Sustainable Fertilizer Usage Optimizer for Higher Yield
Background: Excessive and improper use of fertilizers leads to soil degradation and reduced agricultural productivity, negatively impacting farmers’ income.
Description: Create a data-driven solution that recommends optimal fertilizer types and quantities based on soil health, crop type, and weather patterns, ensuring sustainable agricultural pra...
|
Smart Irrigation System for Precision Farming
Background: Water scarcity is a major challenge in agriculture, leading to inefficient water use and reduced crop yields. Traditional irrigation methods often result in overuse or underuse of water. Description: Develop a smart irrigation system that utilizes sensors and IoT technology to monitor soil moisture levels and weather conditions.
This ...
|
Smart Irrigation System for Precision Farming
Background: Water scarcity is a major challenge in agriculture, leading to inefficient water use and reduced crop yields. Traditional irrigation methods often result in overuse or underuse of water. Description: Develop a smart irrigation system that utilizes sensors and IoT technology to monitor soil moisture levels and weather conditions.
This ...
|
Mobile App for Direct Market Access for Farmers
Background: Farmers often face challenges in accessing markets, leading to lower income due to middlemen. This gap restricts their ability to sell produce at fair prices. Description: Create a mobile application that connects farmers directly with consumers and retailers.
The app should include features for listing produce, negotiating prices, an...
|
Farmers Disease Diagnostic/Reporting Portal - Mobile Portal Al Based
Background- Agricultural productivity and food security are heavily dependent on the health of crops and livestock. Farmers, especially in remote or resource-limited areas, often face challenges in diagnosing and reporting diseases that affect their livestock and crops.
Early diagnosis and timely reporting are crucial for effective disease manage...
|
Drone-Based Intelligent System for Apple Orchard Management in Himachal Pradesh
Background: Himachal Pradesh, a northern state in India, is renowned for its apple production, contributing significantly to the local economy and livelihoods. With an annual apple production of approximately 600,000 metric tons, the region's apple orchards face challenges related to tree health monitoring, nutrient management, pest and disease con...
|
Development of AI-ML based models for predicting prices of agri-horticultural commodities such as pulses and vegetable (onion, potato, onion)
The Department of Consumer Affairs monitors the daily prices of 22 essential food commodities through 550 price reporting centres across the country. The Department also maintains buffer stock of pulses, viz., gram, tur, urad, moon and masur, and onion for strategic market interventions to stabilize the volatility in prices.
Decisions for market ...
|
Assured Contract Farming System for Stable Market Access
Background: Farmers often face uncertainties in market access, leading to fluctuating incomes. Contract farming can provide stability by ensuring farmers have guaranteed buyers for their produce. Description: Develop a comprehensive platform that facilitates assured contract farming agreements between farmers and buyers.
This platform will enable...
|
AI-Driven Crop Disease Prediction and Management System
Background: Crop diseases can devastate yields, leading to significant financial losses for farmers. Early detection and timely intervention are crucial for effective management. Description: Develop an AI-driven system that analyzes crop images and environmental data to predict potential disease outbreaks.
This system will provide farmers with a...
|
Affordable, Sustainable, and User-friendly Solutions for Semen Dose Storage and Distribution
Background: lndia has emerged as leading milk producer country in the world, however productivity of dairy animals is very low. To improve the productivity of animals a major focus area is to breed these animals using semen from high genetic merit bulls through Artificial lnsemination (Al).
Al enables farmers to access the best bull (male) geneti...
|
DESIGN AND IMPLEMENTATION OF AN ONLINE PETITION MANAGEMENT SYSTEM
since 2000, various authorities like parliaments and government offices have introduced electronic petitions systems (e-petitions).
Compared to most other means of petitions made available by public institutions, e-petitions have moved past the test organization and are portrayed by a significant level of institutionalization and procedural devel...
|
DESIGN AND IMPLEMENTATION OF AN ONLINE ELECTRICITY PAYMENT AND METERING SYSTEM WITH PAYMENT INTEGRATION, EMAILING AND SMS. (A CASE STUDY OF HARCOURT ELECTRICITY DISTRIBUTION COMPANY)
Nigeria's energy sector is plagued by poor, inadequate and disorganized electricity billing and consumer relations management.
