VOLUME 9, ISSUE 10, OCTOBER 2020
Downlink Scheduling with Sharing Spectrum for Surviving LTE System: A Review
Poonam Damara, Yashika Sharma
A Review on Fuzzy Based Routing Method for Improving Performance in WSN
Deepa Goel, Yashika Sharma
A Review Paper on games Designed & Implemented on FPGA
V.Radha Krishna, Rakesh Kumar Y
Reactive and Bootstrapping Beem Algorithm For 3d-Clustering in Wireless Sensor Network
Manpreet Kaur, Er. Amreen Kaur
Information Technology in Supply Chain Management
Shruthi K Murthy, Chethan S R, Rishi Singh, Nishitha G S, Sai Raksha S Iyengar, Janak V Kumar
Open Network Automation Platform: Solution Summary
Jasneet Singh Parmar
Analysis of Random Page Replacement Algorithm in Operating System
Tri Dharma Putra, Rakhmat Purnomo, Wowon Priatna
Bike Blind Spot Alert System
Rohit Kothawale, Amit Chandan, Prachi Kotkar, Prof. Manjusha Namewar
Implementation of College Network Module using Cisco Packet Tracer Simulator
Bhavesh G. Wani, Shreyas Fegade
Application of Adaptive Neuro-fuzzy Inference System (ANFIS) for Prediction of Nutrients (Nitrogen, Phosphorus, Potassium and Magnesium) level from Soil Sample in some States of Nigeria Vegetational Zone. Abdullahi Yusuf Egwoh, Emmanuel Amano Onibere, Philip Odion
Abdullahi Yusuf Egwoh, Emmanuel Amano Onibere, Philip Odion
Blockchain For Securing Cyber Infrastructure
Riya Suri, Nachiket Bhuta, Sagar Gada ,Rahil Vithalani
Online Arabic Handwriting Characters Recognition using Deep Learning
Khalid Mohammed Musa Yaagoup, Mohamed Elhafiz Mustafa
Pneumonia Detection in Covid-19 Patients using CNN Algorithm
Vishesh S, Nishanth S, Bharath R, Amith Vishnu
Development of an Electronic Incubator for Hen Eggs using a Tire
Joel Flores, Gerardo Suárez
Evaluation of Multimedia Transmission for Wireless Multihop Networks using the Evalvid Tool
Ms. Renita Blossom Monteiro
Traffic Signal & Street Light Automation System
Rohit Kothawale, Prince Kumar, Sahil Kumar, Aniket Mahajan
A study on Proxy Re-Encryption Schemes
Shashank Shekhar Tiwari, Hemant Kumar Baranwal, Shweta Tiwari, Ritika Yaduvanshi
Obstacle Avoidance using LiDAR Sensors and Artificial Intelligence
Neelanjan Goswami
Augmenting Embedded Systems for Computer Vision Applications
Neelanjan Goswami
A Survey on Clustering Techniques for Wireless Sensor Networks
Alefiya Shabbir Pithapur and Ankit Tripathi
Enhancing Network Security with Intrusion Prevention Systems and Host-Side Two-Factor Authentication
S.T.Saravanan, T.Manigandan, P.M.Suresh, Anbarasu.R
Abstract
About Ad hoc On-Demand Multi-Path Distance Vector Routing for Mobile Ad hoc Networks
Phu Hung Le
DOI: 10.17148/IJARCCE.2020.91001
Abstract: In Mobile Ad hoc NETwork (MANET), routing is one of the most important problems and is widely studied in the world. Routing greatly affects performance of the network. Multi-path routing is a technique that uses multiple paths between the source and the destination. Its advantages are that it increases throughput, reliability and reduces end-to-end delay, and so on.In this paper, we compare performance ofthe Ad hoc On-demand Multi-path Distance Vector routing (AOMDV) andthe Ad hoc On-Demand Distance Vector Routing (AODV) in terms of Packet Delivery Fraction, Routing overhead and Nomalize Routing Load. Simulation results show that the AOMDV’ packet delivery fraction outperforms that of the AODV. Our results also show that AOMDV’Routing overhead and Nomalize Routing Loadare less than AODV. Keywords:Mobile Ad Hoc Networks; Routing Protocol; AODV; AOMDV.
