VOLUME 8, ISSUE 5, MAY 2019
Multi - Class Active Learning to Classify and Map Ecological Zones Across the Dune - Beach Interface
Amani M. Alattas
Smart Glass
Er. Dhananjali Singh, Rohit Pathak, Sandeep Singh, Gaurav Mudgal
Post harvesting Onion Storage Methodology Using IOT
Mokshi Vyas, Rutuja Gore, Manali Misal,Sneha Jagtap,Prof. S.V. Todkari
Smart Garbage Collection
Tejas Kamble, Vishal More, Aishwarya Jathar, Dhananjay Gurav, Prof.L.J.Deokate
Intelligent Chatbot for Guided Navigation of Repository Contend
Miss. Anjali Mishra, Miss. Shruti Sapre, Miss. Shruti Shinde, Miss. Shreya Nahar,Prof. S.N Shelke
Stationed Automotive’ s Surveillance of Streets for Smart City
Amogh H Kashyap, Chethan A, Anusha C Shetty, Dhatri R Bidarahalli
Healthcare System
Mr Kunal Nabariya, Miss Dnyanashree Patil, Miss Prachi Solanki
Analysis Accidents Detection
Tanisha Sonawane, Siddhi Bhamare, Mayuri Gote, Ujjwala Wale, Prof. M.K.Nivangune
Smart Market Yard System
Sarvesh Khandelwal, Pawan Kumar, Rushabh Khimawat, Prof. Namrata N. Wasatkar
Home Automation and Security Using IOT
Er. Dhananjali Singh, Satyendra Kumar Singh, Jitendra Kumar Yadav, Mohini Singh, Shikha Singh
Privacy Policy Images on Content Sharing Sites
Sakshi Datrange, Swarali Lakade, Nikita Kamble, Prasad Kamble, Prof. S. P. Godse
Vrudh Sevak: A Digital Assistant for Lonely Elders using ‘Technology of Device Connectivity’
Vinaya B, Dr. M. C. Padma
Medicine Manufacturing Supply Chain Management System Using Blockchain
Akshada Shelke, Aishwarya Deshmane, Najneen Shaikh,Suheb Shaikh, Gyankamal Chhajed
On Sum - Throughput and Fairness Index analysis of Downlink NOMA Over OFDMA for Machine - to - Machine Communication
Selvam K, Kumar K
Real Time Moving Object Detection
Prof. Rakhi J. Bharadwaj, Rohan M. Saggam, Rushikesh, Yogesh J. Choudhary, Aman R. Shaikh
SQL Query Optimization Techniques
Bhagyashri S. Bharambe, Priyanka R. Munot, Dipali R. Patil, Kajal P. Pathak
Some elliptic curve based crypto-compression schemes for medical images
Cidjeu D.D, Tieudjo D
“Analyzing Sentiment in One Go”
Srushti Jare, Aditi Adawade, Shweta Parge, Komal Balkawade
Meander Shaped Bandpass Filter With Low Insertion Loss
S.Rajapriya, G.Gomathi, T.Muruganantham
Design of Monopole Antenna Loaded with Split Ring Resonator for Dual Band Operation
R.Balamurugan, U.Surendar
RYMECse - An Android Application for Cse Department
Navyashree B M, Soujanya G, Tanuja Patil, Sai KrishnamRaju G, Sarvar Begum
Dynamic Task Scheduling using Trained Neural Network and Genetic Algorithm
Suhani Kumari, Himanshu Yadav, Chetan Agrawal
An Efficient Approach in Detecting Water Leakage in Superstructure
Mrs Kalaivani M, Dr Jeyalakshmi C, Mrs Dharini D
Design and Implementation of Forest Monitoring System using IOT
Mr.S.Syed Husain, Mr.K.Vigneshwaran, Mrs.S.Kaveya
Implementation of Kogge Stone Adder for Signal Processing Applications
A.Abinaya, M.Maheswari
Design and Implementation of a Planar MIMO Antenna for LTE-Applications
D. Stephy Angel, N.R.Nagarajan, U.Surendar
Short Circuit and Contingency Analysis Implementation for IEEE-14 Bus System using Mi Power Software
Mr.A.Prabhu, Mr.A.Subramaniya Siva
Design of Active Inductor Based Tunable Low Noise Amplifier (LNA)
V.Subhashini, Dr.M.Maheswari, A.Abinaya
Design of CPW Antenna for Future Wireless Application
S.Monisha, U.Surendar
A CPW-Fed Metamaterial Loaded Monopole Antenna for Multiband Operation
S.Praveena, R. Samson Daniel
A Dual Band Elliptical Antenna for ISM and WIMAX Application
D.Stephy Angel, M.Karthick, J.Roselin Suganthi
Emergency Tracking of the Heart Patients
Pooja P.Nemade, Dr. G.A.Kulkarni
Realization of a Smart Aquaponics System: A Closed - Loop System
Kushal S, Honnu S, Sindhu R
Expression Invariant Face Recognition Using Convolutional Neural Networks
Minu Correya, Dr. Thippeswamy G
Transformation through Communication System the Step in Sugar Industries Domain
Pratibha M. Deshmukh, Dr. Pallavi P. Jamsandekar
A Surevey on Ultra Wide Band and Narrow Band Low Noise Amplifiers for Wireless Transceivers
T.Muruganantham, Dr.M.Maheswari
Development of a High Resolution Imaging System at 635 nm and 840 nm
Roshan K. Borase, Kartik Shrivastav, S.L.Nalbalwar, Roshan Makkar
Challenges in E-Marketing Adoption Among Small Businesses in the Hospitality Industry in Kenya
Charles Owuor Omoga
Social Network Analysis
Susha Jain, Mahaveer Jain, Balasubramani R, Vasudeva Pai
Integrated E-Marketing Adoption Model for Small Businesses
Charles Owuor Omoga
Single - Phase VSI System Controlled by Suitable On - Board Microcontroller
T. Muruganantham, K. Vigneshwaran, S.Syed Husain
Dossier of Disaster Recovery in AWS and Azure
Prasthutha, Chandrahasa Rai, Rashmi Naveen
A Survey of Various Protocols Over Vehicle Ad-Hoc Network
Monica Varrmaiya, Sushma Kushwaha, Amit Thakur
Implementation of OSPF on a Network Using GNS3 Tool
Apoorva N S, Namratha H, Rishik A Sunadoli, Mariya Smitha C, Anil Umesh
Design of Efficient Fused Floating-Point Units for DSP Applications
Bhagirth Sharma, Mrs. Suman Dagar
Triangular Waveguide Fed Slot Antenna
Shraddha J. Salve, J. K. Prajapati, S. S. Kakatkar, S. L. Nalbalwar
A Practical Approach for Objects Identification in Rgb Colored Image using Segmentation in Matlab Simulation
Diksha, Er. Sheetal Chhabra
A Review: Segmentation Based Objects Analysis in RGB Colored Image using Matlab Simulation
Diksha, Er. Sheetal Chhabra
Selection of ERP in Deterministic Unpredictable Scenario
G. R. Gosavi, Dr. V. M. Thakare
Abstract
Multi - Class Active Learning to Classify and Map Ecological Zones Across the Dune - Beach Interface
Amani M. Alattas
DOI: 10.17148/IJARCCE.2019.8501
Abstract
Smart Glass
Er. Dhananjali Singh, Rohit Pathak, Sandeep Singh, Gaurav Mudgal
DOI: 10.17148/IJARCCE.2019.8502
Abstract: The smart glass project that we have designed is to make the information more accessible and incorporate the human vision with technology. The designed system makes the information access hands free. We have used Raspberry pi Zero as a microprocessor. It is a single board computer which has a system on chip. On the input side of the raspberry pi, there is a camera unit which is used to take the photos which is further processed by the raspberry pi. Using this camera, person is able to capture the photo of the view he/she is currently viewing as the photos are taken from the sight of view of the person. The other input component is the microphone, which helps in calling purpose. Keywords: Raspberry pi, Smart Glass, LCD, SOC
Abstract
Online Food Ordering System
Oshonik Kamble
DOI: 10.17148/IJARCCE.2019.8503
Abstract
Post harvesting Onion Storage Methodology Using IOT
Mokshi Vyas, Rutuja Gore, Manali Misal,Sneha Jagtap,Prof. S.V. Todkari
DOI: 10.17148/IJARCCE.2019.8504
Abstract
Smart Garbage Collection
Tejas Kamble, Vishal More, Aishwarya Jathar, Dhananjay Gurav, Prof.L.J.Deokate
DOI: 10.17148/IJARCCE.2019.8505
