Paper Type | :: | Research Paper |
Title | :: | Academic Assesment & Performance Prediction Using Data Mining |
Country | :: | India |
Authors | :: | Shivam Tiwari || Barkha Bhardwaj || Namrata Dhanda || Bramah Hazela |
Page No. | :: | 01-04 |
Keyword :Quality Administration, linear regression, information mining, prediction system, Support vector machine, naïve Bayes
Paper Type | :: | Research Paper |
Title | :: | Extension of Data Science Techniques in Education Prognosis |
Country | :: | India |
Authors | :: | Barkha Bhardwaj || Shivam Tiwari || Bramah Hazela || Namrata Dhanda |
Page No. | :: | 05-08 |
In today's world, the most critical problem being faced by the students while looking for the courses like which course is better among the available course for them and how can they say that this particular course is beneficial for them? Due to this dilemma, students usually go for a course in which either they regret later or drop the course in between. As a result, they face problem during their courses. Most of the time, student go according to the suggestions given by the peer, teacher, friends, family that ultimately creates confusion in the process of selecting the course and they make a random decision that affects their motivation to complete the course. So, there is a need for such a system that would provide them a better prediction about a course that would actually be beneficial for them and should also maintain their motivation to complete it. So, in this paper we're discussing data science and data mining techniques like Regression, Decision Tree, Classification, Clustering, etc. for the better prediction in higher education
Keywords: Random decision, prediction, data mining, regression, classification, clustering.
Paper Type | :: | Research Paper |
Title | :: | Foreground Segmentation and Change Detection Using Singular Value Decomposition |
Country | :: | India |
Authors | :: | Priyanshi Sachan || Pooja Khanna |
Page No. | :: | 09-14 |
Separating background from a video image is an important step for change detection. Most of the change detection methods depend on intensity and texture variations. These algorithms may not give very satisfactory results because of the illumination variation and presence of noise. In this paper we have attempted to segregate moving foreground from video data set and change detection in time series data sets using singular value decomposition (SVD) which is a generalization of the Eigen decomposition which can be used to analyze rectangular matrices. 'CDnet 2012', an open source dataset is used as input image dataset. We have taken SVD for all input images and singular values of all these images were used for detecting any change present in images. A comparison was made for obtained results with the results of 'CDnet 2012'. It is found that the obtained results are very effective and clearly segregate foreground.
Keywords : Background Subtraction, Singular Value Decomposition, Eigen Values, CDnet 2012.
[1]. Singular Value Decomposition (SVD) Tutorial. BE.400 / 7.548
http://web.mit.edu/be.400/www/SVD/Singular_Value_Decomposition.html
[2]. C. Hsu and C. Chen, SVD-Based Projection for Face recognition http:// ieeexplore. ieee.org/xpl/ articleDetails.jsp?
arnumber=4374514
[3]. SingularValuedecomposition,Wolfram MathWorldhttp://mathworld.wolfram.com/SingularValueDecomposition.html
[4]. Singular Value Decomposition (SVD) – Chapter 4
https://www.cs.cmu.edu/~venkatg/teaching/CStheory-infoage/book-chapter-4.pdf
[5]. Banerjee, Sudipto; Roy, Anindya (2014), Linear Algebra and Matrix Analysis for Statistics, Texts in Statistical Science (1st ed.)
Paper Type | :: | Research Paper |
Title | :: | Artificial Intelligence: A Tool in Machine Translation |
Country | :: | India |
Authors | :: | Trupti Mishra |
Page No. | :: | 15-19 |
The thought process of humans is formulated according to the language one is familiar with. The process of reasoning process is complex. It is highly dependent on the language in which humans think and express their ideas. The human brain immediately starts the process of translating a text from one language to another. Translation is not just literal, word to word conversion of text from one language to the other, but the context and culture where the said languages are prevalent also play a vital role. Today, translation is based on literal conversions using methods like pattern recognition. The available corpora of knowledge is also limited. This paper attempts to explore how artificial intelligence can be used as a tool in machine translation and how far can it be used as a replacement of human translation.
