VOLUME 8, ISSUE 9, SEPTEMBER 2019
BA/BI and ML in Automobile Industry
Shruthi K Murthy, Shreya N, Taqiya Sarvath, Michelle Lopez J
Wireless Communication Technology using Li-Fi
Uday N. Kandalkar, Atul G. Pagrut, Akash M. Shukla, Gajanan D. Ramteke, Prof. Vikramsingh R. Parihar
A Survey on Thermal Aware Routing Protocols in Wireless Body Area Network
Hagar Mahmoud, Etimad Fadel
A Clustering & Systematic Scheduling Approach for Data Dissemination in VANET
Amrish Istari Ramteke, Neetesh Raghuwanshi, Bharti Chourasia
Flower Classification using MobileNet: An Optimized Deep Learning Model based on CNN
Tanuja Singh Dubey, Vinod Singh, Pradeep Tripathi
Easy Complaint with Google Cloud Platform
Nimish L, Santosh Shet, Shruthi NM
Architecture of Online Multiplayer Gaming Environment
Suyash Kanungo
Logistic Regression Model to Predict CKD
Shruthi K Murthy, Anubhav V, Pranav P, H Rohith Singh
Design and Analysis of Permanent Magnet Brushless DC Motor for Solar Vehicle using MATLAB
Mukesh K Kumawat, Prakash C Patil, Vijay V Autade
Back Propagation Approach for Image Contrast Enhancement
Shavneet Kaur, Jaspreet Kaur, Sukhmanpreet Singh
Development of Robust and Efficient Routing Scheme for The Extended Network Lifetime in Wireless Sensor Networks
Aaliya Khan, Navneet Agrawal
Active Resource Allocation with coordinated Base station for Multiuser Networks
Dr.K.Chanthirasekaran, M.Jansi Rani
Cloud Based Object Oriented Requirements Engineering
Anandi Mahajan, Dr. S. N. Agal
Design of a Multi-Sensor IoMT Based Secured and Alert Health Monitoring System
Surabhi Joshi, Sunil Joshi
Abstract
Dealing with Large Solutions using ‘Scaled Agile Approach’: A Practitioners Slant
Dr. Jitesh R. Neve
DOI: 10.17148/IJARCCE.2019.8902
Abstract: As a process setting practitioner of software process, many times I came across some disputes. Sometimes our patron party (client) not able to explicate what precisely he is expecting. Maybe sometimes people who faces customer (business analyst) fail to articulate requirements, which is fairly parallel to customer requirement. We understand that definitely there are some problems at both the ends like- novice user, lack of solid visualization power of business analyst, less skilled people, unstable requirements, etc. If we do root cause analysis, we’ll find ‘Agility’, which fits to incremental and rapid change of software requirements and technology under development. Recently, in any IT industry, it is not that stress-free stuff to carry on delivering solutions and meet ever-changing requirements of client without a suitable plan. Commonly, scrum practice is applicable in majority of IT organizations who clutch client centric culture. Going one level up, involvement of more than one (cross track) teams complicates monitoring deliveries and leads to dependency. So Scaled Agile is applicable at the level of ‘Program Management’. When we think of a large solution, we would need a more refined model to mitigate the risks as well as challenges. Right now there is no distinguished model exists which will be expedient specifically for Large Solutions at the program management level. I have tried to put the ‘Scaled Agile’ framework especially suitable for ‘Large Solutions’ through this paper. I have tried to present a practitioners point of view, especially biased on the productivity therefore the paper titled as ‘slant’. Keywords: Agility; Daily Scrum Meeting; SAFe; Large Solution SAFe; Scaled-Agile; Scrum; Agile Approaches; Sprint; Lean; DevOps; PI Planning; Release Train; IP iterations; Large Solution; Solution Train
Abstract
Design and Development of a Serious Mobile Game “MathAventure”
Loubna EL AZIZI
DOI: 10.17148/IJARCCE.2019.8903
Abstract: In this paper we propose a method to motivate students to acquire and consolidate mental calculation skill by using a serious mobile game. We have developed a serious game MathAdventure for Grade 6 students. This game, we can use it on several platforms, Android, IOS or Windows.... It's like Super Mario game where players can try to pick the right answer to arithmetic questions with increasing difficulty. The prototype development process combines instructional system design with the game's development approach. The developed prototype has been successfully tested using the functionality test which has been used to control the stability, game mechanics and integrity of the game elements. Keywords: Serious game; Mobile phone; Math; Video game; Motivation; Student
