VOLUME 13, ISSUE 9, SEPTEMBER 2024
Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security
Kosgey Festus Kipchirchir, Dr. Roselida Maroko Ongare, Dr. Patrick Oduor Owoche
Machine Learning Models in Predicting Mortgage Prices
Nishant Gadde, Avaneesh Mohapatra, Daksh Parikh, Shiva Uppaladinni, Lalit Nookella, Smrutirekha Panda
Agriculture Crop Yield Prediction
SHRIRAKSHA I P, PROF. SANDEEP N K
Cardiovascular disease prediction using ECG
Sumanth Sharma S, Sandeep N K
AI-Powered Traffic Monitoring and Analysis with YOLO
Farman Ali Khan, Shankar B S
Cancellable Biometrics: Trends and Innovations Over the Past Decade
Diptadip Maiti, Madhuchhanda Basak
A Study of Electronic Voting Machines Used Worldwide
Narinder Kumar, Dr. Harish Rohil
Analyzing Usability Requirements for Effective Implementation of Biometric Technology: A Case Study of Kenyan Secondary Schools
Dorcus Arshley Shisoka, Elyjoy Muthoni Micheni, Franklin Wabwoba
MODELLING AND ANALYSIS OF FAILURE IMPACT OF ENTERPRISE CLOUD COMPUTING COSTING IN KADUNA STATE UNIVERSITY
Muhammad Garba, Elias Tabat Barnabas, Sulaiman Umar S.Noma,Muhammad Abdurrahman Usman, Salamatu Musa
Email Spam Detection Using Machine Learning
Disha Gangamma A P, Shankar B S
Poverty Prediction Using Satellite Image
Niveditha N S, Shankar B S
Diagnosis of Chronic Kidney Disease Within a Comprehensive Artificial Intelligence-Driven Healthcare System
Frank Edughom Ekpar
Educational Applications of the DIKW Model in Data Mining
Loulwah AlNikhilan, Ibrahim Y. Alsalem
DL-Driven OCT Image Analyzation for Age Related Macular Degeneration Detection
Dheeraj Tallapragada, Vedant Sagare
Ground Water Quality Analysis Using Machine Learning Techniques
Dr Vasavi Ravuri,Jakkula Teja Venkata Raju, Kommu Sai Rohith, Sheelam Chandrashekhar Reddy, Rajavardhan Rao
friend Function in C++
Mrs. Suwarna Vijay Nimkarde, Mrs. Shobhana Avinash Gaikwad
Circle Generating Algorithms
Mrs. Pournima Abhishek Kamble, Mrs. Sujata Shankar Gawade
Systematic Review of Real-Time Analytics and Artificial Intelligence Frameworks for Financial Fraud Detection
Oluwatofunmi O. Oguntibeju, Michael Adonis, John Alade
InSync Customer Relationship Management
Rupali. S. Shinde, Araya. S. Bhagat, Ansh. M. Narkar, Dr. Asra Sadaf, Puja Patil
Innovations in Agricultural Forecasting: A Multivariate Regression Study on Global Crop Yield Prediction
Ishaan Gupta, Samyutha Ayalasomayajula, Yashas Shashidhara, Anish Kataria,Shreyas Shashidhara, Krishita Kataria, Shrey Raj, Madison Kurtz, Aditya Undurti
A Comparative Analysis of Digitization in the Agri-Food Sector -Innovations, Challenges, and Future Directions
Amit Kohli and Gurpreet Narang
A Study of Machine Learning Approaches and Models for Predicting Cotton Leaf Diseases: Identifying Research Gaps for Future Exploration
Mr. Parteek Singh, Smt. Sunita Rani, Er. Narinder Kumar
Smart Bank Locker Using Finger Print Scanning
Ms. Sneha Bankar, Pandurang More, Omkar Navsupe, Siddheshwar Kadam, Shubham Sutar
THREAT INTELLIGENCE INTEGRATION BEHAVIOUR ANALYSIS OF NETWORK INTRUSION DETECTION CONTROL SYSTEMS IN INDUSTRIAL SECTOR
Mr. Bijjam Venkateswara Reddy, Dr. N.Pughazendi
Wireless Body Area Network (WBAN): Monitoring of Health of Army Personnel for Enhanced Security and Increased Life Expectancy
Digambar Dhanagar, Shailesh Umesh Khot, Vedant Kulkarni, Suraj Suresh
Advanced Orchestration and Memory Management in Cloud Systems
Vanshika Yadav, Mahima Manni, Mr Rinku Raheja
Cost-Effective IoT Connectivity: A Wi-Fi Direct-Based Approach to Eliminating Traditional Network Infrastructure
Sujanavan Tiruvayipati, Ramadevi Yellasiri
Abstract
Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security
Kosgey Festus Kipchirchir, Dr. Roselida Maroko Ongare, Dr. Patrick Oduor Owoche
DOI: 10.17148/IJARCCE.2024.13901
Abstract: The rapid integration of technology in educational institutions has led to the widespread adoption of Student Management Information Systems (SMIS) to streamline administrative processes and enhance student experiences. However, these systems are increasingly becoming targets for cyber-attacks due to the sensitive nature of the data they store, such as personal information, academic records, and financial details. This study evaluates the existing vulnerabilities in university SMIS implementations, focusing on their potential impact on student data security. Through a comprehensive analysis of various university SMIS across different institutions, this research identifies common security flaws, including inadequate access controls, outdated software, lack of encryption, and improper data handling practices. Additionally, the study highlights the implications of these vulnerabilities, such as unauthorized data access, data breaches, identity theft, and potential reputational damage to institutions. By examining these risks, the study provides a framework for understanding the critical areas that require immediate attention and offers recommendations for enhancing the security posture of university SMIS. The findings aim to guide universities in developing robust security measures to protect student data, ensuring the privacy and integrity of their academic environments.
