International Conference on Innovative and Advanced Technologies in Engineering
(Volume-12)

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Query Mining Based On User Logs
Country
::
India
Authors
::
Ameya Ajgaonkar || Vijay Gupta || Vijay Mistry || Virendra Chauhan || Prof. Komal Gothwal
Page
::
01-04

In General, The Queries Inserted In Search Engines Are Short. They Do Not Provide Sufficient Information For An Effective Selection Of Relevant Documents. For User Requests, There May Be More Unrelated Documents Listed Than Those Listed Once. However, The Most Common Practice Includes Searching For Occurrences Of Query Terms In Documents. In This Study, We Proposed A New Method In Which The Documents Will Be Listed Based On User Records.These User Records Contain The Query Term And The Documents That Were Clicked For The Corresponding Search Term. The Main Idea Is To Extract Correlations Between Query Terms And Document Terms By Analyzing User Records. After Finding The Correlation, This Correlation Between The Query Term And The Document Term Is Used To Expand The User's Queries. With The Help Of This Extended Query, The System Can Now Extract More Relevant Documents.

 

Keywords: - Correlation ,Extended Query ,Occurrences, Relevant Documents, Sufficient Information.

[1] M.J. Bates, "Search Techniques." Ann. Rev. of Information Science and Technology, M.E. Williams, ed., pp. 139-169, 1981.
[2] D. Beeferman and A. Berger, "Agglomerative Clustering of a Search Engine Query Log," Proc. SIGKDD, pp. 407-416, 2000.
[3] G. Brajnik, S. Mizzaro, and C. Tasso, "Evaluating User Interfaces to Information Retrieval Systems: A Case Study on User Support," Proc. 19th Ann. Int'l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR'96), pp. 128-136, Aug. 1996.
[4] C. Buckley, G. Salton, and J. Allan, "Automatic Retrieval with Locality Information Using Smart," Proc. First Text Retrieval Conf. (TREC-1), pp. 59-72, 1992.
[5] C. Buckley, M. Mitra, J. Walz, and C. Cardie, "Using Clustering and Super concepts within Smart," Proc. Sixth Text Retrieval Conf. (TREC-6), E. Voorhees, ed., pp. 107-124, 1998.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Overview of Iris Recognition with Ubiris.V2
Country
::
india
Authors
::
Suvarna Pansambal || Swati Shirke || Aruna Pavate || Divya Kumawat
Page
::
05-08

Automated Human Identification At-A-Distance, Using Completely Self Regulating Iris Segmentation, Is Extremely Challenging As Well As Wide Range Of Private Citizens And Forensics Applications. Iris Pictures Obtained At-A-Remove Utilizing Unmistakable And Infrared Imaging Are Frequently Uproarious And Experience The Ill Effects Of Dissimilar Otherworldly Changes To A Great Extent Coming About Because Of Dispersing, Albedo And Phantom Absorbance Selectivity. Hence Further Research Endeavors Are Required To Create Highlight Extraction Procedures Which Are More Tolerant To Light Changes And Commotion. We Show The Iris Rendering Issue As 2-D Gabor Coding Arrangement In Light Of Computationally Proficient Which Is Comprehended By Generally Considered............


Keywords: - Canny Edge Detection, Ubiris.V2, Iris Recognition, 2- D Log-Gabor Filter, Monogenic Log-Gabor Filter

[1] Iona Climent,Juan Diego Blanco, Roberto A Hexcel, " Approximate String Matching For Iris Recognition By Means Of Boosted Gabor Wavelet" ,IEEE Trans On Systems.2010 23rd SIBGRAPI
[2] Park, R. R. Jillela, A. Ross, And A. K. Jain, "Particular Biometrics In The Visible Spectrum," IEEE Trans. Info. Forensics & Security, Vol. 6, Pp. 96–106, 2011.
[3] Ajay Kumar,Tak –Shing,Chun-Wei Tan "Human Identification From At-A-Distance IRIS Images Using Sparse Representation Of Local Iris Features. IEEE-2012.
[4] R.M. Farouk1 R. Kumar2 K.A.Riad1 , "Iris Matching Using Multi-Dimensional Artificial Neural Network", Department Of Mathematics, Faculty Of Science, Zigzag University, Egypt The Institution Of Engineering And Technology 2011.
[5] Fadi N, "Improved Neural Network-Based Recognition Of Irises With Sector And Block Partitioning", International Conference On Innovations In Information Technology 2011