Abstract
Additive Manufacturing Imad ul Iman Chikkodi
Imad ul Iman Chikkodi
DOI: 10.17148/IJARCCE.2019.8904
Abstract: Additive manufacturing uses data Computer-Aided-Design (CAD) software or 3D object scanners to direct hardware to deposit material, layer upon layer, in precise geometric shapes. As its name implies, additive manufacturing adds material to create an object. By contrast, when you create an object by traditional means, it is often necessary to remove material through milling, machining, carving, shaping or other means. While additive manufacturing seems new to many, it has actually been around for several decades. In the right applications, additive manufacturing delivers a perfect trifecta of improved performance, complex geometries and simplified fabrication. As a result, opportunities abound for those who actively embrace additive manufacturing. Keywords: Additive Manufacturing, 3D Printer, 3D Objects, Filaments
Abstract
IoT use Prevalence and Acceptance Modelling in the Kingdom of Saudi Arabia
Abdulaziz Albesher
DOI: 10.17148/IJARCCE.2019.8905
Abstract:
This work examines and models the acceptance and application of the Internet of Things (IoT) in the Kingdom of Saudi Arabia. It first explains the tremendous potential and impact of IoT on different areas of governance in smart cities, the challenges and the security threats faced. Next, the significant improvements accompanied by the introduction of advanced countermeasure techniques such as Blockchain technology are discussed. It proposes an acceptance model of IoT in Saudi Arabia based on well-renowned information systems theories, namely Diffusion of Innovations (DOI) theory, Technology Acceptance Model (TAM) and The Unified Theory of Acceptance and Use of Technology (UTAUT). The current study adopted a quantitative approach to test the model. Statistical analysis of the proposed model validates the effectiveness of the proposed work in modelling of IoT use prevalence and acceptance.Keywords:
Internet of Things (IoT), Diffusion of Innovation (DOI), Technology Acceptance Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT), Saudi ArabiaAbstract
BA/BI and ML in Automobile Industry
Shruthi K Murthy, Shreya N, Taqiya Sarvath, Michelle Lopez J
DOI: 10.17148/IJARCCE.2019.8906
Abstract
Wireless Communication Technology using Li-Fi
Uday N. Kandalkar, Atul G. Pagrut, Akash M. Shukla, Gajanan D. Ramteke, Prof. Vikramsingh R. Parihar
DOI: 10.17148/IJARCCE.2019.8907
Abstract: Light Fidelity (Li-Fi) is one of the hottest topics in both industry and academia of the communication engineering world. This paper gives insight into how Li-Fi can be used for wireless communication and data transfer. In this paper, we have described a project wherein we are transferring data in the form of audio signals using Li-Fi technology. Keywords: Light Fidelity (Li-Fi), Wireless Communication, Light-Emitting Diode, Infrared-Emitting Diode (IRED)
Abstract
A Survey on Thermal Aware Routing Protocols in Wireless Body Area Network
Hagar Mahmoud, Etimad Fadel
DOI: 10.17148/IJARCCE.2019.8908
Abstract: Wireless Body Area Network (WBAN) is a wireless network of wearable devices in or around the human body to serve a variety of applications. In healthcare, sensors might be implanted in or around the human body to monitor and detect abnormal behaviors. In addition to the resource limitations for WBAN, more challenges are existing when applying WBAN for human body applications as in the medical field. Coming to the safety aspect, a major consideration needed to address the heating effects due to wireless communication which cause damage to the surrounding tissues. Therefore, thermal aware routing protocols were proposed by researchers to consider the temperature of the implanted medical devices while routing. This survey presents a state of are for thermal aware routing protocols as a step for coming research addressing the same issue. It provides a comparison between the existing protocols, to finally list the routing design challenges for future research.
