VOLUME 12, ISSUE 5, MAY 2023
Perception-Based Geographical Analysis of Cybercrime: Assessing Vulnerability of Women, Child and Senior Citizens in Palam Colony, NCT Delhi
HeenaKumar, Garima Chauhan and Dr.Shweta Rani
NUTRITION ANALYSIS USING MACHINE LEARNING TECHNIQUES
Ms. V. Lavanya, R. Karthick, S. Karan Kumar, M. Vincent Leo Vimal
Detecting Phishing Attacks Using Natural Language Processing And Machine Learning
Padmanaban A, Rakesh M, Santhosh S, Maheswari M
VARIOUS TECHNOLOGIES USED FOR IDENTIFYING POTHOLE ON ROADS
MANJULA K, SANJAYKUMAR M
Prediction Of Cardiovascular Disease and Their Causes Using Machine Learning Techniques
Ms. V. Lavanya, M. Mathew, F. Patrick, J. Mukesh kumar
Driver Profile and Driving Pattern Recognition for Road Safety Assessment: Main Challenges and Future Directions
Chandana R A, Ravikiran R
Real Time Secure Clickbait and Biometric ATM User Authentication and Multiple Bank Transaction System
Mr. Jimson.L, Vishwa S, Rayner Raj A, Vimal Marccus R
DUAL - SERVER PUBLIC-KEY AUTHENTICATED ENCRYTION WITH KEYWORD SEARCH
Mr. M. NAGARASAN, M.E., GAYATHRI.R, ALAGENDRAN.K, MARIMUTHU.P, PUSHPARAJ.S
ADVANCEMENT IN PHOTONICS FOR SPACE COMMUNICATION
DR. BHASKAR S, ANUSHA S
Web Phishing Detection Based on Web Crawling and Backend Signature
M. Mohamed Afthaf, A. Stalin Sacratees, A. Sandiyo Christan
DEVELOPING LEARNING TOOL FOR ELECTRICAL AND ELECTRONIC COMPONENT USING AUGMENTED REALITY
B. Magesh, J. Bilson, Chundru Naveen Kumar, Mrs. L. Jenitha Mary
IDENTIFICATION OF BIOTIC STRESS IN RICE CROPS USING CONVOLUTIONAL NEURAL NETWORK
MR. M KUMERESAN, M.E, MAYILRAJ S, DHILIPAN R, DINESH S, THANGABALU G
An Experimental study in Fibre reinforced concrete by using glass and steel fibre for sustainable construction
Mahaveer P Jain, Shreedhara, Raghu A R, Anuj Shetty, Suraj M Shet
THIN FILM TECHNOLOGIES FOR IMPROVING THE EFFICIENCY OF SOLAR CELLS
SHREYAS REDDY D, PROF. MOHAN BABU C
CLASSIFYING THE FINGERS TO RECOGNISE THE HAND GESTURES BY USING THE OPEN-SOURCE COMPUTER VISION
Balakrishnan M, Chandru R, Dinakar Jose S ,Jancy Sickury Daisy S
Non-invasive Glucometer
Chethan G, Abhijeet K, Hemanth V, Varun H J, Dr. D J Ravi
BLOCKCHAIN INSPIRED RFID BASED INFORMATION ARCHITECTURE FOR THE FOOD SUPPLY CHAIN
D.R. ANGEL KIRUBA, ANGEL PRINCY A, JEVITHA R, MADIHA ZEHRA K
AN IOT-ENABLED FLOOD INTENSITY PREDICTION VIA ENSEMBLE MACHINE CODE MODEL
Dr. P.D.R. Vijaya Kumar M.E., Ph.D, Megathi .M, G.Akila M.E, Yuvasri . D, Anand Kumar .S,Selva Mari Ganesh .R
MACHINE LEARNING BASED TRAVEL RECOMMENDATION WEB APPLICATION
Thaseen Bhashith, Sneha H M, Suraj K R, Teju B N, Siddesh S
TECHNOLOGIES FOR CONVERSION OF PLASTIC WASTE INTO FUEL
Manjula K, Sahana N
Data Analysis and Modelling of Body Sensor Network in Healthcare Application
Ravi M V, Rakshitha R
FETAL HEALTH CLASSIFICATION USING MACHINE LEARING
Ms. Swarna Lakshmi, Abinaya S, Eswari S , Keerthana B
TERAHERTZ IMAGING AND SENSING FOR HEALTHCARE
Dr. Nagendra Kumar M, Chinmayi N Naidu
The Role of College Placement Portals in Enhancing Graduates' Employment
Ankita Surendra Singh, Yashi Narayan, Prathamesh Vishnu Chavan , Mohd Areeb Husain Ansari
Design and Development of Mechatronic Emergency Ventilator for Treating Breathing Ailments
Hemanth R K, Sudir P, Ganesh K, Deepika B
College Recommendation System for Engineering Students
Miss. Neha P. Sharma, Miss. Shraddha P. Bornare, Miss. Akshada S. Satalkar, Prof. Ramesh P. Daund
An Software-Defined Radio Based Satellite Gateway For Internet Of Remote Things (IoRT) Applications
Manjunatha Siddappa, Mythri G R
TECHNOLOGY FOR WEARABLE DEVICES FOR THE DETECTION OF COVID-19
Dr. Nagendra Kumar M, Ganapriya B M
ORGANIC LIGHT EMITTING DIODES USED IN BIOMEDICAL FIELD
Indu R C, Prasanna Kumar D C
THE 3D HOLOGRAPHIC PROJECTION TECHNOLOGY BASED ON THREE-DIMENSIONAL COMPUTER GRAPHICS
Veena S, Snayani M
PERSONAL SAFETY DEVICE WITH FAKE CRIME ANALYSIS USING IOT AND MACHINE LEARNING
Mrs. Ganavi M, Aliya Naz, Ayesha Siddiqa, Mehroosh Zama, Mizba Noorain
Solar Energy-based Mobile Charger Using Inductive Coupling Transmission
Akshitha M S, Kalaiah J B
Predictive Analytics for Predicting Customer Behavior
Anusha A, Kalaiah J B
Drainage Overflow Detection And Control During Flood
Abhishek Shetty, Basavaraj B Y, Ashwini Bhaskar Kotary, Vikas Jain, Dr. Jayaprakash M C, Dr. Srikrishna Shastri C, Mr. Rajesh N. Kamath
RICE QUALITY ANALYSIS BASED ON PHYSICAL ATTRIBUTES USING IMAGE PROCESSING
Mrs. THASEEN BHASHITH, G C CHANDAN, ABHAY S GAD, FAISAL S, ZAID KHAN
DETECTING STRESS IN PATIENTS WITH COMMUNICABLE DISEASES USING A DEEP LEARNING
Dr.P.D.R. Vijayakumar N, M.E., Ph.D., Sowmiya.L, M.E., C. Prathap, D. Revathi, R. Manjushamol, K. Sampeterjose
DENIAL OF SERVICE DETECTION OF DISTRIBUTED ATTACKS IN SDN USING MACHINE LEARNING
DIVYA.M, RAKESH.P, KARTHIKEYAN.K, SHAMSUNDAR.R, Dr. N. KOTTISWARAN, M.E., Ph.D, Dr. P.D.R VIJAYAKUMAR, M.E.,Ph.D., Mrs.P . GOKILA, M.E., Mr.K. MADESWARAN, M.E
Credit Card Fraud Detection Framework for E-Commerce Sites
Mrs.Shakila, E. Praveen kumar, R. Pavithran, E. Priyadharshan
AI CONTENT GENERATOR USING GPT 4
G Yuvaraj, D Milan breuno, M Yabeshraj
SKIN LESION DETECTION FROM DERMOSCOPIC IMAGES USING CASCADED ENSEMBLING OF CNN
Anil Kumar R, Sneha N V
TECHNOLOGIES FOR GESTURE BASED TOUCHLESS INTERACTION WITH LARGE DISPLAY
Savitha M M, Gagana N V
High Speed Inter-Satellite Optical Communication
Dr. C Rangaswamy, Gireeshma A S
EXTRUSION, INKJET AND LASER ASSISTED BIOPRINTING
ANIL KUMAR R, PREETHI D M
Handwritten Digit Recognition Using Deep Learning
Swetha P, Vidya A, Muthupriya J, Maheswari M
COUNTERFIET DETECTION IN NATIONAL IDENTITY CARDS USING IMAGE STEGANOGRAPHY
Mounica.R, Nikitta Joshie.J, Sahaya Rani.A, Geetha.G
BLUETOOTH EMBEDDED ROBOTIC WITH AGRICULTURE SEEDING AND GRASS CUTTING POWERED BY SOLAR ENENGY
Prof. Ravi Kiran R, Bindu A R, Chandana R A, Darshan S R
A Method to Achieve Data Security Using RSA Algorithm and Fingerprint
Ganavi M, Suhas S A, Chandan Singh, Karthik V R, Sahana C
SMART DUSTBIN USING IoT
Nandish M, Anusha B V, Pooja M R, Rithu S M, Sumathi P
NON-INVASIVE BRAIN STIMULATION-ENHANCING TECHNIQUES
Prof. Ravi M V, Raksha A
DIABETIC RETINOPATHY DETECTION USING VGG-NIN A DEEP LEARNING
DEEPAKRAJ.M, DHIVYA.PV, SATHYASEELAN.M, SHABARI.M, Dr. N . KOTTISWARAN, M.E., Ph.D, Dr. P. D. R VIJAYAKUMAR, M.E., Ph. D, Mrs. P. GOKILA, M.E, Mrs. A. SARANYA, M.E
Network Filtering Using Different Technologies
Prof. Ravi M V, Sai Vennela K S
Background Radiation Surveillance Using An Autonomous UAV
Dr. Sonali Ridhorkar, Ayush Singh, Shreeyash Pandey, Anshul Nagrare
DEVELOPMENT OF IOT BASED SMALL COMPACT ENERGY METER
Anil Kumar R, Sahana A
Driver Driving Performance Analysis And Risk Detection Using Deep Learning
Mrs.G.Geetha, J.Navin, P.Sanjeevi, M.Surya Sivaraj
Landmine Detection Using Impluse Ground Penetrating Radar
Veena S, Shruthi K G
SENSORS DRIVEN AI-BASED AGRICULTURE RECOMMENDATION MODEL FOR ASSESSING LAND SUITABILITY
Dr. Nagendra Kumar M, Darshan k Gowda
Intelligent Alarm System for Driver Drowsiness Detection
Gunasundari B, Gaddam Bhargavi, Elluru Rishitha, Kalluri Lakshmi prasanna
Hand Sign Detection System for Deaf and Dumb People
Dinesh Suresh Bhadane, Riddhi Mukkawar, Srushti Bhasme, Shreya Thakur
DETECTION OF ALIVE HUMAN IN DISASTER SUSCEPTIBLE AREAS USING RENESAS BASED ROBOT
Asharani M, K Sreekanth Reddy, Tejas Gowda S M, Karthik H S
PHOTO CHAIN A BLOCKCHAIN BASED SECURE PHOTO SHARING FRAMEWORK FOR CROSS-SOCIAL NETWORK
Mr.A.Anist, M.Prajith, M.Raymond Raj, L.Sathiya Prakash
IOT BASED SMART ELECTRIC VEHICLE WIRELESS CHARGING WITH REAL TIME LOCATION TRACKING
Lakshith K L, Manjunath Badiger, Naveen H V, Prasanna Kumar D C
IDENTIFYING THE OBJECT AND OBSTACLE DETECTION FOR BLIND PEOPLES
Sneha S, Vijayalaxmi S, Maheswari M, Dr. Roselin Mary S
i-Speculum:Touch Based Smart Mirror
Dinu PD, Harshita Pengoria, Kunal J B, Mandara M, Mr Hiriyanna G S
3D MULTIMODEL BRAIN TUMER IMAGE CLASSIFICATION AND SEGMENTATION USING DEEP LEARNING
Mrs.P.Gokila, M.E, Mrs.P.Sundari, M.E, Aathifa Nusrath.S, Aishwarya.J, Gowtham.S, Manoj.M
A TECHINQUE TO IMPLEMENT A ROBOT FOR SCRAP COLLECTION
Prof.Anil Kumar R, SHIVA A R
TECHNOLOGIES FOR MONITORING TRAJECTORY OF BALL
Prof. Anitha C, Babitha M
KIDNEY STONE DETECTION USING MATLAB
Kratika Verma, Siddharth Yadav, Er. Vivek Yadav
A Survey on Pothole and Hump detection system using IOT
Prashanth M V, Hemanth R, Inchara N P, Niharaika R, Harshith B
Automatic Kidney Lesion Detection using Deep Learning - A Survey
Prof. Neeti Shukla, Pavan C, Prajwal C K, Rakshith N U, Rethick Shinde S
PROPULSION TECHNOLOGY FOR JET PACK SUITS
Sri Ramu D S, Sri Hari Prasad HS
Tool for Management of Human And Robot using Medical ChatBot
Sai prathyush. S, Maheswari M
Realtime Wireless Embedded Electronics for Soldier Security
Akshitha M.S, A.Hemanth Kumar, Anusha.A, Prof.Kalaiah J B
A Review of Determination and analysis of arthritis using digital image processing
Dr. K S Shivakumar, Akhila R G, Anjali J, B Pavitra, C Tejeswini
BRAIN TUMOUR PREICION USING MOBILE NET-DEEP LEARNING AND SEGMENTATION CNN ALGORITHM
Chandini.R, Monika.D, Amsavalli.k, Maheswari.M
Novel and Secure Blockchain Framework for Health Applications
Veena S, Prakruthi MS
WEED DETECTION USING IMAGE PROCESSING AND MACHINE LEARNING
Veena S, Srushti N
Human Identification Based on Freestyle Activities
Balaji M, Logeshkumar D, Dr Roselin Mary S
Hand Cricket Game Using CNN Squeeze Network
M.Krishna Raj, N.A.Abinesh, G.Bhuvanesh, S.Bhuvaneswaran
GLAUCOMA DETECTION IN RETINAL IMAGE
P. Roopa Ranjani, M.Jahnavi, K.Mahimasri, S.Sneha
PREDICTION OF AIR POLLUTION USING SUPERVISED MACHINE LEARNING TECHNIQUES
Mrs.Shakila, Anitha A, Devada Geetha Madhuri C, Harini S
TECHNOLOGIES USED FOR DESALINATION OF SEAWATER INTO DRINKABLE WATER
Manjula K, Lokesh C
ULTRA HIGH PERFORMANCE INLINE CONTACT RF MEMS SWITCH
MADHUKARA S, LAVANYA L
TRAFFIC LIGHT MANAGEMENT SYSTEM USING OPENCV
Riya Saxena, Poonam Yadav, Abhitanshu Pratap Singh Raghav, Sahil Agarwal, and Mr. Mahendra Singh
Software Defined Radio Platforms for Wireless Technologies
Chandana G, Savitha M M
SMART AGRICULTURE BASED ON WIRELESS SENSOR NETWORKS
Dr. Nagendra Kumar M, Suprith S
IoT-based Crop Monitoring and Decision Support System for Precision Farming
Narendra U P, Akshatha, Chaithra Shettigar, Deepthi R Shetty, Shreya G, Vijay G H
A SMART MOTION DETECTION SURVEILLANCE ROVER WITH NIGHT PATROLLING FOR SAFETY AND MONITORING PURPOSES
Dr. Nagendra Kumar M, Chinmayi N, Chiranth M A, Ganapriya B M
Soft,Wearable Robotics and Haptics
Ganesh k, Dr.Sudir P, Deepika B
TECHNOLOGIES FOR REAL TIME VISION OFCOVID 19 TRACKING
PROF. MOHANBABU C, Shabeena R
DETECTION OF ADULTERATION IN FRUITS USING MACHINE LEARNING
Bellapukonda Sudarshan, Bhavya S D, Dr. S. Bhargavi, Bhavyashree N
Predictive Analysis of Credit Card Assessment System
Mr. M Krishnaraj, Adithyan L, Dhanush R
Bitcoin Price Prediction Via Machine Learning
Rutuja Kamble, Shraddha Fulsaundar, Mrunal Nimbalkar, Poonam Sonawane
DETECTION OF RICE BLAST DISEASE USING PATTERN RECOGNITION MODEL
Mrs P. Sheela Rani, P. Dhileepan
IMAGE GENERATION WITH STABLE DIFFUSION AI
Sasirajan M, Guhan S, Mary Reni, Maheswari M, Roselin Mary S
ULTRA-WIDEBAND (UWB) WIRELESS TECHNOLOGY FOR APPLICATION
VISHALA I L, MOHAMMED UMAR
DISEASE DETECTION IN FRUITS USING IMAGE PROCESSING
Dr. C Rangaswamy, Machireddy Gari Gunasekhar Reddy
IMPLEMENTATION OF THE ETHEREUM ALGORITHM TO MONITOR THE E-VOTING SYSTEM AND DATA STORAGE USING BLOCKCHAIN
Revathi TP, Sindhu M, Sivaranjani E
Real-time machine learning for big data approach to early identification of heart disease
MOHANBABU.C, AMBIKA B
DARK-NET ECOSYSTEM CYBER THREAT INTELLIGENCE (CTI) TOOL
Abhishek , Prof. Shreehari H S
A personalized adaptive cruise control system based on driving style recognition and model predictive control
ANIL KUMAR R, SUJAY N S
Geo-based Technical professional hiring system for repairing and maintenance services
Aniket Ajay Thorat, Sakshi Uttamrao Pansare, Smital Dileep Barage, Swapnil Shelake
A Secure User Authentication Scheme For Enabled Iot Devices
Karthiga G , Kaviya S, Lavanya V
A Vulnerability Assessment In Web Application
Abinesh R , Adithyan U, Gowtham K and Mrs.J.Shakila
Brain Tumor Detection
Rishav Walde, Aditya More, Janveer Singh, Bhushan Shelke, Prof. Madhavi Patil
Livenessnet with Hardware Interface for higher Security
Dr. Anil Kumar D, Amulya C S, Harshitha R , Vinutha P, Sujay N
A survey on EEG signal processing techniques
Manjunatha Siddappa, Keerthi H S
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, PALM PRINT, AND FACE RECOGNITION USING DWT TECHNIQUE
Anandharaman T, Chandralekha P, Dr. Roselin Mary S
A Flask based web application to predict death in women due to Breast Cancer
Supriya Pathuri, Shiva Priya.D, Dr. S.Roselin Mary
E-Commerce Laptop Store
Niraj Pardeshi , Kunal Patekar , Shreyas Chaudhari , Talha Shaikh
MULTIMODAL DEPRESSION DETECTION FROM FACIAL LANDMARK FEATURES USING LSTM MODEL
D.SYLVIA SHARON, J ANGEL OZNI , S. SOMALAKSHMI
Email Spam Detection Using Machine Learning Algorithms
ANGEL FELCIYA I , ESAKKI DEVI S, MAHESWARI.M, DR. ROSELIN MARY S
LIVER DISORDER DIAGNOSIS USING MACHINE LEARNING - A COMPARATIVE STUDY
Anusuya.R, Dr. S. Roselin Mary, Ph.D
DETECTION OF DDoS ATTACKS ON 5G SLICING USING DEEP LEARNING
Bharath B P, Srivani E N, Bharath S
Detecting Humans in Search and Rescue Operations Based on Ensemble Learning
Vishnu Rangan K, Yugendran S, Surendar R, Mrs. M. Maheswari
An Electronic Voting System Using FingerPrint Authentication
Mr. Abhijeet Chavanke, Miss. Pritika Somase, Miss. Jayshri Avhad, Miss. Pranjali Salve, Prof. A.S. Dalvi
An Internet of Things (IoT) Application for Predicting the Quantity of Future Heart Attack Patients
Shijin Jose (71917755D), Lokhande Rahul Pandurang (72170264D), Kandekar Narendra Bhimraj (72032816M), Gore Abhishek Vilas (72170258K)
SMART VOTING SYSTEM USING FACE RECOGNITION AND OTP
Arun Siva Ranjith S, Vignesh G, Maran R, Maheswari M, Dr. Roselin Mary S
DDoS ATTACK PREVENTION FOR IoT DEVICES
Manjunath N R, Naveen Kumar R, S Karpaga Murthy, Sacheth K, Prof. Lavanya M C
TECHNOLOGIES FOR HYDROGEN AS AN ALTERANATIVE FUEL FOR USEFULL APPLICATIONS
VISHALA I L, SANJAY B
Detection and Classification of Various Diseases in Arecanut Plantation Using Artificial Intelligence and Machine Learning
Abhilash N Shetty, Gurupavan k, Charan Shetty T V, Ketan Maruthi Prabhu, Prof. Kirankumar M V
E-Voting System Using Blockchain Technology
Yadav Aniket Bhaskar (72170286E), Samruddhi Sanjay Kharat (72170261K), Pratibha Vijay Patil (72170273C), Vaishnavi Suresh Changle (72170252L)
IOT based Anti-Poaching Alarm System for Trees in Forest
Meghana C V, Harshitha P R, Karthik Kumar Reddy.T. A, Pottipati Rakesh, Chandini A G
Convolutional Neural Networks based Fire Detection in Surveillance Videos
Yash Raval, Pratiksha Patil, Hrithik Raj, Swalpesh Kotalwar, Prof. Rupali Waghmode
WATER TESTING AND TREATMENT USING IOT
SHWETHA V, PAVAN U, SREEKANTH V S, ARSHITHA G
AUTOMATIC PET FOOD DISPENSER USING DIGITAL IMAGE PROCESSING
Prof Dr Hemanth Kumar B M, Bharath Kumar S M, Bhavana N M, Gowtham G S, Meghana Gowri G
Predicting The Price Of A Flight Ticket With The Use Of Machine Learning Algorithms
Pravar Umesh Ved (72170275K), Abhishek Anant Waghmare (72170284J), Nikita Navnath Thorat (72170285G)
By Using Machine Learning Algorithms we can predict and classify the diabetes mellitus
K. Harsha vardhan, Mohd Maaz muntajib , S. Sai Kiran, Dr. G. Shyama Chandra Prasad
Realizing an ultrasonic motor speed control system based on an H-bridge
Mahesh S , Prof.Vishala IL
Wireless Smart Notice Board
Manoj V M ,M Tharun , Naveen S N ,Dr.Bhaskar S
F.R.A.M.S Face Recognition Attendance Management System
Qamar Zaid Mohammed, Priyanka Gorakh Dhamane
Credit Card Fraud Detection Using Machine Learning
Dr. Kiran, Sanchitha L Anand, Samudyata S, Raju Poovarsha, Soujanya G V
CYBER SECURITY AND ITS EMERGING TREND ON THE LATEST TECHNOLOGIES
Parmeshwar R. Kumare, Lowlesh N. Yadav, Vijay M. Rakhade
Academic Assets
Krunal Kapse, Sidhhant Ramteke, Ruchir Bhandarkar, Sohel Danish, Prathamesh Pandare, Surendra Gawai
Advancements in EEG electrode technology
Manjunatha Siddappa, Pavithra S
MENTAL HEALTH TRACKER RESEARCH PAPER
Dr. (Mrs.) Snehal Bhujade, Rajashree Chilbule , Aniket Shambharkar , Abhishek Kotangale, Lekanksh Gaikwad, Pratik Sahare
Smart Medbox Using IoT
Dr. Ramananda Mallya K, Gagandeep D Achar, Saadhan Ballal, Shreya, Yogeesh M
Biomimetic ROV for Underwater Survey
S Jeevan Sai Reddy, S Banu Prakash Reddy, Suchit C S, Hithesh K Naik, Dr. Kiran Kumar M V
NETWORK BORDER PATROL
Dr A B Rajendra, Sunil B, Sinchana S, Ritesh Kumar, Harshitha B S
A Novel Approach to Cervical Spine Fracture Detection: Improving Diagnosis and Treatment
Madhuri B.H, Mamatha S, Manasa R, G. Punya, Bhavya B.G
REAL-TIME NOISE AND AIR QUALITY MONITORING SYSTEM AT VVCE
Mr. Alfred Vivek DâSouza, Ms. Payal R Cavan, Ms. Namitha G B, Ms. Moksha S, Ms. Hemapriya M B, Mr. Antony Anush C
Survey Paper on Sign Language Recognition
FIZAN MOHAMMED SHAREEF, LAVANYA, SOURABH SHETTY, VANSHIKA S HEGDE, Dr.SREEJA RAJESH
SIGNAL PROCESSING TECHNIQUES FOR BETTER PERFORMANCE IN SSVEP FOR BCI
Manjula k, Mithun reddy putluri
ENHANCED IoT CONNECTIVITY: TRIPLE TIER CLUSTER BASED ROUTING IN MOBILE WIRELESS SENSOR NETWORK.
SREEKANTH V S, SHWETHA V
Solar Powered Agribot and Surveillance System
Nawman Baig, Shahid Sayed, Mohammed Gouse, Shaqeen M, Rajeshwari
IoT Based Hybrid Battery Charging and Monitoring System for Electric Vehicles
A Amardeep M Kini, Nikhil K Bhat, Sweekrithi Shetty, Yakshitha Ramesh Kunder, Sandeep Seetharam Naik, Manjunath H
Token Generation Through Cashless Transaction With RFID
T Shreekumar, Chigurupati Gnanendra Babu, Sushmitha, Swathi S, Shreyas M
RAGI YIELD PREDICTION BASED ON MACHINE LEARNING USING XGB REGRESSOR ALGORITHM
Manjunatha sidappa, Madhushree R, Keerthi H S, M Sai Harshitha
Convolutional Neural Networks for Diabetic Retinopathy Detection
Karthik Raj S L, Sahana R, Sahana S, Simran G, Akash Anil Kumar
GESTURE CONTROLLED DRONE
Devang Mehta, Vasundhara Jituri, Vedamurthy, Assistant professor
DARPAN* (Virtual Trail Room)
PROF. MOHANBABU C, Ramyashree BR, Shabeena R, Shilpashree T
âSMART AQUARIUM USING IOTâ
Akshitha M, Bindu Rani A.P, Pavan S, Praveen H.S, Rashmi M. Hullamani
ORALSCREEN-ORAL CANCER DETECTION USING DEEP LEARNING
Prof Ashwini D S, Amithashree H R, Charan M, Venkatesh R S
3D AUTHENTICATION SYSTEM USING RUBIKâS CUBE
Mr. Narendra Kumar S, Anirudh G E, Basavesh S P, Divish Raj O, Kunal S Jain
DRIVER DROWSINESS DETECTION AND ACCIDENT PREVENTION
Prasanna Reddy PV, Shiva AR, Sujay NS, Prof. ANIL KUMAR R
Stock Market Prediction Using Machine Learing Algorithm
Sourabh Khade, Pratik Kamble, Kshitij Kadam, Prof.Vasudha Phaltankar
Solar operated paper pod transplantater
Pradeep Shetty, Vignesh Jnanesh, Rachan R Shetty, Chirayu Rai, Dr. Mohan Kumar, Hithesh K. B
Surveillance Robot for Military Application (Bicopter)
Chetan Chougule, Abhishek Bhat, Neeraj M, Abdul Rahman Aflal, Nishmitha
MECHANIZED ARECA NUT CLIMBER AND PLUCKING DEVICE
Rahul, Shetty Nishant Vasudeva, Snighdha Shaw, Kishore Kumar, Santhosh S
VIRTUAL TREATMENT AND CONSULTATION SYSTEM
Prof. Pragati Chandane, Pranali Dalvi, Priti Jadhav, Saloni Mulani, Chaitali Thombare
Brain Tumor Analysis Using Convolutional Neural Network and Machine Learning
Shaik Fareed Ahamad, Dr. S. Bhargavi, Zainab, Triveni G
Secure Online Digital Cheque Clearance Using Blockchain
Prof. Srinivasa Murthy H, Karthik P R, Lohith k, Naveen A, Madhu Kumar H M
Automatic Vehicle Safety and Driver Assistance
Manjunatha Siddappa, Mythri G R, Nayana M R, Pavithra S
CRICKET SHOT CLASSIFICATION AND SCORE PREDICTION
Lakshmi B S, Lavanya A, Navyashree R Bhat, Nidhi G D, Deepakshi I
SATELLITE AND RF ENABLED ASSISTANCE FOR MARINE NAVIGATION
Rishi Nagendra, Sri Hari Prasad H S, Shivam Kumar
Survey on Cardless Transactions using Face Recognition in ATM
Prof. Chayashree G , Rahul L , Ruchitha Bindhu H B , Prajwal R D , Rakshitha S
BLOCKCHAIN BASED TRUST SYSTEM FOR COUNTERFEIT PRODUCT DETECTION
Sanket Oza , Sushant Gore , Amol Koyade , Omkar Jadhav , Prof. Digambar Jadhav
SURVEY ON AN INTEGRATED ARCHITECTURE FOR MAINTAINING SECURITY IN CLOUD COMPUTING BASED ON BLOCKCHAIN
Prof Megha V, Chandana BR, M Vivek Mahanthesh, Surya Prathap S, Vaishnavi B
Emotion Recognition with Audio, Video, EEG and EMG
Savitha M M , K. Vivekananda Reddy , Madhu.T. V , P. Dilip Kumar
ADVANCE SURVEILLANCE ROBOT BY USING ESP 32CAM AND SENSORS
ASST PROF. VISHALA I L,Mohammed Umar, Mahesh S, Sanjay B T
Efficient Tracking of Missing Person Using AI
Aditi A M, Aishwarya G Raj, Anu Devaraju C,Srinivas B V
eXplainable and reliable against adversarial machine learning
Prof. Bhavya R A, Gopika T S, Anusha J
PROJECT-SERI Sericulture-Based Multipurpose Automatic Machine
Shreehari H S, Sumanth V N, Abhishek R, Afzal Pasha M
Flight Delay Prediction System in Machine Learning using Support Vector Machine Algorithm
Prof. Bharti Sahu, Kunal Desale, Ashish Patil, Prithvi Laishetty, Bhuvaneshwar Patil
Vehicle Speed Detection
Akanksha Kakde, LavanyaSangode, Shivesh Kumar Singh, Yash Ladekar
A Review of RF and IoT based Asset tracking system
Mr. Manjunath. G, Aishwarya. H, D. Sony Christela, Sirisha Rani. A, Varshini. M
DETECTION OF OKRA DISEASE - A SURVEY
Maanyatha Mahesh,Suloni Praveen,Swathi Meghana K R, Supriya T C, Shraddha C
DEPRESSION DETECTION SYSTEM USING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Shubham Wadhavane , Shinde Suyog , Martule Akash ,Rushikesh Dhakane Dr. Megha Kadam
Snake Robot Gripper Module for Search and Rescue in Narrow Spaces
Chethan D, Dr. Bhaskar S
DESIGN AND IMPLEMENTATION OF A ROBOT TO ASSIST BEDRIDDEN PERSON
Shivani R Shankar, Sanjana R, Afrah Majid and Dr M V Sreenivas Rao
A critical review of dominant features used in machine learning approaches in COVID-19 Severity risk prediction
Ranjan Kumar , Vaibhav Maheshwari , Aaditya Tripathi
RAITHA SAATHI - An AI/ML-based application for market price and demand prediction
Dr. Archana B, Abhishek D Badiger,Rohit R Aradhya, Sonika KV, Varsha MG
IOT BASED WIRELESS MULTI-FUNCTIONAL WAR ASSISTANT ROBOT
Vishwa Shreeshail Badiger, Nirmala Devi A C, Vinod R,Vinay P L
INTELLIGENT ACCIDENT DETECTION SYSTEM FOR AUTOMOBILES
Peta Sukumar, Prasanna Kumar DC, Jagadish S, Vivek Halanna
SOLAR OUTDOOR AIR PURIFIER WITH AIR QUALITY MONITORING USING IOT
Dr Nagendra Kumar M, Darshan K Gowda, Suprith S, Vinay N
EVENTSPHERE
Basavraj Gadade, Ranjit More, Dipanshu Garg, Nishant Chaware
Anxiety And Depression Detection Using Deep Learning Technique
Ravinarayana B , Shrimanth , Spandana , Swasthik Jain P M , Varshith V Hegde
CROP YIELD PREDICTION USING DEEP LEARNING
Priyanka Jadkar, Yashwant Mahamuni, Pranay Patil, Suhas Sathe
A REVIEW ON FARM MONITORING AND POLLUTION DETECTION DEVICE USING IoT
Brahmani Rajkumar Raavi, Shreyash Sushil Bhagwat, Amol Sunil Lode, Yash Bhupendra Lodhiya, Ankit Suhag
Deep Learning For Screening Covid-19 Using Chest X-Ray Images
C Rangaswamy, Chitra Suresh, Gayithri V, Gireeshma A S
IOT-WEARABLE YOGA AND EXERCISE DEVICE WITH CHILLER JACKET
Savitha M M, Gagana N V, Chaithanya M N, Chandana G
SMART VEHICLE PARKING
Sane Bharath Teja, Shwetha v, S Sameer, Yeddula Charan Reddy
IoT Botnet Cyber Attack Detection
Kajal Sawant, Prajakta Jadhav, Shraddha Shirsath, Shubhangi Dhumal
âCHILD RESCUE SYSTEM FROM OPEN BOREWELLS USING FLAP FOLDING MECHANISMâ
VEENA S, GALI JASWANTH REDDY, SHRUTHI K G, SNAYANI M
Automated Online Exam Proctoring Using AI
Ameya Vaidya, Tanmay Parkhi, Amruta Vaidya, Samiksha Wankhade, Seema Mane
Automatic Waste Segregation in Trash Bin using IoT and Machine Learning
Ravinarayana B , Madhu Shankar Moger , Nithish Prabhu , Palash Chiplunkar , Prathijna D S
GREEN CLOUD COMPUTING
Miss. Vaishali M. Vaidya, Mr. Vijay M. Rakhade, Mr. Neehal B. Jiwane
FIRE ALARM NAVIGATION SYSTEM-IOT
Ms SOWMIYA J S B.Tech, M.E, SOORIA S, PREM KUMAR S, VHOOM PRAKASH M
NEED FOR DETECTING DRIVERS DROWSINESS USING IMAGE PROCESSING
Aditya Deshmukh, Sanket harke, Shruti Tiwari, Sakshi Kumkar, Prof. Digambar Jadhav
A SMART AI TRAINER FOR DETECTING THE FAULTY FORMS OF PUSH UPS
Ms. Shimona E, Emani Keerthi Reddy, Kancharla Bhavya, cuddapah Purnima
Automatic Number Plate Recognition by Using WPOD Network
Ms. Shimona E, Varshitha Duvvuri, Mattipu poojitha, Kurapati Jahnavi
ASSISTIVE DEVICE FOR BLIND, DEAF AND DUMB PEOPLE USING RASPBERRY PI
VEENA S, PRAKRUTHI MS, SRUSHTI N, VK BHAVYADHA
A Review of a Transport Inventory System in association with Tender Web Application
Chhabi Lal, Vivek Singh Rathore
Stock Market Prediction Using RNN
Avin Mahajan, Krushna Fuke, Shivam Raut, Pranay Mahakal, Prof. Zarina Shaikh
IoT based Aquaculture System
Prof. Chandra Prabha R , Rajani Kanth M R , Rakesh K S , Rohith S , Vijay
WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM IN ROADWAYS USING SOLAR POWER
Dr. Anitha T G,Charan V, Srinivas H T, Abhishek V T, K Srivatsa
LOCATING OBJECTS IN WAREHOUSES USING BLE BEACONS AND MACHINE LEARNING
Bharath S, Srivani E N, Akhil V Narayan
REVIEW ON CYBER SECURITY
Harshali R. Tapase, Vijay. M. Rakhade, Lowlesh N. Yadav
Segshare:Secure group file sharing in the cloud using enclaves
Prof.Ninad More, Omraj Nichal, Akash Shinde, Abhishek Ahire, Anuj Bhojane
InterpretML: A Unified Framework for Machine Learning Interpretability
Kiran Bandu Donge, Lovelesh N.Yadav, Neehal B.Jiwane
Ethical Hacking and Management
Monali Bhogekar, Neehal B. Jiwane, Lovlesh.N.Yadav
A Survey of the State of Cloud Security
Dipali Vivek Thakre, Lovelesh N. Yadav, Neehal B. Jiwane
Cyber Security and Privacy Issues in Smart Grids
Arpita Mahadev Belekar, Lovelesh N.Yadav, Neehal B.Jiwane
A Review paper based on Cryptography and Network Security
Achal M. Talase, Lowlesh N. Yadav, Vijay M. Rakhade
PENETRATION TESTING USING ETHICAL HACKING
Girish Shivkumar Puranik(72170276H), Simran Vishnu Makhija(72170281D), Siddharth Rajeshkumar Bedmutha(72170251B), Shruti Kundan Meshram(72170266L)
ARTIFICIAL INTELLIGENCE BASED FACE RECOGNITION FOR SECURITY SYSTEM
Dr. Levy M, Dwarakanath T, Chethan P, Akshay B G
DETECTING DISEASES OF VARIANT NATURE IN HUMANS BY ENHANCED ALGORITHM USING SVM
Chitralekha Dwivedi, Priyanshika, Srishti Kamble, Saurav Nikum, Mrudula Avhad
The impact of computer science and information technology teaching on the growth of software industry
Tejasvini Ankush Naukarkar , Ashish.b.Deharakar , Neehal.B.Jiwane
Cyber Security Of Embedded Iotâs In Smart Homes: Challenges, Requirements, Countermeasures And Trends
Veena S , V K Bhavyadha
ON ROAD VEHICLE BREAKDOWN ASSISTANCE
Prof. Shital S. Aher(Guide), Unhale vrushali Tribhuvan ,Gade pranjal Balasaheb , Patil tulshidas devashri
VOICE MAIL APPLICATION FOR VISUALLY IMPAIRED PERSONS
Santhosh G ,Nagasubramanya C , M R Rahul , Pavan Gowda B S
DESIGN AND DEVELOPMENT OF LOWCOST HIGH ENDURANCE AGRI DRONE FOR SPRAYING PESTICIDES ON ARECA NUT
Mr. Ajith Kumar ,Sudarshan Goudappanour , Preran S T , Adhith , Shreenidhi M M
Emotion Recognition from Formal Text (Poetry)
Prof. Vishal Walunj, Ankit Choudhary, Ameya Kale, Mangesh Gade
A Performance Comparison of Machine Learning Algorithms for Load Forecasting in Smart Grid
Miss. Vaishali M. Vaidya, Harshit K. Mundra, Laxmi M. There, Sandhya Bachar,Ashish B. Deharkar, Mr. Neehal B. Jiwane
SMART MANAGEMENT OF EV CHARGING STATIONS USING AI CHATBOT AND GMAPS API
Prof.Gajanan Kumbhar, Aryan Borkar, Sunil Kamle, Zishan Inamdar, Sayyed Razzak
Design and implementation of Emotion Recognition System
Anjali Vijay Nikhate, Devyani Waman Channe, Sakshi Sanjay Sontakke, Isha Prabhakar Chaple
SMS SPAM DETECTION USING DEEP LEARNING
Prof. Manjunatha P V ,Sri Narahari C N, Sriram Lakshmi Narasimha, Tarun Muthyala, Rakshith R
A Review paper Based on COVID â 19 Application On Deep Learning
Janhavi Anil Chiwhane, Lowlesh N. Yadav, Vijay M. Rakhade
A Review Paper Based on Big Data and Transport Modelling: Opportunities and Challenges
Shweta P. Chamate, Lowlesh N. Yadav, Vijay M. Rakhade
Design and Development of Triphibian Drone
Sujesh Kumar*, P Aneesh Pejathaya, Enrique Morgan Dsa, Gautham and Joswin Lynel Dâsouza
AN INSIGHTS ON CRICKET DATA ANALYTICS
Ms.J.S.Sowmiya B.Tech.,M.E, Thameem Ansari S, Spencer J, Vignesh C K
Controling The Cursor Of Mouse Using Hand Gesture
Smeeta R. zade, Vijay M. Rakhade, Lowlesh N. Yadav
BRAIN TUMOR SEGMENTATION USING DEEP LEARNING
Kavyashree S, Sana, Nisarga, Harshitha M, Suchithra B
A review on Vulnerable Virtual Machines against DDOS Attacks
Ankita Dadmal , Vijay.M.Rakhde , Ashish.B.Deharkar
Travelling Chatbot
Ashutosh Nagawade, Siddhesh Sawant, Yash Kalokhe, Vaibhav Dahitule,Mrs. Dipti Chaudhari
Cyber Security And Cryptography In Cloud Computing
Aniket Babanrao Bele , Neehal B.Jiwane, Lowlesh N.Yadav
PERFORMANCE EVALUATION OF MACHINE LEARNING METHODS FOR CREDIT CARD FRAUD DETECTION USING SMOTE AND ADABOOST
MALLIREDDY SAI HARSHITHA, MANJUNATHA SIDDAPPA
PLASTIC WASTE CLASSIFICATION SYSTEM USING DEEP LEARNING
Vinit Rajesh Navghare, Neehal B. Jiwane, Lowlesh N. Yadav
MULTI-SOURCE MEDICAL DATA INTEGRATION AND MINING FOR HEALTHCARE SERVICES
Sahil Ravindra Kadukar , Lowlesh N. Yadav, Neehal B. Jiwane
A Review Paper Based on Use of Artificial Neural Network in Pattern Recognition
Mrunali N. Parkhi, Lowlesh N. Yadav, Vijay M. Rakhade
Integrating Public Reported Evidence Collection, Public Court Records Archive And Realizing Secure And Decentralized Case Document Management Using IPFS And Hyperledger Fabric Blockchain: An Implementation Study
Karthik Banjan, Jishnu Pillai Anilkumar, Harshit Singh, Kumar Sunny, Ruhin Kouser
âIOT Based Home Automation Systemâ
Prashant Surdas Mukke, Neehal B. Jiwane, Ashish B. Deharkar
Social Media: Various Communication Level
Ankita P. Dadmal, Vijay M. Rakhade, Lowlesh N. Yadav3
Real Time Secure Clickbait and Biometric ATM User Authentication and Multiple Bank Transaction System
Mrs.P.Brinda B.Tech.,M.Tech., Pranish.S, Pragadeesh.S, Thirumalai Raju.R
ANOMALY DETECTION USING MACHINE LEARNING ON SOFTWARE DEFINED NETWORKING
Chetan Patil, Shubham Chakote, Rakshit Teli
SENTIMENTAL ANALYSIS OF NEWS ARTICLES USING NAĂVE BAYES
Mrudul Khairkar, Dhwani Waghela, Manas Bhilare, Aman Shriyan, Chitralekha Dwivedi
A Study of Distributed Systems' Metadata Management Strategies
Anurag Ashish Khot, and Dr. Padmashree T
Sign Language Detection and Recognition using Machine Learning
Chetana Shravage, Monali Gaikwad, Shubhangi Iwarkar, Sandesh Jadhao, Omkar Dongare
An analysis of a web-based platform that allows start upâs and investors to connect and forecast investment returns using deep learning
Salunke Shubham Dipak, Shete Siddhrath Arun, Bhalerao Suraj Santosh, Prof.S.H. Pawar
Renewable Unnamed Substation Technology That Gives Power To Knowing Real Time Fault Control and Isolation Of Power System At Any End Of The World If You Are Authorized
Prashant Dange, Chetan Gowardipe, Mayur Pote
Real-Time Object Detection and Tracking Using Deep Learning Techniques
Arjun Jadhav, Ganesh Dakle, Aditya Kundhe, Parag Vispute
Decentralized NFT market place with custom token
Sagar Gund, Rohit Gore, Yash Gholap, Abhishek Dorge, Prof. Yogita Pore
IOT-BASED LANDSLIDE DETECTION AND MONITORING SYSTEM WITH ACCELEROMETER AND SOIL MOISTURE SENSOR
Mrs Priyanka Gupta, Ayush Gupta, Chhaya Singh, Sonal Gadewar, Atharav Deore
IMPACT OF ARTIFICIAL INTELLIGENCE AND DEEP LEARNING ON THE HEALTHCARE INDUSTRY
Samiksha A. Karmankar, Vijay M. Rakhade, Lowlesh N. Yadav
UI DEVELOPERS - THE POWER OF UI DESIGN PATTERNS
Rakshika A. Sakharkar, Vijay M. Rakhade, Lowlesh N. Yadav
HOW BLOCKCHAIN TECHNOLOGY CAN SOLVE IOTâS SECURITY PROBLEM
Parmeshwar R. Kumare, Lowlesh N. Yadav, Vijay M. Rakhade
A Deep Learning Approach for Predicting Diabetes using Big Data Analytics
Dr. K. Thenmozhi, Dr. A. Nirmala, Dr. M. Savithri
Multi Power Supply Using 4 Different Sources for No Break Power Supply
Suraj.P.Turankar, Ganesh.V.Thengane, Vaibhav.A.Khangar, Divya.A.Bawane
IOT Based Smart Agriculture Monitoring System
Suraj.P.Turankar, Ganesh.V.Thengane, Vaibhav.A.Khangar, Divya.A.Bawane
Life Cycle of a Software Engineering and Overview of Web Development
Namrata M. Goldar, Vijay M. Rakhade, Lowlesh N. Yadav
Understanding Cyber-Security Risk in a COVID-19 Pandemic
Poonam Sushen Halder, Vijay M. Rakhade, Lowlesh N. Yada
PEERROOMS (Hostel / PG Finding Web Application & Mobile App)
Shrividya Bansode, Vaibhavi Wadibhasme, Akash Kumar, Avinash Nishad
A Secured Communication System Using Cryptographic Techinques
Pardeshi Pooja, Bhavsar Vaishnavi, Wadkar Pooja, Khandekar Nikita, Prof. Dalvi A.S.
