Automated Soil Testing System for Agriculture
with IOT
Authors – Miss Lamkhade Pallavi Annasaheb, Miss. Gunjal Sakshi Gorakh, Diwate Swati Balasaheb, Miss Shelar Varshda Ashok, Prof. G. L. Borhade
Abstract- – Monitoring of environmental factors is very important over the last few decades. In particular, monitoring agricultural environments for various factors such as temperature, Conductivity along with other factors can be of more significance. A traditional approach to measure these factors in an agricultural environment meant individuals are taking measurements manually and checking the mat various times. In India, every state around 9 to 10 lakes soil samples have been reviving in laboratories and it is very difficult to test the entire soil sample in the stipulated. But soil analysis is the major role for farmers to cultivate and produce to the proper crop. In this paper the soil condition and nutrients level is soil are analyzed by controller.
Machine Learning and ECC Algorithm Based Intrusion Detection and Mitigation
Authors – M. Tech. Scholar Anurag Khare, Asst. Prof. Shivraj Singh
Abstract- – Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, many challenges arise since malicious attacks are continually changing and are occurring in very large volumes requiring a scalable solution. There are different malware datasets available publicly for further research by cyber security community. In the proposed approach elliptic curve, the cryptography approach used for more security with fewer key sizes with protocol enhancements to perform an efficient authentication process. The other solutions ML model using back propagation neural contributed in this work to detect the attack or for optimization of network and to reduce the overhead consumption as well as increase the network lifetime. Proposed system provides a secure network using the lightweight authentication protocol to mitigate the effect of the attack in the network environment. The MATLAB software has been used to show simulation performance. This simulation performance compare the system while attack taking and after mitigation.
A Review on Performance of Power Quality Improvement of Hybrid Energy in Grid Connected System
Authors -Nitesh Yadav, Prof. Vijay Anand Bhart
Abstract- – This paper presents a review on grid Integration and power quality issues associated with the integration of renewable energy systems in to grid and Role of power electronic devices and Flexible AC Transmission Systems related to these Issues. In this paper, recent trends in power electronics for the integration of wind and photovoltaic (PV) power generators are presented. Discussions about common and future trends in renewable energy systems based on reliability and maturity of each technology are presented. Classification of various Power Quality Issues used by different researchers has been done and put for reference. Application of various techniques as applied to mitigate the different Power Quality problems is also presented for consideration. Power Electronics interface not only plays a very important role in efficient integration of Wind and Solar energy system but also to its effects on the power-system operation especially where the renewable energy source constitutes a significant part of the total system capacity. However there are various issues related to grid integration of RES keeping in the view of aforesaid trends it becomes necessary to investigate the possible solutions for these issues and Power Quality is the main problem in Renewable energy sources. Nowadays there were Scarcity of non-renewable resources and the requirement of consumers was fulfilled by the renewable energy resources. The usage of renewable energy sources are less compared to other energy sources and the renewable energy also causes PQ issues in grid. Some of the issues may be sag, swell, flicker, harmonic, interruptions and voltage imbalance .This review shows what else the issues are caused due to the solar and wind energy while connected to grid and how it can be improved, controllers, grids, power quality enhancement devices, power converters.
Performance of Grid connected system based on Voltage Modulated Direct Power Control and Series Voltage Regulator
Authors – Guatam Ojha, Prof. Vijay Anand Bhart
Abstract- – The concept of a novel Series Voltage Regulator (SVR) for controlling dc bus voltage of a radial dc Microgrid is presented . In this paper, we design a voltage modulated direct power control (VM-DPC) for a three-phase voltage source inverter (VSI) connected to a weak grid, where the PLL system may make the system unstable if the conventional vector current control (VCC) method is applied. Compared with the conventional VCC method, the main advantage of the proposed VM-DPC method is that the PLL system is eliminated. Moreover, in order to inject the rated real power to the weak grid, the VSI system should generate some certain amount of reactive power as well. An Eigen values based analysis shows the system with the proposed method tracks its desired dynamics in the certain operating range. The proposed SVR uses a dual active bridge dc-dc converter followed by a full-bridge dc-dc converter. It injects dynamic voltage in series with the dc grid to compensate resistive drop over the network. As a result, the voltage level at the different points of the grid becomes independent of load variation and stays within the specified limit. Note that the required power rating of the SVR is very low compared to the load demand considering 5% voltage regulation. The simulation has performed on the MATLAB software.
Imperative Analysis on an IOT Based Door Answering System
Authors – Aishwarya S, Dr. Kamalraj. R
Abstract- – The IoT based door answering system, as name suggests aims at controlling and monitoring the door answering process through internet-based protocols and computing. In the spotlight, the system’s IoT module is built using raspberry pi, an LCD 2×16 I2C module, 16 key membrane switch alphanumerical keypad, electric strike lock, RFID card and reader, web camera and a buzzer. Using Open-source computer vision library (Open CV), image processing and recognition is done. Security for authentication and access grants is also achieved with the help of powerful python programming.
Enhancement of Network Security for
Internet of Things
Authors – Jyoti, Dr. Rupali Ahuja (HOD)
Abstract- – In the case of the Internet of Things, research has concentrated on improving network security. IoT has been examined in terms of its purpose, scope, and work. Security hazards across the network have been addressed in this project. In the topic of IoT security, there have been a number of studies; however, the security measures utilized in those studies have had a negative impact on network performance. As a result, prior research was only applicable to certain types of data. In the past, previous research has been limited by issues including a high mistake rate, a poor pace, and a large percentage of packets dropped. There is a pressing need for research on methods that can protect both text and image material while using minimal system resources. Real-world IoT solutions might benefit greatly from this study. In today’s Internet of Things (IoT) technologies, data compression and security are routinely needed. Transmission is more dependable and error-free when using this sort of hybrid technique. IoT-based systems, such as healthcare and the business sector, might benefit from this sort of research. Research on the Internet of Things (IoT) and network security using an encryption method should be taken into consideration. Internet of Things network’s security implementation concerns, such as performance, accuracy, and latency should be studied further. Compression and encryption method integration should be the emphasis of such research to offer high performance and dependable network security for IoTs by resolving security challenges in the IoT network. Such a network security approach should be more secure and efficient than the current one. Data is protected from hackers by using a specific security method. By lowering the amount of encrypted data, the suggested work would boost the encryption operation’s performance.
Driver Drowsiness Detection System Using CNN
Authors – Soumya Agarwal, Dr. M.N Nachappa
Abstract- – Consistently many individuals lose their lives because of lethal road accidents all throughout the world and drowsy driving is one of the essential mistakes of street mishaps and demise. Because of this serious problem, I set out to develop a neural network that can detect if eyes are closed, and when applied in with computer vision, to detect if a live human has had their eyes closed for more than a second. This technology is useful for safety of drivers, reduce road accidents. Neural Networks are a promising area of AI model for diminishing mishaps because of tiredness. The model fabricated was solid and by enhancing the video input, this could possibly be utilized, in actuality, applications. All things considered, the current webcam application can caution the client actually and two or three milliseconds of arriving at the shut-eye time limit. We are creating a system where we are training a dataset of approx. 30,000 images with a Convolutional Neural Network. The accuracy of our model is 96-98%.
