International Conference on Innovative and Advanced Technologies in Engineering
(Volume-11)

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Connecting IOT with diffrent wireless technologies
Country
::
India
Authors
::
Akanksha Bhargava || Jyoti Dange || Jyoti Kolap || Gauri salunkhe || Tanu Sharma
Page
::
01-04

In the rapidly growing Internet of Things (IoT), applications from personal electronics to industrial machines and sensors connect wirelessly to the internet. Covering a wide range of use cases in various environments and serving different requirements, no single wireless standard can effectively overcome. The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to attach and exchange data. Each thing is exclusively particular through its embedded computing system but is capable to inter-operate within the accessible Internet infrastructure.

 

Keywords: - IOT,Tcp/Ip,OSI, wireless connectivity.

[1] "Internet of Things Global Standards Initiative". ITU. Retrieved 26 June 2015.
http://www.faz.net/aktuell/wirtschaft/diginomics/grosse-internationale-allianz-gegen-cyber-attacken-15451953-p2.html?printPagedArticle=true#pageIndex_1
[2] Nordrum, Amy (18 August 2016). "Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated". IEEE.
[3] Hsu, Chin-Lung; Lin, Judy Chuan-Chuan. "An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives". Computers in Human Behavior. 62: 516–527. doi:10.1016/j.chb.2016.04.023.
[4] "Internet of Things: Science Fiction or Business Fact?" (PDF). Harvard Business Review. November 2014. Retrieved 23 October 2016.
[5] .Vermesan, Ovidiu; Friess, Peter (2013). Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems (PDF). Aalborg, Denmark: River Publishers. ISBN 978-87-92982-96-4.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Credit Risk Analysis
Country
::
india
Authors
::
Harshala Yadav || Hemani Yadav || Divya Kumawat
Page
::
05-09

Nowadays There Is Huge Data That Is Being Used By Organizations And It Is Required To Extract Important Patterns And Information From The Database That Is Useful. For This Purpose Data Mining Techniques Is Used. Decision Tree Is Very Popular For Classification Purpose In Data Mining. As We Know In Banking Sector Huge Databases Are Used For Credit Risk Assessment .Credit Risk Is Any Loss That Can Be Incurred Due To Debt Defaulters Encountered. For This Purpose Data Mining Techniques Like Decision Tree Is Very Efficient For Prediction Of Defaulters Which Will Lower The Risk Associated With Lending Loans


Keywords: - Banking Industry, Credit Scoring, Data Mining, Decision Tree.

[1] Mrs. Bharati M. Ramageri "DATA MINING TECHNIQUES AND APPLICATIONS", Indian Journal Of Computer Science And Engineering ,Vol No. 4 301-305.
[2] Sudhamathy G., Jothi Venkateswaran C. "Analytics Using R For Predicting Credit Defaulters"2016 IEEE International Conference On Advances In Computer Applications (ICACA).
[3] Https://Www.Investopedia.Com/Terms/C/Creditrisk.Asp
[4] Fabricovoznika ,Leonardo Viana,"DATA MINING CLASSIFICATION".
[5] Dr. K. Chitra , B. Subashini "Data Minig And Its Applications In Banking Sector".

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Crime Reporting Portal
Country
::
India
Authors
::
Chandresh Narayan Dewedi || Sarthak Pandita || Snehal Chaudhary || Priyanka Paygude || Sonali Idate
Page
::
10-12

Application On Crime Reporting Can Handle Data Of Criminals Who Are Under The Judicial Surveillance Or Are Trial. This Portal Will Be Most Use For Police Department/ DEFENCE For Searching For Criminals. With The Help Of This Software People Can Easily Submit Their FIR In The Police Station. So All The Processes Of FIR Are Done Very Easily.

 

Keywords: - Crime, Fir, Information, News, Report.

