VOLUME 8, ISSUE 2, FEBRUARY 2019
A Survey on Different Techniques of Static and Dynamic Load Balancing
Suhani Kumari, Himanshu Yadav, Chetan Agrawal
A Simulation Model for the Smart Irrigation System using Arduino
P. Mercy Nesa Rani, A. P. S. Thengal, Paominhao Hangsing, L. I. P. Ray, T. Rajesh, Kamalika Datta
“Automated Requirement Management Suite Tool with Traceability and Templates Based on Derived Standards”
Amrut R. Jamdar, Akshay B. Mahadik, Tejas B. Nimase, Mahesh N. Dhimdhime
Review on Different-Different TLBO Methods in Data Mining
Trupti Ayachit, Amit Sariya
Brain Tumour Detection using PSO and Region Growing Algorithm
Rupinder Kaur, Gurjit Singh
Real Time Forest Anti-Smuggling Monitoring System based on IOT using GSM
Pushpalatha R, Darshini M.S
Android Application to Convert Speech to Text and Text to Speech
Manish YM, Kavya K, Vishesh S
Application Development using Kivy Framework
Aman Bhoyarkar, Anuja Solanki, Ashutosh Balbudhe
Barcode Based Billing System for Supermarket using Android Smartphone
Mansi Karanjekar, Pratiksha Rode, Sidhant Mankar, Priyanka Meshram
Online-Cloud Based Data Security
Anjali Dange, Satish Sahare, Shubham Amnerkar, Utkarsh Fopare, Vijay V. Chakole
Project Guesstimation System
Aishwarya Ingle, Akanksha Nandgaonkar, Bhawana Prakash, Rucha Bobade, Yogesh Narekar
Analyzing the Risk factors of Polycystic Ovary Syndrome (PCOS) with Insulin Resistance (IR)
R. Bakkiyalakshmi, T. Jenifer, Gayathri Premanand
Fuzzy Clustering for Next Generation Wireless Sensor Networks
Ola Albeshri, Laila Nassef, Etimad Fadel
Smart irrigation and plant monitoring system using Arduino
Mr. Shubham P.Bhujba, Mr. Sohil S. Hendre, Mr. Digvijay S. Mohite, Prof. Alka Kulkarni
Movie Recommendation Engine using Collaborative Filtering with Alternative Least Square and Singular Value Decomposition Algorithms
Rohan Mhetre, Dr. Priya G
Real Time Traffic Light Controller Using Image Processing
N. Karthikeyan*, N Praveen Kumar, R Priyanka, R Sangavee, A Suthin Raj
Review on Improve Performance Localization in Wireless Sensor Networks Based Received-Signal-Strength Technique
Virendra Jain, Prof.Amit Thakur
A Review Paper on Video Dehazing
Dipali Bhajibhakre, Deepa Pawar, Poonam Pawar, Arjun Nichal
Brain Tumor Detection using Marpholical Segmentation Techniques
K.Shankar, A.Parimala, M.V.V.S.T. Chaitanya, T.Supriya
Forecasting The Sales Volume Of Seven-Up Bottling Company Plc, Kaduna Plant Using The Classical Decomposition Method
Uwa, Celestine Ozoemenam and Ogwueleka, Francisca Nonyelum
Vehicle To Vehicle Communication Using Li-Fi Technology
Arun Kumar N, Hari Subramanian M, Anurudh H, Ms.M.Jaishree
Implementation of Health Monitoring System Internet of Things
Kamalakkannan.S, Mohanraj V, Naven R, Sam peter S
GPS Based Location Tracker: A Review
Kapil Joshi, Durgesh Kashyap, Bhanu Bisht, Ayush Bagwari
Driver Assistance System Based on Vehicular Communication
Somaskandan M, Avinash B, Sanjay Raj D, Someshwar G, Vignesh M
Smart Waste Segregation System
Jeyapriya.K , Lakshmi Priya.P, Krishna Pavani.K, A.S.Balaji
A Smart Home Automation using IOT & Data Analytics Approach
Nikesh Aote, Tejas Belsare, Shivam Giradkar, Ajay Wahane, Aniket Giradkar, Ankit Dekate
A Review on Deep Convolutional Neural Network and its Applications
Sugandhi Maheshwaram
Smart Traffic Control System with Path Clearance Ability and Theft Vehicle Detection
S Shanmugapriya, Bhavyalakshmi T R, Aiswarya G Menon
“Furniture Inventory Management System”
Shrutika Andewar, Shivani Hiware, Akash Bawane, Ankit Sahu, Prof. Shishir Bagal
Design and Implementation of ATM Theft Monitoring System using K-Band Doppler Radar
R.Sathya, C.Pavithra, T.Santhiya, Ms.L.Revathi
Network Intrusion Prevention System
Ayush Gupta, Shreyash Ninawe, Vilas Bariyekar, Ranjita Asati
Usage of QR code for Resource Planning and Utilization
J. Sowbakiyam, E.Ramya, Dr.Priyadharshini.M
Application for Distinguishing Grounds Understudy Troubles Utilize Machine Learning
Mr. Biju Balakrishnan, Adharsh M R, Sharath Prakash
Doctor’s Cloud
Prof. Chandrapal Chauhan, Roheet Kantode, Rajat Wanode, Pranay Dhopte, Gaurav Dhawane
Bank Vault Security System
Ms Kumari S, Rathna Priyadarsini S, Reshma Chowdary M, Sahaana K, Vasantha @ Sindhuja S
IOT Based Cotton Dust Monitoring System in Textile Industry
Z. Reshma, T. Sharmila, D. Tamizharasi, S. Keerthana, P. Brindha
Data Analysis With Hadoop
Bhawna Makhija, Chhaya Amrute, Durga Nandan Mishra, Rashmi Tembhurne, Vijay V. Chakole
Efficient Regular Language Search for Secure Cloud Storage
Karthikeyan B, Vishaal S, Ajithkumar P, Backia selvan K, Rupesh P
“Automatic Driving Robot Simulation in MATLAB with Hardware”
Prof. Vivek Mahawadiwar, Shivani Dongre, Onkar Wanjari, Nidhi Tangselwar, Sourabh Tipramwar
Survey on War Soldiers Health Care Monitoring System Using Machine Learning and IOT
Mr. Abhilash, Ms. Sathya Shree K P, Ms. Subiya Seher, Ms. Thanusha S
Design and Development of Smart Helmet
Dr.G RajivSureshKumar, A. Priyadharshini, B. Firoz
Classification of URL into Malicious or Benign using Machine Learning Approach
Deebanchakkarawarthi G, Parthan AS, Sachin Lal, Surya A
Finding Shortest Distance Path and Object Detection and Avoidance Using Image Processing and Artificial Intelligence
Omkar A Darekar, Kartik R Kalal, Pratik Holkar, Milap R Disagar
A Survey on Smart Capture
Vilas Rathod, Soham Kulkarni, Rutuja Paygude, Samruddhi More, Akash Bhosale
Reputation Based Dead Line Scheduling in Grid Computing Environment
R. Ananthi Lakshmi, R.RaviChandran
Communication and Distribution Management System in SCADA
Mrunmayee Kore, Mohini Chaube, Gaurang Singh, Shruti Nema
Smart Vehicle Insurance Verification System
T.Sivakumar, L.Kalicharan, R.S.Selvanithila, M.Surekha
Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application
Dilli Babu M, Balamani M, Mukesh G, Ajay Krishna S, Kasi Rajan B
Brain Tumour Detection and Classification using Fusion Technology on IOT
K. Malarvizhi, P.Ramya Devi, Akshay G Bhat
Real Time Objects Recognition and Classification using Deep Learning Algorithm for Blind Peoples
K. Sivakumar, Devi K G, Nikhil P C
Web Application for Disaster Management
K. Jason, Jishnu V K, Remya G
Image Processing Based Plant Disease Detection and Automated Treatment
Mr. P. Senthil Kumar, V. Yoganivetha, R. Sindhuja Rakavi, S.Thilagavathi, N. Vigneshwaran
Abstract
A Survey on Different Techniques of Static and Dynamic Load Balancing
Suhani Kumari, Himanshu Yadav, Chetan Agrawal
DOI: 10.17148/IJARCCE.2019.8203
Abstract:
As cloud computing has number of issues related to security, bandwidth efficiency, large information handling, load balancing, etc. Load balancing implies distribution of the workload to node or servers or assets with the goal that one can accomplish maximum utilization of resources, reduce execution time, increase system throughput and so on. This paper gives a concise study of cloud based service balancing methods proposed by different researchers. Here various features of service are detailed for the load balancing and planning. Different sorts of requirement of load balancing was additionally talked with their significance and limitations. So according to the module as well as steps used in techniques classification of load balancing algorithms are done with a comprehensive and comparative understanding of existing literature.Keywords:
Cloud Computing, Load balancing, Machine Learning, Soft Computing, Virtual machinesAbstract