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Automation Of Generic Prescription
Country
::
India
Authors
::
Anjanikumar Pandey || Atharva Joglekar || Naishadh Kalyanpur || Vaibhav Kangane || Prof. Samira Nigrel
Page
::
09-13

An "Automated Generic Prescription" System Is Developed To Assist The Patient By Eradicating Outdated Paper Based System In The Era Of Fast Technology And Big Data Management. Its Prime Objective Is To Make Masses Aware Of The Cheaper Generic Substitute To The Medicines Their Doctors Prescribe, To Make Sure Everyone Is Able To Afford Their Cure Of Disease Or Illness Irrespective Of Any Shortcoming In Their Lifestyles. And To Make This A Stringent Possibility We Come With A Universal Token As A Reference To The Patient's Data To Be Stored In Our Database Which Would Be Used By Our System To Get Secured Access Of One's Details When They Go To Any Of The Medical Fraternity To Avail Their Services. We Maintain And Fetch Every Previous History Of The Patient's Visit To The Doctor With A Single Reference Id For The Doctors To Help Them Check And Evaluate The Patient's Health Accordingly And Reach To A More Significant And Precise Decisions.

 

Keywords: - Automation, Generic.

[1] B.Kovuncu And H. Kovunca, " Intelligent Hospital Management", IEEE Paper, November 2016.
[2] S.Khadka, Privacy, Security And Storage Issues In Medical Data Management, November 2012 "Summary Of HIPAA Security Rules", Internet: Http://Www.Hhs.Gov/Ocr/Privacy/Hipaa/Understanding/Srsummary.Html [25 January 2012]
[3] L.Chee Siang And S.Kumar Gulla, "Electronic Medical Record Management System", IEEE Paper, December 2016.
[4] Martha A. Centeno, Kimberly A. Díaz, Simulating Health Care System, IEEE Paper, December 2015
[5] Weblog Of Ideasforindia.In

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Augmented Reality (Ar) In Education: Current Technologies and the Potential for Education
Country
::
India
Authors
::
Bhavna Arora || Nida Parkar || Tejal Rachh || Priti Rumao
Page
::
14-17

Therealdomainis3D,Mostlyweuse2d Mediaas Learning Methodology.Themixture Ofaugmented Reality............

 

Keywords -Augmentedreality,Technologiesforaugmentedrealitysystems;Augmentedrealityineducation(Keywords)

[1] Azuma,R.T.(1997).Asurveyofaugmentedreality.Teleoperatorsandvirtualenvironments,355-385.
[2] Azuma,R.,Baillot,Y.,Behringer,R.,&Feiner,S.(2001).Recentadvancesinaugmentedreality.Computergraphicsandapplications.IEEE, 21(6),3447.
[3] Billinghurst,M.(2002).Augmentedrealityineducation.Seattlewa:Newhorizonsforlearning-Technologyineducation. Bimber,O.,Raskar,R.,&Inami,M.(2007).Spatialaugmentedreality.SIGGRAPH2007Course17Notes. CSM.(2011,122).Augmentedreality.Retrievedfromcoloradoschoolofminesdivisionofengineering: Http://Engineering.Mines.Edu/Research/Sensing-Comm-Control/Project/?Pid=44Cybergloves.(2011).Metamotion Http://Www.Metamotion.Com/Images/Wireless_CG.Jpg

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Educating Masses with Augmented Reality
Country
::
India
Authors
::
Apeksha Waghmare || Ajay Singh Thakurathi || Dhavalkumar Sonavaria || Dharmit Viradia
Page
::
18-22

Along The Swift Digitalization Taking Place Globally, Augmented Reality Turns Out To Be The Bridge That Connects Real And Virtual Continuum In Such Cases. The Paper Proposes An Android Application Catering The Needs Of Education Providing A Rich Learning Experience To Student Community Through AR Along With Preserving Art Of Reading. Humans Perceive What They See And Sometimes It Might Turn Troublesome To Interpret Real Life Problems Or Queries Which In Turn Might Hinder A Sense Of Understanding About A Particular Subject .Traditional Approaches Today Have Been Trying Hard To Justify The Concepts But Sometimes Some Concepts Just Require A Visual Representation Which Can Be Put Forward By The Concept Of Augmented Reality. The Paper Proposes A Cloud Based Application Which Provides An Intuitive Learning Experience With The Help Of Augmented Reality For Students And Learners With Varied Interests.