[1] Saurabh Zadikar Et Al, Criminal Investigation & Identification System,International Journal Of Computer Science And Mobile Computing, Vol.4 Issue.2, February- 2015, Pg. 402-407
[2] Subhash Tatale1 , Sachin Sakhare2 "Intellectual Crime Recognition System" IOSR Journal Of Computer Science (IOSR-JCE) E-ISSN: 2278-0661, P-ISSN: 2278-8727 PP 40-45
[3] Malathi. A1 , Dr. S. Santhosh Baboo2 , "An Enhanced Algorithm To Predict A Future Crime Using Data Mining, International Journal Of Computer Applications",(0975 – 8887)Volume 21– No.1, May 2011
[4] Zin Mar Win1 , Myint Myint Sein2 , "An Efficient Fingerprint Matching System For Low Quality Images" International Journal Of Computer Applications (0975 – 8887) Volume 26– No.4, July 2011
Youtube:
[1] Crime Patrol: Mukhota- Episode 298/299- 27th/28th Sept. 2013-You Tube Www.Youtube .Com

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
PID Temperature Controller Infant Incubator Using RTD
Country
::
India
Authors
::
Harsh Jadav || Amar Bansode || Prof. Divya Sharma
Page
::
13-16

The Birth Problems And Premature Birth Can Be Caused By Birth In Early Pregnancy And The Lack Of Pregnancy Nutrition So That The Baby Easily Induces Hypothermia. Therefore, Incubator Is Required For The Babies To Adapt The Outside Temperature And To Help Them Survive. Proposed System Design Considers The Precision Control For Sensitive Application Which Is Achieved Using PWM Calculated With PID Algorithm. Fail Safe Provisions Plays An Important Role In System Design Which Monitors Sensor Probes, External Power And Heating To Be In A Defined Range. Sensors Selected Should Be Stable Over A Long Period Of Time With Precise Variations. RTD PT100 Suits Best For The Given Application Considering The Temperature Range Which Sensor Provides Accuracy And Stability.

 

Keywords -Incubator; Pulse Width Modulation (PWM); PID Algorithm; RTD PT100.

[1] P. Jagadeesh, G. Karthick Kumar Reddy, S. Venkatramana Reddy, "An Inexpensive Temperature Controller For An Infant Incubator" International Journal Of Advanced Research In Electrical, Electronics And Instrumentation Engineering, Vol. 3, No.6, Jun 2014.

[2] M. Suruthi, S. Suma, "Microcontroller Based Baby Incubator Using Sensors, International Journal Of Innovative Research In Science, Engineering And Technology, Vol. 4, No. 12, Dec 2015.

[3] Dhaval Kothiya, Arjun Chauhan, Twinkle Patel, Khushbu Shah, Shweta Patel, Supriya Singamsetty, "Temperature Controlled In Infant Incubator", International Journal Of Electrical And Electronics Research, Vol. 3, No. 1, Pp. 47-52, 2015.

[4] Zain-Aldeen S. A.Rahman, Farahan S. A. Hussain, "Smart Incubator Based On Pid Controller", International Research Journal Of Engineering And Technology (Irjet), Vol. 4, No. 3, Mar 2017.

[5] Olson K.R., And Caldwell A.C. , "Designing An Early Stage Prototype Using Readily Available Material For A Neonatal Incubator For Poor Settings", Engineering In Medicine And Biology Society (Embc), Annual International Conference Of The Ieee , Pp. 1100 – 1103, 2010.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Polarization Sensitive Metasurface for Holography
Country
::
India
Authors
::
Deepthi Sekhar || Supriya Dicholkar || Payal Mohadikar || Payal Varangoankar
Page
::
17-21

Metasurfaces for polarisation sensitive holography is suggested here which is combination of holography and nanotechnology. Metasurface holograms are nanoscale structures fabricated on firm substrates. A polarization sensitive recording material consists of silicon nanostructured patterns on a glass substrate, which act as superpixels. These superpixels respond to a certain polarization state of the incident light. Huge data can be recorded in the hologram by scheming and positioning the nanofins to respond differently to the chirality of the polarized incident light.These nanofins can also pave the way to practical applications including polarization manipulation, beam steering, novel lenses, and holographic displays.

 

Keywords - Dielectric ridge waveguides (DRWs), Metasurface,Holography.