A Simulation Model for the Smart Irrigation System using Arduino
P. Mercy Nesa Rani, A. P. S. Thengal, Paominhao Hangsing, L. I. P. Ray, T. Rajesh, Kamalika Datta
DOI: 10.17148/IJARCCE.2019.8202
Abstract:
Irrigating the crop is one of the greatest challenges in agriculture. This irrigation process consumes significant amount of time, when a farmer has to irrigate multiple agriculture fields across different geographical areas. Therefore, we propose a model for the smart automated irrigation system. Initially, the environmental data such as soil moisture level, humidity and temperature have been acquired from the different sensor nodes placed across the agricultural field. Then, the microcontroller estimates the soil temperature and moisture level from the acquired data and start the irrigation process accordingly. When the irrigation process is over, the physical parameters such as humidity, temperature and volume of water irrigated can be uploaded to the cloud server. Later, the user can access the cloud-server for viewing the status of the irrigation system. This system will definitely help the farmers to effectively irrigate the agricultural field.Keywords:
Agriculture, Smart Irrigation Facility, Sensors, CropAbstract
“Automated Requirement Management Suite Tool with Traceability and Templates Based on Derived Standards”
Amrut R. Jamdar, Akshay B. Mahadik, Tejas B. Nimase, Mahesh N. Dhimdhime
DOI: 10.17148/IJARCCE.2019.8204
Abstract: Project requirements writing is a very important role in every Software organization, yet relatively little research effort has focused on how to write them. This Project takes note on issues arising in requirements and their traces to other requirements and presents an approach to requirement writing, traceability, team management, and describes agenda to facilitate the use of our project approach. Requirement writing plays very important role in successful and smooth flow project completion. A framework for writing requirements is introduced. A complete tool set, based on this framework, has been prototyped. The components of this system are a requirement suite tool that gathers project requirement information, a grouping tool that groups various requirements, a team tool that stores team members working for a project, and a traceability tool that traces different requirements.
Keywords:
Abstract
Review on Different-Different TLBO Methods in Data Mining
Trupti Ayachit, Amit Sariya
DOI: 10.17148/IJARCCE.2019.8205
Abstract: Data mining is the process of extracting useful information from this flooded data, which helps in making profitable future decisions in these fields. Evolutionary algorithms (EA) are generic meta-heuristic optimization algorithms that use techniques inspired by nature’s evolutionary processes. EA maintains a whole set of solutions that are optimized at the same time instead of a one single solution. The inherent randomness of the emulated biological processes enables them to provide good approximate solutions nevertheless. The recently emerged nature-inspired multi-objective meta-heuristic optimization algorithms Teaching Learning-Based Optimization (TLBO) and its variations Elitist TLBO belong to this category. Both these algorithms aim to find global solutions for real world problem with less computational effort and high reliability. The principle idea behind TLBO is the simulation of teaching–learning process of a traditional classroom in to algorithmic representation with two phases called teaching and learning. Elitist TLBO was pioneered with a major modification to eliminate the duplicate solutions in learning phase. In this paper, we have studied about different-different efficient algorithm of TLBO that was designed. Also, a brief study has given about TLBO phases and comparison.
Keywords: Data Mining, TLBO, Elitist TLBO, TLBO phases, Elitist TLBO algorithms
Abstract
Brain Tumour Detection using PSO and Region Growing Algorithm
Rupinder Kaur, Gurjit Singh
DOI: 10.17148/IJARCCE.2019.8206
Abstract: Brain tumor, which is one of the most common brain diseases, has affected and devastated many lives. The statistical reports shows low survival rate of brain tumor patients although brain tumor diseases has been the centre of attention of thousands of researchers over several decades, around the world. In the recent years, researchers from different disciplines ranging from medical to mathematical and computer sciences have combined their knowledge and efforts for better understanding of the disease and to find more effective treatments The proposed  algorithm of particle swarm optimization is an evolutionary computational model and is  Particle Swarm Optimization belongs to the class of swarm intelligent techniques that are used to solve the Optimization problem in real life. Fragmentation, detection and extraction of the infected tumor region of MRI are the main concern, but arduous task and time taken by radiologist, depends on their experience only
Keywords: MRI, X-rays, PSO, Segmentation
Abstract
Real Time Forest Anti-Smuggling Monitoring System based on IOT using GSM
Pushpalatha R, Darshini M.S
DOI: 10.17148/IJARCCE.2019.8207
Abstract:
The motivation behind this task work is to plan an enemy of pirating framework which is  valuable in Protected Forest regions. The Theft and illicit development of business trees like Sandalwood, Teak, Sagwan., and so on have been a noteworthy concern. It is additionally a burglary to Forest Flora and fauna. As concerned residents our belief system is to counteract such sneaking exercises by utilizing most recent advances. These trees are exorbitant and also less accessible on the planet. These are use in the medicinal sciences and in addition beauty care products. In light of titanic dimension of money related with offering of such tree woods piles of events are going on of cutting of trees and their sneaking. To join such appropriating and to save the forested spaces the world over some preventive evaluations ought to be passed on. We are ending up such a structure which can be used to tie this appropriating.Keywords:
Accelerometer sensor, flex sensor, fire sensor, GPRS, GSM Module, GPS, CloudAbstract
Android Application to Convert Speech to Text and Text to Speech
Manish YM, Kavya K, Vishesh S
DOI: 10.17148/IJARCCE.2019.8208
Abstract: 21st century is the age of smartphones [1] and other smart gadgets like tablets, portable media players, pocket computers, and smart watches. Most of these gadgets run android OS developed by Google and Open Handset Alliance (OHA) [2]. Android OS supports many android applications, either developed by the company itself or by any third party called third party application (app). In this paper, we have presented one of the applications developed by us which can perform the task of converting speech to text and text to speech. The speech of the subject will be carefully and intelligently converted to text by formal approximations. Anything written or copied to the clipboard can be converted to speech. Our goal is to operate using English language. This can be later employed in the case of regional languages as well.
Keywords: third party application (app), converting speech to text, converting text to speech, recording the data entered on to the clipboard, recording the speech at different rate and publishing it in suitable format.
