VOLUME 11, ISSUE 11, NOVEMBER 2022
Prediction of Poverty Rates with Nonlinear Autoregressive Neural Networks with External Input
Prima Dina Atika, Herlawati, Rahmadya Trias Handayanto
Sustainable Smart Cities and Associated Risks – A Review
Pawankumar Sharma
Practical Implementation of Artificial Intelligence in Cybersecurity – A Study
Saeed Fazal Ur Rehman
Significance of AI in Electrical Control Systems and Automation
Smrutirekha Panda, Mohammed. A. Mutallib, Bibhu Dash
Car Price Prediction using Machine Learning Algorithm
Prof.Bhapkar A.D, Jagtap Shivani, Deshmukh Prachi
Heart Disease Prediction Using Machine Learning
Prof.Waghmode P.S., Wayase Dhanashri, Kharat Dipali
Heart Disease Prediction Using Machine Learning
Prof.Waghmode P.S, Wayase Dhanashri , Kharat Dipali
Real Time Face Mask and Temperature Detection with Alert System
Prof.Shah S.N, Pawar Sanchita, Jagtap Sujata
SURVEY PAPER ON DEVELOPMENT OF TOUR GUIDE APP
Prof.Shah S.N, Shinde Avishkar, Lonkar Yash
Sun Tracking Solar Panel
Mr. Dileep J, V. Bharath Kumar, Charitha P L, Goalla Likhitha, Harshith Kumar K M
“Survey Paper on Flight Ticket Price Prediction Using Machine Learning”
Prof. Kokare S.A, Kamble Priya, Thorat Komal
“Survey Paper on COVID Vaccination Detection Using Aadhar QR Code”
Prof. Waghmode P.S, Jagtap Apeksha, Madane Sayali
DISEASE PREDICTION USING MACHINE LEARNING
Mithun.V.Mhatre , Ranjeet.R.Pawar
Hand Gesture Controller (Virtual Mouse) and Voice Assistant using OpenCV, ML, Python
Gangurde Shipranjali Kiran, Pallavi Somnath Avhad, RautShubham Shantaram, Sonawane Snehal Shashikant, Prof. Pratibha V.Waje
Emerging DSS Tools for RETs: A Case Study
Manoj Gupta, Anand Kumar Jain
“Survey Paper On Crop Recommendation System For Precision Agriculture In ML”
Prof .Shah S.N, Kharade Rohit,Kumbhar Omkar
Wireless solar EV charging station
PROF. Archana Ugale , Ms. Kawade Rutuja Babasaheb, Ms. Kotkar Mrudula Pravin, Ms. Padmane Sapana Bhagwat, Ms. Patil Shraddha Anandrao
ON ROAD VEHICLE BREAKDOWN ASSISTANCE
Prof. Shital S. Aher, Unhale vrushali Tribhuvan, Gade pranjal Balasaheb, Patil tulshidas devashri
E-PASSPORT SYSTEM USING RFID TAG AND FINGERPRINT SENSOR
DR. Pratibha V. Kashid , Ambekar Shrutika Ajay, Jagtap Harshli Vinod, Sangale Manisha Bhausaheb
Identity Management System Using Blockchain
Prof. Pratibha Kashid (Guide), Jadhav Akshada Kiran
IOT PRISION BREAK MONITORING AND ALTERING SYSTEM
Dhruvkumar Gujarathi, Gaurav Dimble, Shrikant Berad, Tarun Sawadatkar
Machine Learning Approach for Predicting Earthquakes in a Geographic Location
Sathwik GS, Vivek S Patil, Sanjay BR, Yatish J, Soham S
IMPACT OF PRADHAN MANTRI UJJWALA YOJANA (PMUY) SCHEME ON COMMUNITY SERVICE PARTICIPATION OF RURAL WOMEN
Dr. Mahananda Chandrakant Dalvi
A Machine Learning Model of Average Fuel Consumption in Heavy Vehicles
Aitha Supriya Mr. M. Kalidas
Traffic Sign Recognition
Smeeta Rajendra Zade, Vijay M. Rakhade, Ashish B. Deharkar
ASSESSING THE EFFECTS OF LOW INTENSITY TREADMILL WORKOUTS ON LIFE STRESS IN SEDENTARY STUDENTS
Dr. Sinku Kumar Singh, Ramakant D. Bansode, Dr. Abdul Waheed
A survey report on: Detecting A diseases of plants using machine learning
Prof. Shah S.N, Bhapkar Akash, Gaikwad Aditya
A Review On Using Android Application For a Modern Farming Techniques
Akash A. Howladar, Ashish B. Deharkar, Vijay M. Rakhade
Benefits and Issues of Health Monitoring System Based on the IoT
Muneshwar Gyaniram Neware, Ashish Baban Deharkar, Vijay M. Rakhade
PREDICTION OF ELECTRICITY POWER CONSUMPTION USING MACHINE LEARNING APPROACH
Thota Supriya, Ramesh Ponnala
Communication between Two Cloud Using Depsky and Program Data Processors System
Dharini Pachare, A. Deharkar
Avoiding Phishing Attack Using Visual Cryptography
Sasmit V. Nakhate, Ashish B. Deharkar, Vijay M. Rakhade
SWASTH *: AN INVERSE COOKING RECIPE GENERATION FROM FOOD IMAGES
Sriperambudur Divya , Dr. G. N. R. Prasad
AI to Predict Natural Disasters like Earthquakes using ESC Extraction and SVM
Sayantika Paul, Harshitha V Raj, Madhwesha R Moudgalya , Pramith L
Review On Security Issues And Challenges In Cloud Computing
Grishma S. Pise, Vijay M. Rakhade, Lowlesh N. Yadav
Artificial intelligence in cyber security
Arpita Mahadev Belekar, Lovelesh N.Yadav,Neehal B.Jiwane
Design of 30 GHz wide-band LNA for Next Generation Cellular Communication
Debasish Dash, Mrunal A. Marihal, Dr. H. V. Kumaraswamy
Cloud Security for Securing Data using Technology
Shraddha G. Pimpalkar, L.N. Yadav, N.B. Jiwane
Cyber Security Technology use for Protect latest Technology
Dipali V. Thakare, L.N. Yadav, N.B. Jiwane
A Future of Computer Assisted Education
Roshani Karale, Vijay. M. Rakhde, Ashish. B. Deharkar
BRB U-Net for Instance Segmentation of Cells in Microscopy
Aruna Kumari Kakumani, Dr. L. Padma Sree
A Review OnVirtualization in Cloud Computing
Ritika A. Bahel, Ashish B. Deharkar, Vijay M. Rakhade
Review On Challenges and Issues in Data Mining
Omkar K. Khadke, Lowlesh N. Yadav, Neehal B. Jiwane
MOVIE RECOMMENDATION EXPLOITATION MACHINE LEARNING
Vinit Rajesh Navghare, Neehal B. Jiwane, Lowlesh N. Yadav
Pronunciation Problems of English Language Learners in India
Aniket Babanrao Bele, Neehal B. Jiwane, Lowlesh N. Yadav
A research on use of Manet for Wireless device
Sapna Titre, Vijay.M. Rakhde, Ashish.B. Deharkar
A research on Digital image processing technology and application
Shweta Date, Vijay.M. Rakhde, Ashish.B. Deharkar
Payment Wallet With Fraud Detection
Prashant Surdas Mukke, Nihal B. Jiwane, Ashish B. Deharkar
SOCIAL MEDIA: IMPACT AND CHANGING COMMUNICATION PATTERNS
Rakshika A. Sakharkar, Vijay M. Rakhade, Lowlesh N. Yadav
Database Architecture and Management System
Monali Bhogekar, Neehal.B.Jiwane, Lovelesh.N.Yadav
A Review on E- Parking system for Smart Cities based on an IoT
Achal M. Talase, Lowlesh N. Yadav, Vijay M. Rakhade
Internet of Things (IOT): Future Application and research Challenges
Anuradha Tonge, Vijay.M.Rakhde, Ashish.B.Deharkar
Data Security Challenges and Industry Trends
Naresh Kumar Miryala, Divit Gupta
Leveraging Cloud Computing for Scalable and Efficient Artificial Intelligence in Healthcare Applications
Nitesh Upadhyaya
Engineering Intelligent and Secure CI/CD Pipelines for Cloud-Native Microservices: A Developer-Centric Approach to Resilience, Compliance, and Scalability
Kashyap Rajath Kalankari
Abstract
Prediction of Poverty Rates with Nonlinear Autoregressive Neural Networks with External Input
Prima Dina Atika, Herlawati, Rahmadya Trias Handayanto
DOI: 10.17148/IJARCCE.2022.111101
Abstract: The indicator of the success of a region's development is determined by the reduction in the poverty rate of its citizens. Based on these problems, a method is needed to determine the level of poverty in Indonesia, both in urban, rural and national areas, one of which is by using the prediction method. In this study, a Levenberg-Marquardt Neural Network model to predict the level of poverty in Bekasi Regency in the future is proposed, namely nonlinear autoregressive neural networks with external input (NARX). The poverty dataset used is sourced from the Central Statistics Agency (BPS) of Bekasi Regency with test data from 2012 to 2020. The test results show an error of 6.9% compared to the real poverty rate.