Code Bud: Translation of Natural Language to Code
Authors – Taha Yunus Moochhala, Asst. Prof. Dr. Kamalraj R
Abstract- – Remembering the syntaxes of different languages is a task in itself. Developers of different statures find it difficult and time consuming to learn and find syntaxes of different languages. This application aims to solve this problem by making the task of coding an easy task. Taking input in natural spoken English and translating this input description into code is the main objective of this application. To accomplish this task we are using a self-attention transformer model along with other languages like react, node and other frameworks to make the application. We aim to create a web application which is easily accessible and usable by the user for ease of coding on the go.
A Survey on Various Diabetes Disease Prediction Techniques
Authors – Roopa Shrivastava, Prof. Rajesh Ku. Nigam, Prof. Rakesh Ku. Tiwari
Abstract- – Medical data diagnosis for detection of various diseases is depends on machine learning models developed by researchers. Out of different health issues judgment of diabetes out of different symptoms. This paper has given detailed introduction of diabetes related condition around the globe with its impact and types of diabetic disease. Various works done by the researcher for prediction of patient diabetic condition were discussed in the paper with implementing techniques. As per the behavior of users different feature values were store in the training dataset, so extraction of patterns form the data was done by data mining approach and learning models were list in the paper. As per the prediction developed models were compared on evaluation parameters, hence paper detail formulas of such models.
A Survey on Attacks Detection in Wireless
Sensor Network
Authors – M.Tech. Scholar Shireen Fatima, Dr.Shaheen Ayyub
Abstract- – A number of solutions have been developed using Wireless Sensor Networks (WSN). The main goal of a wireless sensor network is to enable different devices to communicate with one another. As a result, this virtual network assists the client in gathering and transmitting data via the Internet. WSN is, at the end of the day, an extension of the digital world that now includes tangible objects from the real world. WSNs were widely used for detecting and observing traffic, securing country borders, and analyzing pollutants, among other things. In light of the working technique for WSNs, security is the most basic and fundamental concern in wireless frameworks. Power consumption-related attacks, bandwidth-related attacks, routing-related attacks, identity-related attacks, and privacy-related attacks are all discussed in detail in this work. Researchers in this subject offered and created research solutions, which were also addressed. Finally, numerous strategies for detecting various forms of WSN assaults were addressed, which aid in the identification of hostile nodes in wireless networks.
Casting Defect Reduction in a Manufacturing Industry
Authors – M.Tech. Scholar Raghav Pandey, Asst. Prof. Vipul Upadhayay
Abstract- – Many researchers have conducted experiments to find the sand process parameters to get better quality castings. They have successfully reduced the casting defects considerably up to 6% by proper selecting sand parameters. DoE is the technique which can be implemented in any processing industry. In India there are number of small scale industries which can implement such techniques to improve the yield, give standard process parameter and increase the effective capacity of the unit. The present work is carried out in foundry to minimize casting rejection due to major defect. Quality analysis is carried out which includes the Root cause analysis to find out actual reasons behind occurring the blow holes. Quality control tools such as Pareto analysis, Cause and Effect (Ishikawa) diagram, and Why-why analysis are used for analysis. Accordingly corrective actions and preventive measures are suggested and implemented.
A Review on Implementation of Inventory Management Technique in Manufacturing Industry
Authors – M. Tech. Scholar Ram Pratap Dangore, Asst. Prof Yogesh Ladhe
Abstract- – There is a growing emphasis on the importance of inventory management in the attainment of organizational goal. In manufacturing companies where stock of raw materials and other component parts consists of many different items, the task of maintaining a stock management on every individual item is obviously difficult if not impossible. Inventory management is a challenging problem area in supply chain management. Companies need to have inventories in warehouses in order to fulfil customer demand, meanwhile these inventories have holding costs and this is frozen fund that can be lost. Therefore, the task of inventory management is to find the quantity of inventories that will fulfil the demand, avoiding overstocks. The primary aim of this work is to review the inventory management technique in manufacturing industry.
A Review: The Impact Of Implementing Green Supply Chain Management Practices In Smes Using Spss
Authors – M.Tech. Scholar Aman Laad, Prof. Yogesh Ladhe
Abstract- – Green supply chain management (GSCM) is also called as sustainable supply chain, environmental supply chain, and ethical supply chain. It has also been described as a socially responsible supply chain”. GSCM means “integrating environmental thinking into supply chain management, including product design, material sourcing and selection, manufacturing processes, delivery of the final product to the consumers and end-of-life management of the product after its useful life”. The review was carried out to analyse firm performance by implementing GSCM practices. This paper therefore helps to build environmental awareness amongst industry and helps industry to take decisions that are a priority with little information about supply chain management. Quantitative research method is used to analyse the firm performance by implementing GSCM practices. Primary data is collected from the distribution of questionnaires through online survey. Further, statistical techniques have been applied on survey results.The survey may be further refined to distinguish between various manufacturing industries. This analysis offers significant perspectives. Implementing GSCM activities enhances corporate success in many ways. Supply chain managers are obliged to determine the company’s output and therefore choose the best GSCM practice combination, which will maximize the optimal amount. This research will useful to SME owners to consider GSCM procedures and introduce them.
Friend Recommendation on Social Media using Clustering Technique
Authors – Asst. Prof. Upendra Singh, Asst. Prof. Puja Gupta
Abstract- – Friend suggestion is one of the most popular elements of social network platforms, which suggests similar or known individuals to users. The notion of friend referral derives from social networks such as Twitter and Facebook, which employs friends-of-friends approach to suggest individuals. We may argue users do not create friends from random individuals but end up becoming friends with their friends’ pals. The previous approaches have restricted scope of suggestion and are less efficient. We bring out a new buddy recommendation model to conquer the faults of present system. For improved buddy recommendation system with high accuracy, we will use collaborative filtering approach to compare similar, dissimilar data of users and will develop a recommendation system which delivers user to user suggestion based on their comparable choices, activities and preferences. Location based friend recommendation system are getting popular since it integrates actual world to digital platform and delivers greater insight into user’s preferences or interest This recommendation system will broaden the breadth of suggestion from one user to other with similar set of interest and their area.
Automating Cross Site Scripting
Authors – Simran P, Dr. A. Rengarajan
Abstract- – Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerabilities existed in web applications. As prevention against such attacks like, it is essential to implement security controls that certainly block the third-party intrusion. Recently the most dangerous attacks are reflected, and DOM based cross-site scripting attacks because in both cases attacker’s attack using server-side scripting and do forgery over the network, it is very hard to detect and therefore it must be prevented. Vulnerabilities of the websites are exploited over the network through web request using GET and POST method.
A Review: Application of Data in Cryptolysis System
Authors – Research Scholar Ghazala Firdaus Ansari, Prof.Dr. Ritesh Kumar Yadav, Prof. Dr. Versha Namdeo
Abstract- – Among the many unstable factors in network security, the most prominent is the data security with the smallest granularity in the security and confidentiality levels involved in the operation of the application system. In order to improve the status quo of network security and improve the security of the data transmission process, International Data Encryption Algorithm (IDEA) is one of the cryptographic techniques which support the concept of symmetric key encryption and decryption. It uses 128-bit key over 64-bit plain text and runs for eight and a half rounds. To enhance the technology in IDEA, a new approach is introduced in which we will introduce a full encryption algorithm (RSA) in IDEA making it run for more steps, extra to those of IDEA. Secondly, we will use two different keys for encryption and decryption respectively which was single key in IDEA. This will set up more security in IDEA by converting it into an asymmetric encryption algorithm. In addition to it, we will use 512-bit+128-bit key over 64-bit plain text to enhance data protection. This paper studies and discusses the definition, classification, principle and application of data encryption technology, and at the same time provides support for other related theories..
