VOLUME 8, ISSUE 8, AUGUST 2019
Development of an Automated Temperature Controller and Smoke Detection System
Tanvir Zaman Khan, Subrata Bhowmik, Md. Osman Ali
Stabilize IoT Blockchain using Smart Rewarding Mechanism: Incremental Block Reward
Bahaedinne Jlassi, Liuyang Ren, Scott Chen, Fehri Bilel, Ahmad S. Omar
Proof-of-CAPTCHA: A True ASIC-Resistant Consensus
Bahaedinne Jlassi, Liuyang Ren, Scott Chen
The Role of E-Marketing in Sales Enhancement For (Lg) Arab East (Levant) – Case Study
Odai enaizan, Ahmed Saleh Al-Sukar, Emad Ali Kasasbeh, Bilal Eneizan
Two Way Wireless Mesh Network Data Sharing between ESP8266 without Internet
Sujay A. Alaspure, Rahul N. Borse, Prof. Vikramsingh R. Parihar
A Survey on Computer and Network Security Attacks
Eng. Anwar J. Alzaid
User Activities and Location Based Authentication in IoT Automation
Sangeeta Kol, Prof. Deepak Pranjpe
Improved Reversible Image Encryption Data Hiding Algorithm and BHSEA
Swapnil Singh Thakur, Prof. Amit Thakur
Development of Energy Efficient Wireless Body Area Network (WBAN) based on Modified CPMAC Protocol
Shraddha Nagar, Navneet Agrawal
Crypto-Currency Price Prediction using Machine Learning
Kathyayini R S, D G Jyothi
Alert System for Immediate Emergency Services
Akshata Komar, J Girija
Motion Detection and Prediction Using ML: Logistic Regression
Vishesh S, Anil Umesh, Varnitha N, Y Ajith Rao
Design and Simulation of Curved Edge Patch Antenna for Ka Band Application
Parveen Kour, Harish Kumar, Saleem Khan
Design and Implementation of IoT based Smart Horticultural Crop Real Time Monitoring System
Nitin Kothari, Dr. Sunil Joshi
Abstract
Development of an Automated Temperature Controller and Smoke Detection System
Tanvir Zaman Khan, Subrata Bhowmik, Md. Osman Ali
DOI: 10.17148/IJARCCE.2019.8801
Abstract: Automatic Temperature Controller and Smoke Detection (ATCaSD) system, as an embedded mechanism, is quite interesting, yet essential in the modern era. It is expected to be very handful in the tropical and sub-tropical countries, where temperature always remains high. In addition, the use of minerals, such as kerosene, coal, or forested resources, like woods, as fuel in home and in factories often generate high temperature that eventually hampers the well-being and health of the people, involved in those works. ATCaSD is a micro-controlled automatic system, designed primarily to control the increasing temperature within a defined room-environment as well as to detect the smoke to prevent suffocation and to re-fresh the air quality. Keywords: Automation, Smoke Sensor, Temperature Sensor, Embedded System, Temperature Controller
Abstract
Stabilize IoT Blockchain using Smart Rewarding Mechanism: Incremental Block Reward
Bahaedinne Jlassi, Liuyang Ren, Scott Chen, Fehri Bilel, Ahmad S. Omar
DOI: 10.17148/IJARCCE.2019.8802
Abstract: Bitcoin’s block reward is dependent on miner hardware profiles such as computation capacity and mining hardware identities, therefore, incentivizing miners to upgrade mining rigs in order to mine more blocks and maximize the payoff. As a result, miners who refuse to upgrade mining hardware suffer decreasing payoff because the mining difficulty increases automatically as the computation power of the entire network grows. However, this phenomenon is highly counter-productive in Internet-of-Things (IoT) networks, where CPUs are embedded into various devices and hardware upgrading require non-trivial efforts, in addition to the constrained computational and power capabilities. As a result, we propose the Incremental Block Reward (IBR) to encourage miners to reuse mining hardware, thereby helping stabilize the network, reduce energy consumption, and encourage new miners (i.e. more devices) to join. The simulation results show IBR facilitates even wealth distribution and promotes more fair and long-term mining establishment. Keywords: Internet-of-Things, Blockchain, Mining Reward, Hardware Upgrade, Monte-Carlo Simulation
Abstract
Proof-of-CAPTCHA: A True ASIC-Resistant Consensus
Bahaedinne Jlassi, Liuyang Ren, Scott Chen
DOI: 10.17148/IJARCCE.2019.8803
Abstract