Abstract: India is a developing country with a huge population. This ever increasing population degrades the cleanliness of sustainable environment. To maintain splendor, the Indian Government launched the campaign of “Swachh Bharat” mission popularly known as clean India movement for making an India clean. The campaign objective is to make city smart by reducing or eliminating open defecation through construction of individual, cluster and community toilets. Smart city is a future reality in India, the concept of smart city has several definitions but still no universal definition is accepted. Finding the garbage bins whether it is filled or not is very difficult. The idea is simple and is driven by the fact that garbage containers require very frequent cleaning, which is not always possible. This leads to unhealthy environment.. For that we introduce our system to solve this problem. Keywords: GSM, GPS, Application smart phone
Abstract
Intelligent Chatbot for Guided Navigation of Repository Contend
Miss. Anjali Mishra, Miss. Shruti Sapre, Miss. Shruti Shinde, Miss. Shreya Nahar,Prof. S.N Shelke
DOI: 10.17148/IJARCCE.2019.8506
Abstract
Stationed Automotive’ s Surveillance of Streets for Smart City
Amogh H Kashyap, Chethan A, Anusha C Shetty, Dhatri R Bidarahalli
DOI: 10.17148/IJARCCE.2019.8507
Abstract: Traffic congestion is a common hindrance which is caused mainly due to automobiles parked in “No Parking” areas knowingly or unknowingly. Analogously, the police vehicles need to monitor these areas which further adds pollution and congestion into the system. Therefore, we propose a Deep Learning based solution which can monitor vehicular movements. This involves vehicle and number plate recognition through which the owner’s details are fetched, and warning messages are sent after a certain time specified by the governing body. Meanwhile, the local police authorities are notified about the wrongly parked vehicle, allowing them to easily tow it, thus saving a lot of human and fuel resources which also in the process reduces the pollution. A Graphical User Interface is provided at the local police stations to display various traffic violations and status across the city. Keywords: Deep Learning, Traffic Monitoring System
Abstract
Healthcare System
Mr Kunal Nabariya, Miss Dnyanashree Patil, Miss Prachi Solanki
DOI: 10.17148/IJARCCE.2019.IJARCCE.2019.8508
Keywords: Healthcare System, Disease Prediction, Doctor Recommendation, Machine Learning
Abstract
Social Engineering
Alok A Chauhan, Nischal Puri, Yogesh Narekar
DOI: 10.17148/IJARCCE.2019.8509
Abstract: The age old problem of social engineering is still a threat that does not receive due attention. Due to the advancements in information technology and the explosion of the Internet, attackers have many more avenues to pursue social engineering attacks. Inadequate efforts to educate employees and staff about social engineering and password management, inappropriate usage of messaging systems, poor implementation and awareness of security policies, all lead to people being exposed to potential incidents. This paper talks about social engineering and the new avenues that it has diverged into; and how social engineering plays a part in assisting other attack schemes. The paper first introduces the concept of social engineering It then looks at different attack methods that have proliferated due to the help obtained by social engineering schemes. Social engineering, both with its low cost and ability to take advantage of low technology, has taken its place in the information security literature as a very effective form of attack
Keywords: Impersonating staff, Hoaxing, Creating confusion, Dumpster diving, Reverse social Engineering
Abstract
Analysis Accidents Detection
Tanisha Sonawane, Siddhi Bhamare, Mayuri Gote, Ujjwala Wale, Prof. M.K.Nivangune
DOI: 10.17148/IJARCCE.2019.8510
Abstract
Smart Market Yard System
Sarvesh Khandelwal, Pawan Kumar, Rushabh Khimawat, Prof. Namrata N. Wasatkar
DOI: 10.17148/IJARCCE.2019.8511
Abstract: Agriculture is the backbone of Indian economy. It is one of the major sectors of Indian economy known as primary market. Agricultural Marketing study is the study of all the activities, agencies and policies included in the procurement of farm inputs by the farmers and the procedure of movement of agricultural products from the farmers to the consumers.. Traditional marketing system which was highly regulated opened up owing to changing system and emerging agribusiness. Increase in marketable surplus of agricultural commodities, urbanization and changes in consumption pattern have also contributed to the changing systems. Accordingly, both the Central and State governments initiated policy reforms in marketing to address to the drawbacks in the existing marketing to meet the challenges and requirements of emerging business opportunities. This led to the evolution of new initiatives in marketing of agricultural commodities. Commodities produced have to support a series of operations such as threshing, storage, winnowing, transportation, harvesting, bagging processing and interchange before they reach the market, and as visible from many studies across the country, there are considerable losses in commodities output at all these stages. In this system We send the commodity to the buyer agent. In this paper we develop the android application in that farmer send the commodity detail to agent ,agent give it to gate person then using application gate person give detail of farmer, agent commodity to shopkeeper. Keywords: Commodities, Data Mining, Agricultural Commodities, Support Vector Machine (SVM), and Logistic Regression (LR)
Abstract
Home Automation and Security Using IOT
Er. Dhananjali Singh, Satyendra Kumar Singh, Jitendra Kumar Yadav, Mohini Singh, Shikha Singh
DOI: 10.17148/IJARCCE.2019.8512
Abstract: The home automation and security using IOT project that we have designed is to make home more secure and automated by using internet of things. We have used Raspberry pi and Raspberry pi camera which is attached at the side of the door. When an authorised person comes in front of raspberry pi camera, it detects the face and start comparing with database images. If face matches with database images then gate automatically opens and if it does not matches then raspberry sends a message to owner of house that “home entry detected”. Then the owner can use VS380 Wi-Fi camera which is also attached on side of the door, for watching video outside of home through his mobile and he also can talk with unauthorised person. If owner get to know the person is guest or authorised person then he can open the door home by sending “*y#” message through his phone then gate will open and all home appliances will switch ON. Keywords: Raspberry pi, IOT, Home Security, Automation
Abstract
Privacy Policy Images on Content Sharing Sites
Sakshi Datrange, Swarali Lakade, Nikita Kamble, Prasad Kamble, Prof. S. P. Godse
DOI: 10.17148/IJARCCE.2019.8513
Abstract: Privacy of personal images is important for user acceptance. The media offer attractive means for interaction and communication, but also raise privacy and security concerns. Online social media such as My Space, or the Instagram, Facebook have experienced exponential growth in recent years. We analyze the impact of privacy concerns on image. Keywords: Online Social Media, Image Privacy