Mix Design and Mechanical Performance of Geo-Polymer Binder for Sustainable Construction and Building Material
Authors – M.Tech.Scholar Ramhit Sahu, Prof. Rajesh Joshi
Abstract- – Portland cement is the most widely used binder material for concrete. However, it is an energy-intensive material that causes the production and release of CO2 from greenhouse gases from global warming, as well as causing soil degradation due to limestone mining. This requires the development of ecological binding material and geopolymer concrete is one of those potential materials. This study is mainly focused on use of fly-ash based geo-polymer concrete used as a paver block and compares the mechanical properties of GPC with conventional concrete of same grade (M30). Test samples were taken in cubes and stored at room temperature for melting and curing. A hybrid solution to GPC design based on low-calcium fly ash for usability and strength. Alcofin was then used to generate the necessary compressive force at room temperature. ‘The combined amount of ash and alkaline activation was determined from the assumed density by deducting the average aggregate weight of 2400 kg/m3. The mass relation between sodium silicate and sodium hydroxide was held at 1:2.5, fixing the cube within 24 hours of melting. The main purpose of performing this procedure is to achieve the desired compression strength. The mixer is a mixture of fine additives, coarse aggregate and fly ash. Sod-hydroxide granules are combined with filtered water in order to produce alkaline activator solutions (AAS). AAS was developed using a mixture of sodium hydroxide and sodium hydroxide solution. Addition of thin aggregate, coarse aggregate and fly ash AAS results in the formation of Geo-Polymer Concrete. The strength of GPC at 28 days is less than conventional concrete and it is because of water that comes out in Polymerization gives required compressive strength.
A Review on Thermodynamic Analysis of a Cascade Refrigeration System Based On Carbon Dioxide and Ammonia
Authors – M.Tech Scholar Sourabh Kori, Asst. Prof. Shahrukh Khan
Abstract- -Refrigeration and air conditioning (RAC) play a very important role in modern human life for cooling and heating requirements. This area covers a wide range of applications starting from food preservation to improving the thermal and hence living standards of people. The utilization of these equipment’s in homes, buildings, vehicles and industries provides for thermal comfort in living/working environment and hence plays a very important in increased industrial production of any country. In present study a review has been done on the thermodynamic analysis of cascade refrigeration system.
Thermal Performance Analysis of Shell and Tube Heat Exchanger
Authors – M.Tech. Scholar Vishwas Gautam, Asst. Prof. Vikas Jain
Abstract- -The design and prediction of heat exchanger behaviour are too complicated to mathematically mode land solve using analytical solution. Closed form solutions are available only in situations where the model has several simplifying assumptions. Heat exchanger design based on these assumptions has errors that make the prediction of thermal behaviour challenging. In this study shell and tube heat exchanger with 10 different baffles are placed along the shell in alternating orientations with cut facing up, cut facing down, etc., in order to create flow paths across tube bundle. The geometric modelling is done using CAD software called CATIA V5R21 because it is easy to model Heat exchanger in 3D modelling software..
Partial replacement of Cement with
Nanomaterial in the Concrete
Authors -Assistant Prof. P.Meenakshi
Abstract- -Concrete is used as a building material, and it consumes a massive quantity of cement. In the infrastructure sector, the development of the country can be determined by the consumption of cement in the industry, thus its expansion is dominant. A method determined to reduce cement in concrete by the use of nanomaterial as nano-silica. Nanotechnology is an innovative field in materials science and engineering, which creates the base for the growth of new technological materials. The material Nano silica is currently used in concrete to modify its potency properties. The researchers are mostly designed to enhance the durability and power of concrete and have quickly increased the mechanical and micro structural properties of cementitious materials with the usage of Nano-silica. The study shows that improved strength, durability, superior properties can be created using a combination of Nano-silica. Usage of nanomaterials in concrete can potentially modify the service life and life-cycle cost of building infrastructure. This way of production leads to greener concrete. Compressive strength and split tensile strength of M30 grade concrete at 10% replacement of cement with nano silica is 42.55 N/mm2 and 4.18N/mm2, which is greater than 5% and 15% replacement. Optimum usage of Nano silica increases the compressive strength of concrete.
An Android App for Farm; A Survey
Authors – Rahul Krishna V C, Vijayakumar Adaickalam
Abstract- – Mobile devices are now widely utilized by everyone, including farmers and individuals in rural areas. Because agriculture is the backbone of the Indian economy, mobile-enabled information services and the rapid rise of mobile telephony have improved information sharing in the knowledge-intensive agriculture field. Farmers can use the mobile application to access a variety of information services that aid in farm management, control, and monitoring. Farmers can use a mobile app to expand their farming operations and increase their profits. Now that organic veggies and fruits have evolved, everyone has started farming in their backyards, terraces, and their own homes. As mobile applications are an emerging trend, developing an application that can be used for farming will be the best way to achieve or gain something in the business. An E-Commerce platform can be the best way for business nowadays. Firebase is the software that can be used to integrate the android application and also can be used as a database. Chat systems are also an emerging technology nowadays that can be used as a medium of communication.Technologicaldevelopment brings conveniences to people, especially in business life, making it more convenient for people to shop online without leaving home. The can do everything quickly and efficiently with just a mobile phone and the internet. E-commerce provides consumers with the convenience ofwhen making online purchases.
A Research on Depression Detection Using
Machine Learning
Authors – Dr. Kamalraj, Gaurav Sharma
Abstract- – Depression Detection in light of facial action considers ceaseless exploration, order, and extraction of perspectives from a video catch of the face. It is generally accepted that articulations are embarked for a while when a tendency is available, thusly gloom can be distinguished by perceiving the look related with it. Depression is a significant piece of the general variety of critical 6 dispositions existing. Depression is named an attitude issue. It may be depicted as impressions of sharpness, shock or disaster that upset a singular’s normal activities. People experience gloom in different ways. In explicit cases, depression could provoke deadly cases. To avoid these, slump ought to be distinguished at the earliest and loss ought to be treated with reasonable fixes. The objective of the endeavor is to analyze the sensation of a client using consistent video. This is achieved using Convolutional Neural Networks [CNN]. In case the tendency is analyzed as depression, it should be treated toward the starting stages. As the signs crumble, the mental limit of an individual goes out of control which prompts a tangle. If the tendency is analyzed as to be debilitation/depression, a chatbot spring up appears on the screen where the client can share his/her feelings with the chatbot achieved using Tkinter library. This helps with supporting the client’s demeanor, researching the level of depression, and helping the client with arising out of this outlook. If the client’s tendency is considered terrible, a persevering evaluation is done to arrange among inconvenience and horror.
