Enginnering Student Projects Implementation (For All Department)
Arts College Student Projects Implementation (For All Department)
Phd Works
Journal Writeup & Publishing
Workshop, In-Plant Training & Inernship in All Domains

TRANSMISSION LINE FAULT DETECTION USING IOT

 The fault occurred in transmission line is very much dangerous for the locality. In HV and EHV transmission line there are less fault occurrence but in locality the fault occurrence is more as compared to outer transmission line. In our prototype we design a model which is to be detect the fault in transmission line by comparing the voltage signal ...

Traffic Light Monitoring System based on NodeMCU using Internet of Things

 The increasing numbers of the private car cause the road traffic congestion. That is becoming important problems in the big cities. Another solution to reduce the traffic jam is developing intelligent transportation system such as intelligent traffic light system. However, the solution of such problems is one of the mandatory concern. In recent yea...

SOLAR POWERED DC HOME WITH MPPT& INTEGRATING VOLTAGE CONTROL

 The increase in consumption of low power DC appliances in home, accounts to high AC-DC conversion loss. The solar source is inherently a DC source which mainly provides the supply for DC home with low power DC appliances. This paper presents a DC Home model powered by solar source integrated with conventional backup. The power backup is provided by...

SMART WEARABLE FOR RESCUERS/VICTIMS

 In today’s scenario, there are risks at every moment of our life. People rambling around are found insecure, especially at remote outdoor locations where there are no rescue services provided. One of these scenarios is an aquatic environment such as waterfalls, lakes, trekking, remote locations, water parks, swimming pools, beaches, etc. Many lives...

SMART LPG CYLINDER MONITORING AND EXPLOSION MANAGEMENT SYSTEM

 In India, Liquified Petroleum Gas Cylinder is used as the primary source for cooking. The level of Liquified Petroleum Gas (LPG) Cylinder decreases gradually on daily usage. Upon complete utilization of the LPG Cylinder, a new cylinder can be availed by booking with LPG vendors which may take up to two to three days. Users have no provision to view...

SEMANTICS OF DATA MINING SERVICES IN CLOUD COMPUTING

 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...

PREDICTION OF CHRONIC KIDNEY DISEASE USING DEEP NEURAL NETWORK

 Deep neural Network (DNN) is becoming a focal point in Machine Learning research. Its application is penetrating into different fields and solving intricate and complex problems. DNN is now been applied in health image processing to detect various ailment such as cancer and diabetes. Another disease that is causing threat to our health is the kidne...

PIR SENSOR BASED DOOR OPEN WITH CAMERA AND TELEGRAM

 In modern world, the IoT is at its peak. The world is becoming smarter, the home automation is emerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation tec...

ONLINE E-LEARNING MANAGEMENT SYSTEM

 One of the main important resources for higher education is a Learning Management System (LMS), which has shown an enhancement of students’ progress with high quality learning outcomes worldwide. Many e-learning tools exist, each one has its own weaknesses and strongest points to the online learning process. This number increases continuously, and ...

ONLINE DEEP REINFORCEMENT LEARNING FOR COMPUTATION OFFLOADING IN BLOCKCHAIN-EMPOWERED MOBILE EDGE COMPUTING

 Offloading computation-intensive tasks (e.g., blockchain consensus processes and data processing tasks) to the edge/cloud is a promising solution for blockchain-empowered mobile edge computing. However, the traditional offloading approaches (e.g., auction-based and game-theory approaches) fail to adjust the policy according to the changing environ...

JEWELLERY MANAGEMENT SYSTEM

 In this modern world, computer becomes more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our daily life. Computerized systems can be used for scheduling the jobs, update the stock details, for complex calculations, and also used for preparing bills to customers. Here we devel...

IRIS TUMOR DETECTION USING CNN

 Iris tumors, so called intraocular tumors are kind of tumors that start in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris tumor detection system since the available techniques used currently are still not efficient. The combination of the image processing different techniques ...