Abstract
Application Development using Kivy Framework
Aman Bhoyarkar, Anuja Solanki, Ashutosh Balbudhe
DOI: 10.17148/IJARCCE.2019.8209
Abstract: This paper focuses on Kivy Framework for application development and its implementation. The main aim is to provide sufficient information about the framework and get acquainted with the installation of the framework on different platforms, components of the framework and KV language, use and implementation of framework with Python Programming. and to serve as a practical guide for Kivy Framework.
Keywords: Kivy Framework , Python, KV Language, Graphical User Interface (GUI), Application Programming Interface (API), Â Windows, Raspberry Pi.
Abstract
Smart Monitoring of Electric Meters using IoT
P.Kalpana, B.Manju
DOI: 10.17148/IJARCCE.2019.8210
Abstract:
The technology is now going upwards everywhere in the globe with the tendency to rise even more. But the major backend support required for most of this technology is power supply. So, electricity is now becoming more and more important day by day. Even though the technology is trying to get rid of it, the rate of necessity is currently high. One of the problems faced by the electricity board is taking the reading from the meter to identify the usage of a customer. so a smart monitoring system that will help the electricity boards to fetch the readings of various houses and commercial buildings with the help of internet of technologies , without any intermediation, that makes the interaction possible between the customer and the electricity board through direct communication with mobile application and website and wireless network connectivity attached with Arduino board. Even the customers will be able to know how much power they are consuming so that the awareness among the customers can be developed which may help the nation to use the power carefully. Even we can find the faults, if any, in the meter. Through this, the aim of also conserving budgets regarding the government can be fulfilled by finding faulty meters and avoiding human errors.Keywords:
Cognitive Sensor, Energy Efficient, Reliable, Cost-effectiveAbstract
Barcode Based Billing System for Supermarket using Android Smartphone
Mansi Karanjekar, Pratiksha Rode, Sidhant Mankar, Priyanka Meshram
DOI: 10.17148/IJARCCE.2019.8211
Abstract:
The Smart Shopping methodology is collaborating ease in smart shopping and the sense of security money wise as well as for customer satisfaction while doing shopping offline. This is implemented using an Android application. In Shopping mode, the customer needs to physically pick up his purchase, carry cash, along with them and wait in the long queue to make payments. The application mentioned here would read the Bar code of the product & add it to the shopping cart in the application. It provides methods to change the quantity of product purchased and edit the list. Along with that customer can easily view his cart, bill and amount and products.Keywords:
Barcode, barcode scanner, android, Android smartphoneAbstract
Online-Cloud Based Data Security
Anjali Dange, Satish Sahare, Shubham Amnerkar, Utkarsh Fopare, Vijay V. Chakole
DOI: 10.17148/IJARCCE.2019.8212
Abstract:
We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage is clearly seen in and around the scope of realization of the concept of cloud securityKeywords:
Re-encryption, Simulations, Cloud computing, Data storage, Data deduplicationAbstract
Project Guesstimation System
Aishwarya Ingle, Akanksha Nandgaonkar, Bhawana Prakash, Rucha Bobade, Yogesh Narekar
DOI: 10.17148/IJARCCE.2019.8213
Abstract:
Academic Project management is a major issue which is faced by many educational institutes. The main reason for this is there is no automated system followed in any institute. College management/staff gathers all the project reports and project sources from students and store them physically in some locations probably libraries. To overcome this practical problem and also to make the process easy we developed a secured intranet application which is useful for each. This project realizes several functionalities such as: reducing redundant tasks; giving productive workflow with efficiency; and, providing centralized and consolidated feedback from the approver, reduced risk of errors, increased functional security, message encryption, and improved tracking progress status. This will reduce the physical efforts of students meeting the guide and also reduce the time frame period of completing this part of project work. Students can also update their project status weekly and provide in for regarding the progress, which will be monitored by all relevant professors and head of departments. It will be useful for all students related to Engineering, MSc, M.Tech, final year students of any grad etc.Keywords:
Project Management, Project Evaluation, Project Approval and project UpdatingAbstract
Analyzing the Risk factors of Polycystic Ovary Syndrome (PCOS) with Insulin Resistance (IR)
R. Bakkiyalakshmi, T. Jenifer, Gayathri Premanand
DOI: 10.17148/IJARCCE.2019.8214
Abstract:
Polycystic Ovary Syndrome (PCOS) is the most common endocrine disorder in women of reproductive age, yet debate over appropriate diagnostic criteria and design limitations with sampling methodology have left some doubt as to the actual prevalence in the community. Polycystic Overy Syndrome (PCOS) is not only the problem but it also associated with many others like causes of infertility, metabolic aberrations and manifests with hirsutism, acne, and obesity. Here we have to investigate its impact on health related issues, we have to analysis the risk factors; predict the reasons, and what is the best treatment for PCOS with Insulin Resistance. So the major goal of this research is to find the best solution by comparing patients with PCOS with and without Insulin Resistance using Data Mining Techniques.Keywords: Polycystic Ovary Syndrome (PCOS)
, IR, CART, K-means, Obesity, Type 2 DiabetesAbstract
Fuzzy Clustering for Next Generation Wireless Sensor Networks
Ola Albeshri, Laila Nassef, Etimad Fadel
DOI: 10.17148/IJARCCE.2019.8201
Abstract: The massive growing demands for radio wireless communications have resulted in a spectrum scarcity problem. Cognitive radios utilize a dynamic spectrum access to share the spectrum with licensed frequency bands in an opportunistic manner. The integration of cognitive radio with wireless sensor nodes can improve spectrum utilization and increase communication quality. Currently, clustering protocols have been developed to minimize energy consumption and to prolong network’s lifetime. However, spectrum awareness in not considered. Thus, clustering protocols need to adapt to the changes in the surrounding environment and to optimally consider both energy efficiency and spectrum awareness. Therefore, this paper develops a Fuzzy based Energy Efficient and Spectrum Aware clustering protocol (FEESA) to optimally elect cluster heads based on four conflicting parameters: residual energy, distance to base station, node degree, and channel availability. The performance of the proposed protocol is simulated using MATLAB and Mamdani fuzzy inference system. Two simulation scenarios and three performance metrics were used. The proposed fuzzy clustering protocol is compared with three different protocols: a basic energy efficient protocol, a spectrum aware protocol, and an energy efficient spectrum aware protocol which uses a weighting function. The simulation results indicate the effectiveness of the proposed fuzzy based clustering protocol to extend network lifetime and reduce energy consumption.
Keywords: Routing Protocols, Cognitive Radio Sensor Networks, Spectrum Aware, Fuzzy Logic
Abstract
Smart irrigation and plant monitoring system using Arduino
Mr. Shubham P.Bhujba, Mr. Sohil S. Hendre, Mr. Digvijay S. Mohite, Prof. Alka Kulkarni
DOI: 10.17148/IJARCCE.2019.8215
Abstract: Agriculture helps to meet the basic needs of human and their civilization by providing food, clothing, shelters, medicine and recreation. Agriculture provides food, feed, fiber, fuel, furniture, raw materials and materials for and from factories; provides a free fare and fresh environment, abundant food for driving out famine; favors friendship by eliminating fights. Crops ranks sixth among pulses production in world and major legume crop. Average world production of crops is at 3.0 million tons in the last six years (2000-05). The area under cultivation is stagnant at 4.5 million hectares in the same period. Crops are drought resistant and can be grown in areas with less than 650 mm annual rainfall. World production of crops is estimated at 46,000 km². About 82% of this is grown in India. Hence it is necessary to develop android application for crops crop. It is beneficial for farmer to have all information related to crops crop. This app will contain crop information and disease related to crop.