[1] M. W. Bazzaza, B. A. Delail, And M. J. Zemerly.'Iarbook: An Immersive Augmented Reality System For Education', IEEE Teaching,Assessment And Learning For Engineering, Pp.495-498,December-2014.
[2] N. A. A. Aziz, K. A. Aziz, A. Paul, A. M. Yusof, And N. S. M. Noor ., 'Providing AR Based Education For Students With Attention Deficit Hyperactive Disorder Via Cloud Computing', Presented At 14th International Conference On Advanced Communication Technology, Pp.577-581, Feb-2012
[3] Maqableh, W.F., And Sidhu, M.S., 'From Boards To Augmented Reality Learning', International Conference On Information Retrieval And Knowledge Management, Pp.:184-187,2010.
[4] Li, Y., 'Augmented Reality For Remote Education', 3rd International Conference On Advanced Computer Theory And Engineering, Pp.:187-191,2010.
[5] Sumadio, D.D., And Awang Rambli, D.R., 'Preliminary Evaluation On User Acceptance Of The Augemneted Reality Use For Education', Second International Conference On Computer Engineering And Applications, Pp.: 461-465,2010

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Review on Effectiveness of Social Networking in Education
Country
::
India
Authors
::
Sandip A. Zade || Ameya Jadhav || Ankur Bhattacharjee || Sarang Kulkarni
Page
::
23-26

Social Networking Has Become Very Popular During The Past Few Years, And It Plays An Important Role In Our Life Currently. It Helps Us In The All Fields Of Life Such As Political Field, Economic Field And Educational Field. In Recent Times, The Use Of Social Networking Has Been Transitioning From The Recreational To More Formal Uses In Corporate And Educational Contexts. The Conceptual Structure Of The System Focuses On Four Main Fundamentals Of Learning Activities, Namely, Learning Objects, Collaborative Tasks, Reflection And Evaluation. The Learning Object Tool Consists Of A Learning Object Template Which Allows A Course Manager To Upload Relevant Resources From The Learning Object Library. These Learning Objects Stored In The Library Are Meta-Tagged To Allow Students To Search For The Specific Ones They Require. This Paper Will Summarize Effectiveness Of Social Networking As Education Tool.


Key words: - Social Networking, E-Learning Education.

[1] Bosch, Tanja E. "Using Online Social Networking For Teaching And Learning: Facebook Use At The University Of Cape Town." Communicatio: South African Journal For Communication Theory And Research 35.2 (2009): 185-200.
[2] Kaplan Andreas M., Haenlein Michael (2010). "Users Of The World, Unite! The Challenges And Opportunities Of Social Media". Business Horizons. 53 (1)
[3] Cheung, Christy MK, And Matthew KO Lee. "A Theoretical Model Of Intentional Social Action In Online Social Networks." Decision Support Systems. 49.1 (2010)
[4] Hameed,S. And Badii,A And Cullen,A. (2008), "Effective E-Learning Integration With Traditional Learning In A Blended Learning Environment", European And Mediterranean Conference On Information Systems 2008 (EMCIS2008), May 25-26 2008.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Reduction of Leakage Current using Self Controllable Voltage in 4x4 Dynamic RAM Cell
Country
::
India
Authors
::
Mr. Sarang Kulkarni || Ms. Prajakta Borole || Mr. Sandip Zade || Ms. Ameya Jadhav || Mr. Ankur Bhattacharjee
Page
::
27-30

With the rapid development in the technology to improve the semiconductor chip performance, system designers focused on the circuits for their reliability, low power dissipation, low power consumption, chip density and leakage current. The designers reduced each of these for improved performance, reduced cost and chip area. CMOS technology increased in level of importance to the point where it now clearly holds the center stage as the dominant VLSI technology. Along-with these improvements, the memories have provided with components of considerable capability and extensive application. The main memory is usually of the random access type..............