Despite the introduction of prepaid billing meters, electricity billing and collection remains a major challenge in some communities in Nigeria.
Because the electricity consumer must first go to the bank to make the pay...
|
DESIGN AND IMPLEMENTATION OF A COMPUTERIZED LOAN MANAGEMENT SYSTEM FOR REJECTING OR APPROVING LOAN REQUEST USING CREDIT RISK AND EVALUATION MODELS
Nowadays, home loan is a frequently accessed component of people’s financing activities. Homeowners wants to increase the probability of loan acceptance, however banks seek to borrow money to low risk customers.
This paper compared and examined the machine learning models to select when loan applicants evaluating their probability of success. Thi...
|
Web-scrapping tool to be developed to search and report Critical and High Severity Vulnerabilities of OEM equipment (IT and OT) published at respective OEM websites and other relevant web platforms.
Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time.
There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
|
Universal Switch Set with Data Encryption and Decryption for Legacy Applications without Cyber Safety Measures
Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
|
Solution for end-to-end tracking of dual use chemicals used in both legitimate industries and illicit drug production from point of manufacture to point of end use/export.
Background: Dual use precursor chemicals are substances that have legitimate industrial and commercial applications but can also be used in the illicit manufacture of drugs. For e.g. Opium is converted to Heroin using Acetic Anhydride and manufacturing of Methamphetamine is done using Ephedrine or Pseudoephedrine.
Precursor chemicals are essentia...
|
Software solutions to identify users behind Telegram, WhatsApp and Instagram based drug trafficking
Background: Use of encrypted messaging/social media apps like Telegram, WhatsApp and Instagram for drug trafficking are on the rise. Channels operating on Telegram and WhatsApp and Instagram handles are blatantly being misused by drug traffickers for offering various narcotic drugs and Psychotropic substances for sale. Description: WhatsApp and Tel...
|
Software solution to identify the end receiver of a cryptocurrency transaction
Background: Use of cryptocurrencies like bitcoin, USDT, Monero etc. for drug trafficking activities are increasingly becoming common. The relative anonymity and speed provided by cryptocurrencies are misused by drug traffickers as a mode of transaction for drug sales and also as an asset to amass the proceeds of crime.
Description: Drug trafficke...
|
Recovery of Deleted Data and Associated Metadata from XFS and Btrfs Filesystems
Background : Digital evidence has become increasingly crucial in forensic investigations. The recovery of deleted data from storage devices is essential for reconstructing timelines, identifying suspects, and uncovering critical information. Traditional file systems like FAT and NTFS have been extensively studied, and tools for recovering deleted d...
|
Improving open source software security using Fuzzing
Background: Fuzzing is an automated process of identifying software vulnerabilities by supplying unexpected and faulty inputs to the software. The main aim of fuzzing is to identify the crucial edge cases where a software might fail. Therefore, fuzzing provides a crucial insight into the stability and security of the software. The process of fuzzin...
|
Identification of algorithm from the given dataset using AI/ML Techniques
Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure.
Description: The a...
|
Developing a tool to provide for real time feeds of cyber incident pertaining to Indian Cyber Space
Background: NCIIPC shares detail of cyber incidents to corresponding stakeholders in order to inform them about cyber activities related to their IT/OT infrastructure.