Keywords: Climate, Sensors, climate, agricultural productivity, crop production, prediction, Internet of Things
Abstract
Movie Recommendation Engine using Collaborative Filtering with Alternative Least Square and Singular Value Decomposition Algorithms
Rohan Mhetre, Dr. Priya G
DOI: 10.17148/IJARCCE.2019.8216
Keywords:
Collaborative Filtering, ALS, SVD, Apache Spark, Elastic SearchAbstract
Real Time Traffic Light Controller Using Image Processing
N. Karthikeyan*, N Praveen Kumar, R Priyanka, R Sangavee, A Suthin Raj
DOI: 10.17148/IJARCCE.2019.8217
Abstract:
The frequent traffic jams at major intersections calls for an effective management system. This paper suggests implementing a smart traffic controller by image processing using Raspberry pi module. A camera will be installed on the four sides to capture image sequences. The captured images will then be analyzed using digital image processing for vehicles intensity, and based on this intensity on the road, traffic light can be controlled. It has been customized to control the traffic system by giving sufficient time for each side, depending on the number of cars on each direction to give out a way for ITS [Intelligent Transport System]. Keywords: Automatic Traffic, Raspberry pi, Image Processing, ITS [Intelligent Transport System].Abstract
Review on Improve Performance Localization in Wireless Sensor Networks Based Received-Signal-Strength Technique
Virendra Jain, Prof.Amit Thakur
DOI: 10.17148/IJARCCE.2019.8218
Keywords:
Wireless Sensor Network, security, localization, Â Â mobile sensors, anchor nodes, Localization error, received signal strength.Abstract
A Review Paper on Video Dehazing
Dipali Bhajibhakre, Deepa Pawar, Poonam Pawar, Arjun Nichal
DOI: 10.17148/IJARCCE.2019.8219
Abstract: We make an investigation of dehazing effect of image and video which is affected by bad weather conditions. A video captured in outdoor scenes affects by presence of haze like fog, mist and dust particles in the atmosphere. We are utilizing a Dehazing algorithm to remove this unwanted haze from videos and Real-time video. For this we uses a Novel method of video dehazing based on contrast enhancement. From our observation it is conclude that hazy image and video has low contrast, so we restore the hazy image and video by enhancing its contrast. This algorithm computes the airlight on an input hazy image and video then we estimates the transmission map to maximize the contrast of output video and image. We establish a better Dehazing performance with fewer artifacts and better coding efficiency and demonstrate that the proposed algorithm can remove haze efficiently and recover the parameters of original scene.
Keywords: Real-time video dehazing, image dehazing, restoration, contrast enhancement, airlight estimation, transmission map,gamma correction.
Abstract
Brain Tumor Detection using Marpholical Segmentation Techniques
K.Shankar, A.Parimala, M.V.V.S.T. Chaitanya, T.Supriya
DOI: 10.17148/IJARCCE.2019.8220
Abstract: In medical image processing there are many challenging tasks and performing the segmentation on a brain image is more difficult to understand and extract the tumor form it and classifying the detection rate in MRI images so image segmentation and identification of tumor is one of the best methods for identifying the tumor in image so here in this paper we implement the watershed algorithm and contrast enhancement technique in segmenting a brain image which gives us more accuracy.
Keywords: Segmentation, Brain Tumor. Watershed,MRI
Abstract
Forecasting The Sales Volume Of Seven-Up Bottling Company Plc, Kaduna Plant Using The Classical Decomposition Method
Uwa, Celestine Ozoemenam and Ogwueleka, Francisca Nonyelum
DOI: 10.17148/IJARCCE.2019.8221
Abstract:
The Seven-Up Bottling Company Plc, Kaduna Plant has no mathematical model that takes into account seasonal indexes for forecasting sales volume and since their products are seasonal in nature, the classical decomposition of time series data into the various components was used to model the present using the past trends into the future periods in order to have good forecasts for effective management. Sales records of Seven-Up Bottling Company Plc, Kaduna Plant for the past ten years (2007 – 2016) were collected, analysed and then various statistics such as t-test, z-test and Durbin-Watson test were carried out for the purpose of testing hypothesis. A model was then developed using deseasonalised data series that accounted for 95% of the total variability. The results showed that the seasonal indexes for the months of January, February, March, April, May and December were higher than those of the months of June, July, August, September, October and November. The highest seasonal value of 113.8% was recorded in May and the lowest of 75.3% was recorded in August. The model was used to forecast product sales for 2017 with the result showing good agreement between predicted and observed values.Keywords:
Classical decomposition; autocorrelation coefficient; seasonal indexes; trend-cycle; irregular component; cyclical component; trend seasonal factors.Abstract
Vehicle To Vehicle Communication Using Li-Fi Technology
Arun Kumar N, Hari Subramanian M, Anurudh H, Ms.M.Jaishree
DOI: 10.17148/IJARCCE.2019.8222
Abstract:
Vehicle to Vehicle communication is the communication methodology which implies the network-based topology. This proposed method meets and ensures the comfort and safety for the vehicles by preventing major accidents. This proposed project is an application of vehicle to vehicle and no infrastructure is required. Since this project does not require any protocols or any architecture which is network based, this is more robust. This proposed project makes use of various sensors namely accelerometer, ultra sonic sensor, speed sensor and transfers the data collected from these sensors between vehicles. Services such as warning about an accident, traffic jams information or messages about a rescue vehiÂcle which is approaching. Additional information such as whether information and voice commands can also be given. Moreover the main key part in this proposed system is the use of Light Fidelity (Li-Fi) to transmit the data. The use of Li-Fi ensures and guarantee the speed of the communication and also go green to the environment.Keywords:
Vehicle to Vehicle, Li-Fi, LEDAbstract
Implementation of Health Monitoring System Internet of Things
Kamalakkannan.S, Mohanraj V, Naven R, Sam peter S
DOI: 10.17148/IJARCCE.2019.8223
Abstract:
The Internet of Things is an growing topic of technical, social, and economic significance. IOT involves in various departments like Medical industries, Automobile industries, Manufacturing industries, and etc. Now a day’s utility components everyday objects are being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way of life style. In this project a for comma patient a Dynamic Service Non Dependency Verification has been implemented using IOT. The first process of this project initiate with hardware interface. And we propose a heterogeneous IOT scheme to secure communication between a sensor node and an Internet host. We prove that this scheme is indistinguishable against various conditions. This project has the following advantages. First, it achieves confidentiality, integrity and authentication in a logical single step. Second, it allows a sensor node in an identity-based Enhanced data transfer to send a message to an Internet host in a public key infrastructure method.Keywords:
Internet of Things, Dynamic Service Non Dependency Verification.Abstract
GPS Based Location Tracker: A Review
Kapil Joshi, Durgesh Kashyap, Bhanu Bisht, Ayush Bagwari
DOI: 10.17148/IJARCCE.2019.8224
Abstract
Driver Assistance System Based on Vehicular Communication
Somaskandan M, Avinash B, Sanjay Raj D, Someshwar G, Vignesh M
DOI: 10.17148/IJARCCE.2019.8225
Abstract: Vehicular communication system is a system which can guarantee the safer transport by enabling vehicles to communicate with one another, and their surroundings and thereby it can provide driver assistance. The proposed system is capable of measuring the level of fuel in the tank and send enquiry to know the nearest location of fuel station, then wireless communication equipped fuel station automatically gives the information about that location. This system enables immediate payment system in which the vehicle can pay the tolls in arrears by the wireless fund transfer method. This system is also capable of detecting an approaching landslide or occurring one and transmitting pre safe warning. In addition to this, the system enables us to automatically monitor and/or control the actual speed of a vehicle relative to the legal speed limit of the geographic area the vehicle is located in. By implementing this effective and reliable system the road accident can be reduced and road safety will be improved. If this idea comes to the real life it will be more useful for the people as well the government since it take lots of measures to reduce the accidents.
