VOLUME 9, ISSUE 1, JANUARY 2020
An Appraisal on Women Safety Measures
Nighila Ashok, Akshara K S, Aneesha K B ,Amal Dev P J,Smrithy N M
Intelligent Smart Helmet System: A Review
Anjali Baburaj, Thasni V.T, Reshma N.S, Yadhu Krishnan P, Deepak K.N
Water Quality Monitoring
Adithya Jayaraj, Esly V Kuriyan, Jossila N J, Reshma Viswanath C, Muneebah Mohyiddeen
Analysis of Digital Signal Features Extraction Based on LBP Operator
Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Prof. Yousf Eltous, Prof. Ziad Alqadi
Healthy Diet Monitoring System
Muneebah Mohyiddeen, Abhirami KJ, Arathy AV, Swathy T
Blood Bank, Donor Tracking and Management System Using Geofencing
Riya S. Dandekar, Shweta R. Mane, Ronak D. Shah, Prof. R. P. Karande
Review on Navigation Device For Blind
Nitha C Velayudhan, Ajna.K.A, Anshi Musthafa, Megha Jaison
Smart Lavatory
Nighila Ashok, Sarangi Subramanayan, Divya P, Aiswarya E
Unusual Human Activity Detection using Open CV Python with Machine Learning
Abhishek Mohite, Darshan Sangale, Prathamesh Oza, Tushar Parekar, Prof. Manisha Navale
Review of Sentiment Analysis: A Multilingual Approach
Sanal Kumar T S, Dhathri Devi N T, Krishnendhu T K, Neethu K E, Swetha C Radhakrishnan
Review of Smart Energy Meter
Arun V S, Aswathy C S, Asin Iqbal P, Fathima Beevi S R, Sreejith P S
Evaluation of Character Recognition
Sanal Kumar T.S, Akhil V.V, Mumthas K.H, Sreehari M, Sruthy C.B
IBM Watson “The Game Changer Technology Innovation”
Anlin Albert, Divin Das, Praveenkumar K.S
Enhancing Color Image Clustering using K-Means Method
Prof. Ziad Alqadi, Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Prof. Yousf Eltous
Healthcare Management
Sobiya Johny, Sreepriya A S, Uthara S Menon, Nitha C Velayudhan
A Survey on Secure Data Group Sharing and Distribution with Multi-Owner using Multicloud Storage Services
Ms. Judith Peters, Prof. M.E. Sanap
Ballooned Network Disaster Managment
Sreejith P.S, Asnath aziz, Aswathi T, Sreelakshmi P Govindan, Silpa Joy
Machine Learning Approach for Predicting Bumps on Roads
Advait Ram Anand, Anjith Ranjithan, Shameed Ali PA, Shine Sunil, Minnuja Shelly
Review on Human Performance Measuring and Analysing System
Deepak K N, Akshaykumar K H, Thejus V S, Aswin M S, Abins Baby
Novel Applications of High Altitude Stratospheric Platforms for Traffic Management and Control
Yasser Albagory
ED-MFO Optimization Efficient Routing Protocol for Improving Network Stability in WSN
Parminder Singh, Harshdeep Trehan, Dr. Naveen Dhillon
Application of Data Mining in Higher Education
Abhirami V.P, Amrutha A.R, Neethu Kunjappan
Cyber Threats in Social Media and Prevention
Nidhin M V, Akhil Sugathan, Radhika B
Robot for War Field with Night Vision Wireless Camera by Android Application
Sunita.S.Malaj, Shivanand.D.Hirekodi, Sujata.S.Kamate
A Survey on PPCT-FIM: Prepost Computation Tree Based Frequent Itemset Mining
Mr. Phalke Sagar Balkrishna, Prof.Amol Subhash Rajpure
Semantic Survey on 6th Generation of Wireless Mobile Communication
Dr.P. Joseph Charles, G. Nelson Leander, T. Kiruthika
Detailed Analysis of Coronary Artery Disease (CAD): Data Analytics and Machine Learning
Shruthi Krishna Murthy, Priyanka P A, Deepak C R, Varshini G
Survey on IOT Based Heart Attack Prediction
Dr.I.Carol MCA, M.Phil., PH.D., MBA, Mr. D.Richard, M.Sc(CS), M.Phil, Ms. T.Kiruthika
Android File Manager
Pratiksha Salunkhe, Aishwarya More, Ayesha Khan, Suwarna Nimkarde
Policy-Driven Academic Result Computation and Transcription: Ritman University Case
Oryina Kingsley Akputu, Kingsley Friday Attai, Abel Usoro, Adedolapo Omobukola Abiodun
Judgemental Risk Analysis Process Development in Construction Projects
Greeshma T. Nath, Reshma Mohan, Nimitha Mohan
Fingerprint Door Unlock System
Pratiksha Doundkar, Mansi Patil, Abraar Khan, Shobhana Gaikwad
Roommate Finder Application
Sanchita Mehetre, Jyoti Biradar, Neha Malghe, Swati Patil
Analysis of Machine Learning in Finance
Gayathri.S.Nair, Ansiya K.M, Claijo Kurian V
Predictive Analysis of Mental Fog Using Machine Learning
Urang Awajionyi Samuel and Onuodu, Friday Eleonu
A Survey on Blockchain Parameters and Challenges for Heart Disease
Mr. D.Richard, M.Sc., (CS), M.Phil, Dr.I.Carol MCA, M.Phil., Ph.D
Scheduling Algorithms and its Types in Cloud Computing: A Survey
Mr. S. HendryLeo Kanickam, C. Naresh Prakash
Security Issues and Challenges in Wireless Sensor Networks: A Review
Mr. S. Hendry Leo Kanickam, J. Angel
Ethical Hacking: Impacts on Society
Sankardas P D, Mohammed Raeez, Bibitha Baby
Abstract
An Appraisal on Women Safety Measures
Nighila Ashok, Akshara K S, Aneesha K B ,Amal Dev P J,Smrithy N M
DOI: 10.17148/IJARCCE.2020.9102
Abstract: In today’s world women are less secure. They face a lot of problems like sexual harassment, molestation, acid attack etc. Even though our government had implemented many laws for women's safety, they are not much effective during a dangerous situation. There are many safety devices for women that automatically detect the dangerous situation and send the alert message to the concerned authority with current location. Different systems use different type of sensors such as temperature sensor, flex sensor, an accelerometer to detect the abnormal condition. Some devices include mechanisms such as pepper spray, electric shock for self-defense. Some device contains cameras which capture images and videos and voice recorder which record sound which can be used as a proof for legal actions. GPS module is used to track the location and GSM module is used to send the alert message. In this paper we discussed about various women security devices which uses different technologies. Keywords: Accelerometer, Flex sensor, GPS, GSM, Temperature sensor