A Review Study of Job Satisfaction in the Public Sector and Private Sector: Comparative Study
Authors – Neha Srivastava, Asst. Prof. Hemant Kumar
Abstract- – In this paper discussed about the job satisfaction in the public sector and private sector. At present time is very ambivalence for job. Job is the very necessary part of life for every person that means money is the basic need of every person. The person creates many methods for to earn the money. Because on earth, only human have need to some things, food, dress, houses, luxuries cars etc. for found to these all too human collected the money. The resources of money are jobs, business or self-employee. In this paper discussed about the job satisfaction or dis-satisfaction in the public sector and private sector. In this paper also discussed about the basic parameters are public sector, percentage of public sector, private sector and some factors are also defined as salary, organizational culture, time schedule, work load, lack of supervisory support, job stress.
A Survey on Reconnaissance for Ethical Hacking
Authors – PG Student Manoj Saha, Professor Vijayakumar Adaickalam
Abstract- – As technology approach the new era of cyber security, Internet user witnessed the flexible growth of using cyber security tools in 5 years. The fundamental challenges that professional faced today is evolving technologies and human beings. In these digital environments, where online communication and the Internet have become essential but we always fear our security and privacy. As a normal Internet user, they are not aware of the cyber security tool that is used to protect our security and privacy or the tools which help cyber security professionals to figure out the cyber-incident. So, let’s talk about the cyber security tool, LINUX and PARROT Operating system but it’s a completely different environment for average Internet users. It very important to know about cyber security fundamentals and ethical hacking ethics which will provide cyber security knowledge and behavior pattern. Adversaries are frequently capable of penetrating networks and compromising structures through exploiting vulnerabilities in human beings and information systems. The key to the fulfilment of those attacks is statistics that adversaries gather during the levels of the cyber kill chain. We summarize and examine the methods, tactics, and gear that adversaries use to behavior reconnaissance activities in the course of the attack process. It is important to talk about what types of information adversaries seek, and how and when they could gain this information.
Face Mask Detection using CNN
Authors – Amogh B, Asst. Prof. Dr. Ganesh D
Abstract- – The COVID-19 epidemic has had a dramatic impact on our daily lives, disrupting global trade and transportation. Protecting one’s face with a mask has become the new normal. Many public service providers will need clients to wear masks correctly in the near future in order to use their services. As a result, detecting face masks has become a critical responsibility in aiding worldwide society. This project shows how to achieve this goal with the help of several fundamental Machine Learning tools such as TensorFlow, Keras, OpenCV, and Scikit-Learn. The suggested approach successfully detects the face in the image and then determines whether or not it is covered by a mask. It can also detect a face and a mask in motion as a surveillance task performance. The approach achieves a level of accuracy of up to 99%. We investigate optimum parameter values using the Sequential Convolutional Neural Network model to appropriately detect the existence of masks without over-fitting.
Geospatial Based Hybrid Water Supply and Sanitation System for Lakes in Hebbal Valley
Authors – Professor and Head Dr. Prasad C S M V, Prof. Dr. M. Inyathulla, Prof. Dr. Lakshmi C, Associate Prof. Dr. Manjunath H. N
Abstract- – Bangalore city receives uninterrupted and well distributed rainfall with an average rainfall of 970 mms annually. Rainwater harvesting involves low capital and transaction costs; besides it helps to reduce water stress of the city by over 20% in the future. Therefore, an integrated water resource management approach, combining water supply augmentation and demand management strategies is certain to improve economic efficiency of the city. In the present study Hybrid Water Supply System is proposed in Jakkur and Rachenahalli Lake sub watersheds. Sewage treatment with complete removal of nutrients and chemical contaminants can be achieved by adopting decentralized treatment plants similar to the success model (secondary treatment plant integrated with constructed wetlands and algae pond) at Jakkur lake. In addition to this, water available with efficient rainwater harvesting is about 14.8 TMC. This accounts to total of 30.85 TMC of water that is available annually would cater the demand of 20.05 TMC, provided the city administration opts for decentralized optimal water management.
Study of Single and Double Precision Floating Point Multiplier using Different Types of Adder
Authors -M.Tech. Scholar Marode Shubham Hemant, Asst. Prof. Dr. Neetesh Raghuwanshi
Abstract- -In high-performance computing applications such as signal processing and image processing, floating point multiplication is a critical and widely utilized arithmetic operation. The IEEE-754 standard floating point multiplier’s high speed and memory requirements make its implementation more difficult in many applications that require quick processing. As a result, developing an efficient architecture to accomplish the floating point multiplication operation in less time and with less memory has become a major research focus in practically every discipline of electronics. This study review paper provides a detailed explanation of each of the proposed architectures for floating point multipliers, as well as their benefits and drawbacks. In this paper, we introduce an architecture that performs high speed IEEE 754 floating point multiplier using carry select adder (CSA). Here we are introduced two carry select based design. These designs are implementation Xilinx Vertex device family.
VLSI design and analysis of IEEE 754 Floating
Point Multiplier
Authors – M.Tech. Scholar Marode Shubham Hemant, Asst. Prof. Dr Neetesh Raghuwanshi
Abstract- – There is an increasing demand for high-speed and low-power processors as new technology in the field of VLSI and embedded systems advances. The multiplier and adder performance of a processor have a significant impact on its speed. Despite the complexity of floating point arithmetic, its implementation is becoming more common. As a result, high-speed adder architecture is becoming increasingly critical. To improve the efficiency of the adder, several architecture designs have been proposed. In this paper, we provide an architecture that uses a carry choose adder to perform a high-speed IEEE 754 floating point multiplier (CSA). Two carry choose based designs are presented here. These designs are based on the Vertex device family from Xilinx.
Implementation of Complex Vedic Multiplier using Three Multiplier and Kogge Stone Adder Technique
Authors – Ph.D. Research Scholar Neha Shukla, Professor Dr. Jaikaran SingH
Abstract- – The main objective of this research paper is to design architecture for complex Vedic multiplier by rectifying the problems in the existing method and to improve the speed by using the kogge stone adder with the help of hybrid square technique. The Vedic multiplier algorithm is normally used for higher bit length applications and ordinary multiplier is good for lower order bits. These two methods are combined to produce the high speed multiplier for higher bit length applications. The problem of existing architecture is reduced by removing bits from the remainders. The proposed algorithm is implementation Xilinx software with Vertex-7 device family.
Implementation for Android ‘Pay & Park’ Application
Authors – Jay Yadav, Suyash Gajbhiye, Bhavesh Tembhekar, Himanshu Khade, Asst. Prof. Mr. Kishore Peshwani
Abstract- – Among the challenges that we face in our day to day life one of most unavoidable challenge is parking the car wherever we go. As our need increases our travelling increases but due to drastic increase in usage of vehicles and increase in population we face the tough task of parking our car particularly during busiest hours of the day. During peak hours most of the reserved parking area gets full and this leaves the user to search for their parking among other parking area which creates more traffic and leaves them with no indication on availability of parking space. To overcome this problem there is definitely a need for designed parking in commercial environment. To design such parking slot we need to take into the account of reservation of parking slot with optimal parking space which depends on cost and time. Additionally, four hours prior to his expected arrival, the user can pre-book a slot in the area he desires if it is available. This will help reduce the load on the administrator as his physical work reduces drastically and user can search the parking slot through Android Application. Payment services are made available using Google Wallet, so the user is required to own a credit card or debit card. Application relieves the user from the hassle of manually searching and waiting for empty slots to park the vehicle.