Keywords: Cybersecurity, Vulnerabilities, Student Data Security, SMIS (Student Management Information Systems), Encryption, Access Controls, Data Breaches
Abstract
Machine Learning Models in Predicting Mortgage Prices
Nishant Gadde, Avaneesh Mohapatra, Daksh Parikh, Shiva Uppaladinni, Lalit Nookella, Smrutirekha Panda
DOI: 10.17148/IJARCCE.2024.13902
Abstract: The following study concerns exploring the performance of multiple regression algorithms of machine learning in the context of house pricing, while attempting to enhance the precision and offering practical implications for the stakeholders in the real estate industry. Using dataset that is collected from the real estate platforms, property records and other fresh data obtained directly from the real estate agencies, models like Random Forest, Gradient Boosting Machines (GBM), XGBoost, Support Vector Regression (SVR) and Neural Networks are examined. It also entails carrying out massive data preprocessing, feature construction, and other computationally expensive steps such as tuning of hyperparameters for achieving high accuracy. The residual plots indicate the prediction accuracy of each of the 23 models of some levels and weakness in the various methods employed in the models. For example, Random Forest and XG Boost exhibit typical non-linear patterns to capture, but they have heteroscedasticity to some extent in residuals. On the other hand, standard models like the SVR with the linear kernel show some level of failure in dealing with the interleaved pattern between the data, resulting in systematic biases. Thus, it is crucial to choose a right model depending on the data set properties and certain market conditions are considered in the study. Thus, it is seen that this research adds to the literature on machine learning real estate by offering a step-by-step comparison of these five advanced regression techniques that will be useful in determining the effectiveness of such techniques in the prediction of housing prices. Acquired knowledge is expected to benefit, for instance, real estate agents, investors, and policy-makers towards increasing market transparency leading to efficiency.
Keywords: Mortgage prediction, GBM, SVR, XGBoost, Elastic Net
Abstract
Agriculture Crop Yield Prediction
SHRIRAKSHA I P, PROF. SANDEEP N K
DOI: 10.17148/IJARCCE.2024.13903
Abstract:
In the quest to enhance agricultural productivity, predicting crop yield plays important part in optimizing resource allocation and planning. This study explores the uses of machine learning model to forecast crop yield, leveraging various models to analyse and interpret historical data. By integrating parameter like crop type, temperature, rainfall, and pesticide use, Machine learning techniques yield precise outcomes. predictions that support decision-making processes in agriculture. The results demonstrate the potential of these advanced analytical methods to provide actionable insights, improve yield forecasting accuracy, and ultimately contribute to sustainable agricultural practices.Abstract
Cardiovascular disease prediction using ECG
Sumanth Sharma S, Sandeep N K
DOI: 10.17148/IJARCCE.2024.13904
Abstract:
The intent is to create an ECG image-based machine learning system for the detection of cardiovascular disorders. After digitizing ECG recordings, the system preprocesses them using methods including contour detection, noise reduction, and grayscale conversion before extracting important features such the A, BCD, and E waves. To classify the ECG data into distinct disease categories, such as normal, myocardial infarction, and aberrant heartbeats, these properties are examined using machine learning models, such as SVM, KNN, and Random Forest. By automating the analytical process, the project overcomes the drawbacks of the present manual approaches and increases the speed and accuracy of diagnosis. Clinical decision-making is aided by the real-time feedback and result visualization made possible by an intuitive web interface. The study comes to the conclusion that improvements in image processing and machine learning greatly improve the capacity to identify heart conditions from ECG pictures. To enable a wider range of applications in clinical settings, future work will involve enhancing feature extraction algorithms and growing datasets.Abstract
Resume Parser Using NLP
Mohammed Kashif, Parimal Kumar K R
DOI: 10.17148/IJARCCE.2024.13905
Abstract:
The recruitment process in today's competitive job market is often hindered by the inefficiencies of manual resume screening. The AI Resume Analyzer aims to streamline this process using Natural Language Processing (NLP) and machine learning techniques. This tool automates the extraction of critical information from resumes and provides real-time recommendations to both applicants and administrators. By leveraging advanced algorithms and a resume parser technique, the system categorizes and analyzes resumes based on job roles, extracting essential details like skills, experience, and education. The analyzer also offers practical recommendations for applicants, such as additional skills and certifications that could enhance their profiles, and provides practical resources for resume improvement. For administrators, the tool facilitates data management and analytics, allowing for comprehensive data downloads, the generation of visual reports, and the tracking of applicant trends. Implemented using Streamlit for the frontend and backend, MySQL for database management, and Python for data processing, the AI Resume Analyzer addresses the limitations of manual screening by offering a faster, more accurate, and consistent method of evaluating resumes. This system not only reduces the time and effort required for candidate evaluation but also ensures a more objective and efficient hiring process, ultimately aiding organizations in identifying the best candidates.Keywords:
Machine learning, Natural Language processing, recommendation.Abstract
AI-Powered Traffic Monitoring and Analysis with YOLO
Farman Ali Khan, Shankar B S
DOI: 10.17148/IJARCCE.2024.13906
Abstract: Urban traffic management is a growing challenge in modern cities, plagued by congestion, accidents, and pollution. The "AI-Powered Traffic Monitoring and Analysis with YOLO" project seeks to address these issues by leveraging advanced computer vision and machine learning technologies. Utilizing the YOLOv8 model, this system provides real-time object detection, accurately identifying various traffic entities such as vehicles and pedestrians. This innovation enhances traffic monitoring capabilities and offers actionable insights for urban planners and authorities, facilitating informed decision-making to improve traffic flow, reduce accidents, and promote safer urban environments. Our approach integrates high-resolution traffic cameras with a central processing unit, leveraging cloud services for data processing and storage. The system's design focuses on scalability, accuracy, and ease of use, ensuring it can adapt to diverse urban environments and integrate seamlessly with existing infrastructure. Through this project, we aim to contribute significantly to the development of smarter, more efficient cities by providing a comprehensive solution to traffic monitoring and management challenges.
Keywords: Machine learning, Linear Regression, Kmeans, analysis, prediction
Abstract
Cancellable Biometrics: Trends and Innovations Over the Past Decade
Diptadip Maiti, Madhuchhanda Basak
DOI: 10.17148/IJARCCE.2024.13907
Abstract:
The paper provides a comprehensive overview and comparative analysis of recent advancements in cancellable biometrics methods. Through an in-depth examination of various studies, the paper showcases a diverse range of techniques and features utilized to enhance the security, privacy, and accuracy of biometric authentication systems. Key findings include the development of robust fingerprint templates using techniques such as Delaunay Triangulation Net and alignment-free templates, as well as the exploration of multi-modal approaches combining different biometric modalities for improved performance. Additionally, privacy-preserving techniques, machine learning-based approaches, and novel integrations with block chain technology are investigated to address concerns about data protection and authentication reliability. The paper highlights the richness and diversity of research efforts in cancellable biometrics, providing valuable insights and advancements to address emerging threats in biometric security.Keywords:
Cancellable biometrics, Template protection, Alignment-free templates, Revocability, Non-invertibilityAbstract
A Study of Electronic Voting Machines Used Worldwide
Narinder Kumar, Dr. Harish Rohil
DOI: 10.17148/IJARCCE.2024.13908
Abstract:
Voting machines play a significant role in ensuring accurate, transparent, and secure elections. This paper analyses various voting machines that researchers have proposed from time to time in their research work. The study explores technological advancements, security features, voter accessibility, transparency, usability improvements, etc. By studying several research papers/ articles, voting machines are categorized into two main categories: those that are currently used in practice and those that have been proposed in the literature but not implemented physically yet. The categories of these machines are further sub-categorized according to various technologies used The present study is based on both patent literature and non-patent literature.Keywords:
Election, Voting Machines, Internet Voting, Mobile Voting, Voting MethodAbstract
Analyzing Usability Requirements for Effective Implementation of Biometric Technology: A Case Study of Kenyan Secondary Schools
Dorcus Arshley Shisoka, Elyjoy Muthoni Micheni, Franklin Wabwoba
DOI: 10.17148/IJARCCE.2024.13909
Abstract: Biometric technology has gained popularity since it focuses on the use of human traits in authentication unlike traditional conventional systems and/or uni-modal biometric security systems. Integrating biometric technology in educational Schools aims to enhance security and streamline administrative processes. However, there is limited understanding of the extent to which this technology has been adopted in Secondary Schools and the specific usability requirements necessary for its effective implementation. The purpose of the study therefore analyze usability requirements for the adoption of biometric technology in secondary schools in western Kenya. The study adopted a pragmatic perspective, employing a survey design targeting Schools using biometric technology. Data was collected via questionnaires, observation checklists, and interviews. Findings revealed significant positive correlations between system properties, user actions, and communication and feedback, enhancing engagement and trust. However, perceived benefits showed moderate correlations, and time-saving perceptions negatively correlated with extensive feedback, suggesting optimization needs. The study concluded that successful implementation hinges on user-centered experience and adoption. While generally positive, concerns about fraud prevention and legal compliance persist. Recommendations include comprehensive training programs, regular technology reviews, and user-centered design improvements, emphasizing routine maintenance and seamless integration into existing infrastructure. Further studies should investigate the long-term impact on user experience and operations, explore adoption in various settings, examine legal and ethical considerations, analyze technical and logistical challenges, conduct cost-benefit analyses, test new usability features, and understand diverse user experiences.