Keywords: WBAN, thermal-aware, routing protocol, hotspot, temperature.
Abstract
A Clustering & Systematic Scheduling Approach for Data Dissemination in VANET
Amrish Istari Ramteke, Neetesh Raghuwanshi, Bharti Chourasia
DOI: 10.17148/IJARCCE.2019.8909
Abstract:
VANETs are an important part of intelligent transport systems. This can be seen as a network of vehicles that communicate autonomously and unequally. The dynamic topology of vehicles leads to an unexpected change in the network topology, as it poses a significant challenge for VANET information dissemination, which is efficient and scalable. The probabilistic clustering and clustering strategy provides a breakdown of the synchronization between space, time, and communication entities, as it adapts better to the VANET-like environment, but increases the load on the network by grouping the same amount together times in the directory network. In this article, we propose our systematic grouping or clustering and programming approach for the spreading of information in VANET. In our approach, we assume a stable VANET network, consisting of static information stations and moving vehicles, with the vehicle choosing its cluster leader or head, who is responsible for its downlink communication, with each group's vehicle planning algorithm. . The support will be communicated and the cluster manager will decide on the programming mode and the node that will transmit this programming to the cluster. The results of the simulation show that our approach works well with an increasing number of vehicles, which reflects its applicability.Keywords:
VANET, RSU, AP, OBU, CBP, CSSAbstract
Flower Classification using MobileNet: An Optimized Deep Learning Model based on CNN
Tanuja Singh Dubey, Vinod Singh, Pradeep Tripathi
DOI: 10.17148/IJARCCE.2019.8910
Abstract: Classification of objects into their specific classes is always been significant tasks of machine learning. As the study of flower, categorizing specific class of flower is important subject in the field of Botany but the similarity between the diverse species of flowers, texture and color of flowers, and the dissimilarities amongst the same species of flowers, there still are some challenges in the recognition of flower images. Existing recent Google’s inception-v3 model comparatively takes more time and space for classification with high accuracy. In this paper, we have shown experimental performance of MobileNets model on TensorFlow platform to retrain the flower category datasets, which can greatly minimize the time and space for flower classification compromising the accuracy slightly.
Keywords: Classification, Inception-v3, MobileNets, TensorFlow
Abstract
Easy Complaint with Google Cloud Platform
Nimish L, Santosh Shet, Shruthi NM
DOI: 10.17148/IJARCCE.2019.8911
Abstract
Architecture of Online Multiplayer Gaming Environment
Suyash Kanungo
DOI: 10.17148/IJARCCE.2019.8912
Abstract: Multiplayer gaming is useful in fastest growing industrial, defence and educational applications like simulation of piloting aircraft, testing of robots and online learning. These applications require high performance architecture for extensive computations and sophisticated Artificial Intelligent algorithms. In this paper, architecture of a multiplayer gaming environment is proposed which uses peer-to-peer computing for improving gaming experience over the LAN. A* algorithm has been used for finding path from one point to other.
Keywords: Multiplayer Gaming, A* Algorithm, Socket Programming, Dijakstra’ Algorithm, Defect Testing
Abstract
Logistic Regression Model to Predict CKD
Shruthi K Murthy, Anubhav V, Pranav P, H Rohith Singh
DOI: 10.17148/IJARCCE.2019.8913
Abstract: Artificial intelligence (AI) aims to impersonate human cognitive functions. It is bringing a paradigm shift to healthcare, powered by increasing availability of healthcare data and rapid progress of analytic techniques. Chronic Kidney Disease (CKD) damages the kidneys. Kidneys have the capability to eliminate waste from the body. If this situation occurs, the waste gets accumulated in the body. Chronic Kidney Disease (CKD) is one ailment which could devastate the human body. It can be prevented via examining few indicators like RBC count, specific gravity value, Blood Pressure (BP), albumin levels in urine, sugar content, anaemia and WBC count. Other conditions like coronary artery disease, Diabetes Mellitus (DM) and bacterial infections could directly affect the kidneys. [1] In this paper we have collected few samples from a public hospital and selected fields have been analysed for designing a prediction model for CKD. Data analysis and visualization are carried out to improve the statistical analysis of given data. Before AI systems can be deployed in health-care applications, they need to be ‘trained’ through data that are generated from clinical activities, such as screening, diagnosis, treatment assignment and so on, so that they can learn similar groups of subjects, associations between subject features and outcomes of interest. Logistic regression is carried out on the data since it contains lot of columns with categorical values. Accuracy, precision, and f1 score of the model have been measured. Various conclusions can be drawn from this interdependent data set and can be stored as historical data for future analysis.