 

Keywords - DRAM, Self Controllable Voltage, Low Leakage Current, Reduced Cost, Performance

[1] Laxmi singh And Ajay Somkuwar,"Used self-controllable Voltage Level technique to reduce leakage current in DRAM 4x4 in VLSI", 978-1-4673-5758-6/13/2013 IEEE
[2] W. K. Luk And R. H. Dennard,"A Novel Dynamic Memory Cell With Internal Voltage Gain", IEEE Journal Of Solid-State Circuits, Vol. 40, No. 4, April 2005
[3] H. J. Yoo, "A Low Voltage High Speed Self Timed CMOS Logic For The Multi-Gigabit Synchronous Dram Application", Ieice Trans. Electron., Vol. E80-C, No. 8, Pp. 11261128, Aug. 1997.
[4] John E. Leiss, Pallab K. Chatterjee, And Thomas C. Holloway, "Dram Design Using The Taper-Isolated Dynamic Ram Cell", IEEE Transac-tions On Electron Devices, Vol. Ed-29, No. 4, April 1982
[5] G. W. Taylor, P. K. Chatterjee, H-S. Fu, And A. F. Tasch, Jr., "A Punch-Through Isolated Ram Cell", IEEE Iedm Tech. Dig., P. 352, 1978
[6] K. M. Cao, W. C. Lee, W. Liu, X. Jin, P. Su, S. K. Fung, J. X. An, B. Yu, C. Hu. "BSIM4 Gate Leakage Model Including Source-Drain Partition" Iedm Meeting 2000, Iedm Technical Digest, Pp. 815-818, December, 2000 and Fujio Masuoka, Fellow, IEEE, "Device Design Guidelines For Fc-Sgt Dram Cells With High Soft-Error Immunity", IEEE Transactions On Electron Devices, Vol. 52, No. 6, June 2005

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Secure Steganography Using Geo-Fence
Country
::
India
Authors
::
Abhishek Galinde || Ishwar Suryawanshi || Pritesh Sisale || Shweta Sharma
Page
::
31-33

This paper is based on a new steganography application to hide the secret message behind the image with the help of Geo-Fence technique. This application is design to share secret message/information behind the image and that image is stenograph along with the Geo-Coordinates. This purposed system provide an image platform for the user to input image and a text box to insert a secret message. The system encrypt the secret message and image file with geo-coordinates of receiver using modified LSB technique. Once the process is done user can send the stego image to receiver using same application. At the time of retrieving stego file its checks the geo coordinates using in built technology of android i.e GPS so that the file can only be decrypted at particular location.


Keywords – Least Significant Bit (LSB), Steganography, Stego file, Geo-fence.

[1] R. Rejani, D. Murugan, Deepu V. Krishnan, "Pixel Pattern Based Steganography on Images", ICTACT Journal on Image and Video Processing, Volume: 05, Issue: 03, pp. 991-997, February 2015.

[2] K.Thangadurai, G.Sudha Devi, "An analysis of LSB Based Image Steganography Techniques", International Conference on Computer Communication and Informatics (ICCCI -2014), Coimbatore, INDIA, 2014.

[3] Nadeem Akhtar, Shahbaaz Khan, PragatiJohri, "An Improved Inverted LSB image Steganography", Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 749-755, 2014

[4] Subramanya A. Iyer, "Location Based Steganographic Algorithm", Subramanya A. Iyer Department of Telecommunication Engineering, Dr.AIT,Bengaluru
[5] https://thehackernews.com/2015/06/Stegosploit-malware.html

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Arduino Microcontroller Based Airphibian Robot for Surveillance
Country
::
India
Authors
::
Krupali Burute || Mayuri Bansode || Shreyas Naik || Suraj Mhaske || Dr. Bhavin Shah
Page
::
34-36

This Paper Is A Arrangement Of The Outline Procedure And Comprehension Of The Airphibian Surveillance Robot. A Prototype Of Flying Machine Based On Four Rotors Design. The Airphibian Robot Can Be Controlled By The Transmitter And Receiver Also Operated By An Arduino Microcontroller. We Want To Achieve Implementation Of An Arduino Microcontroller As The Airphibian Surveillance Robot's Flying Machine Controller.

 

Keywords - Radio Transmitter And Reciever , Arduino IDE , BLLDC Motor.

[1] Md R Maque , M Muhammad , D Swarnaker , Quadcopter As Low Weight And Lost Cost Autonomous Flight, Electrical Engineering And Information And Technology , (An ISO 3297:2007 Cetrified Organisation) Vol. 2 , Special Issue 10 April,2014.
[2] James Dryden , Ryan Barbaccia , Quadcopter Design Project , ME 445 Final Report ,Vol. 6 , Special Issue 19 December , 2014
These:

[3] Budd Davisson "The PD-1 Roadable Glastar". Sport Aviation. (October 2010). [4] Blain, Loz. "The Flying Motorcycle - Road-Registered And Available Now"Gizmag, 17 April 2007. Retrieved 4 April 2012.