Abstract
Intelligent Smart Helmet System: A Review
Anjali Baburaj, Thasni V.T, Reshma N.S, Yadhu Krishnan P, Deepak K.N
DOI: 10.17148/IJARCCE.2020.9103
Abstract: Some of the research papers related to smart helmet with driver behaviour analysis to be analyzed in this review paper. In the new era smart helmet is a special idea which makes motor cycle driving safer than before. By studying all these papers, we get an idea that all the systems contain basic features like auto ignition with the help of helmet wearing status, alcohol content and accident detection. While reviewing these papers, we get more ideas about smart helmet, how to implement different sensors to sense different features and how to use the sensors within the helmet in proper manner. Some of these papers are using the same sensors like alcohol sensors, speed sensors and slight difference in the implementation only. The motive of this system is to ensure all the motorcycle riders should compulsorily wear helmet and obey traffic rule. Through this paper, the most remarkable studies of the last 6 years were studied thoroughly. It has a great feature of detecting accidents and inform to emergency contacts of the driver via SMS with location and speed of the bike before the accident occurs using GPS and GSM. Keywords: Accelerometer, Alcohol sensor, GPS, GSM, SMS, Speed sensors
Abstract
Water Quality Monitoring
Adithya Jayaraj, Esly V Kuriyan, Jossila N J, Reshma Viswanath C, Muneebah Mohyiddeen
DOI: 10.17148/IJARCCE.2020.9104
Abstract
Analysis of Digital Signal Features Extraction Based on LBP Operator
Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Prof. Yousf Eltous, Prof. Ziad Alqadi
DOI: 10.17148/IJARCCE.2020.9101
Abstract:
Digital voice signal is one of the most widely used type of digital data, it is an important and applicable type of data, & it is used in various applications such human identification systems. Digital voice file usually has a big Size, which means increasing the complexity of the recognition system and decreasing the identification system efficiency. To simplify the recognition system and to increase the system efficiency and accuracy we will introduce a method based on LBP to create a unique voiceprint for each wave file, these voiceprints can be used in a recognition system to identify the person and the spoken voice, we will also discuss how the wave file parameters such as amplitude and sampling rate affect the voiceprint.Keywords:
Digital signal, LBP, CSLBP, MLBP, voiceprint, throughput, efficiency, unique featuresAbstract
Healthy Diet Monitoring System
Muneebah Mohyiddeen, Abhirami KJ, Arathy AV, Swathy T
DOI: 10.17148/IJARCCE.2020.9105
Abstract:
The correct balance of nutrients is very important, particularly in infants. When the body is deprived of essential nutrients, it can lead to serious disease and organ deterioration which can cause serious health issues in adulthood. Automated monitoring of the nutritional content of food provides to in daycare facilities, are essential for their healthy development. To address this challenge, there is a system is introduced based on IoT and fully automated nutrition monitoring system called Healthy diet monitoring system. In this paper there is a review about this automated system. Keywords: IoT, Food Monitoring,Nutrition MonitoringAbstract
Blood Bank, Donor Tracking and Management System Using Geofencing
Riya S. Dandekar, Shweta R. Mane, Ronak D. Shah, Prof. R. P. Karande
DOI: 10.17148/IJARCCE.2020.9106
Abstract
Review on Navigation Device For Blind
Nitha C Velayudhan, Ajna.K.A, Anshi Musthafa, Megha Jaison
DOI: 10.17148/IJARCCE.2020.9108
Abstract
Smart Lavatory
Nighila Ashok, Sarangi Subramanayan, Divya P, Aiswarya E
DOI: 10.17148/IJARCCE.2020.9107
Abstract
Unusual Human Activity Detection using Open CV Python with Machine Learning
Abhishek Mohite, Darshan Sangale, Prathamesh Oza, Tushar Parekar, Prof. Manisha Navale
DOI: 10.17148/IJARCCE.2020.9109
Keywords:
Unusual human activity, Detection, Face recognition, CNN, Deep Learning, Image processingAbstract
Review of Sentiment Analysis: A Multilingual Approach
Sanal Kumar T S, Dhathri Devi N T, Krishnendhu T K, Neethu K E, Swetha C Radhakrishnan
DOI: 10.17148/IJARCCE.2020.9110
Abstract
Review of Smart Energy Meter
Arun V S, Aswathy C S, Asin Iqbal P, Fathima Beevi S R, Sreejith P S
DOI: 10.17148/IJARCCE.2020.9111
Abstract:
Electricity is inevitable in our day to day life. The main objective of this project is to produce the user analysis of the energy consumption. This leads to automatic bill generation. By doing so we can reduce the labour requirements in taking meter reading. This is also helpful because the reading can be taken even if no one is present in their houses, After generating the bill, the bill message will be sent to the users along with the last date up to which the payment is accept. If the bill is not paid warning message will be sent to the user, if the user still doesn’t pay the bill, it will result in automatic disconnection. We also propose a way to give alert during load shedding by giving the users the time of the load shedding at their location.Keywords:
Arduino, Energy Consumption, Alert Message, GSM, IoT, LCD display, Bill PaymentAbstract
X-Ray Machine Radiation Protection Using RF Module
Kunal Gupta
DOI: 10.17148/IJARCCE.2020.9112
- a) It can save the repetition of exposure when there are movements in patients especially for children, older and injured patients.
- b) It can be operated from computed radiography room that can avoid exposure of x-ray radiation for the operator.
Keywords:
X-Ray Machine, Radiation, Radiation Protection, Hand Switch, RF ModuleAbstract
Evaluation of Character Recognition
Sanal Kumar T.S, Akhil V.V, Mumthas K.H, Sreehari M, Sruthy C.B
DOI: 10.17148/IJARCCE.2020.9113
Keywords: Human Computer Interface, Channel State Information, Wi-Fi, Gesture Recognition
Abstract
IBM Watson “The Game Changer Technology Innovation”
Anlin Albert, Divin Das, Praveenkumar K.S
DOI: 10.17148/IJARCCE.2020.9114
Abstract: On 2007, IBM (International Business Machine) Research took itself the biggest summon that could take on the game of Jeopardy!. On 2011, QA (Question Answering) system named "Watson" defeated the two highest ranked players in the game and eventually Watson triumph. Watson not only performs calculations but also keep tracks of day–to-day data that helps to capture various events that occur in the lifecycle of a data asset or model allowing you to discover what happened to the forte since it was created. Cognitive computing is the basis of Watson that uses computerized models to simulate the human thought process in miscellaneous situations. The alternative of Artificial Intelligence, the Augmented Intelligence is used in Watson that focuses and keep tracks on AI’s generous role, emphasizing the fact that cognitive technology is intended primarily to enhance human intelligence rather than replacing it. For the above reasons IBM Watson is celebrated as “Cognitive Computer”. The main section of this paper gives a tale of DeepQA processing pipeline. Hence shortly describing our results, based on the algorithmic techniques performed. Keywords: IBM Watson, AI, Cognitive systems, QA, ML
Abstract
Enhancing Color Image Clustering using K-Means Method
Prof. Ziad Alqadi, Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Prof. Yousf Eltous
DOI: 10.17148/IJARCCE.2020.9115
Abstract:
Creating a color image features is an important and vital task, because these features can be used in a color image recognition system, so decreasing the effort of clustering, and decreasing the feature extraction time will lead to better and efficient color images recognition system. In this paper research we will investigate how using color image histogram will enhance the recognition system, without doing any changes in the accuracy and uniqueness of the k-means method of features extraction. Keywords: Color image, histogram, resolution, features, k-means, cluster, centroid, extraction time, and speed upAbstract
Healthcare Management
Sobiya Johny, Sreepriya A S, Uthara S Menon, Nitha C Velayudhan
DOI: 10.17148/IJARCCE.2020.9116
Abstract: The importance of health care is immense in the society and over the past years, this sector has been evolving to produce a more efficient system. This paper mainly aims in managing and coordinating healthcare services in society, hospitals etc. It describes a mobile system that enable electronic health care data storage, update and retrieval using cloud computing. It observed that people in unknown area in severe danger if they don’t able to find hospital quickly, it is very important that automatic application must be used for decision making, maintain up-to date status of the hospital. When the doctor or family receives alarm message, they can immediately take measures to rescue the user. It can also manage the health record of the user. Keywords: Emergency Medical Service, Hospital Tracking, Health record, Cloud Computing
Abstract
A Survey on Secure Data Group Sharing and Distribution with Multi-Owner using Multicloud Storage Services
Ms. Judith Peters, Prof. M.E. Sanap
DOI: 10.17148/IJARCCE.2020.9117
Abstract
Ballooned Network Disaster Managment
Sreejith P.S, Asnath aziz, Aswathi T, Sreelakshmi P Govindan, Silpa Joy
DOI: 10.17148/IJARCCE.2020.9118
Abstract:
Once disaster happened, communication network and information system are seriously damaged and communication means for residents cannot be used in the disaster area. It is very critical to rescue survivals as soon as possible and guarantee the safety of rescuers .It is necessary to build up a provisional emergency system to monitor the rescuing progress and situation. In this paper, a micro controller- based E-Emergency system with a ballooned wireless adhoc network is proposed. This system includes E-Nurse card, positioning reader and wireless module .The radar and adhoc network techniques are integrated for position and communication. In the real test ,the position and life information of rescuers can be shown in PC or laptop in the monitor centre .Moreover, the information also can be presented in smart phones anywhere .Finally the performance of rescue would be improved and loss would be reduced. The System is specifically developed to provide a stable communication channel between victims and rescuers. Additionally, we propose an optimization to WiFi direct network to enable the inter-group communication between different WiFi direct groups using WiFi legacy. Using this hybrid solution of the two technologies (WiFi legacy and WiFi Direct), we developed an android disaster management system that is more robust and resilient to damage. Experimental results demonstrate that the system achieves improvement in terms of energy consumption, delay and reliability comparing to existing works. Keywords: E-Nurse Card, Omni Directional Camera, GSM Module, Balloon Nodes, VoIPAbstract