Keywords: Poverty Rates, Neural Networks, Bekasi, MATLAB, Levenberg-Marquardt.
Abstract
Sustainable Smart Cities and Associated Risks – A Review
Pawankumar Sharma
DOI: 10.17148/IJARCCE.2022.111102
Keywords: Smart technology, Smart City, Climate change, Artificial technology, Digitalized market
Abstract
Practical Implementation of Artificial Intelligence in Cybersecurity – A Study
Saeed Fazal Ur Rehman
DOI: 10.17148/IJARCCE.2022.111103
Keywords: AI, Cyber Security, Cylance, Dark trace, Web security
Abstract
Significance of AI in Electrical Control Systems and Automation
Smrutirekha Panda, Mohammed. A. Mutallib, Bibhu Dash
DOI: 10.17148/IJARCCE.2022.111104
Abstract: This article's primary purpose was to investigate the usage of artificial intelligence in electrical automation control systems (EACS). With the advancement of current science and technology, artificial intelligence technology has steadily impacted most elements of people's lives, notably in electrical and electronics automation control, with positive effects. Electronics and instrumentation tools and applications have much potential to perform better usingArtificial intelligence (AI) and its related applicability. AI advancements have transformed earlier modes of operation and infused new life into electrical automated control systems. The use of AI in electrical automation control signifies a paradigm shift from the traditional to the intelligent mode of operation, security, and innovation. Electrical automation control systems took many years to develop. Even if AI has a sophisticated technical framework, there is still much opportunity for improvement in these areas, which this article discusses in detail.
Keywords: Electrical automation control systems, AI, Technological adaptability, Automation, Fault detection, Cyberthreats
Abstract
Car Price Prediction using Machine Learning Algorithm
Prof.Bhapkar A.D, Jagtap Shivani, Deshmukh Prachi
DOI: 10.17148/IJARCCE.2022.111105
Abstract: A car price prediction has been a high-interest research area, as itrequires noticeable effort and knowledge of the field expert. Considerable numbers of distinct attributes are examined for the reliable and accurate prediction. To build a model for predicting the price of used cars in Bosnia and Herzegovina, we applied three machine learningtechniques (Artificial Neural Network, Support Vector Machine and Random Forest). However, the mentioned techniques were applied to work as an ensemble. The data used for the prediction was collected from the web portal autopijaca.ba using web scraper that was written in PHP programming language. Respective performances of different algorithms were then compared to find one that best suits the available data set. The final prediction model was integrated into Java application.
Keywords: Machine Learning, SVM Algorithm,Linear RegressionAlgorithm , Random forest regression,Decision Tree Regression, Jupiter, pycharm .
Abstract
Heart Disease Prediction Using Machine Learning
Prof.Waghmode P.S., Wayase Dhanashri, Kharat Dipali
DOI: 10.17148/IJARCCE.2022.111106
Abstract: In recent times, Heart Disease prediction is one of the most complicated tasks in medical field. In the modern era, approximately one person dies per minute due to heart disease. Data science plays acrucial role in processing huge amount of data in the field of healthcare. As heart disease prediction is a complex task, there is a need to automate the prediction process to avoid risks associated with it and alert the patient well in advance. This paper makes use of heart disease dataset available in UCI machine learning repository. The proposed work predicts the chances of Heart Disease and classifies patient's risk level by implementing different data mining techniques such as Naive Bayes , Decision Tree, Logistic Regression and Random Forest. Thus, this paper presents a comparative study by analysing the performance of different machine learning algorithms. The trial results verify that Random Forest algorithm has achieved the highest accuracy of 90.16% compared to other ML algorithms implemented.
Keywords: Machine Learning Decision Tree, Naive Bayes, Logistic Regression,Random Forest, Heart Disease Prediction.
Abstract
Heart Disease Prediction Using Machine Learning
Prof.Waghmode P.S, Wayase Dhanashri , Kharat Dipali
DOI: 10.17148/IJARCCE.2022.111107
Abstract: In recent times, Heart Disease prediction is one of the most complicated tasks in medical field. In the modern era, approximately one person dies per minute due to heart disease. Data science plays acrucial role in processing huge amount of data in the field of healthcare. As heart disease prediction is a complex task, there is a need to automate the prediction process to avoid risks associated with it and alert the patient well in advance. This paper makes use of heart disease dataset available in UCI machine learning repository. The proposed work predicts the chances of Heart Disease and classifies patient's risk level by implementing different data mining techniques such as Naive Bayes , Decision Tree, Logistic Regression and Random Forest. Thus, this paper presents a comparative study by analysing the performance of different machine learning algorithms. The trial results verify that Random Forest algorithm has achieved the highest accuracy of 90.16% compared to other ML algorithms implemented.
Keywords: Machine Learning Decision Tree, Naive Bayes, Logistic Regression,Random Forest, Heart Disease Prediction.
Abstract
Real Time Face Mask and Temperature Detection with Alert System
Prof.Shah S.N, Pawar Sanchita, Jagtap Sujata
DOI: 10.17148/IJARCCE.2022.111108
Abstract: Last years of COVID shows that mask-wearing is a important thing in stopping the COVID-19 spreading. By the time of this article, most states have recover from COVID pandemic but mask wearing is needed for personal safety of person. So, real-time face mask and temperature detection becomes an essential application to prevent the spread of the pandemic as well as other viral infection. This study will present a face mask and temperature detection system that can detect and monitor mask-wearing and temperature from camera and gives alert when the person is not wearing mask. Using SVM and CNN algorithm we can detect the person is wearing mask or not. Increasing number of cases all over the world, this system is replace humans to check masks on the faces of people is needed and also detection of temperature is needed. This system fulfil all those need. Our system can be used in public places like airport entry and railway station. This system is very useful in many companies where there are lot of peoples are worked .We have used basic concepts of convolutional neural network algorithm to state the mask wearing position .Results shows that our model performs well on the test data with 100 percent and 99 percent precision and recall, respectively. Our system will be python and machine learning based .Our system is very helpful there because it is worked on real time and gives output in seconds and will very easily find the people who are not wearing the mask or not and gives the temperature of person if he or she is wearing mask .If the person is not wore the mask the system gives alert message. This system saves the precious time of person because it is work on real time bases.
Keywords: Machine Learning, SVM Algorithm, CNN Algorithm ,python ,face mask detection, temperature detection ,alert system INTRODUCTION
Abstract
SURVEY PAPER ON DEVELOPMENT OF TOUR GUIDE APP
Prof.Shah S.N, Shinde Avishkar, Lonkar Yash
DOI: 10.17148/IJARCCE.2022.111109
Abstract: As technology is growing immensely in recent years, travel is one of the top three sectors are disrupted by technology. Travelling apps are taking center stage in the mobile app development. In today’s market, there are different apps with various functions. As an example, Google maps for maps and locations, another is trivago for hotels and so on. In this project we will build a tour guide app. This app will provide the information about tourist places and nearby place recommendations such as hotels, hospitals and also give brief information about the places. We will also sort the places into season wise and category wise, like hill stations, temples , forts etc. We are implementing all the functions of different apps in one app. Thus, the name tour guide app.
Keywords: Travel Guide, Android App, Interest wise, Season wise Hotel finder, Helpline.
Abstract
Sun Tracking Solar Panel
Mr. Dileep J, V. Bharath Kumar, Charitha P L, Goalla Likhitha, Harshith Kumar K M
DOI: 10.17148/IJARCCE.2022.111110
Abstract: Earth receives 84 Terawatts of power and world consume about 12 Terawatts of power per day. We are trying to consume more energy from the sun. Thus, the tracking of the sun’s location and positioning of the solar panel are important. The goal of this project is to design an automatic tracking system, which can find location / position of the sun. The tracking system will move the solar panel so that it is positioned perpendicular to the sun for maximum energy conversion at all time. Photo resistor will be used as sensors in this system. The system will consists of light sensing system, micro controller, gear motor system, and a solar panel. The Sun illuminates the earth every day by irradiating an enormous amount of energy of which a majority is lost or not utilized because of the unscientific placement of solar panels. Thus, tracking the location of the sun and the position of the panel is of huge importance in this project.
Keywords: Solar Panel, Tracking, Arduino, Sensor
Abstract
“Survey Paper on Flight Ticket Price Prediction Using Machine Learning”
Prof. Kokare S.A, Kamble Priya, Thorat Komal
DOI: 10.17148/IJARCCE.2022.111111
Abstract: Flight ticket price is the continuously changing data which varies every day. Depending on the various factors that affect it directly or indirectly. we cannot say that the price of flight ticket fare remains the same or not. It is quite a tough task to predict the flight ticket fare. It may change throughout the week, month or some days, but it can be predicted nearly accurate to the actual flight ticket price. We can say that todays flight ticket price which is different from tomorrows flight ticket price to solve this problem we can predict accurate flight ticket price for various airline with various cities.