This empowers them to take necessary actions to mitigate further risk. Description: In order to achieve objective of protecting Critical Information Infrastructure (CIIs) of the Na...
|
De-anonymizing of entities on the onion sites operating on TOR Network
Background: Dark web is being used for illegal purposes and number of market places are being operated by the underground operators which facilitate illegal buying/selling of drugs/weapons/data leaks/counterfeit moneys/documents etc. Platforms, being anonymise to the LEA, make it difficult to identify the market place running on dark web mainly TOR...
|
DDoS Protection System for Cloud: Architecture and Tool
Background: Many organization are using Cloud for hosting their web applications. The attackers can try to attack these webservers for achieving Denial of Service attack. Specifically, Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by ...
|
Creating an application to identify the presence of government issued personally identifiable information (PII) embedded in documents and data, inadvertently or otherwise
Background: In today’s digital age, a wide variety of services and processes take place online. Users of these digital facilities are required to upload government-issued containing documents or provide data for successfully availing the services. However, the uploaded documents or data which are required to facilitate these digital services and pr...
|
Creating a cyber triage tool to streamline digital forensic investigation
To design and develop an innovative digital forensics and incident response tool with an intuitive and accessible interface for investigators, that streamlines the process of importing evidence, conducting automated analysis, and generating detailed reports. The tool should feature an interface with clear navigation & real-time data visualization a...
|
Centralized application-context aware firewall
Description: Develop an application firewall for end-points that can identity and restrict access of application to external network/hosts. The application firewall should provide further granular control of restricting domains, IP addresses and protocols for each application.
The firewall should be manageable through a centralized web console wh...
|
Product Rating through Sentiment Analysis
Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase “Positive”, “Negative” or “Neutral”.
It analyzes the data and labels the ‘better’ and ‘worse’ sentiment as...
|
ONLINE HOSPITAL LOCATION SYSTEM USING GOOGLE MAPS
Location based services provide many value added features to their mobile clients for information retrieval about their current location which can be processed to get the related information about their locality.
In the Emergency cases the doctors nearby (from the app) will fill the gap by providing the information of all the doctors present near...
|
Online Food Ordering System using PHP
The purpose of Online Food Ordering System is to automate the existing manual system by the help of computerized equipment’s and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same.
The required software and hardwa...
|
INFORMATION TECHNOLOGY AND SERVICE DELIVERY IN NIGERIA
The covid-19 pandemic intensified the deployment of technology in Nigeria, particularly in the realm of public service delivery in Nigeria. While this has brought series of benefits, there are equally some factors undermining the utilisation of the full potential of new technologies.
This study focused on the effects of the deployment of technolo...
|
ETHICAL ISSUES IN COMPUTER AS AN INSTUMENT TO TECHNOLOGY GROWTH
The recent technological advancement in digital computers has provided a more robust computer based operations in modern industrial society, including manufacturing, transport and distribution, government, the military, health services, education and research.
This impact of modern digital computers as an irreplaceable tool for technological grow...
|
Detection of Credit Card Fraud System
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
DESIGN AND IMPLEMENTATION OF PDF TO AUDIO SYSTEM
The PDF to Audio Converter project provides an alternative was to access the PDF books for blind, lazy, readers and others.
Using this PDF to Audio Converter the user will be able to listen to his\her favorite PDF and can do their daily routine.
The application can be used to read any PDF which has page numbers. The following application can be...
|
DESIGN AND IMPLEMENTATION OF ONLINE CAMPUS FUND RAISER SYSTEM
Over the years students use manual ways to raise funds to support their election ambitions, help pay less privileged students school dues, sick friends and many other challenges which they face in the school.
To overcome the problems of manual fund raising, the researcher has developed “an Online Campus Fund Raiser System”.
The system which wil...
|
DESIGN AND IMPLEMENTATION OF LECTURE REMINDER SYSTEM
Computerized lecture reminder is a tool that permites academic students and lectures to know like due dates and locations.
Lecture reminder has turned to be a very important tool in the time management and it is a common saying in the time management that it is better to keep track of things using a system rather than your memory.
A computerized...
|
DESIGN AND IMPLEMENTATION OF AN ONLINE BARCODE ATTENDANCE SYSTEM
Student attendance play significant role in order to justify academic outcome of a student and school as overall. Unfortunately, there is no automated attendance record keeping application available in Malaysia’s secondary schools.