[1] James Burch, Dandan Wen, Xianzhong Chen & Andrea Di Falco Conformable Holographic metasurfaces DOI: 10.1038/s41598- 017-04482-2

[2] Meng-Xin Ren, Wei Wu, Wei Cai, Biao Pi, Xin-Zheng Zhang & Jing-Jun Xu Reconfigurable metasurfaces that enable light polarization control by light DOI:10.1038/lsa.2016.254

[3] Shaltout, A. M., Kildishev, A. V. & Shalaev, V. M. Evolution of photonic metasurfaces: from static to dynamic. JOSA B 33, 2016, 501–510

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Formative Assessment with Evaluation & Scoring Tool - A-TEST
Country
::
India
Authors
::
Jyothi Arun || Rovina D'Britto || Sachin Gavhane || Snigdha Wasnik || Yogita Shelar
Page
::
22-26

In large classrooms with limited teacher time, there is a need for automatic evaluation of text answers and for real-time, personalized feedback as students learn. Most automatic essay scoring systems focus on providing scores that are comparable to human scores. While this helps save time in large scale or ongoing assessments, it does not provide real time help to learners. Moreover, training the system generally requires the help of experts in machine learning and NLP. We discuss the design of A-TEST, a text evaluation and scoring tool that can learn text answers and the scoring methodology from manually scored answers and also directly from teacher input using LSA, NLP and SVD techniques. In addition, A-TEST provides the necessary information to our web tutoring system thus enabling it to provide real-time feedback during the formative assessment process.


Key words: - Essay scoring, Latent Semantic Analysis (LSA), SVD, word by context matrix, Natural Language Process, NLP, AES, formative assessment.

[1] Tuomo Kakkonen, Niko Myller, Erkki Sutinen and Jari Timonen, "Comparison of Dimension Reduction Methods for Automated Essay Grading", International Forum of Educational Technology & Society (IFETS), J. (2008).
[2] Rama Adhitia and Ayu Purwarianti., Automated Essay Grading System Using SVM and LSA for Essay Answers in Indonesian.
[3] Michael Flor ,Yoko Futagi, "On using context for automatic correction of non-word misspellings in student essays ",The 7th Workshop on the Innovative Use of NLP for Building Educational Applications, pages 105–115, Montreal, Canada, June 3-8, 2012.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Network Performance Improvement in AODV with Improved Weighted Clustering
Country
::
India
Authors
::
Supriya Dicholkar || Payal Mohadikar || Deepthi Sekhar || Payal Varangaonkar || Poonam Chaudhari
Page
::
27-30

Mobile Ad-Hoc Network Is Integral Part Of Growing Wireless Communication Network .Different Protocols Available In MANET Are DSDV, DSR, AODV, TORA. MANET Is Infrastructure Less Mobile Network Without Centralized Administration So Security Is Main Concern In MANET. Research Work Is Carried Out MANET Security As It Is Used For Most Crucial Military Operations And Rescue Operations. In This Paper We Are Focusing On Different Attacks On AODV And Security Measures Taken Against Them For Network Performance Improvement.

 

Keywords - Mobile Ad-Hoc Network, Wormhole Attack, Ad-Hoc On Demand Distance Vector

[1] Salim M Zaki, Mohd Asri Ngadi, Shukor Abd Razak," A Review Of Delay Aware Routing Protocols In MANET", Computer
Science Letter,Vol.1,2009
[2] Lee, S., Gerla, M., (2001), "Split Multipath Routing With Maximally Disjoint Paths In Ad Hoc Networks", Communications, ICC
2001. IEEE International Conference On, Pp. 3201-3205, Vol.10. [21]
[3] K. J. Lee, M. S. Kim, S. Y. Cho, B. I. Mun, (2005), "Delay-Centric Link Quality Aware OLSR", Proceedings Of The IEEE
Conference On Local Computer Networks 30th Anniversary, Pages: 690 – 696.
[4] Rajiv Misra And C.R. Mandal, "Performance Comparison Of ADOV/DSR On-Demand Routing Protocols For Ad Hoc Networks In
Constrained Situation"

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Study on Cyber Crime and Digital Forensics in Network Security
Country
::
India
Authors
::
Vaishali Salvi || Sejal D'mello || Reena Somani || Pranoti Nage || Pragyamani Sharma
Page
::
31-35

The progress of technology has made man dependent on Internet for all his needs. Internet has given man easy access to everything while sitting at one place. With increasing internet penetration, Cybercrime have also increased in the last few years. A Cyber Crime is a crime in which main objective of the crime is computer or it can be used as a tool to make an offence like cyber terrorism, credit card fraud. Cyber forensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves electronic data storage extraction for legal purposes. In this paper we overview about cyber forensics and network forensics.