Abstract
Downlink Scheduling with Sharing Spectrum for Surviving LTE System: A Review
Poonam Damara, Yashika Sharma
DOI: 10.17148/IJARCCE.2020.91003
Abstract: This paper focuses on related study of LTE with Wi-Fi system. This work studies on sharing of spectrum and impact of scheduling concept of LTE over WiFi network. The Long-Term Evolution provides a high data rate and can operate in different bandwidths ranging from 1.4MHz up to 20MHz. It focuses on studying improvement in throughput value of system by using suitable technique. It is difficult to enhance QoS of System by using packet scheduling alone. A scheduler assigns the shared resources (time and frequency) among users’ terminals. The implementation, the analysis and the comparison of these scheduling algorithms will be done through simulations executed on a MATLAB.
Keywords: VANET, Internet of Things, Vehicle Collision Avoidance, Fuzzy Controller etc.
Abstract
A Review on Fuzzy Based Routing Method for Improving Performance in WSN
Deepa Goel, Yashika Sharma
DOI: 10.17148/IJARCCE.2020.91004
Abstract:
Energy efficient operation is a critical issue that has to be addressed with large-scale wireless sensor networks deployments. Cluster-based protocols are developed to tackle this problem and Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the best-known protocols of this type. However, certain aspects of LEACH offer room for improvement. Due to this, it presents a review on fuzzy based routing method for improving performance in WSN. This work also includes study about related routing protocols applied in WSN.Keywords:
Fuzzy Based Routing, WSN, Fuzzy Rules, Leach Protocol etcAbstract
A Review Paper on games Designed & Implemented on FPGA
V.Radha Krishna, Rakesh Kumar Y
DOI: 10.17148/IJARCCE.2020.91002
Abstract: In present days’ computer and information technology as a lot of develop and became a part of daily human life. One of the computer application is games and are very important in human life which gives relaxation and makes stress free. Particularly handheld based games are becoming more crazy and popular. The scientists and engineers have always thought of creating new things for entertainment. The electronics gave big opportunities to the engineers to create intersecting and attractive games for all the generations of people with more upgraded version. Electronic games have big market to earn money. Electronic games can be implemented may hardware platforms one such is on Field Programmable Gate Arrays(FPGAs). This paper gives review on the different approaches to design and implement games on FPGA.
Keywords: FPGA, Game, Implementation, HDL, Model, Design.
Abstract
Reactive and Bootstrapping Beem Algorithm For 3d-Clustering in Wireless Sensor Network
Manpreet Kaur, Er. Amreen Kaur
DOI: 10.17148/IJARCCE.2020.91005
Abstract:
A wireless sensor network of spatially shared out self-directed sensor for observing materialistic otherwise atmospheric situations, like sound, warmth, stress, so on as well as to cooperatively go by their data via network to the central location. A WSN is the network of hundreds or thousands nodes having low price, short powered, extremely little sensor nodes by processing ability. It had the potential of sensing extremely dynamic, rapid changing physical factor. This proposed protocol improves Existing protocols and consider parameters such as alive nodes, Remaining Energy, First Node Dead Evaluation, Tenth Node Dead Evaluation, Last Node Dead Evaluation, Improvement ratio in stable period, Improvement ratio in network lifetime for evaluating the performance of proposed protocol. This improvement results in increased lifespan of network.Keywords:
WSN, Threshold Sensitive Energy Efficient Sensor Network (TEEN), Low Energy Adaptive Clustering Hierarchical (LEACH).Abstract
Information Technology in Supply Chain Management
Shruthi K Murthy, Chethan S R, Rishi Singh, Nishitha G S, Sai Raksha S Iyengar, Janak V Kumar
DOI: 10.17148/IJARCCE.2020.91006
Abstract:
Supply Chain Management can be defined as the management of flow of products and services, which begins from the origin of products and ends at the product’s consumption. It also comprises movement and storage of raw materials that are involved in work in progress, inventory and fully furnished goods. The main objective of supply chain management is to monitor and relate production, distribution, and shipment of products and services. This can be done by companies with a very good and tight hold over internal inventories, production, distribution, internal productions and sales. Today, supply chain management, is one of the most important usable ways by modern companies to earn competitive benefit. Information technology has had very important effect on its development. Also, supply chain, is one of the management substructure bases in electronic business. Supply chain management basically merges the supply and demand management. It uses different strategies and approaches to view the entire chain and work efficiently at each and every step involved in the chain. Every unit that participates in the process must aim to minimize the costs and help the companies to improve their long term performance, while also creating value for its stakeholders and customers. This process can also minimize the rates by eradicating the unnecessary expenses, movements and handling. Since supply chains may be long, complicated and including a lot of foreigner, partners are faced with problems that carelessness to them will cause dissatisfaction of customers and losing sale. This management widely is supported by information technology. After a brief discussion on different parts of supply chain management, this paper tries to turn existing problems in this chain and presents a classification of the different ways in which companies use IT in SCM (Supply Chain Management) and usage of information technology in it.Keywords:
Supply Chain Management, movement and storage of raw materials that are involved in work in progress, inventory and fully furnished goods, IT in SCM (Supply Chain Management), minimize the costs and help the companies to improve their long-term performance, the unnecessary expenses, movements and handling.Abstract
Open Network Automation Platform: Solution Summary
Jasneet Singh Parmar
DOI: 10.17148/IJARCCE.2020.91007
Abstract: Open Network Automation Platform (ONAP) role is to develop global and massive scale (Multi-Site and Multi-VIM) automation capabilities for both physical and virtual network elements. It facilitates service agility by supporting data models for rapid service and resource deployment, and providing a common set of Northbound REST APIs that are open and interoperable, and by supporting model driven interfaces to the networks. This technology was implemented to gain deeper knowledge of its architecture and to test its limitations in communication technology. Keywords: AWS, Docker, Kubernetes, ONAP, OOM, Rancher.
Abstract
Vehicle External Airbag System
Rohit Kothawale, Amit Chandan
DOI: 10.17148/IJARCCE.2020.91008
Abstract
Analysis of Random Page Replacement Algorithm in Operating System
Tri Dharma Putra, Rakhmat Purnomo, Wowon Priatna
DOI: 10.17148/IJARCCE.2020.91009
Abstract: Page replacement algorithms choose pages to swap out from memory, namely when a new page needs allocation memory. Several page replacement algorithms proposed by experts. Four well known page replacement algorithms are Least Recently Used (LRU), Optimal Page Replacement (OPR), First In First Out (FIFO), Random page replacement algorithms. Each one has the objective to minimize the page fault. If the minimum page fault achieved, the performance of the process increased. The algorithm discussed is random page replacement algorithm. In this paper three case studies of random page replacement algorithm are discussed thoroughly. Keywords: Random page replacement algorithm, page fault, page replacement algorithm, FIFO, LRU, OPR
Abstract
Bike Blind Spot Alert System
Rohit Kothawale, Amit Chandan, Prachi Kotkar, Prof. Manjusha Namewar
DOI: 10.17148/IJARCCE.2020.91010
Abstract
Implementation of College Network Module using Cisco Packet Tracer Simulator
Bhavesh G. Wani, Shreyas Fegade
DOI: 10.17148/IJARCCE.2020.91011
Abstract: A Campus Network Module is a type of network designed for establishing the Internet network on the campus. A Campus Network Module is a project which can be usefully established for the network in any college or campus. In this project, we used the Cisco Packet Tracer software for designing this network module. This project is implemented in this software using real-time simulation that confirms live data transfer is working or not. We have a project on the Campus Network Module that will help network designing have an edge over others when it comes to cost and product designing. The study on computer networking and technology provides an insight into various concepts like the design of topology, IP address configuration and moreover how to send information in form of packets in a single network and the use of Virtual Local Area Networks (VLANs) to separate the traffic generated by different departments this can be studied easily using the cisco packet tracer virtually. Keywords: Computer Networks, Masking, IP Addresses, Ping Test, Simulation Tool, Sub-netting, VLANs, Routing protocols.
