Series-3 (March-April 2019)March-April 2019 Issue Statistics
Series-1 Series-2 Series-3 Series-4
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Robotic Jaw for Object Sorting using Raspberry pi |
Country | : | India |
Authors | : | Shraddha More || Smital Bari || Purva Patil || Srushti Raut |
: | 10.9790/0661-2102020106 |
Abstract: Technology has evolved tremendously over the past few years in many fields. It not only benefits businesses and companies but also has increased the level of accuracy in educational activities. Many new mobile applications are playing a huge role in solving daily problems of educational institutes. These apps are providing anytime and anywhere access to daily college activities to stakeholders of an institute. Teachers use these applications to do their work easily and in less time and students can also get benefits by getting regular updates regarding college activities anytime and anywhere. As for the teachers, various tasks such as taking student attendance, notifying students about...........
Keywords: RAndroid Result, Attendance, Report generation, Marks
[1]. Edusense Note: http://www.edusensenote.com/
[2]. Edmodo: https://www.edmodo.com/
[3]. Offline Attendance Manager: https://play.google.com/store/apps/details?id=com.pm.attandancemanager&hl=en_IN
[4]. Student Management System: https://play.google.com/store/apps/details?id=com.mmdu.erp.sms
[5]. Attendance Manager: https://play.google.com/store/apps/details?id=com.vg.attendancemanager&hl=en_IN
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Convolutional Neural Networks were inspired by biological processes that have proven very effective in areas such as image recognition and classification. CNNs have been successful in identifying faces, objects, things and traffic signs. But at a certain point there are some disadvantages of neural networks which we are going to resolve using Capsules. Capsules at one level make predictions, via transformation matrices and using other algorithms. When multiple of predictions agree, a higher level capsule becomes active. A Capsule is a group of neurons whose vector represents...........
Key Words: Image- Processing, Deep Learning, GPU, Image Classification
[1]. Hinton, G.E., Ghahramani, Z and Teh Y. W.," Learning to parse images," Advances in Neural Information Processing Systems 12, MIT Press, Cambridge, MA:
[2]. Kussul, Ernst; Tatiana Baidyk, "Improved method of handwritten digit recognition tested on MNIST database," Retrieved 20 September 2013.
[3]. Hinton, G.E. ,"A parallel computation that assigns canonical object-based frames of reference," Proceedings of the Seventh International Joint Conference on Artificial Intelligence Vol 2, Vancouver BC, Canada
[4]. Hinton, G. E., Krizhevsky, A. and Wang, S ,"Transforming Auto-encoders.," International Conference on Artificial Neural Networks, Helsinki :http://www.cs.toronto.edu/~hinton/absps/transauto6.pdf
[5]. Sabour, S., Frosst, N. and Hinton, G. E, "Dynamic Routing between Capsules," NIPS-2017: http://www.cs.toronto.edu/~hinton/absps/DynamicRouting.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mobile Cloud Computing Security Challenges and Method: A Review |
Country | : | India |
Authors | : | Vipin Kumar |
: | 10.9790/0661-2102031216 |
Abstract: From the last few years mobile devices and mobile applications have grown exponentially. Also emerging of cloud computing opens the new way to building applications on on-demand infrastructures instead of building applications on fixed and rigid infrastructures. Cloud computing is very popular among companies as it provide the flexibility for creating on-demand infrastructure for developing custom applications. Accessing the company resources on mobile devices is also essential for growth of a business and makes quick decision. Cloud computing technology considered as very important...........
Key Words: Mobile cloud computing, Security, Cryptography, Encryption, Authentication
[1]. Niroshinie Fernando , Seng W. Loke , Wenny Rahayu, "Mobile cloud computing: A survey ", June 20 12 Future Generation Computer Systems ,.
[2]. Abdul Nasir khan, M L mat khan "A study of incremental cryptography for security schemes in mobile cloude computing environment", IEEE 2013
[3]. Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing Wassim Itani Ayman Kayssi Ali Chehab
[4]. http://searchsecurity.techtarget.com/tip/Adaptive-authentication-An-introduction-to-risk-based-authentication
[5]. Abdul Nasir Khan, M L Kiah Samee U Khan "A Study of incremental cryptography for security scheme in mobile cloud computing environment" IEEE 2013 Symposium on Wireless technology and applicatin
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Agriculture is the major source for the highly populated country like India to earn income and carry out their livelihood. The factors such as weather, rain, soil, pesticides and fertilizers are the main responsible aspects to raise the production of yields. The fundamental aspect of the agriculture is soil for the growth of the crop. Examination of soil plays vital role in agriculture productivity which has be done manually. In India still farmers are not making use of soil test to get better yields, they're following their ancestral methods to grow the same crop in same soil every year. The ancestral method leads to decrease soil fertility and crop yield every year because consumption of same nutrient by the same crop makes soil infertile. The purpose of this paper is to enlighten the measure of soil nutrients and environmental parameters using sensors.On acquiesced we can apply different data analytical algorithms to predict the suitability of the crop based on the nutrients present in the soil.