Keywords: Chronic Kidney Disease (CKD), RBC count, specific gravity value, Blood Pressure (BP), albumin levels in urine, sugar content, anaemia, WBC count, Logistic regression, accuracy, precision, and f1 score, coronary artery disease, Diabetes Mellitus (DM) and bacterial infections, categorical values, data analysis and visualization.
Abstract
Design and Analysis of Permanent Magnet Brushless DC Motor for Solar Vehicle using MATLAB
Mukesh K Kumawat, Prakash C Patil, Vijay V Autade
DOI: 10.17148/IJARCCE.2019.8914
Abstract: This paper presents style and performance analysis of static magnet Brushless DC motor of 2 kW utilized in star vehicle and hybrid electrical vehicle. Finite Component Methodology (FEM) is employed for deciding the performance characteristics of motor. Static magnet brushless DC motor, style and its dynamic performance analysis is finished on RM skilled then its magnetic attraction studies has done on Maxwell 3D.In last motor is analyze by varied the lead angle up to the mark circuit
Keywords:
Abstract
Back Propagation Approach for Image Contrast Enhancement
Shavneet Kaur, Jaspreet Kaur, Sukhmanpreet Singh
DOI: 10.17148/IJARCCE.2019.8915
Abstract:
In this research work, An adaptive contrast enhancement technique which is based on the adaptive histogram equalization is used. The back propagation algorithm is applied to select the smoothing factor dynamically and to calculate histogram equalization. The simulation of the proposed modal is performed in MATLAB. The performance of proposed modal is compared in terms of PSNR , SSIM and MSE.Keywords:
Back propagation, CLAHEAbstract
Development of Robust and Efficient Routing Scheme for The Extended Network Lifetime in Wireless Sensor Networks
Aaliya Khan, Navneet Agrawal
DOI: 10.17148/IJARCCE.2019.8916
Abstract:
WSN is made up of a wide amount of small power units called nodes that execute sensing, information collection, computing, compression, transmission operations. Much emphasis has recently been placed on improvements in WSNs by developing new methods and methods for attaining energy efficiency and improving lifetime. Since the network is restricted in terms of power, energy, and computing capacities, these need to be addressed effectively. In WSNs sensor nodes with inadequate battery capacity are positioned in wireless sensor networks, therefore use of energy is a key concern in a WSNs. Efficient use of energy has therefore become a fascinating study area in WSNs. The Clustering and gateway approaches remains the effective way to improve the WSNs lifetime. In this paper we proposed the hierarchical routing scheme is in the function of limiting the energy consumption of the network and extend the lifetime of network. In which we generate some nodes from the deployment of sensor nodes as a gateway node in the last section of the routing protocol.Keywords:
Cluster formation, Cluster head nodes, Energy Consumption, Gateway nodes, Hierarchical Routing protocols, LEACH, Leader Nodes, PEGASIS, Wireless Sensor Networks, Two-level routing scheme, Three-level routing scheme.Abstract
Active Resource Allocation with coordinated Base station for Multiuser Networks
Dr.K.Chanthirasekaran, M.Jansi Rani
DOI: 10.17148/IJARCCE.2019.8917
Abstract: Resource Allocation is a kind of scheduling technique of balancing the multiuser channel spectral efficiency and feedback load. This paper addresses the problem of traffic inelasticity in dynamically configured network and its impact on Average Spectral Efficiency losses. Allocating fixed bandwidth to meet dynamic user requirements will lead to communication overhead. This paper proposes the problem of traffic inelasticity by routing the dynamic user to utilize the neighbourhood base station. Dynamic bandwidth allocation for user sub channel is optimally controlled by a global router which tracks and monitor the status of various base station within its coverage area, the over flow of user requirements of a base station is balanced by routing the excess user sub bands to the ideal or available neighbour base stations assuming synchronizations between these base stations, which increases the individual base stations spectral efficiency and reduces the hardware overhead. The performance evaluation of two scheduling schemes “On Off Based Scheduling”-(OOBS) and “Switched Based Scheduling”-(SBS) has been introduced and the switch based scheduling scheme is proved as comparatively efficient.