Keywords: Translation, Artificial Intelligence, Machine Translation, knowledge
[1]. ALEKSY, M., Korthaus, A., and Schader, M., CARLA – A CORBA-based Architecture for Lightweight Agents, in: Proceedings of
the IEEE/WIC International Conference on Intelligent Agent Technology (IAT'03), Halifax, Canada 2003.
[2]. AU, R., Yao, M., and Looi, M., Privilege Negotiation Agents for Distributed Authorisation on World Wide Web, in: Proceedings of
the IEEE/WIC International Conference on Intelligent Agent Technology (IAT'03), Halifax, Canada 2003.
[3]. Chavez, A., Maes P., Kasbah: An Agent Marketplace for Buying and Selling Goods, in: Proceedings of the 1st International
Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, London 1996.
[4]. COSSENTINO, M., Sabatucci L., and Chella A., A Possible Approach to the Development of Robotic MultiAgent Systems, in:
Proceedings of the IEEE/WIC International Conference on Intelligent Agent Technology (IAT'03), Halifax, Canada 2003.
[5]. COST, S., Chen, Y., Finin, T., Labrou, Y., and Peng, Y., Using Colored Petri Nets for Conversation Modeling, Issues in Agent
Communication, Lecture Notes in AI, Springer-Verlag, Berlin 2000.
Paper Type | :: | Research Paper |
Title | :: | Model for Smart Web services using Intelligent Assistance |
Country | :: | India |
Authors | :: | Urvi Mitra || Roopanshi Dixit || PoojaKhanna || Puneet Sharma |
Page No. | :: | 20-25 |
In current era of digitization most of the services are now offered as E-services; E- shopping, E Governance, E-Healthcare. For a non E-educated person it is the biggest challenge to survive in E-world. There is a huge gap between demand and supply of E-services. The world of internet is full of latest and advance web services but they are not being used by even 50% of total internet users. One of the reason for such a huge gap in; services offered and their utilization by common men, is lack of knowledge and fear. With studies it is found that corrective measures are required to deal with the problem. The work here is a sincere effort in the direction of providing smart web services for users.............
Keywords: Chatbot, deep learning, customer service, intelligent system, conversational agent
[1]. Alan Ritter, Colin Cherry, and William B Dolan. Data Driven Response Generation in Social Media.In Proc. of EMNLP, 2011,
583-593.
[2]. AnjuliKannan, Karol Kurach, Sujith Ravi, Tobias Kaufmann, Andrew Tomkins, BalintMiklos, Greg Corrado, Laszlo Lukacs,
Marina Ganea, Peter Young, and VivekRamavajjala. Smart Reply: Automated Response Suggestion for Email. In Proc. of KDD,
2016, 955-964
[3]. IlyaSutskever, OriolVinyals, and Quoc V Le.Sequence to Sequence Learning with Neural Networks. In Proc. of NIPS, 2014, 3104-
3112
[4]. Tomas Mikolov, IlyaSutskever, Kai Chen, Greg S Corrado, and Jeff Dean.Distributed Representations of Words and Phrases and
Their Compositionality.In Proc. of NIPS, 2013, 3111-3119.
[5]. Q. Vera Liao1, Muhammed Mas-ud Hussain2,4 *, Praveen Chandar2,6 †, Matthew Davis2, Yasaman,Khazaen2, Marco Crasso3,
Dakuo Wang1, Michael Muller2, N. Sadat Shami5, Werner Geyer2,IBM Research, 1Yorktown Heights, NY, USA; 2Cambridge,
MA, USA; 3Capital Federal, Argentina4Northwestern University, Evanston, IL, USA,IBM, Armonk, NY, USA, 6Spotify Research,
New York, NY, USA. All Work and no Play? Conversations with a Question-and-Answer Chatbot in the Wild
Paper Type | :: | Research Paper |
Title | :: | Multilayer fibonacci Structures Containing Single-Negative Metamaterials Conditioned in Photonic Transmission Spectra |
Country | :: | India |
Authors | :: | Vishal Kumar Singh || Vishal Singh Chandel |
Page No. | :: | 26-31 |
In this work we studied transmission properties of the Fibonacci semi periodic layered structure comprising of a couple of two fold/double positive (DPS), epsilon-negative (ENG) and mu-negative (MNG) materials. Frequently electrically thinMNG and ENG meta-materialslayers considered in microwave reduplication location. It is observed that there exist the polarization-subordinate with invariant transmission gap with a difference in layer scale and angle of incident (approximate negligent angle). The successful medium hypothesis has been utilized to clarify the properties of transmission spectra of DPS-MNG, DPSENG and ENG-MNG multilayerFibonacci structures.