RFID Based Vehicle Monitoring System
Authors – Nadeer Mohamed, Vijayakumar Adaickalam
Abstract- – In the present world, the population is increasing. Therefore, there will be more vehicle usage. Monitoring vehicles in the parking lot is a major challenge. Parking should be secured at the guarded entrance and exit. We need an automated and efficient monitoring system. RFID vehicle monitoring systems can be used to automatically collect vehicle information for efficient and safe vehicle management. An RFID tag is assigned to each vehicle. RFID readers are located at the IN and OUT gates. Information in the RFID transponder which is used to identify the vehicle is placed in it and is obtained via reader tags. An RFID reader reads the vehicle ID and sends this information to the controller for display on the monitor along with the date and time with the help of RTC module. In the case of private sector parking lots, we can identify if the vehicle is already registered in the system or not with the help of the information from the RFID transponder. This way we can identify if the vehicle is authorised or unauthorised and the barrier gate is automatically opened according to it. This information is also sent to the owner as an SMS with the help of the GSM module. The device labelled “RFID based vehicle monitoring system” can be very useful for the safe tracking of all the vehicles’ records and also providing an alert message to the owner in case of any theft. This describes a prototype development to solve recurrent monitoring problems in developing countries using RFID technology and is capable of eliminating the time wasted during manual collection of data.
Determination of chloride (Cl-) ion in water from Madurai region, Tamilnadu by Mohr’s method
Authors – Asst. Prof.M. Rajendran, K. Sivalakshmi, G. Sneha, T. Tamilroja
Abstract- – Surface water, bore well water and mineral water contain chloride ions at low concentration levels; chloride ion determination is carried out by titration with silver nitrate (AgNO3) as titrant. The chloride ion (Cl-) is a type of anion which is commonly found in the environment and it has paired with number of cations and involved in important physiological functions and industrial uses. However, a higher concentration of Cl- in water will do harm to the ecological environment, human health and industrial production. There is a great significance to monitor the level of Cl- ion content in water. Recent development of society and industry, large amounts of domestic sewage and industrial sewage are discharged into the environment, hence the water polluted by Cl-. The detection of Cl- in water has gradually become a research focus. In the present investigation we collected few water samples from Madurai region, Tamilnadu and determined the amount of chloride (Cl-) ion by Mohr’s method.
Detecting Suspicious Email using Keywords and Identifiers
Authors – Jeevan Raj S, Raghav K Sejpal, Mrs. Priya N, Dr. Mir Aadil
Abstract- – The purpose of detection of Suspicious emails are to help identify emails that contain antisocial elements and obscene or offen sivewordsusing various methods. Detecting suspicious emails using keywords/identifiers is a type of mail system that is identified by identifying keywords used by users with a suspicious motive. Keywords such as murder, kill, militant etc.if appeared in emails sent by the users. The system administrators will check all these messages and identify the users who sent these messages. The administrators can block these users and they will be prohibited from sending any further emails.
Advanced Synthesis Procedures Of Magnesium
Aluminate Spinel- A Review
Authors – Srinath Ranjan Ghosh, Soumya Mukherjee, Priyankari Bhattacharya, Sathi Banerjee
Abstract- -Magnesium aluminate (MgAl2O4) spinel (MAS) is a man-made material with good chemical, thermal, dielectric, mechanical, and optical properties. These characteristics made MAS an essential material for optically transparent windows, domes, and armours, as well as other applications for a variety of refractory purposes. The main reason for this is the high processing cost of dense MAS ceramics. Despite its high performance, it is only used in a few key applications. The use of alumina and magnesia prevents the formation of thick MAS bodies in a single-stage reaction. As a result, dense MAS bodies are created by firing in two stages. This is a time-consuming and costly operation. According to the available literature, the processing cost of dense MAS ceramics can be significantly lowered by carefully selecting initial raw materials, powder processing and densification settings, and understanding the underlying mechanisms. MAS formation and densification mechanisms. Because there is very less review article on the subject, an attempt has been made to construct this review article with a complete and comprehensive understanding of MAS. Synthesis, processing, and key applications of MAS, as well as its utility for a number of fresh and inventive uses that will emerge in the future.
A Review Of Iso In Manufacturing Industry :A Study (With Special Reference To Avtech International Ltd. Pithampur)
Authors – Nilesh Pathare, KamleshGurjar
Abstract- – ISO is a non-governmental organization that forms a bridge between the public and private sectors. On the one hand, many of its member institutes are part of the governmental structure of their countries, or are mandated by their government. On the other hand, other members have their roots uniquely in the private sector, having been set up by national partnerships of industry associations. Therefore, ISO enables a consensus to be reached on solutions that meet both the requirements of business and the broader needs of society.In the era of globalisation, major international buyers are increasingly asking their suppliers to comply with international standards to improve the competitiveness of their products. The proliferation of international standards is partly due to the World Trade Organization’s (WTO) Agreement on Technical Barriers to Trade (TBT), which encourages the use of ISO 9000 and ISO 14000 (hereinafter ISOs) as a means of preventing unnecessary barriers to international trade (WTO, 2003).
An Observant Of Log For Information And
Security Occurrence
Authors – Sumedh Arun Patil, Asst. Prof. Dr. Mir. Aadil
Abstract- – Machines are composed of several parts which produce varying velocities as well as collaborate under this machine.Like a result, these created reports occur in a range of forms, are integrated at various designs, and provide confirmation of operational flaws.As combined with metadata, it is feasible to detect all these spillovers and or the source sources of instances.The time it takes to obtain meaningful insight, across the other hand, is hampered by challenges in receiving inputs or developing advanced queries.Connecting information professionals and advisers seamlessly faces similar issues.These study states ways computer scientists must apply software Splunk traffic monitor, which mixes knowledge plus people.Splunk’s function is the part, mysql databases, workflows, and secondary finds reduce hour-long sessions of hard labor reduced mins.of efficiency, and its tags, stored results, and displays provide both practical and creative view.of efficiency, and its tags, stored results, and displays provide both practical and creative view.
Generating 3D Images from a Still Image Using Image Processing
Authors – Sayeed Mohammed Shaik, Associate Prof. Dr. R. Kamalraj
Abstract- – Images are a great visual communication tool and a most shared Media. Whether we are reliving a moment, communicating with an audience, or providing information. We can create an enhanced viewing experience by generating a dynamic three-dimensional composition from the extracted features of the still Image. By identifying elements of a still Image. Extracting Visual and Spatial Features from a still Image. Generating Mesh Objects in a three Dimensional workspace. Rendering the finalized composition to a dynamic view. By utilizing recent techniques and methods in Computer Vision and Image processing the process can be automated enabling users to create matte painting with ease and reduce human labor to perform the same task if done manually. Further with an Interactive View the User can interact with the matte painting in real time in an interactive environment such as a Canvas. Overall the User will have an easy to use tool to create matte paintings and an interactive environment to view the matte painting in the with controlled camera movement creating an enhanced viewing experience from a Still Image.