Keywords: Multi-user scheduling, bandwidth allocation, feedback load and spectral efficiency.
Abstract
Cloud Based Object Oriented Requirements Engineering
Anandi Mahajan, Dr. S. N. Agal
DOI: 10.17148/IJARCCE.2019.8918
Abstract: Cloud Computing is now a topic of significant impact, while it may represent an evolution in technology terms, it is revolutionising the ways in which both academia and industry are thinking therefore, first phase of software engineering, i.e. "Object oriented requirements engineering" also not untouched by this because the benefits of cloud computing paradigms. Unsurprisingly, the benefits and opportunities of clouds attract not only legitimate users, but also attract software developers. Many software developers now use the Cloud as an affordable platform on which to deploy business solutions. Cloud computing is the next stage in the evolution of the internet, it provides the means through which everything — from computing power to computing infrastructure, applications and business processes — can be delivered to you as a service wherever and whenever you need them.
Keywords: Cloud computing; paradigms; impact; revolutionising; legitimate users
Abstract
Risk Calculation Methodology to Detect Malicious Applications
Lovi Dhamija
DOI: 10.17148/IJARCCE.2019.8919
Abstract: Currently, in the smart-phone market, third-party stores are contributing a major share in developing Android apps. This paper represents a technique designed to calculate risk-factor for applications installed on smart-phones via third-party stores. The system represents an alternative to the current detection techniques by alerting users with risk alarm signals about malicious behaviour of application for the safety of mobile devices. The implementation methodology initially collects mobile applications from third-party stores and extracts feature set from many parameters of running mobile applications in an emulated environment. After that, for each feature-set, algorithms are proposed to calculate the risk factor for all the parameters which reveals the risk-level and its malicious impacts on mobile phones and leakage of privacy. Finally, the system is tested on four learning algorithms with WEKA API to find the best classifier for classifications of risk-levels. Among them, Logistic Regression shows 96% accuracy, RBF(Radial Basis Function) show 99% accuracy with some false positives, SMO (Sequential Minimal Optimization) shows 96.6% accuracy and Naïve Baye’s produces 99.8% accurate results with very low false positives. Therefore, it is concluded that Naïve Baye’s classifier can be integrated with the devised technique in future to detect risk levels of third-party applications.
Keywords: Smart Devices; android applications; malware; network traffic; permissions; risk-factor; logistic regression; Naïve Baye’s; radial basis function
Abstract
Design of a Multi-Sensor IoMT Based Secured and Alert Health Monitoring System
Surabhi Joshi, Sunil Joshi
DOI: 10.17148/IJARCCE.2019.8920
Abstract: A reliable health monitoring system essentially requires real time and continuous monitoring of critical health parameters of the patient and a prognostic approach to generate and send an alert during medical emergency. Day by Day, the change in lifestyle increases, changes in environment which causes arising in the health problem, and require a daily or time to time check up to ensure about the health. As our senior citizen don’t able to go hospital regularly for their regular check up. So our main to design such a module which is useful for them and overcome this issue plus making patient’s data secure so that no one can steal crucial or sensitive data of patient’s health. Here we have designed a prototype of a multi sensor IoMT (Internet of Medical Things) based secured Health Monitoring System in which we worked on two algorithm (compression and encryption (cryptography) technique) and four alert categories (SMS, Voice Call, VoIP and Email) based on biomedical embedded system and Internet of Things. Cloud computing is used for to store data so that any time doctor can reach to report of a patient. This system is an improved version of existing systems and can be useful for patients on move or in intensive care unit.
Keywords: Alert system, Biomedical embedded system, Compression, Cloud computing, Data protection, Encryption, Health Monitoring System, IoMT, SMS.