Keywords- Meta material,Photonic crystal, transmittance, band gap and Fibonacci.
[1]. Fredkin, D. R. and A. Ron, "Effectively left-handed(negative index) composite material," Appl. Phys. Lett., Vol. 81, 1753,
2002.
[2]. Li, J., L. Zhou, C. T. Chan, and P. Sheng, "Photonic band gap from a stack of positive and negative index materials," Phys.
Rev. Lett., Vol. 90, 083901, 2003.
[3]. Srivastava, S. K. and S. P. Ojha, "Enhancement of omnidirectional reflaction bands in one-dimentionalphotonic crystals with
left-handed materials," Progress In Electromagnetics Research, PIER 68, 91 –111, 2007.
[4]. Srivastava, R., S. Pati, and S. P. Ojha, "Enhacement of omnidirectional reflection in photonic crystal hetro structures," Progress
In Electromagnetics Research B, Vol. 1, 197–208, 2008.
Paper Type | :: | Research Paper |
Title | :: | Revisiting Secured Software Development: Information Security Perspective |
Country | :: | India |
Authors | :: | Syed Wajahat Abbas Rizvi || Pawan Singh |
Page No. | :: | 32-36 |
Current scenario of Information Technology has been witnessing the development of variety of software applications. These applications are being developed by various developers in order to cater the customer requirements those are exponential growing day by day. No doubt, it has facilitated the end user but on the other side also raised the possibilities of weaknesses, defects and the vulnerability of the system that further reduces the desirable security of the information handled through these software. Subsequently, make the application more unsecure and highly complex, and at the same time losing the trust as well as the good will of the end user. As Information Security in software applications is a critical issue.........
Keywords: Information Security, Secured Software Development, Software Metrics, Security Measurement, Software Requirements, Early Stage Measures.
[1]. Chowdhury, I., &Zulkernine, M. (2011). Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities,
Journal of Systems Architecture, 57(3), 294-313
[2]. Easterbrook, S., & Paul, A.S. (1998). An Experience Report on Requirements Reliability Engineering Using Formal Methods. IEEE
Transactions on Software Engineering, 24(1), 4-14.
[3]. Gilliam, D. P., Wolfe, T. L., Sherif, J. S., & Bishop, M. (2003). Software Security Checklist for the Software Life Cycle, Twelfth
International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, ACM Digital Library
[4]. Graham, D., Finzi, S., & Glib, T. (1993). Software Inspection. New York: Addison-Wesley, ISBN-10: 0201631814
[5]. Gupta, P. N., Singh, P., Singh, P. K., & Kumar, A. (2012b). A Comparative Analysis of Page Ranking Algorithms, International
Journal of Computer Science and Telecommunications, 3(10), October 2012,33-39
Paper Type | :: | Research Paper |
Title | :: | Key Emerging Technologies of 5G Mobile Communication Network |
Country | :: | India |
Authors | :: | Suhani Sengar || Satish Kumar |
Page No. | :: | 37-40 |
In the upcoming years, the 5G mobile communication network will be established across the globe aiming to remove all the obstacles in the communication network and provide a wireless world. In the near future i.e. [beyond 4G some of the prime objectives or demands that needs to be addressed are fast network, high capacity, Intelligent handover, service in remote areas, reliable service in crowded areas, pseudo outdoor communication, spectrum allocation, energy efficiency etc. that solves the existing problems in mobile communication network. This paper presents the results of detailed survey on 5G mobile communication and a study on key emerging technologies, challenges, and future aspects.
Keywords : Intelligent Handover, Pseudo outdoor communication.
[1]. "Study on scenarios and requirements for next generation access technologies", 3GPP, Sophia Antipolis, France, Tech. Rep. 38.913,
Jun. 2017.