Keywords: Adoption, Biometric technology, Communication, Implementation, Security, Usability
Abstract
Drone Object Detection
Mohammed Umer, Shankar B S
DOI: 10.17148/IJARCCE.2024.13910
Abstract:
Unmanned Aerial Vehicles (UAVs), commonly known as drones, have become increasingly prevalent across various industries, including agriculture, surveillance, and cinematography. However, this proliferation also raises concerns related to privacy, security, and safety, necessitating effective drone detection systems. This project focuses on developing a robust drone object detection system using the YOLOv8 (You Only Look Once) model, a state-of-the-art deep learning algorithm renowned for its real-time performance and high accuracy. The dataset for this project, comprising diverse drone images, was collected from the Roboflow platform and meticulously annotated using the PASCAL VOC XML format. The YOLOv8 model was trained on this annotated dataset, optimizing key parameters to minimize loss functions. Evaluation metrics such as precision, recall, and mean Average Precision (mAP) were employed to assess the model's performance, demonstrating a high accuracy rate in detecting drones under various conditions. Additionally, a user-friendly web application was developed using the Flask framework, allowing users to upload images or videos for real-time drone detection. This comprehensive approach, encompassing data collection, model training, evaluation, and application development, showcases the system's potential in enhancing security and safety measures in scenarios requiring drone monitoring and control.Keywords:
Machine learning, deep learning, NLP, GenAi, syntaxlibrary, C, java, javascripts.Abstract
MODELLING AND ANALYSIS OF FAILURE IMPACT OF ENTERPRISE CLOUD COMPUTING COSTING IN KADUNA STATE UNIVERSITY
Muhammad Garba, Elias Tabat Barnabas, Sulaiman Umar S.Noma,Muhammad Abdurrahman Usman, Salamatu Musa
DOI: 10.17148/IJARCCE.2024.13911
Abstract: Cloud computing has ushered in a transformative era in technology and business operations globally, promising scalability, cost-effectiveness, and accessibility. In Nigeria, particularly within educational institutions like Kaduna State University (KASU), cloud technology adoption has become prevalent, impacting various facets of organizational functioning. This study investigates the economic implications, challenges, and barriers associated with cloud computing in the Nigerian context, with a specific focus on the effects of service outages. The research delves into the multifaceted nature of cloud service disruptions, addressing technical and security aspects, financial implications, and operational disruptions. Real-world studies are considered, providing valuable insights into the economic benefits and challenges associated with cloud adoption. The objectives of this study are to comprehensively assess the economic effects of service outages in Nigeria, identify and analyse challenges faced by organizations like KASU in cloud adoption, investigate the role of poor internet connectivity and security issues in shaping cloud computing adoption, and explore the influence of awareness on cloud technology adoption. The methodology employed encompasses a survey design, combining quantitative research through questionnaires and interviews, and secondary data collection from academic journals and internet sources. Descriptive statistics are used to organize and summarize data, shedding light on the multifaceted nature of cloud service disruptions. The study's findings reveal the profound impact of cloud service outages on enterprises and institutions, emphasizing the necessity for comprehensive strategies that address technical, financial, and operational dimensions of this critical issue. Recommendations include workload distribution among multiple cloud services providers and a deeper examination of hidden costs. Future work aims to explore other factors causing wastage in cloud computing.
Keywords: Cloud Computing, Costing, Kaduna University, Economic Impact, Challenges and Adoption
Abstract
Email Spam Detection Using Machine Learning
Disha Gangamma A P, Shankar B S
DOI: 10.17148/IJARCCE.2024.13912
Abstract: Email spam detection has been a longstanding challenge in the field of cybersecurity, as the volume and sophistication of spam messages continue to grow exponentially. This research paper examines the application of machine learning techniques to address this problem effectively. The paper provides a comparative analysis of various machine learning approaches, including their strengths, limitations, and evaluation metrics. The study also explores the current maturity and limitations of machine learning in cyber security, addressing the concerns of security specialists. (Apruzzese et al., 2018).