[5] Dawson, Virginia; Mark D. Bowles Realizing The Dream Of Flight: Biographical Essays In Honor Of The Centennial Of Flight, 1903–2003. National Aeronautics And Space Administration, NASA History Division, Office Of External Relations. P. 70. ASIN B002Y26TM0.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Video Recording Using FPV Camera In Airphibian Robot
Country
::
India
Authors
::
Krupali Burute || Mayuri Bansode || Shreyas Naik || Suraj Mhaske || Dr. Bhavin Shah
Page
::
37-40

This Paper Is A Arrangement Of The Outline Procedure And Comprehension Of The Security Plays A Vital Role In Day To Day Life. For This Monitoring Of Environment Is Necessary. So Monitoring Of Object As Well As People Is Needed In Every Place At Every Time Implementing Such System Which Covers Large Amount Of Financial Cost For Hardware Device Also It Consumes Large Space Solution To This Problem Is Using FPV Camera On Airphibian Robot FPV Camera Cover Large With Resolution Of 320X240 QUGA.FPV Camera Perform Image Processing Such As AWB (Auto While Balance) AE (Automatic Experience) And AGC (Automatic Gain Control) For The Video Signal Coming Security Plays A Vital Role In Day To Day Life..............

 

Keywords - FPV Transmitter And Receiver , OSD , Battery.

[1] Md R Maque , M Muhammad , D Swarnaker , Quadcopter As Low Weight And Lost Cost Autonomous Flight, Electrical Engineering And Information And Technology , (An ISO 3297:2007 Cetrified Organisation)Vol. 2 , Special Issue 10 April,2014.
[2] James Dryden , Ryan Barbaccia , Quadcopter Design Project , ME 445 Final Report , Vol. 6 , Special Issue 19 December , 2014

[3] Budd Davisson "The PD-1 Roadable Glastar". Sport Aviation. (October 2010).

[4] Farquhar, Peter (2016-08-24). "VIDEO: This Australian Team Just Launched A Giant Racing Drone It Says Can Hit 200km/H". Business Insider Australia. Retrieved 2017-02-03.

[5] Blain, Loz. "The Flying Motorcycle - Road-Registered And Available Now"Gizmag, 17 April 2007. Retrieved 4 April 2012.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Survey on Security Using Honeypot
Country
::
India
Authors
::
Ashka Ashani || Deesha Nirmal || Viral Doshi || Nikita Patil
Page
::
41-44

With The Recent Advancements In Cyber Attack And Ready Available Internet Connection Security Has Become More And More Of An Issue. Here, Honeypots Can Be Used To Ensure Security. Honeypot Uses Deception To Trap The Attacker And Also Logs Details About The Attacker. The Purpose Of The Paper Is To Give An In Depth Idea About What Honeypot Is And How It Can Be Deployed On A Network For Protecting From Malicious Usage Of Any Sensitive Data. It Also Focuses On The Various Attacks That Can Occur On The System.

 

Keywords - Honeypot, Honeynet, Intrusion Detection System.

[1] Hibatul Wafi, Andrew Fiade, Nashrul Hakiem, Rizal Broer Bahaweres, "Implementation Of A Modern Security Systems Honeypot Honey Network On Wireless Networks", 20 17 International Young Engineers Forum (YEF··ECE) Caparicil, Porlugal, May 5 , 2017 IEEE
[2] Janardhan Reddy Kondra, Santosh Kumar Bharti, Sambit Kumar Mishra, "Honeypot-Based Intrusion Detection System: A Performance Analysis", Computing For Sustainable Global Development (Indiacom), 2016 3rd International Conference On 16-18 March 2016 INSPEC : 16426743
[3] Ronald M. Campbell, Keshnee Padayachee,Themba Masombuka, "A Survey Of Honeypot Research: Trends And Opportunities", The 10th International Conference For Internet Technology And Secured Transactions (ICITST-2015), 978-1-908320-52/0/$31.00 ©2015 IEEE
[4] Akshay A. Somwanshi, Prof. S.A. Joshi, "Implementation Of Honeypots For Server Security", International Research Journal Of Engineering And Technology (IRJET) E-ISSN: 2395 -0056 Volume: 03 Issue: 03 | Mar-2016, P-ISSN: 2395-0072 [5] Jiqiang Zhai, Keqi Wang, Research On Applications Of Honeypot In Campus Network Security, Measurement, Information And Control (MIC), 2012 International Conference On 18-20 May 2012, 10.1109/MIC.2012.6273260, INSPEC: 13064684

