VOLUME 8, ISSUE 4, APRIL 2019
Infant Cradle Monitoring System using IoT
Nedheela N Nazar, Mohsina Mohamed Kabeer, Shasna M A, Navami Krishna U A, Nighila Ashok
Silent Ride (SIRI)
Adhithya P.P, Ayana P Dharman, Lishmi M.D, Sreejith P.S
Cloth Matching and Color Selection using Intelligent Robotic System
Sreema E.R, Jisna Davis, Jimna Rose, Dr. Vince Paul
Wireless Healthcare Monitoring System
R. Ravinder Naik, Banda Bhargav Ram, Gaddam Vinay Goud, Yamasani Suryateja
Traffic Control using Computer Vision
Greeshma C A, Nidhindas K R, Parvathi Kishore P, Sreejith P S
Passenger Service System
Minnuja Shelly, Abhiram P. S, Mohammed Aslam, Sreebal Anil
Flower Classification using MobileNet: An Optimized Deep Learning Model
Swati Kosankar, Dr. Vasima Khan
Animal Classification using Deep Learning Inception-v3 Model on Tensorflow
Chetana Khandale, Mayank Ramdev
Correlation and Linear Regression Analysis (CALRA): A Predictive Decision Support System for LEAE
Domingo V. Origines Jr, Dr. Meliza P. Alo
Comparing Machine Learning Techniques for Sentiment Analysis
Saransh Jitendra Sachdeva, Raj Abhishek, Dr. Annapurna V.K
IOT Based Saline Level Monitoring & Automatic Alert System
Ashika A. Dharmale, Revati R. Mehare, Ankita R. Bharti, Shweta R. Meshram, Prof. Swapnil V. Deshmukh
Blockchain Enabled E-Voting System
SriRaksha S Arun, Shibani, Spoorthi S, Vaishnovi R Kamath, Dr. C Vidya Raj
IRNSS Signal Acquisition and Tracking
Shreyas.R, S E Pramod, Rajat Gupta
Colluding Identity Clone Prediction using Machine Learning
Aashrith B Arun, Ajay Kumar D, Anilkumara D N, Mohammed M Rehan Ahmed, Ramesh G
RFID Based on Personnel / Equipment Tracking in Hospitals
Pavithra K M, Rupa S, Sabeena P, Sapna B Kulkarni
Dr. Kiosk
Mohammed Ajmal K.B, Mohammed Fayaz N.H, Pavin Krishna, Muneebah Mohyiddeen
Performance Analysis of Biometric Systems: A Security Perspective
Dr. Deepak Kumar Verma, Savita Ojha
Chatbot System
Prof. Gauri Rao, Muqsit Akbar, Shraddha Mall, Siddhant Mishra, Anish Kumar
Smart Agriculture Monitoring System Using IOT
Dr. Sanjay N. Patil, Madhuri B. Jadhav
A Review on Remote Monitoring System for Moving Patients
Pooja P.Nemade, Dr. G.A.Kulkarni
Gutter and Hump Detection
Archana madhusudhanan, Anupama A P, Sana Habeeb, Sneha George
MediSmart: Better Health with IOT Based Med Box
Vaibhavi G. Raut, Praparna Moharana, Tanya Patil, Shantanu Ghanekar, Prof. Swati A. Joshi
Multi-Purpose Fire Fighting Robotic Vehicle using Android
Mary Agnal P.A, Athira.A, Sanal Kumar T.S
Building a Serverless Progressive Web Application
Ajeeta Asthana, Akanksha Agrawal, Dr. Annapurna V.K
Wi-Fi Based Attendance Application using Hotspot
Pooja A. Waraikar, Shubham W. Borkar, Monika V. Kohale, Pranita S. Ingale, Prof. Miss S. G. Pundkar
Identify Available Parking Space Detection System using IOT
Sakshi S. Jain, Samiksha R. Jadhav, Dolly R. Sathawane, Rashmika S. Kamble, Prof. Rupali A. Meshram
A Consolidated and Comparative Analysis of Software Metrics Tools for Systems Performance Evaluation: A Survey
Er. Ashish Gupta, Dr. Rajat Kumar Mehta, Er. Mahendra Rai
Phishing Attack Prevention Using Visual Cryptography
Megha R.Chaudhari, Neha D.Chaudhari, Shubhangi S.Kanade, Sumedh G.Bhadre, Dhiraj D.Bhagat
Sentimental Analysis by Speech-Video Recognition using Machine Learning
Ms.Nikita Gavhane, Ms.Sayali Kolte, Ms. Smita Botre, Prof.Avinash Palave
IoT Based Home Security System
Anju P.S, Midhuna Subart, Nasiya Y Salim, Dr. Vince Paul
Issues and Challenges in Cloud Computing
Deepak Kumar Verma, Tanya Sharma
Security of the Digital Home Based on Recognizing the Face
Jyothi R, Lakshmisha S Krishna
Computerized Waste Segregation Robot
Saurabh Wasnik, Dushyantsingh Thakur, Prof. Swapnil V. Deshmukh
On the Construction of Radio Environment Map for Cognitive Radio Applications: An Overview
Bara’u Gafai Najashi
Energy Efficient WSN with Cluster Head Rotation Algorithm for Underground Mine Supervising Environment
Archana K R, Kingsley G
Automatic Railway Crack Detector System using LoRa Network
Haritha P, Sharnya V
Programmable Big Data Processing Framework to Reduce On-Chip Communications and Computations Towards Reducing Energy of the Processing
Anusha Medavaka
Secured Crypto-Stegano Communication
Pashang Engineer, Priyanka A. Bansode, Shreya Vitthalrao Surnar, Prathmesh N. Gunjgur
Data Analytics: Car Sales in a Calendar Year
Vishesh S, Pavan Kumar C K
RFID Base Path Tracking of Industrial Mobile Robots Localization for Indoor Environment
Jesika R, Saravanan K
Mechanism for Prescribing Drug in Hospitals and its Substitute Availability in Nearby Hospitals of Area / City
Devki A. Balwani, Chandani C. Barsagade, Harsh D. Khandelwal, Vicky P. Patmase, Prof. Roshan R. Karwa
Semantic Texton Forests for Image Categorization and Segmentation
Miss Nilophar Mullani, Prof. Arati Dandavate
Using Twitter for Branding : Hotel Strategies in Kenya
Patrick Owoche, Samuel Mbugua, Anselemo Ikoha
Fault Tolerance in Wireless Sensor Network
Samuel Devakumar P.V, Mr.N.Ilayaraja
Smart Security System for Vehicles
Dr. Pramod Sharma, Akash Shrivastav, Vivek Parashar, Okesh Kumar, RamNaresh
A Hybrid Approach to Enhance Load Balancing in a Heterogeneous Cloud Environment
Boukari Souley, Abdullahi Nafisatu Aliyu
Skin disease detection using Image Processing and Machine Learning
Miss. Mukta Kamble, Miss. Neha Kandalkar, Miss. Gauri Khandagale, Miss. Tejaswini Agunde, Prof.S.R. Hiray
Mobile Application for Detecting Vehicle Accident and Tracking System using GPS/GSM
Mr. Shubham Ingle, Miss. Ankita Shendkar, Mr. Sanjay Chavan, Prof. Avinash Palave
Intrusion Detection using Machine Learning and log analysis
Miss. Manali Raka, Miss. Shrushti Shah, Miss. Sayali Gunale, Miss. Renuka Tanksale, Prof. Mr U.K.Raut
Image Compression with Contourlet Transformer and Quantitative Evaluation by using WVT
Miss. Sneha Shukla, Prof. Nilesh Bodne, Prof. Pranjali Dahikar
Prediction Model for Detection of Chronic Kidney Disease: Logistic Regression
Vishesh S, Pavan Kumar C K, Varnitha N
Cryptography Technique for Information Security
Priyanka S. Pandhare, Pallavi S. Raut, Shital S. Patil, Pranjali T. Pawar
Personal Tour Planner
Mr. Abhishek Tapadia, Mr. Kunal Agarwal, Mr. Brijesh Sonawane, Mr. Shubham Akurdekar, Prof. Mrs. Suchita Wankhade
E - Attendance System Using Opencv and CNN
Mr. Omkar Sawant, Mr.Yash Jain, Mr. Anand Kulkarni, Mr. Shubham Salunkhe, Prof. Mrs Shantiguru
Ensemble of Segmentation Methods for Detecting Breast Cancer
Shashank A R, M.Veena
Overview: Wavelet Transform Along With SPIHT Algorithm for Image Compression
Navesh Sallawar, Prof.Nilesh Bodne
Blockchain Technology in Electronic Health Record System
Malavika M.B, Richa Kumari, Nihara S.M
Identifying Ransomware - Specific Properties using Static Analysis of Executables
Deepti Vidyarthi, CRS Kumar, Subrata Rakshit, Shailesh Chansarkar
Abstract
Infant Cradle Monitoring System using IoT