Keywords: level of fuel, immediate payment, pre safe warning, legal speed limit
Abstract
Smart Waste Segregation System
Jeyapriya.K , Lakshmi Priya.P, Krishna Pavani.K, A.S.Balaji
DOI: 10.17148/IJARCCE.2019.8226
Abstract: IoT devices can be used to monitor and control the mechanical, electrical and electronic systems which is used in various types of buildings in home automation and building automation systems. The massive amount of waste material is collected, it is difficult to separate and it is unhygienic. In our proposed system the design of new smart dustbin which opens automatically by sensing the waste using the ultrasonic sensor. Here in this method it is designed to sort the trash into metallic waste using the inductive proximity senor, wet waste using the moisture sensor, plastic waste using capacitive sensor and other wastes are thrown separately. Using IOT technology to continuous monitoring the dustbin in order to check whether dustbin is full or not. Infrared sensors sense the amount of waste in the containers if it reached the maximum container capacity, sends instant messages to the user with the help of GSM module which help them to move trash on time. Segregation makes it possible to reuse and recycle the waste effectively. These processes can be used all over the industry to reduce mankind. Smart bin helps to segregates the waste easily and this is helpful for the country for their development.
Keywords: Arduino, GSM, moisture sensor, inductive proximity sensor, capacitive sensor, Infrared sensor
Abstract
A Survey on Various Routing Protocols for MANET in Different Node Mobility Models With Respect To Performance Aspects
Ashish Gupta
DOI: 10.17148/IJARCCE.2019.8227
Abstract: MANET stands for Mobile Ad hoc Network. An ad hoc network is often referred to as an “infrastructure less” network, because the network does not need fixed routers [1]. These nodes are mobile communicating through wireless medium. Each ad hoc node may be capable of acting as a router. It’s characterized by multi-hop wireless connection and frequently changing networks. Due to frequent topology changes and routing overhead, selection of routing protocol in Mobile Ad-hoc Network (MANET) is a great challenge. A design issue for an efficient and effective routing protocol is to achieve optimum values of performance parameters under network scenarios. There are various routing protocols available for MANET. This paper involves study of four routing protocols (Bellman Ford Routing, FSR, CGSR and SHARP), and performance comparisons between these routing protocols on the basis of performance metrics (throughput, packet delivery ratio, and end to end delay measured after simulation of network) with the help of QualNeT Simulator. In this study we have considered three mobility scenarios: Random Waypoint, Group Mobility and Freeway Models. These three Mobility Models are selected to represent possibility of practical application in future.
Keywords: MANET, Bellman Ford, FSR, CGSR, SHARP, Random waypoint Mobility, Group Mobility, Freeway Mobility Models
Abstract
A Smart Home Automation using IOT & Data Analytics Approach
Nikesh Aote, Tejas Belsare, Shivam Giradkar, Ajay Wahane, Aniket Giradkar, Ankit Dekate
DOI: 10.17148/IJARCCE.2019.8228
Abstract: In this world of growing technology, Internet of Things and Data Science are the most trending technologies, either it is in business field or in a commercial field its features makes these technologies more popular and more useful. In our project we have implemented a Smart Home Automation System using Internet of Things (IOT) Technology which includes two types of modules working on various sensors. Internet of Thing is technique which offers interrelationship via the internet of computing devices surrounded in ordinary objects, permitting them to transmit and receive data. In this project, first module is of automatic fan speed controlling in which we are controlling   speed of fan automatically according to current room temperature. In the same manner, we are automatically adjusting  light brightness according to the brightness present in the atmosphere which is the second module of our project. These modules have various components which include sensors too, which generates data values after timely interval. We are doing data analysis on those data values by using web application. We have implemented live data tracking system using the web application. The resulting analysis reports will help us to understand the energy consume by the modules. Also it is useful for efficiently manage electricity. The modules present in the project makes it more impressive and provide standardization in this advance era of technology.
Keywords: Internet of Things, LED, DC Fan, Automation, sensors, web application, Data Analysis.
Abstract
A Review on Deep Convolutional Neural Network and its Applications
Sugandhi Maheshwaram
DOI: 10.17148/IJARCCE.2019.8230
Abstract:
Conventional architectures made use of for dealing computer system vision issues are greatly in control on customer attributes. Yet the brand-new deep discovering strategies have actually offered a replacement for instantly finding out the issue- associated attributes. Therefore the understanding of what kind of deep networks appropriate for an offered issue collection is a tough job. Convolutional Semantic Network (CNN) was to start with introductory in Computer system Vision for picture acknowledgment by Le- Cun et al. in 1989. Ever since it has actually been commonly utilized in photo acknowledgment and also category jobs The current outstanding success of Krizhevsky et al. in ILSVRC 2012 competitors show the considerable development of modern deep CNN on picture category job. Influenced by his job, several current study jobs have actually been concentrat- ing on comprehending CNN as well as prolonging its application to even more traditional computer system vision jobs. Their successes and also lessons have actually advertised the growth of both CNN and also vision science research. This short article makes a study of current development in CNN because in 2012. We will certainly present the general architecture of a contemporary CNN as well as make understandings right into numerous common CNN versions which have actually been researched thoroughly. We will certainly additionally evaluate the initiatives to comprehend CNN as well as evaluation essential applications of CNN's in computer system vision jobs. Index Terms: Deep Learning, Convolutional Deep Belief Network, Convolutional Neural Networks, Natural Language, Computer VisionAbstract
Smart Traffic Control System with Path Clearance Ability and Theft Vehicle Detection
S Shanmugapriya, Bhavyalakshmi T R, Aiswarya G Menon
DOI: 10.17148/IJARCCE.2019.8231
Abstract:
The principal challenge in traffic control is to accommodate the traffic in safe and efficient way conventional system do not gives much preference to emergency vehicles such as ambulance, fire and safety vehicles… that’s why majority of human lives are ended on traffic on the way to hospital. So in consideration to that we proposed this system. Path clearance for emergency vehicle is included here emergency vehicle driver as well as user have an application to give and get the notification respectively also there is a centralized server in between the min addition to this we included theft detection module. It is for the vehicle owner through hardware and a application.Keywords:
Traffic light, WIFI access point, RSSI, ESP32, DJANGO serverAbstract
“Furniture Inventory Management System”
Shrutika Andewar, Shivani Hiware, Akash Bawane, Ankit Sahu, Prof. Shishir Bagal
DOI: 10.17148/IJARCCE.2019.8232
Abstract:
Manual handling of the inventory leads to the wastage of time, reduced efficiency and more over keeping track on the inventory. Also, accuracy of maintaining the inventory becomes impractical some times. This project works in intended to minimize the above mentioned drawbacks using automatic identification and tracking of the inventories with the help of RFID technology. The advantages of using automatic inventory management system are well organized and fast work done, increased efficiency including data security. This project will help to reduce human error and high labor intensive activity. Also it will be responsible for easy sharing of information through the office, maintaining shipping orders, stock out and accelerate processing such as quick packing, also reduce labor cost.Keywords:
Inventory, RFID, Data SecurityAbstract
Design and Implementation of ATM Theft Monitoring System using K-Band Doppler Radar
R.Sathya, C.Pavithra, T.Santhiya, Ms.L.Revathi
DOI: 10.17148/IJARCCE.2019.8234
Abstract: Automated Teller Machine (ATMs) security plays a major role in day to day life, providing protection against physical and electronic theft from ATMs and protecting their installations is much considerable since people usage is increasing steadily now a days. The aim of proposed work is to implement low cost stand-alone security system using advanced sensors like k-band Doppler radar which has a coverage area of about 360 degree. In order to improve the security here we use gas sensor which is used to detect toxic gases and RFID module that is used to provide high security.
