VOLUME 9, ISSUE 2, FEBRUARY 2020
Overcoming Application Integration Challenges Using Middleware: An Overview
Urang, Awajionyi Samuel and Ojekudo, Nathaniel Akpofure
Evaluating the Use of Industrial Internet of Things (IIoT) for Business Models
Dr Mohd Uruj Jaleel, Dr Sabeen Fatma
Compiler and Tester
Khushhal Pal, Sudiksha Ravale, Dipali Pawar, Vijaya Chavan
Digital Rights and Responsibilities
Matthew N. O. Sadiku, Damilola S. Adesina, Sarhan M. Musa
Automatic Street Light System
Saurabh Kadam, Anupam Teli, Atharva Sakpal, Vijaya Chavan
Game Website
Omkar Prabhu, Akash Salunkhe, Abhiraj Kurade, Rahul Patil
A Review on Load Balancing in Cloud Computing
Mr. S. Hendry Leo Kanickam, A. Priyadharshini
Detailed Gait Analysis and Prediction: 24/7 Approach
Dr H S Manjula, Vishesh S, Priyanka PA, Nagaraj S Islur, Nishanth R
Survey on Online Shopping Websites using Sentiment Analysis
Mrs. S. Thulasi Bharathi
Review on Data Security in Cloud Computing Environment
Mr. S. Hendry Leo Kanickam M.Sc., M.Phil., B.Ed, N. Agnas Clementsiya, R.Manikandan
Machine Intelligence
Matthew N. O. Sadiku, Damilola S. Adesina, Sarhan M. Musa
Comparative Analysis and Behavior of Digital Applications simulated using MOSFET, CNTFET and FinFET Transistors in HSPICE
Malti Bansal, Harsh Saxena
High Speed and Low Power Consumption Multipliers using FinFET Technology
Malti Bansal, Harsh Saxena
Power-Delay Behaviour of Digital Circuits Designed using MOSFET, CNTFET and FinFET, with the Scope of Miniaturization in these Transistors
Malti Bansal, Harsh Saxena
A Comprehensive Survey on the Issues in Context Aware Computing Issues for Real Time Application
Manjunatha B N, Manjunath A E, Guruprakash C D
Train Wheel Fault Detection Using Machine Learning
Ashwini Jagadale, Radha Kadam, Abhishek Mourya, Anjesh Nair, Prof. Avinash B. Palave
Big Data - A Study on Challenges, Technologies and Tools
Mr. S. Antony Joseph Raj, Dr. P. Joseph Charles
An Improved Face Recognition Approach Using MC-SVM Classification with Hybrid Feature Extraction Technique
Mamta Bansal, Harshdeep Trehan, Dr. Naveen Dhillon
Navigation Based Local Market Search Engine
Gargi Deshmukh, Muskan Bajaj, Vandan Karwa, Tarun Gaglani, Prof. Sangram Dandge
Multi-Level Security in Cloud Computing Technology
Tejas Kadam, Anas Shaikh, Hariom Gurjar, Rahul Patil
A Novel Approach for Constraint selection Using Genetic Algorithm
Mandana Gholamigazafrudy
Online E-Commerce System
Boni Patel, Ritik Gupta, Tushar Khilari, Swati Patil
Artificial Intelligence Healthcare Chatbot System
Muse Mohamud Mohamed, Professor Wang Zhuopeng
Home Automation System
Somesh Shinde, Tushar Mane, Kunal Girase, Shobhana Gaikwad
Voice Control Car
Ketan Bhosale, Omkar Hadawale, Apeksha Duraphe, Ms. Sujata Gawade
Smart Food Storage System
Kshitij Patil, Abhijeet Chaskar, Anushka Huzare, Mithun Mhatre
Security Enhancement using Color Code and Geographical Location on cloud
Khushbu T, Aswathy K, Nusrat Fatema S, Sakshi G, Jaitn K
Students Faszination System
Angel Snofiya J, Deepika N, Inchole A, Balaji.A.S
Human Movement Detection and Prediction Using Data Analytics and Machine Learning
Apoorva N S, Mariya Smitha C, Namratha H, Nithyashree S, Nagarathna R
Testing and Validation of a CAN Protocol Network Nodes
Harshal Hemane, Debarati Sen, Sakshi Agrawal
Account Authentication by Click Point using Image Processing
Rabab Batawala, Diksha Umeredkar, Nikita Mahadule, Priyanka Chikhale, Rashmi Bhoutkar
Blockchain Based Electric Vehicle Energy Management
Babuvignesh. C, Kavya. S, Atul Choubey, Prasanth. B, Dr. Anitha Devi. N Ph.D
AI-Powered Chatbot Strategy: A Comprehensive Guide to Implementation
Ramkumar Soundarapandian
Abstract
Overcoming Application Integration Challenges Using Middleware: An Overview
Urang, Awajionyi Samuel and Ojekudo, Nathaniel Akpofure
DOI: 10.17148/IJARCCE.2020.9201
Abstract:
No modern business operates in a vacuum. Commercial processes are constantly evolving, as is Software applications that companies rely on for critical tasks such as enterprise Resource Planning (ERP), supply chain management and financial analysis and reports. Therefore, the application integration has become increasingly important for anyone who wants to connect an older company applications to newer cloud applications, guarantee access to shared data for mobile and local devices users and navigate the digital transformation with the least possible interruption (and hopefully, great improvement over) productivity and profitability. An informed approach to integrate business applications is essential to create integration solution that leverages big data and runs all your individual applications together gently. Often, the easiest way to integrate applications is to manually program point-to-point interactions between two applications. But over time, as new integrations are added, it becomes unsustainable. Monitoring dozens or hundreds of manual integrations is very difficult. Therefore, the current best practice for integrating applications is the use of middleware to consolidate and federate the integration architecture.Keywords:
Application Integration, Middleware, Application Integration Challenges, Enterprise Application IntegrationAbstract
Evaluating the Use of Industrial Internet of Things (IIoT) for Business Models
Dr Mohd Uruj Jaleel, Dr Sabeen Fatma
DOI: 10.17148/IJARCCE.2020.9202
Abstract:
The Internet of Things (IoT) is the milestone in the evolution of the internet, as everyday objects are connected to the internet, and obtain the capacity to communicate with other devices and sense their environment. Especially the IIoT is one of the most pivotal about industrial business concepts since the recent years, companies try to focus on business models and operational efficiency. This paper emphasizes on researching the Industrial Internet of Things (IIoT). There is already a lot of information about the common Internet of Things but still a gap in research in the business perspective, especially the concept of business models for the IIoT. The goal of this paper is to investigate different kinds of business models, how they work and how feasible they are. The need to research possible business models for an IIoT framework, as traditional business models are relevant for this study, such as the Business Model Canvas which has been proposed by Alexander Osterwalder or the Business Model Navigator by Oliver Gassmann. But there is still a lack of literature covering the business models for the IIoT. Therefore, after researching the concept of IIoT from a business perspective, we identified fruitful criteria and sustainable business models. With a qualitative literature study, I was able to develop an IIoT business model framework, based on the dynamics and complexity of the IIoT concept, which incorporates business strategies and provides companies with a flexible approach. The business model framework can be used in any business industrial context.Keywords:
Internet of Things (IoT), Industrial Internet of Things (IIoT), Business ModelsAbstract
Compiler and Tester
Khushhal Pal, Sudiksha Ravale, Dipali Pawar, Vijaya Chavan
DOI: 10.17148/IJARCCE.2020.9203
Abstract:
Writing a code for software is getting easier day by day. New programming languages are being developed to let developers easily build apps for the customer in a easy way and let them provide the all the specifications or the needs given by the customer without any hassle the biggest example of this is python it is develop to be language uses function named same as English language which would help others to understand this language easily. But for doing such hardcore coding we need our base proper that is the developerâs basics should be clear he should know the basic of programming such as if-else, functions, class. So, this software is basically for the new developers learning the programming to let them understand programming in a better way. The basic programming languages which are C, C++, Java are the core of programming if a person knows these languages well then, he can learn any other easily and the compiler of these languages donât show the exact error when it occurs so this software helps to clearly identify the error and understand the reason to not to repeatKeywords:
C, C++, Python, Functions, ClassAbstract
Digital Rights and Responsibilities
Matthew N. O. Sadiku, Damilola S. Adesina, Sarhan M. Musa
DOI: 10.17148/IJARCCE.2020.9204
Abstract:
Digital citizens are expected to practice safe and responsible use of information technologies. Digital rights and responsibilities address the best practices when using information online and the responsibilities that accompany technology use. They include privileges and freedoms extended to everyone in the digital society. This paper provides a brief introduction to fundamental digital rights and responsibilities. ÂKeywords:
Digital Rights and Responsibilities, Digital Technologies.Abstract
Automatic Street Light System
Saurabh Kadam, Anupam Teli, Atharva Sakpal, Vijaya Chavan
DOI: 10.17148/IJARCCE.2020.9205
Abstract:
 In this paper, we are to discuss the Automatic Street Light system which now days electric energy consuming more than the regular use after some days we are facing more electric power problem .so we can that solution that, The vehicles are passing over the road and we are placing the some ir sensors to the detect the vehical movement and a neighborhood of places are going to be consisting of less density areas and even no vehicle moments itself in few areas. But during night all street lights are going to be on in conventional street lighting system. To overcome from this issue, a proper energy saving due to density of light low save more light energy methods and lighting control to be implemented. The proposed work based on the combination of the arduino  and other components to have two controls like, one is to switch of lights during no vehicle moments in streets and automatically turn on when vehicles comes and therefore the other modes are to offer less intensity light to turn on bright mode during vehicle moments at sides on the roads.Keywords:
Arduino Uno, IR sensors, BreadBoard, etc.Abstract
Game Website
Omkar Prabhu, Akash Salunkhe, Abhiraj Kurade, Rahul Patil
DOI: 10.17148/IJARCCE.2020.9206
Abstract: An online game is bunch of games with different categories and levels that can be played on a website. Since a website is used for playing online games which results in portability, Thus can be played on certain devices and platforms (Mobile,Pc,Tablets), including first-person shooters, strategy games and massively Multiplayer Online Role-Playing Games (MMORPG). In this paper we are building a web-based portal to create a âGAME WEBSITEâ which can be used to play games for entertainment purpose, we created this Web-Portal using various programming languages used for creating website like Html 5, CSS and JavaScript and used a XAMPP in order to host the website locally.
Keywords: web-based portal, view, register and later login with unique user name and password, server side scripting, client side scripting, report generation, SQL, database.
Abstract
A Review on Load Balancing in Cloud Computing
Mr. S. Hendry Leo Kanickam, A. Priyadharshini
DOI: 10.17148/IJARCCE.2020.9207
Abstract: Distributed computing is Internet based improvement and utilization of PC innovation. A Cloud Computing is one of the greatest platforms which provide storage. Cloud computing stores the data and distributed resources in the open environment. Load balancing is one of the major challenges in cloud environment. Load Balancing is essential for efficient operations in distributed environments. The aim of this paper is to discuss the concept of load balancing in cloud computing and how it improves and maintain the performance of cloud systems and also contains comparison of various existing static load Balancing as well as conventional dynamic load Balancing. Keywords: Cloud Computing, Load Balancing.
