IJRAR(ISSN 2348 –1269, Print ISSN 2349-5138 ) | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science. | UGC Approved Journal | UGC Journal | UGC CARE Journal |UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list, UGC Approved list, list of ugc approved journal
How start New Journal & software Book & Thesis Publications
Submit Paper
Login to Author Home
IJRAR.COM Repository
Communication Guidelines

WhatsApp Contact
Click Here

Conference Proceeding - Virtual International Conference on Communication, Computation, Control and Automation( ICCCA-2022)
Volume 9 | Issue 2

  Paper Title: A BREIF STUDY ON VARIOUS CRYPTOGRAPIC ALGORITHMS FOR DATA SECURITY

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP050

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP050

  Register Paper ID - 246739

  Title: A BREIF STUDY ON VARIOUS CRYPTOGRAPIC ALGORITHMS FOR DATA SECURITY

  Author Name(s): Mr.Shivansh Mishrar, Dr.J.Mahalakshmi

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 288-293

 Year: April 2022

 Downloads: 341

 Abstract

In today�s era of digital world most of the activities and exchange of information are being carried out on the digital platforms. The factor jeopardizing on such platforms is the Data security while exchange done in open communication channel. One better solution for the issue is altering the data to unintelligible format. Cryptography can be defined as the method of protecting the data/information, using the codes so that the information can only be understood by the person to whom it is sent. Encryption and decryption is the process, where the data is converted and reverse to its original state using various algorithms and modes. It is categorized into two types: Asymmetric encryption and Symmetric encryption. The main difference between them is that in symmetric encryption the message is encrypted and decrypted using the same key, whereas in asymmetric encryption for encryption of message public key is used and for decryption of message private key is used. This article, covers the review of the Encryption algorithms advantages and limitations, so that the researchers may avail, the suitable algorithm for their research work


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cryptography, Encryption, Decryption, Algorithms, Data Security, Data Breach.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PRESERVING THE PRIVACY OF REMOTE DATA IN CLOUD USING BILINEAR PAIRING AUDITING MECHANISM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP049

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP049

  Register Paper ID - 246740

  Title: PRESERVING THE PRIVACY OF REMOTE DATA IN CLOUD USING BILINEAR PAIRING AUDITING MECHANISM

  Author Name(s): Kiruthika M

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 282-287

 Year: April 2022

 Downloads: 320

 Abstract

Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. In cloud computing, data owners host their data on cloud servers and users can access the data from cloud servers. But hosting of data services introduces new security challenges. Owners would worry that the data could be lost in the cloud. Some existing system, remote integrity checking methods can only serve for static data thus cannot be applied to the auditing service since the data in the cloud can be dynamically updated. The Trusted Third Party (TTP) is introduced to audit the data. In this paper, we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Our proposed model provides an independent auditing service to check the integrity of the remote data. Our auditing protocol handles static data as well as dynamic data. The analysis and simulation results show that our proposed auditing protocols are secure and it reduce the computation cost of the auditor.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Storage Auditing, Privacy- Preserving Auditing, Bilinear Pairing, Cloud Storage, Cloud Computing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STEPPING TOWARDS EXPLICIT RISK IDENTIFICATION IN AGILE SOFTWARE DEVELOPMENT

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP048

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP048

  Register Paper ID - 246741

  Title: STEPPING TOWARDS EXPLICIT RISK IDENTIFICATION IN AGILE SOFTWARE DEVELOPMENT

  Author Name(s): M. Ayesha Ziana, Dr. Charles. J

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 276-281

 Year: April 2022

 Downloads: 414

 Abstract

Managing risks takes a remarkable role in the better performance of any software project. However, Agile Software Development (ASD) does not proffer dedicated risk management mechanisms. Identification of risks is the predominant phase in assessing the risks and only fewer research works exist in improvising the risk identification process in ASD to detect risks as much as possible throughout the software development process. Therefore, this study gives a better understanding of the popular risk identification practices by a comparison and analysis and can be wield as an aid for further enhancements in future.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Agile Software Development, Risk Identification, Risk Assessment, Risk Identification in ASD

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF DDOS ATTACK IN SOFTWARE-DEFINED NETWORKING USING SVM ALGORITHM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP047

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP047

  Register Paper ID - 246742

  Title: DETECTION OF DDOS ATTACK IN SOFTWARE-DEFINED NETWORKING USING SVM ALGORITHM

  Author Name(s): Lakshmi Prabha S, Bala Subhashini SP, Maria Velantina A, Gowthami N

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 268-275

 Year: April 2022

 Downloads: 444

 Abstract

Software-Defined Networking (SDN) is a networking paradigm that has redefined the term network by allowing network administrators to programmatically initialize, control, change, and manage network behavior. The centralized control that is a primary benefit of SDN can also be a huge security risk. If the intruder succeeds in gaining access to the central controller, he will have complete control of the system. The controller is extremely vulnerable to the Distributed Denial of Service (DDoS) assaults, which cause the system’s resources to be depleted, resulting in the controller’s services becoming unavailable. This has led to the development of numerous algorithms and strategies. However, on the topic of SDN networks, less research has been done. One such method is to use machine learning algorithms to categorize connections as valid or illegal. To discover the suspicious and hazardous traffic patterns, we employ a machine learning approach called the Support Vector Machine (SVM) classifier.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Software-Defined Networking, Distributed Denial of Service, Support Vector Machine.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN EFFECTIVE HIERARCHICAL KEY MANAGEMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY AND SESSION KEY ESTABLISHMENT ON CLOUD

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP046

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP046

  Register Paper ID - 246743

  Title: AN EFFECTIVE HIERARCHICAL KEY MANAGEMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY AND SESSION KEY ESTABLISHMENT ON CLOUD

  Author Name(s): Preetha V, Nisha Soms

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 263-267

 Year: April 2022

 Downloads: 348

 Abstract

Content Delivery Network (CDN) on clouds normally communicate with authenticated subscribers using HTTPS to provide privacy and data integrity. The SSL private key is the most critical component in secure communication, and it can be even more important than the protected content itself. Here the key challenge is how to provide security guarantees so that the SSL private key and the content can be stored onto untrusted public clouds. To solve this issue, keys are generated in Key Distribution Centre(KDC) using Elliptic Curve Cryptographic algorithm and the private key will be hidden even to the CDN and cached or stored in the Key Sub-Centres. Only when decrypting the content or any request from the user, CDN will get the private key cached from the Key Sub-Centres. This type of key management approach in our paper is named as Effective Hierarchical Key Management System. In this system session keys will also be generated for further authentication. In this project a web application will be developed, with a dummy CDN(i.e. Content Delivery Network and KDC(Key Distribution Centre) in that users can be registered, registered users alone will be able to request the CDN and the private key will be secured in the KDC. Once this key authentication gets success user can be able to manage his files in the cloud like upload files to the cloud or download file from the cloud.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key management, Cloud, CDN (Content Delivery Network), KDC (Key Distribution Centre)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DEEP LEARNING BASED REMOTELY MONITORING COVID-PATIENT AND VACCINE SIDE EFFECTS USING WEARABLE DEVICES

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP045

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP045

  Register Paper ID - 246744

  Title: DEEP LEARNING BASED REMOTELY MONITORING COVID-PATIENT AND VACCINE SIDE EFFECTS USING WEARABLE DEVICES

  Author Name(s): M.Ramesh, K.Kodeeswari, S.Abudhakeer, Ismail, M.Ramachandran, P.Mayurika

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 258-262

 Year: April 2022

 Downloads: 330

 Abstract

COVID-19-patient health monitoring system are major public health challenges for COVID-19 patients by using the Internet of Things has attracted much attention in recent years healthcare systems caused by an aging population and a rise in chronic illness. The proposed paper Internet of Things (IoT) based for accessing patient medical parameters in both local and remote areas. A cloud server records data from the patient’s temperature sensor and pulse sensor; the data is analyzed using support of optimized deep-learning model allows for the management and monitoring for further analysis. Deep learning with health wearable devices from to different conditions and an emergency message is sent to the rest of the family via a mobile application, as well as a warning message to the nearest hospital.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Healthcare, Internet of Things, Smart hospitals, big data, Cloud Computing, Electronic health records, Smart-health, IOT-Healthcare, COVID-19, deep learning, Wearable sensors