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Revised Design Model for New Generation Processor to Tackle Side-Channel Attacks
Country
::
India
Authors
::
Viraj Parab || Bhagyesh Kurlekar || Vatsal Agrawal || Asst. Prof. Divya Kumawat
Page
::
47-51

Spectre And Meltdown Are The Newly Discovered Security Vulnerabilities. These Vulnerabilities Exploit The Most Widely Used Techniques In Latest Processors; Speculative Execution And Out-Of-Order Execution. These Attacks Are Side-Channel Based. In These Attacks, Private And Secured Data Is Manipulated And Transferred To The Cache Memory. Cache Memory Acts As A Side Channel And Leaks Out Data. These Security Vulnerabilities Can Breach Into An Entire System And Gain Access To The Private Data Which Causes The Integrity Of The System To Be Compromised. In This Paper, We Have Discussed Meltdown And Spectre Attacks In Detail And Suggested A Hardware Mitigation To The Existing Architecture Of Modern Processors. This Design Model Works With All The Existing Processors And Reduces The Impact Of Side-Channel Attacks To An Extent That It Can Be Nullified.

 

Keywords - Branch Prediction, KAISER, Meltdown, Out-Of-Order Execution, Reorder Buffer, Side-Channel Attack, Timing-Based Attack, Speculative Execution, Spectre.

[1] Intel Analysis Of Speculative Execution Side Channels White Paper, Https://Newsroom.Intel.Com/Wp-
Content/Uploads/Sites/11/2018/01/Intel-Analysis-Of-Speculative-Execution-Side-Channels.Pdf
[2] Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard1, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Meltdown, Https://Meltdownattack.Com/.
[3] Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom, Spectre Attacks: Exploiting Speculative Execution∗, Https://Meltdownattack.Com/.
[4] Project Zero, Https://Googleprojectzero.Blogspot.In/, Referred On 21/2/2018
[5] Recent Intel Cpus Take Performance Hit With Spectre, Meltdown Patches, Joel Hruska,

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Future Shopping Technology Using Hybrid Approach
Country
::
India
Authors
::
Namrata Naralkar || Sonal Gurav || Priyanka Maurya || Ditixa Vyas
Page
::
52-55

The rapid development of mobile communications systems today, along with the changing times and technology, both in terms of hardware, operating system used and the use of Internet bandwidth, making some mobile applications also contribute to exploit these developments. Mobile Commerce Applications for an example, became the most popular applications for mobile users who do not want to trouble yourself with having to carry cash everywhere. An important technology behind mobile payments is called Near Field Communication (NFC).The NFC (Near Field Communication) became a popular short distance wireless communication technology by providing many convenient services such as an easy payment in a store..........

 

Keywords - M-Commerce, NFC (Near field communication), RFID (Radio frequency identification).

[1] Near field communication forum. http://www.nfc-forum.org.
[2] A Secure NFC Application for Credit Transfer Among Mobile Phones by David M. Monteiro,Joel Rodrigues and Jaime Lloret [ComputerEngineering and Applications Vol. 1, No. 1,June 2012]
[3] Design of Prototype Payment Application System with Near Field Communication (NFC) Technology based on Android by Huda Ubaya[Computer Engineering and Applications Vol.1, No. 1, June 2012]
[4] Shopping Application System With Near FieldCommunication (NFC) Based on Android by Emir Husni, Sugeng Purwantoro [2012 International Conference on System Engineering and Technology, September 11-
[5] 12, 2012, Bandung, Indonesia].

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Autonomous Plant Health Indication System Using Image Processing In MATLAB
Country
::
India
Authors
::
Prof.Meenakshi Saron || Ajinkya Borse || Rohan Parsekar || Vinit Harsora || Pratik Shirsekar
Page
::
56-58

India Is An Agricultural Country And Most Of The People Are Farmers. Farmers Are Cultivating Different Types Of Crop. These Crops Affected By Fungi, Bacteria, Viruses And Many More. Identification Of Disease Is Very Difficult For Farmers At Its Early Stage. There Are Number Of Diseases Found In Crop. Farmers Cannot Be Determining Accurate Percentage Of Observed Disease. Patterns Of Diseases Are So Many Complexes That Finding Affected Area Is Difficult. In Modern Science, Taking Image Of These Diseases By Using Digital Camera On Robot To Collect The Data For Leaf Detection. It Is Very Difficult To Monitor The Plant Diseases Manually. It Requires Tremendous Amount Of Work, Expertise In The Plant Diseases, And Also Require The Excessive Processing Time.................