The Role of E-Marketing in Sales Enhancement For (Lg) Arab East (Levant) – Case Study
Odai enaizan, Ahmed Saleh Al-Sukar, Emad Ali Kasasbeh, Bilal Eneizan
Abstract: The main aim of this paper is to study the role of E-marketing in sales enhancement in Jordan. A questionnaire was adopted from previous studies and distributed among managers, assistant or deputy director, and head of division at (LG) Levant company in Jordan. The sample of the study consisted 108 respondents. SPSS software was used to analyze the data. The study concluded a number of results achieved (LG) Levant company in Jordan (= 0.05 α) for electronic marketing in its dimensions (Facebook, Twitter, mobile applications) on the activation of sales with indicators (purchase percentage, repeat purchase) in Jordan. The researchers also recommended the need to work to achieve success. And the need to develop the concept of solving the problem of sales in (LG) Levant company in Jordan.Â
Keywords: E-Marketing, Facebook, Twitter, Mobile Applications, Sales Activation, Purchase History, Repeat Purchase, Jordan.
Abstract
Two Way Wireless Mesh Network Data Sharing between ESP8266 without Internet
Sujay A. Alaspure, Rahul N. Borse, Prof. Vikramsingh R. Parihar
DOI: 10.17148/IJARCCE.2019.8805
Abstract: Internet of Things is one of the hottest topics in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been discuss for decades that haven’t been put into use in large scale, can make a difference when it comes to the network in the IoT world today. This paper gives insight into how IoT networking is a unique combination of wireless personal area networks. This paper discusses the design of an automatic wireless mesh networking which can run without any base server or an internet connectivity. These devices are capable of creating its own Wi-Fi hotpots of radius of 100 meter. The aim of this technology is to gather the traffic data, environmental data within a city locally without the cost of any networks. Keywords: ESP8266, Internet of Things, IOT Networking, PIR motion sensor, Wireless Mesh Network
Abstract
A Survey on Computer and Network Security Attacks
Eng. Anwar J. Alzaid
DOI: 10.17148/IJARCCE.2019.8806
Abstract:
Computer networks and information systems are used in almost all modern organizations, and the assurance of their safety and security is critical to the organization business continuity. Network administrators and security professionals deploy security tools and equipment to ensure network security and protect organization assets. Hackers and cybercriminals use malicious methods and tools to initiate network attacks and gain access to target organization assets. This paper defines different types of network attacks and their classes also explain the stages and steps of network attacks.Keywords:
Network Security, Data Integrity, Encryption, Authentication, Authorization, Nonrepudiation, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)Abstract
User Activities and Location Based Authentication in IoT Automation
Sangeeta Kol, Prof. Deepak Pranjpe
DOI: 10.17148/IJARCCE.2019.8808
Abstract: Recently, advanced technologies in the semiconductor process have a great developed with nano technology. It enabled cost effective solutions to directly integrate wireless network connectivity with embedded processors and sensors. From the improved technology, IoT lead to great interest in the field of information and communication technology, it is defined as integrated, fused and networked interconnection with objects. Security challenges in IoT include privacy, authentication and secure end-to-end connection. In addition, with the presence of multiple smart home standards currently used in market, any security scheme needs to consider inter-compatibility among the multiple standards. We analyzed and surveyed critical issues for technologies and securities of IoT, and discussed the applications and challenges of smart home network and related to IoT systems. Finally, to provide secure authentication procedure, we proposed the security protocol in IoT service in this paper which is based on user activities and locations.