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF DDOS ATTACK IN SDN ENVIRONMENT USING KNN ALGORITHM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP044

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP044

  Register Paper ID - 246745

  Title: DETECTION OF DDOS ATTACK IN SDN ENVIRONMENT USING KNN ALGORITHM

  Author Name(s): Madathi M, Harini R, Monikaa R, Gowthami N

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 252-257

 Year: April 2022

 Downloads: 456

 Abstract

Software-Defined Networking (SDN) is a network architecture which is an optimization of traditional networks. SDN is used for programmatic management which is ideal for high-bandwidth applications. The centralized control being a primary benefit can also be a risk . If the unauthorized user succeeds in gaining access to the controller, he will have complete control of the system. The controller is extremely vulnerable to the Distributed Denial of Service (DDoS) assaults. SDN differs from traditional networks by decoupling the network control and forwarding functions. The control plane and data plane deals with network control and forwarding function respectively. SDN identifies malicious traffic and link failure present in the network. Apart from this flexibility, it is vulnerable to Distributed Denial of Service (DDoS) attacks which halts the whole network. To mitigate this problem, we propose to classify the traffic containing DDoS attacks by using machine learning techniques such as the KNN algorithm. In this project, we enter the features of DDoS attacks into a CSV file and train the algorithm. We use KNN for the classification process and hence we can able to detect the DDoS attack


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Detection of DDoS attack in SDN environment using KNN algorithm

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FACE RECOGNITION VIDEO SURVILLENCE USING DEEP LEARNING

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP043

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP043

  Register Paper ID - 246746

  Title: FACE RECOGNITION VIDEO SURVILLENCE USING DEEP LEARNING

  Author Name(s): Ms. V. S. Esther Pushpam, A.Akash, S.Diwaker, E.karthick Rohan

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 247-251

 Year: April 2022

 Downloads: 339

 Abstract

Face recognition is a biometric technology, which is based on the identification of facial features of a person The main scope of the project is an automated surveillance, and the objective is to recognize and track people who are all in watchlist . The most significant part of the system consists of face detection, face localization and recognition. The face was detected using HOG algorithm. The face is recognized using Local Binary Patterns Histograms. The system obtains underlined facial data through the real-time web-camera. Subsequently, face and background key frames are extracted from the captured video data. The facial image data is compared with the facial images of database. The System displays the recognized person with their details in case of any match. The proposed system is to detect multiple faces at a time which is more accurate, and has better performance, and low cost compared with existing systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Face recognition Binary Pattern Histogram, camera, HOG algorithm.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRAFFIC SIGN RECOGNITION USING DEEP LEARNING

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP042

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP042

  Register Paper ID - 246747

  Title: TRAFFIC SIGN RECOGNITION USING DEEP LEARNING

  Author Name(s): Ms.V.S. Esther Pushpam, P.Nandha Praveen Kumar, Pooja Eshwaramurthy, N.Sowmiya

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 242-246

 Year: April 2022

 Downloads: 321

 Abstract

Traffic Sign Detection and Recognition can be used as driver assistance which also ensures contributing to safety of drivers, pedestrians and vehicles. The usage personal vehicles cars or Two Wheelers are increased during and after COVID-19. The heavy traffic, congestion and fast driving, leads to traffic accidents which caused a lot of personal injury or property loss. In such scenario, the country like India requires traffic signs on road side so that the drivers aware the status of road and able to convey the important traffic information to the driver. In modern artificial intelligence era, this traffic sign are recognized by intelligence system and can be used for voice or any other applications. In our project, the traffic sign was recognized with highest accuracy using Machine Learning Algorithms. To collect the traffic sign data from the road, the camera from cars are used. The Various factors which affected the identification of traffic signs are lighting factors, light intensity. These factors lead to image exposure, light weakness that result in dim, blurred and corroded image. The Convolution Neural Network deep learning algorithm used to find the accuracy of image recognition. the accuracy Calculated as the value of RMSE or MSE. This project designed an improved CNN uses convolution pooling to extract low-dimensional features and high- dimensional features of images to achieve higher accuracy and lightweight models.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Convolutional Neural Network, traffic sign, Camera, Filtering.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW ON CLASSIFICATION OF SPEECH SIGNAL USING TRADITIONAL AND DEEP LEARNING TECHNIQUES

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP041

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP041

  Register Paper ID - 246748

  Title: REVIEW ON CLASSIFICATION OF SPEECH SIGNAL USING TRADITIONAL AND DEEP LEARNING TECHNIQUES

  Author Name(s): Chisnah C.J, Gayathri R

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 238-241

 Year: April 2022

 Downloads: 300

 Abstract

Speech classification could be a broad space of analysis that has gained abundant attention in recent years. Feeling recognition from speech signals is a vital however difficult part of Human-Computer Interaction (HCI). One amongst the largest variations between a machine and a person knows the emotions of others and behaving consequently. Within the literature of speech emotion recognition (SER), several techniques are utilized to extract emotions from signals, as well as several well-established speech analysis and classification techniques. This paper presents an overview of traditional techniques, Deep Learning techniques and discusses some recent literature where these methods are utilized for speech-based emotion recognition. The review covers databases used, emotions extracted, and contributions made toward speech emotion.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Speech classification, Emotions, Deep Learning, speech emotion recognition, traditional techniques,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ADAPTIVE DROWSINESS DETECTION USING MACHINE LEARNING ALGORITHM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP040

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP040

  Register Paper ID - 246749

  Title: ADAPTIVE DROWSINESS DETECTION USING MACHINE LEARNING ALGORITHM

  Author Name(s): P K Ghibitha Bebin, Dr A N Jayanthi

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 232-237

 Year: April 2022

 Downloads: 372

 Abstract

Fatigue and drowsiness of driver are amongst the most significant cause of road accidents. The main aim of the project is to find out the methods to detect driver drowsiness and alerting them, hence increasing the transportation safety. In this proposed system, capturing face gestures, eye movements and eye aspect ratio (EAR) shows that driver is in proper driving condition or not. Driver fatigue can increase the chances of car accidents. The reason for this type of car accidents is due to the fact that driver fails to take necessary actions prior to the accidient. Therefore assisting system which will monitor the behavior of driver and also will give the necessary alerts to the driver to prevent from the road accidents.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Drowsiness, eye aspect ratio, alertness

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PCB DEFECT DETECTION USING CONVOLUTIONAL AUTO ENCODERS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP039

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP039

  Register Paper ID - 246750

  Title: PCB DEFECT DETECTION USING CONVOLUTIONAL AUTO ENCODERS

  Author Name(s): Ms.K.Kaviyasri, Dr.D.Binu

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 227-231

 Year: April 2022

 Downloads: 371

 Abstract

The manufacture of printed circuit boards (PCBs) is one of the most important stages in electronic development. A very small defect on a PCB can lead to serious problems in the final product. Consequently, detecting and locating these defects are essential. An approach based on denoising convolutional auto encoders were used to detect defective PCBs and to locate PCBs it is used. Denoising auto encoders take a corrupted image and attempt to recover the intact image. By training this model with defective PCBs and forcing it to repair the defective parts, this model help us not only to detect all kinds of PCB defects and locate them, but also to fix them. The defective parts can then be located by subtracting the repaired output from the input. Experimental results indicate that this model is highly accurate in detecting the defective PCBs when compared to state of the art manual methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PCB, defect detection, auto encoder, denoising convolutional auto encoders

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PROPOSED SMART SPECS: VOICE ASSISTED TEXT READING SYSTEM FOR VISUALLY IMPAIRED PERSONS USING TTS TECHNIQUE

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP038

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP038

  Register Paper ID - 246751

  Title: PROPOSED SMART SPECS: VOICE ASSISTED TEXT READING SYSTEM FOR VISUALLY IMPAIRED PERSONS USING TTS TECHNIQUE

  Author Name(s): M.Thillai Rani, K.P.Sai Pradeep, R.Sivakumar

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 215-226

 Year: April 2022

 Downloads: 316

 Abstract

World Health Organization has given an estimation of visually impaired amid worldwide people in which out 285 million people are affected out of 7.4 billion populations. Hence there is a great necessity for taking adequate measure by utilizing emerging technologies for leading day today life successfully without any difficulty which is considered as a highly challenging. Smart specs are suggested primarily for supporting them: Text to Speech (TTS) System is employed for Visually Impaired Persons for reading the passage without visually via voice technology which is useful for blind persons for text detection thus yielding a voice output. The printed text can be read by visually impaired persons in vocal form. Raspberry Pi is considered as crucial part offering an interface amid camera besides image processing outcomes. Text image is captured from printed text besides captured image by specs inbuilt camera and Optical Character recognition (OCR) is greatly exploited for analysis. A compact open source software speech synthesizer, eSpeak is employed for detected text conversion. As a final point, synthesized speech is obtained by headphone by Text-To-Speech (TTS) technique.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