Abstract
Detailed Gait Analysis and Prediction: 24/7 Approach
Dr H S Manjula, Vishesh S, Priyanka PA, Nagaraj S Islur, Nishanth R
DOI: 10.17148/IJARCCE.2020.9208
Abstract
Survey on Online Shopping Websites using Sentiment Analysis
Mrs. S. Thulasi Bharathi
DOI: 10.17148/IJARCCE.2020.9209
Abstract: Sentiment
 analysis is one of the popular research areas in the field of text mining. The Internet has become a very popular resource for information gathering. People can share their opinion related to any product, services, events etc. The sentiment content can be about books, people, hotels, products, research, events, etc. These sentiments become very beneficial for businesses, governments, and individuals. Websites like Flip kart, Amazon, Snap deal, etc. are popular sites where millions of users exchange their opinions and making it a valuable platform for tracking and analyzing opinions and sentiments. Sentiment analysis is the best solution. In this paper finding the sentimental analysis survey on online E-shopping websites. The main goal is to compare different online E-shopping techniques algorithms. [2]. Keywords: Sentiment analysis, text mining, opinion mining, E-shopping websiteAbstract
Review on Data Security in Cloud Computing Environment
Mr. S. Hendry Leo Kanickam M.Sc., M.Phil., B.Ed, N. Agnas Clementsiya, R.Manikandan
DOI: 10.17148/IJARCCE.2020.9210
Abstract:
Cloud computing is a computing technique, where a large group of systems are connected through private or public networks, where data owner can store his data on the remote systems and frees from storage burden and uses the data on-demand, anytime, everywhere. As a Cloud data user does not possess direct control of his data, security is one of the few challenging issues which need to be addressed. Security in Cloud computing can be addressed in many directions such as. Authentication, integrity, confidentiality and many more. Data integrity (or) correctness is a issue where there may have some unauthorized alteration in the data without consent of data owner. Hence, data storage security in cloud computing is of the utmost importance nowadays. In this paper, we summarize some encryption-decryption algorithms which is used to secure the userâs data in a cloud environment using a cloud simulation toolkit. Cryptography is caring about the confidentiality of data in the loud. Cryptography these days is a combination of algorithm types: Symmetric Key Algorithm (AES) Asymmetric Key Algorithm (RSA) Â Keywords: Cloud Computing, Data Security, RSAAbstract
Machine Intelligence
Matthew N. O. Sadiku, Damilola S. Adesina, Sarhan M. Musa
DOI: 10.17148/IJARCCE.2020.9211
Abstract:
Researchers worldwide have always attempted to put human intelligence into machines by ways of algorithms. Machine intelligent results from the development of Artificial Intelligence (AI). Â The goal of machine intelligence is to give machines the ability to learn from the changing environment and making predictions. The paper provides a brief introduction to machine intelligence.Keywords:
Machine Intelligence, Intelligent Machines, Artificial IntelligenceAbstract
Comparative Analysis and Behavior of Digital Applications simulated using MOSFET, CNTFET and FinFET Transistors in HSPICE
Malti Bansal, Harsh Saxena
DOI: 10.17148/IJARCCE.2020.9212
Abstract: Full Adder constitutes elementary building block for advanced digital applications. SRAMÂ is a runtime memory unit which performs fast read and write operations. These digital applications dissipate considerable power when synthesized using MOS. FinFET and CNTFET implementations of these circuits have improved power dissipation, delay & scalability characteristics over MOSFET, The HSPICE tool by Synopses designs logical and arithmetic applications and analyse power delay behavior. Library files for coding of FinFET are provided by BSIM & for CNTFET are provided by Stanford Library. Input /Output waveforms have been provided for both applications.
Keywords: FinFET, Nano tubes, CNTFET, SRAM, Full Adders
Abstract
High Speed and Low Power Consumption Multipliers using FinFET Technology
Malti Bansal, Harsh Saxena
DOI: 10.17148/IJARCCE.2020.9213
Abstract: Over the years, the focus of IC Enterprises hasnât shifted from optimizing various performance parameters to validate Mooreâs law. These enterprises are still striving to scale down these parameters. However, near 20 nm range challenges posed regarding the strength, various side-effects hampering the functionality of the IC. With an aim to bring out a solution this research has been done. The outcome assessing parameters are decreased power dissipation and delay in an Array multiplier implemented using FINFET instead of MOSFET. Tool used is HSPICE of synopsis. Simulation is done and comparison drawn between FINFET and MOSFET implementation for 32nm technology. The outcome validates the advantage of FINFET over MOS.
Keywords: FinFET, Average Power, Multiplier
Abstract
Power-Delay Behaviour of Digital Circuits Designed using MOSFET, CNTFET and FinFET, with the Scope of Miniaturization in these Transistors
Malti Bansal, Harsh Saxena
DOI: 10.17148/IJARCCE.2020.9214
Abstract: In current scenario, powerâdelay trade-off and downsizing in deep submicron transistors is major area of innovation. Double gated MOSFET (also called FinFET) and CNTFET are the apt substitutes to the MOSFET at the nanometer scale. MOSFET experiences sub threshold conduction at the nanometer scale, which hinders its performance. If conventional MOSFET is replaced by FinFET, a better control over its channel can be obtained which will avert sub threshold conduction in it. While replacing MOSFET with optimized CNTFET, the prevailing conduction mechanism of its charge carriers through its channel is totally replaced by novel ballast transport mechanism through the Carbon Nanotube (CNT). In this paper, power dissipation and delay in the digital applications based on above transistors are evaluated. Here Synopsis HSPICE tool is used for simulation.