A preliminary study has been conducted in one of secondary schools in Selangor, Malaysia in order to understand the ...
|
DESIGN AND IMPLEMENTATION OF A WEB-BASED SYSTEM THAT WILL LINK FARMERS TO BUYERS
This application note addresses the design and implementation of a web-based RDBMS menu driven information system to provide the exhaustive information on existing farming systems prevailing in different Agro Climatic Zones in India (14) (29 centres across the country, India) .
information system also recommends the required technological interve...
|
DESIGN AND IMPLEMENTATION OF A WEB-BASED SYSTEM FOR DISTANCE-LEARNING (CASE STUDY OF NOUN UNIVERSITY)
this project is to design a Web-based distance learning system, where instructors and students can participate fully in distance learning activities while geographically separated from each other.
This project is aimed to design and implement a distance learning system and use internet as the delivery mode. This report discusses in detail backgr...
|
DESIGN AND IMPLEMENTATION OF A CREDIT CARD FRAUD DETECTION SYSTEM
Credit card fraud detection is a relevant problem that draws attention of machine learning. In the fraud detection task, there are some peculiarities present, such as the unavoidable condition of a strong class imbalance, the existence of unlabelled transaction, and the large number of records that must be processed.
The present paper aims to pro...
|
DESIGN AND IMPLEMENTATION OF A COMPUTERIZED RECYCLING SYSTEM FOR PROTECTING THE GREEN ENVIRONMENT
Our society suffers a lot from the things that are thrown uselessly; these things may be beneficial to our society. On the other hand, communities suffer a lot of waste especially plastic waste; this has led to environmental pollution and depletion of natural resources.
Therefore, this research aims to achieve sustainable development and achieve ...
|
Analysis of Stock Market Prediction
Stock marketplace is a complicated and demanding system in which people make more money or lose their entire savings. The stock market prediction having high accuracy yields more profit for stock investors.
Stock market data is generated in a very large amount and it varies quickly every second. The decision making in stock marketplace is a very ...
|
TRENDS IN VEHICLE CONCEPT AND KEY TECHNOLOGY DEVELOPMENT FOR HYBRID AND BATTERY ELECTRIC VEHICLES
ABSTRACT
This paper deals a detailed study, control and energy management of a solar vehicle Multisource Power Supply. A PVG is used as the principal energy source and the batteries are used as secondary/storage source. The use of this last source can reduce strongly the power stress imposed on the primary source. The power sources (PVG- battery) ...
|
TOWARDS A SMART SUSTAINABLE CITY AIR POLLUTION DETECTION AND CONTROL USING INTERNET OF THINGS
The air quality in cities is degrading as a result of a complex interaction between natural and artificial environmental conditions.
With the increase in urbanization and industrialization and lack of control on emissions and use of catalytic converters, a great amount of particulate and toxic gases are produced.
The objective of this project i...
|
SMART HYBRID ELECTRIC VEHICLE
Smart Hybrid Electric Vehicles (S-HEV) provide large potential to save fuel consumption and reduce pollutant emission.
An S-HEV is a vehicle driven by more than one power source, and usually refers to a combination of internal combustion engine (ICE) and electric motor (EM).
...
|
POWER QUALITY IMPROVEMENT WITH REDUCED NO OF COMPONENTS FOR STAND ALONE APPLICATIONS
Voltage regulation is a main key factor for stable power system. Recent years the electronics equipment growth is rapidly increase. These electronics devices are voltage sensitive devices.
To maintain the grid system voltage equal or near to nominal level, the DVR plays major roll.