Radiology for COVID-19 Detection Using CNN Algorithm
Authors – Suraj Fate, Vaishnavi Lakhekar, Sonali Jagtap,, Prof. A. R. Dandekar, Abhishek Raut, Aanchal Sawadh, Aarti Lakhe
Abstract- – The novel corona virus, generally called COVID 19, might be a different type of corona virus which first appeared in Wuhan Province of China in December 2019. The foremost important impact of this new corona virus is its very high contagious feature which brings the life to a halt. As soon as data about the character of this dangerous virus are collected, the research on the diagnosis of COVID-19 has begun to understand plenty of momentum. Today, the gold standard for COVID-19 disease diagnosis is often supported swabs from the nose and throat, which is time-consuming and liable to manual errors. The sensitivity of those tests isn’t high enough for early detection. These disadvantages show how essential it’s to execute a totally automated framework for COVID-19 disease diagnosis supported deep learning methods using widely available X-ray protocols. During this paper, a novel, powerful and robust Convolution Neural Network (CNN) model is meant and proposed for the detection of COVID-19 disease using publicly available datasets. This model is used to choose whether a given chest X-ray image of a patient has COVID-19 or not with an accuracy of 99.20%. Experimental results on clinical datasets convey the effectiveness of the proposed model. it’s believed that study proposed during this research paper are often employed in practice to assist the physicians for diagnosing the COVID-19 disease.
ResearchPaper on Fingerprint authenticated
secure android notes
Authors – Devdutta Samal, Assistant Prof. Dr. Mir Aadil
Abstract- – Android working framework is basic for clients that the explanation it’s been utilized generally than some other working framework, however is powerless on the grounds that it tends to be hacked by the programmers or may your telephone get taken so it is been gotten by the different instruments like example, pin, secret key. Thus, in this venture I have tracked down a way how to safeguard android notes where I have executed unique mark verification which is the most gotten way motel biometric validation. This framework is simple and unmistakable as a result of its utilization as it has unique mark verification over biometric validation. This application is coordinated with unique finger impression innovation to get access inside the application. With rising instance of telephone getting hacked and getting taken versatile fabricates are involving biometric verification for portable security. Benefit of utilizing unique finger impression verification over biometric confirmation.
Information Gathering of Ethical Hacking using Reconnaissance Framework
Authors – Manoj Saha, Vijayakumar Adaickalam
Abstract- -In Global Cyber security Outlook 2022 report it has pointed that due to Covid-19 Pandemic has increase the rate of online transaction and cybercrimes. Technology has evolved rapidly and have become the essential part of life. Due to pandemic everything has been shifted to online mode for safety precautions but it has led to high cybercrimes throughout the world. According to the researcher, professional who work from home have high possibility of being the next victims. It is important and right time to know about how hacker works, which tools does the hacker use and behavior. The success of ethical hacking depends on the data and information gathered during the phase of reconnaissance, which technically means gathering information about the possible target. Reconnaissance is a very vast process which can be carried out by different tools but not together, every tool works separately which creates lot of work heads and time consuming. In this proposed work, a program is built with python programming language which provide the functionality of live network capturing, port scanning, domain information, clickjacking testing and many more features. It gives the idea of how general information can be effectively protected against the possible attacks.
Appliance Scheduling Optimization for Demand Response
Authors – M.Tech.Scholar Pankaj Tyagi, HOD Ashwani Kumar
Abstract- – The main responsibility of the demand response system is scheduling the operation of appliances of consumers in order to achieve a network-wide optimized performance. Each participating electricity consumer, who owns a set of home appliances, provides the desired expectation of his/her power consumption scenario to the demand response system. It is accompanied with time limits on the flexibility of controllable appliances for shifting their operational time from peak to off peak periods. The appliance scheduling optimization for demand response is modeled as an optimization problem. The optimization of the scheduling probabilities is carried out as an economic dispatch problem, which aims to minimize the total network utilization cost. This problem has been studied extensively in the context of micro grids.
Appliance Scheduling Optimization for Demand Response:A Review
Authors -M. Tech. Scholar Pankaj Tyagi, HOD Ashwani Kumar
Abstract- – The scheduling of appliance is controlled by different controlling algorithm. In this paper, we studied about the different demand required for domestic use and the industrial use. In this thesis, for the purpose of load profiles of appliances, the study is consider for a day of week from Monday to Friday in the season of summer for all the appliance consuming electricity in mid-size load. Appliances with major contribution in terms of energy consumptions such as dishwasher, washing machine with dryer, refrigerators, air conditioners and electric vehicle, are considered in our model to study their demand response and optimize their operation over a period of time to reduction of load curve according to the level and the cost of energy. Each partaking power buyer, who claims a bunch of home apparatuses, gives the ideal assumption for his/her force utilization situation to the interest reaction framework. It is gone with time limits on the adaptability of controllable machines for moving their functional time from top to off top periods. The apparatus planning streamlining for request reaction is demonstrated as an enhancement issue.
A Hybrid Approach Based Advanced Key Logger
Authors – PG Scholar Ms. Vishakha Samaria, Prof. Dr. Mir Aadil
Abstract- – However, it’s been found that 90% of the modern key loggers are walking in user space so that they do now no longer want any permission for execution. Our goal is targeted on detecting user space key logger. The primary goal is to forbid user space key logger from stealing private information and facts. For this purpose, we use a method that is truly primarily based totally on detection way strategies for user space key loggers, a crucial class of malware packages. We intend to obtain this purpose with the aid of using matching I/O of all procedures with a few simulated pastimes of the consumer, and we assert detection in case the 2 are correlated. The gift looks at become targeted at the detection of maximum not unusual place unprivileged consumer area key logger. In this research, keylogger is a tool, made to store all the keystroke generated thru the device which sanctions hackers to scouse borrow touchy facts without consumer’s goal. Privileged additionally is based at the get admission to for each implementation and site with the aid of using Kernel key logger, the whole message transmitted from the keyboard drivers, even as the programmer really is based on kernel degree centers that interrupt. The gift looks at become targeted at the detection of maximum not unusual place unprivileged user space key logger. In this research, we provided a Python Code that lets in the customer to stay respectively with key logging malware without putting his safety in danger. In the look at, it has displayed the key logger reaction with the aid of using matching the enter from keystrokes and with the output i.e., I/O designs which are introduced with the aid of using the key logger. We successfully evaluated our codes in comparison to the maximum diagnosed loose key loggers with false positives and/or negatives fake have been reported. Our codes formally permit the felony API to retrieve their real information even as revealing the key loggers to real noisy stream.
Community Detection using Girvan Newman algorithm in Recommendation systems
Authors – Abhishek Raj Permani, Swapnil Narayan
Abstract- – Any e-commerce site we visit, there is the set of recommendations for us already, it might be based on many parameters like- our search history, shopping preferences, location we are located and many more. Collaborative filtering techniques are popularly used techniques for giving recommendations to the users. But Collaborative technique also suffers with cold start problem, when some new item or user is operated on the system. This paper approaches this problem using hybrid techniques of Girvan Newman algorithm-based alternating least square factorization. Girvan Newman algorithm is a hierarchical method used to detect communities in complex systems and alternating least square algorithm is used to predict recommendations.
A Review Article of Channel Estimation and BER Reduction Using Artificial Neural Network
Authors – M.E. Scholar Pankaj Kumar, Asst. Prof. Komal Kanojia
Abstract- -The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in manufacturing industries. Although significant progress achieved and surveyed in addressing ANN application to PR challenges, nevertheless, some problems are yet to be resolved like whimsical orientation (the unknown path that cannot be accurately calculated due to its directional position). Other problem includes; object classification, location, scaling, neurons behavior analysis in hidden layers, rule, and template matching. Also, the lack of extant literature on the issues associated with ANN application to PR seems to slow down research focus and progress in the field. Hence, there is a need for state-of-the-art in neural networks application to PR to urgently address the above-highlights problems for more successes. The study furnishes readers with a clearer understanding of the current, and new trend in ANN models that effectively addresses PR challenges to enable research focus and topics.