Key Words: Soil nutrients, Crops Prediction, Agriculture yield, Sensors.
[1]. A. Willig and H. Karl, Protocols and the Architectures for Wireless Sensor Networks, John Wiley and Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, England, 2005.
[2]. B. BalajiBhanu, K. RaghavRao, J. V. N. Ramesh, Mohammed Ali Hussain, Agriculture Field Monitoring and Analysis using Wireless Sensor Networks for improving Crop Production", IEEE, 2014.
[3]. Jianfa Xia, Zhenzhou Tang, XiaoqiuShi, Lei Fan, HuaizhongLi ,"An environment monitoring for precise agriculture, based on wireless sensors network", IEEE,2011.
[4]. Shining Li, Jin Cui, ZhigangLi,"Wireless Sensors Network forPreciseAgricultureMonitoring", 2011, China
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing is one of the universal Information Communication Technology(ICT) development and its implementation in education can contribute towards solving the existing problems and also contribute to meeting ofeducational goals at an affordable cost. The application of Cloud Computing in education will not only ease educational institutions from the obligation of managing complex Information Technology infrastructure and maintenance activities, but will also lead to substantial cost savings. This paper assesses the technologies being used in education in primary schools, analyzes the human capacity that manage ICT integration in primary schools and develops an Integrated Cloud Computing Environment Model towards Affordable ICT Integration in primary schools............
Key Words: Cloud Computing; ICT Integration; Affordability
[1]. G. Kiryakova, Application of Cloud Services in Education, Trakia Journal of Sciences, No 4, pp 277-284,ISSN 1313- 3551 (online). 2017
[2]. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, K. Andy, G. Lee, D. Patterson, R. Ariel, I. Stoica, and M. Zaharia, Clearing the clouds away from the true potential and obstacles posed by this computing capability. Communications of ACM, Volume 53 Issue 4, pages50-58, ACM New York, NY, USA. April 2010,
[3]. N. Kiran, &V. Kumar, Cost benefit analysis of cloud computing in Education. International Journal of Business Information Systems, Vol. 27, No. 2. 2018 205
[4]. Y. Kiran, Role of Cloud Computing in Education. International Journal of Innovative Researchin Computer and Communication Engineering. Vol. 2, Issue 2, February 2014
[5]. H. Takeda, P. Veerkamp, T. Tomiyama, and H. Yashikawam, Modeling design processes.1990
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Within the precincts of this study, predictive maintenance deals with a system's ability to recognize and report deviations in components to component's performance on a real-time basis. When this condition is embedded into the composite design of the manufacturing infrastructure, computational models can be developed to capture these deviations and convert them into raster codes for in-process behavioral parameter acquisitions and analysis. In this paper, we have demonstrated how predictive maintenance can be computationally deployed to interpret internal multi-machines...........
Key Words: preventive maintenance, computational analysis and simulation, multi-machines availability, economic value dependence,opportunistic strategy, operability by inter-relativity, reliability determinants
[1]. Jardine, A. K. S., Lin, D. &Banjevic, D. (2006).A Review on Machinery Diagnostics and Prognostics ImplementingCondition-based Maintenance. Mechanical Systems and Signal Processing 20: 1483–1510.
[2]. Nandi S, Toliyat H.A. (1999). Condition Monitoring and Fault Diagnostic of Electrical Machines-A Review, Thirty-Fourth IAS Annual Meeting, vol. 1, Phoenix, AZ, USA, pp. 197–204.
[3]. Wang, H., Pham, H., Izundu, A.E. (2001). Optimal Preparedness Maintenance of Multi-unit Systems with Imperfect Maintenance and Economic Dependence. Pham, H. (Ed.), Recent Advances in Reliability and Quality Engineering. World Scientific, New Jersey, pp. 75–92.
[4]. Baker, R.D. and Scarf, P.A. (1995). Can Models Fitted to Small Data Samples Lead to Maintenance Policies with Near-optimum Cost? I.M.A. Journal of Mathematics Applied in Business and Industry 6, p. 3-12.