Keywords – Cyber Crime, Cyber Forensics, Network Forensics, Network Security.

[1] K. Kent, S. Chevaller, T. Grance and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST SP800-86 Notes, 2006.
[2] S. K. Brannon and T. Song, Computer Forensics: Digital Forensic Analysis Methodology,Computer Forensics Journal, Vol. 56, No. 1, 2008, 1-8.
[3] Stephenson, P. . Cyber Investigation. In S. Bosworth, M. Kabay, & E. Whyne, Computer Security Handbook, (Hoboken: John Wiley & Sons, Inc., 2009) 55.1 - 55.27.
[4] D. Birk and C. Wegener, Technical issues of forensic investigations in cloud computing environments, Proceedings of the Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.
[5] Casey, E. Digital Evidence and Computer Crime. Academic Press. 2001.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Simple Text Based Shoulder Surfing System Using Resistant Graphical Password
Country
::
India
Authors
::
Mr. Krishnashankar Lodh || Akash R. Gupta || Bhupendra Singh Rawat || Abhishek Kumar Mathur || Prof. Rajesh Gaikwad
Page
::
36-39

In The Password Scheme Security Process, High Percentage Of Users Are Familiar With The Textual Password Scheme Instead Of Graphical Password Scheme But In Text-Based Password Scheme Leads To A Threatening Security Problems. Text-Based Shoulder Surfing Resistant Graphical Password Schemes Is Both Secure And Efficient Enough. In This Proposed Scheme, We Propose An Improved Text-Based Shoulder Surfing Resistant Graphical Password Scheme By Using Color Pattern In Much Efficient Form And Pattern. The Security And Usability Scheme Can Easily Be Researched In Well-Mannered Efficient Way In Our Proposed System. It Is Better Solution Against Shoulder Surfing.

 

Keywords - Graphical, Shoulder-Surfing, Authentication.

[1] L. Sobrado And J. C. Birget, "Graphical Passwords," The Rutgers Scholar, An Electronic Bulletin For Undergraduate Research, 2002.
[2] J.C. Birget, "Shoulder-Surfing Resistant Graphical Passwords," Draft, 2005.
[3] S. Wiedenbeck, J. Waters, L. Sobrado, And J. C. Birget, "Design And Evaluation Of A Shoulder-Surfing Resistant Graphical Password Scheme," Proc. Of Working Conf. On Advanced Visual Interfaces, May.2006, Pp. 177-184.
[4] H. Gao, X. Liu, S. Wang, H. Liu, And R. Dai, "Design And Analysis Of A Graphical Password Scheme," Dec.2009.
[5] B. Hartanto, B. Santoso, And S. Welly, "The Usage Of Graphical Password As A Replacement To The
[6] Alphanumerical Password," Informatika, 2006, Pp. 91-97.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A New Way of Viewing Television
Country
::
India
Authors
::
Mohan Kumar || Manoj Mishra || Bhavin Shah || Nilesh Gode || Divya Sharma
Page
::
40-43

Home display technology has evolved at a fast pace. In the coming years, we will witness big and unobtrusive 'lifestyle' surfaces that will be capable of covering the entire wall. With such capability we can have a better system that provides viewers with a collective and personal experience. This system will be able to adapt to multimedia.

 

Keywords - Adapt, Home display, evolved Surfaces, Viewers.

[1] High-PerformanceDynamicGraphics Streaming for Scalable Adaptive Graphics Environment, SuperComputing 2006, November 11-17 2006. http://www.evl.uic.edu/files/pdf/SAGE-SC06- final.pdf.
[2] Web Audio API, Chris Rogers, W3C, https://dvcs.w3.org/hg/audio/raw- file/tip/webaudio/specification.html
[3] Of LargeLCDs,UnusedFabs,andProjectorKillers,PetePutman, Display Daily, April 9th, 2012. http://displaydaily.com/2012/04/09/of-large- lcds-unused-fabs-and-projector-killers/
[4] Responsive Web Design, Ethan Marcotte, 2011, ISBN 978-0-9844425-7-7, http://www.abookapart.com/products/responsi ve-web-design

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Wireless Sensor Network For Industrial Monitoring
Country
::
India
Authors
::
Divya Sharma || Manojmishra || Jyoti || Jyotigurav || Mohan Kumar
Page
::
44-46

During Industrial Operations, Many By Products Are Generated Which Can Be Hazardous To The Health Of Workers Working There. Very Few Industries Setup Such Wireless Sensor Networks (Wsn) In Their Workshops As The Cost Of These Systems Are High. The Purpose Of This Concept Is To Provide A Low Cost Integrated Sensor System Consisting Of Various Sensors. This Device Would Collect The Data And Send It To The Main Database Via Api Where The Information Would Be Analyzed And Necessary Measures Can Be Taken To Avoid Mishaps.