Nowdays many of people not aware of buying flight ticket also many of people pay more amount for buying flight ticket.The flight ticket price are totally depends upon season like summer,winter and festival.So our system helps to predict flight ticket price before people buying flight ticket.
Keywords: Machine Learning, Random Forest Regressor, Jupyter, Pycharm, etc.
Abstract
“Survey Paper on COVID Vaccination Detection Using Aadhar QR Code”
Prof. Waghmode P.S, Jagtap Apeksha, Madane Sayali
DOI: 10.17148/IJARCCE.2022.111112
Abstract: Now these days, a QR code is applied in different application streams related to marketing, security, academics etc. Day by day more people are getting aware of this technology and use it accordingly. The popularity of QR code grows rapidly with the growth of smartphone users and thus the QR code is rapidly arriving at high levels of acceptance worldwide. Identification of objects and places in the real world is very important, and QR (2-D printing) code is useful to store identifiers of them. Any camera cell phone device capture function can read content from a barcode tag directly.
Keywords: Machine Learning, Reed Solomon Method, Quick response code(QR),Mobile application scanner, Smart phone.
Abstract
DISEASE PREDICTION USING MACHINE LEARNING
Mithun.V.Mhatre , Ranjeet.R.Pawar
DOI: 10.17148/IJARCCE.2022.111113
Abstract: We are designing a system called Disease Prediction using Machine Learning which is dedicated for medical sector. We see that there are many online diagnosis systems available but we can encounter one thing that this system has a search bar for searching the expertise on the basis of symptoms or diseases and guide to the user for nearby location of hospitals in the emergency situation. Many peoples are facing problems and challenges regarding disease and they are looking for online helps. If this type of system is made for recommendation system used by doctors’ medicines it will beneficial for real time use of system. Now coming to technical things for the prediction of disease we are used four different algorithms namely Decision Tree Classifier, Random Forest, K-Nearest Neighbor, Naive Bayes Classifier. All these algorithms are directly connected to tanning and testing dataset and GUI. Users of the system are layman so they are unable to use and understand this type of system so in future we are going to use some Human Interaction concepts in same project or system like local language can be added which is understandable by users of different regions. So as a software engineers we are developed a system called Disease Prediction using Machine Learning which takes five symptoms as an input and gives prediction of disease from which user is suffering. We are also tried to use feedback system in our application to improve system accuracy, currently all algorithms give up to 94% of accuracy. Keyword: Decision Tree Classifier, Random Forest, K-Nearest Neighbor, Naive Bayes Classifier
Abstract
Hand Gesture Controller (Virtual Mouse) and Voice Assistant using OpenCV, ML, Python
Gangurde Shipranjali Kiran, Pallavi Somnath Avhad, RautShubham Shantaram, Sonawane Snehal Shashikant, Prof. Pratibha V.Waje
DOI: 10.17148/IJARCCE.2022.111114
Abstract: The mouse is one of the useful hardware inventions of Human-Computer Interaction (HCI) technology. Currently, Bluetooth mouse or a wireless mouse these devices are used but the main disadvantage of these devices is it consumes a battery for power and it requires dongle/ adaptor to connect it to the PC. In the proposed Hand Gesture Controller (Virtual Mouse) and Voice Assistant using OpenCV, ML, Python. This limitations will be overcome by introducing webcam or a built-in camera for capturing of hand gestures and hand tip detection using computer vision. The algorithm used in the system makes use of the machine learning algorithm is Based on the hand gestures, the computer can be controlled virtually and can perform right click, left click, scroll-up, scroll-down and computer cursor function without any physical interaction. The algorithm is based on deep learning for detecting the hand gesture. Hence, the proposed system will avoid full physical interaction with voice assistant for controlling all computer functions. which is helpful for COVID-19 spread by eliminating the human intervention and dependency of devices to control the computer.
Keywords: Hand Gesture, Virtual, OpenCV, Machine Learning, MediaPipe, mouse cursor
Abstract
Emerging DSS Tools for RETs: A Case Study
Manoj Gupta, Anand Kumar Jain
DOI: 10.17148/IJARCCE.2022.111115
Abstract: This paper gives brief introduction of accessible Decision Support System/Software (DSS) tools to plan and develop initial report of small hydropower site (SHPs) for making decision to go further process useful in western Himalayan region. The software tools available for analysis, varies from simple estimation to dedicated special design software. The evaluation of latest SHP sites for planning and development may involve huge amount of total project cost. Multidimensional assessment at pre-feasibility stage might be administered by experienced and highly expertise during this field or professional’s for an equivalent. To the most effective of the author’s knowledge use of such DSS tools for feasibility analysis of RETs project in Indian scenario gives low cost, minimum time and effort estimation for higher cognitive process.
Keywords: RETs; SHP; Feasibility Study; Small Hydropower; Decision Support System.
Abstract
“Survey Paper On Crop Recommendation System For Precision Agriculture In ML”
Prof .Shah S.N, Kharade Rohit,Kumbhar Omkar
DOI: 10.17148/IJARCCE.2022.111116
Abstract: India is agricultural country in India there are many farmers. but still it has very less productivity. crop recommendation or prediction system used to predict suitable crop on the basis of input provided by user such as moisture, PH level, NPK values, Temperature, rainfall.to build model we use supervised ML algorithms such as Logistics regression, Random Forest, decision trees etc.
Keywords: Machine Learning, SVM Algorithm,Random Forest,Logistic Regression,Anaconda
Abstract
Wireless solar EV charging station
PROF. Archana Ugale , Ms. Kawade Rutuja Babasaheb, Ms. Kotkar Mrudula Pravin, Ms. Padmane Sapana Bhagwat, Ms. Patil Shraddha Anandrao
DOI: 10.17148/IJARCCE.2022.111117
Abstract: The industry is rapidly transforming from an IC engine vehicle to an electric vehicle. The demand for an electric vehicle is increasing, these lead to an increase in charging station as well. In this project, a wireless charging system is used to charge the vehicle wirelessly via inductive coupling.
We just simply need to park the car on the charging spot. The transmission of electrical energy from source to load from a distance without any conducting wire or cables is called Wireless Power Transmission. The system checks if the person has sufficient balance and then deduct the charging charges and update the balance. The Internet of Things describes the network of physical objects that uses sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems.
Keywords: : Electrical energy, IOT, Android app, Electric Vehicle (EV), Electric Vehicle Supply Equipment (EVSE)
Abstract
ON ROAD VEHICLE BREAKDOWN ASSISTANCE
Prof. Shital S. Aher, Unhale vrushali Tribhuvan, Gade pranjal Balasaheb, Patil tulshidas devashri
DOI: 10.17148/IJARCCE.2022.111118
Abstract: On Road Vehicle Breakdown Assistance is going to be a good solution for the people who seek help in the remote locations with mechanical issues of their vehicle. Users of the On Road Vehicle Breakdown Assistance will be the registered public and they will be getting connected with the particular mechanic through the trustworthy Assistance system. Because only the legally licensed and approved mechanics are enlisted in the On Road Vehicle Breakdown Assistance system. In an existing system there are users who have their own mechanic database which is very minimal. And also they have no idea if their vehicles are broke down or had any mechanical issue in remote locations or any long distant locations from their known mechanic shops. In an proposed Here the users of On Road Vehicle Breakdown Assistance system can search for list of mechanic at any location or the nearby locations which will help them in an unexpected situations raised by the mechanical issues of their vehicles.
Keywords: On road vehicle breakdown , Python , Django, HTML , CSS , Javascripts
Abstract
E-PASSPORT SYSTEM USING RFID TAG AND FINGERPRINT SENSOR
DR. Pratibha V. Kashid , Ambekar Shrutika Ajay, Jagtap Harshli Vinod, Sangale Manisha Bhausaheb
DOI: 10.17148/IJARCCE.2022.111119
Abstract: RFID is an acronym for Radio Frequency Identification. RFID is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying just about any material object. This project can be used for security purpose where it gives information about the authorized persons and unauthorized persons. The purpose is to limit the use of counterfeit documents. This, in turn, will prevent illegal entry of the travelers into any specific country at the same time maintaining the privacy and personal security of the e-passport bearers and track the person in which country. This proposed system uses Radio Frequency Identification (RFID) is a technology that uses wireless communication for identification purposes. The key characteristic that differentiates one RFID application from another is the purpose of identification.