Nedheela N Nazar, Mohsina Mohamed Kabeer, Shasna M A, Navami Krishna U A, Nighila Ashok
DOI: 10.17148/IJARCCE.2019.8402
Abstract: During the early stages, infants need proper rest and sleep for growth and development. Hence, it is the responsibility of the parents/guardian to provide the necessary care and attention to the infant. But with the modern lifestyle, parents are busy and have a lot of work with little time to provide for their little ones. In today’s world we see that most of the families consist of mainly the parents and children. When a baby is born in a family there has to be someone to look after the baby. Some parents have to do a double task of keeping a check on the baby as well as do the household work. Keeping a nanny could be an option but not all can afford nannies and also it is always difficult for parents to rely on some strangers to look after their baby. So to help such parents we have decided to come up with a smart cradle which will help a mother or a father have a track of their child and do some household work simultaneously. When the baby cries the cradle will start swinging with the help of DC motor. The temperature and wetness sensor detects the temperature and wetness of the baby and if it increases a particular level, message will be send to the parents. The mic in the system detect, if the baby cries and a song will play through the speaker set up in the APR, also message is send to the parents using smart phones with the help of blynk server. Feeding time is also preset according to baby’s growth and is notified to the parent.
Keywords: APR, Blynk server, DC motor
Abstract
Silent Ride (SIRI)
Adhithya P.P, Ayana P Dharman, Lishmi M.D, Sreejith P.S
DOI: 10.17148/IJARCCE.2019.8403
Abstract
Cloth Matching and Color Selection using Intelligent Robotic System
Sreema E.R, Jisna Davis, Jimna Rose, Dr. Vince Paul
DOI: 10.17148/IJARCCE.2019.8404
Abstract: The system proposing is to use it in the textile area. The system incorporates with following technology, consisting of image processing and robotic arm. The technology is meant for pick up the matching cloth this will help the people to select the apparel based on color. The robot automatically recognizes cloths color proposed. The backbone technology is image processing and working under the principle of openCV. Recognized color is matched by intelligent system based on the decision. The system will pick the specific cloth based on recognized color by using robotic technology. By using this technology it reduce the error rate and increase the accuracy.
Keywords: Colour recognition, intelligent system, pick and place arm, Image processing, Robotic Technology
Abstract
Wireless Healthcare Monitoring System
R. Ravinder Naik, Banda Bhargav Ram, Gaddam Vinay Goud, Yamasani Suryateja
DOI: 10.17148/IJARCCE.2019.8405
Abstract:
Wireless health care monitoring system deals with a doctor and multiple patients ,in which a doctor monitor patient’s heart rate, body temperature, Respiration rate and body movements of patient using Microcontroller through a LCD screen. These information passing to the monitoring section using wifi module network and update the patient information to the server. After that connecting Internet to the arduino nano board it act as a server. Then the server automatically sends the data to the web server .Then these parameters are monitor using webpage anywhere in the world using smart phone etc. If these parameters are goes to abnormal, it alerts the doctor take immediate action The Microcontroller is programmed using Embedded C language. This system works well both at day and night (dark light) timing. By this way we can take the prevention steps before occurrence of the major incidence and we can avoid the human losses.Keywords:
Feasibility Study, ESP8266(Wifi Module), LM35(Temperature Sensor), Heartbeat SensorAbstract
Traffic Control using Computer Vision
Greeshma C A, Nidhindas K R, Parvathi Kishore P, Sreejith P S
DOI: 10.17148/IJARCCE.2019.8406
Abstract: Now a days traffic density on the streets increasing around the world tremendously . It causes several problems on the day to day life of people. As we know that it is the era of speed, so that nobody wants to wait for a long time at any cost. Everybody prefers to low traffic density streets. This proposed system introduced a vehicle density-based traffic control system to avoid above issues. This problem can be resolved by controlling the traffic density on the roads. This system introduces a new method to control vehicle density by controlling the traffic lights using Image processing. Vehicle density is measured using predefined classifiers available in image processing. If the measured density is above the normal density (threshold value) it passes an indication to the microcontroller which controls the projector and thereby we can give appropriate traffic signal to display.
Keywords: Computer vision, Traffic density, Arduino uno, Open CV
Abstract
Passenger Service System
Minnuja Shelly, Abhiram P. S, Mohammed Aslam, Sreebal Anil
DOI: 10.17148/IJARCCE.2019.8407
Abstract:
Increased competition in the commercial transportation industry has made service quality of every transportation agencies as one of the key competitive measures to attract passengers against their rivals. in- flight services ,particularly food delivery and waste collections, have a notable impact on perception of the overall airline’s service quality because they are directly and in directly provided to passengers during flight. This is the scenario in every industry. This project consists of two sections, passenger section, they can request their needs by pressing a button in the keypad and it send to the control room section and it is displayed on an LCD control room section.: The requested needs may be food, water and if it is “any other help” the airhostess directly goes to the requested personKeywords:
Embedded System, Microcontroller, Data ModemAbstract
Flower Classification using MobileNet: An Optimized Deep Learning Model
Swati Kosankar, Dr. Vasima Khan
DOI: 10.17148/IJARCCE.2019.8408
Abstract: Classification of objects into their specific classes is always been significant tasks of machine learning. As the study of flower, categorizing specific class of flower is important subject in the field of Botany but the similarity between the diverse species of flowers, texture and color of flowers, and the dissimilarities amongst the same species of flowers, there still are some challenges in the recognition of flower images. Existing recent Google’s inception-v3 model comparatively takes more time and space for classification with high accuracy. In this paper, we have shown experimental performance of MobileNets model on TensorFlow platform to retrain the flower category datasets, which can greatly minimize the time and space for flower classification compromising the accuracy slightly.