Keywords: Arduino mega R3 Board, RFID module, RF communication, K-band Doppler radar
Abstract
Network Intrusion Prevention System
Ayush Gupta, Shreyash Ninawe, Vilas Bariyekar, Ranjita Asati
DOI: 10.17148/IJARCCE.2019.8235
Abstract
Usage of QR code for Resource Planning and Utilization
J. Sowbakiyam, E.Ramya, Dr.Priyadharshini.M
DOI: 10.17148/IJARCCE.2019.8236
Abstract:
To solve the risk of counterfeiting and helping in revenue for goodwill of industry, usage of QR code for resource planning and utilization is followed. Many organizations are facing the problem of poor utilization of resources due to lack of planning and it leads to difficulty in achieving corporate organizational objectives. The work examines the need and scan a QR code by the android device where it directs to the data that displays resources used and planning measures. A convenient way of tracking and controlling process as it could be deployed on smart phones and other devices. It will reduce the worker’s efforts to manually maintain the track of each item .Resource planning consume a desired quantity and excess inventory. This invention also comprises a system and storage. The handheld device automatically fetched an information from the server and it will produce manufacturing details. The objective of the proposed system is, the workers to maintain accurate machine details in analyzed manner and will reduce the process time.Keywords: QR code Scanner, Resource planning and utilization management, QR code
Abstract
Heart Attack Detection System
Abhimanyu. H, BijuBalakrishnan
DOI: 10.17148/IJARCCE.2019.8237
Abstract:
Heart attack is a major death causing disease that can risk in patients lives. If a person is affected by cardiac arrest then the only option is to give medical treatment as soon as possible. What if the patient is a single resident of a house that there is no one there to help him in case of any emergencies. So what if an android Smartwatch is able to detect the heart rate of a person, detect any abnormalities that are happening with his heart. What if the same watch sends notifying messages to the close personalities of the patient whenever he needs them. We are planning to make this alive. A system that could read the heart’s blood pressure rate, respiratory rate, temperature of the body and the pulse rate simultaneously to analyze the condition of the heart. Notify the patient about his condition. Notify the doctor about his patients condition and notify his children. The system uses Internet of Things to connect and systemize the working of the sensors and the detectors. Actually four types of sensors are being used : they are: pulse rate sensors, blood pressure sensor, respiratory sensor and temperature detector. These sensors and detectors simultaneously work together to monitor the hearts condition. Then the detailed results can be checked by using the mobile applicationKeywords: Heart attack, Atmega Microcontroller, WiFi module, Internet Of Things (IoT)
Abstract
Application for Distinguishing Grounds Understudy Troubles Utilize Machine Learning
Mr. Biju Balakrishnan, Adharsh M R, Sharath Prakash
DOI: 10.17148/IJARCCE.2019.8238
Abstract:
The understudy's execution expectation is an imperative research theme since it can enable teachers to keep understudies from dropping out before final tests and distinguish understudies that need extra help. So Accurately foreseeing understudies' future execution dependent on their progressing scholarly records is vital for successfully completing important instructive intercessions to guarantee understudies' on-time and palatable graduation. With the help of machine learning technology, using decision tree algorithm the academic performance and extra-curricular activities of a student will be monitored and learnt to provide alert to the respective tutor. Based on this alert sent by the automated system, the performance of a student could be improved effectively. Keyword: Machine Learning, Decision treeAbstract
Doctor’s Cloud
Prof. Chandrapal Chauhan, Roheet Kantode, Rajat Wanode, Pranay Dhopte, Gaurav Dhawane
DOI: 10.17148/IJARCCE.2019.8239
Abstract:
As we know, appointments with doctor’s is really a very big deal these days. Also keeping the track of all the appointments along with all the prescriptions, tests, reports is again a big issue. By moving towards the new technology, we are making a web portal, which will help to keep the track of all these records safely, in the Doctor’s Cloud. Doctors and patients both will have an open interface between them which will give the information regarding the patient and his/her disease. Clinical data describing the phenotypes and treatment of patients represents an underused data source that has much greater research potential than is currently realized. Mining of electronic health records has the potential for establishing new patient stratification principles and for revealing unknown disease correlations. Information technology has transformed the way health care is carried out and documented. Presently, the practice of health care generates, exchanges and stores huge amounts of patient-specific information. In addition to the traditional clinical narrative, databases in modern health centres automatically capture structured data relating to all aspects of care, including diagnosis, medication, laboratory test results and radiological imaging data.Keywords:
Cloud computing, Image compression, graphic file format, predictive codingAbstract
Bank Vault Security System
Ms Kumari S, Rathna Priyadarsini S, Reshma Chowdary M, Sahaana K, Vasantha @ Sindhuja S
DOI: 10.17148/IJARCCE.2019.8240
Abstract:
 It is an understatement if we say that bank vaults are insecure. We place our trust in banks to contain our savings, both monetary and commodity. We often skim through the news of bank robberies in daily newspapers. The first treasuries were established within temples to ensure that they were protected not only physically, but also morally by the overseeing deity. Bank strong rooms evolved to incorporate increasing levels of physical security. Safes became vaults, with more steel and concrete being used. Similarly, lock technology increased in sophistication and complexity from simple keys to code combination. And bank heists began to find success via brute force – drilling, explosives etc. The proposed project aims to overcome the shortcomings (as in security) of the current vault systems provided in private banks. Here we use advanced methodologies like RFID, Face and Iris recognition system in an approach to automate the accessing of bank vaults. In order to protect the vaults from robbery a proximity sensor is being used here. GSM technology is also used to alert the account holders, the bank officials and the police force incase of an emergency. We intend to automate the manual security mechanism present at the moment so as to improve security levels and strength of the mechanism. ÂKeywords:
Arduino uno, Biometric system, Servo motor, RelayAbstract
IOT Based Cotton Dust Monitoring System in Textile Industry
Z. Reshma, T. Sharmila, D. Tamizharasi, S. Keerthana, P. Brindha
DOI: 10.17148/IJARCCE.2019.8241
Abstract:
IOT based cotton dust monitoring system in textile industry is used to monitor the concentration of cotton dust in textile industry. The system uses Wi-Fi technology to transmit the collected data over a wide range. Optical dust sensor is used to measure the cotton dust level. DHT11 sensor is used to measure humidity and temperature level. The cotton dust, humidity and temperature level are monitored in the mobile application and also displayed in textile industry using LCD. If the concentration of cotton dust goes beyond the permissible limit (750 microgram), an indication is given in the textile industry using buzzer and also mail is sent to the Industry management. Keywords: Cotton dust concentration, Optical dust sensor, Arduino UNO, IOTAbstract
Data Analysis With Hadoop
Bhawna Makhija, Chhaya Amrute, Durga Nandan Mishra, Rashmi Tembhurne, Vijay V. Chakole
DOI: 10.17148/IJARCCE.2019.8242
Abstract:
We live in on-demand, on command digital universe with data prolife ring by institution, individuals and machines at a very high rate. This data is categories as “Big Data” due to its sheer volume, variety and velocity .Most of this data is unstructured , quasi structured or semi structured and it is heterogeneous inn nature . the volume and the heterogeneity of data with the speed it is generated , makes it difficult for the present computing infrastructure to manage Big Data. Traditional data management , warehousing and analysis system fall short of tools to analyze this data . Due to its specific nature of Big Data, it is stored in distributed file system architectures. Hadoop and HDFS by Apache is widely used for storing and managing Big Data. Analyzing Big Data is a challenging task as it involved large distributed file system.ÂKeywords:
Big Data, HDFS, Map Reduced, ClusterAbstract
Efficient Regular Language Search for Secure Cloud Storage
Karthikeyan B, Vishaal S, Ajithkumar P, Backia selvan K, Rupesh P
DOI: 10.17148/IJARCCE.2019.8243
Abstract: Cloud computing provides flexible data management and ever-present data access. However, the repository services provided by cloud server is not trusted by customers. The data’s provided by cloud server can be easily stolen by intruders. Searchable encryption could provide the functions of confidentiality protection and privacy-preserving data retrieval, which is an important tool for secure storage. In this paper, we propose an efficient large universe regular language search scheme for the cloud storage, which privacy is preserving and secure against the off-line keyword guessing attack (KGA). A notable highlight of the proposal over other existing schemes is that it supports the regular language encryption and deterministic finite automata (DFA) based data retrieval. The large universe construction ensures the extendibility of the system, in which the symbol set does not need to be predefined. Multiple users are supported in the system, and the user could generate a DFA token using his own private key without interacting with the key generation centre. Furthermore, the concrete scheme is efficient and formally proved secure in standard model. Extensive comparison and simulation show that this scheme has function and performance superior than other schemes.