Review on Leave Management Systems
Ms. Snehal Choudhari, Prof. Tarun Yengantiwar
Combinational Logic Circuit (SOP & POS)
Mrs.Vijaya Sayaji Chavan, Mr. Mohan Kashinath Mali, Mrs. Swati Bhushan Patil
DOCUMENT SCRUTINIZING AND IMAGING SYSTEM
Prof.Dr Ninad More, Aditi Roy, Kashmira Nagrale
GUI BASED FACE RECOGNITION SYSTEM
Gunasundari B, Pachuru Venkata Nithin, Pokala Venakata Sathish Reddy, Munagala Giridhar
IDENTIFICATION AND OBSERVATION OF IMMATURE WHITE BLOOD CELLS USING CNN AND MACHINE LEARNING
Praful Shah, Shreya Wavhal, Praveen Mahato, Amit Kanani, Prof. Komal Yadav
IMAGE ANALYSIS APPLICATION AND IMAGE INSIGHT APP USING GOOGLEâS CLOUD VISION API
Prof. Madhavi Patil, Yash Kalbande, Pratik Waghchaure, Mayuri Deore, Pratik Avhad
User Interface Test Environment Tool
Kamini Mohan Achari, Apoorva Chhagan Dusane, Pratiksha Ramdas Nagode, Prof Rahul M. Raut
Active Learning Methods for Annotating Training Sets
Gorla Charan Sai Chowdhary, Suraj Rajshekhar Mukkannavar, Kushagra Gupta, Rajot Saha, Prof. Anala M R
Automatic Sewage Monitoring System Using IOT
Dhananjali Singh, Pooja Raheja, Vivek Lawaniya, Abhishek
Study of Object and Sign Detection System
Naresh Katkar, Dr. Rama Bansode
Android App for Creating a Map of the College to be used with visitor localization
Swapnil Vaidya, Dhiraj Rahane, Aniket Gavhane, Vaibhav Shinde, Khushbu Shaikh, Prof. Ansari S.W
MONITORING VEHICULAR POLLUTION USING EMBEDDED SYSTEM
Dr. Pramod Sharma, Shubham Verma, Suhail Khan, Shaskank Tiwari
Review On Blockchain Technology
Mihir Suresh Gadhiya, Nihal B. Jiwane, Ashish B. Deharkar
HANDWRITTEN SIGNATURES FORGERY DETECTION
Prof.Netravathy V, Spoorthy Udayakumar Kulkarni
Survey Paper on Plant Disease Identification Using Machine Learning
Dr Suneetha K R, Rachitha E
Effect Of Temperature On Early Age Of Concrete
Shelar Pratik, Thakur Nachiket, Kakad Sharda, Palve Surekha, Sayyad Simaan, Prof. Gaikwad A.D
Abstract
Perception-Based Geographical Analysis of Cybercrime: Assessing Vulnerability of Women, Child and Senior Citizens in Palam Colony, NCT Delhi
HeenaKumar, Garima Chauhan and Dr.Shweta Rani
DOI: 10.17148/IJARCCE.2023.12502
Abstract: The Internet has become a necessity in todayâs world. It is one of the most useful and harmful things depending upon its usage. In the world of crimes also internet plays a significant role in helping black hat hackers in committing cyber-crimes and steal personal information. Electronic devices and the internet are used in these types of crimes like cyber pornography, email booming, exposure to harmful content, grooming, harassment, sexual abuse, cyber-stalking, virus attacks etc. Educated as well as uneducated, both are the victims, and the most vulnerable part of society is children, women, and senior citizens. Children are among the newest victims of cyber-crime. Our study area is the cyber city Delhi, which is secondarily survey including a case study of Palam district. The present study is concerned with finding and examining the problems and impact of cyber-crime on children, women, and senior citizensby suggesting some mitigation measures to boost cyber security. Questionnaires are discussed and results show how much people are aware of cyber-crimes, the connection between cyber-crimes and children, women & senior citizens, and what kind of problems they face in dealing with such kinds of crimes. The findings suggest that people do know about this current problem, but more awareness is needed from a small level like school discussions should have this kind of topics, elderly people donât use social sites much but receive fake calls from banks and companies which try to manipulate them. To reduce the level of cyber-crime, some suggestions and solutions are discussed at the end.
Keywords: Cybercrime, Internet, Child, Women, Senior Citizens, Delhi, Palam
Abstract
NUTRITION ANALYSIS USING MACHINE LEARNING TECHNIQUES
Ms. V. Lavanya, R. Karthick, S. Karan Kumar, M. Vincent Leo Vimal
DOI: 10.17148/IJARCCE.2023.12503
Abstract:
The importance of food for human survival has been discussed in several medical conferences. Consumers now have more opportunities to learn about nutrition patterns, understand their daily eating habits, and maintain a balanced diet owing to modern dietary evaluation and nutrition analysis tools. Due to the ignorance of healthy food habits, obesity rates are increasing at an alarming speed, and this is reflective of the risks to peopleâs health. People need to control their daily calorie intake by eating healthier foods, which is the most basic method to avoid obesity. However, although food packaging comes with nutrition (and calorie) labels, itâs still not very convenient for people to refer to App-based nutrient dashboard systems which can analyze real-time images of a meal and analyze it for nutritional content which can be very handy and improves the dietary habits, and therefore, helps in maintaining a healthy lifestyle. This project aims at building an application that automatically estimates food attributes such as ingredients and nutritional value by classifying the input image of food. This method employs a deep learning model (CNN) for accurate food identification and Food APIsâ s to give the nutritional value of the identified food. ÂKeywords:
CNN, GLCM.Abstract
Detecting Phishing Attacks Using Natural Language Processing And Machine Learning
Padmanaban A, Rakesh M, Santhosh S, Maheswari M
DOI: 10.17148/IJARCCE.2023.12504
Keywords:
Detecting phishing attacks for cybersecurity that use Catboost, Adaboost, Random Forest, Support Vector Machine algorithms, Natural Language Processing and Machine Learning.Abstract
GAIT RECOGNITION TECHNOLOGY
Bindu A R, Ravikiran R
DOI: 10.17148/IJARCCE.2023.12505
Abstract:
 Gait recognition is typically alluded to as a human recognizable proof/individual by the house style or method of individuals stroll in picture groupings. Stride acknowledgment innovation is a biometric distinguishing proof technique that dissects and recognizes people in view of their strolling designs. This innovation has acquired critical consideration lately because of its expected applications in security, observation, and medical services. Stride acknowledgment frameworks catch a singular's step highlights utilizing camcorders and afterward use AI calculations to investigate these elements for recognizable proof purposes. This theoretical gives an outline of step acknowledgment innovation, its applications, and its constraints. It additionally talks about the difficulties related with stride acknowledgment, like ecological variables and changeability in human step, and features the requirement for additional exploration in this field to work on the exactness and dependability of walk acknowledgment frameworks. Keywords: Gait recognition, Silhouette Segmentation, Contour detection, computer Algorithm vision, Machine learning.Abstract
VARIOUS TECHNOLOGIES USED FOR IDENTIFYING POTHOLE ON ROADS
MANJULA K, SANJAYKUMAR M
DOI: 10.17148/IJARCCE.2023.12506
Abstract:
Potholes are a major concern on roads and highways, causing accidents, vehicle damage, and traffic delays. Detecting potholes in a timely and accurate manner is crucial for ensuring safe and efficient transportation. Various technologies are being used for pothole detection, including laser-based systems, machine learning algorithms, computer vision techniques, and acoustic sensors. Laser-based systems use high-precision measurements to detect the road surface's irregularities, including potholes. Machine learning algorithms analyze images of road surfaces captured by cameras mounted on vehicles to identify potholes. Computer vision techniques analyze road surface images captured by cameras or drones to detect potholes. Acoustic sensors can detect the vibrations generated by vehicles driving over potholes. Overall, the use of these technologies has improved pothole detection accuracy and efficiency, enabling faster repairs and safer roads.Keywords:
Machine Learning, Deep Learning, IoT, Pothole.Abstract
Prediction Of Cardiovascular Disease and Their Causes Using Machine Learning Techniques
Ms. V. Lavanya, M. Mathew, F. Patrick, J. Mukesh kumar
DOI: 10.17148/IJARCCE.2023.12507
Abstract:
Heart disease describes a range of conditions that affect your heart. Diseases under the heart disease umbrella include blood vessel diseases, such as coronary artery disease, heart rhythm problems (arrhythmias), and heart defects you're born with (congenital heart defects), among others. According to World Health Organization (WHO), cardiovascular disease (CVD) is one of the most lethal diseases that leads to the most number of deaths worldwide. Cardiovascular disease prediction aids practitioners in making more accurate health decisions for their patients. Early detection can aid people in making lifestyle changes and, if necessary, ensuring effective medical care. Machine learning (ML) is a plausible option for reducing and understanding heart symptoms of disease using the device's vital parameters like body temperature, heart rate, and blood pressure. This project proposes a Random Forest technique as the backbone of computer-aided diagnostic tools for more accurately forecasting heart disease risk levels and sending alert messages to the doctor ÂÂÂand the guardian with the location details of the patient. Random Forest modeling is a promising classification approach for predicting medication adherence in CVD patients. This predictive model helps stratify the patients so that evidence-based decisions can be made and patients managed appropriately. The chi-square statistical test is performed to select specific attributes from the Cleveland heart disease (HD) dataset. The data visualization has been generated to illustrate the relationship between the features. According to the findings of the experiments, the random forest algorithm achieves 88.5% accuracy during validation for 303 data instances with 13 selected features of the Cleveland HD dataset. ÂKeywords:
CVD (cardiovascular disease), Random Forest algorithm, Machine learning, WHO (world health organization).Abstract
Driver Profile and Driving Pattern Recognition for Road Safety Assessment: Main Challenges and Future Directions
Chandana R A, Ravikiran R
DOI: 10.17148/IJARCCE.2023.12508
Abstract:
This study reviews the Artificial Intelligence and Machine Learning approaches developed thus far for driver profile and driving pattern recognition, representing a set of macroscopic and microscopic behaviors respectively, to enhance the understanding of human factors in road safety, and therefore reduce the number of crashes. It provides a definition of the two scientific fields in terms of safety, and identifies the most efficient approaches used regarding methodology, data collection and driving metrics. Results show that K-means and Neural Networks are the most commonly used methodologies for driver profile identification, and Dynamic Time Warping for driving pattern detection. Most studies discovered driver profiles related to aggressiveness, considering mainly speed and acceleration as driving metrics. Based on the gaps and challenges identified, this paper provides a new framework for combining microscopic and macroscopic driving behavior analysis, instead of examining them separately as is the state-of-theart. Such combined results can potentially improve the development of traffic risk models, which could be exploited in applications that monitor drivers in real-time and provide feedback. These models will represent human behavior more accurately, which can eventually lead to the recognition of âoptimalâ human driving patterns that Automated Vehicles (AV) could âmimicâ to become safer.Abstract
Real Time Secure Clickbait and Biometric ATM User Authentication and Multiple Bank Transaction System
Mr. Jimson.L, Vishwa S, Rayner Raj A, Vimal Marccus R
DOI: 10.17148/IJARCCE.2023.12509
Abstract:
ATM or Automated Teller Machines are widely used by people nowadays. Performing cash withdrawal transaction with ATM is increasing day by day. ATM is very important device throughout the world. The existing conventional ATM is vulnerable to crimes because of the rapid technology development. A total of 270,000 reports have been reported regarding debit card fraud and this was the most reported form of identity theft in 2021. A secure and efficient ATM is needed to increase the overall experience, usability, and convenience of the transaction at the ATM. In today's w kl, orld, the area of computer vision is advancing at a breakneck pace. The recent progress in biometric identification techniques, including finger printing, retina scanning, and facial recognition has made a great effort to rescue the unsafe situation at the ATM. Specifically, the goal of this project is to give a computer vision method to solve the security risk associated with accessing ATM machines. This project proposes an automatic teller machine security model that uses electronic facial recognition using Deep Convolutional Neural Network (DCNN). If this technology becomes widely used, faces would be protected as well as their accounts. Face Verification Clickbait Link will be generated and sent to bank account holder to verify the identity of unauthorized user through some dedicated artificial intelligent agents, for remote certification. However, it obvious that manâs biometric features cannot be replicated, this proposal will go a long way to solve the problem of account safety making it possible for the actual account owner alone have access to his accounts. This eliminates the possibility of fraud resulting from ATM card theft and copying. The experimental results on real-time datasets demonstrate the superior performance of the proposed approach over state-of-the-art deep learning techniques in terms of both learning efficiency and matching accuracy. By using this real time dataset, the proposed system achieves the highest accuracy with 97.93%Keywords:
AI, ATM, CNN, DCNN, FVCLAbstract
DUAL - SERVER PUBLIC-KEY AUTHENTICATED ENCRYTION WITH KEYWORD SEARCH
Mr. M. NAGARASAN, M.E., GAYATHRI.R, ALAGENDRAN.K, MARIMUTHU.P, PUSHPARAJ.S
DOI: 10.17148/IJARCCE.2023.12510
Abstract:
In cloud storage, how to search sensitive data efficiently and securely is a challenging problem. The searchable encryption technique provides a secure storage method without loss of data confidentiality and usability. As an important branch of searchable encryption, public-key encryption with keyword search (PEKS) is widely studied by scholars. However, most of the traditional PEKS schemes are vulnerable to the inside keyword guessing attack (IKGA). Resisting the inside keyword guessing attack is likely to become an essential property of all new PEKS schemes. For a long time, mitigating IKGA has been inefficient and difficult, and most existing PEKS schemes fail in achieving their security goals. To address the above problems, we define the notion of Dual-server Public-key Authenticated Encryption with Keyword Search (DPAEKS), which protects against IKGA by leveraging two servers that do not cooperate, and supports the authentication property. Then, we provide a construction of DPAEKS without bilinear pairings. Experimental results obtained using a real-world dataset show that our scheme is highly efficient and provides strong security, making it suitable for deployment in practical applications. Keywords: Cloud computing, security,DPAEKS adopts a dual-server framework, wherein the test functionality is split into two parts which are handled by two independent servers.Abstract
ADVANCEMENT IN PHOTONICS FOR SPACE COMMUNICATION
DR. BHASKAR S, ANUSHA S
DOI: 10.17148/IJARCCE.2023.12511
Abstract:
Photonic technologies have changed the world of communications in the form of fiber optics, integrated optics, electro-optical components, and micro-photonics. They offer some compelling advantages compared with their traditional RF counterparts when considered for use in space applications. Thus, research and development of photonics technologies for the space, the applications in areas of communications, sensing, and signal processing has been a major them for several years. The use of the photonic technologies for the space applications has risen the problem related to ability of optoelectronic and optic components to withstand space environment as all optoelectronic and optic components come from the terrestrial applications. Thus, the development of photonic technologies for the space applications has made the selection and acceptance test criteria of all optoelectronic and optic components that are part of the photonic system imperative. This presents a summary of the experience to Alter Technology Group on the mechanical, thermal, radiation, and endurance testing of several photonics technologies. In addition, the paper describes an assessment relates to reliability of these parts to be usefull in the space applications.Abstract
TECHNOLOGY FOR TUNABLE LASERS
Dr. Bhaskar S, Harshitha M S
DOI: 10.17148/IJARCCE.2023.12512
Keywords:
Tunable lasers, semiconductor lasers, and photonic integrated circuits.Abstract
Web Phishing Detection Based on Web Crawling and Backend Signature
M. Mohamed Afthaf, A. Stalin Sacratees, A. Sandiyo Christan
DOI: 10.17148/IJARCCE.2023.12513
Abstract:
Web phishing is a social engineering cyber attack that is used to gain the credentials of a legitimate user to achieve unauthorized access to the victimâs account using stolen credentials. Most of the phishing attacks happen on social media, E-commerce, net banking, and mobile platforms. Phishing website is one of the internet security problems that target human vulnerabilities rather than software vulnerabilities. Here, we improve the accuracy of the results. It aims to prevent online fraud and protect internet users from falling prey to phishing attacks. The project involves developing an automated system that can identify and flag websites that attempt to deceive users into divulging sensitive information such as login credentials, credit card details, and personal data. The backend signature detection approach is based on machine learning algorithms that are trained to identify the patterns and characteristics of phishing websites. The system uses these algorithms to compare the identified websites against a database of known phishing sites and to determine the likelihood that a particular site is attempting to deceive users. Overall, the Web Phishing Detection Based on Web Crawling and Backend Signature project is an important step towards improving online security and protecting users from the growing threat of phishing attacks.Abstract
DEVELOPING LEARNING TOOL FOR ELECTRICAL AND ELECTRONIC COMPONENT USING AUGMENTED REALITY
B. Magesh, J. Bilson, Chundru Naveen Kumar, Mrs. L. Jenitha Mary
DOI: 10.17148/IJARCCE.2023.12514
Abstract:
In the era most of the engineering students are known the theoretical concepts of electrical and electronic components used in the laboratory but they couldnât experience or imagine the how each of the component is functioning and the electron current flows in the circuit. In this project, an application is developed to learn and experience the components and overcome the problem which was faced by the student community via augmented reality. Augmented reality provides new development ideas for the visualization of data information, and at the same time provides new development space for the convergence of digital visualization technology and multiple industry. Augmented reality makes the virtual object into the real scene. So the students can able to understand the concept practically through by visualizing the objects. Here we are trying to develop a learning tool for laboratory that uses electrical and electronics components using augmented reality. In this work, initially we are designing the electrical and electronic component through unity and to show the simulation of electrons in the electrical and electronic component through animation. This makes the student to understand the concept theoretically as well as practically. In this project implementing the super imposition augmented reality that makes the virtual object is placed on top the real object in real scene. unity which acts as an toolkit for making the 3D objects and makes the animation on the object. which makes everyone can able to understand the concept practically through virtualizing the virtual electrically and electronic components.Abstract
IDENTIFICATION OF BIOTIC STRESS IN RICE CROPS USING CONVOLUTIONAL NEURAL NETWORK
MR. M KUMERESAN, M.E, MAYILRAJ S, DHILIPAN R, DINESH S, THANGABALU G
DOI: 10.17148/IJARCCE.2023.12515
Abstract:
Most of the countries are depends on agriculture, where Tamil Nadu is theland of agriculture. Here paddy cultivation is major source of earning. People in Tamil Nadu, consumes rice as main meal for three times in a day. Various factors such as diseases on paddy leaf, pest attack etc., the production of paddy will be affected approximately 40% to 50%, commonly rice related diseases should be detected in early stage to protect the paddy because it will destroy the entire farm land. If the diseases are identified in initial stage there is no need to spray a high dose fertilizer on the paddy crops. To overcome this, the proposed system uses pre-processing, transfer learning Inception_V3 method, neural network is trained by deep learning based Convolutional Neural Network(CNN) classification algorithm to identify the paddy leaf diseases like bacterial leaf blight, brown spot and rice blast. This method produces good accuracy. Scope of this project is to detect disease on paddy crops and to notify the types of diseases to farmer so that the farmers can take early action to protect the paddy crops. Index Terms: Convolutional Neural Network (CNN), Digital Agriculture, Internet-of-Agro-Things (IoAT), Machine Learning (ML), Deep Learning.Abstract
An Experimental study in Fibre reinforced concrete by using glass and steel fibre for sustainable construction
Mahaveer P Jain, Shreedhara, Raghu A R, Anuj Shetty, Suraj M Shet
DOI: 10.17148/IJARCCE.2023.12516
Abstract:
Steel fibre for reinforcing concrete is defined as short, discrete lengths of steel fibres with an aspect ratio (ratio of length to diameter) from about 20 to 100, with different cross-sections, and that are sufficiently small to be randomly dispersed in an unhardened concrete mixture using the usual mixing procedures. Glass fibres reinforced polymer composites have been prepared by various manufacturing technology and are widely used for various applications. Glass fibres are having excellent properties like high strength, flexibility, stiffness and resistance to chemical harm. Objective of this to compare the check performance of glass and steel fibres, different percentages of 0.25%, 0.5%, 0.75%, 1%, and 1.25% were used. 1.5% 1.75% And 2% for concrete of M30 grade. To compare the fresh properties of fibre-reinforced concrete to those of conventional concrete. To compare fibre-reinforced concrete with ordinary concrete in terms of compressive strength and split tensile strength. Studying the behaviour of reinforced concrete blocks fortified with steel and glass fibres is the main goal and the methodology of this to research if steel and glass reinforcement for concrete is appropriate. The study used a comprehensive approach that included selecting materials, preparing concrete mixes, testing physical and mechanical properties, and evaluating environmental sustainability. The results were analysed using statistical methods to determine the significance of the differences observed between the various concrete mixes. The rigorous experimental approach and statistical analysis provided reliable data to support the study's findings.Keywords:
steel and glass fibre, compressive strength, split tensile strength.Abstract
THIN FILM TECHNOLOGIES FOR IMPROVING THE EFFICIENCY OF SOLAR CELLS
SHREYAS REDDY D, PROF. MOHAN BABU C
DOI: 10.17148/IJARCCE.2023.12517
Abstract:
Solar energy is one of the most promising renewable sources of energy, and solar cells are the key components for converting sunlight into electricity. However, traditional silicon-based solar cells are limited by their relatively low efficiency and high manufacturing costs. Thin film technologies offer a potential solution to these problems by providing a more efficient and cost-effective alternative to traditional solar cells. In this report, we review recent developments in thin film technologies for improving the efficiency of solar cells. We discuss different types of thin film materials, including cadmium telluride, copper indium gallium selenide, and perovskites, and their potential for improving the efficiency of solar cells. We also review different manufacturing techniques for thin film solar cells, including physical vapor deposition, chemical vapor deposition, and solution-based methods. Finally, we discuss the challenges and opportunities associated with thin film technologies and their potential to revolutionize the solar energy industry. Overall, thin film technologies have the potential to significantly improve the efficiency of solar cells and reduce the cost of solar energy, making it a more viable and sustainable source of energy for the future.Abstract
CLASSIFYING THE FINGERS TO RECOGNISE THE HAND GESTURES BY USING THE OPEN-SOURCE COMPUTER VISION
Balakrishnan M, Chandru R, Dinakar Jose S ,Jancy Sickury Daisy S
DOI: 10.17148/IJARCCE.2023.12518
Abstract:
Hand gesture recognition is a challenging problem in computer vision, with various applications in fields such as robotics, human-computer interaction, and sign language recognition. The ability to recognize hand gestures in real-time can enable seamless communication between humans and machines, making human-computer interaction more intuitive and natural. In this project, we propose a system that can recognize hand gestures by classifying the fingers using open-source computer vision technology. The proposed system uses a combination of image processing techniques and machine learning algorithms to classify the fingers and recognize hand gestures. The input data is captured from a webcam and pre-processed using techniques such as skin colour detection and hand tracking. The hand is then segmented, and the fingers are extracted based on their location and orientation. The extracted finger images are then classified using a convolutional neural network (CNN) architecture. The CNN model is trained on a large dataset of finger images and hand gestures to achieve high accuracy in classification. The dataset comprises images of various hand gestures, including open, closed, and partially closed hands. The CNN model is trained to recognize the fingers' positions and orientations in the input images and classify them into their respective categories. The model is fine-tuned using transfer learning techniques to improve its accuracy and generalizability. The proposed system is evaluated using a variety of hand gestures, including thumbs up, thumbs down, okay, and rock-on, among others. The system achieves high accuracy in recognizing different hand gestures in real-time, with an overall accuracy of 95%. The proposed system's robustness and accuracy make it suitable for various applications, including sign language recognition, human-computer interaction, and gaming. In conclusion, this project proposes a system that can recognize hand gestures by classifying the fingers using open-source computer vision technology. The system achieves high accuracy in real-time hand gesture recognition and has potential applications in various fields. Future work can explore the use of deep learning algorithms and more extensive datasets to improve the system's accuracy and performance. Additionally, the proposed system can be extended to recognize hand gestures in different lighting conditions and backgroundsAbstract
Non-invasive Glucometer
Chethan G, Abhijeet K, Hemanth V, Varun H J, Dr. D J Ravi
DOI: 10.17148/IJARCCE.2023.12519
Abstract:
Non-invasive glucometers are devices that measure blood glucose levels without the need for a blood sample. These devices have the potential to revolutionize the management of diabetes by providing a more convenient and painless method of glucose monitoring. This abstract will discuss the technology behind non-invasive glucometers and their potential benefits and drawbacks. Non-invasive glucometers work by measuring glucose levels in body fluids other than blood, such as saliva, sweat, or interstitial fluid. This is done using various technologies, such as infrared spectroscopy, Raman spectroscopy, or optical coherence tomography. The device then calculates the blood glucose level based on the measurement of the body fluid. One of the main benefits of non-invasive glucometers is the reduction in pain and discomfort associated with traditional blood glucose monitoring methods. This can lead to increased compliance with glucose monitoring and ultimately better diabetes management. Additionally, non-invasive glucometers may reduce the risk of infection or other complications associated with finger pricks. However, non-invasive glucometers are not without their drawbacks. They may be less accurate than traditional methods, particularly in situations where glucose levels are rapidly changing and expensive than traditional methods. Keywords: Non-Invasive; NIR Spectroscopy; Hyperglycemia, Hypoglycemia.Abstract
BLOCKCHAIN INSPIRED RFID BASED INFORMATION ARCHITECTURE FOR THE FOOD SUPPLY CHAIN
D.R. ANGEL KIRUBA, ANGEL PRINCY A, JEVITHA R, MADIHA ZEHRA K
DOI: 10.17148/IJARCCE.2023.12520
Abstract:
 This paper proposes a blockchain-inspired Internet-of-Things architecture for creating a transparent food supply chain. The architecture uses a proof-of-object-based authentication protocol, which is analogous to the cryptocurrencyâs proof-of-work protocol. The complete architecture was realized by integrating a radio frequency identification (RFID)- based sensor at the physical layer and blockchain at the cyber layer. The RFID provides a unique identity of the product and the sensor data, which helps in real-time quality monitoring. For this purpose, a small feature size 900-MHz RFID coupled sensor was fabricated and demonstrated for real-time sensor data acquisition. The blockchain architecture aids in creating a tamper-proof digital database of the food packages at each instance. A detailed security analysis was performed to investigate the vulnerability of the proposed architecture under different types of cyber-attacks. Keywords: Food Supply Chain, Blockchain, radio frequency identification (RFID), tamper-proof.Abstract
AN IOT-ENABLED FLOOD INTENSITY PREDICTION VIA ENSEMBLE MACHINE CODE MODEL
Dr. P.D.R. Vijaya Kumar M.E., Ph.D, Megathi .M, G.Akila M.E, Yuvasri . D, Anand Kumar .S,Selva Mari Ganesh .R
DOI: 10.17148/IJARCCE.2023.12521
Abstract:
Stream flooding is a trademark wonder that can devastatingly influence human life likewise, monetary incidents. There have been various systems in considering stream flooding; in any case, lacking agreement and confined data about flooding conditions defeat the improvement of balance and control measures for this trademark wonder. This includes one more technique for the assumption for water level in relationship with flood earnestness using the gathering model. Our philosophy involves the latest headways in the Internet of Things (IoT) and AI for the robotized assessment of flood data that might be useful to prevent devastating occasions. Investigation results show that gathering learning gives a more strong gadget to expect flood earnestness levels. Keywords: Internet of Things , LSTM ,Machine to Machine InnovationAbstract
MACHINE LEARNING BASED TRAVEL RECOMMENDATION WEB APPLICATION
Thaseen Bhashith, Sneha H M, Suraj K R, Teju B N, Siddesh S
DOI: 10.17148/IJARCCE.2023.12522
Abstract:
Tourism is a rapidly growing industry, and with the rise of machine learning techniques, it is possible to make personalized tourist recommendations. Machine learning models can analyse a large amount of tourist data, including historical tourist trends, demographic information, user preferences. To develop a personalized tourist recommendation system, one approach is to use a combination of machine learning algorithms. The proposed system helps in guiding users with all the information regarding tourist places. In this paper the system also provides a personalized experience to tourists by taking into account their individual preferences. The proposed system helps user to give rating and reviews on the places they visited.Keywords:
Recommendation Web Application, Machine learning, Collaborative filtering algorithm, Content-based filtering, Knowledge-based filtering.Abstract
TECHNOLOGIES FOR CONVERSION OF PLASTIC WASTE INTO FUEL
Manjula K, Sahana N
DOI: 10.17148/IJARCCE.2023.12523
Abstract:
In the present world due to urbanization and industrialization, huge amounts of plastic are generated every year. Hence the disposal methods and management of plastics like burning them in the open air cause hazardous problems in the atmosphere. Though there have been numerous attempts of technologies to repossess plastics, it primarily emits greenhouse gases and the usage of power for the entire recycling process is high rise. Plastic to fuel conversion is a promising technology that has the potential to reduce the amount of plastic waste in the environment and provide an alternative source of fuel. Hence the Pyrolysis technique is one of the nature-friendly attempts to convert plastic to inflammable gas. But this is a process that needs high energy for the anaerobic decomposition of plastic in the presence of the catalyst and at very high temperatures. To minimize the consumption of excess energy nature, renewable technologies are taken in to provide extreme temperature levels to enable pyrolysis. This technology is converting plastic waste into fossil fuel through decomposition.Keywords:
Urbanization, Hazardous, greenhouse gases, pyrolysis, anaerobic, Fossil fuel.Abstract
Data Analysis and Modelling of Body Sensor Network in Healthcare Application
Ravi M V, Rakshitha R
DOI: 10.17148/IJARCCE.2023.12524
Abstract:
Data are presently processed relatively in an systematic way due to the advancement of machine learning procedures. Such plans for information extraction are very often employed in a diversity of contexts, counting trade, social media, wagering, voting, predicting, and more. Healthcare in Body Sensor organize is one of these key areas where displaying and data analysis are exceedingly utilized. The information that is captured and fabricated in this organize is utilized to follow a person's regular exercises, check that the data is exact, determine when a medical emergency is appropriate, and more. There are abundant studies based on such examination; some acted their own methodology while others utilized pri-defined procedures such as Machine Learning, Deep Learning, Neural Systems and more. In order to analysis the sensor information, several methodologies that have been stated in some preferred research articles are compared in this document. Both the analysis strategies and the study's discoveries are very distinct and have numerous distinctive characteristics. The differentiate study contributes a comprehensible exhibit of these procedures and angle. ÂKeywords:
Healthcare, Body Sensor Network, Deep Learning, Neural Networks, Human Activity Recognition.ÂAbstract
FETAL HEALTH CLASSIFICATION USING MACHINE LEARING
Ms. Swarna Lakshmi, Abinaya S, Eswari S , Keerthana B
DOI: 10.17148/IJARCCE.2023.12525
Abstract:
Health complications during the gestation period have evolved as a global issue. These complications sometimes result in the mortality of the fetus, which is more prevalent in developing and underdeveloped countries. The genesis of machine learning (ML) algorithms in the healthcare domain have brought remarkable progress in disease diagnosis, treatment, and prognosis. Around 800 women die every day due to pregnancy and childbirth-related issues. Maternal health and fetal health are closely associated with each other Every year approximately 3 million new born babies die because of miscarriage So there is a need for proper care including the prediction of risk levels before, during pregnancy for the safety of both mother and child. Data mining is a commonly used technique for processing enormous data. Researchers apply several data mining and machine learning techniques to analysis huge complex data, helping health care professionals to predict fetal health. In this project we used different algorithms are compared and the best model is used for predicting the fetal health.Keywords:
Machine learning, Fetal healthAbstract
TERAHERTZ IMAGING AND SENSING FOR HEALTHCARE
Dr. Nagendra Kumar M, Chinmayi N Naidu
DOI: 10.17148/IJARCCE.2023.12526
Abstract:
Recently, terahertz spectroscopy has received a lot of attention because of its unique properties such as biosafety, fingerprint spectrum, and good penetration. In this review, we focus on the research progress of terahertz spectroscopic techniques for the detection and recognition of substances. First, we describe the fundamentals of terahertz spectroscopy. Then, we outline the applications of terahertz spectroscopy in biomedicine, agriculture, food production, and security inspection. Subsequently, metamaterials, which have recently received extensive attention, are also investigated for their applications in terahertz spectroscopic detection and recognition of substances is illustrated. Finally, the development trend of terahertz spectroscopy for substance detection and recognition has also been prospected.Abstract
QUANTUM COMMUNICATION
Arshitha G, Shwetha V
DOI: 10.17148/IJARCCE.2023.12527
Abstract:
Quantum communication is built on a set of disruptive concepts and technologies. It is driven by fascinating physics and by promising applications. It requires a new mix of competencies, from telecom engineering to theoretical physics, from theoretical computer science to mechanical and electronic engineering. First applications have already found their way to niche markets and university labs are working on futuristic quantum networks, but most of the surprises are still ahead of us. Quantum communication, and more generally quantum information science and technologies are here to stay and will have a profound impact on the twentieth century. Hence, this technology plays a vital role in modern day communication.Abstract
The Role of College Placement Portals in Enhancing Graduates' Employment
Ankita Surendra Singh, Yashi Narayan, Prathamesh Vishnu Chavan , Mohd Areeb Husain Ansari
DOI: 10.17148/IJARCCE.2023.12528
Keywords:
college placement portals, employment prospects, graduates, job search, recruitment processes, chat bot.Abstract
Design and Development of Mechatronic Emergency Ventilator for Treating Breathing Ailments
Hemanth R K, Sudir P, Ganesh K, Deepika B
DOI: 10.17148/IJARCCE.2023.12529
Abstract:
This paper presents the design and development of a mechatronic emergency ventilator for treating breathing ailments. The system was developed to address the increasing demand for ventilators due to the COVID-19 pandemic. The ventilator consists of a mechanical system that provides the necessary air pressure and volume to the patient, and an electronic control system that regulates the respiratory rate and tidal volume. The system was designed with simplicity, portability, and cost-effectiveness in mind, using off-the-shelf components whenever possible. The stepper motor is interfaced with a stepper drive in order to impose a "PUSH-PULL" mechanism to run the AMBU bag, and Arduino is used to interface all of the sensors, motor, and supply. The "PUSH-PULL" technique is used to equalize air pressure. This meets every demand and requirement for the patient with Covid-19.Keywords:
Covid-19, Ventilators, PUSH-PULL, Stepper motor, Stepper drive, Arduino.Abstract
College Recommendation System for Engineering Students
Miss. Neha P. Sharma, Miss. Shraddha P. Bornare, Miss. Akshada S. Satalkar, Prof. Ramesh P. Daund
DOI: 10.17148/IJARCCE.2023.12530
Abstract:
Educational institutions play a crucial role in the growth and development of any nation. Therefore, it is imperative to find a suitable college for pursuing higher education. Our proposed system utilizes data analysis and data mining techniques, with a recommendation system being a critical part of it. The system uses data mining techniques to filter data and present relevant information. It caters to the needs of students, parents, and educationalists who seek guidance while searching for admission in engineering colleges. Many students with impressive scores miss out on their preferred colleges or courses due to lack of proper information. Therefore, we propose a recommendation system for engineering students that considers college NAAC grade and NBA grade.[2] this system will assist students and parents in selecting the desired college. The recommendation system is divided into three modules - Student, College, and Parent login modules, each with unique functions. Parents can also search for the best colleges based on different criteria.Keywords:
Educational institutions, growth and development, suitable college, higher education, proposed system, data analysis, data mining, recommendation system, students, parents, educationalists, admission, engineering colleges, college NAAC grade, NBA grade, missed opportunities, unique functions, parent login module, student module, college module.Abstract
An Software-Defined Radio Based Satellite Gateway For Internet Of Remote Things (IoRT) Applications
Manjunatha Siddappa, Mythri G R
DOI: 10.17148/IJARCCE.2023.12531
Abstract
TECHNOLOGY FOR WEARABLE DEVICES FOR THE DETECTION OF COVID-19
Dr. Nagendra Kumar M, Ganapriya B M
DOI: 10.17148/IJARCCE.2023.12532
Abstract
ORGANIC LIGHT EMITTING DIODES USED IN BIOMEDICAL FIELD
Indu R C, Prasanna Kumar D C
DOI: 10.17148/IJARCCE.2023.12533
Abstract
THE 3D HOLOGRAPHIC PROJECTION TECHNOLOGY BASED ON THREE-DIMENSIONAL COMPUTER GRAPHICS
Veena S, Snayani M
DOI: 10.17148/IJARCCE.2023.12535
Abstract:
3D holographic projection technology is a cutting-edge technology that utilizes computer graphics to create virtual 3D images that appear to be floating in the air. This technology works by projecting light onto a screen or other surface to create the illusion of a three-dimensional image. The images are created using specialized software that generates a virtual model of the object, which is then projected using lasers, mirrors, or other optical devices. The result is a stunning visual display that can be used for a variety of applications, including advertising, entertainment, and education. This technology has the potential to revolutionize the way we interact with the world around us, offering new and exciting ways to communicate and experience information. With continued advancements in computer graphics and hardware, we can expect to see even more impressive applications of 3D holographic projection technology in the years to come.Abstract
PERSONAL SAFETY DEVICE WITH FAKE CRIME ANALYSIS USING IOT AND MACHINE LEARNING
Mrs. Ganavi M, Aliya Naz, Ayesha Siddiqa, Mehroosh Zama, Mizba Noorain
DOI: 10.17148/IJARCCE.2023.12538
Abstract:
In today's world scenario personal safety is one of the most important issues to be addressed in our country. Whenever a person encounters any kind of harassment, sexual abuse or molestation. They need urgent help at that time, proper reachability is not present for them. Apart from being aware about the significance of personal safety, it is essential that they are provided with protection during those critical times. The previous current system is helpful in detecting the person's location after the criminal offense has been committed. In this project we introduce a new technique via smart device, this device makes use of wireless sensors to communicate and send the message to the predefined authorities. The project idea is to provide a quick responding and reporting safety device for everyone. It reports a situation just by pressing button on the smart device. The device mainly works on the concept of emotion recognition which can achieve through CNN machine learning algorithm. The captured image is tested whether it is fake or genuine before sending it to the authorities.Keywords:
Machine Learning, CNN Algorithm, Deep Learning, IoT. ÂAbstract
Solar Energy-based Mobile Charger Using Inductive Coupling Transmission
Akshitha M S, Kalaiah J B
DOI: 10.17148/IJARCCE.2023.12539
Abstract
Predictive Analytics for Predicting Customer Behavior
Anusha A, Kalaiah J B
DOI: 10.17148/IJARCCE.2023.12540
Abstract
Drainage Overflow Detection And Control During Flood
Abhishek Shetty, Basavaraj B Y, Ashwini Bhaskar Kotary, Vikas Jain, Dr. Jayaprakash M C, Dr. Srikrishna Shastri C, Mr. Rajesh N. Kamath
DOI: 10.17148/IJARCCE.2023.12541
Abstract:
Flooding is one of the major disasters occurring in various parts of the world. Due to the high density of buildings, flash floods are prevalent in cities. In such scenarios, there is a possibility of a drainage overflow. Therefore, implementation of an intelligent analysis of drainage leakage detection during flood using sensors are necessitated for the field of research in Disaster management. Floods in india hence became the huge obstacle in achieving economic growth in the country. Unplanned urbanization also has a huge impact on drainage and garbage disposal system. Overflow of drainage water onto the grounds are day to day problems that one living in the cities usually face. Hence to decrease all these effects onto the human life, we come up with this proposed system.Keywords:
Sensors, microcontroller, Blynk cloud, Barriers.Abstract
RICE QUALITY ANALYSIS BASED ON PHYSICAL ATTRIBUTES USING IMAGE PROCESSING
Mrs. THASEEN BHASHITH, G C CHANDAN, ABHAY S GAD, FAISAL S, ZAID KHAN
DOI: 10.17148/IJARCCE.2023.12542
Abstract:
This project aims to assess the quality of various rice samples by processing, enhancing, and analyzing their digital images in the spatial domain. The images are subjected to techniques such as image reduction, enhancement, and increment, as well as object recognition to determine the size, color, and overall quality of the grains of rice. Traditionally, grain quality evaluation has been performed manually, but this approach is relative, time-consuming, and may yield inconsistent results, making it costly. Using image processing and edge detection algorithms, the grain size and shape are evaluated by identifying the boundaries and endpoints of each grain. Additionally, the length and breadth of rice grains are measured. The use of image processing greatly reduces the time required for evaluation. Keywords - Grading, Rice grain, Quality, Image processing, grain evaluationAbstract
DETECTING STRESS IN PATIENTS WITH COMMUNICABLE DISEASES USING A DEEP LEARNING
Dr.P.D.R. Vijayakumar N, M.E., Ph.D., Sowmiya.L, M.E., C. Prathap, D. Revathi, R. Manjushamol, K. Sampeterjose
DOI: 10.17148/IJARCCE.2023.12543
Abstract:
Healthcare is a core of humanâs life. Being healthy is one of the main objectives of life ever since BC. Health is maintained and improved by the lifestyles, social, happiness and even willingness to live. Predicting a person's mood tomorrow, from data collected unobtrusively using wearable sensors and smartphones, could have a number of beneficial clinical applications; While accurately predicting mood and wellbeing could have a number of important clinical benefits, traditional Machine Learning (ML) methods frequently yield low performance in this domain. An integrated system to make human lives more easily and to help people in terms of mental health. The main objective of this project is to classify a new data and inform whether a person with stress is affected from acute stress or chronic stress. We will use the heart rate data taken for months and analyzes the data and find the Heart rate variance that constantly related with the stress. After that a variable is found, which is used as an input to the ensemble classifier which includes the Support Vector Machine (SVM), Decision Tree (DT) and Random Forest (RF) approaches. The best classifier will be selected by voting process.Abstract
DENIAL OF SERVICE DETECTION OF DISTRIBUTED ATTACKS IN SDN USING MACHINE LEARNING
DIVYA.M, RAKESH.P, KARTHIKEYAN.K, SHAMSUNDAR.R, Dr. N. KOTTISWARAN, M.E., Ph.D, Dr. P.D.R VIJAYAKUMAR, M.E.,Ph.D., Mrs.P . GOKILA, M.E., Mr.K. MADESWARAN, M.E
DOI: 10.17148/IJARCCE.2023.12544
Abstract:
Software-defined network (SDN) is a network architecture that used to build, design the hardware components virtually. We can dynamically change the settings of network connections. In the traditional network, it's not possible to change dynamically, because it's a fixed connection. SDN is a good approach but still is vulnerable to DDoS attacks . The DDoS attack is menacing to the internet. To prevent the DDoS attack,  the machine learning algorithm can be used. The DDoS attack Is the multiple collaborated systems that  used to target the particular server at the same time. In SDN control layer is in the center that link  with the application and infrastructure layer, where the devices in the infrastructure layer controlled by the software. In this paper, we propose a machine learning technique namely Decision  Tree to detect malicious traffic. Our test outcome shows that the Decision Tree detects whether the attack is safe or not.Abstract
Credit Card Fraud Detection Framework for E-Commerce Sites
Mrs.Shakila, E. Praveen kumar, R. Pavithran, E. Priyadharshan
DOI: 10.17148/IJARCCE.2023.12545
Abstract
AI CONTENT GENERATOR USING GPT 4
G Yuvaraj, D Milan breuno, M Yabeshraj
DOI: 10.17148/IJARCCE.2023.12546
Abstract:
ACG - Ai Content Generator is a web application which helps us to generate contents for various scenarios such as (product description, job description, cold emails etc..) This software is making use of GPT-4. GPT-4, or the fourth generation Generative Pre-trained Transformer, is a neural network machine learning model trained using internet data to generate any type of text. Developed by OPENAI, it requires a small amount of input text to generate large volumes of relevant and sophisticated machine-generated text. The process goes like the user can choose what content they have to generate so based upon their customized request, the user can choose and give key words in the search box corresponding to it . So once it is done then, then the GPT-4 API will be activated with the help of the openai key . Then the request will be handled by the GPT-4 and the desired content will be generatedKeywords:
Artificial Intelligence, Machine Learning, BERT, API Key, GPT 4 (Fourth generation ,Generative Pre-trained Transformer),Abstract
SKIN LESION DETECTION FROM DERMOSCOPIC IMAGES USING CASCADED ENSEMBLING OF CNN
Anil Kumar R, Sneha N V
DOI: 10.17148/IJARCCE.2023.12547
Abstract
TECHNOLOGIES FOR GESTURE BASED TOUCHLESS INTERACTION WITH LARGE DISPLAY
Savitha M M, Gagana N V
DOI: 10.17148/IJARCCE.2023.12548
Abstract:
The development of touchless interaction devices has improved important observation in recent years, especially in the circumstances of large displays. One such system is gesture-based touchless interaction, which enables users to interact with large displays using natural gestures without physically touching the screen. From this paper, we benfit  an abstract for gesture-based touchless interaction with large displays. I relate the technical components for the technique, including the sensors, recognition algorithms, and user interface. We also discuss the application possibilites of such a system, including in public spaces, education, and entertainment. Finally, we address some of the challenges related with the implementation and use of gesture-based touchless interaction with large displays, such as accuracy, ergonomics, and user privacy. Overall, we argue that gesture-based touchless interaction is the good way for the development of large display interaction systems, offering a more intuitive and engaging user experience. Keywords: gesture-based, touchless interaction, large displays, sensors, recognition algorithms, user interface, public spaces, education, entertainment, accuracy, ergonomics, user privacy.Abstract
High Speed Inter-Satellite Optical Communication
Dr. C Rangaswamy, Gireeshma A S
DOI: 10.17148/IJARCCE.2023.12549
Abstract
EXTRUSION, INKJET AND LASER ASSISTED BIOPRINTING
ANIL KUMAR R, PREETHI D M
DOI: 10.17148/IJARCCE.2023.12550
Abstract
Handwritten Digit Recognition Using Deep Learning
Swetha P, Vidya A, Muthupriya J, Maheswari M
DOI: 10.17148/IJARCCE.2023.12551
Abstract:
In order to meet the needs of paperless offices and greatly improve word efficiency, it is necessary to research and implement a handwritten digit recognition system. Handwritten digit recognition plays and important role in large-scale data statistics and the financial business, such as industry annual inspection, population census, tax statements and checks, etc. This project proposes a new type of handwritten digit recognition system based on convolutional neural network (CNN). In order to improve the recognition performance, the network was trained with a large number of standardized pictures to automatically learn the spatial characteristics of handwritten digits. For model training, according to the loss function, the convolutional neural continuously updates the network parameters with the data set in MNIST, which contains 60,000 examples. For model test, the system uses the camera to capture the pictures composed of the images generated by the test data set of MNIST and the samples written by different people, then continuously processes the captured graphics and refreshes the output every 0.5 seconds. With the trained deep learning model, we got a recognition accuracy of 99.3% in test process. Good performance in this experiment shows that our system can automatically recognize the handwritten digital content appearing in the target area and output the content label in real time. ÂKeywords:
Digit Recognition, Deep Learning, Convolutional Neural Network (CNN), MNIST data set, Real-time recognition, Image processing, Machine learningAbstract
QUANTUM DOTS ON SOLAR CELL
Sri Ramu D S, Rishi Nagendra
DOI: 10.17148/IJARCCE.2023.12552
Abstract
COUNTERFIET DETECTION IN NATIONAL IDENTITY CARDS USING IMAGE STEGANOGRAPHY
Mounica.R, Nikitta Joshie.J, Sahaya Rani.A, Geetha.G
DOI: 10.17148/IJARCCE.2023.12553
Abstract:
 A national identity document is an identity card with a photo, usable as an identity card at least inside the country, and which is issued by an official authority. The most common applications for these smart cards are smart to travel documents, electronic IDs, electronic signatures, municipal cards, key cards used to access secure areas or business infrastructures, social security cards, etc. These documents have several security features which mitigate and combat document forgery. As these security systems are difficult to circumvent, criminal attacks on ID verification systems are now focusing on fraudulently obtaining genuine documents and the manipulation of the facial portraits. Trusted identity is a vital component of a well functioning society. To reduce risks related to this fraud problem, it is necessary those governments and manufacturer of IDs continuously develop and improve security measures. With this in mind, we introduce the first efficient steganography method â StegoCard â which is optimized for facial images printed in common IDs. StegoCard is an end-to-end facial image steganography model that is formed by n Deep Convolutional Auto Encoder, that can conceal a secret message in a face portrait and, hence, producing the stego facial image, and a Deep Convolutional Auto Decoder, which is able to read a message from the stego facial image, even if it is previously printed and then captured by a digital camera. Facial images encoded with our StegoCard approach outperform the StegaStamp generated images in terms of their perception quality. Peak Signal-to-Noise Ratio, hiding capacity and imperceptibility results on the test set are used to measure the performance.Abstract
BLUETOOTH EMBEDDED ROBOTIC WITH AGRICULTURE SEEDING AND GRASS CUTTING POWERED BY SOLAR ENENGY
Prof. Ravi Kiran R, Bindu A R, Chandana R A, Darshan S R
DOI: 10.17148/IJARCCE.2023.12554
Abstract
A Method to Achieve Data Security Using RSA Algorithm and Fingerprint
Ganavi M, Suhas S A, Chandan Singh, Karthik V R, Sahana C
DOI: 10.17148/IJARCCE.2023.12555
Abstract:
In the present world, the data security is the major problem. The data should be secured in such a way that only the sender and the receiver should be able to view the original data. Most of the traditional techniques that are being used today uses the generic functions, random key generators, or algorithms to generate the keys. But the keys generated using the traditional techniques will not be unique to each and every individual. So, the Biometric Cryptosystems can be used to achieve the data security. The Biometrics, such as fingerprints can be used for data security. Since the fingerprints of each and every individual in the world is unique, the keys generated using the fingerprints will be unique. In this work, the fingerprint of the individual is taken as the input to generate the prime numbers using the minutiae points. The generated prime numbers are then given as the input to the RSA algorithm to generate the keys. The generated keys are then used for the encryption and the decryption process. ÂKeywords:
Fingerprint feature, Minutiae points, RSA algorithm, Cryptography, Data securityAbstract
SMART DUSTBIN USING IoT
Nandish M, Anusha B V, Pooja M R, Rithu S M, Sumathi P
DOI: 10.17148/IJARCCE.2023.12556
Abstract
NON-INVASIVE BRAIN STIMULATION-ENHANCING TECHNIQUES
Prof. Ravi M V, Raksha A
DOI: 10.17148/IJARCCE.2023.12557
Abstract
AI Based Technology For Face Recognition
C Rangaswamy, Gayithri v
DOI: 10.17148/IJARCCE.2023.12558
Keywords:
Convolutional Neural Network, Transfer Learning, Face Recognition, Artificial Intelligence.Abstract
DIABETIC RETINOPATHY DETECTION USING VGG-NIN A DEEP LEARNING
DEEPAKRAJ.M, DHIVYA.PV, SATHYASEELAN.M, SHABARI.M, Dr. N . KOTTISWARAN, M.E., Ph.D, Dr. P. D. R VIJAYAKUMAR, M.E., Ph. D, Mrs. P. GOKILA, M.E, Mrs. A. SARANYA, M.E
DOI: 10.17148/IJARCCE.2023.12559
Abstract:
Diabetic Retinopathy (DR) is a disease that damages retinal blood vessels and leads to blindness. Usually, colored fundus shots are used to diagnose this irreversible disease. The manual analysis (by clinicians) of the mentioned images is monotonous and error-prone. Hence, various computer vision hands-on engineering techniques are applied to predict the occurrences of the DR and its stages automatically. The VGG16, spatial pyramid pooling layer (SPP) and network-in-network (NiN) are stacked to make a highly nonlinear scale-invariant deep model called the VGG-NiN model. The proposed VGG-NiN model can process a DR image at any scale due to the SPP layerâs virtueAbstract
Network Filtering Using Different Technologies
Prof. Ravi M V, Sai Vennela K S
DOI: 10.17148/IJARCCE.2023.12560
Abstract:
In Network filtering is a technique used to control the flow of data in a network by selectively allowing or blocking traffic based on predetermined rules or criteria. There are various technologies available for implementing network filtering, each with their own strengths and weaknesses. One commonly used technology is firewall filtering, which is based on predefined rules that determine what traffic is allowed or blocked. Another technology is intrusion prevention systems (IPS), which use deep packet inspection to detect and block potentially harmful traffic. Content filtering is another popular technology that filters data based on its content, such as blocking websites containing specific keywords or categories.Abstract
Background Radiation Surveillance Using An Autonomous UAV
Dr. Sonali Ridhorkar, Ayush Singh, Shreeyash Pandey, Anshul Nagrare
DOI: 10.17148/IJARCCE.2023.12561
Abstract:
Background radiation is an important aspect of environmental monitoring, as it can have significant impacts on human health and safety. In recent years, advances in technology have made it possible to measure background radiation more accurately and efficiently. One promising approach involves the use of drones, which can cover large areas quickly and provide high-resolution data. The key challenge in this approach is to develop a reliable method for collecting and analysing the data. To address this challenge, this paper presents a novel method for measuring background radiation using drones equipped with wireless transfer capabilities and custom software. The drones are flown at predetermined altitudes and collect data using radiation sensors. The data is then transmitted wirelessly to a ground station, where it is processed and analysed using custom software. The results of our experiments show that this method is highly effective in measuring background radiation over large areas. The data collected by the drones is accurate and reliable, and the custom software provides a powerful tool for analysing and visualizing the data. This approach makes it easier and more efficient to gather data and identify potential health risks.Keywords:
Background Radiation, ESP8266, GPS, Geiger Counter, UAV, IoTAbstract
DEVELOPMENT OF IOT BASED SMALL COMPACT ENERGY METER
Anil Kumar R, Sahana A
DOI: 10.17148/IJARCCE.2023.12562
Abstract
Driver Driving Performance Analysis And Risk Detection Using Deep Learning
Mrs.G.Geetha, J.Navin, P.Sanjeevi, M.Surya Sivaraj
DOI: 10.17148/IJARCCE.2023.12563
Abstract:
Distracted driving is any activity that deviates an individualâs attention from driving. Driver inattention and distraction are the main causes of road accidents, many of which result in fatalities. Driver distraction is a major cause of road accidents. Distracting activities while driving include text messaging and talking on the phone. Currently, distraction detection systems for road vehicles are not yet widely available or are limited to specific causes of driver inattention such as driver fatigue. Research efforts have been made to monitor drivers' attention states and provide support to drivers. Both invasive and non-invasive methods have been applied to track driver's attention states, but most of these methods either use exclusive equipment which are costly or use sensors that cause discomfort. The existing work of distracted driver detection is concerned with a limited set of distractions(Mainly cell phone usage).In this paper, a robust driver distraction detection system that extracts the driver's state from the recordings of an onboard camera using Deep Learning based Faster Region Convolution Neural Network (FRCNN).This project uses the state farm distracted driver detection, which contains four classes: calling, texting, looking behind, and normal driving The main feature of the proposed solution is the extraction of the driver's body parts, using deep learning-based segmentation, before performing the distraction detection and classification task. Experimental results show that the segmentation module significantly improves the classification performance. The average accuracy of the proposed solution exceeds 96% on our data set. The class activation map (CAM) of our proposed method is subjectively more reasonable, which would enhance the reliability and explain ability of the model.Keywords:
Alert Message, DD, FRCNN, Face Detection,Abstract
Landmine Detection Using Impluse Ground Penetrating Radar
Veena S, Shruthi K G
DOI: 10.17148/IJARCCE.2023.12564
Abstract
SENSORS DRIVEN AI-BASED AGRICULTURE RECOMMENDATION MODEL FOR ASSESSING LAND SUITABILITY
Dr. Nagendra Kumar M, Darshan k Gowda
DOI: 10.17148/IJARCCE.2023.12565
Abstract:
The world population is expected to grow by another two billion in 2050, according to the survey taken by the Food and Agriculture Organization, while the arable area is likely to grow only by 5%. Therefore, smart and efficient farming techniques are necessary to improve agriculture productivity. Agriculture land suitability assessment is one of the essential tools for agriculture development. Several new technologies and innovations are being implemented in agriculture as an alternative to collect and process farm information. The rapid development of wireless sensor networks has triggered the design of low-cost and small sensor devices with the Internet of Things (IoT) empowered as a feasible tool for automating and decision-making in the domain of agriculture. This research proposes an expert system by integrating sensor networks with Artificial Intelligence systems such as neural networks and Multi-Layer Perceptron (MLP) for the assessment of agriculture land suitability. This proposed system will help the farmers to assess the agriculture land for cultivation in terms of four decision classes, namely more suitable, suitable, moderately suitable, and unsuitable. This assessment is determined based on the input collected from the various sensor devices, which are used for training the system. The results obtained using MLP with four hidden layers is found to be effective for the multiclass classification system when compared to the other existing model. This trained model will be used for evaluating future assessments and classifying the land after every cultivationAbstract
Intelligent Alarm System for Driver Drowsiness Detection
Gunasundari B, Gaddam Bhargavi, Elluru Rishitha, Kalluri Lakshmi prasanna
DOI: 10.17148/IJARCCE.2023.12566
Abstract:
With increase in the population, accident rates are also increasing rapidly, the main reason is drowsiness of the driver. Such lethal incidents can be prevented if the driver is warned in time. To implement this technology, we proposes a smart alarm system to detect the drowsiness of driver using facial expressions and eye movements. Here open computer vision is used to detect driverâs eye movements for a long time. We propose an approach based on Convolutional Neural Networks (CNN) that describes the object detection problem as sleepy detection. Based on the drivers' real-time video feed, it can detect and identify whether the eyes are open or closed. The technology used in this object detection challenge is the cellular CNN architecture with a single-shot multi-box detector. A different algorithm is used based on the output produced by the SSD_MobileNet_v1 architecture. A dataset of approximately 4,500 photographs of yawning, non-yawning, eyes-open, and eyes-closed subject faces was labelled to train the SSD_MobileNet_v1 network. The trained model is tested on about 600 randomly selected photos. The suggested strategy will guarantee improved computing efficiency and accuracy.Keywords:
single shot multi-box detector, Deep learning, Smart alarm, eye tracking, drowsiness detection.Abstract
Hand Sign Detection System for Deaf and Dumb People
Dinesh Suresh Bhadane, Riddhi Mukkawar, Srushti Bhasme, Shreya Thakur
DOI: 10.17148/IJARCCE.2023.12567
Abstract:
Hand gestures are a type of non-verbal communication that can be utilized in many contexts, such as deaf-mute communication. The automatic interpretation of sign language is a research area that has not gotten much attention, despite the fact that it is essential for hearing impaired and silent persons to live independent lives as sign language is their primary mode of communication. Numerous methods and algorithms have been created in this field with the help of artificial intelligence and image processing. To recognize the signs and translate them into the necessary patterns, any system that understands sign language has undergone considerable training. This will help deaf people to communicate with the outside world easily. This proposed technique helps vocally disabled people to communicate.Keywords:
Human-Machine Interaction, Gesture Recognition, Machine Learning, Neural Networks, Convolutional Neural Network.Abstract
DETECTION OF ALIVE HUMAN IN DISASTER SUSCEPTIBLE AREAS USING RENESAS BASED ROBOT
Asharani M, K Sreekanth Reddy, Tejas Gowda S M, Karthik H S
DOI: 10.17148/IJARCCE.2023.12568
Abstract: In this paper, for detecting alive humans in disaster susceptible areas using an mobile robot is proposed. The soldiers are sent to save the victims who are struck in disaster. This causes risk to the soldiers lives also. Therefore, this mobile robot is developed. It consists of RFID to identify soldiers who are present in rescue operation.
The unknown Human is detected using Passive-Infrared Sensor. The notification about the soldiers and other people in the disaster can be sent to control room through GSM module. The movement of the robot can be controlled from control room itself. The live video of surrondings is also sent to the control room through wireless camera.
Keywords: RFID,Mobile Robot,PIR sensor,Wireless Camera.