The 31 level inverter is proposed in this study to reduce number ...
|
DETERMINANT-BASED FEATURE EXTRACTION FOR FAULT DETECTION AND CLASSIFICATION FOR POWER TRANSMISSION LINES
Three phase transmission line are soul of power system. In this paper different types of fault are classified in the three phase transmission line. In the present scenario the both end ratios are considered for the data acquisition of voltage and currents. This states are measured and fed to the control panel for the fault analysis and detection. T...
|
DESIGN AND IMPLEMENTATION OF THYRISTOR BASED AUTOMATIC ON LOAD TAP CHANGER FOR CONSTANT OUTPUT VOLTAGE USING ANN & IOT
The on-load tap changing (OLTC) regulators have been widely used in various industry. The main function of OLTC is to change the turns of transformer winding, so that the voltage variations are limited without interrupting the secondary current. In other word the voltage can be regulated with the changer without any supply interruption using ANN co...
|
Battery Energy Management System for DC Micro Grids with AI Controller
This paper presents the design and implementation of an energy management system (EMS) with fuzzy control for a dc microgrid system. Modeling, analysis, and control of distributed and energy storage devices with MATLAB/Simulink are proposed.
To improve the life cycle of the battery, fuzzy control manages the desired state of charge. A fuzzy netwo...
|
AUTOMATIC ON LOAD TAP CHANGING TRANSFORMER USING AURDINO
The on-load tap changing (OLTC) regulators have been widely used in various industry. The main function of OLTC is to change the turns of transformer winding, so that the voltage variations are limited without interrupting the secondary current. In other word the voltage can be regulated with the changer without any supply interruption using ANN co...
|
AN ARTIFICIAL LOGIC CONTROLLER IMPLEMENTATION OF HIGH PERFORMANCE VARIABLE FREQUENCY DRIVER WITH INTERLEAVED CONVERTER
Variable frequency drive uses power electronics vary the frequency of input power to motor, thereby controlling motor speed.
AC motor drives are widely used to control the speed of ACs,pumps, blower speeds, machine tool speeds, conveyor systems speeds and others applications that require variable speed with variable torque.
This paper proposes ...
|
ACTIVE VOLTAGE CONTROL FOR DFIG-BASED WIND FARM INTEGRATED POWER SYSTEM BY COORDINATING ACTIVE AND REACTIVE POWERS
Large-scale wind farms are generally integrated by long-distance transmissions, but power grids cannot sufficiently support the access point voltage of these wind farms. The access point voltage undergoes a stability problem under wind speed variations. However, the reactive power compensation device cannot reconcile the requirements of response sp...
|
Task Management Application in php
The Online Task Management System is designed from day to day working of department of a college. The project provides online platform to accomplish day to day department level task and provide information of the task to specified user.
Admin can assign task, give notification and adds different users in this project. Important benefit of this pr...
|
students attendence by using fingerprint reader
The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification.
For student identification, a fingerprint recog...
|
Secure Online Auction Portal Project
Online auction is a business model where the items are sold through price bidding. Bidding have the start price and ending time. Potential buyers in the auction and the winner is the one who bids the item for highest price within the stipulated time.
For buying product online user must provide his personal details like email address, contact numb...
|
robotic vehicle controling using voice
This project was developed in a way that the robot is controlled by voice commands. An android application with a microcontroller is used for required tasks. The connection between the android app and the vehicle is facilitated with Bluetooth technology.
The robot is controlled by buttons on the application or by spoken commands of the user. The ...
|
real estate search based on data mining
Real estate investments have become more popular last few decades. People who are investing in a new house are more conservative with their budget and market strategies. The existing system involves calculation of house prices without the necessary prediction about future market trends and price increase.
The proposed system has two modes of oper...
|
image processing by using python
As artificial intelligence (AI) develops quickly, Python has become the de facto fully object-oriented programming language. Python'ssimplicity, language variety, and vast library ecosystem make it a valuable tool for image processing .
This research study examines Python's role in image processing in detail, outlining its benefits, drawbacks, a...
|
heart disease prediction final year project cse
Day by day the cases of heart diseases are increasing at a rapid rate and it’s very Important and concerning to predict any such diseases beforehand. This diagnosis is a difficult task i.e. it should be performed precisely and efficiently.
The research paper mainly focuses on which patient is more likely to have a heart disease based on various m...
|
Detection of Credit Card Fraud System
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Cloud Computing for Rural Banking Project
Cloud computing technology will bring to banks such advantages as cost savings, enhanced data processing capacity and improved quality of financial services. To further promote the application of cloud computing in the banking industry, the first and foremost task is to solve the security problem.