Keywords: Cloud, Deterministic finite automata, Efficient Regular language, Secure
Abstract
“Automatic Driving Robot Simulation in MATLAB with Hardware”
Prof. Vivek Mahawadiwar, Shivani Dongre, Onkar Wanjari, Nidhi Tangselwar, Sourabh Tipramwar
DOI: 10.17148/IJARCCE.2019.8244
Abstract:
Obstacle avoidance is one of the most important phase of mobile robotics. Without it, robot movement would be very confining and breakable. This project proposes robotic vehicle that has an intelligence built in it such that it directs itself whenever an obstacle comes in its path. So to protect the robot from any physical harm. This can be design to build an obstacle avoidance robotic vehicle using ultrasonic sensors for its motion. A micro-controller (AT mega 328P) is used to achieve the desired operation. An ultrasonic sensor is used to determine any obstacle ahead of it and sends a command to the micro-controller. Depending on the input signal received, the micro-controller redirects the robot to move in an alternate direction by actuating the motors which are interfaced to it through a motor driver.Keywords:
ArduinoUno, Arduino software, Motor Driver (L293D), Motors, ultrasonic sensorAbstract
Survey on War Soldiers Health Care Monitoring System Using Machine Learning and IOT
Mr. Abhilash, Ms. Sathya Shree K P, Ms. Subiya Seher, Ms. Thanusha S
DOI: 10.17148/IJARCCE.2019.8245
Abstract:
The army soldiers play a vital role to secure the nation. There are many concerns regarding the safety of soldiers. The objective of this project is to develop a security device which gives an ability to track the location and monitor health of the soldiers in real time who become lost and get injured in the battle field. This system will enable army control unit to track the location and monitor health of soldiers using GPS module and wireless body area sensor networks. The data coming from sensors and GPS receiver will be transmitted to the fellow soldiers wherein they are directed so that they can help and rescue the injured one and get him/her to the nearest medical camp using the same GPS module system.Keywords:
Global Positioning System, Zigbee, Wireless Sensor NetworkAbstract
Design and Development of Smart Helmet
Dr.G RajivSureshKumar, A. Priyadharshini, B. Firoz
DOI: 10.17148/IJARCCE.2019.8246
Abstract:
Now a day, the number of two wheelers in India has drastically increased to a great extent. Due to which automobile users are undergoing numerous road accidents thereby causing death. The first and the foremost precaution to avoid Death is to protect our head, therefore we suggest this smart helmet using IOT. Even though people have helmet they are not using it properly. This system is a special idea which helps to promote the usage of helmet in order to make motorcycle driving safer than before. This system can help to know how safe the ride is or what can be made to make the ride safe. Using a force sensing device the helmet can be detected, with a gas detector consumption of alcohol can be known and many other components like SMTP, vibration detector and speed detectors are used.Keywords:
Force Sensing Device, Gas Detector, SMTP, Vibration Detector and Speed DetectorsAbstract
Classification of URL into Malicious or Benign using Machine Learning Approach
Deebanchakkarawarthi G, Parthan AS, Sachin Lal, Surya A
DOI: 10.17148/IJARCCE.2019.8247
Abstract: Now days everything is digitalized and it’s difficult to secure our data. Web security is a major issue because everything is connected through internet. The common way of launching an internet attack is by using malicious URLs. Hackers or Intruders leaks billions of confidential data every year by using malicious websites The traditional way of detecting these kinds of malicious URLs or websites is by the use of a web database called Blacklists. There are many URL shortening methods and Domain Generation Algorithms are available which make it difficult to detect the newly generated malicious URLs. To increase the efficiency and avoid database dependency we proposed the Machine learning approach to detect the malicious URLs. In machine learning approach there are so many algorithms available for the classification and feature extraction from that we select the best method that is Random forest which will gave us more accurate result than the past ones. So our proposed system will increase the efficiency and gave accurate prediction whether the URL entered is malicious or benign by using a well-defined dataset. It is also possible to implement the machine learning application in a proxy server or any network traffic controller system.
Keywords: Malicious URL; Random forest; Machine learning; Blacklist; Detection; prediction; URL; benign
Abstract
Online Voting Using Block Chain
R Tharani, J Jereena, Sreejith P K
DOI: 10.17148/IJARCCE.2019.8248
Abstract:
Digital casting a ballot is the utilization of electronic gadgets, for example, casting a ballot machines or a web program, to cast a ballot. Security of computerized casting a ballot is dependably the greatest concern when considering executing an advanced casting a ballot framework. One way the security issues can be possibly fathomed is through the innovation of block chains. Block chain innovation begins from the fundamental engineering structure of the digital money bitcoin. It is a type of conveyed database where records appear as exchanges, a square is a gathering of these exchanges.Keywords:
Block chain, Privacy, Security, AnonymityAbstract
Finding Shortest Distance Path and Object Detection and Avoidance Using Image Processing and Artificial Intelligence
Omkar A Darekar, Kartik R Kalal, Pratik Holkar, Milap R Disagar
DOI: 10.17148/IJARCCE.2019.8249
Abstract: In this work we will be implementing Shortest distance path finding algorithm and object detection voidance using Image Processing and artificial intelligence. The work will be focuses on generating shortest path using A star algorithm and object avoidance using Image Processing. Work will also represent insert static map with the help of images. Insertion of object will be testing with different shapes and sizes to represent on the graph.
Keywords: Image Processing, Open CV2, Artificial Intelligence, A-Star
Abstract
A Survey on Smart Capture
Vilas Rathod, Soham Kulkarni, Rutuja Paygude, Samruddhi More, Akash Bhosale
DOI: 10.17148/IJARCCE.2019.8250
Abstract: If we imagine shooting of movie the first picture comes in the mind with big trolleys loaded with a camera and a camera man with it. Rolling, Rotating, Capturing a perfect angle needs a huge space and a lot of hard work to shoot even a 5 minute seen. The Smart Capture is being introduced to get easier way.