[2]. Pekka Pirinen, A brief overview of 5G research activity, ICST, 2014, PP.17-22
[3]. Martion Dannenberg, Rohit Datta, Andreas Festag, Gerhard Fetteis, Experimental testbed for 5G cognitive radio access in 4g LTE
cellular systems, IEEE Sensor Array and Multi Channel Signal Processing Workshop, 2014, pp.321-324
[4]. ICT-317669 METIS Project, Scenarios, Requirement and KPIs for 5G Mobile and Wireless Communication System
[5]. S. Patil, V. P. Bhat, A review on 5G technology, Int, J. Eng. Innovative Technology ( IJEIT) (1) (2012) 26-30
Paper Type | :: | Research Paper |
Title | :: | A Comprehensive Review on Various Applications and Challenges for Flying Ad hoc Networks |
Country | :: | India |
Authors | :: | Sumit Kumar Gupta || Sachin Kumar || Sudhanshu Tyagi || Sudeep Tanwar |
Page No. | :: | 41-45 |
Exponential growth of wireless ad hoc networks and its un-reliable nature on pre-existing infrastructure is attracting various industries for different applications. Flying Ad hoc networks (FANETs) is a latest technology of ad-hoc network which has captured the attention of investors due to its unique flying nature. FANET consist of different nodes that can fly at high altitude like balloons, unmanned aerial vehicles (UAVs), and have the ability to fly without the pilot. Common applications of FANET are surveillance, agriculture, photography, etc., and the challenges which can open the opportunity for researchers are multipath propagation, severe shadowing, traffic load balancing, mobility............
Keywords- MANET, FANET, UAV
[1]. Alshbatat, A.I., Dong, L.: Cross-layer design for mobile ad-hoc unmanned aerial vehicle communication networks. In: 2010
International Conference on Networking, Sensing and Control (ICNSC). IEEE (2010).
[2]. Dey, N., Mukherjee, A.: Embedded Systems and Robotics with Open Source Tools. CRC Press (2016)
[3]. Ateef Altaf Munshi, Shikha Sharma and Dr. Sandeep Singh Kang: A Review on Routing Protocols for Flying Ad-hoc Networks,
Proceedings of the International Conference on Inventive Research in Computing Applications (ICIRCA 2018) IEEE Xplore
Compliant Part Number: CFP18N67-ART; ISBN:978-1-5386-2456-2
[4]. Ozgur Koray Sahingoz: Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, J Intell Robot Syst
(2014) 74:513–527 DOI 10.1007/s10846-013-9959-7
[5]. Anuradha Chauhan, and Ms. Renu Singla. "A Detail Review on Unmanned Aeronautical Ad-Hoc Networks." International Journal
of Science, Engineering and Technology Research (IJSETR), May 2016.
Paper Type | :: | Research Paper |
Title | :: | A Heuristic Approach for Fake Currency Identification |
Country | :: | India |
Authors | :: | Kamlesh Kumar Singh || Sachin Kumar || Pragya |
Page No. | :: | 46-51 |
Every economy runs on profit and losses, losses incurred can damage economy and wellbeing of the Nation. Economy in broad sense refers to prosperity of a nation in terms of production, distribution and trade, however there are certain negative events which hamper the growth of the economy, one such area is unauthorized printing and circulation of fake currency. Though every government is employing experts and utilizing the best solutions possible to curb the issue, yet estimated average damage in 2018 was about Rs 400 crore in India itself. Thus it is required to plan a framework that is useful in identification fake paper money notes with quick speed and in less time.........
[1]. Ji Qian, Dongping Qian, MengjieZhang,″A Digit Recognition System for Paper Currency Identification Based on Virtual
Instruments"1-4244-0555-6/06 (© 2006IEEE.
[2]. Y.Y.Tang,H.D.Cheng,&C.Y.Suen,"Transformation-Ring-Projection(TRP) Algorithm and Its VLSI Implementation",
Character & Handwriting Recognition: Expanding Frontiers, 1991, World Scientific PublishingCo. Pte. Ltd.,Singapore
[3]. http://rbi.org.in/currency/Sec_fea_Rs500.html
[4]. Foresti G.L, Regazzoni C,″A hierarchical approach to feature extraction and grouping" IEEE Trans
ImageProcessing,2000;9(6):1056-74.