Abstract
Poverty Prediction Using Satellite Image
Niveditha N S, Shankar B S
DOI: 10.17148/IJARCCE.2024.13913
Abstract: This project aims to investigate the use of deep learning techniques, specifically Recurrent Neural Networks (RNNs), to forecast the socioeconomic deprivation status of an area utilizing orbital photography. The hypothesis is that by leveraging the information captured during the hours of daylight and the nocturnal period as observed in satellite imagery, it is possible to reliably estimate the affluence indicator of a metropolis. The methodology involves training RNNs to learn the complex relationships between satellite imagery and the wealth index. By analyzing the visual features and patterns in the images, the RNN models are expected to capture important indicators of poverty and wealth. The models are trained using a large-scaledataset and evaluated based on their predictive accuracy. The results aims to deliver comprehensive insights into the efficacy of deep learning methodologies. andsatellite imagery for poverty prediction Key words: Deep learning, poverty prediction, satellite imagery, Recurrent Neural Networks (RNNs), wealth index
Abstract
Diagnosis of Chronic Kidney Disease Within a Comprehensive Artificial Intelligence-Driven Healthcare System
Frank Edughom Ekpar
DOI: 10.17148/IJARCCE.2024.13914
Abstract: Chronic Kidney Disease (CKD) is a major noncommunicable disease (NCD) that affects a significant fraction of the millions of people annually who are negatively impacted by NCDs worldwide. This paper presents an artificial intelligence (AI) model trained on publicly available chronic kidney disease data that could be incorporated into a chronic kidney disease diagnosis module within a modular and comprehensive artificial intelligence-driven healthcare system.
Keywords: Chronic Kidney Disease (CKD), Noncommunicable Disease (NCD), Artificial Intelligence (AI), Artificial Neural Network (ANN), Deep Learning (DL), Healthcare System.
Abstract
Educational Applications of the DIKW Model in Data Mining
Loulwah AlNikhilan, Ibrahim Y. Alsalem
DOI: 10.17148/IJARCCE.2024.13915
Abstract:
Data mining involves more than just technical skills; it requires a comprehensive framework that al-lows the conversion of raw data into knowledge. This research paper explores the possibility of integrating the DIKW (Data, Information, Knowledge, Wisdom) pyramid model into datamining, especially in educa-tion. It shows how its application can significantly enhance student’s understanding and decision-making capabilities. Through a structured approach that combines theoretical with practical practices, including the use of external tools like Microsoft Excel, this paper highlights not only the significance of the DIKW model but also its practical application in promoting critical thinking and strategic decision-making skills. The paper revealed that students might improve their grasp of data mining and develop a more profound ability to use these understandings in practical, real-world scenarios. This paper contributes to the ongoing development of the uses of the DIKW model by providing evidence of combining conceptual frameworks with experiential learning to enhance educational outcomes.Keywords:
DIKW Model, Decision-Making Skills, Practical Learning, Real-World ApplicationAbstract
DL-Driven OCT Image Analyzation for Age Related Macular Degeneration Detection
Dheeraj Tallapragada, Vedant Sagare
DOI: 10.17148/IJARCCE.2024.13916
Keywords:
Age-related macular degeneration (AMD), Choroidal neovascularization (CNV), Convolutional Neural Network (CNN), Diabetic macular edema (DME), Deep learning, Drusen, Macula, OCT images, Prediction accuracy, Retinal analysis, Vision lossAbstract
Ground Water Quality Analysis Using Machine Learning Techniques
Dr Vasavi Ravuri,Jakkula Teja Venkata Raju, Kommu Sai Rohith, Sheelam Chandrashekhar Reddy, Rajavardhan Rao
DOI: 10.17148/IJARCCE.2024.13917
Abstract: The study explores the application of IOT sensors, including pH, turbidity, conductivity, temperature, and humidity, for sampling water from diverse sources. By leveraging these sensors, the research aims to predict water portability using the random forest algorithm. This approach involves training the model with existing datasets and subsequently testing it on samples collected via IOT sensors. The abstract suggests that such an approach could provide insights into efficient and accurate methods for assessing water quality in both confined and open water systems. Additionally, comparative analysis with other machine learning algorithms may further elucidate the optimal method for determining water portability.
Keywords: Water Quality, pH, turbidity, conductivity, Random Forest algorithm, PyCharm IDE, sensors.