Abstract
Application of Adaptive Neuro-fuzzy Inference System (ANFIS) for Prediction of Nutrients (Nitrogen, Phosphorus, Potassium and Magnesium) level from Soil Sample in some States of Nigeria Vegetational Zone. Abdullahi Yusuf Egwoh, Emmanuel Amano Onibere, Philip Odion
Abdullahi Yusuf Egwoh, Emmanuel Amano Onibere, Philip Odion
DOI: 10.17148/IJARCCE.2020.91012
Abstract:
Lack of soil nutrients knowledge can cause serious yield challenges if remains undiagnosed, misdiagnosed and untreated. It is the most prevalent problem identified by Nigeria Agricultural Development Project (ADP) to be affecting majority of the productive adult farmers in Nigeria. This study identified and compare qualitative and quantitative decision methods. Soil laboratory were used for determine soil nutrients level. This research proposes a hybrid soft computing model driven, by complimenting the advantages of Artificial Neural Network (ANN) and Fuzzy Logic (FL) with the use of Adaptive Neuro Fuzzy Inference System (ANFIS) for predicting the soil nutrients level. The Matrix Laboratory (matlab) applications were used for the analysis. The results of the analysis were found to be within acceptable predefined limits as examined by ADP officials. Evaluation of the model using standard statistical methods proved that the model is effective in providing accurate soil nutrients level (R2 of 94%). The Root Means Square Error (RMSE) from ANFIS simulation is very low (0.000162) which indicate the significant and effectiveness of the model for prediction.Keywords:
Adaptive Neuro Fuzzy Inference System (ANFIS), Soil formation, Triangular membership function and Rule Viewer.Abstract
Blockchain For Securing Cyber Infrastructure
Riya Suri, Nachiket Bhuta, Sagar Gada ,Rahil Vithalani
DOI: 10.17148/IJARCCE.2020.91013
Abstract: Blockchain technology has seen adoption in numerous ventures and most overwhelmingly in money using digital currencies. Be that as it may, the technology is capable of working successfully in cybersecurity. Here we have referred to several blockchain related research papers. It found that most of their researchers are focusing on the appropriation of Blockchain to ensure IoT (Internet of Things) gadgets, systems, and information. The paper inspected the ways featured by past scientists through which Blockchain can manage the cost of security to the three hazardous areas in IT. In conclusion, the paper prescribed that future researchers center around a solitary Blockchain on which to create cyber security applications to take into consideration combination and consistency among arrangements.
Keywords: Cyber, Security, Cybersecurity, Blockchain, Consensus, Hash, Cloud, Cloudcomputing, Mining, Ledger, Decentralized, E-wallet
Abstract
Online Arabic Handwriting Characters Recognition using Deep Learning
Khalid Mohammed Musa Yaagoup, Mohamed Elhafiz Mustafa
DOI: 10.17148/IJARCCE.2020.91014
Abstract: Recent research shows that in a wide variety of fields, such as computer vision, speech recognition and natural language processing, deep learning has produced noticeably promising results. Automatic recognition of handwriting is a significant component for many applications in different fields. It is a complex subject that has gained a great deal of attention in the past three decades. Research has focused on the recognition of Latin languages’ handwriting, fewer studies have been done for the Arabic language, a few problems still wait to be solved for Arabic handwritten characters. We presented a Convolutional Neural Network (CNN) model for the recognition of Arabic handwritten characters in this paper. The dataset is pre-processed before feeding it to the CNN model, it applied on database that contain 16800 of handwritten Arabic characters. The accuracy was raised to 96% as a test accuracy showing better results than other methods using the same database. Keywords: Deep Learning, Convolutional Neural Network, Handwritten Characters, Pre-Processed.
Abstract
Pneumonia Detection in Covid-19 Patients using CNN Algorithm
Vishesh S, Nishanth S, Bharath R, Amith Vishnu
DOI: 10.17148/IJARCCE.2020.91015
Abstract
Development of an Electronic Incubator for Hen Eggs using a Tire
Joel Flores, Gerardo Suárez
DOI: 10.17148/IJARCCE.2020.91016
Abstract: Poultry are distributed almost all over the world. In western countries the current trend is the specialization of production in poultry farms, some producers are responsible for incubating eggs, others for the production of eggs for consumption and still others for raising chickens for the meat market, therefore this document focuses on the development of an electronic incubator whose control system has the function of regulating the heat, humidity and movement of chicken eggs; kept the eggs in optimum conditions for the development of the embryo. Keywords:Electronic incubator, Incubation of chicken eggs, Temperature and humidity control, Electronic control.