Abstract
Vrudh Sevak: A Digital Assistant for Lonely Elders using ‘Technology of Device Connectivity’
Vinaya B, Dr. M. C. Padma
DOI: 10.17148/IJARCCE.2019.8514
Abstract: According to a report from Times of India, about 15 million old age people are living alone in India. For various reasons they are living alone and its probability is high in cities. Since they are old, their life is limited to a bound, loneliness and will be having health issues. Old age contributes forgetfulness in many, poor health support and loneliness due to various reasons. We proposed an assistance (Vrudh Sevak) to the majority of the problem faced by the lonely elders using ‘Internet of Things’ and smart phone technology. Internet of things is a propelled worldview to interface physical and virtual substances for improved administrations. We proposed different methodologies to address the various issues such as forgetfulness using smart phone and its voice based assistance, health care by IOT sensors, social communication among same age group and connecting to concerned people via GSM technology. We also proposed a way to improve their health and habit based on the user information. Keywords: Vrudh Sevak, IOT, GSM, Smart Phone
Abstract
Medicine Manufacturing Supply Chain Management System Using Blockchain
Akshada Shelke, Aishwarya Deshmane, Najneen Shaikh,Suheb Shaikh, Gyankamal Chhajed
DOI: 10.17148/IJARCCE.2019.8515
Abstract: Counterfeit of medicine is major problem for consumer. Though there are more conventional methods for identifying counterfeit of medicine but they lack in security so to overcome this problem we are proposing secure software for medicine manufacturing supply chain management system by using blockchain technology. Blockchain technology is specially used in bitcoin cryptocurrency. It is characterized as an open-source, decentralized, distributed database for storing medicine information. Instead of relying on centralized intermediaries, this technology allows two parties to transact directly using duplicate, linked ledger called blockchain. Supply chain management is collection of activities required to plan, control and execute a products flow, from collecting raw materials and production through distribution to the final customer, in the most smooth and cost effective way possible. Supply Chain is beneficial when consumer or the organizations who want the information about medicine manufacturing at every stage to compare its quality. Confidential information related to medicine manufacturing is not to be unveil is accessible to authorized users.
Keywords: Counterfeit, Blockchain, Supplychain, Smart Contract
Abstract
On Sum - Throughput and Fairness Index analysis of Downlink NOMA Over OFDMA for Machine - to - Machine Communication
Selvam K, Kumar K
DOI: 10.17148/IJARCCE.2019.8516
Abstract: With the anticipated exponential increase in the volume of cellular traffic e.g., beyond a 1000 fold increase in the next decade, significant gains in sum throughput and Fairness index of the system are required to satisfy all the users with the excellent quality of user experience. As a potential candidate of multiple access technique for 5G, Non-Orthogonal Multiple Access (NOMA) can be an effective and noteworthy solution to M2M communications to serve more number of users by the same resource to achieve significant spectrum efficiency gain over conventional Orthogonal frequency division multiple access. NOMA, a novel technique can provide more satisfied level of Sum-throughput and Fairness index value to all the devices and users. In this paper, the performance of Sum-throughput and Fairness Index of NOMA technique is analysed and compared it with existing OFDMA system. Simulation results demonstrate that the NOMA technique outperforms the prevailing OFDMA technique with respect to Sum-throughput and Fairness Index of users, thus can be a potential solution for effective use of limited bandwidth constraint to suffix the need of future M2M communications. Keywords: Sum - Throughput, Fairness Index, 5G Networks, Machine - to - Machine (M2M) Communications, Non- Orthogonal Multiple Access (NOMA), Orthogonal Frequency Multiple Access Technique (OFDMA)
Abstract
Real Time Moving Object Detection
Prof. Rakhi J. Bharadwaj, Rohan M. Saggam, Rushikesh, Yogesh J. Choudhary, Aman R. Shaikh
DOI: 10.17148/IJARCCE.2019.8517
Keywords:
R-CNN, Automatic Detection, Tracking, Real-Time VideoAbstract
SQL Query Optimization Techniques
Bhagyashri S. Bharambe, Priyanka R. Munot, Dipali R. Patil, Kajal P. Pathak
DOI: 10.17148/IJARCCE.2019.8518
Abstract:
Query optimization is the overall process of choosing the most efficient means of executing a SQL statement. The optimizer attempts to generate the best execution plan for a SQL statement. The best execution plan is defined as the plan with the lowest cost among all considered candidate plans. SQL is a nonprocedural language, so the optimizer is free to merge, reorganize, and process in any order. The cost is a number that represents the estimated resource usage for an execution plan. The cost computation accounts for factors of query execution such as I/O, CPU, and communication. To implement query optimization methods such as Heuristic Greedy based optimization, Iterative Improvement based cost optimization and Ant Colony optimization algorithms. Show Comparison of cost, execution time and response time between Heuristic Greedy based optimization; Ant Colony Optimization and Iterative Improvement based cost optimization algorithmsKeywords:
Optimization, Genetic, Ant colony algorithm, HeuristicAbstract
Navigating Visually Impaired and Sightless People using Auditory Guidelines
Dr.K.Priyadarshini
DOI: 10.17148/IJARCCE.2019.8519
Abstract:
The proposed work presents a novel strategy for navigating visually impaired and blind people using audio commands .To detect the significant objects in a video shot we start from the theory that moving objects attract attention more than other and are considered prominent. This projected method is evaluated and analysed based on the Optical character recognition which moves towards to detect the streets and shops name boards. Based on the OCR result a Text to speech (TTS) converter algorithm is used to assist the blind people.Keywords:
Optical Character Recognition; Converter AlgorithmAbstract
Some elliptic curve based crypto-compression schemes for medical images
Cidjeu D.D, Tieudjo D
DOI: 10.17148/IJARCCE.2019.8520
Abstract: In this paper, we propose two lossless crypto-compression schemes based on Elliptic Curve (EC) for the security of medical images. Pixels values are computed as elements of a finite field Fq. For compression, these elements are grouped in blocks in an appropriate manner. After transforming these blocks into points of an elliptic curve, two EC-based encryption schemes are applied. We obtain two crypto-compression schemes which compared to some existing systems, offer better performances in terms of compression rate, image quality and execution time.
