To overcome the problems of traditional traffic control systems, there is a shift in adaption to an Adaptive traffic control system. The ATCS (Adaptive Traffic Control System) is a traffic management technique that modifies or adapts the timing of traffic signals based on the real demand for traffic and achieved using a control system that includes both hardware and software, where hardware is the sensor used for real-time traffic density estimation and software is designed using captured data analysis of the city's current traffic flow. This paper depicts a model of camera-based traffic monitoring and processing system which reduces the cycle time and possesses special provisions for emergency vehicles.
Keywords: Traffic monitoring, Traffic congestion detection, Adaptive traffic control system, Intelligent Transportation System, OpenCV, Image Processing, Traffic Management System.
Abstract
ERP Software for College Management System with REST Web APIs
Danish Shaikh, Smita Chavan, Supriya Deshmukh, Shruti Karad
DOI: 10.17148/IJARCCE.2021.10341
Abstract: Online College Management System provides a simple interface for maintenance of student information as well as all the operations related to college. It can be used by educational institutes or colleges to maintain the records of any college operation. The creation and management of accurate, up-to-date information regarding a college academic career is critically important in the university as well as colleges. ERP System for College management system deals with all kind of student details, academic related reports, Promotional things, college details, course details, curriculum, batch details, placement details and other resource related details too. It will also have faculty details, batch execution details, students’ details in all aspects, the various academic notifications to the staff and students updated by the college administration. It also facilitate us explore all the activities happening in the college, Different reports and Queries can be generated based on various options related to students, batch, course, faculty, exams, semesters, certification and even for the entire college The placement officer is responsible for updating the placement related information like eligible criteria for a particular company, arriving date for the company which is coming for recruitment, the list of students who are eligible for attending the recruit.
Keywords: Enterprise Resource Planning, Python, Django, REST Framework, Application Programming Interface, Web APIs, MVC, JWT, MD5, College Management, LMS.
Abstract
"A Survey: Blockchain"
Vaibhavi Shukla
DOI: 10.17148/IJARCCE.2021.10342
Abstract: Blockchain- The Blockchain is alleged to be the technology of future. Despite the inherent ‘Block’ in it, the name has traversed additional miles than the other technical term within the recent past. it's reverberant in nearly all existing IT infrastructures; move a possible threat to the very existence of the present institutions.
Keywords: Blockchain, Applications, Ledger, Bitcoin
Abstract
Preventing Cyber Attacks: A Multi-Layered Approach
Swapnil B. Kolambakar, Dr. Praveen Kumar
DOI: 10.17148/IJARCCE.2021.10343
Abstract:
Cybersecurity threats have become increasingly prevalent in recent years, causing significant damage to businesses, individuals, and governments. As a result, preventing cyber attacks has become an important issue. This paper examines different ways to prevent cyber attacks and the importance of a multi-layered approach. It highlights the need for education, software updates, secure configurations, network segmentation, access controls, and incident response plans as key components of a comprehensive prevention strategy. This paper also discusses emerging technologies that can help in the fight against cybercrime, such as artificial intelligence and blockchain.