Abstract
Evaluation of Multimedia Transmission for Wireless Multihop Networks using the Evalvid Tool
Ms. Renita Blossom Monteiro
DOI: 10.17148/IJARCCE.2020.91017
Abstract: Simulation and analysis of Video transmission in NS-2 is a challenging task because of limited resources available and as a result of this the video quality will be degraded. In this paper we are trying to simulate video transmission in an IEEE 802.11 multihop network using the chain network. Multiple video streaming is compared and analysed with various factors and efficiency is recorded. Analysis is done for various protocols such as AODV, DSR, AOMDV and DSDV and in each case the results are recorded. From the evaluation results it is clearly understood that the performance varies with the protocol and AODV had better results as compared to other protocols.
Keywords: IEEE 802.11e, multihop network, multipath routing, video streaming, Evalvid-2.7.
Abstract
Two Wheelers Balancing System
Rohit Kothawale, Aniket Mahajan
DOI: 10.17148/IJARCCE.2020.91018
Abstract
Traffic Signal & Street Light Automation System
Rohit Kothawale, Prince Kumar, Sahil Kumar, Aniket Mahajan
DOI: 10.17148/IJARCCE.2020.91019
Abstract:
This project is based on traffic management and street light power saving measures. It is inspired by the daily observation during driving a vehicle. This system will offer us both the facilities like smart traffic signal management and street light power saving. Currently traffic signal is set by equal time for all road. This system will set the traffic signal according to density of the road from that direction. This system will improve the traffic management and will reduce the time to stop at traffic signal. Moreover, this system will save power of the street lights. At nights, all street lights are left on. Even if there is no commute on some roads, still every night, the streetlight of these roads remains on which causes lots of electricity wastage. To prevent this wastage, this system will turn on the street light only when some vehicle is going to pass from that road. The intensity of the street light will be set by the intensity of surrounding light. On some parts of the road there are lot of light sources like for example residential or commercial complexes or some advertising banner which can provide light to road, here the intensity of street light need not to be high. So in such situations, by reducing the intensity of street light, we can save electricity.Keywords:
Microcontroller, Ultrasonic Sensor (HC-S04), Led, LDR, etc.Abstract
A Survey on Error Detection Techniques
Nishanth S
DOI: 10.17148/IJARCCE.2020.91020
Abstract
A study on Proxy Re-Encryption Schemes
Shashank Shekhar Tiwari, Hemant Kumar Baranwal, Shweta Tiwari, Ritika Yaduvanshi
DOI: 10.17148/IJARCCE.2020.91022
Abstract: Proxy Re-Encryption (PRE) is now a primitive encryption used to assign decryption privileges. It was introduced by Blaze, Bleumer and Strauss. With the use of a proxy agent, PRE enables re-encryption of a ciphertext intended for one party to a ciphertext for another party. The underlying message and the sender's private key cannot be read by the proxy agent. The properties of proxy re-encryption systems with different classifications of proxy re-encryption schemes are discussed in this paper.