Keywords: Automatic Identification and Data Capture (AIDC), Radio Frequency Identification (RFID), Security, E-passport
Abstract
Identity Management System Using Blockchain
Prof. Pratibha Kashid (Guide), Jadhav Akshada Kiran
DOI: 10.17148/IJARCCE.2022.111120
Abstract: Identity management solutions are generally designed to facilitate the management of digital identities and operations such as authentication, and have been widely used in real-world applications. In recent years, there have been attempts to introduce blockchain-based identity management solutions, which allow the user to take over control of his/her own identity (i.e. self-sovereign identity). In this paper, we provide an in-depth review of existing blockchain-based identity management papers a.
Keywords: Blockchain, digital identities, multi- factor authentication, cryptographic, Security.
Abstract
IOT PRISION BREAK MONITORING AND ALTERING SYSTEM
Dhruvkumar Gujarathi, Gaurav Dimble, Shrikant Berad, Tarun Sawadatkar
DOI: 10.17148/IJARCCE.2022.111121
Abstract: The prison system in India as everyone knows it is not as good as we see in the movies. It is quite shocking to know that in a digitally modern country like India, the prison system is quite orthodox. So in such an orthodox system, jailbreaks are a very common and usual thing. There is no such number, but prison escapes happen all the time, either on a large scale or on a smaller scale.
Keywords: Prison, Monitoring system, ARDUINO UNO, Microcontroller, Surveillance system.
Abstract
Machine Learning Approach for Predicting Earthquakes in a Geographic Location
Sathwik GS, Vivek S Patil, Sanjay BR, Yatish J, Soham S
DOI: 10.17148/IJARCCE.2022.111122
Abstract: An earthquake is a type of natural disaster that is well-known for the devastation it causes to both naturally existing and artificial structures, including buildings, bungalows, and residential areas, to name a few. Seismometers, which pick up vibrations caused by seismic waves moving through the earth's crust, are used to measure earthquakes. The damage caused by an earthquake was categorised in this work into damage ratings, which have values ranging from one to five. The damage grade of a certain structure, which is linked to a Unique Identification String, was predicted using a previously gathered data set and a number of criteria. An analysis of current machine learning classifier techniques was used to make the forecast. Logistic Regression, Support Vector Machine (SVM), Random Forest Classifier, and K-Nearest Neighbors were the machine learning techniques employed in this study. The best algorithm was taken into consideration after a review of a number of attributes. The method used to predict the property underwent a thorough investigation, and the data analysis that followed revealed information that could help future earthquakes' effects be lessened.
Keywords: Machine learning, Support Vector Machine (SVM), Random Forest Classifier, Logistic Regression, K Nearest Neighbors, and predictive analysis.
Abstract
IMPACT OF PRADHAN MANTRI UJJWALA YOJANA (PMUY) SCHEME ON COMMUNITY SERVICE PARTICIPATION OF RURAL WOMEN
Dr. Mahananda Chandrakant Dalvi
DOI: 10.17148/IJARCCE.2022.111124
Abstract: PMUY is the process of improving the quality of life and economic well-being of women living in rural areas. The aim of the scheme is to provide efficient cooking energy for the people living below BPL. The household survey was undertaken from the beneficiaries of PMUY . The data was collected through demographic information and interview schedule from women residing in the rural sector in Aurangabad district of Maharashtra. Descriptive statistics, Chi-square and Regression analysis (By using SPSS)was used for data processing. The aim of the 'Pradhan Mantri Ujjwala Yojana is to provide eight crore free cooking LPG connection to the people living under below poverty line. When women are living safe, fulfilled and productive life, they can reach their full potential, contributing their skills to the workforce and can raise happier and healthier children. The population of the research consists of the beneficiaries of Pradhan Mantri Ujjwala Yojana (PMUY) Scheme are living in Aurangabad District. Total 300 samples was the target population of the study. The dimension of Pradhan Mantri Ujjwala Yojana (PMUY) Scheme selected as Sustainability, Energy Affordability, Accessibility, Safety, environment-friendly and Health & hygiene. women empowerment variables selected as Increase in tourism activity, Swachh Bharat Abhiyan, Enhancement in girl education, Curtailment of money lenders and exploitation, Helping and motivating others at the time of need. The results of the study indicate that, the Sustainability was correlated with Increase in tourism activity (r = p<.05), Swachh Bharat Abhiyan , (r = p<.05) and Enhancement in girl education (r = p<.05).,Curtailment of money lenders and exploitation (r = p<.05) and Helping and motivating others at the time of need(r = . p<.05). Women empowerment through community service participation was not significantly associated with Pradhan Mantri Ujjwala Yojana (PMUY). Key Words: Increase in tourism activity, Swachh Bharat Abhiyan, Enhancement in girl education, Sustainability, Energy Affordability
Abstract
A Machine Learning Model of Average Fuel Consumption in Heavy Vehicles
Aitha Supriya Mr. M. Kalidas
DOI: 10.17148/IJARCCE.2022.111125
Abstract: In this paper we used vehicle travel distance rather than the traditional time period when developing individualized machine learning models for fuel consumption. This approach is used in conjunction with seven predictors derived from vehicle speed and road grade to produce a highly predictive neural network model for average fuel consumption in heavy vehicles. The proposed model can easily be developed and deployed for each individual vehicle in a fleet in order to optimize fuel consumption over the entire fleet. The predictors of the model are aggregated over fixed window sizes of distance travelled. Different window sizes are evaluated and the results show that a 1 km window is able to predict fuel consumption with a 0.91 coefficient of determination and mean absolute peak-to-peak percent error less than 4% for routes that include both city and highway duty cycle segment
Keywords: vehicle modeling, neural networks, average fuel consumption, data summarization, fleet management
Abstract
Traffic Sign Recognition
Smeeta Rajendra Zade, Vijay M. Rakhade, Ashish B. Deharkar
DOI: 10.17148/IJARCCE.2022.111126
Abstract: Traffic sign recognition is a technology by which a vehicle is able to recognize the traffic signs on the road. In this paper, we propose a novel traffic sign recognition that can operate robustly and accurately for real scenes of Korean roads. The proposed method first detects a potential traffic sign and then recognizes the content of the potential traffic sign. With this approach, the proposed method can robustly recognize small traffic signs from long distances and reduce false alarm significantly. We employ Histogram of Oriented Gradient (HOG) and Support Vector Machine (SVM) in a two-step model. Compared with the original HOG and SVM method using three Hyundai data sequences with ground truth, our proposed method outperforms significantly and operates robustly in different conditions. The source code and datasets are available online at https://github.com/comvisdinh/realtimetrafficsignrecognition.
Keywords: Traffic sign recognition, histogram of oriented gradients, support vector machine.
Abstract
REVIEW ON 5G WIRELESS TECHNOLOGY
Achal Thengane, V.M. Rakhade
DOI: 10.17148/IJARCCE.2022.111127
Abstract: 5G stands for fifth-generation wireless Technology. The latest iteration of cellular technology has three main features: greater speed, lower latency, and the ability to connect several devices simultaneously. 5G wireless network will aspect new contents, as well as growing claim on network capacity to support a lot more devices running applications necessitating high data rates and always-on connectivity; hugely and supportive of the emerging business models in the wireless network market demanding network to be more open. New challenges initiate new resolutions and involve changed plans in the network positioning, management, and operation of 5G wireless networks equated to those of current wireless networks. One of the key purposes of the 5G wireless network is to completely provide service- customized networks to a wide variety of services using integrated cloud reserve and wireless and wired network possession, which may be presented by several infrastructure providers and operates. The term 5G is used alternatingly with the worldwide wireless web (WWWW), which is a platform that enables us to connect to any kind of device, anytime and anywhere.
Keywords: 5G, Wireless, 5G Architecture, Evolution of 5G.
Abstract
ASSESSING THE EFFECTS OF LOW INTENSITY TREADMILL WORKOUTS ON LIFE STRESS IN SEDENTARY STUDENTS
Dr. Sinku Kumar Singh, Ramakant D. Bansode, Dr. Abdul Waheed
DOI: 10.17148/IJARCCE.2022.111129
Abstract: The primary aim of the study was to examining the effects of Low Intensity Treadmill Workouts on stress, only one group was targeted as an experimental group, there was no control group. The 15 male participated in the study and their age ranged between 19-28 years. The all students are sedentary and not participation any sporting or physical activities Exclusion criteria were the presence of any chronic disease such as CVD, Hypertension Hypotension, asthma, Diabetes, etc. that would put the subjects at risk when performing the experimental tests. Experimental group participated in Low Intensity Treadmill Workouts Training program which was conducted for four-week, four days in a week and 15 minutes in a day. After the pre-test was over, the entire selected subjects were exposed to four-week Treadmill Workouts. The findings of the study show that severe stress were reduce, The findings of the study will be proposing a new conceptual model that may assist the government in framing new policies and strategies to manage the stress problem
Keywords: Stress, Treadmill, Low Intensity
Abstract
A survey report on: Detecting A diseases of plants using machine learning
Prof. Shah S.N, Bhapkar Akash, Gaikwad Aditya
DOI: 10.17148/IJARCCE.2022.111130
Abstract: Plant disease detection is an Innovative and Enlightening System helping the users to know the disease, trainings or any interesting things taking place around their Area. This Organization aids the native community to keep themselves up to date about the events around their locality or zone or in their town. There are 2 things for this method to work; one for the image processing and another is machine learning.