Abstract
friend Function in C++
Mrs. Suwarna Vijay Nimkarde, Mrs. Shobhana Avinash Gaikwad
DOI: 10.17148/IJARCCE.2024.13918
Abstract: Friend function is a normal C++ function that can access private members of the class to whom it is declared as friend. Private members of a class cannot be accessed from outside the class. However there could be a situation where more than one classes want to share a particular function.
Keywords: friend, private, protected, public.
Abstract
Circle Generating Algorithms
Mrs. Pournima Abhishek Kamble, Mrs. Sujata Shankar Gawade
DOI: 10.17148/IJARCCE.2024.13919
Abstract: The basic principle of this algorithm is to select the optimum raster location to represent a circular curve. To accomplish this, the algorithm always increments x. Increment of y is depends upon the distance between the actual circle location and the nearest pixel. This distance is called decision variable D.
Keywords: Pixel, Decision Variable.
Abstract
Systematic Review of Real-Time Analytics and Artificial Intelligence Frameworks for Financial Fraud Detection
Oluwatofunmi O. Oguntibeju, Michael Adonis, John Alade
DOI: 10.17148/IJARCCE.2024.13920
Abstract: The technological advancement of the financial industry has been vital in ensuring that it is more accessible to consumers. Still, it has also brought up complicated security issues, such as financial fraud. Conventional rule-based fraud detection methods consistently have challenges in staying up with the speed at which cyber threats evolve. To solve these issues, this systematic study examines how real-time analytics and artificial intelligence (AI) frameworks might improve the detection of fraud capabilities. Prior research has concentrated on discrete AI models but has frequently needed more thorough integration with real-time data. This review addresses the gaps in previous research by analyzing various AI models, including neural networks, support vector machines, and graph-learning algorithms in the context of identifying fraudulent behavior. The paper assesses experimental settings and real-world applications, offering insights into various frameworks' efficacy, scalability, and adaptability in real-time financial situations. This research also contributes to financial fraud detection systems continuous growth by investigating how AI-powered techniques might improve fraud detection accuracy, precision, and reaction times. Additionally, combining AI with real-time analytics is a viable way to combat the growing complexity of criminal activities related to financial crime.
Keywords: Real-Time Analytics, Artificial Intelligence, Financial Fraud Detection, Machine Learning, Fraudulent Transactions, Supervised Learning, Unsupervised Learning, Data Mining, Graph, Learning Algorithms, Explainable AI (XAI)
Abstract
InSync Customer Relationship Management
Rupali. S. Shinde, Araya. S. Bhagat, Ansh. M. Narkar, Dr. Asra Sadaf, Puja Patil
DOI: 10.17148/IJARCCE.2024.13921
Abstract: This paper examines the pivotal role of Customer Relationship Management (CRM) in the hotel industry and presents strategies and technologies to augment CRM practices. Amid escalating competition in the hospitality sector, hotels are prioritizing the cultivation of enduring guest relationships to foster loyalty and drive revenue. Effective CRM empowers hotels to personalize guest experiences, elevate satisfaction levels, and bolster profitability. This study addresses the challenges inherent in CRM system implementation within hotels and proposes remedies such as data analytics and mobile applications.
Introducing Insync CRM as a comprehensive solution, this paper showcases its user-friendly interface and customizable features, enabling seamless lead management, sales pipeline tracking, and customer relationship nurturing. By embracing holistic CRM strategies and harnessing advanced technologies like Insync CRM, hotels can maintain a competitive edge and deliver unparalleled guest experiences.
Keywords: Customer Relationship Management, Hospitality CRM, Guest Satisfaction, CRM Strategies, CRM Technologies.
Abstract
Innovations in Agricultural Forecasting: A Multivariate Regression Study on Global Crop Yield Prediction
Ishaan Gupta, Samyutha Ayalasomayajula, Yashas Shashidhara, Anish Kataria,Shreyas Shashidhara, Krishita Kataria, Shrey Raj, Madison Kurtz, Aditya Undurti
DOI: 10.17148/IJARCCE.2024.13922
Abstract: The prediction of crop yields internationally is a crucial objective in agricultural research. Thus, this study implements 6 regression models (Linear, Tree, Gradient Descent, Gradient Boosting, K Nearest Neighbors, and Random Forest) to predict crop yields in 37 developing countries over 27 years. Given 4 key training parameters, insecticides (tonnes), rainfall (mm), temperature (Celsius), and yield (hg/ha), it was found that our Random Forest Regression model achieved a determination coefficient (r2) of 0.94, with a margin of error (ME) of .03. The models were trained and tested using the Food and Agricultural Organization of the United Nations’ data, along with the World Bank Climate Change Data Catalog. Furthermore, each parameter was analyzed to understand how varying factors could impact overall yield. We used unconventional models, contrary to generally used Deep Learning (DL) and Machine Learning (ML) models, combined with recently collected data to implement a unique approach in our research. Existing scholarship would benefit from understanding the most optimal model for agricultural research, specifically using the United Nations’ data.