Keywords: Classification, Inception-v3, MobileNets, TensorFlow
Abstract
Animal Classification using Deep Learning Inception-v3 Model on Tensorflow
Chetana Khandale, Mayank Ramdev
DOI: 10.17148/IJARCCE.2019.8409
Abstract:
Identification of similar types of objects in image processing now become regular task, but when dissimilar objects come into picture it becomes quite complex. Even it become more complicated when not just we need to identify objects but also categorizes them into their specific classes. We are using machine learning technique to classify the animal and put them into specified classes. Inception-v3 is the open source algorithm made by Google and used for objects classification. In this paper, based on Inception-v3 model in TensorFlow platform, we use the transfer learning technology to retrain the animal category datasets, which can greatly improve the accuracy of animal classification.Keywords:
Classification, Inception-v3, image processing, TensorFlowAbstract
Correlation and Linear Regression Analysis (CALRA): A Predictive Decision Support System for LEAE
Domingo V. Origines Jr, Dr. Meliza P. Alo
DOI: 10.17148/IJARCCE.2019.8401
Abstract:
This study introduce a Decision Support System called Correlation and Linear Regression Analysis –Decision Support System (CALRA-DSS) System. The CALRA-DSS will use Data mining technique in the process of discovering knowledge which in turn can be used to predict future results. CALRA-DSS predicts Students chances whether passed or Failed in the LEAE Licensure Examination. The integration of Data Mining Technique using Pearson-Product Moment Correlation that is used to determine the degree to which two variables are related and Regression Analysis that is used to examine the relationship between and one dependent and one independent variable. The data to be tested by this CALRA-DSS were the April 2016 Agricultural Engineering graduates of ICET, SPAMAST- Digos Campus who participated in the LEAE Mock Board Examination last and took the August 2016 LEAE. The academic records of these graduates were taken from the SPAMAST Electronic Students Information System (eSMS) Digos Campus while the Mock Board data Result was taken from the SPAMAST LEAE Reviewer Committee. It is concluded that with the use of this tool, the ICET Department can implement an intervention program timely before Student would intend to take the LEAE. Based on the Outcome, the results obtained from the Correlation and Regression Analysis and the attributes obtained from eSMS, the identified Academic Predictors has a strong correlation to Mock Board Examination. In general outcome of the study can give a hint to the Students as to which subjects can be considered as predictor variables for their licensure exam scores and hence become their focus of study/review while still studying. Keywords: Correlation, Data Mining, Regression, LEAE, Academic Performance, Prediction.Abstract
Comparing Machine Learning Techniques for Sentiment Analysis
Saransh Jitendra Sachdeva, Raj Abhishek, Dr. Annapurna V.K
DOI: 10.17148/IJARCCE.2019.8410
Abstract: Sentiment Analysis uses Natural Language Processing (NLP) and text analysis to systematically identify and extract subjective opinion of a document. There are several ways to evaluate the polarity of document. This paper gives insights on various machine classifiers used. Each Classifiers are evaluated separately using predefined metrics to find the best classifier for correctly determining the polarity of document.
Keywords: Sentiment Analysis, Polarity, Machine Learning Classifiers, confusion matrix, K-fold cross validation
Abstract
IOT Based Saline Level Monitoring & Automatic Alert System
Ashika A. Dharmale, Revati R. Mehare, Ankita R. Bharti, Shweta R. Meshram, Prof. Swapnil V. Deshmukh
DOI: 10.17148/IJARCCE.2019.8411
Abstract: As the world population is increasing, the need of health prevention is also increasing day by day. Hence, it is mandatory for everyone in this world to take care of their health properly. In these recent years, there is a rapid progress in medical care due to the technological advancements in the various fields of sensors, micro-controllers, and computers for assuring fast recovery of patients in the hospitals. The major and fundamental requirement of the hospitalized patients is that every patient should be provided with a better treatment and observation and should be supplied the correct amount of vital nutrition at the correct time. Among the various treatments, the saline therapy is the most important treatment that many patients receive from the hospitals. The bottle of saline is fed to the patients to treat dehydration and thus improve their health. In the hospitals, whenever a saline is fed to the patients, the patient needs to be continuously administered by a nurse or a care-taker. But unfortunately, there are some critical situations, i.e., patient's blood re-flexing back into the saline tubing system due to the negligence towards the saline completion and busy schedules of the responsible doctors, nurses, or the care-takers, so a huge number of patients are dying or are being harmed in the hospitals. Hence to prevent the patient from getting harmed and to protect their lives during saline feeding hours, the saline level monitoring and automatic alert system has been developed. The proposed system facilitates a sophisticated method of controlling saline drop rate by monitoring the saline system remotely by using Internet Of Things platform. The proposed system consists of a sensor used for monitoring the critical level of the saline liquid in the saline bottle and a mechanism that will stop the saline flow automatically after the saline bottle is completely empty. This proposed system can be utilized efficiently in homes as well as hospitals. Keywords: Intravenous, Internet of Things, Node MCU
Abstract
Blockchain Enabled E-Voting System
SriRaksha S Arun, Shibani, Spoorthi S, Vaishnovi R Kamath, Dr. C Vidya Raj
DOI: 10.17148/IJARCCE.2019.8412
Abstract:
The Blockchain-Enabled E-Voting uses a digital-currency analogy where in eligible voters can cast a ballot anonymously using a computing environment. BEV employs an encrypted key, smart biometrics and tamperproof real-time personal ID verification. Blockchain enable the creation of tamper-proof audit trails for voting. The idea of adapting digital voting systems to make the public electoral process cheaper, faster and easier, is a compelling one in modern society which normalizes it in the eyes of the voters, removes a certain power barrier between the voter and the elected candidate, thus making it an effective way for casting vote in this generation of technology.Keywords:
Blockchain, E-Voting System, Ether, Ethereum, Paillier Encryption, Smart ContractAbstract
IRNSS Signal Acquisition and Tracking
Shreyas.R, S E Pramod, Rajat Gupta
DOI: 10.17148/IJARCCE.2019.8413
Abstract: IRNSS is an independent regional navigation satellite system being developed by India. It is designed to provide accurate position information service to users in India as well as the region extending up to 1500 km from its boundary, which is its primary service area. An Extended Service Area lies between primary service area and area by the rectangle from Latitude 30 degree south to 50 degree north, Longitude 30 degree east to 130 degree east. This paper is focused primarily on developing a software based receiver for the signals transmitted from IRNSS satellites. Tracking and positioning of IRNSS device is primarily preceded by acquisition stage which involves serial search and autocorrelation methods.
Keywords: IRNSS, PRN, C/A, BPSK, NCO
Abstract
Colluding Identity Clone Prediction using Machine Learning
Aashrith B Arun, Ajay Kumar D, Anilkumara D N, Mohammed M Rehan Ahmed, Ramesh G
DOI: 10.17148/IJARCCE.2019.8414
Abstract: As Online Social Networks such as Facebook, Linkedln and Twitter are increasing becoming a part and parcel of one's daily lives, personal information is at stake. Easy access to personal information has made the attackers to steal information from influential users using various forms of attacks. Attackers take advantage of the user’s trustworthiness when using Online Social Networks. Hence, there is a need for the third party applications of various Online Social Networks sites to provide defence mechanisms against adversaries. Colluding attack is a way of creating fake profiles of friends of the target in the same OSN or others. Colluders impersonate their victims and send friend requests to the target with an intention to infiltrate their private circle to steal information. These types of attacks are difficult to detect in because multiple malicious users may have a similar purpose to gain information from their targeted user. In this regard, the work intends to overcome this type of attack by addressing the problem of identity clones across multiple Online Social Networks using machine learning.