Modern approaches such as machine learning and deep learning algorithm have been employed to increase the recognition rate and the accuracy of the results. Random forests are as a whole, learning method for classification, regression and other tasks that operate by constructing a forest of the decision trees during the training time. Unlike decision trees, Random forests overcome the disadvantage of over fitting of their training data set and it handles both numeric and categorical data.
The histogram of oriented gradients (HOG) is an element descriptor utilized as a part of PC vision and image processing for the sake of object detection. Here we are making utilization of three component descriptors:
Keywords: Machine Learning, Image processing, Random Forests, HOG, Object detection, Histogram graph
Abstract
Mentor System
Rafi P
DOI: 10.17148/IJARCCE.2022.111131
Abstract: The student mentoring system is introduced in the College. All the Teachers are involved in the process of mentoring. Every mentor is allotted with about 10 students to take care of them depending upon the department and semester. Every mentor has a list of all the students allotted to him / her with details of Name, register number, roll number, semester. The mentor has a chalked-out responsibilities to take care of all the mentees such as to provide them career counselling, to provide them personal counselling to support them for any kind of difficulty in their curriculum and in their personal life, to make provision of remedial coaching for them and to always support them as and when required. Mentor system also provide a listener for mentee to speak up their problems. The mentor also works for finding out hidden talent of the students in various aspects of academic, co – curricular, extra – curricular and extra mural activities so that they can be promoted to do various activities in the concerned area for their holistic development. The mentor also contacts and meets the parents of his / her mentees to discuss their progress and / or any other matter, as and when required.
Keywords: React.js, Firebase,Html,Css.
Abstract
CAMPUS ACTIVITY: AN EFECTIVE MANAGEMENT SYSTEM
Rafi P
DOI: 10.17148/IJARCCE.2022.111132
Abstract: The purpose of this project is to provide a web application for the colleges. The intended user of the application are college students, college staff. Now a days the student and the staff in college faces so many problem related to the Campus Activities such as Manage Arts, Sports, Library activities. The web application solves all these problems related to the college activities. This web application satisfy all the information to the college students. This project also include services for college staff such as staff directory. Once the app is deployed the only requirement is data updating.
Keywords: Software, College
Abstract
A Review On Using Android Application For a Modern Farming Techniques
Akash A. Howladar, Ashish B. Deharkar, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2022.111133
Abstract: Today mobile devices are used often by everybody, as well as the farmers and country folks. per observations of knowledge and Information Communication Technologies (ICT) mobile plays very important role in everyday life of farmers. The farmers, WHO were smitten by clouds for rain, currently are wanting into the Cloud Computing (CC) for his or her solutions towards cultivation of superior crops in today’s trendy agricultural world. The normal ways utilized by the farmers, peculiarly in Asian nation, are terribly slow and undependable.
The big quantity of crop is obtaining harm within the field because of the microorganism attacks and lack of knowledge resources. Annually, such loss exceeds four-hundredth in total. So, the paper conferred here recommend numerous ways that during which a farmer will utilize Mobile Computing(MC) on their handsets victimization application referred to as “Kissan”, to help them for comparatively higher cultivation and merchandise. the most awareness of this work is concentrated on Indian farmers because it addresses the key issues of obtaining the market updates of various product, weather updates and knowledge concerning the rain and additionally provides multiple language support. this may effectively facilitate farmers to sell their product in international market and earn exceptional profit.
Hence, this framework uses MHz, that in impact, puts power into a farmer’s hand. The experimental setup uses tools like humanoid SDK. during this analysis Associate in Nursing humanoid primarily based mobile devices are used for testing.
Keywords: Information and Communication Technologies, Humanoid SDK, Cloud Computing, Kissan.
Abstract
Battery Saver in Android Studio
Kiran Donge, V.M. Rakhade
DOI: 10.17148/IJARCCE.2022.111134
Abstract: Now a day 75 % of people or even more than that use Android Operating System in the world. Android Operating System has groundbreaking features like Mobile Hotspots, Calling, Texting, Gaming, WIFI, Bluetooth, etc in such small devices that fit in the palm. In between these revolutionary features, we are going to talk about the main feature which is its battery. Because of Battery, it is portable meaning, it can be carried anywhere and it doesn’t need to be connected continuously to an electric socket like desktops, TVs, etc while using it. But still, it needs to be charged at least once a day. Android Operating System uses a lot of resources which in turn reduces the battery charge too quickly. To tackle this situation much research has been done to optimize the Battery quality of android devices but with a limited supply of energy, the battery can’t withstand android applications for a long-time. There are various ways to enhance power management. One of them is a battery saver application. This application can help the user to reduce power consumption slightly.
Keywords: Smartphone Android Operating System, Battery Saver.
Abstract
Benefits and Issues of Health Monitoring System Based on the IoT
Muneshwar Gyaniram Neware, Ashish Baban Deharkar, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2022.111135
Abstract: A world wherever everything is online and act to alternative things and folks to boost peoples lives likself driving drones and sensors for observation your health is conjointly referred to as the web of things (IoT). IoT devices are very useful in Hospitals. In most of the time using the IoT for Healthcare we replace part of the visit to the physician with an online consultation moreover some medical test can be performed remotely either, right at the patients home. In this paper author focus on Review of issue and benefits of HMS (Human Monitoring System) based on IoT smart devices can track health conditions IoT applications for health care can send a emergency signal if the patient has an asthma attack, heart failure or another medical issue.
Keywords: IoT, Sensor, folks, Human Monitoring System, driving drones.
Abstract
PREDICTION OF ELECTRICITY POWER CONSUMPTION USING MACHINE LEARNING APPROACH
Thota Supriya, Ramesh Ponnala
DOI: 10.17148/IJARCCE.2022.111136
Abstract: discipline about computer architecture has long researched electricity consumption in great detail. While energy acquisition as a machine learning metric is starting to gain traction, majority about experiments are still primarily focused on achieving extremely high levels about accuracy among no computational constraints. We think that one about reasons for this lack about interest is because people don't easily have access to information on energy consumption. major goal about this research is to evaluate helpful regulations for machine learning community, enabling them to use & develop energy estimation techniques for machine learning algorithms. LSTM, linear regression, random forest regression, & other ensemble models are used to forecast electricity & produce precise results. We also provide two use cases that support investigation about energy exhaustion in machine learning, as well as most recent software tools that provide electricity estimating methods. through using updated smart metres that allow everyone to see who is consuming more energy in what appliances, we are able to accurately estimate future energy that will be very useful to grid in determining when we will need more & less energy.
Keywords: Machine Learning, Lstm.
Abstract
Communication between Two Cloud Using Depsky and Program Data Processors System
Dharini Pachare, A. Deharkar
DOI: 10.17148/IJARCCE.2022.111137
Abstract: In todayÂ’s life cloud, computing plays important role for the computing environment for reducing the cost of the computational cost and resources cost of the computing methods such as to storing the data and using the computing resources. It enables the use of the inter cloud communication for accessing the various information or data from different cloud. Inter cloud or multi cloud is term related to cloud of cloud, which provides the huge amount of data within the same cloud by adding the different cloud within single cloud. This method provides the service availability, storage of data and services within the same unit. Which provide the security to the whole data within the cloud by using the third-party auditing method, which requires applying the encryption key on data only one time, which can reduce the attacks on the cloud data? This paper also introduces the new method of multi cloud storage technique to store the data on the different small cloud within the system, which allows reducing the redundancy of data within the cloud. Key Terms: Cloud Computing, Cloud Services, DepSky
Abstract
Avoiding Phishing Attack Using Visual Cryptography
Sasmit V. Nakhate, Ashish B. Deharkar, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2022.111138
Abstract: Phishing is one amongst the foremost common social engineering attacks that users over the web fall for. Associate degree example is balloting systems, and since such systems ought to be correct and error free, phishing interference techniques square measure crucial. Visual Cryptography (VC) is employed for economical electoral system authentication to solid votes. VC is one amongst the foremost secure approaches for privacy protection because it ensures the confidentiality of the electoral system. This paper discusses planned phishing interference strategies and compares totally different proposed strategies.
Keywords: Remote Voting System (RVS), Voting System (VS), Shares Ballots, Commons Attribution International Authentication, Visual Cryptography, Phishing, Captcha.