Keywords: Smart Shooting, Raspberry Pi, Remote Access, Smart Control
Abstract
Reputation Based Dead Line Scheduling in Grid Computing Environment
R. Ananthi Lakshmi, R.RaviChandran
DOI: 10.17148/IJARCCE.2019.8251
Abstract:
Grid is a kind of distributed and parallel computing. Mainly it is used to solve complex problems such as weather forecasting, earth observation and financial modeling (etc). Hence we propose the reputation based deadline scheduling in grid, which is to be consider important factor for resource selection. In this paper, reputation based deadline scheduling is based on select for solving a complex task within particular schedule. Most existing reputation models used for reliability evaluation ignore the time influence. Based on Reputation Prioritized Based Deadline Scheduling Algorithm (PDSA) using average turnaround time. PDSA has shown optimal performance as compared to EDF and RR scheduling algorithm.Keywords:
Reputation, Deadline, Grid, ResourceAbstract
Communication and Distribution Management System in SCADA
Mrunmayee Kore, Mohini Chaube, Gaurang Singh, Shruti Nema
DOI: 10.17148/IJARCCE.2019.8252
Abstract: In this paper, various aspects of communication techniques in SCADA is discussed. The integration of the communication system along with the entire distribution network is very crucial for real-time, up to date information. This benefits the personnel to take quick action in case of fault occurrence. This paper also deals with how the Distribution Management System (DMS) improves reliability in the system and forms an important component of the entire distribution network.
Keywords: SCADA, DMS, MPLS, Communication System
Abstract
Smart Vehicle Insurance Verification System
T.Sivakumar, L.Kalicharan, R.S.Selvanithila, M.Surekha
DOI: 10.17148/IJARCCE.2019.8253
Abstract:
Vehicle Insurance is issued by the Road Transport Offices (RTOs) and the Vehicle Registration Certificate (RC) are used by the citizens to drive vehicles across the country. Vehicle Insurance is mandatory while driving. The driver should keep the vehicle insurance while driving. The major constraint is to carry the insurance paid certificate while driving otherwise the driver has to pay penalty for not having the insurance certificate as per the driving laws. In this paper, we propose a online security protocol to verify the insurance certificate and further to authenticate the vehicle’s insurance to the traffic police. Also, security services to the personal details present in the insurance certificate are provided during the transmission of data via the Internet. The proposed protocol is simple and easy to implement in real time.ÂKeywords:
Digital India, Vehicle Insurance, Online Insurance Verification, Security Protocol, Authentication ServiceAbstract
Detection of Firewall Fingerprinting and Vulnerability Prevention by Denial of Attacks on Web Application
Dilli Babu M, Balamani M, Mukesh G, Ajay Krishna S, Kasi Rajan B
DOI: 10.17148/IJARCCE.2019.8254
Abstract: Firewalls are most important and critical devices which provides securities against all vulnerabilities. Firewall handles all the traffic in and out of the network. We think firewall is secure but it’s not many vulnerabilities compromise the firewalls. Hackers / intruders exploit the firewall (host based) using malicious scripts and access the server / applications. In this project, we analyse firewall finger printing and denial of firewalling. We also analyze attacks namely path traversal, DOM XSS, file inclusion, CSRF which are bye passed beyond and we handle those attacks. Our proposed system provides efficient fingerprinting methods to prevent the attacks. Also, the proposed system provides security against application as well. If the firewall is been compromised, intruder can access the files in the application or server because application is made secure against most common web vulnerabilities. This security on application is achieved to prevent the above attacks. Thus, our proposed system of firewall fingerprinting methods can achieve quite high accuracy against all web vulnerability. Thus, all web applications can be made secure against web attacks.
Keywords: Firewall, Vulnerabilities, Fingerprinting, Secure
Abstract
Brain Tumour Detection and Classification using Fusion Technology on IOT
K. Malarvizhi, P.Ramya Devi, Akshay G Bhat
DOI: 10.17148/IJARCCE.2019.8255
Abstract: Automatic defects detection in MR images is very important in many diagnostic and therapeutic applications. Because of high quantity data in MR images and blurred boundaries, tumour segmentation and classification is very hard. This work has introduced one automatic brain tumour detection method to increase the accuracy and yield and decrease the diagnosis time. The goal is classifying the tissues to three classes of normal, begin and malignant. In MR images, the amount of data is too much for manual interpretation and analysis. During past few years, brain tumour segmentation in Magnetic Resonance Imaging (MRI) has become an emergent research area in the field of medical imaging system. In the proposed system accurate detection of size and location of brain tumour plays a vital role in the diagnosis of tumour. The diagnosis method consists of four stages, pre-processing of MR images, feature extraction, and classification. The features selection is based on Discrete Wavelet Transformation (DWT).and feature extraction based GLCM. In the last stage, Probabilistic Neural network is employed to classify the Normal and abnormal brain. After that normal image store on cloud and move towards on android application.
Keywords: Brain Tumour detection, MRI Scan, DVM, GLCM, PNN, Deep learning, cloud access, feature selection, feature selection
Abstract
Real Time Objects Recognition and Classification using Deep Learning Algorithm for Blind Peoples
K. Sivakumar, Devi K G, Nikhil P C
DOI: 10.17148/IJARCCE.2019.8256
Abstract: Object detection mainly deals with identification of real- world objects such as people, animals and objects of suspense or threatening objects. Object detection algorithms use a wide range of image processing applications for extracting the objects desired portion. It is commonly used in applications such as image retrieval, security, medical defense. In this project consider as the real time object Recognition & Classification using deep learning algorithms after that Classification objects output hear sound what categories of the object present in near we are find it. So the project will implement on PYTHON 2.7.15.
Keywords: Object Detection, Image Processing, Tracking, Deep Neural Network
Abstract
Web Application for Disaster Management
K. Jason, Jishnu V K, Remya G
DOI: 10.17148/IJARCCE.2019.8257
Abstract: The web application for disaster management can provide all the helpline and it is used for public welfare and efficient management of disaster. However the existing system have some such like less accuracy and less prediction. This paper present web application for disaster management for public welfare and efficient management easily. This application include all the detail about help lines and government bodies to be contact in the stage of emergency. Then we have to upload all the news. We have all the government data set and disaster dataset. All the dataset have to analyze then those information are sort it based on user needs. Then it uploaded to this web app. GPS and hazard mapping is used to identify the areas of concern and giving the exact location along with a future prediction. This web application is developed by using HTML, CSS, Bootstrap and Python. This papers main goal is to develop a web app for disaster management. This system is very useful for at the time of disaster.
Keywords: Disaster, Hazard Mapping ,Data Set, Help Lines
Abstract
Image Processing Based Plant Disease Detection and Automated Treatment
Mr. P. Senthil Kumar, V. Yoganivetha, R. Sindhuja Rakavi, S.Thilagavathi, N. Vigneshwaran
DOI: 10.17148/IJARCCE.2019.8258
Abstract: The protection of plants and crops in the farming fields is extremely important, because they form the basis for survival of humans every day. Such plants are often subject to various factors like viral, bacterial or fungal diseases that cause degradation and even the death of the plants, by gradually deteriorating them when they are healthy, thus decreasing the crop yield, and also makes them unfit for consumption by humans. In order to tackle this issue and lend a helping hand to the farmers, this paper introduces a system which will detect if a plant is affected by a disease or not, with a greater accuracy, by processing the captured appropriate plant images and spray the medicine automatically if it is found diseased. In addition to this, the system can also check if enough water is held for plants using water sensor, and pump water to the plants automatically, in the farming land. With this system, time can be saved to the maximum for farmers, since it promotes automation in farming. Also, this will be of help in a number of farming applications like in organic farming.
Keywords: Plant Leaf images, MATLAB, Arduino Uno, Image processing, Automation, Water sensor