Keywords: Identity Clone Attack, Machine Learning, Predictive FP growth, Online Social Networks
Abstract
RFID Based on Personnel / Equipment Tracking in Hospitals
Pavithra K M, Rupa S, Sabeena P, Sapna B Kulkarni
DOI: 10.17148/IJARCCE.2019.8415
Abstract
Dr. Kiosk
Mohammed Ajmal K.B, Mohammed Fayaz N.H, Pavin Krishna, Muneebah Mohyiddeen
DOI: 10.17148/IJARCCE.2019.8416
Abstract: The long queue in hospital often causes delaying in availability of services, Delayed diagnosis and other diagnostic errors are more common, costly and harmful than any other patient safety threat overall are the 6th leading cause of death in the United States(Report by NCBI),The DR.KIOSK is virtual Doctor Kiosk where a person could get diagnosed with virtual presence of a Doctor with AI assistance , which means same quality treatment available in hospital will be available inside a cubicle that too without having a physical presence of your doctor with intelligent system for reducing diagnosing errors , DR KIOSK is similar to Auto Teller Machine where you can meet your Doctor Online through this kiosk which has equipment equivalent to stethoscope etc ,this diagnostic reports is sent to Doctor and his prescription is Broadcast to group of nearby pharmacist literally patient doesn't need to bother about long queues both in pharmacy and Clinic
Keywords: Internet of things; Global system for mobile communication; PIR sensor; Raspberry Pi 3 model B
Abstract
Performance Analysis of Biometric Systems: A Security Perspective
Dr. Deepak Kumar Verma, Savita Ojha
DOI: 10.17148/IJARCCE.2019.8417
Abstract: In the modern era of digitization Security has become a critical and challenging issue not only for the defence or government departments but also for a common man because today we are very much dependent on machines that authenticate the person by some identity to allow for use of them. Biometric Systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics, like a fingerprint or face pattern, or some aspects of behaviour, like handwriting or keystroke patterns. In this paper we have studied the physiological and behavioural characteristics of biometric systems by means of performance analysis in context with security perspective.
Keywords: Biometric, Security, Authentication, Digitization
Abstract
Chatbot System
Prof. Gauri Rao, Muqsit Akbar, Shraddha Mall, Siddhant Mishra, Anish Kumar
DOI: 10.17148/IJARCCE.2019.8418
Abstract: For a student interface web applications can come in a different of formats, ranging from command-line, graphical, web application, and even voice. While the most popular user interface include graphical and web-based applications, occasionally the need arises for an alternative interface. Whether due to multi-threaded complexity, concurrent connectivity, or details surrounding execution of the service, a chat bot based interface may suit the need. Chat bots provide a text-based user interface, allowing the user to type commands and receive text as well as text to speech response. Web application using Chat bots are usually a form full services, remembering previous in order to provide functionality. When chat bot technology is integrated with popular web services it can be utilized securely by an even larger audience.
Keywords: Chatbot, Machine Learning, Artificial Intelligence
Abstract
Smart Agriculture Monitoring System Using IOT
Dr. Sanjay N. Patil, Madhuri B. Jadhav
DOI: 10.17148/IJARCCE.2019.8419
Abstract: Agriculture is basic source of livelihood People in India. It plays major role in economy of country. But now days due to migration of people from rural to urban there is hindrance in agriculture. Monitoring the environmental factor is not the complete solution to increase the yield of crops. There are no of factors that decrease the productivity to a great extent. Hence Automation must be implemented in agriculture to overcome these problems. An automatic irrigation system thereby saving time, money and power of farmer. The Traditional Farm land irrigation techniques require manual intervention. With the automated technology of irrigation the human intervention can be minimized. Continuous sensing an monitoring of crops by convergence of sensors with Internet of things (IOT) and making farmers to aware about crops growth, harvest time periodically and in turn making high productivity of crops and also ensuring correct delivery of products to end, consumers at right place and right time. So to overcome this problem we go for smart agriculture technique using IOT. This Project includes sensors such as temperature, humidity, soil moisture and rain detector for collection the field data and processed. These sensors are combined with well established web technology in the form of wireless sensor network to remotely control and monitor data from the sensors.
Keywords: Arduino Uno, ESP8266 (Wi-Fi module), Automation of Irrigation System, Sensors.
Abstract
A Review on Remote Monitoring System for Moving Patients
Pooja P.Nemade, Dr. G.A.Kulkarni
DOI: 10.17148/IJARCCE.2019.8420
Abstract: Timely monitoring and quick diagnosis of ECG rhythm can save many lives. Wearable health monitoring technology is an emerging technology for frequently recording the physical parameters of the patient. This signal is widely adopted to access and diagnose major as well as minor cardiac diseases and health risks. In many fields, to make the user’s life more comfortable Internet of Things (IOT) devices are also used. Smart sensors devices are used to collect heartbeat which is used to monitor the condition of the patient. Communicating the information to the doctor and giving the exact diagnosis to the patient through the IOT is a challenging task. This paper gives a comparative study on health monitoring and detection of the patient. ECG monitoring system in the form of mobile, wireless and remote technologies are reviewed in this paper. Further objective of this paper is to identify the research gaps in existing systems and finalise the research statement for further work.
Keywords: Wireless ECG monitoring system, Wearable monitoring system, we-health care, tele-health care, android health monitoring system, expert ECG systems.
Abstract
Gutter and Hump Detection
Archana madhusudhanan, Anupama A P, Sana Habeeb, Sneha George
DOI: 10.17148/IJARCCE.2019.8421
Abstract: One of the major problems in the developing country is safety while driving through the roads. The roads should be well maintained to improve the economy of the country. Identification of distress such as potholes and humps not helps the drivers to avoid accidents or damages for the vehicle but also help to maintain roads. Our project mainly discuss about the economical solution to identify pothole and hump and give a timely alert for the drivers to avoid accidents and damages for the vehicles.
Keywords: Embedded system, raspberry pi, GPS, sensor ultrasonic sensor
Abstract
MediSmart: Better Health with IOT Based Med Box
Vaibhavi G. Raut, Praparna Moharana, Tanya Patil, Shantanu Ghanekar, Prof. Swati A. Joshi
DOI: 10.17148/IJARCCE.2019.8422
Abstract:
Multiple surveys indicate that about 65% of Adults are elderly people and are suffering from chronic diseases like diabetes, cholesterol, arthritis, osteoporosis, dementia, blindness, Alzheimer and so on. Also, the youngsters have fallen prey to the busy and hectic lifestyle. This busy lifestyle has made them forget to take their medicines on time, which is essential for their healthy recovery from their diseases. MediSmart proposes a solution to this distress. It is a smart, IOT based medicine or pillbox that reminds its patient to take their medicines on time with some additional features.Keywords:
Healthcare; Medicine box; Arduino; Wi-Fi; Alert System (or medicine reminder); Android App; SOS buttonAbstract
Multi-Purpose Fire Fighting Robotic Vehicle using Android
Mary Agnal P.A, Athira.A, Sanal Kumar T.S
DOI: 10.17148/IJARCCE.2019.8423
Abstract
Building a Serverless Progressive Web Application
Ajeeta Asthana, Akanksha Agrawal, Dr. Annapurna V.K
DOI: 10.17148/IJARCCE.2019.8424
Abstract:
Progressive web apps have the ability to incorporate the accessibility of the web with the features of the native apps. They provide cross-browser support and compatibility with mobile friendly frameworks. Serverless computing platform provide function as a service to end users while promising reduced high costs, high availability, fault tolerance, and dynamic elasticity for hosting micro services. It provides a platform for developers to execute the code in response to events without building and maintaining infrastructure. The third party apps or services would manage the server-side logic and state.Keywords:
Serverless Computing Architecture, Progressive Web Applications (PWAs), Native web apps, Amazon Web Services, Function as a Service (FAAS)Abstract
Wi-Fi Based Attendance Application using Hotspot
Pooja A. Waraikar, Shubham W. Borkar, Monika V. Kohale, Pranita S. Ingale, Prof. Miss S. G. Pundkar
DOI: 10.17148/IJARCCE.2019.8425
Abstract: The attendance tracking using traditional approach is really a cumbersome process. The individual has to maintain the attendance record in registers and files using pen and paper. The problem with this approach is that it requires lots of paper which are the part of our non-renewable natural resources. We are in the age, where we have to think about sustainable development. Managing the attendance using mobile phones, provide an alternative way in this direction. The project emphasize on the development of a standalone system that can track the attendance of the students with the help of Wi-Fi. Communication between teachers and the parent is also an important issue that should also be considered, because parent can only get the information about their ward after the interaction with teachers. So, we also tried to bring the system which enables parent to receive the information of their ward of regularity on daily basis.