OCR, Voice Technology, Text Information Extraction, TTS, e-Speak, Reading System, Impaired Persons

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART SECURITY SYSTEM FOR VEHICLE ANTI-THEFT

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP037

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP037

  Register Paper ID - 246752

  Title: SMART SECURITY SYSTEM FOR VEHICLE ANTI-THEFT

  Author Name(s): Anjana R, Padma Preethi R, Sujitha J, Mrs.S.Karthika

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 209-214

 Year: April 2022

 Downloads: 345

 Abstract

In today’s culture, the demand for automobiles has been constantly increasing. At the same time, the theft of these vehicles is on the rise. This project is used to validate the user’s identification and provide security to the vehicle. Biometrics is crucial in verifying the user’s identification and ensuring high levels of security, preventing the car from being stolen. Unlike other authentication techniques such as passwords, email verification, or fingerprint verification, this one does not need the use of a password. According to security, only authorized persons are likely to unlock the doors using fingerprint recognition. Due to the existence of a fingerprint sensor on the doors, only authorized individuals are permitted to access the vehicle. The role of face recognition follows, which is utilized to validate the user’s identification. A camera is used inside the vehicle to record the user’s image and compare it to recorded data. It compares the information to a database to find a match.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino microcontroller, Anti-theft, Fingerprint recognition, Face recognition.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DEVELOPMENT OF HEALTH CARE MONITORING SYSTEM FOR ELDER PEOPLE USING INTERNET OF THINGS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP036

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP036

  Register Paper ID - 246753

  Title: DEVELOPMENT OF HEALTH CARE MONITORING SYSTEM FOR ELDER PEOPLE USING INTERNET OF THINGS

  Author Name(s): R.Deepalakshmi, R.Vanitha, M.Shivashankari, Dr.J.Jeyarani, J.Jecintha

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 203-208

 Year: April 2022

 Downloads: 326

 Abstract

Conventional sensor based diagnosis in medical field requires more number of sensors and human efforts if it is processed in a large scale. It is a difficult task due to the shortage of medical professionals and system setup. To overcome this issue an IoT based health care application is proposed in the research work. The proposed system consists of the web and mobile application based on continuous wireless monitoring of patients. The objective of this paper is to implement a low-cost system and transmit the patient vital signs in emergency situations. Sensors are being used for measuring the patient vital signs by using the wireless network. The sensors data are collected and transmitted to the cloud for storage via Wi-Fi module connected with the controller. The data is processed in the cloud and feedback steps are taken on the analysed data which can be further analysed by a doctor remotely. Remote viewing reduces burden to doctors and provides the exact health status of patients. If the patient needs urgent attention then a message is sent to the doctor.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Health care, Elder people, IOT, Wi-Fi Module, Sensors, Wireless Networks, Remote Monitoring

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IOT BASED EPILEPSY MONITORING SYSTEM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP035

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP035

  Register Paper ID - 246754

  Title: IOT BASED EPILEPSY MONITORING SYSTEM

  Author Name(s): R.P.Meenakshi Sundhari, K.Jaikumar, S.Suruthi Gobika

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 199-202

 Year: April 2022

 Downloads: 325

 Abstract

Epilepsy is a neurological condition characterized by aberrant electrical activity in the brain that results in seizures. Seizures are unpredictable; the length of time between seizures, as well as the symptoms, differ from one patient to the next. Because seizures are unpredictable, and most epileptic patients experience physically dangerous symptoms during them, they are unable to do daily tasks. The goal of this project is to create and install a monitoring system for epileptic patients that will continuously check vital signs, evaluate measurements, and determine whether or not the patient is on the verge of having a seizure. The system sounds an alarm whenever a seizure is predicted. A notification should also be made to the health care provider in charge, as well as one recommended contact. People with epilepsy will have a better chance to work and live a normal life if the monitoring system is implemented. As a result, this article explains the whole system and demonstrates the outcomes of the three systems that have been implemented: EEG,Heart rate sensor, and a Fall Detection System. This system have been developed in the aim of assisting the doctors to identify the type of seizure with better accuracy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Epilepsy ,EEG , Blood pressure senor, Accelerometer , Fall Detection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EXACT NATURE OF K-K MODEL COUPLED WITH G-M EQUATION ON THE RATE OF FLOW OF WASTE WATER USED FOR SEWER DESIGN

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP034

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP034

  Register Paper ID - 246755

  Title: EXACT NATURE OF K-K MODEL COUPLED WITH G-M EQUATION ON THE RATE OF FLOW OF WASTE WATER USED FOR SEWER DESIGN

  Author Name(s): R Senjudarvannan, G Bhavani, K Senthamil Selvan

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 196-198

 Year: April 2022

 Downloads: 310

 Abstract

In this paper, a pioneering method endowed on the rate of the flow of surplus water used for sewer design. Here the innovative arduous solutions scrutinized on seventh order K-K model coupled with G-M equation. These solutions have innumerable insistences in the field of physics and other zones. Embraced consequences will succour as a very imperious breakthrough in the awareness of the rate of the flow of surplus water used for sewer design. We also have exposed the method which is an operative implement for seventh order K-K model.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Kaup-Kuperschmidt, Sewer design, Sewer dynamics, Gauckler�Manning’s equation, seventh order equation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VEHICLE TRACKING AND ACCIDENT DETECTION SYSTEM USING GPS AND GSM MODULE

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP033

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP033

  Register Paper ID - 246757

  Title: VEHICLE TRACKING AND ACCIDENT DETECTION SYSTEM USING GPS AND GSM MODULE

  Author Name(s): R. Kanmani, R. Rakhul, R. Sakthivel, S. Sharjeel

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 189-195

 Year: April 2022

 Downloads: 321

 Abstract

In today�s world, most accidents do happen on the roads nowadays due to increased traffic and also due to the driver’s reckless driving. In many cases, family members or the ambulance and police are not kept informed on time. This results in delaying the assistance provided to the injured person by accident. This Project titled �Vehicle Tracking and Accident Detection System and Arduino as the master controller� aims at finding the vehicle where it is and locating the vehicle using a computer within the vehicle system to send a message. Initially, the GPS continuously takes input data from the satellite and stores the latitude and longitude values in Arduino. If we have to track the vehicle, we need to send a message to the GSM device, by which it gets activated. It also gets activated by detecting accidents on the vibration sensor. Once GSM gets activated it takes the last received latitude and longitude positions values from the buffer and sends a message to the particular number or laptop which is predefined in the program. Once the message has been sent to the predefined device the GSM gets deactivated and GPS gets activated. This project presents analyzes of the accident detection techniques and some future possibilities in this field.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Vibration Sensor, Arduino, GSM, GPS, Buffer, etc,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF VIRTUAL FRIENDLY WOMEN SECURITY DEVICE WITH IOT TECHNOLOGY

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP032

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP032

  Register Paper ID - 246758

  Title: IMPLEMENTATION OF VIRTUAL FRIENDLY WOMEN SECURITY DEVICE WITH IOT TECHNOLOGY

  Author Name(s): R. Arunprasath, M.Jaya, M. Jothiga, C. Mohanapriya, A.Pavithra

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 186-188

 Year: April 2022

 Downloads: 326

 Abstract

IoT based women safety device is designed and implemented for effective security defense and their self protection. A three way safety module is proposed in order to provide self defense by giving electric shock, recording and tracking of evidences as well as information which results in transformation of data through SOS to the nearby police station, Here recording the information and its footage.In the views of security of women, self defense devices are designed which produced electric shock to the attacker through a nerve simulator and rings a buzzer on pressing a button. It also allows to record evidence via a video camera which gets activated through the button and stores the footage and the Raspberry Pi. A microphone and speaker are connected with the GSM module through which the user can hear and speak with the connected person. Hardware used are Raspberry Pi 3 b+, GSM module, Relay module, Buzzer and Nerve simulator.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