Keywords:
Abstract
Wireless Cradle
Dinesh Bhalerao, Aditya Kumbhar, Aditi Dhake
DOI: 10.17148/IJARCCE.2019.8809
Abstract: With fast growing pace of life and nuclear families working women find it difficult to come home and cradle their infants at night. Keeping a continuous watch on the baby and cradling him every time is not possible. We propose a remote operated cradle with a vertical movement that will give the effect of a mother’s lap. The ZigBee transceiver will be used in the remote. The motor interfaced with the PIC microcontroller will cause the Vertical movement of cradle. The cradle has the provision of stopping at a certain angle. The cradle incorporates a baby monitoring system. The cries of the baby will be Detected at the remote and the voice of the mother will be heard at the speaker in the cradle. It also has Music player Keywords: Zigbee, Cradle shape, MP3 Player, Motor Driver
Abstract
Simulation Study of High Performance Low Pass filter at Nanoscale
Sarah Khwaja
DOI: 10.17148/IJARCCE.2019.8810
Abstract:
This paper presents a design and simulation study of high performance  low-pass filter based on Cascode OTA using 0.9 V. The cascode OTA is used as the active building block. It is a new class of Operational Amplifier (OP-AMP). It has flexibility and tunability unlike Op Amp. Further, CNT technology is used along with MOS technology  to  design and simulate proposed  structure at 45nm technology node. The proposed structure can be used. Figure 2 shows the schematic diagram of one of the important application of CNT, that is, Carbon Nanotube Field Effect Transistor (CNTFET). In a CNTFET, the channel is made up of parallel combination of SWCNTs. The source and drain regions are highly doped regions and the CNT channel is undoped. The important advantages of CNTFET include 1D ballistic transport of charge carriers, high mobility, large drive current and very low power consumption for low power applications. It is observed that the proposed LPF is also consuming low power of 28.43 µW.Keywords:
CMOS, CNTFET, DC Gain, Cascode -OTA, Power consumption, Filters, LPFAbstract
Improved Reversible Image Encryption Data Hiding Algorithm and BHSEA
Swapnil Singh Thakur, Prof. Amit Thakur
DOI: 10.17148/IJARCCE.2019.8811
Abstract:
Describes the thought of Reversible Information Hiding (RDH) methodology is predicated on steganography. Recently loads of attention is paid to RDH in encrypted image. Security ought to be provided for the transmission of confidential and sensitive information over the network and insecure channel, loss in data happens. To secure the data, code the wrap information and introduce is secret information into cover media. therefore the protection of image and embedded data is maintained, Since RDH manages the outstanding secured property, and thus the first image are usually recovered with none loss, Reversible Information Concealing (RDH). At intervals the planned rule, bar chart Shifting (HS) is used for RDH, and thus the BHSEA methodology is employed for encryption. The BHSEA methodology performs four processes for encoding; Reversible info concealing can be a kind of info concealing techniques whereby the host image is usually recovered specifically. Being lossless makes this methodology acceptable for medical, military applications and cloud storage. In cloud storage, a content owner can code an image to preserve his/her privacy, and transfer the encrypted information onto cloud. Reversible information activity in encrypted image, which could recover the primary image with none distortion from the marked image once the hidden data, are extracted. Existing rule consists of varied hierarchical steps for the data embedding and thus the encryption. Therefore, the planned rule area unit usually acceptable for the stratified access system, where the permission is granted in keeping with the numerous access rights and planned algorithmic program up strength and authentication of image information concealing. Generation of encrypted image information, image information activity in encrypted into cover image, image information extraction and image information recovery. Projected technique may be a traditional BHSEA approach. n this process PSNR value is high in BHSEA compare to RIEDHA.Keywords:
Reversible data hiding, BHSEA, lossless data hiding, Image encryption, PSNR, MSE, data hiding capability, HSAbstract
Development of Energy Efficient Wireless Body Area Network (WBAN) based on Modified CPMAC Protocol
Shraddha Nagar, Navneet Agrawal
DOI: 10.17148/IJARCCE.2019.8812