Keywords: Wi-Fi, Hotspot, Attendance, Android Application
Abstract
Identify Available Parking Space Detection System using IOT
Sakshi S. Jain, Samiksha R. Jadhav, Dolly R. Sathawane, Rashmika S. Kamble, Prof. Rupali A. Meshram
DOI: 10.17148/IJARCCE.2019.8426
Abstract: In college the parking slots are available but sometimes it’s very complicated to find out the empty parking space and there is not any such functionality available for checking the parking slot is available. In institutes there is the separate parking available for faculties and students whenever we would like to search parking slot we have to reach there to find out the available slots. Then it is very less time consuming process to reach till empty or vacant slots. Now a day’s almost all people use the smart phone so if we connect the parking slot to the smart phone then it is very useful for the upcoming vehicle to search for the empty parking slot and park the car over there. The user can also reserve the space for the parking slots via smart phone. Through this user can reserve parking space for given location online in advance .Then user can place the vehicle in the parking slot with minimal fees. After study about some current systems and it shows that the current systems are not totally automated and require a certain level of human interference and communication with the system. The difference between our system and existing systems is that we intend to make our system as less human independent by automating whole parking area.
Keywords: Smart phone, Internet of Things (IoT), IR sensor, Raspberry Pi
Abstract
A Consolidated and Comparative Analysis of Software Metrics Tools for Systems Performance Evaluation: A Survey
Er. Ashish Gupta, Dr. Rajat Kumar Mehta, Er. Mahendra Rai
DOI: 10.17148/IJARCCE.2019.8427
Abstract:
Software metrics refers to a broad range of measurements for computer software. Software metric is a mathematical definition mapping the entities of a software system to numeric measurement values. Measure the software and the software development processes both are very important for organization. As we know when we are calculate software metrics by different-different tools the result will differ due to metrics tools use different methodology. The results are thus tools dependent and are in question for validations. Here an attempt is made to integrate eight different object oriented free metric tools. A study has been done to measure the metrics values using the same set of standard metrics for a software projects. The results have been discussed before and showed the variations in results from different tools for same metrics. Measurements show that, for the same software system and metrics, the metrics values are tools dependent. In this study we have considered comparison of CCCC, CKJM, Dependency Finder, Semmle, VizAnalyzer, JHawk Tool, Analyst 4j and OOMeter Tools.Keywords:
Software Metrics, Software Metric Tools, Measurement, Verification, Maintainability, Coupling and Object OrientedAbstract
Phishing Attack Prevention Using Visual Cryptography
Megha R.Chaudhari, Neha D.Chaudhari, Shubhangi S.Kanade, Sumedh G.Bhadre, Dhiraj D.Bhagat
DOI: 10.17148/IJARCCE.2019.8428
Abstract: Now days each and every single application which uses security includes authentication process having username and password. Phishing is an effort by an personality or a group to burgle personal con denial in turn such as passwords, credit card information etc from unsuspecting victims for identity theft, monetary gain and other fraudulent activities. Proposed a new approach "Phishing Attack Prevention Using Visual Cryptography" to solve the problem of phishing. Here, an image based conformation, by means of Visual Cryptography (VC) is worn. According to this approach, user registration contains the captcha image as password and the image is splits into two parts using K-N sharing algorithm. For the purpose of user authentication user is sent one share (part of image) and other part of image is on server side. We need to secure Website Authentication process. Here is many approaches present there for cryptographic mechanism but not for website authentication. Though our system has proposed an approach provides authentication of website by using OTP on e-mail id. If OTP is matched then only the login successfully.
Keywords: Phishing attack, image captcha, visual cryptography, OTP
Abstract
Sentimental Analysis by Speech-Video Recognition using Machine Learning
Ms.Nikita Gavhane, Ms.Sayali Kolte, Ms. Smita Botre, Prof.Avinash Palave
DOI: 10.17148/IJARCCE.2019.8429
Abstract: Presently large amount of data is available on social networking sites, product review sites, blogs, forums etc. This data holds expressed opinions and sentiments. The volume, variety, velocity are properties of data, whether it comes from the Internet or an enterprise resource planning system, sentiment analysis system should get the data and analyze it. Due to the large volume of opinion rich web resources such as discussion forum, review sites, blogs and news corpora available in digital form, much of the current research is focusing on the area of sentiment analysis and opinion mining. Expression of any sentiment is a mixture of text, prosody, facial expression, body posture etc. Thus only text input cannot fully represent a sentiment. A multimodal system uses a combination of input modes e.g. text and audio or text and video or all of these three. This paper analyses the techniques used for sentiment data and also demonstrate that how individual model works. Extracting the sentiments from different input modes is achieved by different classifying techniques. The proposed method first digitizes the signal to extract the required properties. According to emotional Prosody studies, the tone of every person’s voice can be characterized by its pitch, loudness or intensity, timbre, speech rate and pauses, whose changes convey different information from the speaker to the listener
Keywords: Sentiments, Emotion, Video, Audio
Abstract
IoT Based Home Security System
Anju P.S, Midhuna Subart, Nasiya Y Salim, Dr. Vince Paul
DOI: 10.17148/IJARCCE.2019.8430
Abstract: In today’s rapidly moving world where almost everything is driven by technology, it has become the central and essential part of living. Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the internet. With increasing rate of crime, protecting our loved ones and our belongings has become important. Such situations can be solved by exploiting the latest functionalities that current technology has to offer i.e. IOT which provides seamless data communication; remote control ability makes it easier to automate the process of security. Automation of security can be achieved by designing an application on Raspberry Pi and ATmega 328 microcontroller through various sensors such as motion sensor -PIR (Passive Infrared) sensors for detection of any intruder in the house, upon detection an alarm is raised and the owner of the house and notification messages are provided. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This project presents the overall design of Home Automation System (HAS) with low cost and wireless system. The smart home concept in the system improves the standard living at home. Whenever a person come in front of the house the PIR motion detector sensor detect the person and a message will send to the house owner and he can see the person through the camera in front of the house. The camera is accessed to the web page and also the light, fan, door lock, alarm can be controlled with the web page. The system intended to control electrical appliances and devices in house with relatively low cost design, user-friendly interface and ease of installation. According to the priority of the person the owner can control the electrical appliances. Those who get the authentication can unlock the door by entering password on the keypad and use the home appliances depending on the priority set by the owner.
Keywords: Internet of things; Global system for mobile communication; PIR sensor; Raspberry Pi 3 model B, ATmega 328 microcontroller.