IoT module, Raspberry Pi, GSM, GPS, self- defense device.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPACT OF BURST PRIORITY, COLLISIONS, FEEDBACK AND BUFFER SEARCH IN OBS NETWORKS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP031

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP031

  Register Paper ID - 246760

  Title: IMPACT OF BURST PRIORITY, COLLISIONS, FEEDBACK AND BUFFER SEARCH IN OBS NETWORKS

  Author Name(s): D. Veera Vanitha, D. Sumitha, M.Nila

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 179-185

 Year: April 2022

 Downloads: 334

 Abstract

Optical Burst Switching (OBS) is a competitive and promising switching technology for the realization of high speed optical networks. In this OBS, Burst delivery ratio is the important factor which decides the performance of the network. Burst loss occurs due to heavy load and burst contention. The performance of the network can be improved by applying proper contention resolution schemes. This paper deals about hybrid buffering and retransmission technique with the impact of collisions, feedback and burst priority to increase the burst delivery ratio on the network. A mathematical model of the proposed model is framed and analyzed to derive the performance measures like steady state probabilities, average network size and average buffer size by Supplementary variable Method. The obtained results shows that the proposed model gives better results when compared with conventional OBS method.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Optical Burst Switching; Burst Priority; Retransmission; Collision; Feedback.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN OF PATCH ANTENNA AND 1X2 PATCH ARRAY FOR WIFI APPLICATIONS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP030

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP030

  Register Paper ID - 246764

  Title: DESIGN OF PATCH ANTENNA AND 1X2 PATCH ARRAY FOR WIFI APPLICATIONS

  Author Name(s): V.Ganesh, S. Rajkumar, F.S. Umarfarook, S.N. Sridhar

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 175-178

 Year: April 2022

 Downloads: 347

 Abstract

The antenna is used to receive RF/Microwave signal and the rectifier is used to convert the received RF/Microwave signal into DC signal. In this work, the design and simulation of the rectangular microstrip patch antenna and arrays are carried out at 2.45GHz frequency for low-profile wireless applications. Initially a rectangular microstrip patch antenna is designed at 2.45GHz frequency using an electromagnetic solver. The antenna design parameters are optimized using the above electromagnetic solver. Rectangular microstrip array of 1�2 is designed using feed network at the same frequency. The inter-element spacing of the antenna is 0.75?0. The antenna radiation parameters such as return loss, gain, directivity, efficiency and 3D radiation patterns are obtained for single patch and array. The antenna radiation parameters are compared for the antenna and arrays. From the simulation results, it is observed that the gain and beamwidth of the antenna array are increased and decreased respectively for the increase in elements in the array.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Microstrip antenna, Wireless communication ,Directivity, Efficiency, Gain

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SUPER RESOLUTION WITH INTERPOLATION-BASED METHOD: A REVIEW

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP029

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP029

  Register Paper ID - 246766

  Title: SUPER RESOLUTION WITH INTERPOLATION-BASED METHOD: A REVIEW

  Author Name(s): Noor Zaim Fariz Nor Azam, Haniza Yazid, Saufiah Abdul Rahim

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 168-174

 Year: April 2022

 Downloads: 302

 Abstract

Image Super Resolution (SR) is a method that was quickly developed and updated nowadays. Image SR can be done different methods such as interpolation-based methods, reconstruction-based methods, and example learning-based methods. Interpolation-based methods in SR is also a great topic of interest in many researchers throughout the world since it can be easily derived from previous work to accommodate any desired outcomes and relatively low computational costs compared to other methods. In this paper, we reviewed 17 different literatures on the developments and the updates of the interpolation-based methods in SR. The reviewed literatures are from journal articles such IEEE Transactions, IEEE Access and conference proceedings such as IEEE INMIC. The performance of these reviewed methods were mostly evaluated by measuring the output HR image quality such as Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Method (SSIM) values and also the computational costs of the proposed methods such as the run time. Even though many interpolation-based SR methods were proposed throughout the years, there is still the need to further develop this method since there are some improvements can be made in order to produce a good HR image from a LR image such as the edges structure, issues with artifacts, and textural quality of the image.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Super Resolution, Image Interpolation, Interpolation Method.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMAGE AND TEXT TRANSMISSION USING LI-FI TECHNOLOGY

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP028

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP028

  Register Paper ID - 246767

  Title: IMAGE AND TEXT TRANSMISSION USING LI-FI TECHNOLOGY

  Author Name(s): R Ramakrishnan, Sakthivignesh A, Narasimman S, Nanda kumar G

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 165-167

 Year: April 2022

 Downloads: 354

 Abstract

Wi-Fi is innovation utilizes radio waves to move the information between gadgets in light of the principles of IEEE 802.11 and this is the most ordinarily involved procedure for associating the electronic devices. Through this Wi-Fi one can associate with the web with remote passages openly puts like air terminals, railroad stations, libraries and other entertainment shopping centers and so forth Wi-Fi is having its own impediment on move speed and limit, starting at 2019, at nearby reach, a few sorts of Wi-Fi, running on suitable equipment, can accomplish velocities of 9.6 Gbit/s. This can be overwhelmed by the creating innovation called Li-Fi to move information like text, picture and voice. Li-Fi has no restrictions on its exchange limit and accomplished an accelerate to 224Gbit/s in its creating stage. In this proposed project work, Li-Fi is utilized to move information like text and pictures utilizing Arduino sheets to decrease the expense of the innovation. This proposed strategy is multiple times quicker than the current Wi-Fi procedure in moving information. The result of the this proposed project work is reasonable in electromagnetic delicate zones like airplane lodges, clinics and thermal energy stations without causing electromagnetic impedance utilizing Li-Fi information transmission.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wi-Fi, Li-Fi, VLC.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SPEAKING SYSTEM FOR DUMB PEOPLE AND REMOTE DEVICE CONTROLLING USING HAND GESTURES

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP027

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP027

  Register Paper ID - 246769

  Title: SPEAKING SYSTEM FOR DUMB PEOPLE AND REMOTE DEVICE CONTROLLING USING HAND GESTURES

  Author Name(s): S. Thiyagarajan, V S.Nandhakumar, K. Sudhan, B. Vimal

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 160-164

 Year: April 2022

 Downloads: 319

 Abstract

It has always been difficult to communicate between dumb people and normal people. Various methods for the benefit of dumb individuals have been developed by manufacturers all over the world, however they are not flexible or cost-effective. A smart speaking system based on hand motions and gestures has been developed to assist dumb people using Flex sensors, an accelerometer sensor, and a Raspberry Pi are used to implement it. When hand motions are made, the analog data from the flex sensors and accelerometer sensor is transferred to an ADC converter, which converts it to digital data and sends it to the Raspberry Pi, which analyses it and provides the desired output. The voice will be played for different accelerometer movements and home applications will be turned on and off using flex sensor movements allowing dumb people to communicate in an effective manner.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Speaking, Analog, Sensor, Accelerometer, Flex sensor, ADC converter.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EMBEDDED BASED OXYGEN LEVEL DETECTOR IN HEALTHCARE APPLICATIONS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP026

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP026

  Register Paper ID - 246772

  Title: EMBEDDED BASED OXYGEN LEVEL DETECTOR IN HEALTHCARE APPLICATIONS

  Author Name(s): Malathi.L, Sreemathi.R, Subhashini.E, Sneha.M

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 153-159

 Year: April 2022

 Downloads: 313

 Abstract

Recent technological advancements have enabled us to check our health status using a variety of devices. It is now possible to monitor blood oxygen levels, heart rate, temperature, and other parameters without the assistance of a doctor. With these technological breakthroughs, it is now possible to create a basic, user-friendly health monitoring system that can be made available to the general public. The purpose of this study is to improve community health while also lowering the infection’s detrimental impact on the economy and society. The suggested system monitors several health metrics in public settings using an Arduino and a sensor. These parameters are set in the entrance door frame of public buildings to monitor health and prevent the spread of disease.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Body temperature, Blood oxygen level, Pulse rate

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FUTURISTIC FACE RECOGNITION BASED COVID NON-VACCINATION POPULATION FINDER AND ALERT SYSTEM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP025