Keywords: FinFET, Nanotubes, Carbon nanotube FET, Multipliers
Abstract
A Comprehensive Survey on the Issues in Context Aware Computing Issues for Real Time Application
Manjunatha B N, Manjunath A E, Guruprakash C D
DOI: 10.17148/IJARCCE.2020.9215
Abstract: A pervasive computing describes that users can communicate anywhere with any system. In this environment, most people are invisible and networked systems are aware of the context as well as peers. In this context, people interact with the integrated computer. In the meantime, they can deliver services or efficiently utilize services from peers. Context awareness is an important terminology in computing that can sensitively adapt its physical environment. Topics include context accuracy, reliability, situation of conflict, unexpected adjustment, power management. Various techniques and solutions are recommended and considered to avoid these problems in this survey. In order to recognize not only the current context but also can predict the future context, context prediction is used. However, centralized architecture can be handled alone and still not implemented in the decentralized system. Policies for conflict resolution are used to deal with the conflict situation. This is helpful to improve context awareness performance. And middleware Internet of Things deals with scalability, incomplete data and conflict resolution. We need an efficient intelligence system in order to avoid all of this scalability, conflict and complexity problem. The energy problem arises in context because of large, complex data and long computing time. During the whole process, user position authentication and information should be kept. That's why we talked about security and privacy at last. The following work analyzes and offers solutions to the various problems and challenges. Keywords: Context aware, Pervasive computing, Location, Power Management Context Recognition
Abstract
Train Wheel Fault Detection Using Machine Learning
Ashwini Jagadale, Radha Kadam, Abhishek Mourya, Anjesh Nair, Prof. Avinash B. Palave
DOI: 10.17148/IJARCCE.2020.9216
Abstract:
The development of the country is based on its economy and Railways play an important role for developing countries like India to boost the economy of the nation. Wheel Defects are of major concern in todayâs time as it may lead to poorer economy of the nation as well as it can be life threatening at moments. Hence it is very important to tackle the defects as early as possible. The main reason that these defects are not detected is due to the lateness in identifying them. Early detection can help save money, time and most importantly human being life. The paper proposes a Machine learning algorithm for detection of these Wheel defects at early stage and informing the same.Keywords:
Machine Learning, Defects, CNN-based classification, Image Processing, Image Acquisition, etcAbstract
Big Data - A Study on Challenges, Technologies and Tools
Mr. S. Antony Joseph Raj, Dr. P. Joseph Charles
DOI: 10.17148/IJARCCE.2020.9217
Abstract: With the growing IT infrastructures and technologies such as Internet of Things and Cloud Computing information generated is enormous in amount. As the data is generated in every nanosecond, probably faster than that the data exceeds the boundary often. In order to collect such an enormous amount of data and process it there are a number of techniques tied up under the term big data. As, such data is evolving form every industry namely medical, food, business, education, entertainment and etc., it is put into a severe treatment for the benefit of profits in various means called as analytics. Lot organizations adapt to analytics for processing and utilizing the customary information for various applications. This paper aims at providing a study on challenges in the big data analytics for the extensive usage of various techniques. The work also focuses on technologies involved in analytics based on the need and requirements. The result and analysis presented would help the researchers in choosing the technologies and also to identify the challenges in big data. Keywords: Big data, Hadoop, Map Reduce, Apache Spark, Storm, Python, R, Tableau
Abstract
An Improved Face Recognition Approach Using MC-SVM Classification with Hybrid Feature Extraction Technique
Mamta Bansal, Harshdeep Trehan, Dr. Naveen Dhillon
DOI: 10.17148/IJARCCE.2020.9218