[5]. EuisunChoi,JongseokLeeandJoonhyunYoon,″FeatureExtractionforBankNote Classification Using Wavelet Transform" 2006
@ISBN ISSN:1051- 4651 , 0-7695-2521-0 ,IEEE
Paper Type | :: | Research Paper |
Title | :: | Smart Fix Home Automation Using Internet of Things |
Country | :: | India |
Authors | :: | Sanjeev Gangwar || Ashok Kumar Yadav || Santosh Kumar Yadav |
Page No. | :: | 52-55 |
We are in the age of rapid technology change, where working on new technology is booming to create new things to easier the living style of human beings. This idea re present to design and implement a minimum cost and a highly secure home automation system which are controlled by smart phones. The whole system is based on Arduino Uno board connected with relay to access and control the home automated appliances with the help of android Smart phone. The communication medium between hardware and software is done using the low cost Bluetooth module i.e. wireless system implementation is going to be done. This system is design to provide low cost and easy to implement home automation system to control different electrical appliances. Each system is secure with the unique security feature of Bluetooth pairing technique i.e. based on MAC address to provide security feature during the connectivity.
Keyword: Arduino Uno, Smart phone, Android IDE, Bluetooth, Arduino BT.
[1]. Gaurav Tripathi, Dhananjay Singh, and Antonio J. Jara, "A survey of Internet-of-Things: Future Vision, Architecture, Challenges
and Service", IEEE World Forum on Internet of Things (WF-IoT), 2014, pp. 287-292
[2]. Neng- Shiang Liang; Li-Chen Fu; Chao-Lin Wu. "An integrated, flexible, and Internet-based control architecture for home
automation system in the internet era". Proceedings ICRA `02. IEEE International Conference on Robotics and Automation, Vol. 2,
pp.1101-1106, 2002.
[3]. E. Yavuz, B. Hasan, I. Serkan and K. Duygu. "Safe and Secure PIC Based Remote Control Application for Intelligent Home".
International Journal of Computer Science and Network Security, Vol. 7, No. 5, May 2007.
[4]. B. Koyuncu. "PC remote control of appliances by using telephone lines". IEEE Transaction on Consumer Electronics, Vol. 41,
Issue 1, pp.201-209, 1995.
[5]. Chao-Lin Wu, Yi-Show Tseng, and Li-Chen Fu, "Spatio-Temporal Feature Enhanced Semi-supervised Adaptation for Activity
Recognition in IoT-based Context-aware Smart Homes", IEEE International Conference on Green Computing and Communications
and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013, pp. 460-467.
Paper Type | :: | Research Paper |
Title | :: | Routing Optimization for Wireless Sensor Network Using Genetic Algorithm |
Country | :: | India |
Authors | :: | Kushagra Seth || Sumita Mishra || Pallavi Asthana |
Page No. | :: | 56-63 |
This paper discusses about various routing optimization methods employed in wireless sensor network with main focus on genetic algorithm based optimization.Wireless Sensor Network (WSN) is composed of various types of networks which are randomly distributed to process or transfer the data to another step or path. It is used commonly nowadays in industrial applications like street light, health care monitoring, water impurities measuring devices, weather prediction, soil condition etc. One of the important uses of WSN is in the area of machine monitoring like rotating machine where it is difficult for engineers to take measurement from hard wired sensors and more relevant to wired sensors, wireless sensors are much cheaper than them.
Keyword: Wireless Sensor Network, optimization techniques, genetic algorithm, Sensor Nodes.
[1]. S.Ramakrishnan and Ibrahiem "M., Wireless Sensor Network from theory to Application" 1st ed. , United States : CRC Press 2013,
pp. 10-50.
[2]. Ruiz-Garcia L, Lunadei L, Barreiro P, et al. "A review of wireless sensor technologies and applications in agriculture and food
industry: state of the art and current trends". Sensors, 2009, 9(6): 4728-4750.
[3]. N. Jamal "Routing Techniques in wireless networks a survey" IEEE Wireless Communication, Vol 11(6), 2012.
[4]. S. Rajahekaran, G.A.Vijayalksmi- "Neural Network, Fuzzy Logic and Genetic Algorithm: Synthesis and Application" Published
2008.