Abstract
Issues and Challenges in Cloud Computing
Deepak Kumar Verma, Tanya Sharma
DOI: 10.17148/IJARCCE.2019.8431
Abstract: Cloud computing is a model that helps to speed up and increase the flexibility of data management with reduced cost. It is undeniable that cloud computing has brings us lots of benefits and becoming more popular nowadays. Many large companies start using cloud service in their business. While the cloud computing is widely used, the security becomes a concern to everyone who use cloud services. There is a lot of security arises continuously while there are improvement as well on the security model of the cloud service provided. Despite the increasing use of the cloud service, the user should use the cloud service provided wisely in a way that always ensure good security practices so that this technology have the potential to bring the information technology to the next level. In this paper we have provided the foundation in regards to major issues and challenges in cloud computing and we have also proposed a data recovery technique in cloud computing.
Keywords: Cloud Computing, Issues and Challenges, Security, Cloud Models
Abstract
Security of the Digital Home Based on Recognizing the Face
Jyothi R, Lakshmisha S Krishna
DOI: 10.17148/IJARCCE.2019.8432
Abstract:
In modern daily life, Smart security system has become absolutely necessary. To prevent robbery in sensitive areas such as home, banking sector etc. with low consumption of power and reliable security device this system has been proposed. By recognizing the face, it will allow only authorized people to enter the premises. The viola jones method is used to detect the face of the person by using the ‘OpenCV’ technique and RANSAC (RANdom SAmple Consensus) is used for face recognition. By matching with the database image the door opens for the known person automatically. For the strange person, the image will sent to owner’s android application through Google Cloud Messaging. Based on his command, the door will be opened or closed. This security system is developed by using Atmega 328P electronic development board operated on battery power supply, wireless internet connectivity by using laptop and data base .This proposed system is more reliable and more effective. Compared to the other systems, this system will consumes very low data and power.Keywords:
Face Recognition, Arduino IDE,Data base, Bluetooth module, LCD, Android phone, RelaysAbstract
Computerized Waste Segregation Robot
Saurabh Wasnik, Dushyantsingh Thakur, Prof. Swapnil V. Deshmukh
DOI: 10.17148/IJARCCE.2019.8433
Abstract: The major dilemmas faced due to improper waste management include health risks to humankind and environmental concerns. We in India generates over 150,000 tonnes of municipal solid waste per day, with Mumbai being the world’s fifth most wasteful city. Yet, only 83% of the waste is collected and less than 30% is treated. According to the World Bank, India’s daily waste generation will reach 377,000 tonnes by 2025. Now blame urbanization and industrialization, but the consequences of India’s megacities producing tonnes of waste are tangible and troubling. The unprocessed waste contains different types of solid waste like metallic & organic material, which can be used for recycling and composting purpose. As it’s very necessary to segregate the solid waste with a more efficient and intelligent approach. The robots are very much capable of doing such things on behalf of the human. Robots are easily programmable to do such tasks. By using the robots, the reduction of manpower will take place with the prevention of human contacts with chemically hazardous substances. Robots use technologies like artificial intelligence & machine learning to achieve such a complex task. These technologies empower machines a smart understanding to think like a human being. By developing such understanding for a robot, we can assume that in the future a robot can take place of the human in such a place of work where humans suffer most physically and mentally.
Keywords: Computerized, Machine learning, Solid Waste, Robotic Arm, Segregation, Microcontroller
Abstract
On the Construction of Radio Environment Map for Cognitive Radio Applications: An Overview
Bara’u Gafai Najashi
DOI: 10.17148/IJARCCE.2019.8434
Abstract:
Demand for data services from a few Kilobytes to several Gigabytes over the last 25 years has led to the development of several mobile and wireless standards. Unfortunately, the spectrum required for these services to operate is becoming scarce not because of shortage but because of under-utilization as several spectrum occupancy measurements have shown over the years. The solution then has to be a dynamic spectrum access approach where licensed and unlicensed users could share the spectrum without causing interference to the licensed user. This concept known as Cognitive Radio (CR) was envisioned by Mitola promises to solve this problem. Radio Environment Map (REM) is one of the central tools at the heart of CR as it constructs a comprehensive map of the CR network storing information on physical network, policies, regulation, licensed user profile and activity. In this research, a general overview on REM construction is presented. From the architecture to the techniques applied in constructing REMs. The performance of propagation models employed in this process is also presented. Finally the quality metrics used to determine the accuracy of the constructed REMs is givenKeywords:
Cognitive radio, Radio environment map, propagation models, quality metricsAbstract
Energy Efficient WSN with Cluster Head Rotation Algorithm for Underground Mine Supervising Environment
Archana K R, Kingsley G
DOI: 10.17148/IJARCCE.2019.8435
Abstract: Underground mines are more hazardous in nature and always contain unsafe for their workers. Every year, underground mining causes huge losses due to accidents and disaster. There is the need to develop an effective, secure, reliable and low-cost surveillance and safety system in underground mine environments. Wireless Sensor Networks (WSNs) are increasingly being used for such application. Since wireless sensor nodes are highly energy constrained devices and they have limited battery life due to various constraints of sensor nodes such as size and cost, etc. Therefore, optimal usage of node energy is the major challenge in wireless sensor networks. Clustering of sensor nodes is an effective method to use the node energy optimally and prolong lifetime of such energy constrained wireless sensor networks. In this paper, we propose an energy efficient wireless sensor node with cluster head rotation algorithm for supervising the underground mine environment. Proposed clustering algorithm ensures balanced size cluster formation and it has been proposed to achieve balanced energy consumption among nodes.
Keywords: Wireless Sensor Networks (WSNs), Clusters, Cluster head, and Underground mines
Abstract
Automatic Railway Crack Detector System using LoRa Network
Haritha P, Sharnya V
DOI: 10.17148/IJARCCE.2019.8436
Abstract: Safety and reliability are considered in one of the main issues at all transport system, particularly in railway. An automatic railway track crack detector system for Railway has been proposed here which aims in building a robot that can detect and analyze any kind of crack on the railway line and send the coordinates of that faulty line to the concerned authority. The proposed system can be networked with multiple robots and central computer system can control all these robots, so that complete track can be scanned for detecting any crack before each time train passes through track. Multiple such systems can be connected by using LoRa network instead of GSM network. This will eliminate the connectivity and network traffic issues. With the networked robotic system can be connected with the railway signaling system to synchronize the signaling with the crack detection. Synchronization with the signaling system can help automatic control of traffic if any crack is detected.
Keywords: LoRa Network, Robot, PIR sensor, ultrasonic sensor
Abstract
Programmable Big Data Processing Framework to Reduce On-Chip Communications and Computations Towards Reducing Energy of the Processing
Anusha Medavaka
DOI: 10.17148/IJARCCE.2019.8437
Abstract: Multi-Sensor health and wellness tracking systems are utilized to forecast future occasions of our health and wellness system. Each sensor produces a whopping quantity of data per 2nd and also requires to be refined in real-time. At the very same time, health and wellness tracking systems are battery ran, hence they have stiff restraints on power and also the location of the processing platform. Furthermore, health and wellness surveillance systems need to be precise, hence we adjust artificial intelligence methods to boost discovery precision. We recommend a programmable Big Data Processing structure to decrease on-chip interactions as well as calculations, therefore minimizing the power of the processing. We incorporate a low-overhead laying out structure with a low-power programmable PENC many-core platform. The laying out method decreases the data interactions and also calculations, furthermore processing time is reduced by parallel processing on the many-core platform. For the presentation we reveal seizure discovery application with 22-channel of electroencephalograph (EEG), each network creates 256 examples per 2nd calling for overall of 88 Kbps data price. The calculations are lowered by 16 while the power intake of processing is minimized approximately 68%. For compression prices of 2-16, the seizure discovery efficiency for the level of sensitivity and also uniqueness is broken down by 2.07% and also 2.97%, specifically for Logistic Regression classifier.