Abstract: In order to recognize a face, many processes contribute to complete this process such as detection of a face, image processing, feature extraction, and classification. All these processes are executed in different ways. There are several techniques to carry out these tasks. Researchers have delved deeper into this field to study different techniques and their efficiency in terms of recognizing the face. A significant number of studies have been carried out to this end. Recently, a technique of feature extraction and face recognition algorithm was proposed in which PCA was used to extract the features: which is efficient but lacks in some aspects. Thus, in this paper, a novel approach is presented in which the concept of Region of Interest (RoI) is introduced to the input image. PCA feature extraction is replaced by implementing hybrid LBP-LPQ. These techniques offer various advantages over PCA. Multi-class SVM is used for classification purposes. MATLAB is used to perform simulation results. Performance evaluation of the proposed method is carried out in terms of different parameters such as recognition time for different numbers of samples and recognition rate for different dimensions and number of samples. From the comparative analysis, the proposed technique outperformed the existing approaches. Keywords: Face recognition, Region of interest, LBP, LPQ
Abstract
Navigation Based Local Market Search Engine
Gargi Deshmukh, Muskan Bajaj, Vandan Karwa, Tarun Gaglani, Prof. Sangram Dandge
DOI: 10.17148/IJARCCE.2020.9219
Abstract:
A navigation based local market search engine is a mobile application which is used to put out local market. The prime objective of Local Market Search Engine is to generate a full-fledged android application. This application will make local market goods which is shortly available for particular area only, available to users in specific yet larger geometric area. This app will also provide facility of auctioning artefact. As being a search market engine, this application will also facilitate the user to find out the hotels and hospitals in nearby areas within the cities. The prototype implemented will include basic functionalities such as showing a map, locating Points of Interests (POIs) on a map, locating location of a user, retrieving information of POIs, add reviews about POIs, support communication (e.g. phone, message), show route direction to POIs, add reminder, and choose different kinds of POIs to show on map.ÂKeywords:
Navigation, SDLC Model, MVC Architecture, AndroidAbstract
Multi-Level Security in Cloud Computing Technology
Tejas Kadam, Anas Shaikh, Hariom Gurjar, Rahul Patil
DOI: 10.17148/IJARCCE.2020.9220
Abstract:
Cloud computing is being projected by several major IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those application and or software projects which need very high speed for compute intensive and huge data capacity for scientific, engineering research problems and also e-business and data content network applications. this direct access service management based on virtualization of hardware, software and very high bandwidth internet communication. The paper reviews these developments for cloud computing and examines the claims being made by the major cloud computing provider companies and a future prospect of the ISP based services. It also high lights the IT industry's concerns for cloud computing ÂKeywords:
Cloud Computing, Security, RSA, Image SequencingAbstract
A Novel Approach for Constraint selection Using Genetic Algorithm
Mandana Gholamigazafrudy
DOI: 10.17148/IJARCCE.2020.9221
Abstract: K-means algorithm has simple implementation and high speed. However, this algorithm is not capable of using the side information. Since this deficiency is effective on the performance of the algorithm, some improvements like Cop-k-means and CVQE algorithms have been designed. However, they encounter with another shortage which is equalizing the importance of constraints. To resolve this problem, the present paper proposes a mechanism to select the constraints of a data set through the use of CVQE clustering algorithm and the Imperialist Competitive Algorithm. The improvement measure in this method is the minimum constraint violation, reduction in the inter-cluster distances, and increase the distance between separate clusters. Thus, Davies Bouldin index is utilized to compare the results of the proposed algorithm with those of Cop-k-means, and CVQE algorithms. After clustering four data sets using these algorithms, the results proved that the proposed algorithm performs successfully in improving the constrained clustering.