Abstract
PHOTO CHAIN A BLOCKCHAIN BASED SECURE PHOTO SHARING FRAMEWORK FOR CROSS-SOCIAL NETWORK
Mr.A.Anist, M.Prajith, M.Raymond Raj, L.Sathiya Prakash
DOI: 10.17148/IJARCCE.2023.12569
Abstract
IOT BASED SMART ELECTRIC VEHICLE WIRELESS CHARGING WITH REAL TIME LOCATION TRACKING
Lakshith K L, Manjunath Badiger, Naveen H V, Prasanna Kumar D C
DOI: 10.17148/IJARCCE.2023.12570
Abstract:
The system would likely involve multiple components, such as charging stations equipped with wireless charging technology, EVs that are outfitted with compatible hardware and software, and a central system that manages and tracks the charging and location data. The wireless charging would allow EVs to recharge their batteries without physical connections or cables, which could make charging more convenient and efficient for users. The real-time location tracking would enable the central system to check the location of each EV, which could be useful for managing charging demand, identifying trends in usage patterns, and optimizing the distribution of charging resources. Overall, this paper would likely require a combination of hardware and software expertise,as knowledge of wireless charging and location tracking technologies. Additionally, there may be regulatory and safety considerations to the use of wireless charging systems in public areas, which would need to be carefully managed and addressed.Abstract
Feet-Beat: A Wearable device using FITS
Darshan S R, Ravikiran R
DOI: 10.17148/IJARCCE.2023.12571
Abstract
IDENTIFYING THE OBJECT AND OBSTACLE DETECTION FOR BLIND PEOPLES
Sneha S, Vijayalaxmi S, Maheswari M, Dr. Roselin Mary S
DOI: 10.17148/IJARCCE.2023.12572
Abstract:
 Sight and touch are the basic sensory systems for human interaction with the environment. For blind amputees, one of the key challenges is how to quickly and intuitively convey information about the environment to restore their daily life abilities. Inspired by the ability of human auditory localization, we constructed a virtual scene almost identical to reality and at the same time added a virtual sound source to the interactive object. Using the spatial sound rendering (SAR) method, the three-dimensional movement of a virtual sound source can be simulated live in real time. Finally, a myoelectric prosthetic control system was developed to assist blind amputees in their daily activities. The Fitts' law test for target localization was performed on both SAR and voice guidance (VP) guidance methods, the results indicate that SAR significantly improves the information transfer rate. Prosthetic control test results show that SAR reduces the completion time by half compared to VP while restoring the natural grasp path. With the advantage of intuitive and rich perception, SAR demonstrated potential applications for blind amputees to reconstruct control and sensory loops.Keywords:
Object and Obstacle detection, Convolutional Neural Network (CNN)Abstract
i-Speculum:Touch Based Smart Mirror
Dinu PD, Harshita Pengoria, Kunal J B, Mandara M, Mr Hiriyanna G S
DOI: 10.17148/IJARCCE.2023.12573
Abstract:
i-Speculum aims to enhance the concept of smart mirrors by incorporating interactive features such as voice inputs and outputs, gesture control, and touchscreen capabilities. The smart mirror's software, powered by Raspberry Pi, recognizes users through facial recognition or voice control, allowing easy access to personalized information such as emails, smart home controls, and daily news updates. By presenting information in an intuitive and accessible format, smart mirrors improve productivity and convenience while reducing reliance on traditional computing devices. The combination of a traditional mirror's reflection and a computer display's versatility makes smart mirrors a promising technology for the future.Keywords:
I-speculum, Smart Mirror, Raspberry Pi, Interactive FeaturesAbstract
3D MULTIMODEL BRAIN TUMER IMAGE CLASSIFICATION AND SEGMENTATION USING DEEP LEARNING
Mrs.P.Gokila, M.E, Mrs.P.Sundari, M.E, Aathifa Nusrath.S, Aishwarya.J, Gowtham.S, Manoj.M
DOI: 10.17148/IJARCCE.2023.12574
Abstract:
Brain tumor segmentation from 3D images is one of the most important and challenging tasks in the field of medical imaging. Manual classification can lead to false predictions and diagnoses. Moreover, this is a difficult process when the supporting data is enormous.. Extracting brain tumour regions from MRI images becomes challenging due to the great variety of appearances of brain tumours and how similar they are to normal tissues. In this article, we designed a modified U-Net architecture under a deep learning framework for brain real images for medical imaging and computer-assisted interventions provided by the BRATS 2020 dataset. Test accuracy of 99.4% has been achieved. A comparative review with other papers shows our model using U-Net performs better than other deep learning-based models.Keywords:
Deep learning,brain tumor classification and segmentation,3d unet architecture.Abstract
A TECHINQUE TO IMPLEMENT A ROBOT FOR SCRAP COLLECTION
Prof.Anil Kumar R, SHIVA A R
DOI: 10.17148/IJARCCE.2023.12575
Abstract:
Scrap collecting robots are becoming increasingly important as waste management and recycling become critical environmental issues. This paper presents a comprehensive review of the literature on scrap collecting robots, focusing on recent advancements, technologies, applications, and future directions. The types of scrap collecting robots, advantages, and technologies used are discussed, including the use of sensors, artificial intelligence, and machine learning. The paper also presents the applications of scrap collecting robots in residential, commercial, industrial settings, and disaster response. The need for continued research and development is emphasized, as scrap collecting robots are poised to play a crucial role in addressing environmental challenges in waste management and recycling.Abstract
TECHNOLOGIES FOR MONITORING TRAJECTORY OF BALL
Prof. Anitha C, Babitha M
DOI: 10.17148/IJARCCE.2023.12576
Abstract:
Recently, the increase in the number of sport lovers in games like football, cricket, hockey etc. has created a need for digging, analyzing and presenting more and more multidimensional information to them. Different classes of people require different kinds of information and this expands the space and scale of the required information. Tracking of ball movement is of utmost importance for extracting any information from the ball based sports video sequences. Detection is the first step of tracking. Dynamic and unpredictable nature of ball appearance, movement and continuously changing background make the detection and tracking processes challenging. Main intention is to evaluate the quickest way to detect the ball in any sport event in order to develop sports, AI without spending million dollars on techor developers by comparing different technologies.Abstract
KIDNEY STONE DETECTION USING MATLAB
Kratika Verma, Siddharth Yadav, Er. Vivek Yadav
DOI: 10.17148/IJARCCE.2023.12577
Abstract:
Nowadays, kidney stone has become a major problem and if not detected at an early Stage, then it may cause complications and sometimes surgery is also needed to remove the stone. This study presents an ultrasound speckle suppression method to detect the stones in the human kidney. An initial image is first improved using image enhancement techniques, which are used to change the imageâs intensities. Next, median filters smooth the picture and eliminate noise. Pre-processed images are segmented using a thresholding technique. The suggested approach locates stones using location coordinates. The suggested scheme has been assessed by different performance measuring parameters. Physicians are likely to benefit from the research in terms of clinical diagnosis and educational training. Based on 30 test cases, the proposed plan was correct 96%. Key Words: Kidney stone detection, image processing, wavelet processing, ultrasound images, median filter, canny edge detection.Abstract
A Survey on Pothole and Hump detection system using IOT
Prashanth M V, Hemanth R, Inchara N P, Niharaika R, Harshith B
DOI: 10.17148/IJARCCE.2023.12578
Abstract
Automatic Kidney Lesion Detection using Deep Learning - A Survey
Prof. Neeti Shukla, Pavan C, Prajwal C K, Rakshith N U, Rethick Shinde S
DOI: 10.17148/IJARCCE.2023.12579
Abstract
PROPULSION TECHNOLOGY FOR JET PACK SUITS
Sri Ramu D S, Sri Hari Prasad HS
DOI: 10.17148/IJARCCE.2023.12580
Abstract
Tool for Management of Human And Robot using Medical ChatBot
Sai prathyush. S, Maheswari M
DOI: 10.17148/IJARCCE.2023.12581
Abstract:
A decent existence requires access to quality healthcare. It is extremely important to our day-to-day existence. Nevertheless, getting a doctor's appointment for each health issue is exceedingly difficult. The goal is to create a medical chatbot using computer science that will propose a doctor who specializes in a certain ailment. This can make it easier to increase access to medical data via chatbots. Chat bots are software applications that converse with users by using language. The chatbot keeps the data within the data to identify the sentence keywords, create a call to action, and respond to the question. Conversational User Interfaces (CUIs) let users interact with computers in a direct, human-like way. The way we engage with computers and applications is radically altered.CUI is utilized in this study to train data and a variety of packages that help us provide suitable satisfactory outcomes For the purpose of recovering findings, we will combine machine Learning with Natural Language Processing in this chat bot. Care plays an important role in our daily lives; whenever someone is ill, they visit their general practitioner or a nearby clinic to learn more about the issues they are facing. In recent years, a number of organizations and businesses have worked with hospitals to produce support that could help doctors and medical staff deal with patients in a better manner and reduce their labor by using technology; not only does this help the project's main goal is to help you convey information that you have mined more effectively (information) using Access to timely, easy, contextual information is required for both customers and staff.Keywords:
 Chat Bot System which can make suggestions to help people with correct decision making without making a failurre of treatment in initial stages of curing disease for hospital and people benefits.Making Faster Progress and results of health development in good side.Abstract
Realtime Wireless Embedded Electronics for Soldier Security
Akshitha M.S, A.Hemanth Kumar, Anusha.A, Prof.Kalaiah J B
DOI: 10.17148/IJARCCE.2023.12582
Abstract
A Review of Determination and analysis of arthritis using digital image processing
Dr. K S Shivakumar, Akhila R G, Anjali J, B Pavitra, C Tejeswini
DOI: 10.17148/IJARCCE.2023.12583
Abstract
BRAIN TUMOUR PREICION USING MOBILE NET-DEEP LEARNING AND SEGMENTATION CNN ALGORITHM
Chandini.R, Monika.D, Amsavalli.k, Maheswari.M
DOI: 10.17148/IJARCCE.2023.12584
Abstract:
To analyse the tumours and help patients receive the appropriate treatment according to their classifications, it is essential to have a thorough understanding of brain disorders such as classifying Brain-Tumors (BT). There are many imaging techniques for BT detection, including magnetic resonance imaging (MRI), which is frequently used due to the higher image quality and fact that it uses non-ionizing radiation. With the help of two datasets and a Gaussian Convolutional Neural Network (GCNN), this research suggests a method for identifying different BT types. To categorise tumours into pituitary, glioma, and meningioma, one of the datasets is employed.Keywords:
Deep learning, brain tumor classification, Gaussian convolutional neural networkAbstract
Novel and Secure Blockchain Framework for Health Applications
Veena S, Prakruthi MS
DOI: 10.17148/IJARCCE.2023.12585
Abstract
WEED DETECTION USING IMAGE PROCESSING AND MACHINE LEARNING
Veena S, Srushti N
DOI: 10.17148/IJARCCE.2023.12586
Abstract
Human Identification Based on Freestyle Activities
Balaji M, Logeshkumar D, Dr Roselin Mary S
DOI: 10.17148/IJARCCE.2023.12587
Abstract:
Human Identification Based on Free-Style Activities is a system designed to identify individuals by analyzing their unique patterns of free-style activities, such as walking, running, or gestures. The system aims to provide a reliable and efficient method of identification that goes beyond traditional biometric measures. By leveraging advanced algorithms and machine learning techniques, it captures and analyzes the distinctive characteristics of an individual's activities to establish their identity. This abstract presents the concept and potential benefits of Human Identification Based on Free-Style Activities, highlighting its potential applications in security, surveillance, and forensic investigations.Keywords:
Free-Style Activities, Activity Recognition, Unique Patterns, Machine Learning.Abstract
Hand Cricket Game Using CNN Squeeze Network
M.Krishna Raj, N.A.Abinesh, G.Bhuvanesh, S.Bhuvaneswaran
DOI: 10.17148/IJARCCE.2023.12588
Abstract
GLAUCOMA DETECTION IN RETINAL IMAGE
P. Roopa Ranjani, M.Jahnavi, K.Mahimasri, S.Sneha
DOI: 10.17148/IJARCCE.2023.12589
Abstract:
The main objective of this proposed system is to detect Glaucoma in the retinal image. Glaucoma is an eye condition that canât be healed once it happens. In case the corrective therapy does not continue, it causes a permanent visual disability so it cannot be ignored. Treatment will be helpful when the disease is identified at an early stage. Most of the research describes different techniques widely incorporated in the detection of Glaucoma disease. In this proposed system, the detection of Glaucoma is identified through Image Pre-processing and SVM algorithm. Pre-processing operators like Segmentation, Enhancement, Binarization, and Thresholding are used to extract the optic cup and optic disc from the retinal image to find the CD R. This proposed technique is based on OTSUâs segmentation method to locate the Optic cup and disc. Calculating only the CDR (Cup-to-Disc ratio) does not help to distinguish all the images as Glaucomatous or normal. Thus, RDR (Rim-to-Disc ratio) is considered another feature for Glaucoma assessment. The SVM (Support Vector Machine) algorithm plays an important role.Keywords:
Cup to Disc Ratio (CDR), Rim to Disc Ratio (RDR), Support Vector Machine (SVM), Optic Disc (OD), Optic Cup (OC), and Region of Interest (ROI).Abstract
PREDICTION OF AIR POLLUTION USING SUPERVISED MACHINE LEARNING TECHNIQUES
Mrs.Shakila, Anitha A, Devada Geetha Madhuri C, Harini S
DOI: 10.17148/IJARCCE.2023.12590
Abstract
TECHNOLOGIES USED FOR DESALINATION OF SEAWATER INTO DRINKABLE WATER
Manjula K, Lokesh C
DOI: 10.17148/IJARCCE.2023.12591
Abstract
ULTRA HIGH PERFORMANCE INLINE CONTACT RF MEMS SWITCH
MADHUKARA S, LAVANYA L
DOI: 10.17148/IJARCCE.2023.12592
Abstract
NIGHT VISION TECHNOLOGY
Afzal Pasha M, Prof. Shreehari H S
DOI: 10.17148/IJARCCE.2023.12593
Abstract:
The various "Night Vision" techniques are referred to as invention that gives us the mysterious phenomenon of vision in all out dimness and vision adjustment in low light conditions. This invention is an amalgamation of a few distinct strategies each with their own different focal points and inconveniences. Low- Light Imaging, Thermal Imaging and Illumination are the most commonly known techniques. various night vision gadgets (NVDs) that allow images to be produced in levels of light moving towards adding up to darkness, as well as clarifies various applications where innovation in night vision is used to care for of different issues because of low light conditions . Pedestrians and animals have the greatest risk in night time traffic due to darkness, the ability to identify such objects should be the key performance requirement, and the device should remain successful when facing oncoming vehicles 'headlights. The infrared system has been shown to be superior to the near infrared system. Near infrared images have been identified as having substantially higher visual clutter compared to far- reaching infrared images. The visual clutter is shown to correlate with reduced pedestrian detection distance. Far- infrared images are thought to be more peculiar and hence more difficult to view, although the presence of the image is presumably related to the lower visual clutter.Abstract
TRAFFIC LIGHT MANAGEMENT SYSTEM USING OPENCV
Riya Saxena, Poonam Yadav, Abhitanshu Pratap Singh Raghav, Sahil Agarwal, and Mr. Mahendra Singh
DOI: 10.17148/IJARCCE.2023.12594
Abstract:
Traffic jams have become one of the biggest problems any metropolitan city faces in todayâs time. This paper suggests implementing a smart traffic detector using OpenCV. The density of vehicles on the road keeps increasing to a higher amount these days. In traffic signal, people waste much time particularly during the peak hours of the day. In order to solve this problem of high traffic pressure, it is indispensable to solve traffic congestion. The frustration that is faced by people during traffic jams could also lead to mishaps such as accidents. Thus an idea of monitoring the traffic congestion using real-time image processing techniques, through this software has been proposed. The theme is to determine the traffic density on each side of the road by calculating the number of vehicles at the traffic signal zone. In this, an input image of traffic surveillance is shown to our trained machine which declares whether there is traffic or not by judging via the number of vehicles seen. After the image acquisition, the image undergoes various image pre-processing, image enhancement, and edge detection techniques. This project has been customized to be used in the future to control the traffic signals as well as monitor violators and avoid inconvenience and accidents as much as possible. Â Keywords: Traffic Sign, Arduino UNO, Node MCU, CameraÂAbstract
Software Defined Radio Platforms for Wireless Technologies
Chandana G, Savitha M M
DOI: 10.17148/IJARCCE.2023.12595
Abstract
GLOBAL WIRELESS E-VOTING SYSTEM
Dr. Nagendra Kumar M, Vinay N
DOI: 10.17148/IJARCCE.2023.12596
Abstract:
As we are seeing much better growth in technology but we donât see that its level is being properly utilized in the voting system. The present voting system is highly unsecured and itâs not efficient in utilizing the current technology i.e., It canât determine that the person who come for voting is eligible or not, it just depends on the voting in-charge officer in the booth. Here there is also a possibility to boost the vote number as the vote count lies within the piece of equipment and if the in-charge officer is corrupted, he has the chance to do it, even while transporting the machines to the strong room. Hence we canât rely on it any more. In the projected system, i.e., âGlobal wireless e-voting systemâ, machine is made smart that it can find out whether the voter is qualifiedfor voting or not with the help of scanning the eye pattern of the voter and also the vote count is not maintained in the machine itself .Vote count is made to be stored in a remote server by converting them into radio waves. Hence there wonât be any scope of escalating the vote count. Even the machine fails; there wonât be any problem to the votes that are casted as they are saved in the server. By this we can reduce many problems regarding the present EVMâs.Abstract
SMART AGRICULTURE BASED ON WIRELESS SENSOR NETWORKS
Dr. Nagendra Kumar M, Suprith S
DOI: 10.17148/IJARCCE.2023.12597
Abstract:
India's economy is based largely on agriculture, which supports nearly 70% of the population. To meet the global population's demand for food, agriculture's yield needs to be rapidly increased. The Wireless Sensor Network (WSN) is a modern technology used to address a variety of current issues. In many fields, including transportation, medicine, the military, mobile phones, home appliances, and others, WSN is crucial. All living things rely on agriculture as one of their major food sources. Agriculture crops, however, are now impacted by numerous environmental changes. WSN plays a significant role in the field of agriculture to combat this. WSN is used in agriculture for monitoring, temperature measurement, irrigation system measurement, water supply measurement, and other tasks. WSN enables the farmer to increase crop production while lowering yield costs. Climate change, environmental change, and natural disasters all have an impact on agriculture. The management of soil and water can be done using WSN. Here, wireless sensors are utilised, resulting in very low implementation costs. In this study, the crops are observed using wireless sensor nodes. Sensors can be used to measure temperature, humidity, and other theft indicators. Agriculture's productivity is boosted as a result. Automatic processes reduce the need for human effort and encourage farmers to develop their farmland. Using GPS, the location of the farmland can be transmitted. The use of sensors, Wi-Fi, cameras, and other devices helps to make agriculture as smart as possible. All collected data are kept in memory or the cloud. Thus, this system helps the agriculturists, landowners and research experts to monitor these parameters at the base station without going to the field site. The measured data is appropriately archived in the database and displayed using a GUI tool as well. The system's design incorporated the IRIS mote, MDA100 data acquisition board, and MIB520 USB interface board. We use Microsoft Visual Studio to create the GUI tool and the TinyOS operating system to create the wireless node software. For node-to-base station communication, the direct topology and ZigBee IEEE 802.15.4 protocol are utilised. Finally, we also talk about potential future research areas.Abstract
IoT-based Crop Monitoring and Decision Support System for Precision Farming
Narendra U P, Akshatha, Chaithra Shettigar, Deepthi R Shetty, Shreya G, Vijay G H
DOI: 10.17148/IJARCCE.2023.12598
Abstract: Crop prediction using Machine Learning (ML) and Internet of Things (IoT) based solutions is promising approach to guarantee food security and sustainable agriculture. Algorithms based on Machine Learning have shown promising results in predicting crop yields based on various environmental elements such as weather, soil conditions, and irrigation patterns. The project presents an alternative approach for crop prediction using ML. This approach involves integration of various sensors and IoT devices to collect data on various ecological factors that are known to affect crop yields, such as temperature, humidity, rainfall, and soil nutrient levels. To evaluate our approach, we collected data on crop yields and environmental factors for several years from multiple farms in different regions. The data is pre-processed and used to train the ML model, and its accuracy in predicting crop yields for a specified set of environmental conditions is tested. The outcomes reveal that this approach outperforms traditional methods of crop prediction, such as statistical regression models. The ML model was able to precisely predict crop yields with an average error rate of less than 4%. This demonstrates the potential of ML algorithms in improving crop yields and ensuring food security. In conclusion, this approach of crop prediction using ML is a promising method for improving agriculture and food security. By leveraging the power of ML algorithms and collecting data on various environmental factors, it can accurately predict crop yields and optimize agricultural practices. This may significantly affect food production worldwide and contribute to feeding the world's expanding population.
Keywords: Crop Prediction, ML Algorithm, Environmental Factors, IoT based Solutions, Food Security, sustainable agriculture.
Abstract
A SMART MOTION DETECTION SURVEILLANCE ROVER WITH NIGHT PATROLLING FOR SAFETY AND MONITORING PURPOSES
Dr. Nagendra Kumar M, Chinmayi N, Chiranth M A, Ganapriya B M
DOI: 10.17148/IJARCCE.2023.12599
Abstract
Soft,Wearable Robotics and Haptics
Ganesh k, Dr.Sudir P, Deepika B
DOI: 10.17148/IJARCCE.2023.125100
Abstract
TECHNOLOGIES FOR REAL TIME VISION OFCOVID 19 TRACKING
PROF. MOHANBABU C, Shabeena R
DOI: 10.17148/IJARCCE.2023.125101
Abstract
DETECTION OF ADULTERATION IN FRUITS USING MACHINE LEARNING
Bellapukonda Sudarshan, Bhavya S D, Dr. S. Bhargavi, Bhavyashree N
DOI: 10.17148/IJARCCE.2023.125102
Abstract
Predictive Analysis of Credit Card Assessment System
Mr. M Krishnaraj, Adithyan L, Dhanush R
DOI: 10.17148/IJARCCE.2023.125103
Abstract
Bitcoin Price Prediction Via Machine Learning
Rutuja Kamble, Shraddha Fulsaundar, Mrunal Nimbalkar, Poonam Sonawane
DOI: 10.17148/IJARCCE.2023.125104
Abstract: This paper aims to predict the direction of Bitcoin price in USD using machine learning techniques and sentiment analysis. Social media platforms such as Twitter and Reddit have been explored as sources of public sentiment, and we have applied sentiment analysis to tweets and Reddit posts related to Bitcoin. Supervised machine learning principles have been used to develop a prediction model, and we have analyzed the correlation between Bitcoin price movements and sentiments in tweets...
Abstract
DETECTION OF RICE BLAST DISEASE USING PATTERN RECOGNITION MODEL
Mrs P. Sheela Rani, P. Dhileepan
DOI: 10.17148/IJARCCE.2023.125105
Abstract: Abstract The techniques of machine vision are extensively applied to agricultural science, and it has great perspective especially in the plant protection field, which ultimately leads to crops management. The paper describes a software prototype system for rice disease detection based on the infected images of various rice plants. Images of the infected rice plants are captured by digital camera and processed using image growing, image segmentation techniques to detect infected parts of the plants. Then the infected part of the leaf has been used for the classification purpose using neural network. The methods evolved in this system are both image processing and soft computing technique applied on number of diseased rice plants. We proposed in this project to detect the blast disease in rice through image segmentation, HOG (Histogram of Gradient) feature extraction and classify the disease in high evaluated pattern recognition model called SVM (support vector machine). The experimental result shows in MATLAB in accurate manner
Abstract
IMAGE GENERATION WITH STABLE DIFFUSION AI
Sasirajan M, Guhan S, Mary Reni, Maheswari M, Roselin Mary S
DOI: 10.17148/IJARCCE.2023.125106
Abstract: Artificial intelligence (AI) has been playing an increasingly important role in the development of new technologies across various domains. One such domain is law enforcement, where AI-based tools can be used to improve the efficiency and accuracy of suspect identification. In this project, we propose a system that generates facial images of suspects based on input text descriptions using the Stable Diffusion AI model. The existing systems for suspect identification rely on eyewitness accounts, sketches, and/or composite images, which can be unreliable and time-consuming. Our proposed system uses AI-based image generation to provide law enforcement agencies with a more efficient and accurate method for generating facial images of suspects based on input text descriptions. The proposed system consists of four modules: input processing, image generation, user interface, and database. The input processing module receives the text description of the suspect's appearance and pre-processes it to remove any unwanted characters. The image generation module uses the Stable Diffusion AI model to generate a latent vector ...
Abstract
ULTRA-WIDEBAND (UWB) WIRELESS TECHNOLOGY FOR APPLICATION
VISHALA I L, MOHAMMED UMAR
DOI: 10.17148/IJARCCE.2023.125107
Abstract:
Ultra-wideband (UWB) transmission has recently received great attention in both academia and industry for applications in wireless communications. It was among the CNNâs top 10 technologies to watch in 2004. A UWB system is defined as any radio system that has a 10-dB bandwidth larger than 20% of its center frequency, or has a 10-dB bandwidth equal to or larger than 500 MHz, The recent approval of UWB technology by Federal Communications Commission (FCC) of the United States reserves the unlicensed frequency band between 3.1 and 10.6 GHz (7.5 GHz) for indoor UWB wireless communication systems. It is expected that many conventional principles and approaches used for short-range wireless communications will be reevaluated and a new industrial sector in short-range (e.g., 10 m) wireless communications with high data rate (e.g., 400 Mbps) will be formed. Further, industrial standards IEEE 802.15.3a (high data rate) and IEEE 802.15.4a (very low data rate) based on UWB technology have been introduced.Abstract
DISEASE DETECTION IN FRUITS USING IMAGE PROCESSING
Dr. C Rangaswamy, Machireddy Gari Gunasekhar Reddy
DOI: 10.17148/IJARCCE.2023.125108
Keywords:
K-means clustering, Artificial Neural Network.Abstract
IMPLEMENTATION OF THE ETHEREUM ALGORITHM TO MONITOR THE E-VOTING SYSTEM AND DATA STORAGE USING BLOCKCHAIN
Revathi TP, Sindhu M, Sivaranjani E
DOI: 10.17148/IJARCCE.2023.125109
Abstract:
Electronic voting systems have gained significant attention due to their potential to streamline the voting process, increase accessibility, and reduce fraud. However, ensuring the integrity, security, and transparency of the voting process remains a critical challenge. Blockchain technology has emerged as a promising solution to address these concerns by providing a decentralized, immutable, and transparent ledger system.This abstract presents an e-voting system that leverages blockchain technology to enhance the security, transparency, and efficiency of the voting process. The proposed system utilizes a permissioned blockchain, ensuring that only authorized participants can participate in the consensus and validation process.Each eligible voter is assigned a unique cryptographic identity and can securely cast their vote through a user-friendly interface. The vote is recorded as a transaction on the blockchain, which includes a digital signature and timestamp to ensure its authenticity and immutability. The votes are anonymized to preserve voter privacy while maintaining the ability to verify the integrity of the overall election process. Â Keywords: electronic voting, e-voting, blockchain, e-government, verifiable votingAbstract
Real-time machine learning for big data approach to early identification of heart disease
MOHANBABU.C, AMBIKA B
DOI: 10.17148/IJARCCE.2023.125110
Abstract: The leading cause of death worldwide over the past few decades has been heart disease. Thus, regular monitoring and early detection of cardiac disease can lower the death rate. An vast amount of data has been continuously being generated by the exponential increase of data from various sources, including streaming systems, wearable sensor devices used in Internet of Things health monitoring, and others. A breakthrough in technology, streaming big data analytics and machine learning, has the potential to revolutionise the healthcare industry, particularly in the area of early heart disease detection. This technology might be more affordable and more potent. This research suggests a real-time cardiac disease prediction system built on Apache Spark to address this problem.
Keywords: big data, spark, distributed machine learning, heart disease, real-time
Abstract
DARK-NET ECOSYSTEM CYBER THREAT INTELLIGENCE (CTI) TOOL
Abhishek , Prof. Shreehari H S
DOI: 10.17148/IJARCCE.2023.125111
Abstract
MEMS APPLICATIONS IN AUTOMOBILE
Prof. Shreehari H S, Sumanth V N
DOI: 10.17148/IJARCCE.2023.125112
Abstract
A personalized adaptive cruise control system based on driving style recognition and model predictive control
ANIL KUMAR R, SUJAY N S
DOI: 10.17148/IJARCCE.2023.125113
Abstract:
A customised adaptive cruise control (ACC) system based on model predictive control (MPC) and driving style identification to accommodate various driving styles while ensuring car-following, comfort, and fuel-efficiency performances. A series of real-world vehicle experiments are carried out to gather the driving data of 66 randomly selected drivers in order to determine the controller parameters that correspond to various driving styles. The experimental data is then clustered using an unsupervised machine learning technique. A driving style classifier is created using supervised machine learning on the basis of this information, and it can be used to identify drivers' driving styles online. The control issue with the customised ACC system is thus defined as a multi-objective optimisation issue that may be resolved using the MPC approach. The simulation findings demonstrate that the suggested personalised ACC system can provide varying performances and cater to the needs of various driving styles.Abstract
Geo-based Technical professional hiring system for repairing and maintenance services
Aniket Ajay Thorat, Sakshi Uttamrao Pansare, Smital Dileep Barage, Swapnil Shelake
DOI: 10.17148/IJARCCE.2023.125114
Abstract: Because of new technology, smart phones have become very important for communication and are now a big part of our daily lives. In Country like India, people are having trouble finding and hiring local technical professionals to fix things in their homes and offices. This also makes it difficult for new workers to find jobs nearby. To solve this problem, we need to create a platform that helps connect technical workers with people who need their services. This platform should be easy to use and work well with the latest technology.
One idea is to create an android app called Task -Tracer, as well as a website. Task -Tracer would be a great way to start in developed Countries. It's an app that lets users and experts with different technical skills communicate. It uses Google Maps to help with searching and hiring based on location. Users can see a map with markers showing all the available workers in their area. Right now, the app has four categories of experts: Decorators, Electricians, Mechanics, and Plumbers. But more categories can be added in the future.
Keywords: Android recruitment system, local technical l professionals, Maintenance and Repair system, Geo based home services
Abstract
A Secure User Authentication Scheme For Enabled Iot Devices
Karthiga G , Kaviya S, Lavanya V
DOI: 10.17148/IJARCCE.2023.125115
Abstract:
The internet of things is a system of connecting devices to the internet. It interacts with the real world with wide range of applications. Nowadays, in many home, user can remotely access and control a variety of home devices such as smart curtains, lights etc. despite providing convenient services including home monitoring, temperature management and daily work assistance. A smart home can be vulnerable to malicious attacks because all messages are transmitted over insecure channels. Moreover, home devices can be a target for device capture attacks since they are placed in physically accessible locations. But, IOT has a disadvantage that it has less security. To provide security for protecting information to be delivered and communication through the use of codes we use cryptography. In cryptography we are using AES algorithm, in this message will be passed in turns of block ciphers. To connect IOT and cryptography we require MQTT (message queuing telemetry transport) broker to publish and subscribe system takes place, in which we can publish and receive message as a client. This encrypted message cannot be decoded until it has decryption key, so the device can secure from attacks. ÂKeywords:
Internet of Things (IoT), Message Queuing theory telemetry transport (MQTT), Advanced Encryption Standard (AES), Amazon web service (AWS), Light Emitting Diode(LED).Abstract
A Vulnerability Assessment In Web Application
Abinesh R , Adithyan U, Gowtham K and Mrs.J.Shakila
DOI: 10.17148/IJARCCE.2023.125116
Abstract: Nowadays, most of the business enterprises are running through web application. But the major drawback is that they fail to provide a secure environment. To overcome this security issue in web application, there are vulnerability detection tools are available at present. But these tools are not proactive and consistent as it unable to track vulnerabilities. Vulnerability assessment reports play a vital role in ensuring the security of an organizationâs application, computer systems and network infrastructure.it is a process of identifying, classifying and prioritizing security vulnerabilities in IT infrastructure. It is a systematic review of security weakness in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assign severity levels to those vulnerability and can help to identify problem area. A comprehensive vulnerability assessment evaluates whether an IT system is exposed to known vulnerability. Web application vulnerability scanners are automated tools that scan web application, normally from the outside, to look for security vulnerabilities such as cross-site scripting, SQL injection, command injection, path traversal and insecure server configuration. It is a software command-line vulnerability scanner that scans webservers for dangerous file/CGIs, outdated server software and other problems. It performs generic and specific type checks.
Keywords: Command-Line Interface(CLI), Graphical User Interface(GUI).
Abstract
Brain Tumor Detection
Rishav Walde, Aditya More, Janveer Singh, Bhushan Shelke, Prof. Madhavi Patil
DOI: 10.17148/IJARCCE.2023.125117
Abstract:
Brain excrescence is the growth of abnormal cells in brain some of which may leads to cancer. The usual system to descry brain excrescence is glamorous Resonance Imaging( MRI) reviews. From the MRI images information about the abnormal towel growth in the brain is linked. In colorful exploration papers, the discovery of brain excrescence is done by applying Machine Learning and Deep Learning algorithms. When these algorithms are applied on the MRI images the vaticination of brain excrescence is done veritably presto and a advanced delicacy helps in furnishing the treatment to the cases. These vaticination also helps the radiologist in making quick opinions. In the proposed work, a tone- defined Artificial Neural Network( ANN) and complication Neural Network( CNN) is applied in detecting the presence of brain excrescence and their performance is anatomized. ÂKeywords:
Image Segmentation; Support Vector Machine; Self-Organized Mapping; MRIAbstract
Livenessnet with Hardware Interface for higher Security
Dr. Anil Kumar D, Amulya C S, Harshitha R , Vinutha P, Sujay N
DOI: 10.17148/IJARCCE.2023.125118
Abstract: This paper introduces a user-friendly face recognition system that includes liveness detection. The system's core programming is implemented in Python, which provides access to powerful machine learning libraries such as TensorFlow and Keras. These libraries are known for their high-level neural network capabilities, which greatly assist in training the dataset. In terms of hardware interfacing, a basic setup is employed to demonstrate the functionality of the liveness system. This setup incorporates a mechanism that automatically opens and closes a door when a recognizable face is detected. The face recognition system outlined in this paper aims to provide a straightforward and accessible solution for identifying individuals. By integrating liveness detection, it enhances security by verifying that the detected face is not a still image or a video playback. The choice of Python programming language for the core implementation offers several advantages. Python is widely used for machine learning tasks due to its simplicity and extensive libraries. TensorFlow and Keras, in particular, provide a comprehensive set of tools for neural network-based tasks, including facial recognition. Overall, this paper presents a practical and effective approach to face recognition, combining the power of Python and machine learning libraries to achieve accurate and reliable results while incorporating liveness detection for enhanced security applications. Â Keywordsâ liveness, neural networks, Biometrics, training, Python, ESP controller.