[5]. Ferentinos K P, Tsiligiridis T A. "Adaptive design optimization of Wireless Sensor Network using Genetic Algorithm." Computer
networks, 2007, 51(4): 1031-1051
Paper Type | :: | Research Paper |
Title | :: | Utilization of Data Science to Investigate the Role of Nano Materials in Road Transportation Engineering |
Country | :: | India |
Authors | :: | Ajay Kumar Singh || Asita Kulshreshtha |
Page No. | :: | 64-66 |
Nanotechnology is the technology in which nanoscale material properties are utilized in construction or formulation of new composite materials. When the conventional materials interacts with nanoparticles their physical parameters change dramatically. The reason being that nanoparticles provide highly reactive sites on their surface[1] bringing in unusual physical, chemical, and biological properties at the nano scale, differing in important ways from properties of bulk materials. Some nanostructured materials are stronger or have different magnetic properties compared to other forms or sizes of the same material. Working at the nanoscale enables us to utilize the unique physical properties of the nanomaterials. Presently we have made a comparative study of various parameters obtained by previous workers to find out the economicviability of the nanomaterials.
Keyword: Nanosilica (NS), Nanoclay (NC), Compressive Strength, Flexure Strength
[1]. Thamwattana N.& Hill, J.M.(2005)" Mathematical Modelling in Nanotechnology", Proceedings of the International Conference in
Mathematics and ApplicationsICMA-MU2005(pp1-17). Bangkok: Department of Mathematics, Faculty of Science, Mahidol
University.
[2]. A.M. Said, M.S.Zeidan, M.T. Bassuoni, Y.Tian, " Properties of Concrete Incorporating Nanosilica." Constr. Build Mater.,36(2012)
pp.838-844.
[3]. M.S.Morsy, "Effect of Nanoclay on Mechanical Properties and Microstructure of Ordinary Portland Cement Mortar" Int.J. Recent
Trends Eng.,(4)(2009)
[4]. Anwar,M.Mohamed,"Influence of Nanomaterials on Flexural Behavior and Compressive Strength of Concrete". HBRC Journal
Volume 12, Issue2, August 2016 Pages 212-225.
Paper Type | :: | Research Paper |
Title | :: | Overview of Breast Cancer Detection using Machine Learning |
Country | :: | India |
Authors | :: | DikshaRajpal || Anil Kumar || Sumita Mishra |
Page No. | :: | 67-71 |
Cancer is the second cause of death in the world. Breast Cancer is one of the leading causes of death in women. Breast Cancer is caused due to abnormal growth of cells in the breast tissue. Both women and men can suffer from breast cancer. There are several ways by which breast cancer can be detected the chief being mammograms. However, mammograms have a disadvantage that false results can be detected which can risk a patient's health. It becomes imperative to discover different techniques which are simpler to formulate and are able to operate with various datasets, are cheaper to design and are able to estimate results which have higher accuracy. This paper discusses a basic breast cancer classifier model which uses different machine learning and deep learning algorithms to predict results via images to determine whether the cancer is benign or malignant and future plans for designing better classifier models.
Keyword: Breast Cancer, Deep Learning
[1]. X. Liu, J. Shi, S. Zhou, and M. Lu, "An iterated Laplacian based semi-supervised dimensionality reduction for classification of
breast cancer on ultrasound images," in Proceedings of the 201436th Annual International Conference of the IEEE Engineering in
Medicine and Biology Society (EMBC '14), pp. 4679–4682, USA,August 2014.[2]. Y. Qiu, Y. Wang, S. Yan et al., "An initial investigation on developing a new method to predict short-term breast cancer risk based
on deep learning technology," in Proceedings of theMedical Imaging 2016: Computer-Aided Diagnosis, SPIE. Digital Library, San
Diego, California, USA, March 2016.
[3]. M. Taheri, G. Hamer, S. H. Son, and S. Y. Shin, "Enhanced breast cancer classification with automatic thresholding using SVM and
Harris corner detection," in Proceedings of the InternationalConference on Research in Adaptive and Convergent Systems (RACS
'16), pp. 56–60, ACM, Odense, Denmark, October 2016.