 

Keywords - MATLAB, Diseases, Detection, Automated Process .

[1] Prof. K.V. Fale 1, Bhure Amit P 2, Mangnaleshivkumar 3 Pandharkarsuraj" Autonomous Farming Robot With Plant Health Indication" International Journal Of Advanced Technology In Engineering And Science, Volume No.03, Issue No. 01, January 2015.
[2] Http://Www.Ijiras.Com/2017/Vol_4-Issue_5/Paper_7.Pdf
[3] Https://Www.Onlinejournal.In/IJIRV2I8/289.Pdf

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Review of IOT in Pet Management
Country
::
India
Authors
::
Jigarmasekar || Jashsohni || Shweta Sharma
Page
::
59-63

With The Advent Of New Technologies And Enhancement In The Ones Already Existing, Particularly In The IT Industry, The Mankind Has Received So Many Technologies At Their Disposal Such That They Can Reduce Their Physical Efforts And Adopt To More Automatic Friendly Methods In Order To Get Their Jobs Done. One Such Technology That Is Rapidly Developing Is The IOT, I.E., Internet Of Things.Iot Is Basically A Cluster Of Networking Devices Interconnected With Each Other And Are Embedded With Sensors And Connectivity Chips That Enable Exchange Of Data Between Devices And Thus Making It Responsive. The Concept Of Iot Can Well Be Paired To Pets And Managing Their Various Activities. In This Paper, We See How We Can Manage Pets Without Much Human Intervention Using The Concept Of Iot.

 

Keywords - Internet Of Things, Pet Management, Automation,Connectivity

[1] Chung-Ming Own, Haw-Yun Shin, Chen-Yateng,Advances In Internet Of Things,Vol.3 No.1(2013) [2] Wigmore, I. (June 2014). "Internet Of Things (Iot)". Techtarget
[3] Https://Mapr.Com/Blog/14-Benefits-And-Forces-Are-Driving-Internet-Things/ (August 2014 )
[4] Https://Www.Postscapes.Com/Wireless-Smart-Dog-Devices
[5] Dr.Kirtiwankhede, Sayalipednekar, Animal Tracking And Caring Using RFID And IOT, IOSR-JCE, E-ISSN: 2278-0661, P-ISSN: 2278-8727
[6] Https://Www.Pymnts.Com/Intelligence-Of-Things/2018/Smart-Pet-Tech-Smarter-Pet-Owners/(2018)

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Two Way Authentication Protection for Cloud Storage System
Country
::
India
Authors
::
Amit Choudhary || Akshay Mohite || Ravindra Chavan || Sejal D'Mello
Page
::
64-68

To design a protected authentication protocol while considering the various kinds of aspects in system to observe user's behaviour and to make convenient as well as user friendly protocol is difficult. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. We demonstrate new technique of authentication using visualization which can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a login id-password protocol, and the other is a QR code-based authentication protocol

 

Keywords - Authentication, computation, protocols, security, visualization.

[1] Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, and Yang Xiang, "Two-Factor Data Security Protection Mechanism for Cloud Storage System," IEEE Transactions on Computers, Vol. 65, pp. 1992-2004, June 2016.
[2] Suratose Tritilanunt, Napat Thanyamanorot & Nattawut Ritdecha, "A secure authentication protocol using HOTP on USB storage devices," International Conference on Information Science, Electronics and Electrical Engineering , Vol. 3, pp. 1908-1912, November 2014.
[3] Balasaraswati V.R., Manikandan.S , "Enhanced Security for Multi-Cloud Storage using Cryptographic Data Splitting with Dynamic Approach," International Conference on Advanced Communications, Control and Computing Technologies , Vol. 14, pp. 1190-1194 January 2015.
[4] C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng,"Key-aggregate cryptosystem for scalable data sharing in cloud storage," IEEE Trans. Parallel Distrib. Syst., Vol. 25, pp. 468–477, Feb. 2014..
[5] H. C. H. Chen, Y. Hu, P. P. C. Lee, and Y. Tang, "NCCloud: A net-work-coding-based storage system in a cloud-of-clouds," IEEE Trans. Comput., Vol. 63, pp. 31–44, Jan. 2014.