Images Forgery and JPEG Double Compression Detection using forensics approach
Authors – Mohammad Shadeed, Layth Abu Arram
Abstract- -As the usage of digital pictures has grown, so have the methods and motivations to manufacture forged digital images. As a result, there is an urgent demand for digital picture forensic systems capable of identifying image changes and falsified photos. Many procedures may be employed and evaluated in image processing, and in this article we describe pixel value comparison and statistical effects, which must be referred to intrinsic maps in the image pixel value histogram, and then offer forensic ways to identify manipulation. Image falsification, double compression detection, and image falsification On the useful impacts of digital forensics, we offer a method for detecting additives through noise, observation, and simulation, which demonstrates its efficiency after multiple testing. The portions of this research referred to the findings in the discovery of different unique handicrafts that aid in digital forensics.
Prediction of Wine Quality Using Machine
Learning Algorithms
Authors – Associate Prof. Lakshmi.D, Anil Kumar.B, Guda V.S.C.S.S.Gowtham, Konda Venkata Saran Vineeth
Abstract- – Wine classification is a difficult task since taste is the least understood of the human senses. A good wine quality prediction can be very useful in the certification phase, since currently the sensory analysis is performed by human tasters, being clearly a subjective approach. An automatic predictive system can be integrated into a decision support system, helping the speed and quality of the performance. Furthermore, a feature selection process can help to analyze the impact of the analytical tests. If it is concluded that several input variables are highly relevant to predict the wine quality, since in the production process some variables can be controlled, this information can be used to improve the wine quality. Classification models used here are 1) Random Forest 2) Stochastic Gradient Descent 3) SVC 4) Logistic Regression.
A Survey on Solar Photo Voltaic Based Power Prediction Techniques and Features
Authors – Sumit Kumar, Asst. Prof. Durgesh Vishkarma
Abstract- -The increased competitiveness of solar PV panels as a renewable energy source has increased the number of PV panel installations in recent years. In the meantime, higher availability of data and computational power has enabled machine learning algorithms to perform improved predictions. So this paper focuses on this problem of increasing the solar panel installation without knowing approximate output. Here various approaches adopt by researchers which was detailed in this paper. Here different techniques of prediction were discussed with their feature set. This paper has summarized issues still present in this field of research.
Fabrication for Agricultural Fertilizer Sprayer Runs on Smart Solar Energy
Authors – Assc. Prof. Dr. B Srinivasulu, Mohd Shanawaz Khan, Abdul Riyaz, Mohd Arbaz Khan
Abstract- -Energy demand is a major thread for our country. Nowadays, with the depletion of the conventional sources of energy the usage of non-conventional sources is in a rise. To meet this huge energy demand one of the important sources that can be used is the solar energy. As this solar energy is being used in many other places like pumping water from the well, it will also prove helpful to the farmer by implementing it in agriculture sector. By introducing solar energy, the pollution due to the usage of diesel and petrol is controlled. Hence in agricultural sector solar energy can be used for spraying fertilizers, pesticides, etc., with the help of solar sprayers. In this paper we have discussed that instead of using fossil fuels like diesel, petrol, etc., for spraying fertilizers solar power is used, where the later proves to be efficient than the former. The system was fabricated by considering parameters like desired spraying capacity, low weight, low cost, user-friendly nature, high operating time and for faster coverage of area. Thus, the solar sprayer was fabricated to be a value for money product in the agricultural sector. For designing the prototype, the conventional sprayer system was studied to understand the mechanism for spraying process.
Voting System Design with Finger Print Authentication
Authors – Amrapali Pataskar, Prasad Shete, Santosh Londhe, Ashwini Bade
Abstract- –Our study report focuses on developing a system that deals with fingerprint voting system which can help in process of election in robust and secure manner. The system uses hardware components like microcontroller, finger print sensor, button switches, LCD display, etc. For the implementation of this system, R350 fingerprint sensor is used to take user finger print image and store in internal memory, and these images are further processed and analyzed using IC. The HMI is implemented using 16x2LCD screen, which is mainly used to print the instruction of the complete project.
To Develop a New Method for Crowd Size Estimation in Real Time Application
Authors – Dr. A.N. Thakare, Harshada Yenurkar, Sakshi Yenurkar, Sunny Taksande, Shrirang Chaware, Harshika Yelane, Dipali Wankhede
Abstract- — The growing number of people in the crowd scene may increase the probability of security threat, which make crowd size estimation more important. In this digital Era, physical counting of people in crowd is very old fashioned and time consuming method. These methods fail in places where the movement of crowd is random. We are developing this propose system for situation where emergency evacuations are required. Most of the existing approaches could not estimate crowd in real time. This paper introduces new method for crowd size Estimation in real time application to improve accuracy of crowd. Most of the available methods could not measure the crowd in real time. This paper introduces a new way to measure crowd size in real-time application to improve crowd accuracy. The system uses a processor to exploit. Compatible computer framework for accomplishing fast processing of video- captured video feeds. This function helps to create a model to find the head captured by the camera. This system provides additional accuracy in estimating the total population.
F-OFDM and UF-OFDM Based Performance Analysis of PAPR Reduction
Authors – M.Tech Scholar Shankar Kumar, Asst. Prof. Sneha
Abstract- — In this paper proposed a combine technique of precoding and PTS to reduce the PAPR. This hybrid combined technique reduces PAPR effectively and also minimizes the complexity of PTS technique which arises due to number of sub blocks. In PTS scheme, as the number of sub blocks increases, the IFFT operation to be performed for sub blocks also increases. Simulation results have shown that the decrement of PAPR of proposed scheme is more than PTS and precoding methods as well as the complexity reduced significantly. The out of band radiation of proposed scheme is less than original OFDM as shown in power spectral density (PSD) simulation result. The UF-OFDM and F-OFDM systems are both used in this suggested system, and a precoding-based PAPR reduction strategy is implemented by using the zadoffchu transform precoding method. With this approach, the UF-OFDM signal is transformed into a lower order summation of single carrier signals and the F-OFDM signal is transformed into a lower order summation of single carrier signals. And in the performance evaluation is based on the BER, PAPR and IAPR is calculated on the obtained output.
Smart Car Parking System
Authors -Wagh Shripal Vasant, Shiledar Amir Gulabhusen, D’Souza Patrick Anton, Ashwini Bade
Abstract- — The use of cars have used drastically in last few years. There are various reasons for increase in car demand. Car is also a symbol of status. Change in the people’s life style and growth in technology also made car affordable. Now-a-days, peoples don’t like to travel in public transport and feel continence in driving own car. Especially after the COVID-19 pandemic situation, peoples find safe traveling in personal car instead of sharing the seat in public transport. A car also provides the comfort considering the global warming and environment changes. This results the drastic increase in number of cars user, resulting increase in traffic and pollution. These are known issues, but here we have studied a most neglected issue and that is the parking problem. As car is expensive item its spare parts are also expensive. Hence it is always a threat of thief, damage etc. So, parking on roadside is not safe. In cities, to resolve parking issues there are Paid/Free parking zones are available. These parking zones are maintained manually and there are many gaps in the system, due to which the facility is not utilized efficiently. Most of the user time is wasted for searching and parking vehicle. This system provides a solution to the owner as well as the user. The embedded system installed in parking zone will keep the records of IN-OUT cars and bill them based on the parking duration. Similarly, the android application helps the user by telling him the available parking slots and facilitates him to book a parking slot in advance. The owner can specify the definite parking slot to park his car. This saves time to find the available slot and avoid inconvenience. Digital payment mode eliminated the issue of keeping change. In this way, this system is a complete package to facilitate the user and the owner both to work efficiently and effortlessly.