Judging from the commercial banks, cloud computin...
|
Android Smart City Travelling Project
Now a day’s a mobile phone has become a necessary part of one’s life. There is a continuous rise in the number of mobile computing applications, centeredaroundpeoples daily life. In such applications, location dependent systems have been identified as an important application.
Such application which presents the architecture and implementation of...
|
Advanced relatable real estate portal using asp. net
Aim of this project was to develop a real estate web application using Microsoft ASP .NET and SQL 2008. The real estate system Give the functionality for buyers, allowing them to search for houses by features or address.
It provides functionality for the seller, authorize them to log into the system and add new advertisements or delete existing o...
|
Admission Enquiry Chat Bot Project
Frequently we tend to tend to pay our time interrelate with numerous chatterboxes on the net, mostly targeted at such functions or just amusement. The chatbots have embedded information that helps them acknowledge the user's question and provide an answer to it.
The college enquiry chatbot project is meant exploitation algorithms that interpret ...
|
Approximate Pruned and Truncated Haar Discrete Wavelet Transform VLSI Hardware for Energy-Efficient ECG Signal Processing
The approximate computing paradigm emerged as a key alternative for trading off accuracy and energy efficiency. Error-tolerant applications, such as multimedia and signal processing, can process the information with lower-than-standard accuracy at the circuit level while still fulfilling a good and acceptable service quality at the application leve...
|
A Compact 0.3V Class AB Bulk Driven OTA
In this article, a new solution for an ultralow-voltage (ULV) ultralow-power (ULP) operational transconductance amplifier (OTA) is presented. Thanks to the combination of a low-voltage bulk-driven nontailed differential stage with the multipath Miller zero compensation technique, a simple class AB power-efficient ULV structure has been obtained, wh...
|
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting.
It is interesting because current VPN solutions are well established and have existed ...
|
Real-time web search engine in php
The increasing penetration of the real world with embedded and globally networked sensors leads to the formation of the Internet of Things, offering global online access to the current state of the real world.
We argue that on top of this realtime data, a Web of Things is needed, a software infrastructure that allows the construction of applicati...
|
Hospital Management System using java
Before computerized Hospital Management System came into practice, it was difficult to keep proper records of the daily activities of hospitals, patient information, maintenance schedule of equipments in the hospital, and how funds are being allocated and used.
This resulted in waste of money, time and manpower. Hospital Management System is an...
|
Hospital Information System Using Python
The target of this project "HOSPITAL MANAGEMENT SYSTEM" is to digitise the hospital's front office management and produce software that is user-friendly, fast, and cost-effective. It is related with the gathering of patient information, patient tests, and so on.
Before, it was done by hand. The system's principal job is to register and maintain...
|
Detection and classification of brain tumor using hybrid deep learning models
Accurately classifying brain tumor types is critical for timely diagnosis and potentially saving lives. Magnetic Resonance Imaging (MRI) is a widely used non-invasive method for obtaining high-contrast grayscale brain images, primarily for tumor diagnosis.
The application of Convolutional Neural Networks (CNNs) in deep learning has revolutioniz...
|
Credit Card Fraud Detection Using Machine Learning
The purpose of this project is to detect the fraudulent transactions made by credit cards by the use of machine learning techniques, to stop fraudsters from the unauthorized usage of customers’ accounts.
The increase of credit card fraud is growing rapidly worldwide, which is the reason actions should be taken to stop fraudsters.
Putting a ...
|
Credit Card Fraud Detection Using Machine Learning with Python
Online transactions have become a significant and crucial aspect of our lives in recent years. It's critical for credit card firms to be able to spot fraudulent credit card transactions so that customers aren't charged for things they didn't buy.
The number of fraudulent transactions is rapidly increasing as the frequency of transactions increa...
|
CREDIT CARD FRAUD DETECTION USING BIG DATA FRAMEWORK
: In this paper, we are implementing a credit card fraud detection system, by using big data technologies. Credit card is one of the most divisive products among all the financial tools available.