Keywords: Agriculture, Machine Learning, Crop Optimization, Yield Prediction
Abstract
A Comparative Analysis of Digitization in the Agri-Food Sector -Innovations, Challenges, and Future Directions
Amit Kohli and Gurpreet Narang
DOI: 10.17148/IJARCCE.2024.13923
Abstract: The development of digitalization is a critical turn for global agri-food. Based on reviewing five key countries, namely Bangladesh, Kenya, India, Ghana, and Australia, this paper discusses and highlights the different models pursued and ensuing varied outcomes of integrating technology into agriculture. Digital tools are reshaping market access, supply chain efficiency, and sustainability- from e-commerce platforms in Bangladesh to climate adaptation policies in Australia. These challenges include gendered leaps in technology access, accessibility, and other regulatory barriers. This paper discusses the strengths and limitations of the current wave of digital initiatives through case studies, focusing on insights that seek to critically contribute to how technology can further revolutionize the agri-food sector. By addressing these challenges, countries can transform their agricultural sectors into globally competitive and resilient ones through inclusive digital transformation. Further, the paper concludes with ways in which future research should go to bridge gaps that exist in digital adoption for making agriculture sustainable and, in turn, for promoting inclusive growth.
Keywords: Digitalization, Agri-food industry, Agricultural technology, Smart agriculture, Smallholder farmers, Climate adaptation, Agricultural policy.
Abstract
A Study of Machine Learning Approaches and Models for Predicting Cotton Leaf Diseases: Identifying Research Gaps for Future Exploration
Mr. Parteek Singh, Smt. Sunita Rani, Er. Narinder Kumar
DOI: 10.17148/IJARCCE.2024.13924
Abstract: Plant diseases have been a source of concern for farmers and academics around the world from long time. It is critical to identify and manage these illnesses as soon as possible in order to avoid their spread and reduce their impact on crop output. The ability to analyse patterns and features from plant photos or data using Machine Learning algorithms allows us to diagnose diseases more quickly, accurately, and at scale. The paper presents a comprehensive review of machine learning techniques applied to plant disease prediction, emphasizing their effectiveness and limitations. An in-depth analysis on key factors such as the authors’ approaches, datasets employed, specific problem statements addressed, and performance metrics used to evaluate model effectiveness. Through the analysis, various critical research gaps in the existing literature has been identified. The findings includes the need for standardized datasets, the integration of real-time data collection methods and the integration of ml and deep learning techniques for predicting the plant disease. The study provides a structured framework for future research, guiding the development of more robust and scalable machine learning solutions in plant disease management.
Keywords: Plant Disease Prediction, Machine Learning, Predictive Models, ML Techniques, Disease Detection, Agricultural AI
Abstract
Smart Bank Locker Using Finger Print Scanning
Ms. Sneha Bankar, Pandurang More, Omkar Navsupe, Siddheshwar Kadam, Shubham Sutar
DOI: 10.17148/IJARCCE.2024.13925
Abstract: The fingerprint based bank locker system is an enhancement to the traditional bank locker system that uses keys.Now a day security is very important in everywhere. Especially in Banks security is primary concern. Traditional keys can easily copy. We have so many smart lockers available in market, but all those are very expensive. Here we are providing system to solve this. The name the system is bank locker system using finger print security.
Keywords: Biometric,KNN,CNN,SVM,Bank Locker,Authorised Person.
Abstract
THREAT INTELLIGENCE INTEGRATION BEHAVIOUR ANALYSIS OF NETWORK INTRUSION DETECTION CONTROL SYSTEMS IN INDUSTRIAL SECTOR
Mr. Bijjam Venkateswara Reddy, Dr. N.Pughazendi
DOI: 10.17148/IJARCCE.2024.13926
Abstract: The tremendous growth of the usage of computers over the network and development in applications running on various platforms captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability, and confidentiality of a computer resource. The Intrusion Detection System (IDS) plays a vital role in detecting anomalies and attacks in the network. In this work, the data mining concept is integrated with IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like the EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach, and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using the KDD Cup dataset. The entire proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms. Threat intelligence integration is a critical component of modern cyber security strategies, helping organizations stay one step ahead of cyber threats and minimize security risks. It empowers security teams to make data-driven decisions and respond effectively to evolving threats in today's complex threat landscape.
Keywords: Data Mining, Intrusion Detection, Network Intrusion, EDADT, HIDS, Hoperaa, Predictive Data Mining, Network Data Systems, Denial of Service (DNS), Distributed Data Mining, Host-based Intrusion Detection Systems, Threat Intelligence Integration Systems (TIIS).