Rainfall Forecasting Using Machine Learning Algorithms for the Various Ecological Zones of Ghana
Authors -Asst. Prof. Nallusamy P, Pachava Harsha Vardhan, Pedasingu Manikanta, Sridharla Manikanta, Vinoth R
Abstract- — Rainfall forecasting could be very crucial due to the fact heavy and abnormal rainfall will have many influences like destruction of plants and farms, harm of belongings so a higher forecasting version is important for an early caution that could reduce dangers to lifestyles and belongings and additionally coping with the rural farms in higher way. This prediction particularly enables farmers and additionally water assets may be applied efficiently. Rainfall prediction is a difficult undertaking and the effects ought to be accurate. Precipitation is the meteorological marvel that has the excellent have an effect on human exercises. Precipitation is notably aimed toward meals era strategy, supervision of water source, altogether motion methods within side the landscape.
Rainfall Forecasting Using Machine Learning Algorithms for the Various Ecological Zones of Ghana
Authors -Asst. Prof. Nallusamy P, Pachava Harsha Vardhan, Pedasingu Manikanta, Sridharla Manikanta, Vinoth R
Abstract- — Rainfall forecasting could be very crucial due to the fact heavy and abnormal rainfall will have many influences like destruction of plants and farms, harm of belongings so a higher forecasting version is important for an early caution that could reduce dangers to lifestyles and belongings and additionally coping with the rural farms in higher way. This prediction particularly enables farmers and additionally water assets may be applied efficiently. Rainfall prediction is a difficult undertaking and the effects ought to be accurate. Precipitation is the meteorological marvel that has the excellent have an effect on human exercises. Precipitation is notably aimed toward meals era strategy, supervision of water source, altogether motion methods within side the landscape.
Sign Language Recognition Using Machine Intelligence for Hearing Impairment Person
Authors -P.Elayaraja, V.Gowtham, S.Karthick, T.Karthikeyan
Abstract- — Rainfall forecasting could be very crucial due to the fact heavy and abnormal rainfall will have many influences like destruction of plants and farms, harm of belongings so a higher forecasting version is important for an early caution that could reduce dangers to lifestyles and belongings and additionally coping with the rural farms in higher way. This prediction particularly enables farmers and additionally water assets may be applied efficiently. Rainfall prediction is a difficult undertaking and the effects ought to be accurate. Precipitation is the meteorological marvel that has the excellent have an effect on human exercises. Precipitation is notably aimed toward meals era strategy, supervision of water source, altogether motion methods within side the landscape.
DOI: /10.61463/ijset.vol.10.issue2.212
Automatic Temperature Screening and Sanitizing with Face Mask and RFID Detection Using Raspberry PI
Authors -Dharmalingam M, Gowsalya M,Janani M, Jhansi M, Kamali M
Abstract- — The novel Coronavirus had brought a new normal life in which the social distance and wearing of face masks plays a vital role in controlling the spread of virus. But most of the people are not wearing face masks in public places which increase the spread of viruses. This may result in a serious problem of increased spreading. Hence to avoid such situations we have to scrutinize and make people aware of wearing face masks. Humans cannot be involved for this process, due to the chance of getting affected by corona. Hence here comes the need for artificial intelligence which is the main theme of our project. Our project involves the identification of persons wearing face masks and not wearing face masks in Educational Institutions and Industries by means of using image processing and AI techniques and sending alert messages to authority persons.
DOI: /10.61463/ijset.vol.10.issue2.213
Pulmonary Lobe Based Lung Diseases Detection Using Deep Learning Techniques
Authors -Yuvaraja T, Aruna S, Atchaya L, Bhavadharani M, Jeevetha U
Abstract- – Coronavirus disease 2019 (COVID-19) is an infectious disease triggered by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Since the disease has spread all over the globe in enormous numbers and is declared a pandemic. Although radiological imaging is not recommended for diagnostics as the patient arrives in the clinic, a chest X-ray is often useful to monitor treatment outcomes and comorbidities in seriously ill patients. The detection of COVID-19 from chest X-ray and its differentiation from lung diseases with identical opacities is a puzzling task that relies on the availability of expert radiologists. Recently, several researchers have reported the use of AI-based tools in solving image classification problems in healthcare, based on training with X-ray images, CT scans, histopathology images, etc. Deep learning is an extremely powerful tool for learning complex, cognitive problems, and the frequency of their use and evaluation in different problems is increasing. In the present study, we have made use of a deep learning algorithm using the convolutional neural network (CNN) that can efficiently detect COVID-19 from CT-scan images. And also implement Multi-class CNN to identify the multiple lung diseases such as Pneumonia, tuberculosis, and so on. Experimental results shows that the proposed system provides improved accuracy in disease prediction and also provide the diagnosis information about analyzed diseases.
DOI: /10.61463/ijset.vol.10.issue2.214
Real-Time Vehicle Driver Drowsiness Prediction Using Image Processing
Authors -Dr.R.Sathya, Harini M, Megavathi S, Vishalini V
Abstract- – Drowsiness while driving is a significant cause of road accidents, leading to fatal consequences. This paper presents a real-time driver drowsiness detection system utilizing image processing and an improved Eye Aspect Ratio (I-EAR) technique. The system employs Haar cascade classifiers for facial and eye region detection, followed by an I-EAR calculation to determine the driver’s drowsiness state. If prolonged eye closure is detected, an alert is triggered to warn the driver. The proposed method enhances road safety by providing an efficient and non-intrusive way to monitor driver alertness. Experimental results validate the system’s effectiveness under different lighting conditions and facial variations. The paper also discusses the integration of the system into real-world applications and its adaptability to different driving environments.
DOI: /10.61463/ijset.vol.10.issue2.215
IoT Enabled Optimized MPPT Techniques for Solar Power Generation in Smart Building
Authors -P.Tamilnesan, M.Mohamed Aslam, M.harikrishnan, M.Poovarasan, B.Santhosh
Abstract- – The technology to generate strength from renewable assets is to apply solar cells to convert sun irradiance into electricity. The intention of this paper is to design a maximum strength point monitoring gadget for solar panels. the primary cause of this undertaking is to study the overall performance of PV arrays beneath varying weather situations. A database of hourly solar radiation and temperature turned into gathered for this have a look at it. The sun photovoltaic gadget requires better automation of the system, controlling, monitoring flora the use of remotely with different sorts of sensors which are interfaced with the system and then sought to pick out the problems using IoT generation for controlling and producing solar photovoltaic strength can significantly impact the performance, monitoring, and management of the plant using numerous wireless conversation technology techniques after which removing interrupting issues in a very quick time. The proposed system carried out a sun strength era and tracking system with IoT sensors and produce continuous strength.