IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Dalal Abdullah Aljohany, Reda Mohamed Salama, Mostafa Saleh
DOI: 10.17148/IJARCCE.2018.771
Abstract:
Rapid developments in computer technology transformed the form of testing from traditional Paper-And-Pencil Tests (PPT) to Computerized Adaptive Testing (CAT). Assessment has another role. It became tool for learning rather than tool for grading. In the adaptive test, the multiple-choice test is a commonly used method for an assessment. The strategy followed by student in problem-solving questions in test it is consider the important assessment component. Feedback in problem-solving yields the most effective learning model than those that do not provide such a feedback. In this paper we present Smart Assessment Model (SAM) of students. SAM allows producing and providing CAT through web interfaces. Also, this model capable to assess such complex type of questions and provide student with appropriate instruction and feedbacks to improve learning
Abstract: This paper provides a summarisation of current DGPS techniques in flight applications. Differential GPS (DGPS) was meant for the needs of positioning and distance-measuring applications which is essential for higher accuracies which stand-alone Precise Positioning Service (PPS) or Standard Positioning Service (SPS) GPS could not deliver. This paper elaborates the characteristics of various DGPS systems and comparison of their strengths and weaknesses in flight applications.
Confidential and Secure Key Exposure in Cloud Environments
Pooja Vijay Bankar, Asst. Prof. Yashanjali Sisodia
DOI: 10.17148/IJARCCE.2018.773
Abstract:
As information is powerfully refreshed in this day and age, the current remote trustworthiness checking strategies which filled in as a reason for static information can never again be upheld to validate the honesty of dynamic information in the cloud. Show day insights show an effective aggressor which breaks data classification with the valuable asset of getting cryptographic keys, using pressure or indirect accesses in cryptographic programming program application. By methods for compulsion or indirect accesses in cryptographic programming, a capable assailant can break information secrecy by securing cryptographic keys. We've examined measurements classification contrary to an assailant who might perhaps comprehend the encryption key. To this end, we underwrite Bastion and changed RSA calculation, a solitary and green plan that ensures information secrecy notwithstanding assuming the encryption keys spilled and the foe approaches all figure content squares. We have re-scrambled the figure content framed by method for Bastion utilizing adjusted RSA set of guidelines and encryption key have separated inside the squares which may be on unmistakable servers. All together that despite the fact that the enemy endeavors to get the encryption key, he'll get a large portion of a piece of the key and insights classification is protected.
Keywords:
Current remote trustworthiness checking strategies, RSA, Encryption key, Cryptographic keys
This project implements a Smart traffic controller using fuzzy logic based on Vehicle and pedestrians count. Smart traffic controllers are needed these days to maintain busy traffic junctions featuring both vehicles and pedestrians. Computer vision technologies are available to see and identify the vehicles and pedestrians for regulating traffic. Various Fuzzy controllers based on neural networks are available to handle the modern metro traffic junctions. Fuzzy inference system used in this project decides the signalling time based on the fuzzified count of pedestrians and vehicles. This input variable for the decision is the fuzzified count of the vehicles and pedestrians from all the streets. This project is built in MATLAB using Fuzzy systems toolbox. This Smart traffic controller based on Fuzzy logic is capable of delivering unbiased traffic signalling and manage the traffic effectively.
The Stead Fastness Technique for Location Privacy against Local Eavesdropper in Wireless Sensor Network
Amandeep Kaur
DOI: 10.17148/IJARCCE.2018.775
Abstract:
Wireless Sensor Network is basically arrangement of distinct and dedicated sensors for observation and recording the healthiness of the surroundings and organizing the collected information at a central location. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink and eventually capture them by eavesdropping on the sensor node’s transmissions and tracing the packet’s trajectories in the networks. The aim of proposed scheme is to provide the source location privacy against hotspot locating attack in Wireless Sensor Network. This thesis provides privacy against the attack by misguiding attacker by sending him the deviated location information and false identity of the sensor nodes through. In the proposed work, the adversary deploys the monitoring nodes in the WSN, here to be referred as attacker in entire work.  The proposed schemes on the platform has analyze along with evaluation of performance in terms of safety period, end-to-end latency and energy consumption. The results illustrate that proposed location privacy protection schemes can obtain satisfied performance as proposed schemes has analyze the location privacy protection at the source and sink respectively. The optimal combination schemes are designed to achieve a highest location privacy protection for both ends.