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP025

  Register Paper ID - 246775

  Title: FUTURISTIC FACE RECOGNITION BASED COVID NON-VACCINATION POPULATION FINDER AND ALERT SYSTEM

  Author Name(s): Soundhariya Lakshmi V, Hemalakshmi S, Meena N

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 145-152

 Year: April 2022

 Downloads: 305

 Abstract

Vaccinations are an important and effective cornerstone of preventive medical care with significant health benefits. Vaccination is crucial to limit the pandemic spread of SARS-CoV-2/COVID-19. The government has started vaccination to prevent the continuous spread of corona infection in India. Therefore, besides the development and supply of vaccines, it is essential that sufficient individuals are willing to get vaccinated, but concerning proportions of populations worldwide show vaccine hesitancy. However, it soon became clear that to end the pandemic, we would have to address another ubiquitous problem: the widespread hesitancy toward or downright rejection of vaccination. To achieve population immunity first we have to find the non-vaccinated population to this end, this project proposed an Aadhaar-based facial recognition system is used to find non-vaccination citizen and alert them using Artificial Intelligence. Deep learning in the form of Convolutional Neural Networks (CNNs) to perform the face recognition and seems to be an adequate method to carry out face recognition due to its high accuracy. A CNN is a type of Deep Neural Network (DNN) that is optimized for complex tasks such as image processing, which is required for facial recognition. CNNs consist of multiple layers of connected neurons: there is an input layer, an output layer, and multiple layers between these two. In the context of the corona virus disease (COVID-19) pandemic, a face recognition-based person�s current vaccination status to protect against COVID-19 can then be used for continuity of care or as proof of vaccination for purposes other than health care. Facial recognition technology (FRT) along with the Aadhaar to authenticate people before entering into any kinds of service. This project provides COVID-19 vaccination status using their face and attest that an individual has received a vaccine or not and alert them to get vaccinated.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DIGITAL IMAGE WATERMARKING FOR IMAGE PROTECTION

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP024

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP024

  Register Paper ID - 246777

  Title: DIGITAL IMAGE WATERMARKING FOR IMAGE PROTECTION

  Author Name(s): Ms.P. DEVI, SIBICHAKRAVARATHY NI, UDHAYAPRAKASH A, YAVINRAJ S, YOGESHKUMAR S

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 139-144

 Year: April 2022

 Downloads: 343

 Abstract

For of copyright security for sight and sound information, computerized watermarking innovation has drawn in increasingly more consideration in different exploration fields. Analysts have started to investigate the achievability of applying it to include picture detecting information as of late. On account of the distinction of remote detecting picture, higher prerequisites are advanced for its security and the board, particularly for the copyright assurance, illicit use and credibility ID of remote detecting picture information. Accordingly, this paper proposes to utilize picture watermarking innovation to accomplish complete security insurance of remote detecting picture information, while the utilization of cryptography innovation expands the appropriateness and security of watermarking innovation. The exploratory outcomes show that the plan of remote detecting picture advanced watermarking innovation has great execution in the indistinctness and vigor of watermarking.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Watermarking, Mallat Wavelet, DWT, PSNR

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FACE DETECTION & RECOGNITION FOR HOME SECURITY SYSTEM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP023

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP023

  Register Paper ID - 246778

  Title: FACE DETECTION & RECOGNITION FOR HOME SECURITY SYSTEM

  Author Name(s): Ms.P.DEVI, U.A.JOKINDHER, S.KARTHIK, R.KEERTHIVASAN

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 134-138

 Year: April 2022

 Downloads: 349

 Abstract

Face Recognition and Detection home automation has received a lot of interest due to the great influence it has had on the control of home appliances and devices through the use of efficient sensor devices. One of the most populated biometric that is used in control automation is the recognition based faces. In the modern world security is one of the major issues. As technology is getting advanced many security issues are arising. The existed developed security methods have some flaws and they can be hacked. The face of a person is captured by the camera and compared with the acquired database. The authorized user can also utilize mobile application to give access to the premises to any unregistered person. In the case of unauthorized/unknown access, the face image of the person will be captured and notified to the concerned authorities through an email. An Alarm will be generated in the case of unauthorized access. The proposed system produced accurate results in both cases: authorized and unauthorized access


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Near Infrared Visible, Video Based Face Recognition, DWT, CCTV

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURE DIGITAL PAYMENT TRANSACTION USING FACE RECOGNITION

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP022

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP022

  Register Paper ID - 246780

  Title: SECURE DIGITAL PAYMENT TRANSACTION USING FACE RECOGNITION

  Author Name(s): Narmatha. P, Ragul M, Shafeer Mohamed I, Vana bharath S, Subash S

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 126-133

 Year: April 2022

 Downloads: 312

 Abstract

The danger of exchange coordinated out or pernicious programming (malware)- based assaults or unlawful utilization of innovation is huge and developing; simultaneously web based banking gets increasingly well known. Prior, during making any web- based installment or making any web based banking related exchanges, the technique used to finish an exchange was with One-Time- Passwords as well as passwords, which were sent on the end clients enlisted versatile number or email address which were connected with his financial balance. Monetary misfortune might be one of the outcomes assuming that certifications or qualifications connected gadgets get taken. In numerous conventions, the exchange data isn’t gotten as expected. The proposed “Validation of Digital Payment utilizing Face Recognition” depends on the face acknowledgment procedure on installment door. This framework wipes out the One- Time-Password and secret word based exchanges with Face acknowledgment framework. Whenever face acknowledgment verification is utilized, parodying or faking of face comes into picture. As in face acknowledgment, faking should be possible by showing photo (printed copy) or video before the confirming gadget. Considering these faking or parodying strategies, the framework additionally utilizes Face ridiculing calculations to conquer these issues. Utilizing this we can finish fruitful exchange by checked regular individual such that it is demonstrated to the executing party, that the exchange was as a matter of fact started and affirmed by a distinguished normal individual.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Portal, Digital Payment, Payment Portal, Face recognition, Authentication.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HOME AUTOMATION FOR DISABLED PERSON USING VOICE TAG

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP021

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP021

  Register Paper ID - 246782

  Title: HOME AUTOMATION FOR DISABLED PERSON USING VOICE TAG

  Author Name(s): Dr.A.N.JAYANTHI, S.SABITHA, M.VISHALI, S.VISHNU PRIYA

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 122-125

 Year: April 2022

 Downloads: 464

 Abstract

Advancement of Automation technology, life is getting simpler and easier in all aspects. In today�s world, Automatic systems are being preferred over manual system. There is a rapid increase in the number of users of internet over the past decade. This has made internet a part and parcel of life, and IoT is the latest and emerging internet technology. Internet of things is a growing network of everyday object-from industrial machine to consumer goods that can share information and complete tasks with other activities. Wireless Home Automation system using IoT is a system that uses computers or mobile devices to control basic home functions and features automatically through internet from anywhere around the world, an automated home is sometimes called a smart home. It is meant to save the electric power and human energy. The home automation system differs from other system by allowing the user to operate the system from anywhere around the world through internet connection.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino UNO, HC-05 Bluetooth Module, 2N2222 Transistor, PN Junction Diode, AMR Voice app.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RASPBERRY PI BASED VEHICLE ANTI-THEFT SYSTEM BY FACE RECOGNITON

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP020

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP020

  Register Paper ID - 246783

  Title: RASPBERRY PI BASED VEHICLE ANTI-THEFT SYSTEM BY FACE RECOGNITON

  Author Name(s): A. Poornima, J. SathishKumar, R. Tamilselvan, M. Vignesh

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 117-121

 Year: April 2022

 Downloads: 388

 Abstract

Now day�s vehicles are stolen by the criminals. The mechanical key based lock is not so safe in the present vehicle systems. If someone gets the vehicles key he can easily have the access to the engine of the vehicle. To protect the vehicle from being stolen, the present key based security system has to be replaced with new face detection based system. The main aim of this project is to make the use of face recognition technique for vehicle engine, as opposed to the current method of using keys and if the driver consumes alcohol , then the vehicle cannot start. Face recognition is a new technique which is rapidly increasing, interesting area in real world . The face recognition methodology enables face recognition of the authorized users of the vehicle to be enrolled in the records. Before any user can access the vehicle, the image of his face is checked with the faces in the database. The driver with no match in the database is not allowed to accessing the vehicle also SMS, mail and buzzer alert give immediately This is implemented on �Raspberry Pi� micro-controller and this is very low cost system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