Abstract
SWASTH *: AN INVERSE COOKING RECIPE GENERATION FROM FOOD IMAGES
Sriperambudur Divya , Dr. G. N. R. Prasad
DOI: 10.17148/IJARCCE.2022.111139
Abstract: The three important for every one of us is food, cloth and house. We give the first priority to food. At the same in this fast generation making a food by spending so many hours in the kitchen is a tough task. People are using various food delivery apps like Zomoto, Swiggy, Uber eats and many to get their food. Many restaurants have started takeaways courts to parcel the food items. Behind of every meal there is a procedure involved in making of it. How to the know the process behind of it. The basic of aim of this paper is to provide a solution to the query. We are introducing an inverse cooking system named it as “Swasth”. This system recreates cooking recipes for the given food image. This system provides the ingredients used and then also gives the cooking instructions. Our system uses a unique architecture to forecast ingredients as sets, modelling their relationships without enforcing any order, and then creates cooking directions while concurrently paying attention to the image and its predicted components. We thoroughly test the system on the massive Recipe 1 million dataset and demonstrate that we are able to obtain high quality recipes by utilising both image and ingredients. We also demonstrate that the system is able to produce more compelling recipes than retrieval-based approaches in terms of human judgement.
Keywords: Inverse cooking, CNN, Deep learning, Machine learning.
Abstract
AI to Predict Natural Disasters like Earthquakes using ESC Extraction and SVM
Sayantika Paul, Harshitha V Raj, Madhwesha R Moudgalya , Pramith L
DOI: 10.17148/IJARCCE.2022.111140
Abstract: Due to its capability of weather-independent imaging and sensitivity to target scattering and geometric properties, Polarimetric Synthetic Aperture Radar (PolSAR) offers crucial support for the built-up areas (BA) information analysis. However, labelled BA samples with unique orientations are hard to come by, and PolSAR BA with wide orientation angles is frequently mistaken for vegetation. Additionally, the trained models and labelled BA samples hardly ever perform well in the cross-domain BA analysis of PolSAR data. This article describes a PolSAR BA extraction method that combines subspace alignment with eigenvalue statistical components (ESC) and PU-Learning (PUL) to achieve cross-domain BA extraction (SA). Building orientation effects and the roll invariance of the eigenvalues of the coherency matrix are examined first. Regional statistical information is then obtained by using the Wishart-Eigen value unsupervised classification.[1-2] In our previous paper titled “Machine Learning Approach for Predicting Earthquakes in a Geographic Location” Machine Learning Approach was used with lower accuracy. In this paper key methods of pre-processing were used to increase the accuracy of SVM.
Keywords: Machine learning, eigenvalue, Polarimetric Synthetic Aperture Radar (PolSAR), PU-Learning (PUL), and eigenvalue statistical components (ESC).
Abstract
Review On Security Issues And Challenges In Cloud Computing
Grishma S. Pise, Vijay M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2022.111141
Abstract: Cloud computing services enabled through data communication technology delivered to a client as services over the net on a hired basis have the potential to increase up or down their service necessities or desires. during this model, the infrastructure is in hand by a 3rd party merchant and therefore the cloud computing services square measure delivered to the requested customers. Cloud computing model has several blessings together with measurability, flexibility, elasticity, efficiency, and supports outsourcing non-core activities of a company. Cloud computing offers Associate in Nursing innovative business conception for organizations to adopt IT enabled services while not advance investment. This model allows convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing may be quickly provisioned and discharged with negligible management effort or service supplier interaction. despite the fact that organizations get several advantages of cloud computing services, several organizations square measure slow in acceptive cloud computing service model due to security issues and challenges related to management of this technology. Security, being the main problems that hinder the expansion of cloud computing service model thanks to the availability of handling confidential information by the third party is risky specified the shoppers got to be a lot of attentive in understanding the risks of knowledge breaches during this new setting. during this paper, we've mentioned the protection problems, the challenges and therefore the opportunities within the adoption and management of cloud computing services model in a company.
Keywords: Cloud Computing, Cloud Security Issues, Cloud Deployment model, Cloud Computing Services.
Abstract
Artificial intelligence in cyber security
Arpita Mahadev Belekar, Lovelesh N.Yadav,Neehal B.Jiwane
DOI: 10.17148/IJARCCE.2022.111142
Abstract: the velocity of procedures and additionly the quantity of expertise to be utilized in protective the cyber vicinity can’t be handled by way of people at the same time as now not large automation.but,its miles tough to expand software device with fashionable set up algorithms(hard stressed common sense on figuring out stage)for successfully protective in opposition to the dynamically evolving attacks in networks.this case may be treated by using applying strategies of computing that provide flexibility and gaining knowledge of capability to software program device.this papers offers a quick survey of computing packages in cyber safety,and analyses the potentialities of enhancing the cyber safety competencies by using shows that accelerating the intelligence of the safety structures.once measuring the papers available regarding Al application in cyber protection,we will conclude that helpful application exist already.they belong;intial of all,to application of artificial neural nets in perimeter security and some alternative cyber security areas. From the opposite side-it has most effective strategies of AI are getting used,as an example,wide statistics utilization is critical in identifying,and clever name aid is one of however unresolved problems in cyber security.
Keywords: Cyber security techniques,artificial intelligence,visual network,expert systems.
Abstract
Design of 30 GHz wide-band LNA for Next Generation Cellular Communication
Debasish Dash, Mrunal A. Marihal, Dr. H. V. Kumaraswamy
DOI: 10.17148/IJARCCE.2022.111143
Abstract: In this paper, a low noise amplifier is designed at 30GHz for millimeter wave applications. The LNA is designed using BSIM4 transistor in complementary metal oxide semiconductor (CMOS) technology. The bandwidth ranges from 28GHz to 30GHz. the LNA design has two stages. A common source topology is designed at both stages which provide highly stable characteristics with high gain and low NF. In the first stage, noise and input matching is improved by using a degenerative inductor. The second stage is designed to achieve flat gain response over a wide bandwidth. The highest gain achieved by the LNA is 39.129dB at 30 GHz. The noise figure is less than 1.1dB over the entire bandwidth. 1 volt of supply voltage has been given. Advanced Design System (ADS) software is used for design of LNA and simulation of results.
Keywords: Advanced Design System, CMOS, Degenerative Inductor, Fifth Generation, Gain, LNA, 30GHz.
Abstract
Cloud Security for Securing Data using Technology
Shraddha G. Pimpalkar, L.N. Yadav, N.B. Jiwane
DOI: 10.17148/IJARCCE.2022.111144
Abstract: Security is one of the main issues hindering the growth of cloud The idea of handing off important data to another company worries me. Consumers should therefore be vigilant to understand the risks of data breaches in this new environment. This white paper provides an in-depth analysis of cloud computing security issues and challenges, focusing on types of cloud computing and types of service offerings. Cloud computing is a set of IT services provided to customers over a network on leased bases, allowing the service requirements to be scaled up or down. Cloud computing services are typically provided by a third party that owns the infrastructure. Notable benefits include scalability, resilience, flexibility, efficiency, and outsourcing of non-core activities. Cloud computing offers organizations an innovative business model for adopting IT services with no upfront investment. Despite the potential benefits to be gained from cloud computing, security issues and related challenges have delayed the adoption of cloud computing by organizations. Keyword: Cloud Security, Community, Data Portability, Hybrid
Abstract
Cyber Security Technology use for Protect latest Technology
Dipali V. Thakare, L.N. Yadav, N.B. Jiwane
DOI: 10.17148/IJARCCE.2022.111145
Abstract: In today's world driven by technology and connectivity, it's important to understand what cybersecurity is and be able to use it effectively. Systems, important files, data and other important virtual things are at risk if there is no security to protect them. need to do it Attackers are keeping up with the development of new technologies in cybersecurity. They use better and improved hacking techniques and target vulnerabilities in many companies.Cybersecurity is critical as military cops, government Department, financial Sectors, Hospitals, and organizations col-lect, practice, and store unprecedented amounts of data on PCs and other devices. A significant portion of this data may be sensitive information, such as financial data, intellectual property, personal information, or various other types of data, and unlawful access.
Keywords: Cloud,Cyber Security, Artificial Intelligence, Ramsomware
Abstract
A Future of Computer Assisted Education
Roshani Karale, Vijay. M. Rakhde, Ashish. B. Deharkar
DOI: 10.17148/IJARCCE.2022.111146
Abstract: The cause of this evaluation paper is to discover and study boundlessly about computer-assisted schooling, and its impact on college students and their educational success. Laptop-assisted mastering offers lecturers with diverse coaching statistics and multimedia platforms for easy gaining knowledge of college students. It translates the innovation of computer-assisted education and its fulfilment in today’s generation. Computer-aided schooling indicates the integrated approach of the laptop and its gadgets. although, it does no longer imply on-line gaining knowledge of will subsequently replace traditional education and teachers, instead instructors the usage of computer-primarily based platforms, and their applications to teaching, like smart training, motion pictures, and web tutoring with stepped forward resources and reduced trainer workloads. By which, students can arrive, grasp, and have interaction themselves at their very own pace in a co-relational environment. Furthermore, within the state of affairs of a deadly disease like this, we all are deciding on laptop-assisted education. Consequently, without pc facilitated training these days, it'd were merely impossible for us to observe, and obtain schooling. The sector has widely opened and regular the brand new era of pc-assisted schooling. This paper is completed to differentiate the success of pc-assisted schooling.