Abstract
A survey on EEG signal processing techniques
Manjunatha Siddappa, Keerthi H S
DOI: 10.17148/IJARCCE.2023.125119
Abstract
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, PALM PRINT, AND FACE RECOGNITION USING DWT TECHNIQUE
Anandharaman T, Chandralekha P, Dr. Roselin Mary S
DOI: 10.17148/IJARCCE.2023.125120
Keywords:
Deep Learning, Feature Extraction, Fusion, Enhancement, Discrete Wavelet Transform, Biometrics, Modalities, Matlab, Digital Image Processing.Abstract
A Flask based web application to predict death in women due to Breast Cancer
Supriya Pathuri, Shiva Priya.D, Dr. S.Roselin Mary
DOI: 10.17148/IJARCCE.2023.125121
Abstract:
Breast cancer is the leading cause of cancer death in women. Early detection and diagnosis are the most effective strategy to control tumour progression. The currently recommended imaging method for early determination and diagnosis of breast tumours. Classifications of still a big challenge and play a crucial role in assisting radiologists in accurate diagnosis this project, we propose a convolution neural network-based classification technique which is one of the deep learning techniques. The architectural model of CNN is used for the classification of breast cancer into normal and abnormal. Pre-processing is performed on the input mammogram image to remove unwanted elements. Segment the tumour region using morphological operations, and highlight the region on the original mammogram image. If the mammogram image is normal, it indicates that the patient is healthy. BC patients and healthy patients are classified using Random Forest (RF) Classifiers.Keywords:
Deep learning, Cancer Detection, CNN, Feature Extraction.Abstract
E-Commerce Laptop Store
Niraj Pardeshi , Kunal Patekar , Shreyas Chaudhari , Talha Shaikh
DOI: 10.17148/IJARCCE.2023.125122
Abstract:
This research paper aims to investigate the impact of website quality on online purchase intention for an E-commerce website named Laptop Store. The study examines the factors that influence customers' online purchase intentions and their behaviour towards online shopping. The research also explores the effect of social media on consumers' online shopping behaviour and the moderating role of product type and review valence on purchase intention. The research methodology includes a quantitative approach, with a survey questionnaire distributed among a sample of Indian consumers. The data collected was analysed using structural equation modelling (SEM) and the results indicated that website quality has a significant positive impact on customer satisfaction and behavioural intentions. Furthermore, the study found that social media has a significant impact on consumers' online shopping behaviour. The research contributes to the existing literature by providing insights into the factors that influence online purchase intentions and the effect of social media on consumers' behaviour towards online shopping. The findings of this research can be useful for E-commerce website owners and marketers in enhancing website quality and social media strategies to improve customers' online shopping experiences and increase purchase intentions.Keywords:
E-commerce, Online shopping, Website quality, Purchase intention, Consumer behaviour, Social media, Product type, Review valence, Customer satisfactionAbstract
MULTIMODAL DEPRESSION DETECTION FROM FACIAL LANDMARK FEATURES USING LSTM MODEL
D.SYLVIA SHARON, J ANGEL OZNI , S. SOMALAKSHMI
DOI: 10.17148/IJARCCE.2023.125123
Abstract:
This paper proposes massive and growing burden imposed on modern society by depression has motivated investigations into early detection through automated, scalable, and non-invasive methods, including those based on speech. However, speech-based methods that capture articulatory information effectively across different recording devices and in naturalistic environments are still needed. This article presents a novel multi-level attention-based network for multi-modal depression prediction that fuses features from audio, video, and text modalities while learning the intra and inter modality relevance. Multi-level attention reinforces overall learning by selecting the most influential features within each modality for decision-making. We perform exhaustive experimentation to create different regression models for audio, video, and text modalities. Evaluations of both landmark duration features and landmark n-gram features on the DAIC-WOZ and SH2 datasets show that they are highly effective, either alone or fused, relative to existing approaches. ÂKeywords:
Depression classification, landmark n-grams, speech articulation, smartphone speech, naturalistic environmentsAbstract
Email Spam Detection Using Machine Learning Algorithms
ANGEL FELCIYA I , ESAKKI DEVI S, MAHESWARI.M, DR. ROSELIN MARY S
DOI: 10.17148/IJARCCE.2023.125124
Keywords:
Machine learning, NaĂŻve Bayes, support vector machine-nearest neighbour, random forest, bagging, boosting, neural networks.Abstract
LIVER DISORDER DIAGNOSIS USING MACHINE LEARNING - A COMPARATIVE STUDY
Anusuya.R, Dr. S. Roselin Mary, Ph.D
DOI: 10.17148/IJARCCE.2023.125125
Abstract:
It is critical to diagnose liver illness early on in order to receive the best therapy possible. Machine learning algorithms is growing rapidly such as SVM, K-mean clustering, KNN, Random Forest, Logistic regression, and others. The input is usually numerical data of various factors, and the output findings are obtained in real-time, predicting whether or not the patient has a liver problem. In this project, used a variety of supervised machine-learning methods before deciding which one is best for the model. Existing systems rely on classical deep learning models, which are inefficient and imprecise. They aren't precise enough. This proposing model is to use classification algorithms to identify liver patients from healthy individuals. Here, we choose the algorithm in this module that serves as the best fit. The dataset is taken from the Kaggle dataset. The advantages of the proposed model are that it shows high accuracy, is fast processing and is highly scalable. With the effective use of the presented model, practitioners can make intelligent clinical decisions.Keywords:
Bivariate analysis, correlating columns, MSE Loss Function, Removing Null values, Replacing Non-acceptable zero values, Univariate analysisAbstract
DETECTION OF DDoS ATTACKS ON 5G SLICING USING DEEP LEARNING
Bharath B P, Srivani E N, Bharath S
DOI: 10.17148/IJARCCE.2023.125126
Abstract
Detecting Humans in Search and Rescue Operations Based on Ensemble Learning
Vishnu Rangan K, Yugendran S, Surendar R, Mrs. M. Maheswari
DOI: 10.17148/IJARCCE.2023.125127
Abstract:
Deep learning is a sub field of machine learning that focuses on training artificial neural networks to learn and make predictions or decisions without being explicitly programmed.In this paper, we present a convolutional neural network-based model for the detection of humans in aerial images of mountain landscapes acquired by unmanned aerial vehicles (UAVs) used in search and rescue operations.. By using drones in SAR applications, it is desirable to minimize the cost and time spent on SAR operations. In this paper, we present a convolution neural network-based model for the detection of humans in aerial images of mountain landscapes acquired by unmanned aerial vehicles (UAVs) used in search and rescue operations. Detection of humans in aerial images remains a complex task due to various challenges such as pose and scale variations of humans, low visibility, camouflaged environment, adverse weather conditions, motion blur, and high-resolution aerial images. Due to imaging from high altitudes, in most high-resolution aerial images captured by UAVs, only 0.1 to 0.2 percentage of the image represents humans. To solve the problem of low coverage of the object of interest in high resolution aerial images, we propose to implement a deep learning-based object detection model. In this paper, we propose a novel method for the detection of humans in aerial images based on the Efficient DET architecture and ensemble learning. The method has been validated on the HERIDAL image datasets. By implementing the proposed methodologies, we achieved an map of 95:11%. To the best of our knowledge, this is the highest accuracy result for human detection on the HERIDAL datasets.Keywords:
Search and Rescue Operations, Unnamed Aerial Vehicles, Heridal Image Dataset, Ensemble learning.Abstract
An Electronic Voting System Using FingerPrint Authentication
Mr. Abhijeet Chavanke, Miss. Pritika Somase, Miss. Jayshri Avhad, Miss. Pranjali Salve, Prof. A.S. Dalvi
DOI: 10.17148/IJARCCE.2023.125128
Abstract:
The electronic voting machine verifies voters using finger print scanners. A voting system that uses fingerprint identification eliminates the requirement for the user to carry an ID that provides the necessary information. Web-based system enables voter to cast their votes from anywhere in the world. Online website has a prevented IP address generated by the government of India for election purpose. People should register the name and address in the website. Election commission will collect the fingerprint and face image from the voters. The database or server will store the images. , keeping track of voter decisions is not a difficult task, however, in situations where there are hundreds of thousands of voters, keeping a precise record of voter decisions becomes important and more difficult. The advancements in blockchain technology provide a potential solution to the record-keeping problem of contemporary voting procedures, as blockchain technology by design, excels in applications where multiple users are working on immutable data. this project provides the best solution to avoid false voting. The electronic voting machine was connected with the computer. The computer is having the full database list of the peoples who are having the eligibility to vote. For each polling, the corresponding person identity was deleted. So it avoids false voting. A touch screen is used, so it is user-friendly. Keywords:Â Voter ID, Fingerprint module, Pattern Matching, Machine Learning, Image Processing..Abstract
An Internet of Things (IoT) Application for Predicting the Quantity of Future Heart Attack Patients
Shijin Jose (71917755D), Lokhande Rahul Pandurang (72170264D), Kandekar Narendra Bhimraj (72032816M), Gore Abhishek Vilas (72170258K)
DOI: 10.17148/IJARCCE.2023.125129
Keywords:
IOT, ML, Healthcare, ECG, Temperature, Sensors.Abstract
Road and Car Extraction Using UAV Images via Efficient Dual Contextual Parsing Network
Sujith M G
DOI: 10.17148/IJARCCE.2023.125130
Abstract
SMART VOTING SYSTEM USING FACE RECOGNITION AND OTP
Arun Siva Ranjith S, Vignesh G, Maran R, Maheswari M, Dr. Roselin Mary S
DOI: 10.17148/IJARCCE.2023.125131
Abstract:
Deep learning, a subfield of machine learning, has revolutionized various domains by enabling computers to learn from large amounts of data and make accurate predictions or decisions. . The new method does not force the person's physical appearance to vote, which makes the things easier. This paper focusses on a system where the user can vote remotely from anywhere using his/her computer or mobile phone and doesnât require the voter to got to the polling station through two step authentication of face recognition and OTP system. This project also allows the user to vote offline as well if he/she feels that is comfortable. The face scanning system is used to record the voters face prior to the election and is useful at the time of voting. The offline voting system is improvised with the help of RFID tags instead of voter id. This system also enables the user the citizens to see the results anytime which can avoid situations that pave way to vote tampering.Keywords:
Online voting system, Face recognition, OTP authentication, Biometric authentication, Secure voting, Fraud prevention, Voter verification, Identity authentication, Electronic voting, Democracy, Election security, Digital voting, Biometric recognition, Two-factor authentication.Abstract
DDoS ATTACK PREVENTION FOR IoT DEVICES
Manjunath N R, Naveen Kumar R, S Karpaga Murthy, Sacheth K, Prof. Lavanya M C
DOI: 10.17148/IJARCCE.2023.125132
Abstract:
The rising frequency of Distributed Denial of Service (DDoS) attacks is mostly due to botnets, as their weaknesses in the Internet of Things (IoT) make them an excellent target for these attacks. As DDoS attacks have become more frequent, it is critical to address the implications they have for the IoT industry, which is one of their primary causes. The purpose of this study is to offer an examination of attempts to stop DDoS attacks, mostly at the network level. These solutions effectiveness in addressing IoT risks serves as a gauge of their sensitivity. This analysis makes it clear that there isn't yet a perfect answer for IoT security and that there are still lots of prospects for research and development in this area. Keywordsâ Denial of Service (DoS), Distributed Denial of Service(DDoS), Internet of Things (IoT), Attacks, Technology, Botnets.Abstract
TECHNOLOGIES FOR HYDROGEN AS AN ALTERANATIVE FUEL FOR USEFULL APPLICATIONS
VISHALA I L, SANJAY B
DOI: 10.17148/IJARCCE.2023.125133
Abstract:
The general rise in environmental and anthropogenically induced greenhouse gas emissions is driven by worldwide population growth and a growing appetite for clean energy, industrial production and consumer consumption. Moreover, well-established, developed and emerging countries are looking for fossil fuel and petroleum resources to support their aviation, power utilities, industrial sectors and consumer processing needs. As emerging technological advances in clean energy technologies progress, there is a growing trend to overcome these challenging concerns and achieve the Paris Agreement priorities. Hydrogen is expected to be implemented in various manufacturing applications as a fundamental fuel in the development and production processes of future energy carrier materials. This paper summarizes recent developments and hydrogen technologies in fuel refining, hydrocarbon processing, materials manufacturing, pharmaceuticals, aircraft construction, electronics and other hydrogen applications. It highlights the existing industrialization scenario and describes expected innovations including theoretical scientific advances, production of green raw materials, potential exploration and renewable resource integration. Furthermore, this article discusses some of the future socioeconomic implications of hydrogen as a green resource.Abstract
Detection and Classification of Various Diseases in Arecanut Plantation Using Artificial Intelligence and Machine Learning
Abhilash N Shetty, Gurupavan k, Charan Shetty T V, Ketan Maruthi Prabhu, Prof. Kirankumar M V
DOI: 10.17148/IJARCCE.2023.125134
Abstract:
A tropical crop called areca nuts, sometimes referred to as betel nuts, is grow. India is the world's second-largest producer and consumer of areca nuts. The early monsoon winds from the Indian Ocean and the Bay of Bengal bring heavy rain, which causes a range of illnesses to afflict the areca nut throughout its life cycle, including Yellow Leaf, Nut Split, and Fruit Rot. The only method of disease detection currently available to farmers is observation with the naked eye, and they must periodically examine each crop carefully in order to identify any diseases. Furthermore, without a farmer who is well-versed in these diseases and areca nuts, it will be difficult to detect diseases. This system incorporates several machine learning and image processing principles that will make this vision a reality. As the system concentrates on early detection so the issue might be eliminated at the starting stage in order to avoid the barriers later, it may accept inputs from areca nuts (including the tree) and transport them there for pre-processing. Otherwise, it poses a serious risk.Keywords:
Areca nut, yellow leaf, fruit rot, machine learning, image processing.Abstract
E-Voting System Using Blockchain Technology
Yadav Aniket Bhaskar (72170286E), Samruddhi Sanjay Kharat (72170261K), Pratibha Vijay Patil (72170273C), Vaishnavi Suresh Changle (72170252L)
DOI: 10.17148/IJARCCE.2023.125135
Keywords:
Traditional voting system, decentralized nature of blockchain, Key, Poof-of-Individuality(POI), confidentiality of vote, uniqueness of each vote, etcAbstract
IOT based Anti-Poaching Alarm System for Trees in Forest
Meghana C V, Harshitha P R, Karthik Kumar Reddy.T. A, Pottipati Rakesh, Chandini A G
DOI: 10.17148/IJARCCE.2023.125136
Abstract
Convolutional Neural Networks based Fire Detection in Surveillance Videos
Yash Raval, Pratiksha Patil, Hrithik Raj, Swalpesh Kotalwar, Prof. Rupali Waghmode
DOI: 10.17148/IJARCCE.2023.125137
Abstract:
The recent advances in embedded processing have enabled the vision based systems to detect fire during surveillance using convolutional neural networks (CNNs). However, such methods generally need more computational time and memory, restricting its implementation in surveillance networks. In this research article, we propose a cost-effective fire detection CNN (YOLO Object Detection) architecture for surveillance videos. The model is inspired from GoogleNet architecture, considering its reasonable computational complexity and suitability for the intended problem compared to other computationally expensive networks such as âAlexNetâ. To balance the efficiency and accuracy, the model is fine-tuned considering the nature of the target problem and fire data. Experimental results on benchmark fire datasets reveal the effectiveness of the proposed framework and validate its suitability for fire detection in CCTV surveillance systems compared to state-of-the-art methods. We plan to overcome the shortcomings of the present systems and provide an accurate and precise system to detect fires as early as possible and capable of working in various environments thereby saving innumerable lives and resources. Keywords: Convolutional Neural Networks (CNNs), GoogleNet architecture, Fire Detection, CCTV Surveillance Systems, etc.Abstract
WATER TESTING AND TREATMENT USING IOT
SHWETHA V, PAVAN U, SREEKANTH V S, ARSHITHA G
DOI: 10.17148/IJARCCE.2023.125138
Abstract:
According to research, 8 lakh people die from waterborne diseases in most of developing and undeveloped countries. The flips in the sewage treatment cause the improper treatment of water, which in turn affects the lives dependent on that water. The automation of these treatment processes will help improve the treatment of water. Every year over a million people suffer from waterborne diseases and a number of them are mainly due to improper treatment of water. Water pollution has been an increasing problem over the last few years. Hence, it is a necessity to deal with this problem and to make sure most of the swage is treated before use. The treatment plant is automated with the help of IoT and IoT-based sensors. These sensors are used to monitor the quality of the water and control the flow of water. This data can also be used to process and store this information for future research and processing. This sewage treatment plant automation aims to achieve this by making use of IoT to reduce power consumption and gives better water quality. On a large scale, the implementation and sewage treatment plant automation will be way cheaper than the traditional methods.Keywords:
Water quality testing, Water treatment, Arduino, Arduino sensors.Abstract
AUTOMATIC PET FOOD DISPENSER USING DIGITAL IMAGE PROCESSING
Prof Dr Hemanth Kumar B M, Bharath Kumar S M, Bhavana N M, Gowtham G S, Meghana Gowri G
DOI: 10.17148/IJARCCE.2023.125139
Keywords:
Automatic Pet Feeder, Arduino IDE, Smart Home, Digital Image Processing, Neural networks.Abstract
Predicting The Price Of A Flight Ticket With The Use Of Machine Learning Algorithms
Pravar Umesh Ved (72170275K), Abhishek Anant Waghmare (72170284J), Nikita Navnath Thorat (72170285G)
DOI: 10.17148/IJARCCE.2023.125140
Abstract:
 Flight ticket prices fluctuate based on factors such as flight timing, destination, and duration. To address the challenge of determining the optimal time to purchase tickets, this proposed system aims to develop a predictive model using machine learning algorithms. By analyzing historical flight data, our project focuses on identifying underlying price trends in India and providing recommendations for the best time to buy tickets.This project seeks to validate or debunk myths surrounding the airline industry, comparing different models to predict the optimal timing for ticket purchases and potential cost savings. Notably, price trends vary significantly depending on the route, month, day, time of departure, whether it's a holiday, and the airline carrier. For highly competitive routes like major business destinations (e.g., Mumbai-Delhi), prices tend to increase as the departure date approaches. However, other routes, such as tier 1 to tier 2 cities like Delhi-Guwahati, have specific time frames when prices are at their lowest. Additionally, the collected data reveals two distinct categories of airline carriers in India: the economical group and the luxurious group. In most cases, the lowest-priced flights belong to the economical group. Furthermore, the data confirms that certain periods of the day are associated with higher expected prices. Expanding the scope of this project to cover various routes can lead to significant savings when purchasing domestic flight tickets in the Indian market..Keywords:
Flight ticket, Optimal timing, historical data, competitive routes, Indian Domestic Airline marketAbstract
By Using Machine Learning Algorithms we can predict and classify the diabetes mellitus
K. Harsha vardhan, Mohd Maaz muntajib , S. Sai Kiran, Dr. G. Shyama Chandra Prasad
DOI: 10.17148/IJARCCE.2023.125141
Abstract
Realizing an ultrasonic motor speed control system based on an H-bridge
Mahesh S , Prof.Vishala IL
DOI: 10.17148/IJARCCE.2023.125142
Abstract
Wireless Smart Notice Board
Manoj V M ,M Tharun , Naveen S N ,Dr.Bhaskar S
DOI: 10.17148/IJARCCE.2023.125143
Abstract: This project deals with an innovative rather an interesting manner of intimating the message to the people using a wireless electronic display board which is synchronized using the Bluetooth technology. Now-a-days information displaying is going digital with a high speed. This will help us in passing any message almost immediately without any delay just by sending a SMS which is better and more reliable than the old traditional way of passing the message on notice board. This proposed technology can be used in colleges many public places, malls or big buildings to enhance the security system and also make awareness of the emergency situations and avoid many dangers. Using Bluetooth module display the message onto the display board. In the last couple of decades, communication technology has developed by leaps and bounds. It has already established its importance in sharing the information right from household matters to worldwide phenomena. In this paper, we present the development of an SMS controlled E-notice board which can be updated automatically and remotely.The system was implemented using a BLUETOOTH Module IC controlled by a Microcontroller and an LCD display. The BLUETOOTH module receives the message to be displayed as data, then transmits the message through the COM port to the microcontroller displays the message on the LCD display.
Abstract
PROBABILITY & ITâS DISTRIBUTION
Mrs. Anagha A. Bade
DOI: 10.17148/IJARCCE.2023.125144
Abstract
F.R.A.M.S Face Recognition Attendance Management System
Qamar Zaid Mohammed, Priyanka Gorakh Dhamane
DOI: 10.17148/IJARCCE.2023.125145
Keywords:
LBPH, OpenCV, Haarcascade,Face recognition, Face detection,Spreadsheet.Abstract
Credit Card Fraud Detection Using Machine Learning
Dr. Kiran, Sanchitha L Anand, Samudyata S, Raju Poovarsha, Soujanya G V
DOI: 10.17148/IJARCCE.2023.125146
Abstract
CYBER SECURITY AND ITS EMERGING TREND ON THE LATEST TECHNOLOGIES
Parmeshwar R. Kumare, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2023.125147
Abstract:
The term "cybersecurity" refers to the practice of protecting electronic information by reducing information risks and vulnerabilities. Data threats can be caused by a variety of factors, including intentional attacks (such as hacking) or unintentional events (such as power outages). Cyber security includes measures to prevent unauthorized access to electronic information and systems and prevent hijacking of information and systems. Some of the latest artificial intelligence (AI) developments have implications for cybersecurity. For example, machine learning techniques can be used to identify malware and natural language processing can be used to decrypt large volumes of text for security-related information. Artificial intelligence can also be used to create new approaches to endpoint security, network security, and user authentication.Keywords:
cybersecurity, hacking, artificial intelligence, malware.Abstract
Academic Assets
Krunal Kapse, Sidhhant Ramteke, Ruchir Bhandarkar, Sohel Danish, Prathamesh Pandare, Surendra Gawai
DOI: 10.17148/IJARCCE.2023.125148
Abstract:
This research paper delves into the intricacies of designing and developing an integrated learning platform that effectively harnesses academic assets to augment the learning experience for both students and educators. The primary objective of the project is to create a dynamic website that seamlessly facilitates the exchange of home-made notes, offers a comprehensive array of courses spanning various subjects, empowers users to pose inquiries across a broad spectrum of topics, and furnishes valuable updates on professional opportunities. By leveraging these multifaceted features, the website serves as an all-encompassing platform for the exchange of knowledge and collaborative endeavors, fostering an immersive and interactive learning environment. The study undertakes a meticulous exploration of the underlying design principles, meticulous development methodologies, and astute implementation strategies employed in creating this innovative platform. Furthermore, it evaluates the efficacy of the website in augmenting the learning experience through the scrupulous analysis of user feedback and insightful observations. The findings derived from this comprehensive analysis contribute to the advancement of our comprehension regarding the optimal utilization of academic assets to optimize learning outcomes and promote lifelong learning. Looking towards the future, the research endeavor envisages expanding the repertoire of available courses to encompass a wider range of subjects, integrating more interactive features to enhance user engagement, and perpetually refining the platform in accordance with evolving user requirements and emergent trends in the realm of education.Keywords:
self made notes, ask and learn, online courses, hiring updatesAbstract
Advancements in EEG electrode technology
Manjunatha Siddappa, Pavithra S
DOI: 10.17148/IJARCCE.2023.125149
Abstract
MENTAL HEALTH TRACKER RESEARCH PAPER
Dr. (Mrs.) Snehal Bhujade, Rajashree Chilbule , Aniket Shambharkar , Abhishek Kotangale, Lekanksh Gaikwad, Pratik Sahare
DOI: 10.17148/IJARCCE.2023.125150
Abstract:
 The use of technology in mental health has grown significantly in recent years, with the emergence of mental health tracker web applications. These applications allow individuals to track their mood, symptoms, and behaviors, and may offer resources and tools for managing mental health. This paper discusses proposed mental health tracker systems, which typically include features such as mood tracking, symptom tracking, and behavior tracking. Additionally, this paper highlights the importance of conducting a literature survey to better understand the current state of research on mental health tracker web applications, including their effectiveness and potential benefits and drawbacks. A literature survey could provide valuable insights into the most effective features and interventions for these applications, and help identify areas where further research is needed. Overall, mental health tracker web applications have the potential to improve mental health outcomes and offer a valuable tool for managing mental health conditions. ÂKeywords:
Machine Learning, Track Mental Health, Flutter, Mental Health Dataset.Abstract
Smart Medbox Using IoT
Dr. Ramananda Mallya K, Gagandeep D Achar, Saadhan Ballal, Shreya, Yogeesh M
DOI: 10.17148/IJARCCE.2023.125151
Abstract:
The proposed smart medical box is designed to address medication adherence challenges, particularly among the elderly. It consists of a companion phone application for initial setup and remote operation, allowing users to specify pills and schedule them at varying times throughout the day. An Arduino board/ESP 8266 controls the operations and connectivity functions of the box, which only unlocks for a short time in the specified slot. Notifications for missed or low-stock medication are sent to the app, and the system logs usage statistics. Implementation on a larger scale using IoT-based platforms can benefit institutions such as old-age homes and nursing homes, improving medication management, sanitation, and safety, and reducing drug overdependence. The proposed system offers a potential solution to medication mismanagement challenges by providing visual and auditory cues to reduce confusion and improve medication adherence. By using technology to regulate pill intake and generate medication adherence reports, the smart medical box has the potential to significantly enhance medication management for patients, especially the elderly, and improve overall healthcare outcomes. The records can be sent to the administrator who can further notify the participants.Keywords:
Smart Medical Box, Medication adherence, Companion phone application, Pill scheduling, Arduino, IoT- based, Healthcare outcomes.Abstract
Biomimetic ROV for Underwater Survey
S Jeevan Sai Reddy, S Banu Prakash Reddy, Suchit C S, Hithesh K Naik, Dr. Kiran Kumar M V
DOI: 10.17148/IJARCCE.2023.125152
Abstract:
Lakes and water bodies have a huge impact on the local ecosystem and environment. Unfortunately, water bodies today are in very bad state all over the country. In most cases, they have become dumping place for household and industrial waste. In many places, they are also filled with garbage. The result is that water bodies are dying, and this makes the water crisis faced by the communities worse. Water pollution can be attributed to one of four sources sewage discharges, industrial activities, agricultural activities, and urban runoff including storm waters. Sources of water pollution are either point sources or non-point sources. Point sources have one identifiable cause, such as a storm drain, dumping of industrial waste, sewage treatment facilities, illegal dumping water treatment plan or an oil spill. Non-point sources are more diffuse, such as agricultural runoff. The first step towards water body revival is to survey for the garbage dumped in waterbodies. So, we have come up with a solution to do a survey of plastic waste in the waterbodies using Biomimetic ROV and IoT i.e., raspberry pi, TDS sensor, Turbidity sensor, Ultra-sonic sensor, GPS sensor. Using camera we will detect the plastic bottle, plastic cup, plastic bag through object detection, the data from the sensors are sent to firebase real-time database and that data will be displayed in the website in real-time. This will help us know the amount of garbage in the waterbodies and that data can be used to clean that garbage, which will reduce the water pollution crisis.Keywords:
Water Pollution Crisis, Biomimetic ROV, IoT, Plastic Garbage, Object Detection.Abstract
NETWORK BORDER PATROL
Dr A B Rajendra, Sunil B, Sinchana S, Ritesh Kumar, Harshitha B S
DOI: 10.17148/IJARCCE.2023.125153
Abstract
A Novel Approach to Cervical Spine Fracture Detection: Improving Diagnosis and Treatment
Madhuri B.H, Mamatha S, Manasa R, G. Punya, Bhavya B.G
DOI: 10.17148/IJARCCE.2023.125154
Abstract
REAL-TIME NOISE AND AIR QUALITY MONITORING SYSTEM AT VVCE
Mr. Alfred Vivek DâSouza, Ms. Payal R Cavan, Ms. Namitha G B, Ms. Moksha S, Ms. Hemapriya M B, Mr. Antony Anush C
DOI: 10.17148/IJARCCE.2023.125155
Abstract
Survey Paper on Sign Language Recognition
FIZAN MOHAMMED SHAREEF, LAVANYA, SOURABH SHETTY, VANSHIKA S HEGDE, Dr.SREEJA RAJESH
DOI: 10.17148/IJARCCE.2023.125156
Keywords:
Artificial intelligence, feature classification, machine learning, supervised learning, Mediapipe, SVM.Abstract
SIGNAL PROCESSING TECHNIQUES FOR BETTER PERFORMANCE IN SSVEP FOR BCI
Manjula k, Mithun reddy putluri
DOI: 10.17148/IJARCCE.2023.125157
Abstract:
In particular for a spelling programme application, this research offers an optimisation technique for steady state visual evoked potential (SSVEP)-based brain computer interface (BCI). Stimulator, signal processing, and application (spelling programme) are the minimum number of components required to construct a comprehensive BCI application in this application. To achieve the best performance, the three components should ideally operate on independent processing units. However, combining those three parts into a single computer system has other benefits, such as improving concentration and simplifying system setup. The spelling system and the jerky animation are the two key components that require optimisation. We will concentrate on the display driver technology and programming factors while optimising the flickering animation. The layout and representation of the letter matrix will be the main areas of emphasis for spelling system optimisation. We put our program's frequency range, frequency resolution, and frequency stability to the test across many computers. Conclusion: Using a computer monitor as the stimulator, it can be concluded that, regardless of the software technology used (DirectX or OpenGL), the maximum synthesizable stimulator frequency is always half of its minimum refresh-rate. With a frequency resolution of 0.11 Hz, the highest synthesizable frequency of up to 30 Hz is attained. 106 people participated in our system testing at CeBIT 2008 in Hannover, Germany. The spelling system's average accuracy is 92.5%. Therefore, without substantial expert assistance or pricy hardware, the optimisation approach outlined here resulted in a stable and dependable system that performed well across the majority of subjects.Abstract
ENHANCED IoT CONNECTIVITY: TRIPLE TIER CLUSTER BASED ROUTING IN MOBILE WIRELESS SENSOR NETWORK.