FACE RECOGNITION, VEHICLE ,USER , ALERT, IMAGE , DATABASE

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IOT BASED SOCIAL DISTANCE MONITORING

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP019

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP019

  Register Paper ID - 246784

  Title: IOT BASED SOCIAL DISTANCE MONITORING

  Author Name(s): R. Kanmani, S. Gowtham, B. Harish Nandhan, V. Kishore Kumar

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 111-116

 Year: April 2022

 Downloads: 289

 Abstract

Social distancing plays a vital role in preventing the spread of viral diseases such as COVID-19. In this work, IoT based social distance monitoring system which can be integrated with Passive Infrared sensor (PIR sensor) is proposed. This smart device is handy for maintaining social distancing and thereby the public safety. This device will be useful for law enforcing agencies, authorities or managers of public premises where public crowds. It will also be useful for individuals in order to alert them if someone is close around. Use of Wi- Fi eradicates the need of wired connection and thus improves the utility of the system. In this case the Wi-Fi module (ESP 8266), acts as a gateway to connect the sensors to the Blynk server and those application can be monitored remotely through the Blynk mobile app. The method is reasonably accurate and can be very useful in maintaining social distance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PIR Sensor, Arduino, IOT, Wi-Fi.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPUTER VISION BASED APPROACH FOR SORTING OF FASTENERS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP018

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP018

  Register Paper ID - 246788

  Title: COMPUTER VISION BASED APPROACH FOR SORTING OF FASTENERS

  Author Name(s): Dr.R.Lavanya, R. Nihil, S. Praveen kumar, S. Vipin

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 105-110

 Year: April 2022

 Downloads: 318

 Abstract

The main aim of this project is to sort different types of fasteners by using a computer vision system. Sorting of various types of fasteners can be carried out using image processing techniques. Real time images are feeded to a system and image processing is to be done by using OpenCV. This image processing technique is applied for the image uploaded, and appropriate processing is done. By using Watershed Algorithm, it is easy in separating different objects in an image. We can also use webcam focused on the products in the sorter in order to perform image processing. Image processing involves feature extraction and object detection techniques to identify the different types of fasteners. The sorter is fed with this processed information which enables easier segregation and sorting of the fasteners.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Watershed Algorithm, OpenCV, Extraction, Object detection, Image processing, Fasteners

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BCI APPLICATION: AN EEG BASED SIGNAL ANALYSIS AND CLASSIFICATION FOR NEURO DEGENERATIVE DISORDER PATIENTS � A SURVEY

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP017

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP017

  Register Paper ID - 246791

  Title: BCI APPLICATION: AN EEG BASED SIGNAL ANALYSIS AND CLASSIFICATION FOR NEURO DEGENERATIVE DISORDER PATIENTS � A SURVEY

  Author Name(s): J.N Deepak Antony, S. Kirubakaran, S. Kowsik, S. Logeshwaran, Dr. S. Anila

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 100-104

 Year: April 2022

 Downloads: 314

 Abstract

Today the neurodegenerative disorder is one of the major concerns in the Healthcare industry. There are several types of neurodegenerative disorder and it directly affects the driving force of the body, Brain. As a result, the involuntary movement occurs such as tremor and this causes disability, which leads the person to depend on others neurodegenerative diseases represent a major threat to human health. These age-dependent disorders are becoming increasingly prevalent, in part because the elderly population has increased in recent years. To support the disabled person as well as the care taker a communication channel is vital. The system bridges the gap between the patient and the care taker. The EEG of the Neuro Degenerative patients is Recorded, Preprocessed, Feature Extracted and Classified with the help of neural network to trigger the alert system. The system also focuses on the fall detection system with the help of three axis accelerometer. The system will play a vital role in assisting the Neuro Degenerative Disorder patients for their betterment of life.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Neuro Degenerative disorder, EEG(Electroencephalography) ,Preprocessing , Feature Extraction , Classification

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: OPTICAL FIBER CABLE IN HIGH SPEED COMMUNICATIONS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP016

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP016

  Register Paper ID - 246793

  Title: OPTICAL FIBER CABLE IN HIGH SPEED COMMUNICATIONS

  Author Name(s): Dr. S. Mary Praveena, A. Mirdulaa, K. Divya Vidya, S. Abirami, J. Kayalvizhe, S. Jaganayaki

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 96-99

 Year: April 2022

 Downloads: 312

 Abstract

Optical Fiber Communication is that the method of communication during which signal is transmitted within the sort of light and glass fiber is employed as a medium of transmitting those light signal from one place to a different. The signal transmitted in glass fiber is converted from the electrical signal into light and at the receiving end, it’s converted back to the electrical signal from the sunshine. the info sent are often within the sort of audio, video or telemetry data that’s to be sent over long distances or over Local Area Networks. glass fiber communication having good leads to long-distance data transfer at high speed, it’s been used as an application for various communication purposes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

light, glass fiber, telemetry data, Local area network, long distance data transfer, high speed

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FAILURE PREDICTION IN EMBEDDED SYSTEMS USING LONG SHORT-TERM INFERENCE

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP015

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP015

  Register Paper ID - 246794

  Title: FAILURE PREDICTION IN EMBEDDED SYSTEMS USING LONG SHORT-TERM INFERENCE

  Author Name(s): Dr. S. Mary Praveena, M.Abijith, M.Akash, S.Karthick, H.Kumaravel

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 91-95

 Year: April 2022

 Downloads: 325

 Abstract

Users of embedded systems and cyber-physical systems expect dependable operation for diverse sets of applications in environments. Reactive self-diagnosis techniques either use unnecessarily old preventive methods, or it does not prevent the system from failure. In this paper, we use the MACHINE LEARNING(ML) techniques to prevent the systems from those catastrophizes. we evaluate and analyse the alternative using machine learning techniques for predicting temperature behaviour on a mobile system-on-chip, and propose realizable hardware.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Failure prediction in Embedded Systems using Long Short-Term Inference

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LORA BASED SMART IRRIGATION SYSTEM USING WSN TECHNOLOGY

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP014

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP014

  Register Paper ID - 246795

  Title: LORA BASED SMART IRRIGATION SYSTEM USING WSN TECHNOLOGY

  Author Name(s): Dr.P.M. Benson Mansingh, G.Praveen, A.Shiva Bharathi, S.Stephen Yesudoss, S.Sundar Raj

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 87-90

 Year: April 2022

 Downloads: 425

 Abstract

Smart agriculture method using WSN Technology, enhances the yield and reduces the human intervention towards agriculture works. The prime factors are high accuracy and low power for any WSN based ranchers. In this project we have designed a controlling mechanism for the flow of water into agricultural farms depend on the wetness of the soil and the crops. The humidity and temperature sensed by the sensor mainly depends on the action performed by the farmer. These long range data transmission of the sensed data is effectively possible by adopting LoRa. These long range network can transmit data upto 15 km; usage of this communication module ensures the remote site data transfer operation. The sensed environmental parameters are communicated to farmers via smart mobile using LoRa technology. Smart irrigation system can utilize water efficiently, in the precision place at the appropriate time in the right amount.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Lora-Ra-02, Soil Moisture Sensor,Humidity sensor �DHT11

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: POWER FLOW ANALYSIS OF AC � DC POWER NETWORK USING NUMERICAL METHODS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP013

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP013

  Register Paper ID - 246797

  Title: POWER FLOW ANALYSIS OF AC � DC POWER NETWORK USING NUMERICAL METHODS

  Author Name(s): Reshma Muralidharan, Rajeswari Ramachandran

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 75-86

 Year: April 2022

 Downloads: 868

 Abstract

The HVDC system is adopted due to the limitations in HVAC such as reactive power losses, stability etc. HVDC technology provides qualities that make it particularly appealing for specific transmission applications such as massive electricity delivery across greater distances, interconnections which are asynchronous, lengthy submarine cable crossovers, and power flexibility that is rapid. Thus, High Voltage Direct Current transmission lines must be modelled and included in the Alternating Current power flow estimation for the entire AC-DC system. The conventional approach involves solving AC-DC system using Simultaneous technique in which the equations for AC and DC power systems are solved together. Due to computation burden of Simultaneous technique, the Sequential approach is adopted in which AC and DC power flow equations are solved independently, The AC and DC systems are linked by infusing an equal quantity of actual and reactive power into the AC buses at the terminals. In this work, an IEEE 5 bus system in which HVDC system is linked to buses 4 and 5 ( Bus 4 has a rectifier, whereas Bus 5 has an inverter) and an IEEE 30 bus system with HVDC link between buses 9 and 28 ( Bus 9 has a rectifier, whereas Bus 28 has an inverter) are taken as sample systems for performing AC-DC power flow analysis. The numerical methods for assessing AC-DC power flow, such as Gauss Seidel and Newton Raphson, are implemented using MATLAB programming. The results obtained for different combinations complement with the results stated in the literature. The future work shall include the application of recurrent neural network for AC-DC power flow analysis.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