IOT BASED UNDERGROUND FAULT DETECTOR

 Cables are put underground to stay away from pointless obstruction. These force cables convey electrical force and when these cables are put underground it is extremely hard to decide the specific area of the deficiency happened. There are numerous elements or purposes behind a deficiency to happen as, for example, burrowing, tremor, development wo...

IOT BASED AIR POLLUTION MONITORING SYSTEM USING ARDUINO

 Air pollution is a growing issue these days. It is necessary to monitor air quality and keep it under control for a better future and healthy living for all. Here we propose an air quality monitoring system that allows us to monitor and check live air quality in a particular area through IOT. System uses air sensors to sense presence of harmful gas...

IMAGE PIXEL BASED GRAPHICAL AUTHENTICATION SYSTEM

 In three level graphical, text and color file security system the authentication is done by image representation password. Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce co...

HUMAN STRESS DETECTION AND PREDICTION USING ANN

 The present study aims to elucidate the main variables that increase the level of stress at the beginning of military conscription service using an artificial neural network (ANN)-based prediction model. Random sample data were obtained from one battalion of the Lithuanian Armed Forces, and a survey was conducted to generate data for the training a...

FACE RECOGNITION BASED ATTENDANCE IN PYTHON

 In this paper, we propose a system that takes the attendance of students for classroom lecture. Our system takes the attendance automatically using face recognition. However, it is difficult to estimate the attendance precisely using each result of face recognition independently because the face detection rate is not sufficiently high. In this pape...

FABRICATION OF SECURED WIRELESS CONTROLLER FOR TRAFFIC SIGNALS AND REDUCING SPEED OF VEHICLE BY USING SENSORS

 This paper covers the design and implementation of an intelligent traffic management system for an isolated intersection. Vehicle Speed Detection is used to detect the speed of the running vehicle with the help of video and image processing techniques. We use camera to capture and analyzed the speed of the vehicle in real time. We detect the vehicl...

Environmental surveillance Monitoring System for the Industries

  One of the alarming threats to mankind and other living organisms is environmental pollution. Worldwide, textile industry is one of the main air and water pollutants. Its environmental effect is critical because it consumes considerable water for processing and discharges major polluted water. If the quality of those discharged water exceeds th...

ENVIRONMENT MONITORING SYSTEM IN INDUSTRY USING IOT

 Environmental monitoring is must for all industries as its conditions majorly affect our prosperity, solace and efficiency. Because it is such an essential aspect that have an immense effect on health of operating personnel & other parameters like fire, smoke, dust and intruder detection along with weather forecasting in industries. But the systems...

Enhancing Remembrance of Password as an Image

 This paper focuses on changing the system of having ‘text’ as password as people tend to often forget their passwords and have to recover it. Proposing the system of having picture as a password which is kept encrypted in a database and decrypted and matched to check for authorization of user. It has been scientifically proven that it’s easier for ...

ENERGY CONSUMPTION PREDICTION BY USING MACHINE LEARNING FOR SMART BUILDING

 Building Energy Management System (BEMS) has been a substantial topic nowadays due to its importance in reducing energy wastage. However, the performance of one of BEMS applications which is energy consumption prediction has been stagnant due to problems such as low prediction accuracy. Thus, this research aims to address the problems by developing...

EMPLOYEE ATTENDANCE SYSTEM

 This study aims at establishing an attendance system which can facilitate the administration data collection related to employee attendance effectively and efficiently. The method used descriptive scheme, interview and document analysis related to employee attendance to create an effective and efficient attendance system. The results obtained from ...

DRIVER DROWSINESS DETECTION USING MACHINE LEARNING IMAGE PROCESSING

 Drowsiness of drivers is one of the significant cause of road accidents. Every year, there is an increase in the amount of deaths and fatal injuries globally. By detecting the driver’s drowsiness, road accidents can be reduced. This paper describes a machine learning approach for drowsiness detection. Face detection is employed to locate the region...