Keywords: Image, Crypto-compression schemes, Elliptic Curve Cryptography, Discrete Logarithm Problem (DLP).
Abstract
“Analyzing Sentiment in One Go”
Srushti Jare, Aditi Adawade, Shweta Parge, Komal Balkawade
DOI: 10.17148/IJARCCE.2019.8521
Abstract:
Propose system tend to concentrate on modeling user-generated review and overall rating pairs and aim to spot linguistics aspects and aspect-level sentiments from review knowledge similarly on predict overall sentiments of reviews. We tend to propose a completely unique probabilistic Supervised Joint Side And Sentiment Model (SJASM) to upset the issues in one go underneath a unified framework. SJASM represents every review document within the style of opinion pairs, and might at the same time model side terms and corresponding opinion words of the review for hidden side and sentiment detection. It conjointly leverages sentimental overall ratings, which regularly comes with on-line reviews, as superintendence knowledge, and might infer the linguistics aspects and aspect-level sentiments that aren't solely purposeful however conjointly prognosticative of overall sentiments of reviews. Moreover, we tend to conjointly develop economical illation methodology for parameter estimation of SJASM supported folded Gibbs sampling. We tend to judge SJASM extensively on real-world review knowledge, and experimental results demonstrate that the planned model outperforms seven well-established baseline strategies for sentiment analysis tasks. We build social network web site on that user post with attaching files, thereon file topic name match with product name then suggest to user on e-commerce web site.Keywords: Supervised Joint Side And Sentiment Model (SJASM), Gibbs sampling, Sentiment analysis, aspect-based sentiment analysis, probabilistic topic model
Abstract
Meander Shaped Bandpass Filter With Low Insertion Loss
S.Rajapriya, G.Gomathi, T.Muruganantham
DOI: 10.17148/IJARCCE.2019.8522
Abstract:
The paper proposes the design of bandpass filter using meander structure . The application in which it can be used includes WLAN applications used for vehicular communication. The feed arrangement used in this structure includes coupled feeding using SIR. The low insertion loss in this structure is achieved by modifying the properties of meander. The dimension of the meander structure and distance between the two meander is adjusted to provide low insertion and return loss. Coupling effect takes place between the meander and SIR to provide output at the ports. Thus insertion loss and return loss are effectively obtained and the structure can be used for WLAN applications.Keywords:
Coupling Effect; Inseertion Loss; Meander Structure; Return loss; SIR (stepped impedence resonator), WLAN (Wireless Local Area Network)Abstract
Design of Monopole Antenna Loaded with Split Ring Resonator for Dual Band Operation
R.Balamurugan, U.Surendar
DOI: 10.17148/IJARCCE.2019.8523
Abstract
RYMECse - An Android Application for Cse Department
Navyashree B M, Soujanya G, Tanuja Patil, Sai KrishnamRaju G, Sarvar Begum
DOI: 10.17148/IJARCCE.2019.8524
Abstract:
The application is designed for departmental use for our college where both the faculty members and students can register to seek the convenience to access digital library, digital notes, departmental events, faculty specialization and details, student details and registration forms linking to department events and many other add-ons. This application provides special features to faculty members to add notes in Digital notes section and add events commencing in department and links to register for these events. The users can access digital library, add any new books available in text field specified in digital library section, access co-faculty details in faculty specialization, add circulars in student section and can give their details specified with respect to semesters. Students are given permission only to register, login through University seat numbers and access all the sectional resources available exclusively for students.Keywords:
Role Based Key Access (RBAC), Authentication, Data Mining, MVC Architecture, ModulesAbstract
Dynamic Task Scheduling using Trained Neural Network and Genetic Algorithm
Suhani Kumari, Himanshu Yadav, Chetan Agrawal
DOI: 10.17148/IJARCCE.2019.8525
Abstract:
This paper focus on allocation of cloud resources where two models were developed for this work. First was TLBO (Teacher Learning Based Optimization) genetic algorithms which find the correct position for the process to execute. Here some information used for analysis are total number of machines, memory, execution time, etc. So, outcome of the selected training process sequence were used as training input to the Convolutional Neural Network for learning. Here training was done in such a way that all set of features were utilized in pair with their process requirement and current position. For increasing the reliability of the work whole experiment was done on real dataset. Result shows that proposed GNNLB model has overcome various evaluation parameters on different scale as compared to previous approaches adopt by researchers.Keywords:
Cloud Computing, Genetic Algorithm, Load Balancing, Neural Network, Virtual MachinesAbstract
An Efficient Approach in Detecting Water Leakage in Superstructure
Mrs Kalaivani M, Dr Jeyalakshmi C, Mrs Dharini D
DOI: 10.17148/IJARCCE.2019.8526
Abstract: Automatic leakage detection and maintenance of superstructure is a challenging task in current civil frame work. Current detection standards require a detector to locate the target architecture location and visually appraise the superstructure condition. When the target location is impassable, lorgnette must be used to recognize the defects. This paper proposes a labour-intensive approach, by means of image processing which uses a robotic system to monitor and detect the superstructure frequently and execute independent leakage detection. This paper uses fuzzy KNN algorithm to detect water leakage in the building wall. Keywords: Fuzzy KNN Algorithm; Image Processing; Labour Intensive Approach; Leakage Detection
Abstract
Design and Implementation of Forest Monitoring System using IOT
Mr.S.Syed Husain, Mr.K.Vigneshwaran, Mrs.S.Kaveya
DOI: 10.17148/IJARCCE.2019.8527
Abstract:
Traditional approaches to the tracking of wild animals provide useful, yet spatially constrained information. Remote sensing offers the prospect for large area characterizations of biodiversity in a systematic, repeatable, and spatially exhaustive manner. Information and monitoring systems for the forest sector are beneficial for effective policies and planning, valuation of forest resources and proficient investments. This project presents a system for monitoring forest and its vicinity based on IoT based wireless sensor network technology. The need to be able to accurately monitor forest cover and quality is crucial to understanding the costs of deforestation. The monitoring of forest and the surrounding area can, however, still is considered an open research problem due to its substantial vast area. Even though sufficient manpower has been deployed, it is inefficient as it could be life-threatening. This project is an attempt to prevent forest mishaps, the intrusion of animals in the surrounding forest areas, illegal activities in the forest by using wireless sensor technology and eliminating manual power to the highest possible extent.Keywords:
Tilt Sensor, Temperature Sensor, Vibration Sensor, Arduino Uno, Wifi ModuleAbstract
Implementation of Kogge Stone Adder for Signal Processing Applications
A.Abinaya, M.Maheswari
DOI: 10.17148/IJARCCE.2019.8528
Abstract
Design and Implementation of a Planar MIMO Antenna for LTE-Applications
D. Stephy Angel, N.R.Nagarajan, U.Surendar
DOI: 10.17148/IJARCCE.2019.8529
Abstract:
Modern communication systems demand the use of antennas that are light weight, easy to excite and performance over wide range of frequencies. In addition to that, there is a need to implement antennas that have high gain and flexibility. Moreover using two or more antennas to cover various frequency bands will increase the system cost. This leads to the development of MIMO antenna which consists of the micro-strip patch. The main objective of this paper is to design a MIMO antenna which has four radiating elements that are separated by placing 2 L-shaped metallic structures and a Slotted Ground Plane which reduces the correlation coefficient between them. Mutual coupling is reduced by applying the polarization diversity which is achieved by placing the elements orthogonal to each other. Since the gain is more than a single element and gives multiple frequency bands, makes it suitable for LTE applications.Keywords:
MIMO; Correlation; Mutual Coupling; Polarization Diversity; SGP; Micro strip; LTEAbstract
Short Circuit and Contingency Analysis Implementation for IEEE-14 Bus System using Mi Power Software
Mr.A.Prabhu, Mr.A.Subramaniya Siva
DOI: 10.17148/IJARCCE.2019.8530
Keywords:
IEEE 14 bus, Contingency Analysis, Mi Power Software 9.1Abstract
Smart Shoppe Trolley
R.Balamurugan, N.R.Nagarajan
DOI: 10.17148/IJARCCE.2019.8531
Abstract
Design of Active Inductor Based Tunable Low Noise Amplifier (LNA)
V.Subhashini, Dr.M.Maheswari, A.Abinaya
DOI: 10.17148/IJARCCE.2019.8532
Abstract: In this paper, we proposed the design of active inductor based tunable Low Noise Amplifier. The circuit consists of an efficient active inductor. The performance of LNA is validated by its S-Parameter analysis and Noise Figure (NF). In order to decrease the silicon area and to enhance the Quality factor (Q) of the LNA, the efficient active inductor is proposed and its performance is determined through post layout simulation using ADS tool. The designed active inductor based tunable LNA is operated in lower band frequency ranges from 3-5 GHz. The designed LNA operates at supply voltage of 1.2V. The proposed active inductor was designed by using a 180nm CMOS technology, which gives improved quality factor as high as 30 with a 7.9nH at 4GHz. The proposed LNA shows up to 47% improvement in gain and up to 43% improvement in Noise Figure. The proposed LNA shows better performance for S-parameter measurements.