Keywords: Computer Assisted Education, Computer Facilitated Education, Multimedia platforms
Abstract
BRB U-Net for Instance Segmentation of Cells in Microscopy
Aruna Kumari Kakumani, Dr. L. Padma Sree
DOI: 10.17148/IJARCCE.2022.111147
Abstract: Biological cell analysis like cell segmentation, cell classification, cell tracking etc. aid in quantitative analysis of cells which is useful for cellular level knowledge of biological activity. Microscopy imaging allows for the generation of cell images and are used for cell studies in computational biology research and clinical disease diagnosis. In this article we explore instance segmentation of DIC-C2DH-HeLa cells in microscopy images. Specifically, a deep learning model Bottleneck residual blocks U-Net (BRB U-Net) is utilized for the task of separating individual cell instances from the background. This method achieved a Dice Index of 88% for DIC-C2DH-HeLa cells.
Keywords: Instance segmentation, Deep Learning, Microscopy, Marker controlled Watershed algorithm.
Abstract
A Review OnVirtualization in Cloud Computing
Ritika A. Bahel, Ashish B. Deharkar, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2022.111148
Abstract: Virtualization refers to the act of one thing as well as virtual laptop makes a unreal image of the storage space devices servers or network resources in order that they'll be used on multiple machines at a similar time. With the latest growth in cloud computing technologies, security of the info becomes necessary. it's Associate in Nursing modify technology allowing the look of Associate in Nursing intelligent abstraction layer that hides the density of underlying computer code or hardware virtualization technology that may build things easier operations yet as enable data Technology organizations to react quicker to dynamical business demands. It permits multiple virtual computers to run on prime of 1 physical computer and to share the hardware resources, like printers, scanners, and modems.
This will increase the economical use of {the laptop\the pc} by low prices since only 1 physical computer is required and running. Cloud computing technology is one of the biggest milestones in leading United States to next generation technology and winning up business and data Technology field. It helps to rise higher than the matter for the loss of information, accessing knowledge whenever needed and knowledge security. This technology is especially service familiarised and focuses on reduction in low value, hardware reduction and pay just for service conception.
Keywords: Virtualization, Cloud Computing, VM, Data security.
Abstract
Review On Challenges and Issues in Data Mining
Omkar K. Khadke, Lowlesh N. Yadav, Neehal B. Jiwane
DOI: 10.17148/IJARCCE.2022.111149
Abstract: Data Mining data and data from high databases has been recognized by several researchers as a key analysis topic in machine learning and info system and in several industrial corporations as a crucial space with a chance of major revenues .we gift a two-dimensional read of information mining. the foremost dimensions area unit data, knowledge, technologies and application. Researchers in some totally different fields have shown their nice interest in data mining. during this section, we tend to in brief define methodology, user interaction. data processing analysis has powerfully impact society and can still do thus within the future.
Keywords: Data Mining, Machine Learning, Data Mining Issues.
Abstract
MOVIE RECOMMENDATION EXPLOITATION MACHINE LEARNING
Vinit Rajesh Navghare, Neehal B. Jiwane, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2022.111150
Abstract: In the times, wherever technology is at the forefront of each business, there has been AN overload of information and knowledge. Thus, a recommendation system comes in handy to manage this massive volume of knowledge and separate out the helpful info that is quick and relevant to the user’s alternative. This paper describes AN approach to a moving picture suggestion system victimization circular function Similarity to recommend similar movies supported by the one chosen by the user. though the present recommendation systems get the work done, it doesn't justify if the moving picture is value defrayment time on. to reinforce the user expertise, this method performs sentiment analysis on the reviews of the moving picture chosen victimization machine learning. 2 of the supervised machine learning algorithms Naïve Bayes (NB) Classifier and Support Vector Machine (SVM) Classifier are accustomed increase the accuracy an deficiency. This paper conjointly offers a comparison between NB and SVM on the premise of parameters like Accuracy, Precision, Recall, and F1 Score. The accuracy score of SVM came dead set be ninety-eight.63% whereas the accuracy score of NB is 97.33%. Thus, SVM outweighs NB and proves to be a stronger-suited Sentiment Analysis.
Keywords: Trigonometric function, similarity picture recommendation, NaĂŻve mathematician, Sentiment analysis , Support vector machine.
Abstract
Pronunciation Problems of English Language Learners in India
Aniket Babanrao Bele, Neehal B. Jiwane, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2022.111151
Abstract: India is a land of culture and there are many languages like Sanskrit and Hindi, which have been spoken in India for a decade. But in today's world English becomes the universal language it is mandatory for everyone to learn English to communicate with the rest of the people in the world because each country has its own language to speak to overcome this problem it is required to learn fluent English. In India, most people speak in their local language and when the situation came to talking in English they feel shy and do pronunciation mistakes. This article explains the problems faced by learners while pronouncing English words.
Keywords: Pronunciation, spelling, foreign language, official language, mother tongue.
Abstract
A research on use of Manet for Wireless device
Sapna Titre, Vijay.M. Rakhde, Ashish.B. Deharkar
DOI: 10.17148/IJARCCE.2022.111152
Abstract: With the fast improvement of wireless gadgets a MANET got here into existence. A MANET which is also referred to as cellular advert hoc network which connect cellular gadgets wirelessly. it is a self-organizing community which does now not have any framework. consequently it's far self-governing device. each device in MANET is loose to transport in any direction dynamically so that it will proportion information between devices or nodes of network. MANET has no any administrator node which is chargeable for controlling different nodes, each and each node of MANET is behave as router and host itself and shape their own network. diverse routing protocol is chargeable for routing in MANET. This paper introduces, routing protocol, benefits, problems, programs, traits of MANET.
Keywords: hoc network, characteristics, challenges, applications.
Abstract
A research on Digital image processing technology and application
Shweta Date, Vijay.M. Rakhde, Ashish.B. Deharkar
DOI: 10.17148/IJARCCE.2022.111153
Abstract: Computer virtual photo generation is a completely crucial department of the pc software discipline, and its software regions consist of measurement, pc-aided design, physics, three-d simulation and different industries. Moreover, with the development of pc hardware performance, photo processing algorithms have progressed the software of virtual photo processing generation. This article makes a speciality of the contemporary virtual photo processing generation and its software status.
Keywords: Digital Image Processing Technology ,Application
Abstract
Payment Wallet With Fraud Detection
Prashant Surdas Mukke, Nihal B. Jiwane, Ashish B. Deharkar
DOI: 10.17148/IJARCCE.2022.111154
Abstract: Payment wallet has many significant features like anytime transfers, mobile transfers, and secure and convenient transfer of money. It can also be considered a bank for those who do not have an approach to banks and do the banking activity like sending and receiving money. Digital wallets are gaining momentum in the Indian market due to increasing technology penetration and acceptance of new developments by customers. E-Wallet payments can be made anywhere including receiving money, storing, and sending. The situation everything actually careful banks then telecom companies toward proposal investment facilities to their subscribers. The use of e-wallets helps in moving away from a cash base economy. In the process, all the transactions get accounted for in the economy, which has the effect of reducing the size of the parallel economy It is an online platform that lets an operator save money popularly, fair similar to a set account. Operator requirements toward typing a description with a portable file provider. This can be used in many different sectors of businesses, Shops, and Malls. It will also capitalize on the scope of India’s education market segments.
Keywords: E-Wallet, Payment, Transaction, Fraud Detection.
Abstract
SOCIAL MEDIA: IMPACT AND CHANGING COMMUNICATION PATTERNS
Rakshika A. Sakharkar, Vijay M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2022.111155
Abstract: Given the pace, at which we are encountering new media as a democratic means of communication, the prospect of NICs being the most indispensable part of our lives is not far away. From this perspective, the paper attempts to study the changing communication patterns of the 21st-century tech-savvy generation. It has been claimed that new media has brought sea changes in intrapersonal, interpersonal, group, and mass communication processes and content. Once upon a time, traditional media was setting the agenda of public discourse observing forward to new media for breaking news. In the absence of a proper content regulatory authority, new media is diminishing the gatekeeping function in media, making it more participatory yet less authentic in content. In the virtual world, youth is existing a virtual life rather than proper life. The paper explores how new media is redefining social roles that are more vulnerable to dissolution as interpersonal communication is scheduled on public platforms. In the crowd of hundreds and thousands of friends on social media, youths find themselves alienated from the real world. The author concludes that in the age of announcement, a new kind of social order is being developed, establishing public and mass communication but weakening interpersonal communication. The next part of the thing is dedicated to the clarification of the elementary ideas of social media studies, emphasizing such concepts as new media, new new media. And The paper will observe how the use of social media has presented uncertainty in channels of communication and its influence on organizations. The paper will also discourse the implications of the occurrence of social media and discourse on the properties it has had on the excellence of organizational communication management.