Keywords:
 Wireless sensor network, Location Privacy, Energy Efficiency
Reinforcement learning is used to automatically determine the ideal behaviour of a machine with the help of machine learning algorithms to maximize the performance of the machine. Explicit goals are not given to the algorithm. They have to learn this optimal goal by trial and error .think of game contra in which the movement of the player which is done by clicking the buttons that decide the result of the optimal gameplay, by pressing the button the error occurs and the reward are given accordingly. A formula is used to determine the reward of the machine and according to it, the rewards are given from which the machine learns. The rewards can be positive or they can be negative and on the basis of rewards, the machine’s accuracy is denoted.
Keywords:
Reinforcement learning, RL, base of AI, machine language, machine accuracy
Using Arduino Based Automatic Irrigation System to Determine Irrigation Time for Different Soil Types in Nigeria
*Okoye F.A, Orji E.Z, Ozor G.O
DOI: 10.17148/IJARCCE.2018.777
Abstract:
In Nigeria, for crop production to have high quality yields, healthy irrigation water balance is important. Plants that are under-watered experience shortage in crop nutrient and on the other hand, plants that are over watered are defenseless to pest and diseases and few in some cases leads to the death of the plant. Also, plants that are over watered cannot withstand the hash dry season (harmattan) in Nigeria. The goal of this research paper is to use control engineering principle and concepts to provide an automatic irrigation system for clay, loamy and sandy soil which are more common in Nigeria. The automatic irrigation system is controlled using Arduino UNO which is embedded with an ATmega328P micro controller. The Arduino microcontroller is programmed to send an interrupt signal to the irrigation system depending on the moisture level of the soil. The moisture content of the soil is checked using the soil moisture sensor. The moisture sensor sends an interrupt signal to the micro-controller whenever there is a change in the soil moisture and the micro-controller on the other hand checks the water level in the over-head tank water storage using water level sensor, then activating or deactivating the watering system accordingly. The water level and other important data status are displayed on a 16Ă—2 Liquid Crystal Display (LCD). The system was used to compare the irrigation time and sensor reading for clay, loamy, and sandy soil. The result shows that irrigation time is not the same for all three soil types. Clay soil requires more irrigation time than loamy soil, followed my sandy soil which has the least irrigation time. The proposed system helps in improving plant growth, reduce costs, minimize water wastage, reduce lab our, and monitoring overheads.
Implementation of Real time based Automated Lighting Control System
Nethravathi G Nelogal, Siddesha K, Kavitha Narayan B M
DOI: 10.17148/IJARCCE.2018.778
Abstract:
The plan and usage of one of a kind detecting and in citation application is introduced here. To enhance and spare vitality inside the city, brilliant stop lighting has the potential. Despite regardless of whether a client is available, standard stop lights stay lit all through night, which causes pointless vitality wastage. These stop lights can be fitted with a mechanized lighting framework. To distinguish when the clients are on the way robotized framework utilizes movement sensors. The robotized framework turns the light on when clients are available, and kills the light generally. The fundamental goal of this venture is to grow long haul robotized control framework model for the city's way lights and to test it in a city's stop. The robotized framework needs to keep up the well being of the way voyagers while sparing vitality. Likewise, the establishment and framework should be of low cost.PIR (Passive infrared) sensors are utilized as a part of computerized lighting framework they are situated on each post to distinguish clients on way. The control rationale of perusing the sensors and deciding when the light is turned on or off and when to remotely advise neighboring posts to turn on, all these are taken care of by Renes as microcontroller. Except if movement is distinguished once more, lights stay on for a predetermined time out period. The quantity of neighboring shafts that turn on after the movement is identified and time out period these parameters are arranged remotely through a workstation associated with a remote handset. To guarantee adequate lighting is given to meet client wellbeing needs these parameters are completely tried. The last deliverable is a reproducible robotized lighting model with remotely configurable parameters introduced in a recreation center.