The usage of credit cards has become common in today’s world and huge volume of transaction happens online. The increase in these transactions has al...
|
Credit card fraud detection using artificial neural network
Frauds in credit card transactions are common today as most of us are using the credit card payment methods more frequently. This is due to the advancement of Technology and increase in online transaction resulting in frauds causing huge financial loss.
Therefore, there is need for effective methods to reduce the loss. In addition, fraudsters f...
|
Brain Tumor Detection and Classification Using Deep Learning and Sine-Cosine Fitness Grey Wolf Optimization
Diagnosing a brain tumor takes a long time and relies heavily on the radiologist’s abilities and experience. The amount of data that must be handled has increased dramatically as the number of patients has increased, making old procedures both costly and ineffective. Many researchers investigated a variety of algorithms for detecting and classifyin...
|
Brain Tumor Detection and Classification Using Artificial Intelligence
Health is very important for human life. In particular, the health of the brain, which is the executive of the vital resource, is very important. Diagnosis for human health is provided by magnetic resonance imaging (MRI) devices, which help health decision makers in critical organs such as brain health.
Images from these devices are a source of...
|
A smart System for Fake News Detection Using Machine Learning
Most of the smart phone users prefer to read the news via social media over internet. The news websites are publishing the news and provide the source of authentication.
The question is how to authenticate the news and articles which are circulated among social media like WhatsApp groups, Facebook Pages, Twitter and other micro blogs & social n...
|
Real-time Weather Forecasting web app
Weather forecasting has been an important application for predicting the weather changes and accordingly organizing human activities to prevent any loss. The Weathercast application notifies the user about the weather conditions like min-max temperature, humidity, windspeed, AQI (Air Quality Index), UVI (Ultraviolet Index) of any particular locatio...
|
Optical Character Recognition System (OCR) using machine learning
OCR is used to identify the character from human written text. To recognize the text segmentation of character is important stage. So here, we addressed different techniques to recognize the character.
This document also presents comparison of different languages for character and numeral recognition with its accuracy achieved by different writer...
|
News Feed web Application
Over the past few years, mobile news applications have become an extremely hyped thing for mobile users from all over the world. And, it is no wonder to learn that with the passage of time, their popularity and demand continue to enhance.
The project , the “News Feed Application for Android” is a cutting edge and versatile mobile news application...
|
Mobile wallet with merchant payment
Mobile wallets have emerged as the most significant contributor in pushing cashless and electronic payments. The surge of smartphones and internet connectivity of 4G and 5G is reflected in the robust growth of Mobile-wallets in India.
Numerous digital wallet providers have risen. Technological advancement has made everything possible under one to...
|
library management system
With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries.
In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
|
Facial Recognition Attendance System Using Python and OpenCv
The main purpose of this project is to build a face recognition-based attendance monitoring system for educational institution to enhance and upgrade the current attendance system into more efficient and effective as compared to before.
The current old system has a lot of ambiguity that caused inaccurate and inefficient of attendance taking. Ma...
|
Face Recognition based Smart Attendance System Using IoT
Face recognition based smart attendance system using IoT is a tool for recognizing the students face while taking attendance by using face biometrics based on monitor camera image capturing.
In our face recognition based smart attendance project, a raspberry pi system will be able to find and recognize human faces fast and precisely in images. ...
|
Face Recognition Based Gate Pass System
A software web application based on facial recognition is used to create a gate pass system. During college hours, it coordinates the student's gate pass request and leave. This system is ready for use and is simple to operate and manage.
A gate pass security system is what this system is called. Its main goal is to keep the campus safe from ou...
|
Credit Card Fraud Detection and Prevention By Face Recognition
Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases.
We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication.
The primary step o...
|
Basic Hospital Management System
The hospital's management system includes improved profitability, improved administration, and better patient care. The goal of this study is to create a digital management system that will boost the hospital's effectiveness and systems integration standards.