[4]. N. C. Mhala and S. H. Bhandari, "Improved approach towards classification of histopathology images using bag-of-features," in
Proceedings of the 2016 International Conference on Signal andInformation Processing (IConSIP '16), IEEE, Vishnupuri,
India,October 2016.
Paper Type | :: | Research Paper |
Title | :: | Cost efficient security system Using Internet of Things |
Country | :: | India |
Authors | :: | Ashok Kumar Yadav || Santosh Kumar Yadav || Sanjeev Gangwar |
Page No. | :: | 72-75 |
Home Security System is an Arduino based security system that not only protects our homes but also all those place where security is required. For domestic purpose, need of security alarm systems is required. As the number of crimes is increasing every day, there should be something that will keep us safe. We are aware of high end security systems present in all markets, but they are not easily available for everyone. Therefore we want to provide a solution by building a cost-effective electronic system that has the ability to feel the intruder's speed and stop the alarm with the user sending an SMS alert. The basic idea behind this letter is that all bodies produce some heat energy in the form of infrared which is invisible to human eyes. However, it can be detected by electronic motion sensors................
Keyword: Arduino, motion sensor, buzzer, LCD display, SIM800
[1]. Takeshi Yashiro, Shinsuke Kobayashi, Noboru Koshizuka, and Ken Sakamura, An Internet of Things (IoT) Architecture for
Embedded Appliances, IEEE R10-HTC2013.
[2]. Padmini Gaur, Mohit P. Tahiliani, Operating Systems for IoT Devices: A Critical Survey, 2015 IEEE Region 10 Symposium
[3]. Husni Ruslai3, Kamaruzzaman Jahidin4, Mohammad Syafwan Arshad4, Smart Mirror for Smart Life ,2017 IEEE
[4]. Jinhong Yang, Hyojin Park, Yongrok Kim, Jun Kyun Choi, IoT Gadget Control on Wireless AP at Home, The 11th Annual IEEE
Consumer Communications and Networking Conference
[5]. Neng- Shiang Liang; Li-Chen Fu; Chao-Lin Wu. "An integrated, flexible, and Internet-based control architecture for home
automation system in the internet era". Proceedings ICRA `02. IEEE International Conference on Robotics and Automation, Vol. 2,
pp.1101-1106, 2002
Paper Type | :: | Research Paper |
Title | :: | Analysis of E-Healthcare centers in Lucknow |
Country | :: | India |
Authors | :: | Vartika Singh || Deepak Arora || Pooja Khanna || Puneet Sharma |
Page No. | :: | 76-80 |
E-HealthCare center are muchfocused to ameliorate the healthstatus of the country. In thispaper, we are presenting an analysis of variousGovernmentHospitals and privateHospitals in Lucknow. There are basically 10 Governmenthospitals, out of whichonly 7 hospitals have website. Wehadbasicallyfocused on someposh areas of Lucknow i.e. GomtiNagar, Indira Nagar, Hajratganj, Mahanagar, Aliganj, Jankipuram, Alambagh, LDA Colony and Aashiana. The total number of PrivateHospitals and Trauma centers in these areas isapproximately 200. Out of whichonly 60 hospitals have theirwebsites running. The in-depthanalysis of thesewebsitesisdone by using Alexa Tool. In thispaper, wehadalsodiscussed about the Bounce Rate, Daily Page views and the average time the user spends on the site.
Keyword: E-HealthCare, Bounce Rate, Daily Page Views
[1]. R Jaya Subalakshmi, Arjit Das, N.Ch. S.N. Iyengar : A small E-Healthcare information systems with Agent Technology, 2011
International Conference on Computational Intelligence and Communication Systems, IEEE
[2]. Laura O' Grady: Depicting credibility in health care websites. Towards a more usable means, ACM SIGCAPH Newsletter, Page No
75, January 2003
[3]. Anthony Maeder, e-Research meets eHealth, Proc. 2nd Australian Workshop on Health Data and Knowledge Management, CRPIT
Volume 80, Health Data and Knowledge Management, 2008.
[4]. Craig E Kuziemskey, James B Williams, Jens H. Weber-Jahnke: Towards Electronic Health Record support for Collaborative
Processes, ACM.
[5]. Alexa, http://www.alexa.com/
© 2019 All Rights Reserved | Design by iosrjen