SREEKANTH V S, SHWETHA V
DOI: 10.17148/IJARCCE.2023.125158
Abstract:
Mobile Wireless Sensor Networks (MWSNs) are an important part of the Internet of Things (IoT), where many sensors are connected through wireless channels. However, there are challenges related to energy consumption, connectivity, scalability, and security in MWSNs. Adding mobility makes it even more challenging to find a good way to improve MWSN performance. This paper introduces a new routing protocol called "Triple Tier Cluster-Based Routing" (TTC-BR) that improves MWSN performance. It does this by dividing the network into virtual zones and using a triple-tier clustering approach. The virtual zones cover the entire network area using three levels: the main connectivity zone (MCZ), candidate cluster zone 1 (CCZ1), and candidate cluster zone 2 (CCZ2). The protocol selects the best sensor node to act as the Cluster Head (CH) for each zone.TTC-BR outperforms other routing protocols such as DDR, MCCA, LEACH-MEEC, and LEACH-M, and can improve network lifetime by 9% to 48%. Our study suggests that TTC-BR is an efficient solution to improve the performance of MWSNs, particularly for large networks and many sensors. Keyword: Mobile wireless sensor network (MWSN), cluster-based routing, cluster head (CH), virtual zone, energy-efficient.Abstract
Solar Powered Agribot and Surveillance System
Nawman Baig, Shahid Sayed, Mohammed Gouse, Shaqeen M, Rajeshwari
DOI: 10.17148/IJARCCE.2023.125159
Abstract:
Agricultural robotics technology helps to produce qualitative products at higher speeds and with fewer errors. Robotics helps in various fields like agriculture, medicine, mining and space researches. The major disadvantage of driverless machines for agriculture is liability. This technology can completely change cultural or emotional appeal of agriculture. Robotics in agriculture could play a very important role in automizing the several processes. Agriculture consists of grass cutting, Ploughing, Seed Sowing, Seed watering and Crop cutting for early growing plants/crop. These operations can be achieved by means of solar operated multifunctional vehicle. Current methods for off-road navigation using vehicle and terrain models to predict future vehicle response are limited by the accuracy of the models they use and can suffer if the world is unknown or if conditions change and the models become inaccurate .In this paper, an adaptive approach is presented that closes the loop around the vehicle predictions. This approach is applied to an autonomous vehicle known as field robots used in agriculture Agricultural Robotics is the logical proliferation of automation technology into biosystems such as agriculture, forestry, green house, horticulture etc. Presently a number of research are being done to increase their applications. Some of the scientist contributions are mobile robot, flying robot, forester robot, Demeter which are exclusively used for agriculture.Keywords:
Robotics, Navigation, Field Robots, Proliferation, DemeterAbstract
IoT Based Hybrid Battery Charging and Monitoring System for Electric Vehicles
A Amardeep M Kini, Nikhil K Bhat, Sweekrithi Shetty, Yakshitha Ramesh Kunder, Sandeep Seetharam Naik, Manjunath H
DOI: 10.17148/IJARCCE.2023.125160
Abstract:
Electric vehicles (EVs) are an innovative technology that could transform the transportation industry, and they are seen as a crucial step towards achieving a sustainable transport sector. EVs have become known for producing low carbon dioxide, low noise, high efficiency, and flexibility in grid operations and integration. Despite these benefits, the adoption of the delayed adoption of EVs is a result of inadequate charging infrastructure and extended charging periods. To overcome this challenge, hybrid charging mechanisms that utilize wind and solar power are developed to improve the charging while also monitoring the battery. The management and monitoring system of EVs is an IoT-based solution that provides real-time data on the battery's status, capacity, and charging and consuming current. This information is made available to users through an application, allowing them to make knowledgeable choices on how to charge their automobiles. Moreover, during the mobility of vehicles, the energy generated by solar and wind power used to charge the battery. This results in a sustainable charging process that uses green energy and complements the existing charging infrastructure. Overall, hybrid charging mechanisms that utilize wind and solar power, along with the IoT-based management and monitoring system, could help overcome the challenges facing the adoption of EVs. By utilizing more green energy and offering efficient charging, these mechanisms can help shift leading to a sustainable future where EVs play a central role in the transportation sector.Keywords:
Electric vehicles, sustainable transport, IoT-based solution, hybrid charging, green energy, sustainable charging.Abstract
Token Generation Through Cashless Transaction With RFID
T Shreekumar, Chigurupati Gnanendra Babu, Sushmitha, Swathi S, Shreyas M
DOI: 10.17148/IJARCCE.2023.125161
Abstract:
Digital transformation means the adaptation of the power of new technology to create a better experience for users. As part in the digital world our project aims to create a payment system for students inside the college. So, we have developed a payment system that enables students to pay with their ID cards inside the campus like stationary, canteens, food courts and hostellers can pay their mess bill. Our project utilizes RFID technology and Raspberry Pi to create a seamless payment experience for students using their NFC-enabled student ID cards. Students and cashier can also track their transaction in mobile application that are developed. Also, Students can easily recharge their ID cards using the mobile application. This system provides a user-friendly, efficient, and secure payment option that reduces the need for physical exchange of cash or sensitive payment information while using third party apps.Keywords:
NFC Reader, Digital transformation, Radio Frequency Identification.Abstract
RAGI YIELD PREDICTION BASED ON MACHINE LEARNING USING XGB REGRESSOR ALGORITHM
Manjunatha sidappa, Madhushree R, Keerthi H S, M Sai Harshitha
DOI: 10.17148/IJARCCE.2023.125162
Abstract
Convolutional Neural Networks for Diabetic Retinopathy Detection
Karthik Raj S L, Sahana R, Sahana S, Simran G, Akash Anil Kumar
DOI: 10.17148/IJARCCE.2023.125163
Abstract:
Diabetes Mellitus, also known as diabetes, causes persistently high blood sugar levels that can lead to diabetic retinopathy, which has been linked to damage to the retina's tiny blood vessels. The retina must first register light before the optic nerve can transmit signals to the brain. Until diabetic retinopathy begins to advance towards Proliferate DR/PDR, treatment is frequently postponed. As Diabetic Retinopathy (DR) worsens, more regular comprehensive dilated eye exams are required. Severe non-proliferative diabetic retinopathy patients are at a high risk of developing PDR and may require a thorough dilated eye exam every two to four months. [1] Therefore, in our work, we constructed a model called "retina.model" that can recognise even the slightest variation between each stage of DR and is 100% reusable with a growing amount of cognition over time as the computer tries to learn new patterns.Keywords:
matrix handling, Diabetes , American Optometric Association (AOA), Deep Learning, CNN architecture, Diabetic Retinopathy (DR), Image Classification, retina of the eye, Optometrist, Gaussian filters, Mild DR and Moderate DR, "retina.model", Severe non-proliferative diabetic retinopathy and Cotton wool spots.Abstract
GESTURE CONTROLLED DRONE
Devang Mehta, Vasundhara Jituri, Vedamurthy, Assistant professor
DOI: 10.17148/IJARCCE.2023.125164
Abstract:
Drones can be defined as powered aerial vehicle that does not carry any human operator. As, remote control of a drone is difficult for operators having less technical knowledge which may take a long time for operator to gain control over the drone. Use of gestures over remote control is a unique method of gaining control over the drone, which makes it easy for an operator with less or no technical knowledge to gain control over the drone within few minutes. Gesture control of a drone has been implemented by various researchers and these methods are highly expensive as well as they are affected by various parameters like wavelength of light, unbalanced forces on accelerometers, bulky apparatus etc. The aim of the project is to develop a system that uses hand gestures as a method to control the flight of a drone. In this system, the droneâs absolute position is not being monitored or recorded. Instead, the drone is being told to move relative to its current position based on the detected motion of the user. In order to enable fully autonomous flight, an extended Kalman filter (EKF) based procedure is used to control and adjust all six DOF (degrees of freedom) of the drone. The EKF used the readings of the pre-mounted accelerometer and gyroscope sensors on the drone as well as a supplementary optical flow sensor and a time-of-flight (TOF) sensor. The estimator uses an extended aerodynamic model for the drone, where the sensor measurements are used to observe the full 3D airspeed. To detect the motion of the user, a nearfield sensor is measuring the disturbance of an electric field due to conductive objects, like a finger. Finally, to combine these systems, code will be developed on a Raspberry Pi to facilitate communication from the sensor to the drone and convert from the input X, Y, Z sensor values to the values compatible with the drone system.Keywords:
EKF, DOF, TOF, Gyroscopic.Abstract
DARPAN* (Virtual Trail Room)
PROF. MOHANBABU C, Ramyashree BR, Shabeena R, Shilpashree T
DOI: 10.17148/IJARCCE.2023.125165
Abstract
âSMART AQUARIUM USING IOTâ
Akshitha M, Bindu Rani A.P, Pavan S, Praveen H.S, Rashmi M. Hullamani
DOI: 10.17148/IJARCCE.2023.125166
Abstract
ORALSCREEN-ORAL CANCER DETECTION USING DEEP LEARNING
Prof Ashwini D S, Amithashree H R, Charan M, Venkatesh R S
DOI: 10.17148/IJARCCE.2023.125167
Keywords:
Deep Learning, CNN, ResNet50, VGG16.Abstract
3D AUTHENTICATION SYSTEM USING RUBIKâS CUBE
Mr. Narendra Kumar S, Anirudh G E, Basavesh S P, Divish Raj O, Kunal S Jain
DOI: 10.17148/IJARCCE.2023.125168
Abstract:
Authentication is an important security aspect in modern digital systems, and traditional methods such as passwords and PINs are vulnerable to security threats. Therefore, there is a need for innovative and efficient authentication solutions that can overcome these challenges. A possible authentication solution is to use Rubik's Cube, which is highly secure, unique, and difficult to guess or crack. This approach uses one side of the Rubik's Cube as a unique password, and playing the same side again results in successful authentication. The faces of the Rubik's Cube can be read by the camera and the code can be written in Python using the cv2 module. The purpose of this study is to evaluate the feasibility, effectiveness, and usability of Rubik's Cube authentication approaches in various areas such as access control, security, and authentication. The study also examines the security implications and potential vulnerabilities of the approach, and suggests mitigation strategies to strengthen security. Using the Rubik's Cube as a potential solution for authentication provides insights for designing more secure and efficient authentication systems. This research contributes to research into innovative and efficient authentication solutions, which can be used as an alternative or supplementary authentication method to existing methods such as biometrics and multi-factor authentication. ÂKeywords:
Authentication, Security, Python cv2Abstract
DRIVER DROWSINESS DETECTION AND ACCIDENT PREVENTION
Prasanna Reddy PV, Shiva AR, Sujay NS, Prof. ANIL KUMAR R
DOI: 10.17148/IJARCCE.2023.125169
Abstract:
Driver drowsiness detection is an essential component of modern vehicle safety systems. In this project, we propose a novel method for detecting driver drowsiness using a web camera. Our system captures video footage of the driver and applies computer vision algorithms to track facial features and determine the level of drowsiness. The system uses a combination of facial landmarks detection, eye- tracking, and machine learning techniques to determine the driver's level of alertness. Our experiments show that the proposed system can accurately detect driver drowsiness and alert the driver in real-time. The proposed method has the potential to enhance road safety and reduce the number of accidents caused by driver drowsiness.Abstract
Stock Market Prediction Using Machine Learing Algorithm
Sourabh Khade, Pratik Kamble, Kshitij Kadam, Prof.Vasudha Phaltankar
DOI: 10.17148/IJARCCE.2023.125170
Abstract:
The Stocks Market has had a significant impact on the global economy, including the stock market. Traditional stock market prediction algorithms may not be accurate in predicting stock prices in the current scenario due to the unpredictable nature of the Market. This paper proposes the use of Stocks analysis to improve traditional stock market prediction algorithms. We analyze Stocks data, such as the number of cases, hospitalizations, and deaths, to get a better understanding of how the Market is affecting various industries and the overall economy. This information is then incorporated into traditional stock market prediction algorithms to provide a more accurate forecast of stock prices. We also use machine learning algorithms to analyze Stocks data and predict stock prices. By analyzing large amounts of data, machine learning algorithms can identify patterns and trends that may not be apparent to human analysts. Our results show that incorporating Stocks analysis into traditional stock market prediction algorithms can provide a more accurate forecast of stock prices in the current Market scenario.Keywords:
Stocks, stock analysis, svm, classification, Machine LearningAbstract
Solar operated paper pod transplantater
Pradeep Shetty, Vignesh Jnanesh, Rachan R Shetty, Chirayu Rai, Dr. Mohan Kumar, Hithesh K. B
DOI: 10.17148/IJARCCE.2023.125171
Abstract
Surveillance Robot for Military Application (Bicopter)
Chetan Chougule, Abhishek Bhat, Neeraj M, Abdul Rahman Aflal, Nishmitha
DOI: 10.17148/IJARCCE.2023.125172
Abstract:
Due to growing enemy attacks, monitoring of military regions is vital in today's world. The fundamentals of robotics, including sensors and actuators, provide an overview of robotic building. The drone is controlled via a reliable and long-range remote-control system. The robot will serve as a surveillance robot, both during the day and at night. The robot will also drop explosives in certain locations to give stealth during a war-like situation. In some situations, if the robot is spotted by opposing troops, it will also operate as a suicide bomber. This robot is better suited for military purposes like monitoring a certain region. It will provide a tactical edge in hostage situations or on unfriendly terrain. It is capable of walking on surface and monitoring a large region. This will be useful in applications such as civilian and military robots.Keywords:
BLDC motors, Propellers, High-resolution camera, Real-time videos, Actuators.Abstract
MECHANIZED ARECA NUT CLIMBER AND PLUCKING DEVICE
Rahul, Shetty Nishant Vasudeva, Snighdha Shaw, Kishore Kumar, Santhosh S
DOI: 10.17148/IJARCCE.2023.125173
Abstract:
This paper presents a novel areca nut removal technique using a wheel-based, completely autonomous tree climbing robot. The system consists of a base and two arms with four wheels, and can be moved as a differential drive robot. It drives up while hugging the tree until just the wheels are in contact with the surface, making the removal of areca nuts much simpler and quicker.Keywords:
Rollers, Battery, Fruit Plucker, Robotic arm.Abstract
VIRTUAL TREATMENT AND CONSULTATION SYSTEM
Prof. Pragati Chandane, Pranali Dalvi, Priti Jadhav, Saloni Mulani, Chaitali Thombare
DOI: 10.17148/IJARCCE.2023.125174
Abstract: -
The main motive of introducing these âVirtual Treatment and consultation systemâ is to promote online health care services. Because lack of specialists is major problem in small towns. But Virtual Treatment provides online services like online treatment. It will be beneficial for all those peoples located in small towns and the patients who have to take regular treatment, travel a lot where there is a lack of medical facilities. Virtual Treatment and Consultation System is a web-based project system which deals with online check-up through video conferencing & doctor gives online prescription. The project is very helpful to doctor, receptionist and public. People can book appointments online by approaching the website of Virtual Treatment and Consultation System. And People can discuss their health-related issues via video conferencing and get doctor useful prescription Virtual Treatment system is a computerized system designed and programmed to deal with day-to-day records like appointment, interaction and management activities. It also maintains patients records.Abstract
Brain Tumor Analysis Using Convolutional Neural Network and Machine Learning
Shaik Fareed Ahamad, Dr. S. Bhargavi, Zainab, Triveni G
DOI: 10.17148/IJARCCE.2023.125175
Abstract: Brain tumor is a very serious brain cancer. It is present or become due to the separation of the brain cells. It can be life threatening to a person. In the recent field of this study, tells us that deep learning will help in health industry of medical diseases imaging in the Medical Diagnostic of all the diseases. CNN is mostly used in this Machine learning algorithm. In this project CNN algorithm, image processing and data augmentation of the brain images of cancerous and are not cancerous. This project will require less computational power due to the transfer learning compared to the old CNN model. This has good accuracy results than the old pre-trained models. With the help of this project the brain tumour can be easily identified.
Abstract
Secure Online Digital Cheque Clearance Using Blockchain
Prof. Srinivasa Murthy H, Karthik P R, Lohith k, Naveen A, Madhu Kumar H M
DOI: 10.17148/IJARCCE.2023.125176
Abstract: By employing a scanned image of the check and information from a Magnetic Ink Character Reader (MICR) device, the Cheque Truncation System (CTS) technique simplifies the handling of checks electronically without actually exchanging or moving the financial instrument. 1,50,000 branches are covered at the time. As of September 2020, 1,219 non-CTS clearinghouses (ECCS centres) had been converted to CTS. Currently, there are around 18,000 bank branches that lack any kind of formal clearing agreement. This study offers an automatic fix for the aforementioned issues that any Indian commercial bank could use. All banks that are interested in taking part must join to the proposed block chain-based system in order to offer their clients faster cheque clearance. The proposed system is based on the block chain. One of the key technologies used to build the system was Ethereum. It strengthens the system's integrity and benefits both the bank and the customer by accelerating and simplifying the clearing of checks while boosting security. Additionally, it contributes to a quicker and more precise system for detecting cheque fraud, which benefits both the user and the bank by providing a safe, effective, and environmentally friendly solution. Last but not least, it makes it possible for the payer and payee to clear checks directly in a continuous stream.
Keywords: blockchain, cheque, fraudster, image processing, OTP
Abstract
Automatic Vehicle Safety and Driver Assistance
Manjunatha Siddappa, Mythri G R, Nayana M R, Pavithra S
DOI: 10.17148/IJARCCE.2023.125177
Abstract
CRICKET SHOT CLASSIFICATION AND SCORE PREDICTION
Lakshmi B S, Lavanya A, Navyashree R Bhat, Nidhi G D, Deepakshi I
DOI: 10.17148/IJARCCE.2023.125178
Abstract: Cricket is one of the most popular sports that is played in many countries and have audience who like it in huge numbers. And in the technology field, Artificial Intelligence has gained lots of interest from people. So, implementing Artificial Intelligence in the field of sports, especially cricket, has brought many advancements which has helped in decision making, ball tracking and many visualizations. In this project we have implemented a model which classifies the cricket shots using the pose of the player and also based on the shot obtained we predict the runs that can be scored. As per the survey many algorithms and techniques have been proposed which include Artificial neural network, Computer vision, Deep convolutional neural network, Pose detection, Long short term memory, Recurrent Neural Network and Deep neural network. The Project has been implemented using Convolution neural network based algorithms which can be used for self-paced training and to predict score from a shot. In other words, the model identifies the shot of the player which can be related to the pose structure, by which the players can improve their shot pose, helping in training themselves. The dataset has been obtained from Kaggle where each shot has around 1000 images, with a total of around 4000 images. The results are obtained from the CNN models that are VGG-16 and ResNet-50, where the better results are obtained using ResNet-50. The dataset has been divided into 80% and 20% for training and testing purposes respectively. The score prediction for shot classification is done using the Linear regression model. This can help batsmen to improve their shot, bowlers to ball so that they can take wickets or reduce the runs and also would be helpful in training the players.
Keywords: Cricket shot, Convolution neural network, Resnet-50, VGG-16, Linear regression.
Abstract
SATELLITE AND RF ENABLED ASSISTANCE FOR MARINE NAVIGATION
Rishi Nagendra, Sri Hari Prasad H S, Shivam Kumar
DOI: 10.17148/IJARCCE.2023.125179
Abstract
Survey on Cardless Transactions using Face Recognition in ATM
Prof. Chayashree G , Rahul L , Ruchitha Bindhu H B , Prajwal R D , Rakshitha S
DOI: 10.17148/IJARCCE.2023.125180
Abstract: This research paper proposes the development of a cardless ATM system that aims to provide a more secure and convenient banking experience for users. The system includes two types of accounts, individual and joint, and requires login through mobile OTP, face recognition, and fingerprint authentication. The face and fingerprint recognition technology has been developed using Convolutional Neural Network (CNN) algorithms, ensuring accurate and reliable authentication.Upon successful login, users can perform various banking operations such as withdrawing and depositing money. The system also provides notification alerts to joint account holders upon the completion of any transactions.The proposed cardless ATM system aims to reduce the risk of fraud and enhance user convenience through the implementation of advanced authentication and transaction management features.
Keywords: Cardless ATM, CNN, Mobile OTP, Face Recognition, Fingerprint, Fraud detection.
Abstract
BLOCKCHAIN BASED TRUST SYSTEM FOR COUNTERFEIT PRODUCT DETECTION
Sanket Oza , Sushant Gore , Amol Koyade , Omkar Jadhav , Prof. Digambar Jadhav
DOI: 10.17148/IJARCCE.2023.125181
Abstract: With increase in new products, there is always a problem of counterfeits in almost every industry. It is essential to have a system which can check details of product and identify whether the product is genuine or counterfeit. Counterfeit plays vital role in todayâs world as it can affect many industries resulting in loss of sales, reputation, profits, ideas. In order to fight these counterfeit products, we have used blockchain technology. Blockchain technology is a decentralized, distributed ledger that stores transactions in the form of blocks in many databases that are interlinked to each other via chains. Blockchain is stable and secure as it has immutable property due to which the data once stored in blockchain nodes cannot be modified. By using blockchain technology, there is no need for customers to rely on third party for confirming product originality. Our project uses QR (Quick Response) codes to combat the problem of counterfeit. QR code scanner will be used by the buyer to scan the product for genuineness, as the QR code of each product is connected to our blockchain. System will check productâs unique code with the entries in our blockchain database. If code matches, the notification will pop out to customer stating product is genuine. If not, customer will receive notification that product is counterfeit.
Keywords: Blockchain, Counterfeit, Supply chain, QR codes.
Abstract
SURVEY ON AN INTEGRATED ARCHITECTURE FOR MAINTAINING SECURITY IN CLOUD COMPUTING BASED ON BLOCKCHAIN
Prof Megha V, Chandana BR, M Vivek Mahanthesh, Surya Prathap S, Vaishnavi B
DOI: 10.17148/IJARCCE.2023.125182
Abstract: By enabling on-demand access to computer resources and services through the internet, cloud computing has completely transformed the IT sector. Yet, because of the centralised architecture of cloud services, the security and privacy of data have grown to be significant issues. Blockchain technology has been suggested as a potential remedy to address these problems by offering a secure and decentralised foundation for cloud computing. This review article overviews current work on a blockchain-based integrated architecture for preserving security in cloud computing. This study examines the many elements of the integrated architecture, such as security standards, blockchain technology, and cloud computing. The survey also examines the various methods for integrating permissioned and permissionless blockchains, smart contracts, and consensus mechanisms into cloud computing. The study research also covers the benefits and difficulties of incorporating blockchain technology into cloud computing, including interoperability, scalability, and data protection. The report also provides a comparative review of the current methods for cloud computing integration of blockchain technology based on several factors including security, performance, and cost-effectiveness. The survey paper's conclusions discuss the directions that research in this area should take going forward, emphasising the need for more investigation into how blockchain and cloud computing technologies can work together to improve the security, privacy, and effectiveness of cloud computing services. Keywords â Blockchain, Cloud Computing, Decentralized, Smart Contracts, Data Privacy, Security, Scalability, Permissioned Blockchain
Abstract
Emotion Recognition with Audio, Video, EEG and EMG
Savitha M M , K. Vivekananda Reddy , Madhu.T. V , P. Dilip Kumar
DOI: 10.17148/IJARCCE.2023.125183
Abstract
ADVANCE SURVEILLANCE ROBOT BY USING ESP 32CAM AND SENSORS
ASST PROF. VISHALA I L,Mohammed Umar, Mahesh S, Sanjay B T
DOI: 10.17148/IJARCCE.2023.125184
Abstract
Efficient Tracking of Missing Person Using AI
Aditi A M, Aishwarya G Raj, Anu Devaraju C,Srinivas B V
DOI: 10.17148/IJARCCE.2023.125185
Abstract: For a very long time, law enforcement and search and rescue organizations have struggled to locate missing people. However, recent developments in artificial intelligence (AI) have made it possible to create more effective strategies for locating the missing person. One possible tactic is to use AI algorithms to examine a variety of data sources, like as social media posts and surveillance camera footage, in order to build a detailed profile of the whereabouts and conduct of the missing person. By combining these numerous data sources, AI systems might help detectives uncover trends and anomalies that might be indicative of the missing person's travels or activities. Face recognition has emerged as a popular and difficult problem in the image processing field, which is currently one of the technology trends. Finally, depending on past information and other important factors such as facial features, AI-powered predictive models can be created to assist authorities in anticipating where missing persons may be located. These models can support search and rescue teams. The application of AI technologies has the potential to completely transform the way missing people are tracked and located, offering quicker and more accurate findings while requiring less time and money to conduct a search.
Keywords: Artificial intelligence, image processing, CNN, missing person, open cv
Abstract
eXplainable and reliable against adversarial machine learning
Prof. Bhavya R A, Gopika T S, Anusha J
DOI: 10.17148/IJARCCE.2023.125186
Abstract
PROJECT-SERI Sericulture-Based Multipurpose Automatic Machine
Shreehari H S, Sumanth V N, Abhishek R, Afzal Pasha M
DOI: 10.17148/IJARCCE.2023.125187
Abstract
Flight Delay Prediction System in Machine Learning using Support Vector Machine Algorithm
Prof. Bharti Sahu, Kunal Desale, Ashish Patil, Prithvi Laishetty, Bhuvaneshwar Patil
DOI: 10.17148/IJARCCE.2023.125188
Abstract: Flight delays have been extensively studied in recent years. The rising demand for air travel has led to a rise in flight delays. Commercial scheduled flights regularly encounter delays as a result of clogged airspace, a rise in passengers each year, maintenance and safety concerns, unfavourable weather, and the delayed arrival of the aircraft that will be used for the next flight. In order to considerably reduce expenses, academics are looking at how to anticipate and analyse flight delays because it has become a serious problem in the US. The recommended approach therefore makes use of machine learning to predict flight arrival and delay. We have developed a model that implements different machine learning algorithms to predict whether a flight will be delayed or not based on certain characteristics. These characteristics include weather data, past flight data and flight details. We have analysed numerous algorithms based on past research and settled on the Support Vector Machine or the SVM algorithm. The SVM algorithm is a supervised machine learning algorithm which is majorly used for classification as well as regression problems. We also aim to help passengers in their stay in the vicinity of the airport in situations where their flights are delayed.
Keywords: Flight delay prediction, Supervised Machine Learning, Classification, Prediction, Support Vector Machine, Air traffic management, predictive analytics.
Abstract
Vehicle Speed Detection
Akanksha Kakde, LavanyaSangode, Shivesh Kumar Singh, Yash Ladekar
DOI: 10.17148/IJARCCE.2023.125189
Abstract: Vehicle Speed Detection and Estimation is an essential task for many traffic management and safety systems. In this research, we offer a novel computer vision-based method for real-time vehicle speed estimate and detection. To identify the cars and determine their speeds, our system first analyses video footage of the moving vehicles using image processing algorithms. On a dataset of actual traffic scenarios, we test the suggested algorithm, and the results show that it performs rather well in terms of accuracy. Potential uses for the suggested approach include traffic control, law enforcement, and intelligent transportation systems. Overall, this research helps to create methods for detecting and estimating vehicle speed that are accurate and efficient, which may greatly enhance traffic management and safety. The issue description, suggested solution, study methods, and findings are all briefly summarized in this abstract. It emphasizes the contribution to the area and draws attention to the research's importance and prospective uses. The abstract is succinct and informative, giving the reader enough details to comprehend the study and its significance to the subject.
Keywords: Image processing, computer vision, Nodejs, OpenCV, Image Processing, Moving Object Detection.
Abstract
A Review of RF and IoT based Asset tracking system
Mr. Manjunath. G, Aishwarya. H, D. Sony Christela, Sirisha Rani. A, Varshini. M
DOI: 10.17148/IJARCCE.2023.125190
Abstract
DETECTION OF OKRA DISEASE - A SURVEY
Maanyatha Mahesh,Suloni Praveen,Swathi Meghana K R, Supriya T C, Shraddha C
DOI: 10.17148/IJARCCE.2023.125191
Abstract
DEPRESSION DETECTION SYSTEM USING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Shubham Wadhavane , Shinde Suyog , Martule Akash ,Rushikesh Dhakane Dr. Megha Kadam
DOI: 10.17148/IJARCCE.2023.125192
Abstract: In a state of natural psychic equilibrium, tension may be viewed as a disturbance in general. A person's mental health will be put under stress if they cannot balance the expectations placed on them with their ability to cope with them. There are many different kinds of challenges. Psychological equilibrium disruption is a broad description of depression. Depression detection is one of the main areas of biomedical engineering study because it may be simple to avoid depression with the right measures. There are many bio signals accessible, including Mri, Rgb, oxygenation, and Frs. which can be used to determine depression levels because they show unique changes in depression induction. Due to the readily available recording, we use ECG as the top candidate in this endeavor. Multiple SVM model types have been examined by changing the function number and kernel type.
Keywords: Preprocessing, Segmentation, SVM Algorithm, Machine Learning. Feature Extraction, Classification CNN Algorithm.
Abstract
Snake Robot Gripper Module for Search and Rescue in Narrow Spaces
Chethan D, Dr. Bhaskar S
DOI: 10.17148/IJARCCE.2023.125193
Abstract
DESIGN AND IMPLEMENTATION OF A ROBOT TO ASSIST BEDRIDDEN PERSON
Shivani R Shankar, Sanjana R, Afrah Majid and Dr M V Sreenivas Rao
DOI: 10.17148/IJARCCE.2023.125194
Abstract: Bedridden individuals often face a significant challenge when it comes to performing daily activities due to their inability to move. Such individuals have to rely on others for assistance with even the most basic tasks, which can lead to a feeling of dependency and a reduced sense of autonomy. This lack of independence can negatively impact their mental and emotional well-being, and can cause a decline in their overall quality of life. To address this issue, we designed and implemented a robot to assist bedridden individuals in performing various tasks. This robot combines a mobile robot with a versatile robotic arm, which is controlled through the Blynk platform. The Blynk platform is a mobile application that allows users to remotely control devices that are connected to the internet. With the help of the ESP8266 microcontroller and L298N Motor driver, the robot can be easily maneuvered. The robotic arm utilizes servos to perform a wide range of angular movements, making it capable of performing many activities that were previously impossible for bedridden individuals. This technology allows bedridden individuals to perform tasks like object manipulation and relocation, providing them with a newfound sense of independence and significantly improving their quality of life.
Keywords: NodeMCU, Mobile robot, Robotic arm, Blynk IoT
Abstract
A critical review of dominant features used in machine learning approaches in COVID-19 Severity risk prediction
Ranjan Kumar , Vaibhav Maheshwari , Aaditya Tripathi
DOI: 10.17148/IJARCCE.2023.125195
Abstract: COVID-19, which is caused by SARSCoV2 (Severe Acute Respiratory Syndrome Coronavirus 2), has wreaked widespread havoc in recent years. Almost immediately after the epidemic, experts at nearly every public health center began investigating all possible sources of the virus. The spread surged dramatically in the early phases, which became a big concern in the medical community. Researchers employed numerous ML approaches in the computer age to study the causes and patterns of diffusion. As a result, several studies utilizing machine learning and artificial intelligence have been conducted in this field. This article examines the essential elements in predicting severity due to COVID-19 and summarizes new studies on predicting severity using machine learning. This studyâs reviewed research papers were published using various search techniques.
Keywords: COVID-19 Pandemic, Machine Learning, Feature Selection, Severity Risk, ML Techniques
Abstract
RAITHA SAATHI - An AI/ML-based application for market price and demand prediction
Dr. Archana B, Abhishek D Badiger,Rohit R Aradhya, Sonika KV, Varsha MG
DOI: 10.17148/IJARCCE.2023.125197
Abstract: Accurate prediction of crop prices is crucial for farmers to make informed decisions about agricultural production and trade. It enables them to optimize their planting decisions, determine the harvest time, and plan their sales strategy to maximize profits. Given the increasing volatility of agricultural markets due to climate change and other factors, the significance of crop price prediction has grown in recent years. As a result, sophisticated models that can analyze large amounts of data to provide accurate price forecasts are in high demand. Nowadays, farmers seek to leverage analytics for obtaining the data they need to make actionable insights and informed decisions. Automated farming is becoming more popular among farmers in many countries. Crop price estimation and evaluation are critical to minimize losses and manage the risk of price fluctuations when farming a specific crop type. Falling prices can lead to significant losses for farmers. In this study, we employed the Random Forest Algorithm to analyze past data, predict prices for new data, and estimate crop prices.
Abstract
IOT BASED WIRELESS MULTI-FUNCTIONAL WAR ASSISTANT ROBOT
Vishwa Shreeshail Badiger, Nirmala Devi A C, Vinod R,Vinay P L
DOI: 10.17148/IJARCCE.2023.125198
Abstract
INTELLIGENT ACCIDENT DETECTION SYSTEM FOR AUTOMOBILES
Peta Sukumar, Prasanna Kumar DC, Jagadish S, Vivek Halanna
DOI: 10.17148/IJARCCE.2023.125199
Abstract
SOLAR OUTDOOR AIR PURIFIER WITH AIR QUALITY MONITORING USING IOT
Dr Nagendra Kumar M, Darshan K Gowda, Suprith S, Vinay N
DOI: 10.17148/IJARCCE.2023.125200
Abstract
EVENTSPHERE
Basavraj Gadade, Ranjit More, Dipanshu Garg, Nishant Chaware
DOI: 10.17148/IJARCCE.2023.125201
Keywords:
event infrastructure, audience, attendees, organizers, venue, and mediaAbstract
Anxiety And Depression Detection Using Deep Learning Technique
Ravinarayana B , Shrimanth , Spandana , Swasthik Jain P M , Varshith V Hegde
DOI: 10.17148/IJARCCE.2023.125202
Abstract:
The majority of individuals cope with stress on a regular basis in varied situations in their daily activities. However, sustained tension or a high level of stress will compromise our safety and interfere with our regular activities. Many physical issues linked to stress can be avoided through early detection of mental stress. There are noticeable changes in a variety of physiological and psychological characteristics, such as facial emotion, speech emotion, etc. when a person is under stress. Data from these features can predict whether a person is stressed or depressed. By using all these and some standard questionnaires, the system's probability of predicting anxiety and depression will increase. The system was evaluated on a dataset of individuals with and without anxiety and depression and achieved promising results with high accuracy and sensitivity. In our proposed system, we have used three modules: facial emotion, speech emotion, and standard questionaries. For the detection of facial emotion, we have used VGG16, for the detection of speech emotion, we have used DNN, and for the standard questionaries, we have used SVM. Finally, we integrated all these modules by using a soft voting mechanism to get the desired outcome. This proposed approach has the potential to provide a non-invasive and efficient method for early detection of anxiety and depression in individuals.Keywords:
SVM, VGG16, facial emotion, speech emotion.Abstract
CROP YIELD PREDICTION USING DEEP LEARNING
Priyanka Jadkar, Yashwant Mahamuni, Pranay Patil, Suhas Sathe
DOI: 10.17148/IJARCCE.2023.125203
Abstract:
Crop yield prediction is an important area of research that involves analyzing environmental, soil, water, and crop parameters. Deep-learning models have gained popularity for extracting meaningful crop features to make accurate predictions. However, these methods have certain limitations. They are unable to establish a direct relationship, whether linear or nonlinear, between the raw data and crop yield values. Additionally, the performance of these models heavily relies on the quality of the extracted features. To overcome these drawbacks, deep reinforcement learning offers a solution. By combining the strengths of reinforcement learning and deep learning, deep reinforcement learning constructs a comprehensive framework for crop yield prediction. This framework effectively maps the raw data to the predicted crop values, addressing the aforementioned inadequacies.Keywords:
Deep learning, linear mapping, nonlinear mapping, predictionAbstract
A REVIEW ON FARM MONITORING AND POLLUTION DETECTION DEVICE USING IoT
Brahmani Rajkumar Raavi, Shreyash Sushil Bhagwat, Amol Sunil Lode, Yash Bhupendra Lodhiya, Ankit Suhag
DOI: 10.17148/IJARCCE.2023.125204
Abstract:
Farming has been the most important thing since the neanderthal age. Food, shelter and clothes are the basic that a person needs and farming is the root to all. In Early days people used simple and manual tools to grow a crop, such as sticks, hoes, sickle to plant and harvest crops. A few years back farming was a labour-intensive process. Farmers often had to work for long hours and any kind of irregularities in the atmosphere can ruin everything. But later, it became quiet a relief to the farmers, with all those automation techniques, machines, almost half of the work can be done within minutes. Although that too had a lot of efforts in it, still improper rain can damage the yields and the prices could go high. The solution for that is IoT. With the help of IoT and its sensors the amount of water required in the field can be checked and start the irrigation with just one click. With IoT a farmer can just supervise his farm and IoT sensors can do the rest of the work. A reference paper that we took into consideration discusses a system that combines software and hardware to allow farmers to monitor and control various aspects of their fields in real-time. The focus is on weather stations and mobile data logging for monitoring, and the relationship between these technologies and Smart IoT-based farm monitoring is explored. In the past, farming has seen the advent of grain elevators, mechanized ploughers, chemical fertilizers, and gas-powered tractors, while the use of satellites for planning tasks became prevalent in the late 1900s. Looking forward, IoT is poised to revolutionize farming and become a new standard in the field, with smart farming becoming increasingly promising thanks to technological advancements in automation.Keywords:
Internet of Things, Agricultural activities, Farming, Sensors, Technology, Smart Computing.Abstract
Deep Learning For Screening Covid-19 Using Chest X-Ray Images
C Rangaswamy, Chitra Suresh, Gayithri V, Gireeshma A S
DOI: 10.17148/IJARCCE.2023.125205
Abstract:
The year 2020 has witnessed the effects of global pandemic outbreak through the unprecedented spread of novel coronavirus COVID-19. As the testing of coronavirus happened manually in the initial stage, the ever- increasing number of COVID-19 cannot be handled efficiently. Also, the coronavirus is divided into 3 phases and it has different effectson lungs. To handle this situation, researchers have attempted to detect coronavirus using chest X-ray images and Chest CTscan images by using Artificial Intelligence[AI] technologies. AI helps to forecast the coronavirus cases for analysing the virus structure and chest X-Ray and CT scan images helps to predict the stags of corona virus. Henceforth, this paper has developed a CNN model, which utilizes 3 classes as follows: positive COVID-19 images, normal images and viral pneumonia images. The model has been trained on these set of images and got 94% of accuracy on training dataset and 96% of accuracy on validation dataset. The proposed model has achieved the test accuracy of 94% for 3 classes in Chest X-Ray image classification. The main motive behind developing this model is to reduce its computational time by using less layers and more hyper parameter tuning. The proposed model is compared with pre-existing models as they were more complexand took much training time. Till now 94% of accuracy has been achieved on test dataset. Keywords- Convolutional neural networks, COVID-19, neural networks, X-RayAbstract
IOT-WEARABLE YOGA AND EXERCISE DEVICE WITH CHILLER JACKET
Savitha M M, Gagana N V, Chaithanya M N, Chandana G
DOI: 10.17148/IJARCCE.2023.125206
Abstract:
To bridge the time between the patient's routine and their regular doctor, a project has been created. Here, sensors are used to read and record the regular parameters that a doctor must keep track of. Here, we're saving ourselves the time that would have been required for a routine checkup. This device is more effective at supplying the necessary detailed data, which can be evaluated in a matter of minutes. This technology also allows automatically adjusting body temperature, which benefits those in need like troops, the elderly, etc. Because elderly individuals and patients typically require assistance with every movement due to a lack of energy, this project includes notifications for any unusual patient falling.Keywords:
Renesas, Microcontroller, accelerometer, buzzer.Abstract
SMART VEHICLE PARKING
Sane Bharath Teja, Shwetha v, S Sameer, Yeddula Charan Reddy
DOI: 10.17148/IJARCCE.2023.125207
Abstract
IoT Botnet Cyber Attack Detection
Kajal Sawant, Prajakta Jadhav, Shraddha Shirsath, Shubhangi Dhumal
DOI: 10.17148/IJARCCE.2023.125208
Abstract
âCHILD RESCUE SYSTEM FROM OPEN BOREWELLS USING FLAP FOLDING MECHANISMâ
VEENA S, GALI JASWANTH REDDY, SHRUTHI K G, SNAYANI M
DOI: 10.17148/IJARCCE.2023.125209
Abstract: -
The "Child Rescue System From Open Borewells Using Flap Folding Mechanism" Is An Innovative Approach To Rescue children who have fallen into an open borewell. Open borewells are a significant hazard in many regions, and children are particularly vulnerable to falling into them. The proposed system includes a mechanism that can fold flaps and rescue the child safely. The system comprises a motor, a gearbox, a chain drive, a winch, and a folding flap mechanism. The motor and gearbox are mounted on a frame that is placed on the borewell's mouth. The chain drive is connected to the motor, and it drives the winch. The winch is attached to a rope, which is lowered into the borewell. The folding flap mechanism is designed to fit the diameter of the borewell. When a child falls into the borewell, the mechanism is activated, and the flaps fold up. The winch then pulls the rope, along with the child, to the surface. The system is controlled by a remote control, which can operate the motor and winch. It can also control the folding flap mechanism. Overall, the "Child Rescue System from Open Borewells using Flap Folding Mechanism" is an innovative and potentially life-saving technology. It can rescue children who fall into open borewells safely and quickly, without endangering the rescuers.Abstract
Automated Online Exam Proctoring Using AI
Ameya Vaidya, Tanmay Parkhi, Amruta Vaidya, Samiksha Wankhade, Seema Mane
DOI: 10.17148/IJARCCE.2023.125210
Abstract:
Over the past few years, online education has expanded quickly as more students enrol in MOOCs and other online courses. The COVID-19 pandemic has also sped up colleges' shift to online education. Another issue with online education is how to maintain academic integrity when taking tests. The research offers a multimedia analytics system for online exam proctoring (OEP) to overcome this issue. The system aims to offer real-time proctoring to identify test-taker cheating behaviour. The method employs audio-visual compliance to keep an eye on test-takers and spot any instances of cheating. In the world of education, AI-based proctoring systems (AIPS) are gaining popularity. Artificial intelligence is used by these systems to keep an eye on students during exams and catch any cheating activity. Online tools are generally used by online proctoring systems (OPS) to guarantee exam integrity. These issues can be addressed and the validity and fairness of exams in online education can be ensured through the deployment of AI-based proctoring systems, such as the multimedia analytics system described in the study.Keywords:
COVID-19, MOOCS, OEP, AIPS, OPS.Abstract
Automatic Waste Segregation in Trash Bin using IoT and Machine Learning
Ravinarayana B , Madhu Shankar Moger , Nithish Prabhu , Palash Chiplunkar , Prathijna D S
DOI: 10.17148/IJARCCE.2023.125211
Abstract:
The conventional waste management system has proven to be inefficient and costly, relying on a daily schedule. Similarly, the current recycling bin is ineffective because the public fails to segregate waste properly. However, with the advancement of Internet of Things (IoT) and Artificial Intelligence (AI) technologies, there is a potential to replace the conventional waste management system with smart sensors that can automate waste segregation and enhance the waste management process. The primary objective of this research is to develop a smart waste management system that incorporates IoT and machine learning models. The system features several compartments, which are controlled by servo motors, facilitating segregation of waste into categories such as metal, plastic, paper, wet waste, and general waste. Each compartment contains an ultrasonic sensor that monitors the waste filling level in real-time.Keywords:
waste classification, IoT, smart waste management.Abstract
GREEN CLOUD COMPUTING
Miss. Vaishali M. Vaidya, Mr. Vijay M. Rakhade, Mr. Neehal B. Jiwane
DOI: 10.17148/IJARCCE.2023.125212
Abstract
FIRE ALARM NAVIGATION SYSTEM-IOT
Ms SOWMIYA J S B.Tech, M.E, SOORIA S, PREM KUMAR S, VHOOM PRAKASH M
DOI: 10.17148/IJARCCE.2023.125213
Abstract:
In Fire alarm systems are becoming more sophisticated, capable and reliable. Life and property insurance are the two main purposes. Over the past two decades, firefighting has become more focused on life safety due to state and local regulations. Various safety measures have been introduced to solve the problems caused by fires and reduce loss of life and property. Our project aims to create and evaluate an IoT based fire alarm navigation system and application. The purpose of fire alarm systems is to warn people of impending fires so they can get out of the area and act quickly to extinguish the fire. There is a GSM module, a GPS module, buzzers, LEDs and flame detectors for quick communication between the authorities and the fire station. The goal is to reduce property and lives.Keywords:
Fire alarm, IoT, Safety , Modules.Abstract
NEED FOR DETECTING DRIVERS DROWSINESS USING IMAGE PROCESSING
Aditya Deshmukh, Sanket harke, Shruti Tiwari, Sakshi Kumkar, Prof. Digambar Jadhav
DOI: 10.17148/IJARCCE.2023.125214
Abstract:
Driver drowsiness is a major cause of road accidents worldwide, leading to significant loss of lives and property. To address this critical issue, the development of an effective and reliable system for detecting driver drowsiness has become essential. This abstract presents the need for employing image processing techniques in detecting driver drowsiness, highlighting its potential to enhance road safety. The proposed solution leverages computer vision and image processing algorithms to analyze real-time images or video frames captured from a camera placed inside the vehicle. By monitoring the driver's facial features and eye movements, the system can accurately determine the level of drowsiness and issue appropriate warnings or alerts when necessary. In conclusion, employing image processing techniques for detecting driver drowsiness is a crucial step towards improving road safety. By leveraging computer vision and machine learning, this approach has the potential to save numerous lives, prevent accidents, and create a safer driving environment for everyone. Future research and development efforts should focus on refining and deploying such systems widely to enhance overall road safety.Keywords:
Image processing ,Driver drowsiness detection ,Fatigue detection ,Eye tracking ,Driver safety.Abstract
A SMART AI TRAINER FOR DETECTING THE FAULTY FORMS OF PUSH UPS
Ms. Shimona E, Emani Keerthi Reddy, Kancharla Bhavya, cuddapah Purnima
DOI: 10.17148/IJARCCE.2023.125215
Abstract
Automatic Number Plate Recognition by Using WPOD Network
Ms. Shimona E, Varshitha Duvvuri, Mattipu poojitha, Kurapati Jahnavi
DOI: 10.17148/IJARCCE.2023.125216
Keywords:
Number Plate, Convolutional Neural Networks, Optical Character Recognition.Abstract
ASSISTIVE DEVICE FOR BLIND, DEAF AND DUMB PEOPLE USING RASPBERRY PI
VEENA S, PRAKRUTHI MS, SRUSHTI N, VK BHAVYADHA
DOI: 10.17148/IJARCCE.2023.125217
Abstract:
Assisting to the people with visual, hearing and vocal impairment through the modern system is a tough job. Now the modern-day researches are only focusing on the issues of any one of the impairments in the above challenges but not all. This work is performed mainly to find the unique technique/solution for people with visual, hearing, vocal improvement to communicate with each other and also with the normal persons. The main part is Raspberry pi on which all these activities are carried out. This work provides the assistance to visually impaired person by making them hear what is present in text format. For hearing impaired people, the audio signals are converted into text format by using speech to text conversion technique. And for vocally impaired people, they can convey their message by the help of speaker by using text to speech conversion. Â Â Key words: Raspberry pi, image to voice, text to voice, speech to textAbstract
A Review of a Transport Inventory System in association with Tender Web Application
Chhabi Lal, Vivek Singh Rathore
DOI: 10.17148/IJARCCE.2023.125218
Abstract: Transport Inventory System (TIS) is a digital solution that facilitates the management of all transportation activities from beginning to end for any organization. This system will help automate the transport operation and allow managing all the various tasks and activity. This Transport Inventory based system provides web application stores all the vehicle and job-related information in a dynamic format, making it easy for users to access data with just a single click. One of the core features of this application is the Tender system, which enables transporters to view open tenders and quote for them. The system also provides details of approved tenders, including tender amount, dispatch date, and payment dates for future reference. The Transport Inventory System (TIS) helps streamline transportation activities, eliminating the need for maintaining registers and enabling quick access to indent reports. This system comprises four main components, including indenter, transporter, super admin, and admin, with specific responsibilities related to managing transportation activities. The Transport Inventory System (TIS) simplifies the transportation process and increases productivity, making it an essential tool for managing transportation activities in any organization. This Transport Inventory System (TIS) will help the users in improving their planning and scheduling of transportation. In addition indent feeling and reducing their time and energy, and making their working process more efficient.