 

Keywords - Wireless Sensor Network (Wsn), Application Protocol Interface (Api).

[1] S.Aravinth,S.K.Manikandan,"Smartsensorsfor Industrial Monitoring In I Ot Environment", International Journal Of Electrical And Electronics Research Is Sn 2348-6988(Online)Vol.3,No.2,Pp.545-550,2015.
[2] Poonamthakur,Prof. Rahul M. Pethe,Prof. Sunita I. Parihar, "Real Time Dat
[3] Aacquisitionovercloudusinghardwarebasedwsn",Internationaljournal Onrece Nt Andinnovationtrends In Computing And Communication Issn: 2321-8169 Vol.3 N O. 5,Pp.060–064,2015.
[4] Abhimanyurathore,"Internet Of Things–Connectedsmartsystems"[Online],201 5 . A V A I L A Ble :H T T P : / / I N T E R N E T O F T H I N G S . E L E C T R O N I C S F O R U . C O M/2 0 1 5/02/Internet-Things-Connected-Smart-Systems. Divya Sharma, Kanika Sharma,"Grid Based Multipath Energy Aware Routi Ng Protocol For Wsns", International Journal Of Computer Trends And Technolo Gy (Ijctt),Vol.4,No.4,.Issn2231-2803,(2013).
[5] R.Bronson And G. Naadimuthu, Operations Research, 2 Ed., Schaum‟s Outlin Es, Mcgrawhill,Newyork,1997

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
An RF Based Intruder Detection Using Radar System
Country
::
India
Authors
::
Gauri Salunke || Manoj Mishra || Divya Sharma || Jyoti || Mohan Kumar
Page
::
47-49

In Recent Years, Peoples Are Using Electromagnetic Theory For Exchanging Information In Free Space For Various Home & Defense Applications. From Mobiles To Health Monitoring Systems. Intruder Detection System Is A Type Of Security System & Object Detection System Using Radar System. Intruder Detection System Development Attracted The Researchers Mind Towards Radar System. As We Know The Nature Of Rf Of Deep Penetration The Vital Sign Detection System Includes Various Domain Of Application, Viz. Medical, Security, Etc. This Paper Presents Review Of Rf Based Intruder Detection Using Radar. In This Paper, Vital Sign Detection Techniques Are Presented.

 

Keywords -Radar System, Heartbeat, Intruder, Radar Receivers, Respiration Rate.

[1] Miss Zade Gauri N., Mr. Badnerkar S.S., "A Modern Microwave Life Detection System For Human Being Buried Under Rubble", International Journal Of Advanced Engineering Research And Studies, E-Issn2249 – 8974, Ijaers/Vol. I/ Issue I/October-December, 2011/69-77.
[2] Lohman, B.; Boric-Lubecke, O.; Lubecke, V.M.; Ong, P.W.; Sondhi, M.M.; , "A Digital Signal Processor For Doppler Radar Sensing Of Vital Signs," Engineering In Medicine And Biology Magazine, Ieee , Vol.21, No.5, Pp.161-164, Sept.-Oct. 2002 Doi: 10.1109/Memb.2002.1044188
[3] Olga Boric-Lubecke, Victor M. Lubecke, Isar Mostafanezhad1, Byung-Kwon Park, Wansuree Massagram, Branka Jokanovic, "Doppler Radar Architectures And Signal Processing For Heart Rate Extraction", Mikrotalasna Revija, Decembar 2009.
[4] Ichapurapu, R.; Jain, S.; John, G.; Monday, T.; Lie, D.Y.C.; Banister, R.; Griswold, J.; , "A 2.4ghz Non -Contact Biosensor System For Continuous Vital-Signs Monitoring," Wireless And Microwave Technology Conference, 2009. Wamicon '09. Ieee 10th Annual, Vol.,No.,Pp.1-3,20-21April 2009 Doi: 10.1109/Wamicon.2009.5207236.
[5] Byung-Kwon Park, Alex Vergara, Olga Boric-Lubecke, Victor M. Lubecke, Anders Høst-Madsen, "Quadrature Demodulation With Dc Cancellation For A Doppler Radar Motion Detector",