DRIVER DROWSINESS AND ALCOHOL DETECTION WITH CAR TRACKING SYSTEM USING IOT

 The Internet of Things is most useful in communicating devices (things) with each other by using the internet nowadays. Most of sensor device is connected with IoT is more popular in recent times. In this paper a model based in IoT is proposed with aim to prevent accidents due to drink-driving and drowsiness of driver. It includes analysis of alcoh...

COVID-19 prediction using CNN Algorithm

 Deep learning (DL) has proved successful in medical imaging and, in the wake of the recent COVID-19 pandemic, some works have started to investigate DL-based solutions for the assisted diagnosis of lung diseases. While existing works focus on CT scans, this paper studies the application of DL techniques for the analysis of lung ultra sonography (LU...

COMPREHENSIVE ANALYSIS OF TWITTER TRENDING

 Twitter is among the most used microblogging and online social networking services. In Twitter, a name, phrase, or topic that is mentioned at a greater rate than others is called a "trending topic" or simply “trend”. Twitter trends has shown their powerful ability in many public events, elections and market changes. Nevertheless, there has been ver...

CLOUD FIREWALL UNDER BURSTY AND CORRELATED DATA TRAFFIC: A THEORETICAL ANALYSIS

 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...

BLOCK CHAIN BASED SECURED DATA TRANSFER IN MOBILE CLOUD COMPUTING

 Offloading computation-intensive tasks (e.g., block chain agreement cycles and information handling undertakings) to the edge/cloud is a promising answer for block chain-enabled versatile edge figuring. Nonetheless, the conventional offloading approaches (e.g., sell off based and game-hypothesis draws near) neglect to change the strategy as per the...

AUTOMATIC FORENSIC SKETCH TO IMAGE GENERATOR USING GAN

 Image processing has been a crucial tool for refining the image or to boost the image. With the improvement of machine learning tools, the image processing task has been simplified to great range. Generating a semantic and photographic face image, from a sketch image or text description has always been an extremely important issue. Sketch images ba...

AN END-TO-END EARLY WARNING SYSTEM BASED ON WIRELESS SENSOR NETWORK FOR GAS LEAKAGE DETECTION IN INDUSTRIAL FACILITIES

 Existing liquefied petroleum gas (LPG) detection systems are ad hoc and designed as stand-alone nodes. This article, however, presents an integrated end-to-end wireless sensor network (WSN) system that integrates hardware and software for early warning gas leakage detection and monitoring applications, fully utilizing the Internet of Things (IoT) f...

AI BASED STROKE DISEASES PREDICTION

 Since stroke disease often causes death or serious disability, active primary prevention and early detection of prognostic symptoms are very important. Stroke diseases can be divided into ischemic stroke and hemorrhagic stroke, and they should be minimized by emergency treatment such as thrombolytic or coagulant administration by type. First, it is...

To provide solution for entire year commercial solar drying of food commodities

 Sun drying is perhaps one of the oldest methods of food preservation that has been practiced for centuries. The direct usage of solar radiation which is renewable and abundant favours farmers that harvest and process at small quantity. As technology advances, an alternative to sun drying evolves to maximize the potential of solar radiation and this...

Water logging in almost all major cities despite having drainage system in place

 It is a common phenomenon in cities that waterlogging affects people’s normal life. It is of great significance for targeted transformation and upgrading to identify the risk factors of urban waterlogging. This paper collected the waterlogging data of Tianjin in China, analyzed the coupling mechanism among waterlogging risk factors of urban drainag...

Water harvesting

 Water harvesting is a traditional conservation technique, and there is general agreement that conserving water will promote agricultural production, especially in arid and semi-arid regions. The high competition for water and land has led to scarcity of water resources, and it has also threatened the world's food security. Recent technological deve...

Waste Management System

 This Waste management is one of the serious challenges of the cities, the system now used in cities, we continue to use an old and outmoded paradigm that no longer serves the entail of municipalities, Still find over spilled waste containers giving off irritating smells causing serious health issues and atmosphere impairment. The Smart Waste Manage...