Keywords: Ultra Wide Band (UWB), Noise Figure (NF), Low Noise Amplifier (LNA), Active Inductor (AI), Complementary Metal Oxide Semiconductor (CMOS)
Abstract
Design of CPW Antenna for Future Wireless Application
S.Monisha, U.Surendar
DOI: 10.17148/IJARCCE.2019.8533
Abstract
A CPW-Fed Metamaterial Loaded Monopole Antenna for Multiband Operation
S.Praveena, R. Samson Daniel
DOI: 10.17148/IJARCCE.2019.8534
Abstract:
The hexagonal shaped patch antenna loaded with hexagonal complementary split ring resonator is presented for multiband characteristics. The better impedance matching is achieved by employing the HCSRR, the metamaterial element in the main radiating patch. The proposed antenna resonate at 2.1 GHz, 6.5 GHz,10 GHz frequency bands due to the loading of metamaterial element Hexagonal Complementary Split Ring Resonator (HCSRR). The entire size of the antenna is 20 × 21 × 0.8 mm3. The dielectric material used for fabricating the antenna is FR-4 having the dielectric constant of 4.4 (εr) respectively. The proposed antenna offers better impedance matching, multiband and good radiation pattern characteristics. Parametric study is done for various width of HCSRR slots and by split gap for scrutinizing several characteristics of the proposed antenna. The HCSRR offers negative permittivity characteristics by its pass band behavior. The designed antenna is desirable for L, S and C band applications.Keywords:
Multiband, HCSRR, Negative Permittivity, MetamaterialAbstract
A Dual Band Elliptical Antenna for ISM and WIMAX Application
D.Stephy Angel, M.Karthick, J.Roselin Suganthi
DOI: 10.17148/IJARCCE.2019.8535
Abstract
Emergency Tracking of the Heart Patients
Pooja P.Nemade, Dr. G.A.Kulkarni
DOI: 10.17148/IJARCCE.2019.8536
Abstract: The author is developing an ECG monitoring device that can be used by non-technical users in need of health monitoring and is integrated with a broader internet-of-things is being taken to a greater extent. Along with ECG monitoring it also sends the GPS location to the medical experts so that in case of urgent medical assistance the same can be reached out as soon as possible. The techniques used here are using discrete electronic components and a custom PCB. The live data can be received from the patient's body and will be transmitted at the health care where the GPS location of the patient can be traced by the doctor. We gave a thought to build this device so that the data collection can be stored at the doctor's end and it can also provide urgent medical attention without which patients can have fatal incidence. There are many similar devices in the market but ours is the cheapest ensuring even the common people can afford it. It aims to be used by the people in areas where medical assistance may not be readily available. Keywords: Wireless ECG monitoring system, Wearable monitoring system, Bluetooth modem, USB, GPS tracker, android phone
Abstract
Realization of a Smart Aquaponics System: A Closed - Loop System
Kushal S, Honnu S, Sindhu R
DOI: 10.17148/IJARCCE.2019.8537
Abstract
Expression Invariant Face Recognition Using Convolutional Neural Networks
Minu Correya, Dr. Thippeswamy G
DOI: 10.17148/IJARCCE.2019.8538
Abstract: For the past few decades, one of the most extensively studied topics under computer vision is face recognition. This technology has many applications in real life. However, the performance of a face recognition system suffers with variation in lighting, pose and facial expression. Out of these major concerns faced by the recognition system this paper mainly focuses on the impact of expression variation in recognition systems. Facial expression changes have a negative effect on the accuracy of recognition of a face recognition system. Hence this paper proposes an expression invariant face recognition technique using convolutional neural network. Keywords: Face Recognition, Expression Invariant, Convolutional Neural Networks, Deep Learning
Abstract
Transformation through Communication System the Step in Sugar Industries Domain
Pratibha M. Deshmukh, Dr. Pallavi P. Jamsandekar
DOI: 10.17148/IJARCCE.2019.8539
Abstract
A Surevey on Ultra Wide Band and Narrow Band Low Noise Amplifiers for Wireless Transceivers
T.Muruganantham, Dr.M.Maheswari
DOI: 10.17148/IJARCCE.2019.8540
Abstract:
This paper presents the survey of the design of Low Noise Amplifier (LNA) for different wireless applications. This paper focuses diverse design techniques and new architectures in the design and implementation of low noise amplifier such as self-biased, forward bias, common source cascade, Cascode, body bias and LNA based on dual resonance techniques. These design methodologies are serving to reduce the power consumption and enhance the performance such as gain and noise factor in wireless applications. In this paper, recent design methodologies of different LNA is meticulously analyzed and new design method will be proposed to enhance the performance of the LNA.Keywords:
Cascade, Cascode, CMOS, LNA, Low Power And Low NoiseAbstract
Development of a High Resolution Imaging System at 635 nm and 840 nm
Roshan K. Borase, Kartik Shrivastav, S.L.Nalbalwar, Roshan Makkar
DOI: 10.17148/IJARCCE.2019.8541
Abstract: This Optical Coherence Tomography (OCT) is a non-invasive technology which is used in medical and non-medical applications to produce high-resolution images. It provides the cross-sectional images of an object in real time. It is based on low coherence inter ferometry to get the depth resolved information of the sample. The depth of imaging is in millimeter range with the resolution in the micrometer range. The broadband source of light is split by the beam splitter and directed to the sample arm and reference arm respectively as is the case in Michelson’s interferometer. The CCD photo-detector used in the NIR spectrometer detects the interference produced by the backscattered light. The Matlab script is used to convert this backscattered data into an image pertaining to one axial scan (A-scan). Final 2D/3D image is constructed by performing A-scans at various points of the sample in the XY plane.
Keywords: Matlab, Michelson Interferometer, OCT, Photo-Detector, Reference Arm, Sample Arm, etc
Abstract
Challenges in E-Marketing Adoption Among Small Businesses in the Hospitality Industry in Kenya
Charles Owuor Omoga
DOI: 10.17148/IJARCCE.2019.8542
Abstract:
Small businesses appear to be slow in adopting e-marketing. This study sought to investigate the challenges faced by small businesses in adoption of E-marketing. Specifically, this study sought to determine the relationship between security concerns and adoption of E-marketing and to determine the relationship between perceived cost of e-marketing technology and adoption of E-marketing among small businesses in the hospitality industry in Kenya. A cross sectional survey design was employed. Stratified random sampling method was used to generate the study sample of 115 small businesses, out of which respective owner-managers responded. The study used structured self administered questionnaire to collect primary data while secondary data were collected via relevant publications. Instrument reliability assessment was confirmed using cronchbas alpha while validity was confirmed using content and construct validity testing. The data was analyzed using descriptive and inferential statistics using Partial Least Squares-Structural Equations Modeling implemented in WarpPLS v.5 software. The results show that a negative relationship exists between Security concerns and e-marketing adoption (β= -0.158, p= 0.047). The results also show a negative relationship between perceived costs and e-marketing adoption (β= -0.260, p= 0.002).This study recommends the provision Information Technology security systems to prevent spy ware, viruses and hackers and hence improve security of the Internet and provide relatively affordable hosting services for small businesses. The policy makers should also play an active role to ensure that the cyber laws effectively regulate online transactions and protect against virtual theft and hacking. The Vendors of E-marketing applications should also create awareness among small businesses on the advantages of e-marketing and especially on newer technologies like the provision of Software As A Service (SAAS) using cloud technologies. This may reduce the cost of adoption of e-marketing among small businesses that are resource constrained. The Government should also invest in the necessary I.T. infrastructure to allow E- marketing and payment services to be conductedKeywords:
E-marketing, Small businesses, Adoption, Information Systems, Cost, and Security concernsAbstract
Social Network Analysis
Susha Jain, Mahaveer Jain, Balasubramani R, Vasudeva Pai
DOI: 10.17148/IJARCCE.2019.8543
Abstract:
Social Network Analysis is an action of making inquiries about social network, which is also termed as social structures through the application of networks and Graph theory. To manage the social networks, different methodologies have been proposed to break down them. What has not been done is to appropriately and productively imitate, govern and utilize the social network. In this paper we are analyzing the twitter revolution data set. It is a social network which is a combination of many separate networks which captured a certain kind of interaction between individuals. We are applying island method and centrality concept on the data set. Here we can observe how the information diffusion happens among the individuals and also the actor and communities who plays the major role in process can be noticed.Keywords:
Twitter, Facebook, Google+ and LinkedIn, Organizational Network Analysis [ONA]Abstract
Integrated E-Marketing Adoption Model for Small Businesses
Charles Owuor Omoga
DOI: 10.17148/IJARCCE.2019.8544
Abstract:
Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and service .The objective of the study was to develop a model for studying e-marketing adoption among small businesses. A cross sectional survey design was employed on a target population . Stratified random sampling method was used to generate the study sample. Structured self administered questionnaire was used to collect primary data while secondary data were collected via relevant publications and reports. Instrument reliability assessment was confirmed using cronchbas alpha.The data was analyzed using descriptive and inferential analysis using WarpPLS v.5 software. The results show that the predictive relevance of the model (Q2 ) was strong at 47.5%.Policy makers may find these results useful for future policy formulations regarding adoption of e-marketing among small businesses.An Integrated Model for E-marketing adoption was realized in the study that could enhance innovations on small business adoptionKeywords:
Small businesses, Institutional theory, E-marketing adoption model, Hospitality industryAbstract
Single - Phase VSI System Controlled by Suitable On - Board Microcontroller
T. Muruganantham, K. Vigneshwaran, S.Syed Husain
DOI: 10.17148/IJARCCE.2019.8545
Abstract: In recent years, single-phase Voltage Source Inverter (VSI) is extensively used in various applications such as single phase uninterruptible power supply for the residential consumers, single phase micro-grid single-phase roof-top solar energy conversion system and single-phase Vehicle to Grid (V2G) system. This paper concentrates on the development of single-phase VSI system controlled by suitable on-board microcontroller. Nowadays, dedicated real time controllers such as ACE 1103, 1104 controllers, MICROLAB box, PXI platform etc. are developed as a general purpose controller panel/board. These controllers are mainly used in the laboratory for real time testing, research and development activities. But, in the applications mentioned above, the system with dedicated controller is required. Therefore, the development of the above said power electronics system plays an important role in the field of electrical power industry[1].
The VSI generates harmonics in its output voltage. The harmonics generation should be limited to avoid poor load performances. Lower order harmonics mainly contributes to the distortion effects in the system. On the other hand, the higher order harmonics effect less distortion in the system. Therefore, high switching frequency pulse width modulation techniques such as Sine-Triangle Pulse Width Modulation (SPWM) and Space Vector Pulse Width Modulation (SVPWM) are commercially used to remove the distortion effect created by the lower order harmonics. In this case, system efficiency is reduced due to higher switching losses by adopting these high frequency Pulse Width Modulation (PWM) techniques. Therefore, lower switching frequency Selective Harmonic Elimination PWM (SHEPWM) technique is considered in this paper to get the double benefits of lower switching losses and the removal of lower order selective harmonics.
Keywords: Sine-Triangle Pulse Width Modulation (SPWM) and Space Vector Pulse Width Modulation (SVPWM), Pulse Width Modulation (PWM)
Abstract
Dossier of Disaster Recovery in AWS and Azure
Prasthutha, Chandrahasa Rai, Rashmi Naveen
DOI: 10.17148/IJARCCE.2019.8546
Abstract:
Disaster recovery is a field of security planning that targets to protect an organization from the aftermath of significant adverse events. In this paper, we will do the scrutiny of Disaster Recovery methods in Amazon Web Service and Microsoft Azure. For any user the application developed must be available at all time. Application that is not available for a second may cause extensive complication for the business and also ruin the status of the company. For the continuity of any application the company need to have recovery plan. There are numerous cloud providers that offer service called as disaster recovery. Many of the companies get puzzled or bewilder in choosing the right provider that can match their system needs in case of any disaster. We will look forth in this paper that, how a disaster recovery process minimize the impact on the data of the application and in business operation. The management must determine the relevant events that can cause disasters and figure out their impact. They need to be firm with the goals clearly, decide suitable disaster recovery plans to choose the DRP that would be most favorable. The key parameters that need to take into consideration are basic cost, the amount of data transfer and the rate of data storage. To get the rate of uncertainty, we need to get to know the type of the disaster. Disaster maybe caused naturally or by some human errors. Cloud computing has moved to a new level of preparing for IT disasters by furnishing secondary environments for backing up and restoring data and failing over business applications. These disaster recovery resources are worthwhile and straight forward to set things up. Microsoft Azure and Amazon Web Services (AWS) are two of the top providers in terms of disaster recovery solutions currently.Keywords:
Disaster recovery, AWS, Azure, DRP, Cloud ComputingAbstract
A Survey of Various Protocols Over Vehicle Ad-Hoc Network
Monica Varrmaiya, Sushma Kushwaha, Amit Thakur
DOI: 10.17148/IJARCCE.2019.8547
Abstract: Intelligent Transportation Systems (ITS) is a coordinated methodology being created to trade important information to expand the security and proficiency of the road transportation systems. Vehicular Ad hoc Network (VANET), a variation of Mobile Ad Hoc Networks (MANET), is a center component of ITS. IoV offers a couple of advantages, for instance, road prosperity, traffic efficiency, and infotainment by sending best in class traffic information about approaching traffic. Execution of this brilliant ITS for the most part owes to the plan of productive routing protocols in VANETs. The computation of the best course estimates the exhibition of communication while routing protocols deals with communication and routing of the information. Provision of keen communication, requires the examination of routing protocols in VANET. In like manner in this paper, evaluated different sorts of existing routing protocols in VANET, posting their advantages and disadvantages. In conclusion potential inclinations of imminent research connected to VANET routing are discussed. Keywords: Protocol, VANET, ITS, MANET
Abstract
Implementation of OSPF on a Network Using GNS3 Tool
Apoorva N S, Namratha H, Rishik A Sunadoli, Mariya Smitha C, Anil Umesh
DOI: 10.17148/IJARCCE.2019.8550
Abstract: A Computer Network consists of many interconnected nodes, sharing resources linked through communication channels. Routers are placed at the nodes, forwarding the packets in the network. The packets are guided to their destination through the shortest path as defined by the dynamic routing protocol configured on the routers. In this paper, we have considered a network consisting of routers placed at the nodes, linked by serial interfaces. OSPF is configured on the network for the packets to reach the destination through the shortest path. Open Shortest Path First (OSPF) is a dynamic and classless routing protocol. We have used Variable Length Subnet Masking (VLSM), during IP addressing in the network. The network is password protected and encrypted. Any router can be remotely accessed using Telnet. We have used GNS 3 to build the situation and solve the problem. In this paper we also illustrate the setting of CTY, TTY, AUX and VTY password, create interface loopbacks to test the advertisement by OSPF routing protocol configured on each router and other aspects of OSPF routing protocol.