It was able to produce a module that would provide some facilities, like booking doctors...
|
Online Payment Fraud Detection using Machine Learning in Python
As we are approaching modernity, the trend of paying online is increasing tremendously. It is very beneficial for the buyer to pay online as it saves time, and solves the problem of free money.
Also, we do not need to carry cash with us. But we all know that Good thing are accompanied by bad things.
The online payment method leads to frau...
|
Tumor Detection using classification – Machine Learning and Python
Brain tumor detection is a critical application in the field of medical imaging, aimed at aiding healthcare professionals in the early and accurate diagnosis of brain tumors. This project leverages machine learning and deep learning techniques in Python to developa robust and reliable brain tumor detection system.
The system undergoes sensitivi...
|
Fake News Detection using Machine Learning
In recent years, due to the booming development of online social networks, fake news for various commercial and political purposes has been appearing in large numbers and widespread in the online world.
With deceptive words, online social network users can get infected by these online fake news easily, which has brought about tremendous effects...
|
The Quantum Path Kernel: A Generalized Neural Tangent Kernel for Deep Quantum Machine Learning
Building a quantum analog of classical deep neural networks represents a fundamental challenge in quantum computing.
A key issue is how to address the inherent non-linearity of classical deep learning, a problem in the quantum domain due to the fact that the composition of an arbitrary number of quantum gates, consisting of a series of sequenti...
|
An Interpretable and Accurate Deep-Learning Diagnosis Framework Modeled With Fully and Semi-Supervised Reciprocal Learning
The deployment of automated deep-learning classifiers in clinical practice has the potential to streamline the diagnosis process and improve the diagnosis accuracy, but the acceptance of those classifiers relies on both their accuracy and interpretability.
In general, accurate deep-learning classifiers provide little model interpretability, whi...
|
Public news fake identification using asp.net
Fake news, deceptive information, and conspiracy theories are part of our everyday life. It is really hard to distinguish between false and valid information.
As contemporary people receive the majority of information from electronic publications, in many cases fake information can seriously harm people’s health or economic status.
This article...
|
Stock price movement prediction based on the historical data using machine learning
predicting stock market is one of the challenging tasks in the field of computation. Physical vs. physiological elements, rational vs. illogical conduct, investor emotions, market rumors, and other factors all play a role in the prediction.
All of these factors combine to make stock values very fluctuating and difficult to forecast accurately. ...
|
Self-Supervised Learning for Electroencephalography
Decades of research have shown machine learning superiority in discovering highly nonlinear patterns embedded in electroencephalography (EEG) records compared with conventional statistical techniques.
However, even the most advanced machine learning techniques require relatively large, labeled EEG repositories.
EEG data collection and lab...
|
Production-Level Artificial Intelligence Applications in Semiconductor Supply Chains
This is a panel paper which discusses the use of Artificial Intelligence (AI) techniques to address production level problems in semiconductor manufacturing.
We have gathered a group of expert semiconductor researchers and practitioners from around the world who have applied AI techniques to semiconductor problems and the paper provides their a...
|
machine learning in innovations in stroke identification
Cerebrovascular diseases such as stroke are among the most common causes of death and disability worldwide and are preventable and treatable.
Early detection of strokes and their rapid intervention play an important role in reducing the burden of disease and improving clinical outcomes.
In recent years, machine learning methods have attracte...
|
A Human-Machine Agent Based on Active Reinforcement Learning for Target Classification in Wargame
To meet the requirements of high accuracy and low cost of target classification in modern warfare, and lay the foundation for target threat assessment, the article proposes a human-machine agent for target classification based on active reinforcement learning (TCARL_H-M), inferring when to introduce human experience guidance for model and how to au...
|
Evaluation of academic performance in web application
Managing the result sheets using traditional approach is a cumbersome process. The person must maintain the result records in registers and files using pen and paper.
The problem with this approach is, it requires lot of paperwork which is the part of our non-renewable natural resources. We are in the age, where we must think about sustain...
|