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
UWB Antennas
Country
::
India
Authors
::
Payal Mohadikar || Supriya Dicholkar || Deepthi Sekhar || Payal Varangaonkar
Page
::
50-53

The Demand Of Compact And Low Profile Antennas Has Increased With The Advancement In Wireless Communication System. Ultra Wideband Antennas Are Widely Used For The Same. A Variety Of Structures Are Analyzed And Designed To Obtain Ultra Wideband Response. This Paper Explains Printed Monopole Antennas And Discusses Various Modified Circular And Rectangular Structures To Obtain Ultra Wideband Characteristics. The Discussed Configurations Yield Operating Bandwidth From Less Than 2 Ghz To More Than 10 Ghz With Co-Polar Gain Of Around 1 To 2 Dbi Over Complete Bandwidth. Due To The Realized Bandwidth And Gain, The Configurations Can Find Applications In Personal Mobile Communication, Blue-Tooth And Wi-Fi Wi-Max Applications In 3 To 10 Ghz Frequency Range.

 

Keywords - UWB Antenna, Printed Monopole Antenna, Impedance Bandwidth.

[1] G. Kumar And K.P. Ray, Broadband Microstrip Antennas, Artech House, USA, 2003.
[2] Balanis, C.A., Antenna Theory Analysis And Design, John Wiley & Sons, Inc., 1997.
[3] R. Garg, P. Bhartia, I. Bahl And A. Ittipiboon, Microstrip Antenna Design Handbook, Artech House, USA, 2001.
[4] B. Bhartia And I. J. Bahl, Microstrip Antennas, USA, 1980.
[5] M. Naser-Moghadasi, Mohsen Koohestani And R. A. Sadeghzadeh, Compact Microstrip-Fed Ultrawideband Antenna With Novel Radiating Element, Microwave And Optical Technology Letters, Vol. 52, No. 10, October 2010, Pp. 2267-2269.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
An Android Based Application to Find Missing Children and Lost Belongings (F.I.N.D.)
Country
::
India
Authors
::
Dr. Meenakshi S. Arya || Manali Muley || Pranav Desai || Hemendra More
Page
::
54-57

Locating Missing Items Is A Challenging Complication That People Face Frequently. F.I.N.D. Is An Attempt To Solve This Problem By Taking The Advantage Of Interactions Among People. The Proposed System Will Implement An Android Application Which Will Help The Users To Find Lost Items And Missing People. Nowadays, Smart Phones Have Brought Us Closer And Have Created A Platform For People To Interact Socially. When A Particular Object Is Lost, The Only Way To Find It Is Through Police But The Proposed System Will Help People Interact Through The Application And Contact The Owner If The Lost Object Is Found. The Application Will Also Help Find Missing People. Using This Application, Will Help The User Register Their Complaint On The Application And If The Complaint Details Match With The Registration In Found Section, The User Will Be Informed About Object/Person. The Lost Objects Will Be Sorted By Location.

 

Keywords - Find, Missing, Lost , Location, People, Belongings.

[1] Rahul Mote And Pooja Rakate, "Android Based Application On Missing Person Finder", International Of Scientific And Research Development, Vol. 3, No. 1, Pp. 2321-0613, 2015.
[2] Ashley Eden And Trevor Darrell, "Finding Lost Children", Proc. Of IEEE Workshop On Person Oriented Vision (POV),2010.
[3] Mehul Dabhi And Bhavna Pancholi, "Face Detection System Based On Viola-Jones Algorithm", International Journal Of Science And Research Vol. 5, No. 4, Pp. 2319-7064,2016.
[4] Samina Kausar And Asif Khan, "Improved Approach Of Extract Pattern Matching", International Journal Of Computer Science Issues Vol. 10, No. 3, Pp. 1694-0784,2013.
[5] Xianming Chen, "Face Recognition With Multi-Stage Matching Algorithms", University Of Southern Mississippi,2015.
[6] Liton Chandra Paul And Abdulla Al Sumam, "Face Recognition Using Principal Component Analysis Method ",International Journal Of Advanced Research In Computer Engineering And Technology ,Vol. 1, No. 9, Pp. 2278 – 1323,2012.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Li-Fi Audio Transmission
Country
::
India
Authors
::
Pranay Smendhe || Assistant.Prof.Deepthi Sekhar
Page
::
58-64