Keywords: Open Shortest Path First (OSPF) routing protocol, Autonomous System (AS), CTY, TTY, AUX and VTY,password protected, VLSM (Variable Length Subnet Masking), encrypted and GNS 3
Abstract
Design of Efficient Fused Floating-Point Units for DSP Applications
Bhagirth Sharma, Mrs. Suman Dagar
DOI: 10.17148/IJARCCE.2019.8551
Abstract:
The fused floating point units are advantageous for various Digital Signal Processing (DSP) applications such as butterfly operations of Fast Fourier Transform (FFT) and Discrete Cosine Transform (DCT) and complex multiplication. In this thesis, two floating point fused units are proposed: 1) Floating point Fused dot product unit, 2) Floating point fused add subtract unit. Fused dot product unit performs the multiplication and addition of two pairs of operands. Fused add subtract unit perform the addition and subtraction of same operands simultaneously. In order to enhance the performance for the fused dot product unit, DADDA multiplication algorithm is applied. FDP unit with DADDA Multiplier improved the speed by 61.1 % compared to the FDP unit with Booth multiplier. The fused dot product unit and fused add subtract unit are implemented for single precision and synthesized in 90nm technology.Keywords:
Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Digital Signal Processing (DSP)Abstract
Triangular Waveguide Fed Slot Antenna
Shraddha J. Salve, J. K. Prajapati, S. S. Kakatkar, S. L. Nalbalwar
DOI: 10.17148/IJARCCE.2019.8552
Abstract: Limited literature is available on triangular waveguides and triangular waveguide fed slot antennas, as compared to their rectangular and circular waveguide counterparts. In this paper, simulated and measured results have been presented for a right angled isosceles triangular waveguide fed slot antenna in S band. The antenna has been simulated and then fabricated in aluminium material. Simulated and experimental results show good agreement in resonant frequency. This work can be used in the design of a triangular waveguide fed low cost slot array.
Keywords: Antenna, Slot antenna, Triangular waveguide, Waveguide
Abstract
A Review on Segmentation and Feature Extraction by using LBP and PCA for Brain Tumor Detection in MRI
Navjot Kaur
DOI: 10.17148/IJARCCE.2019.8553
Abstract: Tumor is the premier reason of death in financially created nations and the second most essential reason of death in creating nations. Tumor perceived therapeutically as a dangerous neoplasm, is a broad gathering of a blend of infections, all concerning unregulated cell development. In growth, cells separate and breed generally, framing harmful tumors, and attack adjacent parts of the body. The malignancy may likewise extend to more far off parts of the body through the lymphatic framework or circulation system. Brain tumor is one of the premier explanations behind the ascent in mortality among youngsters and grown-ups. A tumor is a mass of tissue that spreads crazy of the typical powers that manage development. Brain tumors happen when one kind of cell changes from its typical attributes and develops and duplicates in an unusual way.
Keywords: Tumor, Brain Tumor, Segmentation, Local Binary Pattern, Principal Component Analysis
Abstract
A Practical Approach for Objects Identification in Rgb Colored Image using Segmentation in Matlab Simulation
Diksha, Er. Sheetal Chhabra
DOI: 10.17148/IJARCCE.2019.8548
Abstract:
Object Analysis is one of the great challenges of computer vision. The RGB color models are an additive coloration version in wherein red, green and blue light are added collectively in various way to reproduce a large array of colors. The primary goal of the RGB color model is for sensing, representation and show image in electronics systems like televisions and computers, though it’s been used in conventional images. There are general phases that define the flaws the working on these Techniques. The proposed work has been explained the concept of the Image Segmentation means to analysis object in RGB colored and generate performance parameter based on the results or output. The analysis of the different objects and quality of image can be implement using image segmentation process. Keywords: Image Processing, Segmentation, Computer VisionAbstract
A Review: Segmentation Based Objects Analysis in RGB Colored Image using Matlab Simulation
Diksha, Er. Sheetal Chhabra
DOI: 10.17148/IJARCCE.2019.8549
Abstract:
Object Analysis is one of the great challenges of computer vision. The RGB color models are an additive coloration version in wherein red, green and blue light are added collectively in various way to reproduce a large array of colors. The primary goal of the RGB color model is for sensing, representation and show image in electronics systems like televisions and computers, though it’s been used in conventional images. There are general phases that define the flaws the working on these Techniques. The proposed work has been explained the concept of the Image Segmentation means to analysis object in RGB colored and retrieve the edge of the image through image segmentation. The analysis of the different objects and quality of image can be implement using image segmentation process. Keywords: Image Processing, Segmentation, Computer VisionAbstract
Selection of ERP in Deterministic Unpredictable Scenario
G. R. Gosavi, Dr. V. M. Thakare
DOI: 10.17148/IJARCCE.2019.8554
Abstract:
ERP, The Enterprise resource planning is a planning philosophy, enabled with software that attempts to integrate all the business processes of various departments and functions across a Company on to a Software system that can serve the needs to execute the transactions of the tightly integrated departments. Determinism is the incidental concept that states that every happening and choice is a consequence of and is eventually determined by archived but live causes and reasons. Determinism is often taken to incorporate liberty of selection because it embodies the principal of past actions and future results. In mathematics all deterministic processes are predictable, you get to understand the next state, given the current state, and then if owned a strong computing resource, one ought to produce future step derivations. One example is count on the constraints laying precisely for an ERP today and has prediction of ERP selection suiting the constraints in unpredictable scenario. For an archived set of an ERP, or numerous ERPs, a set of observations on a variable measured at successive points of time are recorded for performance and implementation progress, then for every future procurement and deployment of that ERP, the recorded trend may guide the future decisions. The polynomial representation of coded ERP constraints based matrix can be simplified and solved using least squares method of regular moving averages. The trends in history can predict the trends and success of ERP in present or future in mathematically modeled processing form. This paper analyses the simulation logic with a practical case study, in deterministic unpredictable scenario.Keywords:
MMS, POMS, Inventory Management System (IMS), Human Resource Development Management System (HRDMS), Payroll Management System (PMS), Electrical Management System (EMS)