To create a eco-friendly way of packing several varieties of foods

 Plastics have remained the material of choice, and after serving their intended purpose, a large proportion ends up in the environment where they persist for centuries. The packaging industry is the largest and growing consumer of synthetic plastics derived from fossil fuels. Food packaging plastics account for the bulk of plastic waste that are po...

Technology solutions for decarbonization of maritime industry as per IMO CHG startegy

 The Initial Strategy on reduction of greenhouse gas (GHG) emissions from ships adopted by the International Maritime Organization (IMO) in 2018 commits the IMO to reduce total GHG emissions of shipping by at least 50% by 2050. Though the direction of the Strategy is clear, the path to implementation remains uncertain. The ambitious IMO’s target cal...

Identification of reduction in carbon footprint using new technologies

 Climate change and global warming are internationally recognized as current issues, driving negative effects on humanity, and being mainly caused by GHG emissions generated both from industrial activities, and from other anthropogenic activities. Restoring the ecological balance requires urgent action to reduce GHG emissions. In this respect, the E...

Green Transformation of ports to achieve Net Zero Carbon Emissions

 Ports form a vital link in the global maritime supply chain, and adherence to the UN sustainable goals in each port development and operation is all-important. Improving the sustainability performance of port infrastructure requires identifying all relevant aspects of sustainability, defining suitable performance measures, applying tools for quanti...

Development of business models for collection and utilization of single use plastics and various other industrial wastes

 This study reviews the scientific literature for business models contributing to sustainable plastic management and suggests avenues for future research. We define sustainable plastic management (SPM) as any technique along the waste hierarchy seeking to minimize the environmental damage of plastic material. Limited cases were found during the lite...

App-Based Solution to provide market access to micro & small enterprises

 Finance for micro, small, and medium-sized enterprises (MSMEs) has been a concern for all stakeholders including entrepreneurs, financial institutions, and government organizations. The key objective of the study was to identify various challenges faced by MSMEs in sourcing of finance during different stages of their life cycle. This study is a fir...

Using food waste as consumable organic resource

 Food wastage and its accumulation are becoming a critical problem around the globe due to continuous increase of the world population. The exponential growth in food waste is imposing serious threats to our society like environmental pollution, health risk, and scarcity of dumping land. There is an urgent need to take appropriate measures to reduce...

Tracking, reducing and reusing of plastic waste

 The quantities of plastic wastes discarded and the fate of various plastics in the environment. Our Interactive Qualifying Project was concerned with researching the possible alternatives to plastics, mainly biodegradable plastics that have been claimed to biodegrade and help environment. Moreover, it was also required to evaluate the best methods ...

Tracking of supply chain and reverse logistics of products to reduce environmental impact

 Based on environmental, legal, social, and economic factors, reverse logistics and closed-loop supply chain issues have attracted attention among both academia and practitioners. This attention is evident by the vast number of publications in scientific journals which have been published in recent years. Hence, a comprehensive literature review of ...

Tracking of food waste for productive usage

 There is something that we still don’t see: food wasted by restaurants, shops or industries. There is also something we can see: food wasted by ourselves. This is the range focus of communities, through the management of wasted products of catering firms. Now a days people are aware of importance of food but there are no platform to share informati...

Suggest an improvised of tackling the issue of creating a consistent supply chain to augment the use of Bio fuels

 The rapidly growing biofuel industry poses considerable challenges to its supply chain network design and operations. In this chapter, we introduce key characteristics of the biofuel supply chain that comprises of feedstock production, biomass logistics, biofuel production and distribution. We then discuss the recent literature on biofuel supply ch...

Solution to establish a zero waste society with proper waste disposal management

 This study aims to find out how far the implementation of the concept of Zero Waste in waste management in Banda Aceh City. The problem of increasingly complex garbage due to the increasing amount of waste along with population growth. During this time generally waste is transported and disposed to the Final Processing Place (TPA) so that all garba...