Keywords: Reasons of social media is effective, communication levels, communication studies, Communication Management.
Abstract
Database Architecture and Management System
Monali Bhogekar, Neehal.B.Jiwane, Lovelesh.N.Yadav
DOI: 10.17148/IJARCCE.2022.111156
Abstract: one of the essential challenges for the IT agencies nowadays is the way to manipulate huge growing volumes of statistics and how to produce a fine pushed software program product ensuring most efficient utilization of resources with minimal fee. The database management system is a software machine
i.e. a hard and fast of applications that provides its customers with procedures for defining, building, manipulating and sharing databases among the users and programs. A cloud records base management machine is a database control system for control of cloud information and provides shipping of computing as services instead of as product. on this paper we have proposed an architecture for management of facts in cloud termed as “Cloud Database management gadget architecture”. The cloud database management gadget presents an method for management of cloud information. The cloud statistics are unfold over the net and are stored to a remote server controlled by means of a 3rd birthday celebration. as a result, the cloud records control is a primary issue which needs to be catered to. A properly-described architecture is consequently required to control the cloud records, to be had at a far flung vicinity. In this work an architectural model for cloud database control machine has been evolved .This structure is based at the 3 schema structure for facts base management gadget and three degree object orientated database management system architecture.
Keywords: Three schema architecture, cloud device architecture, green computing, 3degree object oriented
Abstract
A Review on E- Parking system for Smart Cities based on an IoT
Achal M. Talase, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2022.111157
Abstract: The increasing range of vehicles on the road on with the direction of accessible car parking zone results in the parking connected issues yet as inflated holdup in urban areas. therefore, it's extremely needed to develop an automatic smart parking management system that will facilitate the motive force to find out some appropriate car parking zone for his/her vehicle very quickly. idea enough aggregate of survey struggle on the development of sensible parking system exist in literature, but most of them haven't addressed the matter of period detection of incorrect locating and impulsive bundle of parking amount. In this paper, an example of internet-of-thing based mostly E-parking system is planned. The planned E-parking system uses AN integrated element known as timer to handle the abovementioned issues yet on give sensible parking management throughout the town.
Keywords: Smart parking system(sps), parking iot, parking meter (PM), internet-of-thing (IOT), E-parking.
Abstract
Internet of Things (IOT): Future Application and research Challenges
Anuradha Tonge, Vijay.M.Rakhde, Ashish.B.Deharkar
DOI: 10.17148/IJARCCE.2022.111158
Abstract
Study of Web Crawling Approaches
Dr. Kompal
DOI: 10.17148/IJARCCE.2022.111159
Abstract
Data Security Challenges and Industry Trends
Naresh Kumar Miryala, Divit Gupta
DOI: 10.17148/IJARCCE.2022.111160
Abstract:
In an era where data stands as the lifeblood of the digital landscape, safeguarding its integrity, confidentiality, and availability has become a paramount concern. This paper delves into the multifaceted realm of "Data Security Challenges and Industry Trends," examining the pressing issues faced by organizations in an environment marked by relentless technological advancement and evolving threat landscapes. The introductory segment establishes the critical importance of data security in the face of escalating volumes and values of digital information. As the paper progresses, it navigates through the labyrinth of rising data security challenges [1], dissecting issues such as data breaches, insider threats, and the growing specter of ransomware attacks. Exploration extends to the pivotal role of encryption in securing sensitive data, alongside discussions on privacy concerns and the influence of regulatory landscapes on data security practices [2]. The intricate dynamics of securing data in cloud environments and the challenges posed by the expansive Internet of Things (IoT) ecosystem are scrutinized, accompanied by insights into emerging trends and best practices. The regulatory landscape, with a focus on data protection regulations such as GDPR and CCPA, forms a crucial aspect of the analysis. The paper further delves into the synergies between artificial intelligence (AI) and machine learning (ML) in fortifying data security measures, considering both the advantages and ethical considerations associated with these technologies. Amidst these challenges, the exploration pivots to proactive measures, emphasizing the role of cyber threat intelligence and the formulation of best practices to fortify organizational data security postures. Real-world case studies illuminate successful approaches, offering tangible examples and lessons learned. The paper concludes by peering into the future, examining the emerging trends that promise to shape the landscape of data security. The dynamic interplay between technologies like blockchain, zero-trust security, and quantum computing is forecasted, offering a glimpse into the evolving strategies required to combat the ever-changing data security landscape. This exploration encapsulates the complexities and nuances of data security challenges while unraveling the trends that will define the future of safeguarding digital assets. As organizations navigate this intricate landscape, the imperative is not only to fortify defenses against known threats but also to anticipate and adapt to the unforeseen challenges that lie ahead.Keywords:
Data Breaches, Insider Threats, Privacy Concerns, Incident Response Security Best Practices, Hybrid and Multi-Cloud Security. Cite: Naresh Kumar Miryala, Divit Gupta,"Data Security Challenges and Industry Trends", IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, vol. 11, no. 11, pp. 300-309, 2022, Crossref https://doi.org/10.17148/IJARCCE.2022.111160.Abstract
Predictive maintenance in manufacturing using AI
Sneha .M
DOI: 10.17148/IJARCCE.2022.111161
Abstract:
Predictive maintenance (PdM) represents a proactive approach to equipment maintenance in manufacturing, leveraging artificial intelligence (AI) to predict and prevent potential failures before they occur. This paper examines the application of AI techniques such as machine learning and data analytics in predictive maintenance strategies within manufacturing industries. By analyzing historical data and real-time sensor information, AI algorithms forecast equipment health, anticipate maintenance needs, and optimize operational efficiency. This approach aims to minimize downtime, reduce maintenance costs, and enhance overall equipment reliability, thereby improving production continuity and competitiveness in the manufacturing sector.Keywords:
Predictive maintenance, manufacturing, artificial intelligence, machine learning, equipment reliabilityAbstract
Leveraging Cloud Computing for Scalable and Efficient Artificial Intelligence in Healthcare Applications
Nitesh Upadhyaya
DOI: 10.17148/IJARCCE.2022.111162
Abstract: The convergence of cloud computing and artificial intelligence (AI) is driving a paradigm shift in healthcare, offering scalable, efficient, and innovative solutions to some of the industry's most pressing challenges. By leveraging the vast computational power and storage capabilities of cloud platforms, AI applications in healthcare are now able to process large volumes of data in real-time, delivering actionable insights for diagnostics, predictive analytics, and personalized medicine. This integration has the potential to significantly improve patient outcomes by enabling early detection of diseases, optimizing treatment plans, and enhancing operational efficiency within healthcare systems.
This paper delves into the diverse applications of cloud-based AI, from analyzing medical imaging to enabling real-time patient monitoring. It also examines the inherent challenges of this synergy, including data security and privacy concerns, regulatory compliance with standards like HIPAA and GDPR, and latency issues in time-critical applications. Supported by data visualizations, case studies, and comparative analyses, this study provides a comprehensive overview of the current state of cloud-AI adoption in healthcare. Finally, the paper highlights emerging technologies such as edge computing, blockchain, and advanced encryption protocols as potential solutions to address these challenges. Recommendations are provided for optimizing cloud-AI implementations to achieve transformative impacts, ensuring a secure, efficient, and patient-centric approach to modern healthcare.
Keywords: Cloud Computing, Artificial Intelligence, Healthcare, Scalability, Predictive Analytics, Data Security, Compliance.
Abstract
Engineering Intelligent and Secure CI/CD Pipelines for Cloud-Native Microservices: A Developer-Centric Approach to Resilience, Compliance, and Scalability
Kashyap Rajath Kalankari
DOI: 10.17148/IJARCCE.2022.111163
Abstract: The evolution of software delivery in cloud-native ecosystems has elevated continuous integration and continuous deployment (CI/CD) from a developer convenience to an operational necessity. This research presents a comprehensive, secure, and scalable CI/CD framework tailored for deploying RESTful microservices in multi-cloud environments. Moving beyond traditional automation, the study embeds DevSecOps principles, dynamic rollback mechanisms, security compliance enforcement, and intelligent testing strategies into the pipeline. It also introduces observability tooling, secrets management, and resilience-enhancing deployment techniques such as blue-green deployments and canary releases. Through a developer-centric lens, this paper outlines how integrated pipelines can address regulatory constraints, resource optimization, and rapid feedback cycles while maintaining service integrity. The resulting framework not only accelerates delivery velocity but also enhances system reliability, compliance traceability, and operational agility—laying the groundwork for next-generation DevOps excellence.
Keywords: CI/CD Automation, DevSecOps Integration, Multi-Cloud CI/CD, Infrastructure as Code, Rollback and Resilience