Keywords: Transport Inventory System, transportation activities, web application,  tender system, productivity, transparency.
Abstract
Stock Market Prediction Using RNN
Avin Mahajan, Krushna Fuke, Shivam Raut, Pranay Mahakal, Prof. Zarina Shaikh
DOI: 10.17148/IJARCCE.2023.125219
Abstract:
Future stock prices are frequently predicted using historical financial entity prices. This paper uses a two-layer reasoning technique to present a novel financial entity price prediction model. The first layer directs the second layer, which relies on learning techniques, using domain knowledge acquired from scientific study.An effective money management approach is added to the model to increase its performance. When choosing whether to buy, sell, or do nothing, this method takes into account the past performance of the model's predictions as well as the investor's available funds. The development of deep learning mining, which seeks to identify profitable technical trading patterns made up of combinations of indicators taken from previous financial data series, distinguishes this work from others. Trading guidelines are regarded as these patterns.Keywords:
Stock Market, RNN.Abstract
IoT based Aquaculture System
Prof. Chandra Prabha R , Rajani Kanth M R , Rakesh K S , Rohith S , Vijay
DOI: 10.17148/IJARCCE.2023.125220
Abstract: India boasts a vast coastline and a thriving fishing industry, making it the world's third-largest fish producer, with an average production of 11 million tons of aquatic products annually. The states of Andhra Pradesh and West Bengal are the top producers of marine food in the country. Aquaponics, which is the integration of aquaculture and hydroponics, is playing a vital role in India's development and contributing significantly to the country's rising GDP growth. In fact, aquaponics alone produces over 41 million tons of production, making a substantial contribution to the economy. As the demand for aquatic products continues to grow, it is essential to monitor aquaponics production closely. This is where the proposed IoT-based aquaculture system comes in. Implemented using a microcontroller, this system offers a comprehensive solution for monitoring the aquaponics production process, enabling farmers to monitor critical parameters such as water temperature, gases present in the atmosphere, turbidity, water level, and pH level inside the pond. These parameters are crucial for optimal fish growth and health, and by continuously monitoring them, farmers can detect any variations or abnormalities that may impact the fish's health or growth. One of the key features of this system is its ability to send alert notifications to individuals via LORA Tx and Rx modules. These notifications allow farmers to take immediate action if needed, ensuring that the aquaponics production process is not affected by any anomalies that may occur. Additionally, the system monitors all sensor and actuator status and transmits data to the IoT cloud for further analysis. The proposed IoT-based aquaculture system offers an efficient way to monitor and maintain optimal fish growth and health, contributing to the continued success of India's thriving fishing industry.
Keywords: Aquaculture system, Water temperature, pH level, Water level, Gases in the atmosphere, Turbidity of water, real-time, Aquaponics, IoT based.
Abstract
WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM IN ROADWAYS USING SOLAR POWER
Dr. Anitha T G,Charan V, Srinivas H T, Abhishek V T, K Srivatsa
DOI: 10.17148/IJARCCE.2023.125221
Abstract: Solar power generation has emerged as one of the most rapidly growing renewable sources of electricity. Solar power generation has several advantages over other forms of electricity generation. We have designed solar roadways which harvest electricity using solar panels. The electric vehicles using solar energy will be running on these Solar road ways, in which power generated by solar energy is being transferred from solar roadways using wireless power transmission concept. This system makes use of a solar panel, battery, transformer, regulator circuitry, copper coils, AC to DC converter, Atmega controller and LCD display to develop the system. Keyword: . Solar panel, Copper coils, AC to DC converter.
Abstract
LOCATING OBJECTS IN WAREHOUSES USING BLE BEACONS AND MACHINE LEARNING
Bharath S, Srivani E N, Akhil V Narayan
DOI: 10.17148/IJARCCE.2023.125222
Abstract
REVIEW ON CYBER SECURITY
Harshali R. Tapase, Vijay. M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2023.125223
Abstract: Cybersecurity plays an essential part in the field of Information Technology. We'll be assaying a variety of Cyber-attacks and different security styles. Securing information has come one of the biggest challenges in the present day. Whenever we think about cyber security, the first thing that comes to mind is âcybercrimeâ, which is adding immensely daily. Various Governments and companies are taking numerous measures to help this cybercrime. Besides different styles, cyber security is still a huge concern to numerous. This paper concentrated on the challenges cyber security faces on the rearmost technologies. It also focuses on the rearmost cyber security ways, ethics, and trends changing the face of cyber security.
Keywords: cyber security, cybercrime, online
Abstract
Segshare:Secure group file sharing in the cloud using enclaves
Prof.Ninad More, Omraj Nichal, Akash Shinde, Abhishek Ahire, Anuj Bhojane
DOI: 10.17148/IJARCCE.2023.125224
Keywords:
CloudComputing,Saas,Encyption,Data SharingAbstract
InterpretML: A Unified Framework for Machine Learning Interpretability
Kiran Bandu Donge, Lovelesh N.Yadav, Neehal B.Jiwane
DOI: 10.17148/IJARCCE.2023.125225
Abstract:
InterpretML is an open-source Python package which exposes machine learning interpretability algorithms to practitioners and researchers. InterpretML exposes two types of interpretability â glassbox, which are machine learning models designed for interpretability (ex: linear models, rule lists, generalized additive models), and blackbox explainability techniques for explaining existing systems (ex: Partial Dependence, LIME). The package enables practitioners to easily compare interpretability algorithms by exposing multiple methods under a unified API, and by having a built-in, extensible visualization platform. InterpretML also includes the first implementation of the Explainable Boosting Machine, a powerful, interpretable, glassbox model that can be as accurate as many blackbox models. The MIT licensed source code can be downloaded from github.com/microsoft/interpret.Keywords:
Interpretability, Explainable Boosting Machine, Glassbox, BlackboxAbstract
Ethical Hacking and Management
Monali Bhogekar, Neehal B. Jiwane, Lovlesh.N.Yadav
DOI: 10.17148/IJARCCE.2023.125226
Abstract:
We have been living in the modern technology of the world where all the data and the resource comes us in the online mode rather it is personal data or any information notice and so on as nowadays all the information are available online there are large number of user who are accessing it among some of them uses the information for gaining the knowledge and some think how to destroy or steal the data which are present in the website or database without any knowledge of the owner of the website. This paper purpose is that how the data has been stolen by someone itsknow as hacking who are those hackers , what code conduct of ethical hacker and need of them. As we can see that the state security on the internet is very poor hacking is the activity in which the person exploits the weakness in the system for the profit of themselves. The public and the private organization migrates the function applications such as marketing, commerce and database which are access on the internet. This paper describes about the attacks of the hacking and what is the ethical hacking and impact of ethical hacking.Keywords:
Ethical hacking, hacking, hackers, risk managementAbstract
A Survey of the State of Cloud Security
Dipali Vivek Thakre, Lovelesh N. Yadav, Neehal B. Jiwane
DOI: 10.17148/IJARCCE.2023.125227
Abstract:
Cloud computing has emerged as an important paradigm in computing today with the potential to offer scalable, fault tolerant services and reduce costs significantly. However, security concerns present significant barriers in its adoption industry wide. The multitenant nature of the cloud and the fact that data is stored in multiple locations compound these security concerns. Confidentiality, authenticity, integrity, availability and auditability are key aspects that need to be accounted for, when dealing with security. Guarantees of secure data and transactions from the service provider will enable more users to migrate to a cloud environment. Employing Intrusion Detection Systems, Cryptographic techniques and Computer Forensic Tools that recover deleted files and collect digital evidence of intruder activities are among some of the guarantees a trustful service provider can provide. This paper presents a survey on some of the common threats and associated risks on cloud platforms along with ways of tackling these threats. We also review data management and security model of some of the leading cloud service providers.Keywords:
cloud computing security, cloud computing, cloud risk assessmentAbstract
Cyber Security and Privacy Issues in Smart Grids
Arpita Mahadev Belekar, Lovelesh N.Yadav, Neehal B.Jiwane
DOI: 10.17148/IJARCCE.2023.125228
Abstract:
smart grid is a promising power delivery infrastructure included with communique and statistics technologies. Its bi-directional communique and power float permit each utilities and customers to monitor, predict, and control strength usage. It additionally advances energy and environmental sustainability thru the integration of significant dispensed energy assets. Deploying any such green electric powered machine has considerable and far-achieving monetary and social blessings. nevertheless, improved interconnection and integration also introduce cybervulnerabilities into the grid. Failure to cope with those issues will hinder the modernization of the prevailing electricity machine. In order to build a reliable smart grid, a top level view of relevant cyber protection and privacy troubles is presented. based totally on contemporary literatures, numerous capability research fields are discussed on the give up of this paper.Keywords:
smart grid, SCADA; AMI, security, privacyAbstract
A Review paper based on Cryptography and Network Security
Achal M. Talase, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2023.125229
Abstract:
With the arrival of the World Wide Web and the emergence of ecommerce operations and social networks, associations across the world induce a large quantum of data daily. Information security is the most extreme introductory issue in guaranteeing safe transmission of data through the web. Also, network security problem is now obtained essential as the community is relocating towards digital information age. As further and further druggies connect to the internet it attracts a lot of cyber-attacks. Itâs needed to cover computer and network security i.e., the critical issues. The nocuous capitals make an issue in the system. It can use the means of different capitals and guard the means of its own. In this paper we provide an overview on Network Security and various ideas among which Network Security could be perfect i.e., Cryptography.Keywords:
Security, Threats, Cryptography, Encryption, DecryptionAbstract
PENETRATION TESTING USING ETHICAL HACKING
Girish Shivkumar Puranik(72170276H), Simran Vishnu Makhija(72170281D), Siddharth Rajeshkumar Bedmutha(72170251B), Shruti Kundan Meshram(72170266L)
DOI: 10.17148/IJARCCE.2023.125230
Keywords:
Network security, defense mechanism, various tools, security of data.Abstract
ARTIFICIAL INTELLIGENCE BASED FACE RECOGNITION FOR SECURITY SYSTEM
Dr. Levy M, Dwarakanath T, Chethan P, Akshay B G
DOI: 10.17148/IJARCCE.2023.125231
Abstract
DETECTING DISEASES OF VARIANT NATURE IN HUMANS BY ENHANCED ALGORITHM USING SVM
Chitralekha Dwivedi, Priyanshika, Srishti Kamble, Saurav Nikum, Mrudula Avhad
DOI: 10.17148/IJARCCE.2023.125232
Abstract: The healthcare organisation creates a massive amount of patient data, which may be analysed in a variety of ways. As a result, with the assistance of a machine learning, we developed a prediction system that can identify many diseases at the same time. We have focused on various diseases: heart disease, liver disease, diabetes, etc however many more diseases may be included in the future. The user must enter numerous illness parameters, and the system will determine whether the person has the diseases or not. Support vector machines with adaptivity were utilised to identify numerous illnesses. The goal was to offer an adaptive SVM-based diagnostic technique that was automated, rapid, and versatile. To improve outcomes, the bias value in traditional SVM was changed. The suggested classifier produced 'if-then' rules. Using the recommended technique, several diseases were detected, as well as increased categorization rates. The key emphasis of future research should be the development of more effective ways for changing the bias value in classical SVM.
Keywords: Diseases Prediction System, Supervised Machine Learning, Classification, Prediction, Support Vector Machine, Health Care Analysis.
Abstract
The impact of computer science and information technology teaching on the growth of software industry
Tejasvini Ankush Naukarkar , Ashish.b.Deharakar , Neehal.B.Jiwane
DOI: 10.17148/IJARCCE.2023.125233
Abstract: on this research paintings we mentioned the significance of pc science and records era teaching. We explored the components of the strategic laptop technological know-how and statistics era teaching which are important to cope up with the swiftly converting era and statistics generation paradigm at the side of its effect on the fast growing software program commercial growth. we've also thrown a few mild at the bits and bobs of the current computer science and records technology curricula, and suggested certain tips for the curricula to match into the modern software business wishes
Abstract
Cyber Security Of Embedded Iotâs In Smart Homes: Challenges, Requirements, Countermeasures And Trends
Veena S , V K Bhavyadha
DOI: 10.17148/IJARCCE.2023.125234
Abstract: Connected computers and sensors transmit data across the Internet to solve problems and generate new services (IoT). Smart homes use IoT, for example. Smart home technology can monitor temperature, detect smoke, regulate lighting automatically, and install smart locks. It also poses additional security and privacy problems, such as accessing user data through surveillance equipment or false fire alarms. Smart homes are vulnerable to numerous sorts of assaults. This survey emphasizes IoT. We discuss IoTâs design, objects, and standards. We also address the tiered Internet of Things framework and smart home security concerns. In this article, researchers examine IoT-based smart home difficulties and offer solutions.
Abstract
ON ROAD VEHICLE BREAKDOWN ASSISTANCE
Prof. Shital S. Aher(Guide), Unhale vrushali Tribhuvan ,Gade pranjal Balasaheb , Patil tulshidas devashri
DOI: 10.17148/IJARCCE.2023.125235
Keywords: On road vehicle breakdown , Python , Django, HTML , CSS , Javascripts
Abstract
VOICE MAIL APPLICATION FOR VISUALLY IMPAIRED PERSONS
Santhosh G ,Nagasubramanya C , M R Rahul , Pavan Gowda B S
DOI: 10.17148/IJARCCE.2023.125236
Abstract: The Voice Mail Application for Visually Impaired Persons is an innovative mobile application designed to enhance communication accessibility for individuals with visual impairments. Visual impairment poses significant challenges in using traditional text-based communication methods, such as reading and sending text messages. This application aims to bridge the communication gap by leveraging voice-based technology to enable visually impaired users to manage their voice messages efficiently.The application offers a user-friendly interface and utilizes advanced speech recognition and synthesis technologies to facilitate seamless voice-based interactions. Users can easily navigate through their voice messages, listen to incoming messages, and compose and send voice messages to their contacts. The application employs natural language processing techniques to transcribe voice messages into text format, which can be beneficial for individuals who are proficient in reading
Abstract
DESIGN AND DEVELOPMENT OF LOWCOST HIGH ENDURANCE AGRI DRONE FOR SPRAYING PESTICIDES ON ARECA NUT
Mr. Ajith Kumar ,Sudarshan Goudappanour , Preran S T , Adhith , Shreenidhi M M
DOI: 10.17148/IJARCCE.2023.125237
Abstract: The use of drones in agriculture has become increasingly popular in recent years, with the ability to spray pesticides being one of their most useful applications. Arecanut, also known as betel nut, is an important cash crop in many parts of the world, and the use of drones for pesticide spraying can greatly improve its yield and quality. This technology allows for more precise and efficient spraying, reducing the amount of pesticides needed and minimizing the risk of exposure to humans and wildlife. Additionally, drones can access hard-to-reach areas and can cover large areas of land in a short amount of time. The use of drones for pesticide spraying in arecanut cultivation can lead to increased profitability for farmers and improved environmental sustainability.
Abstract
Emotion Recognition from Formal Text (Poetry)
Prof. Vishal Walunj, Ankit Choudhary, Ameya Kale, Mangesh Gade
DOI: 10.17148/IJARCCE.2023.125238
Abstract: The classification of emotional states in poetry or formal texts has received less attention from experts in computational intelligence than informal textual content, such as SMS, email, chat, and online user reviews. This work introduces a technique for classifying emotional states in poetry using cutting-edge Artificial Intelligence technology known as Deep Learning in order to fill this knowledge gap. To analyse the poetry corpus and categorise the text into different emotional states, such as love, joy, hope, grief, anger, and others, the system uses an attention-based C-LSTM model.
Abstract
A Performance Comparison of Machine Learning Algorithms for Load Forecasting in Smart Grid
Miss. Vaishali M. Vaidya, Harshit K. Mundra, Laxmi M. There, Sandhya Bachar,Ashish B. Deharkar, Mr. Neehal B. Jiwane
DOI: 10.17148/IJARCCE.2023.125239
Abstract: Load forecasting plays a crucial role in the efficient management and planning of electricity distribution in smart grids. Machine learning algorithms have shown promising results in load forecasting, enabling accurate predictions and aiding decision-making processes. This paper presents a comprehensive performance comparison of various machine learning algorithms for load forecasting in smart grids...
Abstract
SMART MANAGEMENT OF EV CHARGING STATIONS USING AI CHATBOT AND GMAPS API
Prof.Gajanan Kumbhar, Aryan Borkar, Sunil Kamle, Zishan Inamdar, Sayyed Razzak
DOI: 10.17148/IJARCCE.2023.125240
Keywords: Management System, charging slot, EV Cars, Maps.
Abstract
Design and implementation of Emotion Recognition System
Anjali Vijay Nikhate, Devyani Waman Channe, Sakshi Sanjay Sontakke, Isha Prabhakar Chaple
DOI: 10.17148/IJARCCE.2023.125241
Abstract:
Human emotion recognition has significant part in our day to day lives. Objective of the study is to develop and implement a system capable of analyzing, predicting, and classifying emotions in real-time using Convolutional Neural Network (CNN) algorithm, with the assistance of the OpenCV library. The proposed approach enables the classification of various emotions, including anger, disgusted, fear, happy, neutral, sad, and surprised, based on feature extraction. FER2013 dataset is utilized for performance evaluation, and pre-processing techniques such as facial landmark detection are employed during training and testing. This dataset is utilized for training and testing purposes, as it is understood that while one-third of communication is conveyed verbally, the remaining two-thirds are conveyed through non-linguistic. means. Although there are existing emotion recognition systems, in real-life scenarios, consider the example of mental hospitals where this technology provides medical professionals with insights into patients' emotional states. By leveraging this technology, medical professionals can offer improved care and potentially enhance outcomes. Facial expression recognition remains a challenging problem in computer vision, as images of the same person in different expressions can change in brightness, background, and position.Keywords:
Emotion recognition, Convolutional Neural Network (CNN), OpenCV, Pre-processing.Abstract
A SURVEY ON AGUMENTED REALITY
Akshay B G(1SJ19EC006), Dr. Levy M
DOI: 10.17148/IJARCCE.2023.125242
Abstract:
Augmented Reality is a combination of a real and a computer-generated or virtual world. It is achieved by augmenting computer-generated images on real world.AR increases engagement and interaction and provides a richer user experience. Research has shown that AR increases the perceived value of products and brands and industries like Automotive, Consumer/Retail, Education, Financial, Publishing and Tourism/Heritage. In AR, technologies like SLAM (Simultaneous Location and Mapping), Depth Tracking and Image Processing and Projection are used. They both have certain similarities and differences. Augmented Reality has various application in the field of medical, manufacturing, entertainment & games, robotics and education. It can be concluded that how the use of Augmented Reality can be beneficial in our day to day lives. In spite of having many threats to its success,prospected.ÂAbstract
SMS SPAM DETECTION USING DEEP LEARNING
Prof. Manjunatha P V ,Sri Narahari C N, Sriram Lakshmi Narasimha, Tarun Muthyala, Rakshith R
DOI: 10.17148/IJARCCE.2023.125243
Abstract
A Review paper Based on COVID â 19 Application On Deep Learning
Janhavi Anil Chiwhane, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2023.125244
Abstract:
This check explores how Deep knowledge has battled the COVID- 19 epidemic and provides directions for future disquisition on COVID- 19. We cover Deep knowledge operations in Natural Language Processing, Computer Vision, Life loreâs, and Epidemiology. We describe how each of these operations vary with the vacuity of big data and how knowledge tasks are constructed. We begin by assessing the current state of Deep Learning and conclude with pivotal limitations of Deep Learning for COVID- 19 operations. These limitations include Interpretability, Generalization Metrics, Learning from Limited Labelled Data, and Data insulation. Natural Language Processing operations include mining COVID- 19 disquisition for Information Retrieval and Question Answering, as well as Misinformation Discovery, and Public Sentiment Analysis. Machine Vision operations drape Medical Image Analysis, Ambient Intelligence, and Vision- established Robotics. Within Life loreâs, our check looks at how Deep knowledge can be applied to Precision Diagnostics, Protein Structure prophecy , and Drug Repurposing. Deep knowledge has also been employed in Spread auguring for Epidemiology. Our literature review has set up multitudinous samples of Deep knowledge systems to fight COVID- 19. We hope that this check will help accelerate the use of Deep Learning for COVID- 19 disquisitionKeywords:
COVID- 19, Deep Learning operations, Natural Language Processing, Computer Vision, Life loreâs, EpidemiologyAbstract
A Review Paper Based on Big Data and Transport Modelling: Opportunities and Challenges
Shweta P. Chamate, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2023.125245
Abstract:
This paper discusses the eventuality of using big data in transport modelling. In recent times, scientific exploration communities have been showing an increased interest in using big data; especially after technology- merchandisers demonstrated how effectively big data can be used to beget a significant enhancement in business operations and client experience. individualized client service and volume- to- value, are some of the popular expressions in big data businesses now. While this might be valid in day- to- day consumer products and services requests, the use of big data in transport exploration is yet to be embraced extensively or yet to be proved in detail. In the history, it was the exploration community who were seeking suitable data for validating their models. Significant quantum of coffers was allocated just for the purpose of data collection alone. One illustration was, creating a megacity-wide vehicle- grounded origin- destination matrix. Moment, big data can deliver similar matrix at ease, along with multitudinous other trip gets affiliated information Thus, rather of experimenters seeking data, now it's common to see big data possessors seeking experimenters to come up with ways of exercising the data. The question for exploration community is thus this should was-invent the wheel of transport models that were formerly created with limited data available also? Or, should were-create the models from scrape, in order to make use of an almighty system of data. Methodology used for this study encompasses a detailed review of recent history and current studies and papers in this field. The donation of this paper could be an alert to stakeholders on where to concentrate and where not to, when it comes to edging in big data generalities in arriving at transport results.Keywords:
Big Data, Transport Modelling, Call Data, Smart phone data, social media data, analyticsAbstract
Design and Development of Triphibian Drone
Sujesh Kumar*, P Aneesh Pejathaya, Enrique Morgan Dsa, Gautham and Joswin Lynel Dâsouza
DOI: 10.17148/IJARCCE.2023.125246
Abstract:
In this paper, we propose the use of triphibian drones equipped with sensors to detect various miscellaneous activities in forest areas. Air dominance and control is a major factor for any country in case of international safety and for domestic purpose. These days unmanned aerial vehicles play a vital role for any country for its international and domestic safety. Modern setup are only limited to amphibious UAVâs which can move in air and water or air and land. Seeking to the recent needs and safety with time having a triphibian drone can provide an overall control over the territory. A triphibian drone is a type of UAV the can move in air, water and land. Increase in wildfires, environment degradation caused due to climate change and human activities like deforestation, environmental pollution have put forests in danger. The aim of this project is to build a triphibian quadcopter with on board equipmentâs to predict wildfires, weather, detecting trespassing, smuggling and other illegal activities in forest areas thereby contributing in reserving the natural resources of the country.Keywords:
UAV, Triphibian Drone, Ultrasonic Sensor, Flight controller.Abstract
AN INSIGHTS ON CRICKET DATA ANALYTICS
Ms.J.S.Sowmiya B.Tech.,M.E, Thameem Ansari S, Spencer J, Vignesh C K
DOI: 10.17148/IJARCCE.2023.125247
Abstract:
From this project, we can review performance of the team using previous data of the cricket players. It also helps to track the performance of an individual player, which helps the team management and selection committee to select the best player for a particular tournament by analyzing the data. Data played a key role in analyzing the performance of a team. One team can analyze the teams with whom they are about to compete. They can analyze the opposition teamâs strengths and weaknesses through rigorous analysis of their scoring patterns, how they scored their runs, when they were vulnerable during innings.Keywords:
performance, analyzeAbstract
Controling The Cursor Of Mouse Using Hand Gesture
Smeeta R. zade, Vijay M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2023.125248
Abstract
BRAIN TUMOR SEGMENTATION USING DEEP LEARNING
Kavyashree S, Sana, Nisarga, Harshitha M, Suchithra B
DOI: 10.17148/IJARCCE.2023.125249
Abstract: Brain tumor segmentation plays a crucial role in the diagnosis and treatment planning of brain tumors. In recent years, deep learning techniques have shown remarkable success in medical image segmentation tasks. In this study, we propose the use of three deep learning architectures, namely ResNet, U-Net, and ResUNet, for brain tumor segmentation. ResNet is a popular deep residual network known for its ability to capture complex image features. U-Net is a widely used architecture for biomedical image segmentation, known for its effective encoding-decoding structure. ResUNet is a hybrid architecture that combines the advantages of ResNet and U-Net. We evaluate the performance of these architectures on a publicly available brain tumor segmentation dataset. The dataset consists of magnetic resonance imaging (MRI) scans of brain tumors, with annotated tumor regions. We preprocess the data and train the models using a combination of loss functions and optimization algorithms. We compare the segmentation results of ResNet, U-Net, and ResUNet in terms of accuracy, sensitivity, specificity, and Dice coefficient. The experimental results demonstrate the effectiveness of deep learning models in segmenting brain tumors. The ResNet architecture achieves high accuracy in capturing fine details and subtle tumor boundaries. The U-Net architecture effectively captures contextual information and produces accurate tumor segmentations. The ResUNet architecture combines the strengths of both ResNet and U-Net, achieving improved segmentation performance.
Keywords: Deep Learning, Brain Tumor Segmentation, ResNet, U-Net, ResUNet, Magnetic Resonance Imaging (MRI).
Abstract
A review on Vulnerable Virtual Machines against DDOS Attacks
Ankita Dadmal , Vijay.M.Rakhde , Ashish.B.Deharkar
DOI: 10.17148/IJARCCE.2023.125250
Abstract
Travelling Chatbot
Ashutosh Nagawade, Siddhesh Sawant, Yash Kalokhe, Vaibhav Dahitule,Mrs. Dipti Chaudhari
DOI: 10.17148/IJARCCE.2023.125251
Abstract: This paper presents an innovative approach to developing a travel application for Android mobile phones that integrates a retrieval-based chatbot. The primary goal of our system is to provide convenient and reliable information about tourist places and accommodations in Pune. By incorporating internet map and hotel/resort booking services, we aim to enhance the overall user experience. Additionally, our proposed architecture includes a retrieval-based chatbot that offers 24/7 customer support, emulating real-person interactions. The chatbot assists users with their inquiries related to the application, ensuring user-friendly communication. Our system strives to empower travel enthusiasts by enabling them to discover the best accommodations and navigate easy routes, ultimately enhancing customer satisfaction.
Keywords: Artificial Intelligence, Deep Learning, Chatbot, Android, Travel
Abstract
Cyber Security And Cryptography In Cloud Computing
Aniket Babanrao Bele , Neehal B.Jiwane, Lowlesh N.Yadav
DOI: 10.17148/IJARCCE.2023.125252
Abstract: Data can be stored on the internet or on the cloud, so that the user (client) can access their data or application anywhere and anytime through the internet connected device. This is called as cloud computing .The main advantage of using the cloud is user can access it's data or services at a very low cost. with the increase in the popularity of cloud based services there is a high risk of Malicious attack on cloud storage and data can also be hacked so it is very important to protect our data from the hackers. So it is essential to protect clients data. One of the finest method to protect the data is cryptography. cryptography is a method in which data is converted into mini English form so the unauthorized user cannot access it. Later it will encrypted and decrypted using the keys. In this paper, we see how cybercrime is becoming a serious threat and steps to overcome it.