Cloud storage can be defined as huge computers with a high security that have huge storage space, user upload their files to be stored, and companies create programs on them, which is called cloud computing. There are different types of cloud storage providers available at the moment; some of them are available for free while others require a reasonable amount of registration fee. Cloud storage providers allow people to upload and protect their data from a third party, providing them with a storage space of their own, in addition to sharing limited data with specific people. This report has focused on the advantages and disadvantages cloud storage services on general basis as well as comparing the different providers with regards to privacy protection, data encryption and the space provided in order to choose the most practical site based on my own point of view. Cloud storage provides complete protection for data as no one can open or view other’s personal files with a high-security privacy policy. These services are easy to use, and allow users to share files with a third party under their authority where the intended parties can amend and add more data without their physical presence in the same place. However, just like any other man-made programs, cloud storage applications have some potential disadvantages that developers are trying to overcome. With respect to the other services, the study suggests that dropbox can be a good choice for data storage and sharing since the advantages of some programs such as, Dropbox, outweigh their disadvantages.
Keywords:
Cloud storage, Cloud services, Personal files, Dropbox, Data sharing, Storage
Nowadays bomb disposal and diffusing has become a very critical and hazardous method to human’s life, In order to overcome the problem a concept based on wireless bomb disposal robot is proposed. The bomb is disposed using the robot which will be controlled through the wireless control module. The control module consist of a transmitter and the actual Robot consists of the receiver module .The receiver module is interfaced with an ARDUINO UNO R3 board. The Robot functions according to the input given via the transmitter. The control module contains LCD display which is interfaced with a wireless video receiver which receives video signal from the wireless camera. The wireless camera is to be placed in the robot near the arm which houses the center shaft motors used for the actual diffusion purpose so that the video captured can be viewed in the LCD display which is placed in the control module. We have used DC motors for movement of the robotic arm. As we is not risking the life of a bomb squad expert or any other solder or commando hence introducing the safest way for disposing the explosive to save life of common people.
Web Content Accessibility Analysis using the WCAG and ARIA Guidelines
Sofre Garevski, Slavcho Chungurski
DOI: 10.17148/IJARCCE.2018.7711
Abstract:
The Web is an important medium for receiving information, providing information and interacting with society. Its importance is in its universality to be accessed by everyone. Accessibility is achieved by following guidelines and usage of different testing tools when designing web sites. The goal of this paper is to examine the compliance of a group of web sites to the WCAG and ARIA accessibility guidelines. To achieve that we are going to give overview of the WCAG and ARIA guidelines and define the requirements needed to achieve accessibility. We are going to use Tenon and Lighthouse automated tools as well as manual testing to test the accessibility of the most visited Macedonian web sites. To find out these sites we are going to use Alexa and SimilarWeb web traffic analytical tools. At the end we are going to discuss and compare the collected results.
Keywords:
Web Accessibility, WCAG, ARIA, Accessibility Evaluation Tools, Lighthouse, Tenon
Analysis of Low Power and High Speed Double Tail Comparator using FinFET Technology
Shwet Kumar, Sanjeev Srivastav, Satyarth Tiwari
DOI: 10.17148/IJARCCE.2018.7712
Abstract:
In conventional double tail comparators, Kick-back noise is produced and the circuit requires high input impedance. Due to aggressive scaling of MOS, short channel effects occur and there is a need of substitutes like FinFETS. In this paper, we have designed double tail comparator by using FinFET technology in shorted gate mode. It is seen from results that the power and delay are reduced in a large quantity maintaining the output waveforms to the previous one. This improves efficiency of the system and noise tolerance and leakage current are also reduced. This can be beneficial for the Analog to Digital Converters, reference voltage comparison.