Keywords: Clustering, constrained clustering, Constraint selection
Abstract
Online E-Commerce System
Boni Patel, Ritik Gupta, Tushar Khilari, Swati Patil
DOI: 10.17148/IJARCCE.2020.9222
Abstract:
Electronic Commerce (E-commerce) is the trading or facilitation in products, services using computer networks, such as the Internet. E-commerce draws on technologies such as mobile, electronic transfer, supply Management, Electronic Data Interchange (EDI), etc. Modern E-commerce typically uses World Wide Web (WWW) for at least one part of transaction's life cycle.Keywords:
E-commerce, EDI, WWW, services, ManagementAbstract
Artificial Intelligence Healthcare Chatbot System
Muse Mohamud Mohamed, Professor Wang Zhuopeng
DOI: 10.17148/IJARCCE.2020.9223
Abstract:
To lead a better life healthcare is extremely much important. But it's very difficult to get the consultation with the doctor just in case of any health issues. The proposed idea is to make a medical chatbot using Artificial Intelligence which will diagnose the disease and supply basic details about the disease before consulting a doctor. To reduce the healthcare costs and improve accessibility to medical knowledge the medical chatbot is made. Certain chatbots acts as a medical reference books, which helps the patient know more about their disease and helps to enhance their health. The user can achieve the real advantage of a chatbot only if it can diagnose all quite disease and supply necessary information. A text-to-text diagnosis bot engages patients in conversation about their medical issues and provides a personalized diagnosis supported their symptoms. Hence, people will have a thought about their health and have the correct protection.Keywords:
Artificial Intelligence, Prediction, Pattern matching, Disease, Query processingAbstract
Home Automation System
Somesh Shinde, Tushar Mane, Kunal Girase, Shobhana Gaikwad
DOI: 10.17148/IJARCCE.2020.9224
Abstract:
This project presents the general style of Home Automation System (HAS) with low price and wireless system. The switch mode and voice mode area unit want to management the house appliances. The main system implements wireless technology to supply remote access from good phone.ÂKeywords:
Node MCU, Capacitor, Register, LED Light, ConnectorAbstract
Voice Control Car
Ketan Bhosale, Omkar Hadawale, Apeksha Duraphe, Ms. Sujata Gawade
DOI: 10.17148/IJARCCE.2020.9225
Abstract:
In this report I will mention about my project. Robotic reduces the manual efforts being put by humans in their day-to-day tasks. My project is voice controlled car. The human voice commands are taken by the car through the Bluetooth device. In this project my aim is to control a car with my voice/speech. I am going to use a Android device to take my voice and simply process it with Voice recognizing software and send result values to the wireless controlled car that I made. I want to make a simple speech recognition program and a wireless device which took commands from android device and send those commands to the car. I need to understand how to code speech recognition program and sending this program result to a car wirelessly and real time.Keywords:
Bluetooth, Aurdino chip, servo motor, Ultrasonic sensor, Voice RecognitionAbstract
Smart Food Storage System
Kshitij Patil, Abhijeet Chaskar, Anushka Huzare, Mithun Mhatre
DOI: 10.17148/IJARCCE.2020.9226
Abstract
Security Enhancement using Color Code and Geographical Location on cloud
Khushbu T, Aswathy K, Nusrat Fatema S, Sakshi G, Jaitn K
DOI: 10.17148/IJARCCE.2020.9227
Abstract:
Pictographic passwords provide a favourable substitute to conventional alphanumeric passwords. They are appealing since people usually remember pictures better than words. The proposed system includes security enhancement using pictographic authentication which includes two step authentication that is, color code authentication and geographical authentication.Keywords:
Pictographic, eavesdropping, shoulder surfing, Bruit forceAbstract
Students Faszination System
Angel Snofiya J, Deepika N, Inchole A, Balaji.A.S
DOI: 10.17148/IJARCCE.2020.9228
Abstract: Students require a great deal of information from colleges such as leave notification, time table, notes, placement details, achievements, QR code scanning for hostellers, college bus tracking, uploading seminar videos, applying for ID card, college attendance. This mobile computing application also providing students related information to the parents such as parent teacher meeting, report card, and even parents too able to know college events and achievements. In our project we are providing easiest way to transfer all the information to students and even to parents via application. Moreover, by implementing this application will reduces management difficulties. Keywords: Mobile Applications, Students Engagement, Bus Tracking, QR Code Scanning, Android
Abstract
Human Movement Detection and Prediction Using Data Analytics and Machine Learning
Apoorva N S, Mariya Smitha C, Namratha H, Nithyashree S, Nagarathna R