Abstract
Wireless Body Area Network (WBAN): Monitoring of Health of Army Personnel for Enhanced Security and Increased Life Expectancy
Digambar Dhanagar, Shailesh Umesh Khot, Vedant Kulkarni, Suraj Suresh
DOI: 10.17148/IJARCCE.2024.13927
Abstract: Wireless Body Area Network (WBAN) is an emerging field of networking with the miniaturization of sensors, increase in Bandwidth (BW) of channels and high speed internetwork of connectivity, WBAN is gaining importance. Any biological stimulus from a human body is converted to an electrical signal to be standardized and is forwarded to the internetwork, an internetwork is a huge network of networks which consists of thousands or even millions of nodes and links. This work considers the realisation of a human body implanted with biomedical sensors, operating wireless protocols of variable frequency, and measuring more than one physiological parameter of the body. Various nodes that are linked together to form a network of biomedical or other sensors placed at the nodes make up a wireless body area network. The implementation and introduction of the intra-body network were covered in our earlier publication, "Realization of Wireless Body Area Network utilising GNS3 tool for Health Monitoring," which has the DOI 10.17148/IJARCCE.2018.7459. Army personnel who are located in remote locations need continuous monitoring of their health and the packets need to be sent to the base station. Each base station needs to be connected to the headquarters (HQ). Also the information needs to be authenticated and encrypted. Any leak in the information or any intrusion will lead to advantage for the enemy. In the project paper we concentrate on building a network, authenticating the network and encrypting the same, we make use of various routing protocols to find the best path and forecasting path between the sender and the receiver. OSPF (Open Shortest Path First) and EIGRP (Enhanced Interior Gateway Routing Protocol) are preferred. We also incorporate 2-way Authentication for traffic. This setup enables healthcare providers to aggregate data from multiple patients, enhancing clinical decision-making and supporting collaborative care models. For instance, healthcare professionals can analyze aggregated data for research purposes, such as understanding trends in chronic disease prevalence.
Keywords: WBAN, internetwork, authentication, encryption, OSPF (Open Shortest Path First) and EIGRP (Enhanced Interior Gateway Routing Protocol).
Abstract
Advanced Orchestration and Memory Management in Cloud Systems
Vanshika Yadav, Mahima Manni, Mr Rinku Raheja
DOI: 10.17148/IJARCCE.2024.13928
Abstract: This paper focuses on the critical dimensions of cloud computing, including resource management and orchestration, and optimal memory utilization. It traces the evolution of cloud computing and identifies salient features such as on-demand self-service, resource pooling, and rapid elasticity. The paper identifies memory management and optimization as key performance drivers in the era of modern clouding, which both cuts costs and ensures system stability in the technological infrastructure. It also identifies and elaborates on advanced memory optimization technologies that are instrumental in improving the quality of cloud services, thereby reducing a bottleneck in dynamic resource allocation, and the critical elements that orchestration plays in a complex cloud environment. The paper also discusses the role of micro services and container management, which eases the nature of workflow orchestration in cloud computing to operate in an efficient manner. Such a discussion and analysis provide crucial information on various memory management strategies and opportunities to improve performance, efficiency, and reduced resource waste in the field of cloud computing.
Keywords: Cloud Resource Management, Orchestration, Memory Optimization, Auto-Scaling Mechanisms.
Abstract
Cost-Effective IoT Connectivity: A Wi-Fi Direct-Based Approach to Eliminating Traditional Network Infrastructure
Sujanavan Tiruvayipati, Ramadevi Yellasiri
DOI: 10.17148/IJARCCE.2024.13929
Abstract: The rapid expansion of the Internet of Things (IoT) has led to a growing demand for scalable and cost-efficient network infrastructure. Traditional IoT networks often rely on centralized routers or access points, which can be costly and difficult to maintain, especially in large-scale deployments. This paper explores the potential of Wi-Fi Direct, a peer-to-peer wireless technology, to address these challenges by expanding the network range of IoT devices and eliminating the need for conventional network infrastructure. By enabling direct communication between devices without the need for a central access point, Wi-Fi Direct can enhance the flexibility, scalability, and cost-efficiency of IoT networks. This research examines the technical capabilities of Wi-Fi Direct, its application in IoT environments, and the potential benefits, including reduced infrastructure costs, improved network coverage, and simplified device communication. The paper also discusses the limitations of Wi-Fi Direct, such as security concerns and scalability issues, and proposes strategies to mitigate these challenges. Ultimately, this study demonstrates that Wi-Fi Direct can play a crucial role in expanding the range and reducing the costs of IoT networks, making it a promising solution for next-generation IoT deployments.
Keywords: Internet of Things (IoT), Wi-Fi Direct, Wi-Fi network expansion, peer-to-peer communication, decentralized network, infrastructure cost reduction, direct device communication, cost-effective networking.