Keywords: Cloud computing, cyber security, cyber crime, encryption, decryption, security, cryptography
Abstract
PERFORMANCE EVALUATION OF MACHINE LEARNING METHODS FOR CREDIT CARD FRAUD DETECTION USING SMOTE AND ADABOOST
MALLIREDDY SAI HARSHITHA, MANJUNATHA SIDDAPPA
DOI: 10.17148/IJARCCE.2023.125253
Abstract
PLASTIC WASTE CLASSIFICATION SYSTEM USING DEEP LEARNING
Vinit Rajesh Navghare, Neehal B. Jiwane, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2023.125254
Abstract:
Plastic waste Operation is a challenge for the whole world. Homemade sorting of scrap is a delicate and precious process, which is why scientists produce and study automated sorting styles that increase the effectiveness of the recycling process. the recycling process. Waste isolation ways and procedures are applied to major groups of accouterments similar as paper, plastic, essence, and glass. - ough, the biggest challenge is separating different accouterments types in a group, for illustration, sorting different colors of glass or plastics types. - e issue of plastic scrap is important due to the possibility of recovering only certain types of plastic( PET can be converted into polyester material). One of the openings is the use of deep literacy and convolutional neural network. In mĂŠnage waste, the most problematic are plastic factors, and the main types are polyethylene, polypropylene, and polystyrene. - e main problem considered in this composition is creating an automatic plastic waste isolation system, which can separate scrap into four mentioned orders, PS, PP, PE- HD, and PET, and could be applicable in a sorting factory or home by citizens. We proposed a fashion that can apply in movable bias for waste feting which would be helpful in working on civic waste problems.Keywords:
Plastic waste, specification, classification system.Abstract
MEDICAL APPLICATION FOR 3D PRINTING
Savitha M M, Chaithanya
DOI: 10.17148/IJARCCE.2023.125255
Abstract:
One of the innovations brought forth by the industrial period is 3D printing technology. It has been a part of our life for a long time. It is quickly evolving and employed in a variety of   industries, including the aviation and defence sectors. In recent years, the medical industry has frequently preferred this miraculous production technique. This paper introduces 3D printer technology, discusses various 3D printing techniques, and refers to the usage of this technology in biomedical applications. The applications of 3D printing in surgery, the pharmaceutical industry, disease modelling, the creation of custom implants and prostheses, organ printing, veterinary medicine, and tissue engineering have been discussed, and this new technique has been contrasted with conventional methods that are currently used in the biomedical field. Additionally, this paper explores potential future directions. Keywords: Anatomical models, pharmacologic at model, Prostheses, implants, surgical  devices, auxiliary medical equipmentAbstract
MULTI-SOURCE MEDICAL DATA INTEGRATION AND MINING FOR HEALTHCARE SERVICES
Sahil Ravindra Kadukar , Lowlesh N. Yadav, Neehal B. Jiwane
DOI: 10.17148/IJARCCE.2023.125256
Abstract:
As the Internet of Health( IoH) period dawns, conventional medical or healthcare coffers are gradationally migrating to the web or the internet, performing in a massive influx of medical data relating to cases, physicians, medicinals, medical structure, and so on. This IoH data's good integration and analysis are ideal pointers for disaster opinion and medical care services. still, IoH is constantly divided into other departments and protects the druggies' sequestration. As a result, collecting or rooting critical IoH data, where stoner sequestration may be compromised, is constantly a delicate operation. To address the forenamed challenges, we concentrate on PDFM, multi-source medical data collecting and booby-trapping solution for bettered health care services( Data Fusion and Private Mining). Through PDFM, we can search for analogous medical records in a time-effective and sequestration-conserving manner, so as to offer cases with better medical and health services. A group of trials are legislated and enforced to demonstrate the feasibility of the offer in this work. Â Index term: Service recommendations, Internet Health, site-sensitive hashing, user privacy, data integration.Abstract
A Review Paper Based on Use of Artificial Neural Network in Pattern Recognition
Mrunali N. Parkhi, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2023.125257
Abstract:
The addition of artificial neural network ways proposition has been entering significant attention. In malice of nearly 50 times of disquisition and development in this field, the general problem of recognizing complex patterns with arbitrary exposure, position, and scale remains unsolved. New and arising operations, analogous as data mining, web searching, recovery of multimedia data, face recognition, and cursive handwriting recognition, bear robust and effective pattern recognition ways. The ideal of this review paper is to epitomize and compare some of the well- known styles used in various stages of a pattern recognition system using ANN and identify disquisition motifs and operations which are at the van of this provocative and challenging fieKeywords:
Pattern Recognition, correlation, Neural Network.Abstract
Integrating Public Reported Evidence Collection, Public Court Records Archive And Realizing Secure And Decentralized Case Document Management Using IPFS And Hyperledger Fabric Blockchain: An Implementation Study
Karthik Banjan, Jishnu Pillai Anilkumar, Harshit Singh, Kumar Sunny, Ruhin Kouser
DOI: 10.17148/IJARCCE.2023.125258
Abstract:
Cloud and Blockchain-enabled case document management system that combines InterPlanetary File System (IPFS) and Hyperledger Fabric blockchain. The system aims to provide secure, transparent, and decentralized storage and management of case documents, while ensuring the privacy and confidentiality of the documents. The system further implements evidence collection from the public and providing public access to the court records.Keywords:
Hyperledger Fabric, InterPlanetary File System, Microsoft Azure, Google Firebase, Docker, React, NodeJS, Spring BootAbstract
âIOT Based Home Automation Systemâ
Prashant Surdas Mukke, Neehal B. Jiwane, Ashish B. Deharkar
DOI: 10.17148/IJARCCE.2023.125259
Abstract:
This design presents the overall design of a Home robotization System ( HAS) with a low-cost and wireless system. It specifically focuses on the development of an IOT-grounded home robotization system that's suitable to control colorful factors via the internet or be automatically programmed to operate from ambient conditions. In this design, we design the development of a Ďirmware for smart control which can successfully be automated minimizing mortal commerce to save the integrity within the whole electrical bias in the home. A smart home will take advantage of its terrain and allow Ďlawless control of whether the stoner is present or down. With a home that has this advantage, you can know that your home is performing at its stylish energy performance. enforcing this system will allow you to explore a variety of engineering tasks, including software programming, circuit board design, Wi-Fi, TCP/ IP protocols, web garçon sense design, and other aspects. This robotization system allows you to understand the challenges of software and tackle development.Abstract
Social Media: Various Communication Level
Ankita P. Dadmal, Vijay M. Rakhade, Lowlesh N. Yadav3
DOI: 10.17148/IJARCCE.2023.125260
Abstract:
Given the pace, at which we are encountering new media as a democratic means of communication, the prospect of NICs being the most indispensable part of our lives is not far away. From this perspective, the paper attempts to study the changing communication patterns of the 21st-century tech-savvy generation. It has been claimed that new media has brought sea changes in intrapersonal, interpersonal, group, and mass communication processes and content. Once upon a time, traditional media was setting the agenda of public discourse observing forward to new media for breaking news. In the absence of a proper content regulatory authority, new media is diminishing the gatekeeping function in media, making it more participatory yet less authentic in content. In the virtual world, youth is existing a virtual life rather than proper life. The paper explores how new media is redefining social roles that are more vulnerable to dissolution as interpersonal communication is scheduled on public platforms. In the crowd of hundreds and thousands of friends on social media, youths find themselves alienated from the real world. The author concludes that in the age of announcement, a new kind of social order is being developed, establishing public and mass communication but weakening interpersonal communication. The next part of the thing is dedicated to the clarification of the elementary ideas of social media studies, emphasizing such concepts as new media, new new media. And The paper will observe how the use of social media has presented uncertainty in channels of communication and its influence on organizations. The paper will also discourse the implications of the occurrence of social media and discourse on the properties it has had on the excellence of organizational communication management.Keywords:
Reasons of social media is effective, communication levels, communication studies, Communication Management.Abstract
Real Time Secure Clickbait and Biometric ATM User Authentication and Multiple Bank Transaction System
Mrs.P.Brinda B.Tech.,M.Tech., Pranish.S, Pragadeesh.S, Thirumalai Raju.R
DOI: 10.17148/IJARCCE.2023.125261
Keywords:
ATM, Face Recognition, Safety , Modules.Abstract
ANOMALY DETECTION USING MACHINE LEARNING ON SOFTWARE DEFINED NETWORKING
Chetan Patil, Shubham Chakote, Rakshit Teli
DOI: 10.17148/IJARCCE.2023.125262
Abstract:
Software-defined networking (SDN) has experienced significant growth and can be leveraged across various network scenarios, ranging from data centres to wide-area 5G networks. It transfers control logic from individual devices to a centralized programmable controller, enabling efficient monitoring and management of network traffic. While a software-based controller enforces rules and policies on forwarded requests, it lacks the ability to identify abnormal patterns in network traffic. Consequently, the controller may inadvertently install flow rules that counteract these anomalies, resulting in reduced overall network performance. These anomalies could indicate potential threats to the network, thereby compromising its security and performance. To address this, machine learning (ML) approaches can be employed to detect such traffic flow patterns and anticipate impending threats to the system. In this study, we propose an ML-based system for detecting traffic anomalies in software-defined networks, specifically utilizing the Support Vector Machine (SVM) algorithm for anomaly detection.Keywords:
Software-defined networking, Abnormal patterns in network traffic, Machine learning, Support Vector Machine algorithm.Abstract
SENSORS ON 3D DIGITIZATION
Deepika B, Sudir P, Hemanth R K
DOI: 10.17148/IJARCCE.2023.125263
Abstract
SENTIMENTAL ANALYSIS OF NEWS ARTICLES USING NAĂVE BAYES
Mrudul Khairkar, Dhwani Waghela, Manas Bhilare, Aman Shriyan, Chitralekha Dwivedi
DOI: 10.17148/IJARCCE.2023.125264
Abstract:
Sentiment analysis is one of the recent technologies under NLP (an application of Artificial intelligence and Machine Learning). It is used in many applications for recommendation and feedback analysis. In this paper, from defining sentiment analysis, to algorithms for sentiment analysis are discussed with practical results. The results declared in this paper are from the implantation of sentiment analysis on the news articles dataset using NaĂŻve Bayes classifier. Additionally, the paper explores the various techniques employed in sentiment analysis, and delves into the challenges faced in accurately determining sentiment polarity. The experimental results demonstrate the effectiveness of the NaĂŻve Bayes classifier in sentiment analysis, shedding light on its potential for enhancing decision-making processes in industries such as marketing, customer service, and public opinion analysis.Keywords:
Sentimental Analysis, News Articles, Target level Sentiment, Opinion MiningAbstract
A Study of Distributed Systems' Metadata Management Strategies
Anurag Ashish Khot, and Dr. Padmashree T
DOI: 10.17148/IJARCCE.2023.125265
Keywords:
metadata management techniques, performance, efficiency, distributed storage systemAbstract
Sign Language Detection and Recognition using Machine Learning
Chetana Shravage, Monali Gaikwad, Shubhangi Iwarkar, Sandesh Jadhao, Omkar Dongare
DOI: 10.17148/IJARCCE.2023.125266
Keywords:
Convolutional Neural Network(CNN), Image Processing (IP), Machine Learning(ML), Data Science(DS), Deep Learning (DL)Abstract
An analysis of a web-based platform that allows start upâs and investors to connect and forecast investment returns using deep learning
Salunke Shubham Dipak, Shete Siddhrath Arun, Bhalerao Suraj Santosh, Prof.S.H. Pawar
DOI: 10.17148/IJARCCE.2023.125267
Abstract:
A purchase or item is considered an investment if it was made with the intention of making money or rising in value over time. Purchasing goods that won't be consumed right now but will be used to increase earnings in the future is considered an expense from a financial standpoint. A variety of financial commodities are considered investments if they are bought with the hope that they would one day provide income, appreciate in value, or be transferred at a more advantageous moment. The concept of investing centres on the current commitment of funds with the hope of a future favourable rate of return. Options for investing in politics are extremely varied today. Business enterprises rely largely on seed money to accomplish their goals. Entrepreneurs also made significant investments at that time, investments that will be crucial as the business grows. Effective research into the process of making recommendations for investments that are exact and correct for the investors is lacking. Numerous investment-related works have been examined for this purpose in order to develop an efficient and practical mechanism for deep learning-based investment-related suggestion, which will be detailed in future iterations of this research.Keywords:
K Nearest Neighbors, Linear Regression, Artificial Neural Networks, and Fuzzy Classification.Abstract
HVAC AND HVDC
Pratiksingh Soyam, Saurav Vaidya & Mayur Pote
DOI: 10.17148/IJARCCE.2023.125268
Abstract
Renewable Unnamed Substation Technology That Gives Power To Knowing Real Time Fault Control and Isolation Of Power System At Any End Of The World If You Are Authorized
Prashant Dange, Chetan Gowardipe, Mayur Pote
DOI: 10.17148/IJARCCE.2023.125269
Abstract
Real-Time Object Detection and Tracking Using Deep Learning Techniques
Arjun Jadhav, Ganesh Dakle, Aditya Kundhe, Parag Vispute
DOI: 10.17148/IJARCCE.2023.125270
Abstract:
The operation of construction vehicles in construction and evacuation sites presents unique challenges due to the different driving conditions and surrounding environment compared to traditional transportation vehicles. Implementing autonomous driving for construction vehicles requires addressing these challenges, even though the learning approach is similar to that of cars. This thesis aims to identify suitable and highly efficient Convolutional Neural Network (CNN) models for real-time object recognition and tracking of construction vehicles, evaluate their classification performance, compare the results, and present the findings. To achieve these objectives, a literature review and experiments were conducted. The literature review identified suitable object detection models for real-time object recognition and tracking, while experiments were performed to evaluate the performance of the selected models. Based on the literature review, Faster R-CNN model, YOLOv3, and Tiny-YOLOv3 were identified as the most suitable and efficient algorithms for detecting and tracking scaled construction vehicles in real-time. The classification performance of these algorithms was calculated and compared with each other, and the results were presented. The evaluation results indicate that YOLOv3 achieved the highest F1 score and accuracy among the algorithms, followed by Faster R-CNN. Therefore, it is concluded that YOLOv3 is the best algorithm for real-time detection and tracking of scaled construction vehicles. These findings align with the classification performance comparison reported in the literature.Keywords:
Object detection and recognition, Deep Learning, Classification performanceAbstract
Decentralized NFT market place with custom token
Sagar Gund, Rohit Gore, Yash Gholap, Abhishek Dorge, Prof. Yogita Pore
DOI: 10.17148/IJARCCE.2023.125271
Abstract
IOT-BASED LANDSLIDE DETECTION AND MONITORING SYSTEM WITH ACCELEROMETER AND SOIL MOISTURE SENSOR
Mrs Priyanka Gupta, Ayush Gupta, Chhaya Singh, Sonal Gadewar, Atharav Deore
DOI: 10.17148/IJARCCE.2023.125272
Abstract
IMPACT OF ARTIFICIAL INTELLIGENCE AND DEEP LEARNING ON THE HEALTHCARE INDUSTRY
Samiksha A. Karmankar, Vijay M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2023.125273
Abstract:
This learning observes the present state of artificial intelligence (AI)-based technology applications and their effect on the healthcare industry. In adding to a detailed review of the literature, this education analyzed that many real world examples of AI applications in healthcare industry. In adding, AI systems are generating an effect on improving the efficiency of nursing and managerial actions of hospitals. While AI is being embraced certainly by healthcare workers, its applications provide both the utopian perspective (new opportunities) and the dystopian view (challenges to overcome). We debate the details of persons chances and challenges to provide a balanced view of the value of AI applications in healthcare. It is clear that fast developments of AI and related technologies will help care workers generate new value for their patients and recover the effectiveness of their operational processes. Nevertheless, effective applications of AI will require effective preparation and plans to transform the entire care service and operations to gain the benefits of what technologies offer. ÂKeywords:
AI Based technology ; real-world cases ; policy and management support; healthcare industry.Abstract
UI DEVELOPERS - THE POWER OF UI DESIGN PATTERNS
Rakshika A. Sakharkar, Vijay M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2023.125274
Abstract: UI developers attracted in UI design patterns normally face main difficulties when trying to use them, since of the complexity of pattern collections and the lack of supporting utensils. As a significance, UI design patterns are not extensively used and this entails an imperative damage of productivity and superiority. In this study, we acknowledged and transcribed 30 UI patterns that were made available in a library, and we associated four modes of presentation for them: pattern thumbnails, application types, decision trees, and alphabetical mode. Ten subjects participated in the study. Operator gratification was advanced with the three new methods than with the alphabetic method. Exploration period was advanced with the three new methods than with the alphabetic mode. Though problematic to evaluate, pattern significance was improved with the three new methods. Those findings were twisted into approvals for instantaneous applications. In conclusion, we proposition some research paths for the future.
Keywords: Present UI Design Patterns, decision trees, projected approach, Standard Screen Patterns, application types, pattern thumbnails.
Abstract
HOW BLOCKCHAIN TECHNOLOGY CAN SOLVE IOTâS SECURITY PROBLEM
Parmeshwar R. Kumare, Lowlesh N. Yadav, Vijay M. Rakhade
DOI: 10.17148/IJARCCE.2023.125275
Abstract:
This paper explores the potential of blockchain technology in addressing the security challenges of the Internet of Things (IoT). The IoT ecosystem faces issues such as authentication, data integrity, secure communication, supply chain security, and auditing. Blockchain, with its decentralized and tamper-resistant nature, offers solutions to these challenges. The paper discusses the key concepts of blockchain, its types, consensus mechanisms, and the security challenges in IoT. It then highlights how blockchain addresses these challenges through decentralized ledgers, data immutability, identity management, secure communication, smart contracts, decentralized consensus, supply chain security, and auditing benefits. Case studies illustrate blockchain-based solutions, and implementation considerations and future directions are explored. Ultimately, blockchain technology has the potential to revolutionize IoT security by ensuring trust, privacy, and integrity in IoT systems and data.Keywords:
Blockchain technology, Internet of Things (IoT), security challenges, authentication, data integrity, secure communication, supply chain security, auditing, decentralized ledger, tamper resistance, identity management, smart contracts, decentralized consensus, case studies, implementation considerations, future directions.Abstract
A Deep Learning Approach for Predicting Diabetes using Big Data Analytics
Dr. K. Thenmozhi, Dr. A. Nirmala, Dr. M. Savithri
DOI: 10.17148/IJARCCE.2023.125276
Abstract:
Millions of individuals worldwide are impacted by the serious public health problem of diabetes. Early detection and treatment are critical to prevent complications and improve outcomes. In this research, we provide a deep learning method for diabetes prediction utilizing big data analytics. We use a large dataset of electronic health records (EHRs) from a hospital system to train and test our model. The dataset contains demographic, clinical, and laboratory data for thousands of patients. We preprocess the data to handle missing values and standardize the features. We then use a deep neural network with multiple layers to learn the underlying patterns in the data and predict the likelihood of diabetes. Our findings demonstrate that our model beats numerous benchmark models in terms of precision, recall, and accuracy. To determine the features that are most essential for predicting diabetes, we also conduct a feature importance analysis. Our strategy can be applied to other chronic diseases and has the potential to enhance diabetes screening and diagnosis.Keywords:
Diabetes Prediction, Deep LearningAbstract
Multi Power Supply Using 4 Different Sources for No Break Power Supply
Suraj.P.Turankar, Ganesh.V.Thengane, Vaibhav.A.Khangar, Divya.A.Bawane
DOI: 10.17148/IJARCCE.2023.125277
Abstract
IOT Based Smart Agriculture Monitoring System
Suraj.P.Turankar, Ganesh.V.Thengane, Vaibhav.A.Khangar, Divya.A.Bawane
DOI: 10.17148/IJARCCE.2023.125278
Abstract
Life Cycle of a Software Engineering and Overview of Web Development
Namrata M. Goldar, Vijay M. Rakhade, Lowlesh N. Yadav
DOI: 10.17148/IJARCCE.2023.125279
Abstract:
Software improvement can be completed with the benefit of the arrangement and efficient improvement model. It is a sequential process that starts with the requirement collection and completes with the project implementation and maintenance at the client end. Software functionality can be modified by using the prototyping model of software development. This article is an attempt to develop a life cycle model for the web-based application based on Software Development Life Cycle Model (SDLC). The First segment of this item defines the functionalities and many stages in Web Development Life Cycle Model. The next segment defines the steps to be followed through the web development life cycle. The last segment defines the benefits of the WDLC.                                                               ÂKeywords:
 Literature Survey, Web-Based Application Development, Website Analysis, Website Testing, compound web applications.Abstract
Understanding Cyber-Security Risk in a COVID-19 Pandemic
Poonam Sushen Halder, Vijay M. Rakhade, Lowlesh N. Yada
DOI: 10.17148/IJARCCE.2023.125280
Abstract:
Cyber-security threats are likely to cost the world a large amount year by year, and the number of attacks has enlarged five-fold after COVID-19. Though there is extensive literature on the threats technological susceptibilities have on the healthcare industry, less research exists on how pandemics like COVID-19 are unscrupulous for cyber-criminals. This paper summarizes why and how cyber-attacks have been most challenging during COVID-19 and ways that healthcare industries can better defend patient data. The Office for Public Rights has loosened enforcement of the Health Insurance Compactness and Responsibility Act, which, although valuable in using new platforms like Zoom, and Google Meet, has also loosened physical and practical safeguards to cyber-attacks. This is especially difficult given that 80% of healthcare providers had already come upon data breaches. Companies must implement well-defined software upgrade procedures, should use secure networks like virtual local area networks, and conduct regular saturation tests of their systems. By thoughtful factors that make individuals, healthcare organizations, and employers more disposed to cyberattacks, we can better prepare for the next pandemic. Keyboards: cyber-security (10); pandemic (184); COVID-19 (933); SARS-CoV-2 (144); risk (3); privacy (90); hack (56); patient data (3)Abstract
PEERROOMS (Hostel / PG Finding Web Application & Mobile App)
Shrividya Bansode, Vaibhavi Wadibhasme, Akash Kumar, Avinash Nishad
DOI: 10.17148/IJARCCE.2023.125281
Abstract:
This research project focuses on developing a hostel finder system to address the time-consuming process of finding suitable accommodations for students. It is observed that both students and hostels face challenges in quickly connecting with each other. To overcome this difficulty, an online marketplace for hostels is proposed, aiming to improve the quality of the education system. The system allows students to search for hostels/PG accommodations based on their preferred location and area. Hostel owners can showcase their facilities, services, and available room types through the platform. Students can register on the portal and provide feedback to enhance the services provided. The key stakeholders in this project include students, working professionals, hostel/PG owners, and an admin overseeing the system's operations. Previous research has identified the critical nature of finding suitable hostels. The current study aims to address this challenge by introducing an online marketplace. Numerous analyses have been conducted on hostel searching and listing, indicating the impact of finding accommodations on the hostel industry. As a result, an architectural proposal for an authentic hostel marketplace has been developed, leveraging technologies such as geolocation, the Google Maps API, and artificial intelligence. The proposed system aims to target a large number of hostel searchers and improve the effectiveness of the Hosteller platform. Further updates and research will be necessary to identify additional factors that can strengthen the system's effectiveness.Keywords:
Hostel finder, Online marketplace, Geolocation, Artificial intelligenceAbstract
A Secured Communication System Using Cryptographic Techinques
Pardeshi Pooja, Bhavsar Vaishnavi, Wadkar Pooja, Khandekar Nikita, Prof. Dalvi A.S.
DOI: 10.17148/IJARCCE.2023.125282
Abstract:
The field of cryptography deals with the procedure for conveying information securely. The goal is to allow the intended recipients of a message to receive the message properly while interrupt eavesdroppers from understanding the message. Cryptography includes a set of techniques for scrambling or disguising data so that it is available only to someone who can restore the data to its original form. In current computer systems, cryptography provides a strong, economical basis for keeping data classified and for verifying data indignity. The dynamite growth of the Internet has made an expanded familiarity with intrigue uncertainty issues. Even though security is the measure worries over the internet, numerous applications have been created and structured without considering fundamental destinations of data security that is confidentiality, authentication, and protection. Cryptography plays a huge role to ensuring confidentiality of the users credentials like passwords, IDs etc. Again security of any cryptosystem should be hardly breakableAbstract
Review on Leave Management Systems
Ms. Snehal Choudhari, Prof. Tarun Yengantiwar
DOI: 10.17148/IJARCCE.2023.125283
Abstract
Combinational Logic Circuit (SOP & POS)
Mrs.Vijaya Sayaji Chavan, Mr. Mohan Kashinath Mali, Mrs. Swati Bhushan Patil
DOI: 10.17148/IJARCCE.2023.125284
Abstract:
Combinational Logic Circuits are made up from basic logic gates like NAND gate, NOR gate or NOT gate that are connected together to generate complicated switching circuits. The building blocks of combinational logic circuits are all the logic gates. Decoder is an example of a combinational circuit is a, that converts the binary data in input into a number of different output lines in decimal code at its output user.Keywords:
AND, OR, NAND, NOR, NOT.Abstract
DOCUMENT SCRUTINIZING AND IMAGING SYSTEM
Prof.Dr Ninad More, Aditi Roy, Kashmira Nagrale
DOI: 10.17148/IJARCCE.2023.125285
Keywords:
OpenCV, Thresholding, Image Smoothening, Edge Detection, Contouring.Abstract
GUI BASED FACE RECOGNITION SYSTEM
Gunasundari B, Pachuru Venkata Nithin, Pokala Venakata Sathish Reddy, Munagala Giridhar
DOI: 10.17148/IJARCCE.2023.125286
Abstract:
Security is the main concern in any web application or apps. To ensure security, biometric systems are used for higher security system. Usually many of the security-based devices use fingerprint authentication for access. Fingerprint recognition-based devices have a large demand for security concerns. In the realm of web applications and software systems, security remains a top priority. Biometric authentication, particularly fingerprint recognition, has emerged as a reliable method for ensuring robust security. However, the need for direct fingerprint contact or passwordentry in some portals and software systems poses challenges. Authentication plays a critical role in system control and security, but the physical unavailability of individuals due to remote work or other circumstances limits the effectiveness of fingerprint-based authentication. To overcome these limitations, this paper proposes the adoption of contactless biometric systems, specifically face recognition technology, as an alternative authentication method. By leveraging face recognition, users can authenticate themselves without physical contact, offering a secure and convenient means of accessing sensitive information. This solution addresses the drawbacks of traditional fingerprint-based systems and enhances security in login systems. By embracing contactless biometric authentication methods like face recognition, organizations can not only mitigate the challenges associated with physical unavailability but also enhance security and user experience. This paper highlights the importance of incorporating face recognition technology as an alternative authentication method in login systems, providing improved security and accessibility in various applications.Keywords:
Face recognition, contactless , security, authenticationsAbstract
IDENTIFICATION AND OBSERVATION OF IMMATURE WHITE BLOOD CELLS USING CNN AND MACHINE LEARNING
Praful Shah, Shreya Wavhal, Praveen Mahato, Amit Kanani, Prof. Komal Yadav
DOI: 10.17148/IJARCCE.2023.125287
Keywords:
WBC, White Blood Cells, Classification Algorithms, CNN.Abstract
SURVEY ON ONLINE TRANSACTION
MaddelaBhargavi, Suneetha K.R
DOI: 10.17148/IJARCCE.2023.125288
Abstract:
The development of information and communication technology unlocked four doors for current payment systems. People's lives were made easier by the rise of smartphones and  access to the internet, which led to digitalization. In addition to enhancing trade and commerce, digitalization also made payment transactions simple and quick. The entire essay is based on three reviews of the literature by different writers that discuss different digital payment mechanisms, their adoption, usage rates, and future prospects, among other topics. It is also a fantastic approach for the government's Digital India effort to succeed as a programme and advance our nation.Abstract
IMAGE ANALYSIS APPLICATION AND IMAGE INSIGHT APP USING GOOGLEâS CLOUD VISION API
Prof. Madhavi Patil, Yash Kalbande, Pratik Waghchaure, Mayuri Deore, Pratik Avhad
DOI: 10.17148/IJARCCE.2023.125289
Abstract:
Image analysis is the extraction of meaningful information from images mainly from digital images by means of digital digital images processing techniques. Image analysis would focus on breaking down the images into fundamental components (edges, shapes, colours, etc) in order to perform statistical analysis on their occurrence. This system is used for scanning the picture and the other for saving the pictures. In this project the front-end involves XML, Android-Java and the back-end involves SQLite. The IDE used in Android Studio. Our aim for the Image analysis and Image insights application using Google Cloud Vision API is to create an application for Smartphone that can recognize any objects or images. With Google Cloud Vision API, we can make custom models that feature explicit ideas from the pictures. It can also detect multiple objects from the image. I will show if the images is safe for a certain age group, whether it contains any violence or not and other details tha many concern. This Android application will help to find insights about the image with the help of Google Cloud API.Keywords:
Image analysis Google Cloud Vision API,Android Application.Abstract
SMART KITCHEN USING IOT
Nikitha KS, Vidyasre N
DOI: 10.17148/IJARCCE.2023.125290
Abstract:
Even though a lot of effort has been done to put the Internet of Things (IoT) in practise up until this point, most of the work still has to be done.Focuses on nodes with limited resources rather than connecting the embedded systems that are already in place to the IoT network. The Internet of things (IoTs) is a network of physical items or things that are integrated with electronics, software, sensors, and connection to allow for data exchange among linked devices, makers, and operators. It may be defined as linking commonplace objects to the Internet, such as smart phones, sensors, and actuators. These devices are then intelligently connected to one another to enable new types of communication between objects and one another. Through the use of existing network infrastructure, IoT enables remote sensing and control of items. It also offers comfort, economy, efficiency, and precision. Since anybody may now get connectivity for anything from anywhere at any time, it is anticipated that these connections will grow and develop into a highly developed dynamic network of IoTs. Our work here aims to improve the Internet-oriented approach with semantic-oriented techniques, as both are necessary to create useful, sophisticated IoT applications that are anticipated on rich embedded devices.Abstract
User Interface Test Environment Tool
Kamini Mohan Achari, Apoorva Chhagan Dusane, Pratiksha Ramdas Nagode, Prof Rahul M. Raut
DOI: 10.17148/IJARCCE.2023.125291
Abstract:
Now a days, Software Development is rapidly growing. Various innovative applications are getting developed and deployed with quality. Before deploying a software, a software is first tested as per SDLC (Software Development Life Cycle). The Testing is in categorized as Automation and Manual. The world is getting autonomous, so Automation Testing will be more focused for testing the application, as it can be result in Accuracy as well as Time Consumption. When an application is in testing, every application must be compared and matched with the expectations defined. So, the same we are trying to develop is called User Interface Test Environment. This UITE Environment, helps in testing the UI of a websites. User Interface is the core part of the website and is the only thing which attracts the user to the application or websites. So, to attract the user with UI, the developed UI must be 99% Accurate as per the Expected UI.Keywords:
Automatic Testing Programming environment, Python, HTML, CSS.Abstract
Active Learning Methods for Annotating Training Sets
Gorla Charan Sai Chowdhary, Suraj Rajshekhar Mukkannavar, Kushagra Gupta, Rajot Saha, Prof. Anala M R
DOI: 10.17148/IJARCCE.2023.125292
Abstract
Automatic Sewage Monitoring System Using IOT
Dhananjali Singh, Pooja Raheja, Vivek Lawaniya, Abhishek
DOI: 10.17148/IJARCCE.2023.125293
Abstract:
This research paper presents the design and implementation of an automatic sewage monitoring system using IoT (Internet of Things). The system aims to address the increasing concerns related to sewage management in urban areas. It integrates several key components, including the NodeMCU microcontroller, SIM800L GSM module, XL6009 booster module, MQ gas sensor, JSN SR-04T waterproof ultrasonic sensor, and an on/off switch. The NodeMCU acts as the central control unit, facilitating data acquisition, processing, and transmission. The SIM800L GSM module enables the system to establish a wireless communication link, allowing remote monitoring and control. The XL6009 booster module ensures a stable power supply for the system's components. The MQ gas sensor is utilized to detect harmful gases, providing early warning signs of potential sewage-related hazards. The JSN SR-04T waterproof ultrasonic sensor enables accurate measurement of sewage levels in tanks or containers. Lastly, the on/off switch allows manual control over the system's operation. Through this integrated system, real-time data on sewage levels, gas concentrations, and system status can be collected and transmitted to a central server or user interface. This information enables proactive management and timely response to sewage-related issues, improving overall sanitation and public health. The proposed automatic sewage monitoring system utilizing IoT technology has the potential to revolutionize sewage management practices, offering a cost-effective and efficient solution for urban areas.Keywords:
Sewage Monitoring, IOT, Automation, NodeMCU.Abstract
Study of Object and Sign Detection System
Naresh Katkar, Dr. Rama Bansode
DOI: 10.17148/IJARCCE.2023.125294
Abstract: Object and sign detection systems are computer vision algorithms designed to identify and locate specific objects and signs within an image or video stream. These systems use machine learning and deep neural networks to analyze visual data and classify objects and signs based on their shape, color, texture, and other features. Object detection systems can identify and locate various objects such as vehicles, animals, people, and other items within an image or video stream. They can also track the movements of these objects in real-time, enabling them to perform a wide range of applications such as autonomous driving, surveillance, and robotics. Sign detection systems are designed to identify and locate various signs such as traffic signs, road signs, and other signs within an image or video stream. They can recognize the shape, color, and text of the sign, and interpret its meaning based on its context. These systems can be used in various applications such as autonomous driving, intelligent transportation systems, and public safety. Overall, object and sign detection systems are powerful tools that enable computers to understand and interpret visual data, making them an essential component of many modern technologies.
Keywords: Sign Language, Gestures, Real Time, Labeling Software, TensorFlow Object detection module.
Abstract
Android App for Creating a Map of the College to be used with visitor localization
Swapnil Vaidya, Dhiraj Rahane, Aniket Gavhane, Vaibhav Shinde, Khushbu Shaikh, Prof. Ansari S.W
DOI: 10.17148/IJARCCE.2023.125295
Abstract:
It creates problem to visitor to reach easily and timely to their desired location. So, there must be a system that will guide and help visitor and also students to get to their desired places from their current location. Almost all people including students use smart phones. Almost all people including students uses smartphones. So a map application will be most helpful to locate desired place and shortest path from current location. Finding a place in a new location where visitors have no experience and clueless about it. This seems like getting lost in a maze and there is no easy way to reach out destination. This paper introduces an application for android mobile, which is implemented to provide the android mobile user to add, remove and review specific locations on the online map. The proposed applications also presents the basics navigation operations like showing directions with the optimal path between source and destination and calculating the distance and expected driving time. Google Maps APIs, Google Direction APIs, PHP, JSON and MySQL have been integrated and used in this application to obtain solutions  keywords- UUB i.e.UltraWide Band, Android App, Navigation, Current Location.Abstract
MONITORING VEHICULAR POLLUTION USING EMBEDDED SYSTEM
Dr. Pramod Sharma, Shubham Verma, Suhail Khan, Shaskank Tiwari
DOI: 10.17148/IJARCCE.2023.125296
Abstract
Review On Blockchain Technology
Mihir Suresh Gadhiya, Nihal B. Jiwane, Ashish B. Deharkar
DOI: 10.17148/IJARCCE.2023.125297
Abstract
HANDWRITTEN SIGNATURES FORGERY DETECTION
Prof.Netravathy V, Spoorthy Udayakumar Kulkarni
DOI: 10.17148/IJARCCE.2023.125298
Abstract: Signature plays a very import role in sectors like banking, finance, Passport, Driving License, legal documentation etc. Signature varies from person to person and may be unique each time. Some time signatures may seem similar if the people have same name. But the features may still vary. Now a days there are problems like identity theft, fake ids, hacking etc.
To reduce such type of issue, this project is focused on developing a system to detect such theft and to know and verify if the signature is real or fake, from the data sets using CNN and deep learning.The reason for using CNN and deep learning is that, the signature can vary with change in personalities and behaviour. With deep learning we can train the data sets and increase the accuracy of the detection. The Signatures can be hand written or signed online, depending on the type of signature the process takes place. Here we are referring to few papers which implement the project using both online and offline methods based on deep learning models. Using these we can try and achieve a better accuracy
Keywords: Signature, CNN, Forgery, Authentication, Deep learning
Abstract
Survey Paper on Plant Disease Identification Using Machine Learning
Dr Suneetha K R, Rachitha E
DOI: 10.17148/IJARCCE.2023.125299
Keywords:
SVM, PNN, ANN, GA, and image processing methods such as feature extractionÂAbstract
SURVEY ON FACE RECOGNITION USING CNN
Pavan S, Thanuja N
DOI: 10.17148/IJARCCE.2023.125300
Abstract
Effect Of Temperature On Early Age Of Concrete
Shelar Pratik, Thakur Nachiket, Kakad Sharda, Palve Surekha, Sayyad Simaan, Prof. Gaikwad A.D
DOI: 10.17148/IJARCCE.2023.125301
Abstract:
A total of thirty cube specim of Grade 40 concrete. A total of thirty cube specimens were specimens were ens were cast, cured in water at ambient temperature in the cast, cured in water at ambient temperature in the laboratory and subjected to various temperature laboratory and subjected to various temperature various temperature regimes before testing. . The CEMs were prepared at temperatures ranging from 8 to 36°C.  Superplasticizer(SP) and airâentraining agent(AEA) demand were evaluated forthe CEM mixturesmade with differentsupplementary cementingmaterial (SCM) and limestone filler types. Test results showed that the ambient temperature can significantly affect the SP and AEA demand, hydration kinetics, and compressive strength at 1 day.Abstract
ISSUES THAT NEED ATTENTION IN IMPROVING THE QUALITY OF THE PEOPLE'S POLICE EDUCATION SCIENCE IN THE 4.0 INDUSTRIAL ERA
Bui Dang Khoa
DOI: 10.17148/IJARCCE.2023.12501
Abstract:
In this article, the author presents the basic issues to improve the quality of Vietnamese scientific journals in general and the quality of the People's Police Education Science Journal in particular. The article has outlined the current situation of Vietnamese scientific journals; Some international experiences in the evaluation and improvement of the quality of scientific journals; Proposing some solutions to improve the quality of the the People's Police Education Science Journal . Thereby helping the school's magazine become more and more prestigious, develop and become one of the well-known magazines.Keywords:
journal, scientific journal, industry 4.0 era, review and improve the quality of journals, scientific research, experience. Works Cited: Bui Dang Khoa " ISSUES THAT NEED ATTENTION IN IMPROVING THE QUALITY OF THE PEOPLE'S POLICE EDUCATION SCIENCE IN THE 4.0 INDUSTRIAL ERA", IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, vol. 12, no. 5, pp. 1-5, 2023. Crossref https://doi.org/10.17148/IJARCCE.2023.12501