Keywords:
Abstract
Secured Crypto-Stegano Communication
Pashang Engineer, Priyanka A. Bansode, Shreya Vitthalrao Surnar, Prathmesh N. Gunjgur
DOI: 10.17148/IJARCCE.2019.8438
Abstract:
Developing a really good efficient secure communication in an android application comes with many of the same challenges posed by the natural imbalances found in computing, Input / Output and communication bandwidths of physical systems. These challenges are greatly amplified by the huge scale of the system, its distributed nature and the fact that virtually all applications are data-intensive. To ensure the privacy and security of the data in the android applications many image processing solutions are implemented to face these challenges. This project focuses on possible image processing solutions using best-possible techniques to battle against the security threats in an android environment.Keywords:
LSB, AES, SteganographyAbstract
Data Analytics: Car Sales in a Calendar Year
Vishesh S, Pavan Kumar C K
DOI: 10.17148/IJARCCE.2019.8439
Abstract
Eliminate a Parallelization Technique to Implement Expandable Lock-Free Deques
Archana Srivastava
DOI: 10.17148/IJARCCE.2019.8440
Abstract:
The data Structures used in concurrent systems need to be modified. Modifications of shared data structures are done in several steps. If these steps are interleaved with modifications from other tasks, this can result in inconsistency of the data structure. Therefore the data structure needs to be protected from other tasks modifying it while the operation is executing. This can either be done using mutual exclusion or non-blocking methods. The focus of this paper is to give a review on efficient and practical non-blocking implementations of shared data structure and suggest alternative scheme in this direction.Keywords:
Concurrency, Lock-Free Deques, Non-Blocking, Memory Management, Compare and Swap, EliminationAbstract
RFID Base Path Tracking of Industrial Mobile Robots Localization for Indoor Environment
Jesika R, Saravanan K
DOI: 10.17148/IJARCCE.2019.8441
Abstract
Mechanism for Prescribing Drug in Hospitals and its Substitute Availability in Nearby Hospitals of Area / City
Devki A. Balwani, Chandani C. Barsagade, Harsh D. Khandelwal, Vicky P. Patmase, Prof. Roshan R. Karwa
DOI: 10.17148/IJARCCE.2019.8442
Abstract: Mechanism for prescribing drug in hospitals and its substitute availability in nearby hospitals of area / city. It has many benefits for those prescribing and dispensing medicines, and also for the maintenance of medical records. Generic substitution of brand prescription is an accepted practice in many parts of the world and mainly done for the economic purpose. This project can be implemented on the basis of application in which the medicines can be bought by the patients in low prices having same contents as that of medicine prescribed by doctors. This system can bring a lot of change in the medical field. Being in the 21st century it has become very necessary to hold up with the latest technologies. As far as medical services are concerned, Use of generic medicine lacks at a point. Since, the use of branded medicine is at large scale it becomes difficult for some people to use them. It is beneficial for people to use generic medicines as it is highly cost effective. Many of the people cannot afford the medicines prescribed by doctor because it is expensive. It is the matter of fact that many of deaths occur due to unaffordable medicines. Keywords: Generic medicines, Health System, Substitution, Symptoms
Abstract
Semantic Texton Forests for Image Categorization and Segmentation
Miss Nilophar Mullani, Prof. Arati Dandavate
DOI: 10.17148/IJARCCE.2019.8443
Abstract
Using Twitter for Branding : Hotel Strategies in Kenya
Patrick Owoche, Samuel Mbugua, Anselemo Ikoha
DOI: 10.17148/IJARCCE.2019.8444
Abstract: Globalization, mobile computing and changes in consumer behaviour are aspects brought about by the new developments in IT that are changing the way business organizations conduct their business. Branding in travel and tourism industry is no exception and the practitioners must consider social media in their online branding strategies. This paper examines the extent to which the hotel industry uses Twitter social networking site in their branding strategies. The study used media content analysis to investigate 35 star rated hotels Twitter account in Kenya. Twitter posts timing, content type and engagement metrics were analysed. The results indicate that the timing of tweets and the Twitter post media type have a bearing on the rate of engagement. On the practical side, this study shades light on how Twitter is utilized by hotels for branding purposes and creates recommendations on how hotels can optimize customer engagement with their tweets. The study also enriches literature in the use of Twitter as a branding tool. Keywords: Twitter engagement, social media in hotels, Social media branding, Twitter posting, timing of tweets
Abstract
Fault Tolerance in Wireless Sensor Network
Samuel Devakumar P.V, Mr.N.Ilayaraja
DOI: 10.17148/IJARCCE.2019.8445
Abstract:
Wireless sensors which are used for sensing any event can be made intelligent by adding cognitive sensors. Cognitive agents are capable of making proactive choices according to the current situation based on the requirement needed in a WSN, to achieve the end to end goals of the network deployed even during the complex situation and with constraints scenario. The cognitive layer can be added to any network deployed in any application environment and it can be made intelligent. The cognitive sensor is a recent technology, and this literature survey reviews how cognitive layer has been implemented in various applications. Energy loss is one of the major impediments in all WSNs. This literature survey shows how energy efficiency can be minimized.Keywords:
Cognitive Sensor, Energy Efficient, Reliable, Cost - effectiveAbstract
Smart Security System for Vehicles
Dr. Pramod Sharma, Akash Shrivastav, Vivek Parashar, Okesh Kumar, RamNaresh
DOI: 10.17148/IJARCCE.2019.8446
Abstract:
In the designed system we can easily communicate with our vehicle from anywhere with the help of GSM and we can command our vehicle according to our need via message to avoid stealing of our vehicle. The existing security system is based on buzzer and is a single password system that cans we easily stolen. The designed system “Smart Security System for Vehicle” is based on OTP, being sent to the owner registered number, the owner has to enter the OTP to turn ON the ignition system, and the OTP is random so it can’t be stolen by another person. If somehow OTP is cracked by someone than owner can easily stop the vehicle from anywhere with the help of mobile phone. Also, the vehicle owner can easily trace the location of his / her vehicle from anywhere with the help of GPS.Keywords:
GSM, GPS, 4x4 Keypad, Microcontroller, OTPAbstract
A Hybrid Approach to Enhance Load Balancing in a Heterogeneous Cloud Environment
Boukari Souley, Abdullahi Nafisatu Aliyu
DOI: 10.17148/IJARCCE.2019.8447
Abstract: Cloud computing is rapidly becoming more advanced .It has been put into use by very large set of users .It has become more attractive due to its cloud potentials of being easy to use and anywhere accessibility in comparison to other technologies. Load balancing is a very important component of efficient operations in cloud computing environment .Several algorithms have been designed but yet unable to rectify the holes found in the performance area. In this work we are proposing a hybrid approach to enhance performance for the cloud system user putting the concepts of enhanced Throttled and Equally Spread Current Execution algorithms (ESCE) into use. The proposed hybrid algorithm will be simulated in cloud analyst environment.