[5]. Huang, R. Q., Xi, L. F., Li, X. L., Liu, C. R., Qiu, H., & Lee, J. (2007). Residual Life Predictions for Ball Bearings Based on Self-organizing Map and Back Propagation Neural Network Methods. Mechanical Systems and Signal Processing 21(1), 193–207.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Home Automation System Using Raspberry Pi 3+ |
Country | : | India |
Authors | : | S.Manikandan || Dr.S.Sujatha |
: | 10.9790/0661-2102034344 |
Abstract: Internet of Things(IOT) conceptualize the idea of remotely connecting and monitoring real world object (Things) through the internet.It's a comparatively recent concept of systems where internet-enable "Things" in the physical world equipped with sensors actuators and capable of iterating with the environment are connected to the Internet for monitoring and control of the "Things". Nowadays door locking system assigned in manual process and thump impress identification process and also face detection. This paper proposed to develop door locking system using the voice control access to help of USB mic with of raspberry pi 3+ kit and servo motor using relay processing via the Internet..
Key Words: Raspberry pi 3+, Tower Pro Sg servo motor, USB mic, relay
[1]. Ravi kodali,Vishal Jain, IOT Based Smart Security and Home Automation System. International Conference on Computing, Communication and Automation (ICCCA 2016).
[2]. Sonali Sen,Shamik Chakrabarty,Raghav ToshniwalDesign of an Intelligent voice controlled Home Automation System. Volume 121-No.15, july 2015.
[3]. A. R . C. Y. O. K. Withanage, C., "A comparison of the popular home automation technologies," pp. 1 – 11, may 2014.
[4]. B. R. Pavithra, D., "Iot based monitoring and control system for home automation," pp. 169 – 173, April 2015.
[5]. Mohamed Abd El-LatifMowad, Ahmed Fathy, Ahmed Hafez "Smart Home Automated Control System Using Android Application and Microcontroller" International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 ISSN 22295518..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Restaurant Payment Validation System |
Country | : | India |
Authors | : | Shweta Temkar || Amruta Amberkar || Nidhisha More || Prof. Chintan Shah |
: | 10.9790/0661-2102034548 |
Abstract: The issue of security is very paramount in any organization. In some spacious Restaurants and pubs there are issues related to Non-paying customers. Usually customers try to exit from the restaurants without clearing the bill. The ultimate motto is to disallow those customers from escaping who are with the intention of disappearing without clearing a bill. Therefore we have proposed a solution to settle the concern of Non-paying customers of Restaurants and pubs. The project points at a target of creating a secure solution for these defaulting customers. This........
Key Words: Customer, Non-paying, Payment, Restaurants and pubs, RFID tag and reader
[1]. Bhaskar Kumar Mishra, Bhawani Singh Choudhary and Tanmay Bakshi, Touch based digital ordering system on Android using GSM and Bluetooth for restaurants, IEEE,2016,1-5
[2]. Aliakbar Akbari and Shiva Mirshahi, Comparison of RFID system and barcode reader for manufacturing processes, IEEE, 2015,502-506
[3]. Manikandan Thiyagarajan, Mohammed Aejaz and Mohan Kumar, RFID based Advanced Shopping Trolley for Super Market, Journal of Chemical and Pharmaceutical Science, 2017, 225-230
[4]. Interfacing RFID Reader with NodeMCU [Online] Available: https://www.instructables.com/id/MFRC522-RFID-Reader-Interfaced-With-NodeMCU/.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Remote desktop controlling provides remote support, remote access and online meeting software that the world relies on. This paper emphasis on providing seamless higher security for remote control devices for website conference, troubleshooting and desktopsharing. The paper presents a remote-desktop based on remote debugging model for the situation that hardware programming experiment is not often conducted in the network innovation experiment and teaching. One of the remote desktop utility Team Viewer is used as a stepping stone in order to achieve more secured remote control. However there were security concerns regarding this application and users felt that it would not provide an appropriate solution to their security........
Key Words: Security; remote control; innovation; troubleshooting; desktop sharing.
[1]. STJEPAN GROŠ "SECURITY RISK ASSESSMENT OF TEAMVIEWER APPLICATION"PROCEEDINGS OF THE ITI 2011, 33RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES 04 AUGUST 2011"
[2]. Implementation of Remote Desktop UtilityJournalVirtual Lab Control Using Android Phone – Journal
[3]. Swati Khandelwal.New TeamViewer Hack Could Allow Clients to Hijack Viewers' Computer. Available: https://thehackernews.com/2017/12/teamviewer-hacking-tool.html
[4]. Security risk assessment of TeamViewer application - IEEE Conference Publication. Available: https://ieeexplore.ieee.org/document/5974003/authors
[5]. Suhashini Chaurasia," Implementation of Remote Desktop Utility using Teamviewer" IOSR Journal of Computer Engineering (IOSR-JCE), (NCRTCSIT-2016).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The task of face tracking is a key component of head gesture recognition system such as video surveillance and monitoring systems. The face tracking in different environmental conditions is a challenging research topic due to varying illuminations. In this paper, we present an improvement of head gesture recognition using camshift tracking algorithm with block local binary pattern. The camshift with block local binary pattern algorithm uses a background weighted histogram to distinguish the face from the background. As the shape and orientation of the face change, the window size is calculated to track the face. Finally, we use a novel feature extraction method called block rotation invariant uniform local binary pattern. The block rotation local binary pattern preserves the.......