Li-Fi Stands For Light-Fidelity. Li-Fi Is Transmission Of Data Using Visible Light By Transmitting Data Through An Led Light Bulb That Operates So Rapidly Than The Human Eye Can Follow. If The Led Is On, The Photo Detector Transmits A Binary One; Otherwise It's A Binary Zero. The Idea Of Li-Fi Was Introduced By A German Physicist, Harald Hass. The Term Li-Fi Was First Introduced By Haas In His Ted Global Talk On Visible Light Communication (Vlc). According To Hass, The Light, Which He Referred To As "Dlight", Can Be Used To Produce Higher Data Rates Up To 1 Giga Bits Per Second Which Is Much More Faster Than Our Broadband Services Used Today. This Prototype Discusses The Implementation Of The Basic Li-Fi Based System To Transmit Sound Signal From One Device To Another.The Purpose Is To Demonstrate Visible Light Communication (Vlc) Through An Led And Receive The Signal At The Receiver Through A Detector. The Sound Transferred By Led In The Form Of Visible Light Is Detected At The Receiver Without Fading.

 

Keywords - Antennas, Vlc, Leds.

[1] Https://Www.Homemade-Circuits.Com/How-To-Make-Simple-Li-Fi-Light-Fidelity/
[2] Https://Www.Youtube.Com/Watch?V=Svm_Tfvdxes
[3] Https://Lifi-Information.Com/Li-Fi-Books/

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Analysis of RF Harvesting Circuit Using Microstrip Patch Antenna Array at 1.8 GHz as Harvester
Country
::
India
Authors
::
Tanu Sharma || Akanksha Bhargva || Gauri Salunke || Jyoti Dange
Page
::
65-68

As Per The Growing Number Of Mobile Towers And Simultaneously Increase In Demand To Power Wireless Devices, RF Energy Harvesting System From Mobile Towers Will Prove Beneficial For Alternate Energy Harvesting Source. A High Gain Patch Antenna Array Is Developed. Germanium Diode As A Two Stage Rectifier Is Also Designed. High Gain Antenna Array Is Designed And Fabricated To Capture Maximum Signal Emitted By Transmitter. The Antenna Is Fabricated On 𝐹𝑅4 Substrate Having Low Cost Which In Turn Makes The Antenna Array A Cost Effective Solution For RF Energy Harvesting. The Designed, Simulated And Fabricated Antenna Array Which Achieved A Higher Gain Of 9.29db Has Lead To Increase The Size Of Antenna...........

[1]. C. R. Valenta And G. D. Durgin, "Harvesting Wireless Power: Survey Of Energy-Harvester Conversion Efficiency In Far-Field, Wireless Power Transfer Systems", IEEE Microwave Magizne, Vol. 15, Issue.4 , Pp. 108–120, 2014.
[2]. Tanu Sharma, Garima Saini "A Survey On RF Energy Harvesting From Mobile Towers", IJEEE, Volume 3, Issue 1, February, 2016.
[3]. Tanu Sharma, Garima Saini " Microstrip Antenna Array For RF Energy Harvesting System", IJAIST Vol 45,No.45, January 2016.
[4]. S. Ladan, N. Ghassemi, A. Ghiotto, And K. Wu, "Highly Efficient Compact Rectenna For Wireless Energy Harvesting Application", IEEE Microwave Magzine, Vol. 14, No. 1, Pp. 117–122, 2013 .
[5]. B. D. W. Knight, "Diode Detectors For RF Measurement Diode Detectors For RF Measurement Part 1 : Rectifier Circuits , Theory And Calculation Procedures . Table Of Contents", Vol. 09, Pp. 1–116, 2016.
[6]. G. Bonded And G. Diodes, "DO-7 Glass Package," Pp. 91-35