Keywords: Cloud Computing, Load Balancing, Performance, Cloud Analyst Network Delay, Physical Memory, Storage Capacity
Abstract
Skin disease detection using Image Processing and Machine Learning
Miss. Mukta Kamble, Miss. Neha Kandalkar, Miss. Gauri Khandagale, Miss. Tejaswini Agunde, Prof.S.R. Hiray
DOI: 10.17148/IJARCCE.2019.8448
Keywords:
Dermatology, Image Processing, Computer Vision, Machine Learning, Data Mining, Computational Intelligence, Automated Disease DiagnosisAbstract
Mobile Application for Detecting Vehicle Accident and Tracking System using GPS/GSM
Mr. Shubham Ingle, Miss. Ankita Shendkar, Mr. Sanjay Chavan, Prof. Avinash Palave
DOI: 10.17148/IJARCCE.2019.8449
Keywords: Global Positioning System (GPS), Global System for Mobile communication (GSM)
Abstract
Intrusion Detection using Machine Learning and log analysis
Miss. Manali Raka, Miss. Shrushti Shah, Miss. Sayali Gunale, Miss. Renuka Tanksale, Prof. Mr U.K.Raut
DOI: 10.17148/IJARCCE.2019.8450
Keywords: SQL injection, Machine Learning, Web Security
Abstract
Image Compression with Contourlet Transformer and Quantitative Evaluation by using WVT
Miss. Sneha Shukla, Prof. Nilesh Bodne, Prof. Pranjali Dahikar
DOI: 10.17148/IJARCCE.2019.8451
Abstract
Prediction Model for Detection of Chronic Kidney Disease: Logistic Regression
Vishesh S, Pavan Kumar C K, Varnitha N
DOI: 10.17148/IJARCCE.2019.8452
Abstract
Cryptography Technique for Information Security
Priyanka S. Pandhare, Pallavi S. Raut, Shital S. Patil, Pranjali T. Pawar
DOI: 10.17148/IJARCCE.2019.8453
Keywords:
Steganography, DES, Run Length Encoding, CompressionAbstract
Timeline Generation After Summarization of Evolutionary Tweet Streams
Madhuri Jiwe
DOI: 10.17148/IJARCCE.2019.8454
Abstract
Personal Tour Planner
Mr. Abhishek Tapadia, Mr. Kunal Agarwal, Mr. Brijesh Sonawane, Mr. Shubham Akurdekar, Prof. Mrs. Suchita Wankhade
DOI: 10.17148/IJARCCE.2019.8455
Abstract
E - Attendance System Using Opencv and CNN
Mr. Omkar Sawant, Mr.Yash Jain, Mr. Anand Kulkarni, Mr. Shubham Salunkhe, Prof. Mrs Shantiguru
DOI: 10.17148/IJARCCE.2019.8456
Abstract: In modern times, face recognition is the key aspect of computer vision. There are at least two reasons for this trend the first is the commercial software, and the second is the availability of practical technologies after years of research. Due to the very nature of the problem, computer scientists, neuro-scientists, and psychologists all share a keen interest in this field. We proposed a system that is based on face detection and recognition algorithms, which automatically detects the student when he/she enters in the classroom and marks the attendance by recognizing him/her. This system is developed by capturing real-time human faces in the class. Finally, the absentee lists are displayed on android application for confirmation. This System can be used in Government Schools and Colleges to monitor and validate attendance. Keywords: Attendance, Opencv, CNN, Question Paper
Abstract
Ensemble of Segmentation Methods for Detecting Breast Cancer
Shashank A R, M.Veena
DOI: 10.17148/IJARCCE.2019.8457
Abstract:
Breast cancer could be a considerable prime cause that affects the lives of women's and results in death all round the world. Consistent with applied math information from the WCR, the proportion of breast tumors in cancers diagnosed is up to thirtieth, leading to fifteenth death because of cancer worldwide. The goal of the primary stage is to boost the image mistreatment totally different pre-processing filters that removes the noise and highlights the tumor region. Within the next stage, tumor is extracted from increased pictures mistreatment projected segmentation techniques classified as delicate, benign and malignant.Keywords:
Pre-processing, filters, enhance, segmentationAbstract
Overview: Wavelet Transform Along With SPIHT Algorithm for Image Compression
Navesh Sallawar, Prof.Nilesh Bodne
DOI: 10.17148/IJARCCE.2019.8458
Abstract: Image compression is one of the important technologies in multimedia communications, that has been much attention in the past decades, where the two techniques Discrete Wavelet Transform (DWT) and Set-Partitioning In Hierarchical Trees (SPIHT) have great influence on its performance. Due to the properties of fast computation, low memory requirement, adaptive Lifting DWT has been adopted as a new technique for still image compression. Furthermore, the traditional DWT and SPIHT have the drawback of long bits output and time consuming. In this paper we produce a new technique named adaptive Lifting DWT. An Adaptive Lifting DWT that locally adapts the filtering directions to image content based on directional lifting. This technique using the new algorithm that detects all the blocks in a given image to decide whether the block is homogenous or heterogeneous block. For homogeneous block, the simple Discrete Wavelet Transform (DWT) is used. And for the heterogeneous block Lifting Wavelet Transform is used. In this technique image quality is measured objectively, using peak signal noise ratio or picture quality scale, and subjectively, using perceived image quality.
Keywords: SPIHT, Entropy coding, Lifting Scheme, Wavelet, Compression.
Abstract
Blockchain Technology in Electronic Health Record System
Malavika M.B, Richa Kumari, Nihara S.M
DOI: 10.17148/IJARCCE.2019.8459
Abstract:
Electronic Health Records (EHRs) are used to maintain the history of the Patient’s records. But it is entirely controlled by the hospitals. Patients face a critical need to focus on the details of their own healthcare and restore management of their own medical data. The rapid development of block chain technology promotes a secure healthcare system, including medical records as well as patient-related data. This technology provides patients with an extensive, unaltered records and provides access to EHRs free from service providers and treatment websites. To guarantee the validity of EHRs encapsulated in block chain, we present an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it.Keywords:
Electronic Health Record System (EHRs), Blockchain, Multiple Authorities, Attribute Based Signature (ABS).Abstract
Performance Analysis of Dynamic Spectrum Access using Composite Fading Channel
Partha Pratim Paul
DOI: 10.17148/IJARCCE.2019.8460
Abstract
Identifying Ransomware - Specific Properties using Static Analysis of Executables
Deepti Vidyarthi, CRS Kumar, Subrata Rakshit, Shailesh Chansarkar
DOI: 10.17148/IJARCCE.2019.8461
Abstract: Ransomware attacks have risen exponentially over the past decade with increasing severity, potency to cause damage, and ease of carrying out attack. The conventional anti-malware techniques are compelled to include advanced ransomware detection mechanisms. This paper presents the results of the study and analysis of ransomware executable files in order to identify the characteristic properties that distinguish ransomware from other malware and benign executable files. The program binaries are analyzed statically and dynamically to observe the typical behaviour and structure of the ransomware. Using the static analysis technique, Ransomware - specific properties are extracted from the executable files. The experiments show that higher accuracy of classification, using machine learning algorithms, is achieved by combining these properties with the set of generic malware properties for malware detection. Keywords: Ransomware, Malware Detection, Static Analysis, Dynamic Analysis
Abstract
Design and Development of Door Access System using Radio Frequency Identification
Naseem Rao
DOI: 10.17148/IJARCCE.2019.8462
Abstract:
In this paper, RFID based Door access control using Arduino is based upon security access and control system using RFID and Arduino. The embedded chips in RFID use radio signals to capture and read information on the object. Barcodes labels have been in the industry for over more than 30 years but over a past decade, new technologies like Radio Frequency Identification (RFID) have diminished the luster of barcodes. RFID technology is significant and consistent means to identify the material. Arduino helps to design the circuit and makes programming a lot easier to understand.Keywords: RFID, Arduino; Health monitoring; LED