Keywords: Directionality, Distributed System, Encryption, Proxy re-encryption, Transitivity
Abstract
Obstacle Avoidance using LiDAR Sensors and Artificial Intelligence
Neelanjan Goswami
DOI: 10.17148/IJARCCE.2020.91023
Abstract: In advanced driver assistance systems, avoiding obstacles is an important feature focused on providing correct, timed and reliable alerts prior to an impending collision (with objects, vehicles, pedestrians, etc.). In order to address the design and evaluation of obstacle detection in a cyber-physical transportation system, the obstacle identification library has been developed and implemented. Library is then built into a system for co-simulation that facilitates the interface between MATLAB / Simulink and SCANeR applications. Next the modelling and simulation of virtual on chip light detection and range sensors in a cyber-physical system is explored for traffic scenarios. In SCANeR, the cyber-physical device is planned and enforced. Secondly, using a visual sensory library supplied by SCANeR, three unique AI - based approaches for obstacle detection libraries are also developed and implemented. A MLP - NN, multi-layer perceptron neural network; a SOM, map of self-organization; and an SVM, support vector machine are the three methods for obstacle detection and identification in the library. Finally, a contrast is made between these approaches under varying weather conditions, with very good findings in terms of precision. Using the multi-layer perceptron in clear skies and low visibility conditions, the support vector machine in the weather of rain and the self-organized map in the weather of snow are the best results obtained. Keywords: Loop - sensors; simulation framework; cyber - physical system; on - chip LiDAR; obstacle detection and recognition libraries.
Abstract
Augmenting Embedded Systems for Computer Vision Applications
Neelanjan Goswami
DOI: 10.17148/IJARCCE.2020.91024
Abstract: Enabling CV, computer vision applications that use low levels of power on embedded devices (called as low-power embedded systems), also poses new sets of problems for developers of embedded applications. These technologies incorporate multiple functionalities, such as deep learning-based image recognition, simultaneous localization and mapping tasks. In order to ensure real-time behaviours and at the same time energy limitations to conserve battery on the mobile network, they are distinguished by rigorous efficiency constraints. While heterogeneous embedded boards are becoming widespread at low power costs for their high computing power, they require a time-consuming customization of the entire application (i.e. mapping application blocks to GPU and CPU processing elements and their synchronization) to efficiently leverage their ability. For such an embedded SW customization, distinct languages and environments have been suggested. However, in complex real situations, they also find limits, since their implementation is mutually exclusive. This paper provides a detailed architecture focused on a heterogeneous parallel programming paradigm that integrates OpenMP, PThreads, OpenVX, OpenCV, and CUDA to better take advantage of various parallel levels while semi-automatic customization is guaranteed. The paper demonstrates how to interface, synchronize, and implement certain languages and API frameworks to customize an ORB - SLAM program for the NVIDIA Jetson TX2 board.
Keywords: low-power embedded system, computer vision, embedded vision, OpenCV, OpenVX, PThreads
Abstract
A Survey on Clustering Techniques for Wireless Sensor Networks
Alefiya Shabbir Pithapur and Ankit Tripathi
DOI: 10.17148/IJARCCE.2020.91025
Abstract: Wireless sensor network is energy constraint network. The lifetime of a network is defined by the life of first specified percentage of dying nodes. Load balancing is a method to equalize energy consumption of all nodes and this way all nodes will degrade together. By load balancing, the lifetime of the network does not depend only on the life of weak node but depends on the life all nodes in the network which helps to increase the life of the network. In this paper, clustering algorithm that based on uniform energy uses is examined for wireless sensor networks. Uniform energy uses can extend the lifetime of a sensor network by reducing centralized load. It also increase network scalability. Wireless sensor network with the different energy levels nodes can prolong the lifetime of the network and also its reliability. We discuss the improvement to be made for future proposed uniform energy consumption/load balancing schemes. This paper provided the reader with the basis for research in load balancing schemes for wireless sensor networks.
Keywords: Wireless sensor network, aggregation, data precision, residual energy, network lifetime, chain
Abstract
Enhancing Network Security with Intrusion Prevention Systems and Host-Side Two-Factor Authentication
S.T.Saravanan, T.Manigandan, P.M.Suresh, Anbarasu.R
DOI: 10.17148/IJARCCE.2020.91026
Abstract: The foundational idea of overall network and computer security architecture is intrusion prevention. This technology holds significant value in both the corporate and academic domains. The Intrusion Prevention System (IPS) guards against misuse and unauthorized access, which is essentially an attack on computer and network resources, by keeping an eye on them. In this instance, we have applied two-factor authentication, which generates the one-time password on the host side rather than the server which makes it hard for anyone to enter. Additionally, it is recreated within a specific time frame without the assistance of outside sources. Thus, it's a simple method to go to our accounts. Keyword: Intrusion Prevention System (IPS),computer security architecture.