Machine Learning Approach for Predicting Bumps on Roads
Advait Ram Anand, Anjith Ranjithan, Shameed Ali PA, Shine Sunil, Minnuja Shelly
DOI: 10.17148/IJARCCE.2020.9119
Abstract: Now a days, the number of accidents increased due to the increase of number of vehicles. The driver must be known about the road condition for his safety. There are some expensive methods to install a dedicated hardware on the vehicle. So we have designed a method based on smart phone using Accelerometer and GPS sensors to identify the road condition. The system that is designed is called Bumps Detection System. The potholes are detected by using the accelerometer and the location of potholes are plotted on the map by using the GPS sensor. So we implemented an Android application by extracting the API of Google Map to locate the potholes in the roads by using a smart phone device held by the driver. The condition of the road and the number of potholes will be informed to the driver in advance in the map by a warning mark. While designing the system, some threshold values that are experimentally derived. A machine learning approach is used to find those threshold values. By using these information, the system is trained. To build the system on the trained data, K-means algorithm is applied. For better prediction, the Random Forest Classifier is applied on the test data. In this application we also include voice based command in both English as well as in our regional language (Malayalam) to notify the driver about the condition of the road. Keywords: Accelerometer, Google Map, GPS, K-means Clustering, Random Forest Classifier
Abstract
Review on Human Performance Measuring and Analysing System
Deepak K N, Akshaykumar K H, Thejus V S, Aswin M S, Abins Baby
DOI: 10.17148/IJARCCE.2020.9120
Abstract: The most important thing in this world is time management. And the most difficult task is to save time. The conventional performance analysing and measuring techniques takes more time for testing. So we introduce a new method which has a reduced testing time when compared to conventional testing time. This project aims at measuring and analysing the human performance and thereby making it suitable for various industries to sort out the individuals with best performance. The performance is based on calculating various attributes such as vision, hearing ability, intelligent quotient (IQ), etc. It can be used for recruiting the best individuals for an industry or company by analysing the overall performance based on the attributes derived through various calculations of an individual. It can also be used for self-assessment. Keywords: Smartphone, Digital camera, Machine Learning, Earphones or Hearing aids
Abstract
Novel Applications of High Altitude Stratospheric Platforms for Traffic Management and Control
Yasser Albagory
DOI: 10.17148/IJARCCE.2020.9121
Abstract: This paper provides some novel applications of High Altitude Stratospheric Platforms (HASP) for traffic monitoring and management systems. A flying HASP in the stratosphere can provide large area coverage with improved communication performance and is candidate for many applications and scenarios such as flood monitoring, highway traffic monitoring and control, accurate localization of remote accidents, tracking of dangerous wanted vehicles and detection of road faults and floods. The system architecture of HASP for traffic management and control is demonstrated with the proposed applications showing the new provided capabilities and advantages such as localization of vehicles, long endurance operation, controlling of traffic lights over wide area by a single HASP, and efficient traffic data collection. Keywords: High Altitude Stratospheric Platforms, Traffic Management, Flood Detection, Vehicle Tracking
Abstract
ED-MFO Optimization Efficient Routing Protocol for Improving Network Stability in WSN
Parminder Singh, Harshdeep Trehan, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2020.9122
Abstract:
In WSN, reliable and efficient routing protocol is among the main technologies which have attracted various researchers. In WSN, for the routing purpose, the random selection of cluster heads is done. In this CH arbitrary selection in the low energy efficient clustering algorithm, the nodes’ residual energy, location of node and density of node are not taken into account. Via theoretical inference as well as mathematical calculation, it has been found that it is NP – hard problem. In order to address this issue, various approaches were proposed. The quantum ABC algorithm was proposed for WSN, which was considered as an efficient technique. This approach has been analyzed and it is founded that it does not lead to major enhancement in the system. Also, the factor those are considered as the fitness factors are only the distance factor. Whereas network stability is dependent on other factors also such as energy, etc. Therefore, for enhancing the existing system for obtaining efficient results, the algorithm based on MFO is introduced in this paper. Moreover, the other fitness factors are also considered i.e. residual energy and communication energy. The proposed approach’s performance is assessed by considering different performance parameters. The results has been obtained which demonstrates that proposed approach is efficient than conventional one. ÂKeywords:
Wireless Sensor Network, Energy Efficient Routing Protocols, MFO AlgorithmAbstract
Speech Emotion Recognition for Malayalam Language
Ashly K John
DOI: 10.17148/IJARCCE.2020.9123
Abstract:
Automatic speech emotion recognition is an active research area in the field of Human Computer Interaction (HCI) with wide range of applications. The proposed work is Speech Emotion Recognition for Malayalam language by using gradient boosted tree classifiers in python. Speech Emotion Recognition is extraction of the emotional state of the speaker from his or her speech signal. In this first we collect different speeches from individuals in Malayalam language. The emotion in one input audio will be found out by extracting features in that audio by MFCC (Mel Frequency Cepstral Co-efficient) and then classified by Gradient boosted tree classifiers. Four types of emotions such as Angry, Happy, Neutral and Sad are identified by this approach. Applications of SER are in the field of Medicine, Counselling, Autism patients, Music therapy, Law and Entertainment – Recognize mood & emotions of user.
Keywords:
Speech Emotion Recognition, MFCC, Gradient Boosted Tree Classifiers
Abstract
Application of Data Mining in Higher Education
Abhirami V.P, Amrutha A.R, Neethu Kunjappan
DOI: 10.17148/IJARCCE.2020.9124
Abstract:
In the last few decades there has been a rapid growth in education system. A lot of programs have been launched for improving the quality of higher education. In these years the number of enrolments for higher education has also increased. Higher education has become important to understand the requirements of students and their academic progression. Education Data Mining helps in a significant way to explain the issues of predictors and profiling of students. Algorithms like page ranker, c.4.5, apriori, expectation maximization are used to evaluating Students behaviour, performance and presentation etc. Data Mining uses a mixture of a direct knowledge base, experienced systematic ability and domain knowledge to expose secret trends and patterns. These trends and patterns form the beginning of conjecturing model that allows analysts to construct new study from existing data. This paper takes up the application of data mining tools and techniques that can be definitely used in claiming the issues of predictions of student’s performance.Keywords:
Data Mining, Educational Data Mining, Application in Higher Education, AlgorithmsAbstract
Cyber Threats in Social Media and Prevention
Nidhin M V, Akhil Sugathan, Radhika B
DOI: 10.17148/IJARCCE.2020.9125
Abstract: On the growth of social media, a range of ability threats to users is likewise increasing. These kinds of threats frequently arise because the users accidentally or unknowingly expose their records or identity on social media. Threats resulted from the disclosure of data are needed to be acknowledged so that the customers can understand the risks that arise and take precautions. These studies turned into aimed to summarize the ability threats bobbing up from the information disclosure in social media. The studies technique used changed into a systematic literature evaluation to discover and summarize the kinds of literature that speak a unique topic. The study’s results show that the potential threats are more often than not social threats and identity theft. Keywords: Social Networking, Malware, Phishing, Spam, Crawling, SQL Injection, SNS, Internet
Abstract
Robot for War Field with Night Vision Wireless Camera by Android Application
Sunita.S.Malaj, Shivanand.D.Hirekodi, Sujata.S.Kamate
DOI: 10.17148/IJARCCE.2020.9126
Abstract:
This paper presents design to develop robotic vehicle with an android application for remote operation provided with wireless camera for the purpose of monitoring. Real time video with night vision capabilities can be wirelessly transmitted with this robot along with camera. This  kind of robot can be helpful for spying purpose in war fields. Commands are sent to the receiver for controlling the movement of the robot either to move forward, backward & left or right at transmitting end. Two motors are interfaced to the microcontroller where they are used for the movement of the vehicle at the receiving end. Any smart-phone/Tablet with android OS , upon a GUI based touch screen operation is used to have Remote Operation. There is advantage of adequate range, when receiver end Bluetooth device fed to the microcontroller drives DC motors via motor driver IC for necessary work which could be obtained by making Android application device transmitter acting as a Remote control. For spying purpose and also to have even to have spying work in complete darkness infrared lighting is used and on the robot body a wireless camera is mounted.Keywords:
Bluetooth module, Camera, Gear, Microcontroller, RobotAbstract
A Survey on PPCT-FIM: Prepost Computation Tree Based Frequent Itemset Mining
Mr. Phalke Sagar Balkrishna, Prof.Amol Subhash Rajpure
DOI: 10.17148/IJARCCE.2020.9127
Abstract
Semantic Survey on 6th Generation of Wireless Mobile Communication
Dr.P. Joseph Charles, G. Nelson Leander, T. Kiruthika
DOI: 10.17148/IJARCCE.2020.9128
Abstract:
Today in our ecosphere of data, there are n ÂÂnumber of possibilities and means of data production. Wireless communications had made a revolution in transmitting data as of increased agility. It plays a major role in data creation as well as data communication. Mobile networks are another technology of generations that made wireless communication promising for every human being right to use. RND (Research and Development) also gave various generations of mobile networks includes 1G, 2G, 3G, 4G, and 5G. The fifth generation of wireless mobile communication which has in a way to scope for this decade. 5G with amplified specifications will move on our technology to another level of data communication and creation where it nears the level of DARQ (Distributed Ledger, Artificial Intelligence, Extended Reality, and Quantum Computing) technology. But it’ll not be adequate to accomplish our future technical aspects Âaccording to our research theories. Hence the need of an advanced kind of mobile wireless generation which in time gave birth to the study of 6G as in research and development. This paper proposes a semantic survey over the possibilities and expectations of our upcoming 6th generation of mobile wireless communications in an imminent perception of DARQ.Keywords:
Data Production, Wireless Communication, Mobile Network, RND, 5G, 6G, DARQ, and Artificial IntelligenceAbstract
Detailed Analysis of Coronary Artery Disease (CAD): Data Analytics and Machine Learning
Shruthi Krishna Murthy, Priyanka P A, Deepak C R, Varshini G
DOI: 10.17148/IJARCCE.2020.9129
Abstract
Survey on IOT Based Heart Attack Prediction
Dr.I.Carol MCA, M.Phil., PH.D., MBA, Mr. D.Richard, M.Sc(CS), M.Phil, Ms. T.Kiruthika
DOI: 10.17148/IJARCCE.2020.9130
Abstract:
The main objective of this paper discuss the various technologies consisting of the internet of things that is used to predict heart attack disease. This paper not only explains the existed heart attack prediction, which is also discussing the aware and monitoring system to the patient who is under the cardiovascular disease probably. In this paper, we revisit convinced kinds of literature and present a survey on heart attack prediction techniques.Keywords:
Internet of Things, Healthcare, coronary failure prediction, Heart Attack, PredictionAbstract
Android File Manager
Pratiksha Salunkhe, Aishwarya More, Ayesha Khan, Suwarna Nimkarde
DOI: 10.17148/IJARCCE.2020.9131
Abstract:
 The need for developing the Android File Manager arose from the fact that there are so many information which needs to be stored and keep secret from others. Therefore this application name as “Android File Manager” will help to secure all your information. This application this application helps to provide high facility to move information from one location to another location in a cell phone. The goal of this project is to provide the security facility and transfer data from one end to another end. First time when we open application it will give help how to use it for the new user. When we enter inside the application we see various functionality regarding the use. In this application we give user to best effort to transfer either files from one device to another device or one location to another location within the device. It provide security to the application when we open application it asks the password then we give correct password then it open otherwise it not. We expect the results we envision; we (eliminate) delays in accessing the files. This project will definitely reduce the effort and efficiency for the USER' who use the application.Keywords:
 File Explorer, Android API, Files, Storage, CloudAbstract
Policy-Driven Academic Result Computation and Transcription: Ritman University Case
Oryina Kingsley Akputu, Kingsley Friday Attai, Abel Usoro, Adedolapo Omobukola Abiodun
DOI: 10.17148/IJARCCE.2020.9132
Abstract: Important obligations of educational institutions include, creation, management, preservation and transcription of examination records of past and active students. Most universities adopt semi-automated and, in some cases, even manual means of processing academic results. The semi-automated approach of the Ritman University in particular, utilizes Microsoft Excel sheets to produce editable result templates. Examination officers across departments utilize the templates to compute student results. While such tedious approach might work well for other institutions with a few student population and fixed curriculum, it is less productive and laborious for the Ritman University which boasts of rapid growing student population and a dynamic curriculum. Often than not it is difficult to validate whether examination officers do incorporate certain policies of individual departments regarding result computation. Not to talk about the security challenges considering that results must be handled by several staff. In this paper, a new system has been developed to efficiently automate and aid result computation task of the university. Keywords: Academic Result; Computation; Policy-Driven; CGPA; Rational Unified Process; Multi-Tier, Transcription, Systems