Comparison of K-Means Algorithm and Hierarchical Algorithm using Weka Tool
Saleena T.S, Dr. S.J.Sathish Aaron Joseph
DOI: 10.17148/IJARCCE.2018.7713
Abstract:
Data mining is a process of Collecting useful information and patterns from huge data. Clustering is a process of partitioning a set of data or objects into a set of meaningful sub-classes, called clusters. In clustering, objects of the data set are grouped into clusters, such a way that each group are very different from each other and the objects in the same group are very similar to each other. In this paper analyses two major clustering algorithms: K-Means and Hierarchical. The performance of these two clustering algorithms is compared using the clustering toolkit Weka, which is a platform-independent open source toolkit.
Keywords:
Data mining, Clustering, Clustering algorithms, K-means algorithms, Hierarchical clustering and Weka toolkit
Analysis of Various Clustering Algorithm on Job Events Data of Google Cloud Tracelog
Mrs. Chethana C
DOI: 10.17148/IJARCCE.2018.7714
Abstract:
The term Workload is defined as “the amount of work assigned to or done by a client, workgroup, server or system in a given time period” and consists of two components user and task. Analysis of cloud jobs and user benefits both providers and researchers as it enables a more in-depth understanding of the system. In this paper I am using clustering techniques available in WEKA tool to perform analysis. The data is taken from google cloud trace.
Object detection is important task in image processing and computer vision. To identify objects in images or pictures, objects have various features. Objects have various features in the form of feature vectors. Feature vector are being extracted for the object detection. There are ways for detection objects that are texture, colour and shape. Texture is the surface of the object. Texture based object detection is further divided in sub types texture segmentation, region based, edge based. In order to shape is most stable and explanative way for object detection. Further shape is divided in two subtypes region based and contour based. In this contour based is more used because these methods are invariant to rotation scaling and transposition invariant of the object. All the ways and its subtypes are discussed in this paper. Object detection is being used in many applications robot navigation, augmented reality, CBIR.
Current State of Agile Methodologies and its extended practices in Software Development - A Review
Mrs. Shivaleela S, Dr. L .Manjunatha Rao
DOI: 10.17148/IJARCCE.2018.7716
Abstract:
In fast changing world agile has become successful in software because of its acceptance of changing requirement and fast delivery of the software product. Once an organization decides to adopt an agile development regimen, there is still plenty of difficult research and decision-making to be done for the project architect / manager. There have been many studies and suggestions in improving the software project development process .The aim of this paper is to document the view on introduction of various agile methodologies, current state of agile adoption, reasons, benefits and cautions of adopting agile methodology and its extended practices. The research method follows grounded theory of qualitative research method, in the first phase systematic literature survey of papers has been done. Structured analysis and techniques have been applied to develop well-grounded theories. The basis of this survey will serve as foundation to my research work.
Keywords:
Agile Methodologies, Extreme Programming, Lean, DevOps, challenges, research and decision-making, Software Development, Structured analysis and techniques, grounded theory of qualitative research method
Web mining is a process in which algorithms are written to analyse or discover patterns from the World Wide Web. Web mining may include web content mining, web structure mining or web usage mining. In this paper we have put in efforts to extract/mine data from the IMDb website-a leading movie website guide for watching movies, listening to music, watching TV shows, celebrity gossips and much more. We have written an algorithm/used a web scraper Bot by virtue of which the database of a particular year or name or IMDb rating is extracted in few seconds and is displayed in the CSV format. Various calculations and analysis can be further carried out after extraction of crude data from the website and converted to useful format. Efforts are also made to store the data in both processed and unprocessed format for future applications.
Keywords:
Analyse or discover patterns from the World Wide Web, extract/mine data from the IMDb website, crude data from the website and converted to useful format, CSV format, store the data in both processed and unprocessed format