High Voltage Direct Current, High Voltage Alternating Current, Simultaneous Technique, Sequential Technique, Gauss Seidel, Newton Raphson, Recurrent Neural Network

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: QUALITY MONITORING FOR FUSED FILAMENT FABRICATION PRODUCT: A REVIEW

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP012

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP012

  Register Paper ID - 246798

  Title: QUALITY MONITORING FOR FUSED FILAMENT FABRICATION PRODUCT: A REVIEW

  Author Name(s): Safwan Hisham, Shah Fenner Khan, Kamarulzaman Kamarudin

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 68-74

 Year: April 2022

 Downloads: 323

 Abstract

Additive Manufacturing (AM) is the process of creating products from three-dimensional (3D) model data by combining materials and building them up, frequently layer by layer. Material efficiency, resource efficiency, production flexibility, and part flexibility are four main environmental advantages of AM over traditional or subtractive manufacturing. There are a lot of different ways to manufacture products with additive manufacturing now but, the focus of this review is on Fused Filament Fabrication (FFF). FFF has a low production cost and the ability to construct complex geometries and shapes. However, this 3D printer needs to be manually stopped by the user if any of the defects or abnormalities are detected. Therefore, many studies have been done on monitoring the 3D printer to spot any defects in the products. This paper summarizes the monitoring based on the defects that are categorized into (1) geometrical defect, (2) layer defect, and (3) surface defect. Based on the reviews, the common sensor used in the monitoring system has been concluded, and some of the limitations are listed.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

additive manufacturing, 3D printing, fused filament fabrication, monitoring, artificial intelligence.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FACE MASK DETECTION SYSTEM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP011

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP011

  Register Paper ID - 246799

  Title: FACE MASK DETECTION SYSTEM

  Author Name(s): Ms. K. K. Archana, R. Abishek, S.Archana, V.Jagadeeshwaran

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 63-67

 Year: April 2022

 Downloads: 343

 Abstract

Efficient strategies to contain Coronavirus Disease- 2019 (COVID-19) pandemic are peremptory to relieve the negatively impacted public health and global economy with the full scope yet to unfold. In absence of highly effective drugs, vaccines, and abundant medical resources, many measures are taken to manage the infection rate and avoid the depletion of limited hospital resources. Wearing mask among the non pharmaceutical intervention (NPI) measures that could be effectively implemented at minimum cost and without dramatically disrupting social practices. Therefore, it is essential to develop a system that detects the citizens who wear a face mask and those who do not. This system is developed using Machine Learning and Deep Learning techniques and build a CNN model to detect people wearing masks and not wearing masks using an image or a video stream as input. Face mask is a part of infection control strategy to eliminate cross-contamination


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN model , Deep learning, Machine learning, K-Nearest Neighbors, Viola-Jones algorithm

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PLANT LEAF DISEASE IMAGE DETECTION AND CLASSIFICATION USING ANN

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP010

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP010

  Register Paper ID - 246800

  Title: PLANT LEAF DISEASE IMAGE DETECTION AND CLASSIFICATION USING ANN

  Author Name(s): Mrs.A.Anitharani, A.Vasanth, C.Hariharan, V.Maheswaran, S.Pranesh

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 55-62

 Year: April 2022

 Downloads: 329

 Abstract

In the emerging technology plant disease detection are important and the source of energy implies to human beings. Plant disease detection can influence the plant at convenience which leads to major loss on the production of crops and inexpensive value in the trade market. Therefore, plant disease detection plays a significant role in agricultural field. However, it requires huge manpower, more processing time and extensive knowledge about plant diseases. Since, machine learning technique under supervised learning like SVM, Gaussian Naive bayes, Random forest is consider detecting diseases in plant leaves as it analyzes the data from different aspects, and classifies it into the predetermined set of classes. The topological features are classified based on color, potency and measurements of the plant leaves are taken into consideration. This paper confer an overview on various types of plant disease detection and different grouping techniques in machine learning of CNN model that are used for recognizing diseases in different plant leaves using smart farming .


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PLANT LEAF DISEASE IMAGE DETECTION AND CLASSIFICATION USING ANN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON SMART WHEELCHAIR MONITORING AND CONTROLLING SYSTEM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP009

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP009

  Register Paper ID - 246801

  Title: A REVIEW ON SMART WHEELCHAIR MONITORING AND CONTROLLING SYSTEM

  Author Name(s): Ms.M.Prabha Maheswari, Karthick A, Perumal A

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 49-54

 Year: April 2022

 Downloads: 338

 Abstract

People with severe disabilities often rely on power wheelchairs for moving around. Although the needs of many people with disabilities can be met by wheelchair or portable wheelchairs, the disabled community finds it difficult or impossible to use wheelchairs independently. To meet this need, researchers have used advanced technology to enable mobile robots to build "smart wheelchairs" and have been the subject of research since the early 1980s and are built on four continents. This article presents a summary of the current state of the art and the directions for future research


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

wheelchair, mobile robot

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON FUTURE CHALLENGES OF EV RANGE EXTENSION

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP008

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP008

  Register Paper ID - 246802

  Title: A REVIEW ON FUTURE CHALLENGES OF EV RANGE EXTENSION

  Author Name(s): Mr.C.Anandhakumar, B. karthick, P.Ramya, M. Ajaikrishnan

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 44-48

 Year: April 2022

 Downloads: 327

 Abstract

Due to the duo of fossil fuel demand and air pollution we are in need of alternate transportation. The acceptable transportation is electric powered vehicles. The bottleneck in this method of transportation is lack of fuel filling station and EV range. Batteries play the most important role in traveling distance as well as performance of traction motor of every electric vehicle. Noticeably, the battery has a wide voltage range from fully-charged to empty state. The range extension issues are overcome with many solutions. But each and every one has its own drawbacks. Installation of a large-capacity battery pack is a straight forward method to extend the range of battery electric vehicles (BEV or all-electric vehicles). However, at the same time, a large-capacity battery pack not only occupies a big space but also significantly increases the vehicle weight, which directly impacts the fuel economy and vehicle performance. Electric Vehicles (EV) offer a strong prospect in achieving emission- free transport. This paper will encourage the audience to invest research and come up with solutions for the problem. Automobile engineers, EV manufacturers, mechanical engineers and budding researchers will be the primary audience for this paper. This paper is divided into three parts. Staring with introduction and discuss about the various methods of existing EV range extension and finally ended with the comparison and conclusion


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BEV, Range Extension, Battery, Economy

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW ON IOT BASED SMART AGRICULTURE MONITORING SYSTEM

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP007

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP007

  Register Paper ID - 246803

  Title: REVIEW ON IOT BASED SMART AGRICULTURE MONITORING SYSTEM

  Author Name(s): Ms. J. Glory Priyadharshini, B. Hariharasudhan, R. Neelakandan, R.K. Arvind

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 38-43

 Year: April 2022

 Downloads: 360

 Abstract

Agriculture is the primary occupation in our country for ages. But now due to migration of people from rural to urban there is hindrance in agriculture. so to overcome this problem we go for smart agriculture techniques using IOT. This project includes various sensors NPK sensor, moisture & Temperature Sensor and pH sensor. It makes use of sensor networks for noting the soil properties & environmental factors continuously and the soil parameters are continuously monitored. The sensed Values are sent to the microprocessor where the threshold values set. If the sensed values are exceeding the threshold values, it will be notified to the farmer.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Internet of Things (IoT), NPK sensor, Moisture & Temperature sensor, pH sensor, Threshold value set.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW OF WATER QUALITY MONITORING USING INTERNET OF THINGS (IOT)

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP006

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP006

  Register Paper ID - 246804

  Title: REVIEW OF WATER QUALITY MONITORING USING INTERNET OF THINGS (IOT)