Abstract
Judgemental Risk Analysis Process Development in Construction Projects
Greeshma T. Nath, Reshma Mohan, Nimitha Mohan
DOI: 10.17148/IJARCCE.2020.9133
Abstract: Every Software project by its inherent nature and contains significant numbers of uncertainity from various perspectives such as time to market, budget and schedule estimation, product maintenance . if failing to the control these un certainties it imposes potential risk not only during the developing phases but also throughout the life cycle of the product. Software Risk Management is an effective tool to control these risks and project success .The risk Management practice is not always possible due resource problems, more emphasize on budget and schedule constrains and difficulties to concretely estimate the benefits of Risk management. Various risks and uncertainties exist in construction projects. These may not only prevent the projects to be completed within budget and time limit, but also threaten the quality, safety and operational needs. In this context, risk analysis processes are the systematic methods to analyze the potential project risks and develop risk response strategies in order to cope with risks and achieve the desired objectives. This study proposes a new schedule risk analysis method named as Judgmental Risk Analysis Process (JRAP) and offers a different project duration equation through JRAP. The process (JRAP) can be defined as a pessimistic risk analysis methodology or a hypothesis based on Monte Carlo simulation that is effective in uncertain conditions due to its capability of converting uncertainty to risk judgmentally in construction projects. A case study has also been developed to show how the proposed process is applied on a construction project and to prove its validity.
Keywords:
Abstract
Fingerprint Door Unlock System
Pratiksha Doundkar, Mansi Patil, Abraar Khan, Shobhana Gaikwad
DOI: 10.17148/IJARCCE.2020.9134
Abstract:
Human identification subject is very huge and has passed through speedy modifications with time. Any crucial and really reliable human identification method is fingerprint identity. Fingerprint is the handiest specific identification for an individual. Not simplest particular however it is efficient in addition to transportable. So this enables in identifying a person or in improving security of a device. Finger print of someone is study through a unique kind of sensor. Finger print sensor can be interfaced with a microcontroller. Via keypad we are able to upload new consumer and delete the existing consumer, additionally perceive the consumer via choosing corresponding option through keypad. In this project we use a fingerprint sensor to study ones identity to automatically function the door. For this, we use a microcontroller to allow the door opening or final if the matching between scanned information and the already present records is correct. Comparison is performed within the fingerprint module itself and its output is given to microcontroller. End result is displayed in a led show whether the person is granted access or not.Keywords:
Digital Signal, LBP, CSLBP, MLBP, Efficiency, Performance, Particular Capabilities, Unique FeaturesAbstract
Roommate Finder Application
Sanchita Mehetre, Jyoti Biradar, Neha Malghe, Swati Patil
DOI: 10.17148/IJARCCE.2020.9135
Abstract: Accommodation in today’s world has been soaring at high rates. In addition, to get a shelter that matches one’s preference, budget, interest and proximity is a challenge. This problem becomes even more bigger if the person looking for accommodation is a student. For students, factors like affordability, proximity to the university, similar company etc. matters the most. There are number of websites and mobile apps that provide facilities for finding suitable roommate and vacant apartment, but as of now, there is no such mobile app that helps to find roommate or apartment for a specific university. This application is aimed at trying to solve the major accommodation problem for university students. This application consists of a variety of features like sending messages, searching based on university name and address, potential match based on user’s preferences and shortlisting. This Application is developed using Android API for front end and Spring MVC for creating Restful web service and Google Maps API for location based services. Keywords: Android API, Front End, Roommate, Potential Match
Abstract
Analysis of Machine Learning in Finance
Gayathri.S.Nair, Ansiya K.M, Claijo Kurian V
DOI: 10.17148/IJARCCE.2020.9136
Abstract:
In the era of different digital technologies, the financial field holds a great importance in the real world. It is an integral part of our life and handles tremendous amount of data. Most of the financial companies nowadays are trying to maximize their profits and there arises a dog-eat-dog situation between them. Companies with help of data-driven machines, survives in the battle while others fail and results in total loss of their company. Analysing the historical data provides a best method to overcome many challenges including financial crisis of the companies Data scientists now may speak that analysing the behaviour of market is not a big deal. While, technology is growing day-by-day, machine learning has successfully built up within finance. One of the main purpose of this technology is to forecast the future behaviour of the finance domain. With the help of various predictive technologies machine learning holds a great impact on the finance industry. The techniques can be implemented in risk free investment banking, payments and market forecasting etc. depicting the analysis on the impacts and facts of machine learning in finance.   ÂKeywords:
ML, AI, IBM, SVM, Bookkeeping, Trail Balance DocumentAbstract
Predictive Analysis of Mental Fog Using Machine Learning
Urang Awajionyi Samuel and Onuodu, Friday Eleonu
DOI: 10.17148/IJARCCE.2020.9137
Abstract:
Mental fog, also known as confusion, is one of the main reasons for poor performance in the learning process or any type of daily task that involves and requires thinking. Detecting confusion in the human mind is a real time paradigm that appears to be more difficult and important tasks that can be applied to online education, driver fatigue detection, etc. Â The Random Forest model achieve a better performance compared to other machine learning approaches and shows a great robustness evaluated by cross validation. We can predict if a student is confused about 100% accuracy. In addition, we found that the most important characteristic for detecting brain confusion is the beta 2 and gamma 1 wave of the Electroencephalography (EEG) signal. Our results suggest that machine learning is a potentially powerful tool for modeling and understanding brain activity. This work could be beneficial to individuals, to Ministry of Health, patients with brain diseases and to any other organization that deals on human state of mind in terms of performance.Keywords:
EEG, Mental Fog, Random Forest Model, Electroencephalography (EEG)Abstract
A Survey on Blockchain Parameters and Challenges for Heart Disease
Mr. D.Richard, M.Sc., (CS), M.Phil, Dr.I.Carol MCA, M.Phil., Ph.D
DOI: 10.17148/IJARCCE.2020.9138
Abstract:
In worldwide, heart disease is the leading reason of passing away many peoples. One in every four people is afflicted with and dies of heart disease. Early and exact diagnoses of heart disease thus are critical in improving the chances of long term survival for patients and saving millions of lives [3]. In this research paper, advanced collections of genetic approach are utilizing a Randomization and Dimension is too proposed for accurate coronary heart disease diagnosis and result predictions. ÂKeywords:
Heart diseases, Welfare, Randomization, DimensionAbstract
Scheduling Algorithms and its Types in Cloud Computing: A Survey
Mr. S. HendryLeo Kanickam, C. Naresh Prakash
DOI: 10.17148/IJARCCE.2020.9139
Keywords:
Cloud Computing, SchedulingAbstract
Security Issues and Challenges in Wireless Sensor Networks: A Review
Mr. S. Hendry Leo Kanickam, J. Angel
DOI: 10.17148/IJARCCE.2020.9140
Abstract:
Wireless sensor network is the rising technology for sensing and performing the various tasks. Sensors are small device having memory, power and processing chip that makes it processing device. These WSNs have various purposes in many fields like Healthcare, industry, military, smart homes, etc.. WSNs have more advantages over wired networks. These systems are probably going to be made out of hundreds, and a large number of modest sensor nodes, working independently. Though there are several advantages of wireless networks, they are prone to security issues. Security became a major concern for wireless sensor networks because of the wider application. So, this paper addresses the security issues and challenges of WSNs in various layers of the communication protocols. Keywords: Wireless Sensor Network (WSN), Network Security, Attacks and Challenges, Security MechanismAbstract
Ethical Hacking: Impacts on Society
Sankardas P D, Mohammed Raeez, Bibitha Baby
DOI: 10.17148/IJARCCE.2020.9141
Abstract:
During the growth of the Internet, computer network security has become a major concern for businesses and government authorities. They want to be able to take advantage of the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being "hacked." At the same time, the regular customers of these services were afraid about maintaining control of personal information that includes credit card numbers to social security numbers and other personal details. This scheme is similar to having independent auditors come into an organization to verify its bookkeeping records. In the case of computer security, these "white hackers" or "ethical hackers" would employ the same tools and techniques that the intruders also implement, but these ethical hackers would never damage the target systems nor steal information. Instead, they would evaluate the target systems security and report back to the concerned authorities with the information they found and instructions for how to free themselves from the hacked situation.Keywords:
Ethical hacking, white hackers, Methodology, Impacts