DOI: 10.17148/IJARCCE.2020.9229
Abstract
Testing and Validation of a CAN Protocol Network Nodes
Harshal Hemane, Debarati Sen, Sakshi Agrawal
DOI: 10.17148/IJARCCE.2020.9230
Abstract:
CAN stands for Controller Area Network. It is communication protocol which is mainly used in digital network of automotive cars, Industrial, Medical and Scientific systems for routing sensor data between equipment. The main advantages are its accuracy, low noise, high reliability, low cost, simple wiring, ease of use and less maintenance requirements. To meet the stringent requirements for accuracy, reliability, low noise interference and simple wiring with long service life, there is an increasing demand for efficient testing and validation test methods for CAN networks, this paper test set up mainly cover the CAN physical transmission layer by connecting CAN nodes directly. To test the prototype UWASA node for conformance to the CANopen CiA DS301 (CAN in Automation Draft Specification 301) and to develop the testing software for the performance test according to an internal CANopen Device Specification which describe the automatic test software for testing and validating that against the CiA DS401 standard.Keywords: CAN, CANopen protocol, Node Test, validation etc
Abstract
Account Authentication by Click Point using Image Processing
Rabab Batawala, Diksha Umeredkar, Nikita Mahadule, Priyanka Chikhale, Rashmi Bhoutkar
DOI: 10.17148/IJARCCE.2020.9231
Abstract:
A lot of work has been done in order to secure the login for different applications. These methods range from login ID Password to OTP sending to the user which is very costly due to SMS charges. In this work we are proposing a low cost application that is âAccount Authentication by click Points Using Image Processingâ. In which user click on an area of image. The next image is based on the previous click-point. Performance was very good in terms of speed, accuracy, and number of errors.Keywords:
Speed, Accuracy, OTPAbstract
Blockchain Based Electric Vehicle Energy Management
Babuvignesh. C, Kavya. S, Atul Choubey, Prasanth. B, Dr. Anitha Devi. N Ph.D
DOI: 10.17148/IJARCCE.2020.9232
Abstract:
Smart charging allows a certain level of control over the charging process. It includes different pricing and technical charging options. The simplest form of incentive â time-of-use pricing encourages consumers to move their charging from peak to off-peak periods. Blockchains promise transparent, and secure systems that can enable novel business solutions, especially when combined with smart contracts. We propose a secure charging system for electric vehicles based on blockchain to resolve these security flaws. Our charging system ensures the security of key, secure mutual authentication, anonymity, and perfect forward secrecy, and also provides efficient charging.This paper has three main contributions: (i) a protocol is proposed that finds an optimum charging station, given public biddings as response to a query; (ii) at the same time the customerâs geographic position is not revealed during protocol execution; and (iii) a blockchain is used as a decentralized and immutable storage for transparency and verifiability of these biddings. The protocol design keeps the communication overhead and the amount of data to be stored in the blockchain small, which allows to use existing blockchain technologies such as Bitcoin. The privacy of the protocol is evaluated in an honest-but-curious adversary model. This paper focuses on the privacy of the EV and assumes that charging stations and their bids are publicly known.Keywords:
Blockchains Security, Charging StationAbstract
AI-Powered Chatbot Strategy: A Comprehensive Guide to Implementation
Ramkumar Soundarapandian
DOI: 10.17148/IJARCCE.2020.9233
Abstract: This research study, conducted in the year 2019, examines the adoption and effectiveness of AI-based chatbots in businesses banking, retail, IT, pharmaceutical, and ESteelCo. Using a multi-methods data collection approach including semi-structured interviews and observation and eliciting qualitative responses from 150 respondents, the design of this research is exploratory in nature. Many performance metrics were developed by this study, such as task automation rate, percentage of customer satisfaction rates, and reaction time. In the average response time, an overall percentage of 86.6% has been obtained. In the context of a solution for frequently reported issues during chatbot project development and suggesting a systematic approach to the implementation of chatbots, this study collects opinions of participants on the main characteristics of the chatbots. Results: The results therefore show that understanding customer needs, effective carrying out process analysis, and ensuring continued maintenance are core cornerstones for the successful adoption of a chatbot across sectors.
Keywords: Artificial Intelligence, AI Chat Bot, Implementing Strategies, Various Industries, Challenges.