Key Words: Face Detection, Face Tracking, Head Gesture, Camshift and LBP.
[1]. P. Jia, H. Hu, T. Lu and K. Yuan: Head Gesture Recognition For Hands Free Control of An Intelligent Wheelchair, 2010 IEEE International Conference on Computer Application and System Modeling.
[2]. Y. Luo, Z. Fang and L. Zhang: A Novel Head Gesture Recognition Means in the Human Wheelchair Interaction, International Conference on Computer Application and System Modeling.
[3]. P. Cho, C. Li and W. Chen: Implementation of Low Cost Vision Based Gesture Recognition System Based on FPGA Approach, International Symposium on Computer, Consumer and Control 2012.
[4]. N. Kawarazaki and A. Diaz: Gesture Recognition System for Wheelchair Control using a Depth Sensor, IEEE International Conference 2013.
[5]. E. Ramirez, H. Hu and K. Maier: Head Movements based Control of an Intelligent Wheelchair in an Indoor Environment, Proceedings of IEEE International Conference on Robotics and Biomimetics December 11 - 14, Guangzhou, China 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: With the development of Internet technology, the increasing of the application service makes the enterprise network management and security more and more complex. Based on it, the military service portals need a system with high performance for identity authentication management. In this paper, a unified identify authentication system through LDAP and Kerberos have been implemented and designed a rational structure of the directory tree. This proposed model also improves the availability and scalability by exploiting directory replication and referral services. In a word where security is a key factor in establishing a reliable IT infrastructure, this paper enables to gain.......
Key Words: Security, LDAP, Kerberos, Identity authentication, Authorization, Directory tree, Single Sign On.
[1]. Hong Yan, "JAVA and model",Beijing: Electronic Industry University Press,2002
[2]. BruceSchneier, "Applied Cryptography", Beijing: Machinery Industry Press,2005:361-367
[3]. Xiang Li; Ai-nong Chao, "Research and application of LDAP in uniform identity authentication", Journal of Computer Application,2008-S1,pp.28-32
[4]. Cheng-long Zhang, Dong Wang, "Exploration and Practice of Directory Service Based on LDAP", Financial Computerizing, No144,Apr.2012,pp.81-83
[5]. W. Yeong, T.Howes, S.Kille. Lightweiht Directory Access Protocol.RFC1777, Mar.1995
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Computing: Now and Road Ahead |
Country | : | India |
Authors | : | Kapil Singh || Sanjay Verma || Sharib Habi || Nitasha Soni |
: | 10.9790/0661-2102037175 |
Abstract: Cloud computing, the practice of hosting and saving data and programs on the Internet, has been booming ever since its introduction. But with advancing technology, it has been widely adopted by large corporations and users alike. The revenue from cloud services is already in billions and with its ever-growing popularity, it is expected to create more income and jobs in future. The applications cloud computing is being used for are large and diverse. Banking services, healthcare, education etc. have readily shifted towards this new technology. There are various deployment and service models which are in place to oversee the functioning of this service. It definitely.......
Key Words: Cloud computing, Security, Service Model
[1]. T. Dillon, C. Wu, and E. Chang, "Cloud Computing: Issues and Challenges," 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 27-33, DOI=20-23 April 2010
[2]. J. F. Yang and Z. B. Chen, "Cloud Computing Research and Security Issues," 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CISE), Wuhan pp. 1-3, DOI=10-12 Dec. 2010.
[3]. J. J. Peng, X. J. Zhang, Z. Lei, B. F. Zhang, W. Zhang, and Q. Li, "Comparison of Several Cloud Computing Platforms," 2009 Second International Symposium on Information Science and Engineering (ISISE '09). IEEE Computer Society, Washington, DC, USA, pp. 23-27, DOI=10.1109/ISISE.2009.94.
[4]. Mohsin Nazir , "Cloud Computing: Overview & Current Research Challenges ", IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012), PP 14-22, 2012
[5]. Monjur Ahmed and Mohammad Ashraf Hossain, " CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD ", International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014..