Abstract: A radio frequency based wireless technology through which the nodes are interconnected with sensor or actuator capabilities placed within or on the human body is called WBAN (Wireless Body Area Network). A network that is designed to sense the conditions of human body and pass the sensed information to base station is called wireless body area network. Due to such unique property of the network channel sensing and energy consumption are the major issues. In this research, channel sensing in wireless body area network is studied. The protocol called ELBPQA is studied which assigns priority to the data for the transmission. The ELBPQA protocol assign priority to data packets but clocks of the sensors are not synchronized which affect its efficiency. To improve performance of ELBPQA protocol, the clocks of sensor nodes are synchronized using time lay technique. The improved ELBPQA protocol and already existing ELBPQA protocol, are compared in terms of throughput, packet loss and number of dead nodes. The performance of proposed protocol is high as compared to ELBPQA protocol. It is analyzed that when the clocks of sensor nodes are synchronized then the Packet Delivery Ratio is optimized up to 8%, power consumption is reduced by 5%, delay is reduced up to 5%Â and throughput is improved by 10%. Keywords: Time-lay, Clock Synchronization, ELBPQA, WBAN
Abstract
Crypto-Currency Price Prediction using Machine Learning
Kathyayini R S, D G Jyothi
DOI: 10.17148/IJARCCE.2019.8813
Abstract
Alert System for Immediate Emergency Services
Akshata Komar, J Girija
DOI: 10.17148/IJARCCE.2019.8814
Abstract
Present Concerns and Future Prospects of Digital Forensics
Shubham Kumar
DOI: 10.17148/IJARCCE.2019.8815
Abstract: Given the consistently expanding predominance of innovation in present day life, there is a comparing improve in the probability of advanced gadgets being relevant to a criminal examination or common suit. As an immediate outcome, the quantity of examinations requiring computerized scientific ability is bringing about gigantic advanced proof excesses being experienced by law requirement organizations all through the world. It tends to be foreseen that the quantity of cases requiring computerized criminological examination will incredibly increment later on. All things considered, each case will require the examination of an expanding number of gadgets including PCs, cell phones, tablets, cloud-based administrations, Internet of Things gadgets, wearables, and so forth. The assortment of new computerized proof sources presents new and testing issues for the advanced agent from an ID, procurement, stockpiling and investigation point of view. This paper investigates the ebb and flow provokes adding to the excess in computerized legal sciences from a specialized stance and diagrams various future research points that could incredibly add to an increasingly productive advanced measurable procedure.
Keywords: Digital Evidence Backlog, Digital Forensic Challenges, Future Research Topics
Abstract
Motion Detection and Prediction Using ML: Logistic Regression
Vishesh S, Anil Umesh, Varnitha N, Y Ajith Rao
DOI: 10.17148/IJARCCE.2019.8816
Abstract
Design and Simulation of Curved Edge Patch Antenna for Ka Band Application
Parveen Kour, Harish Kumar, Saleem Khan
DOI: 10.17148/IJARCCE.2019.8817
Abstract: The aim is to study and design various rectangular microstrip patch antennas for wireless communication systems and to study the effect of various antenna parameters like Patch Length (L), Patch Width (W), substrate material, relative dielectric constant, substrate thickness etc. In the proposed research work antenna is designed and simulated to work in Ka band i.e. 26 GHz to 40 GHz. Various substrate material such as arlon, roger, and Al2O3 were considered for design process. Two resonant frequencies were observed in case of roger substrate and multi frequency bands are observed in case of Al2O3 substrate. Keywords: Microstrip, Patch Length (L), Patch Width (W), Substrate Material, Relative Dielectric Constant
Abstract
Design and Implementation of IoT based Smart Horticultural Crop Real Time Monitoring System
Nitin Kothari, Dr. Sunil Joshi
DOI: 10.17148/IJARCCE.2019.8818
Abstract:
This paper presents the design and implementation of a smart horticultural crop real time monitoring system using a microcontroller (ATmega 2560 Mega) which can be monitor from any corner of the world by using GSM network and internet. Horticulture fruit are picked at wrong stage of maturity may give poor quality and not stored for longer period. The ripening of a fruit is expressed in terms of change in its physical parameter like colour, softness, textural properties etc. The final stage of fruit ripening is to attend a maturity level of all its physical parameter as an indication for harvesting the fruit and vegetable crop. The sensing parameters in the proposed design are colour, firmness, temperature & humidity. An embedded program is developed based on decision making algorithm which compares the process values of the sensor output with the reference value of fruit maturity for this we have design. The real time testing on guava fruit shows 99.66% accuracy of the proposed system and the collected data from various sensors through the microcontroller board made available using an online IoT analytics tool known as Thingspeak and display sensor data on mobile screen. This develop system model can be used in farms, as a handheld portable unit to check the fruit maturity status without cutting the fruit from tree. Keywords: IoT, GSM, Maturity indices, ThingSpeak,MIT app inventor