  Author Name(s): Mr. A.P. Roger Rozario AP, R. Vijay Radha Surya, V. Sowmethran

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 31-37

 Year: April 2022

 Downloads: 319

 Abstract

Water pollution is one of the biggest and serious threats to society. Water has a significant impact on human health. The quality of the water must be monitored in real-time to ensure its safety and supply. Monitoring water in traditional ways takes longer, which can take up to from 24 to 96 hours to identify contaminants in water supplies, which are more time taking. This project aims at developing a water quality monitoring system using sensors and IoT (Internet of Things). The water quality parameters like temperature, pH, and turbidity are measures using sensors and the water quality index is determined. The measured values from the sensors will be processed using a microcontroller, and alert message will be sent to the user via an android application developed using MIT app inventor in case of any abnormalities. The sensor data can be viewed on the ThingSpeak GUI platform for monitoring and correction of the critical water quality parameters. The sensed data will be stored in the cloud or local storage and a machine learning algorithm will be implemented using the sensed parameters to predict the short term and long-term water quality in phase two of the project.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Temperature, pH, Turbidity, Arduino UNO, ESP8266 Wi-Fi Module, ThingSpeak GUI, MIT App Inventor.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IOT BASED REAL TIME SOLDIER HEALTH CARE MONITORING SYSTEM IN BATTLEFIELD

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP005

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP005

  Register Paper ID - 246805

  Title: IOT BASED REAL TIME SOLDIER HEALTH CARE MONITORING SYSTEM IN BATTLEFIELD

  Author Name(s): S. Theivanayaki, N.Rajagopala Krishnan, B. Naveen kumar, R. Ajaykumar, M. Vijayakumar, A. Ramesh

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 25-30

 Year: April 2022

 Downloads: 327

 Abstract

All nations keep its security as high precedence. Wars are being fought for land, water and acquiring the position of nation. A country�s arm forces correspond of three professional uniformed services that are army, navy, and air force. Soldiers are being the backbone of any armed force. They generally lose their lives due to lack of medical help when in emergency, also soldiers who are involved in operations or in special operations get straggled on war fields and lose contact with the authorities. To overcome this concern, we made this design in which wireless body area sensor network (WBANS) such as temperature sensor, heartbeat sensor and oxygen level sensor are used. These will monitor the health status of the soldier and also using IoT we can track the soldier�s exact position whenever needed. Using oxygen level sensor, we can also monitor the environmental condition due to that the authorities can give essential aids. The communication is established between the soldiers and authorities via IOT. Any abnormalities in the readings of wireless body area sensor network (WBASNs) are considered as a trigger for IOT to establish the connection between the soldier and base unit then it sends the current location and health status to the receiver.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

wireless body area sensor network, IOT, oxygen level sensor

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTELLIGENT SOCIAL DISTANCE CROWD MANAGEMENT SYSTEMS FOR PANDEMICS - A GUIDED TOUR

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP004

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP004

  Register Paper ID - 246806

  Title: INTELLIGENT SOCIAL DISTANCE CROWD MANAGEMENT SYSTEMS FOR PANDEMICS - A GUIDED TOUR

  Author Name(s): Hema. C.R., Paulraj M.P., Abhishek Udiit S.P.

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 18-24

 Year: April 2022

 Downloads: 369

 Abstract

Ever since the Covid-19 pandemic started, the world has seen many changes including the change in the lifestyle of people. To stop the spread of coronavirus, the major guidelines to be followed are wearing masks, sanitizing hands, and maintaining social distancing. The major problem is that most people fail to follow social distancing rules, which is flouted in public places. The need for a social distancing monitoring system has become one of the much-needed research areas in the present scenario such monitoring systems will alert the public when they refuse or fail to follow social distancing rules. In this paper we review the research carried out with respect to crowd management and social distance monitoring.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Social distancing, crowd management, human detection, image processing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW OF AUTOMATION OF AERATOR AND FEEDER FOR INLAND AQUACULTURE

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP003

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP003

  Register Paper ID - 246807

  Title: REVIEW OF AUTOMATION OF AERATOR AND FEEDER FOR INLAND AQUACULTURE

  Author Name(s): A.P. Roger Rozario., S. Sathyadevi, A.V. Vishnu Priyan, R. Lokesh

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 11-17

 Year: April 2022

 Downloads: 336

 Abstract

Aquaculture is the fastest growing food production sector over the last few decades. It plays a key role in providing nutritional security and livelihood to many developing countries. Amongst various aquatic species grown in aquaculture shrimps plays a major role in export revenue. Monitoring and control of dissolved oxygen and feeding shrimps at the correct time and amount yields export quality shrimps and reduces mortality of shrimps. This project aims at monitoring the dissolved oxygen and regulating the feed quantity and feeding time. A dissolved oxygen sensor interfaced to a microcontroller monitors the DO level and alerts the farmer in case of abnormalities. The process of feeding is automated using a microcontroller which controls the speed and operating time of the feeder motor and which results in less wastage and accumulation of feed in water which degrades the DO content. The acquired DO values will be stored in a local database or cloud for short term and long term prediction of DO using machine learning algorithms.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DO sensor, Temperature Sensor, Aerator, Feeder, Arduino UNO

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON GUITAR TUNERS

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP002

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP002

  Register Paper ID - 246808

  Title: A REVIEW ON GUITAR TUNERS

  Author Name(s): Gomathy S, Prabha Maheswari M, Aparna P, Prabhakaran S, Yaswanth Kumar N

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 4-10

 Year: April 2022

 Downloads: 310

 Abstract

The guitar is one of the most popular stringed musical instruments and the practical idea of automatically tuning a guitar explores a wide range of technologies and processes. Tuning is the process of altering the frequency of the musical instrument until they create the desired arrangement of tunes. This paper targets to review various types of guitar tuners and various methodology to tune a guitar, which would be helpful for beginner guitar players to assist in tuning an electric guitar to a certain, pre-set tuning preference.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Guitar Tuning, Standard Tuning, Various Methods of Tuning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGNING OF BLDC MOTOR CONTROLLER FOR ELECTRIC VEHICLES

  Publisher Journal Name: IJ Publication

  DOI Member: 10.6084/m9.doi.one.IJRAR1COP001

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1COP001

  Register Paper ID - 246809

  Title: DESIGNING OF BLDC MOTOR CONTROLLER FOR ELECTRIC VEHICLES

  Author Name(s): J. GLORY PRIYADHARSHINI, AJEESH T.R, CHANDRU J, NAVEEN E

 Publisher Journal name: IJ Publication

 Volume: 9

 Issue: 2

 Pages: 1-3

 Year: April 2022

 Downloads: 342

 Abstract

Permanent magnet brushless DC motors (PMBLDC) find wide applications in industries due to their high power density and ease of control. These motors are generally controlled using a three-phase power semiconductor bridge. For starting and providing proper commutation sequence to turn on the power devices in the inverter bridge the rotor position sensors are required. Based on the rotor position, the power devices are commutated. This thesis presents a Fuzzy Logic Controller (FLC) or speed control of a BLDC by using. The Fuzzy Logic (FL) approach applied to speed control leads to improved dynamic behavior of the motor drive system and an immune to load perturbations and parameter variations. The FLC is designed using based on a simple analogy between the control surfaces of the FLC and a given Proportional-Integral controller (PIC) for the same application. Fuzzy logic control offers an improvement in the quality of the speed response, compared to PI control. This work focuses on the investigation and evaluation of the performance of a permanent magnet brushless DC motor (PMBLDC) drive, controlled by PI, and Fuzzy logic speed controllers. The Controllers are for the PMBLDC motor drive simulated using the MATLAB software package. Further, the PI controller has been implemented on an experimental BLDC motor setup.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Brushless DC Motor (BLDC), Inverter, PID Controller, the Fuzzy Logic Controller (FLC), Closed-Loop Speed Control

  License

Creative Commons Attribution 4.0 and The Open Definition

IJRAR.ORG


ISSN
E-ISSN 2348-1269,
P- ISSN 2349-5138
UGC ISSN APPROVED
Journal Starting Year (ESTD) : 2014
ISSN
ISSN
IJRAR.ORG


ISSN
E-ISSN 2348-1269,
P- ISSN 2349-5138
UGC ISSN APPROVED
Journal Starting Year (ESTD) : 2014
ISSN
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 300 per paper
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content