SMART PILL BOX SYSTEM FOR BIPOLAR DISORDER PEOPLE

 The main purpose of the Smart Pill Box System project is helping patients with bipolar disorder or other illnesses to create their motivation to take medicine. Moreover, caregivers can take care of the patients more conveniently. Patients can use the application to setup the notification time for medication. Then the application will send the prese...

SMART PILL BOX SYSTEM FOR BIPOLAR DISORDER PEOPLE

 The main purpose of the Smart Pill Box System project is helping patients with bipolar disorder or other illnesses to create their motivation to take medicine. Moreover, caregivers can take care of the patients more conveniently. Patients can use the application to setup the notification time for medication. Then the application will send the prese...

IOT BASED PATIENT MONITORING SYSTEM IN ICU

 Monitoring various parameters of the patient using internet of things. In the patient monitoring system based on Internet of things project, the real-time parameters of patient’s health are sent to cloud using Internet connectivity. These parameters are sent to a remote Internet location so that user can view these details from anywhere in the worl...

HAZARDOUS GAS AND TEMPERATURE DETECTION IN MINING USING IOT

 Eventually a day's a consequence of a general temperature alteration and atmosphere changes there are attempting conditions in field of coal mine. To decrease the cost and improve the productivity close by thing quality the atomization in the field of coal mine is irrefutably essential, which will in addition reduce the mine laborers endeavors. Thi...

Smart helmet to find distance of vehicle

 There are many countries enforcing a regulation that requires the bike rider to wear a helmet when riding on their bike. With this reason, this project is specially developed as to improve the safety of the bike rider. The impact when bike involves in a high speed accident without wearing a helmet is very dangerous and can cause fatality. Wearing a...

Suggest a solution to help municipal bodies maximize solid waste collection with their given resources

 Municipal solid waste management is one of the major challenges that cities in developing countries are facing. Although waste collection services are critical to build a smart city, the focus of both scholarship and action/activism has been more on the utilization of waste than on collection. We devised a choice experiment to elicit the preference...

Technology demonstration of digital stamping of electronic communication/message to know its origin, date, time and spread

 A new method is discussed to enhance the security of communications over Internet. The method is based on utilization of electronic graphic images being sent as part of messages that require secure communication and certification. At the core of the proposed method are Electronic Virtual Stamps implemented as familiar and easily recognizable electr...

Speech to Text App customized for police functioning in different languages

 This paper reviewed literature from 1999 to 2014 inclusively on how Speech-to-Text Recognition (STR) technology has been applied to enhance learning. The first aim of this review is to understand how STR technology has been used to support learning over the past fifteen years, and the second is to analyze all research evidence to understand how Spe...

Portable Stabilized Buoyancy Platform for aerial surveillance of large public arrangements

 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...

SMART TRAFFIC MANAGEMENT USING CLOUD COMPUTING

 Traffic big data has brought many opportunities for traffic management applications. However several challenges like heterogeneity, storage, management, processing and analysis of traffic big data may hinder their efficient and real-time applications. All these challenges call for well-adapted distributed framework for smart traffic management that...

RURAL BANKING USING CLOUD COMPUTING

 The Rural Banking introduced in villages to give good and better services to the people for the development of their agriculture sector or to help for their small-scale business. The banking sector in India has witnessed a complete transformation both in its functioning and delivery of services to their customers.The banking services in rural areas...

ROAD LANE DETECTION USING MACHINE LEARNING

 Road lane detection systems play a crucial role in the context of Advanced Driver Assistance Systems (ADASs) and autonomous driving. Such systems can lessen road accidents and increase driving safety by alerting the driver in risky traffic situations. Additionally, the detection of ego lanes with their left and right boundaries along with the recog...

Voice controlled vehicle

 This project was developed in a way that the robot is controlled by voice commands. An android application with a microcontroller is used for required tasks. The connection between the android app and the vehicle is facilitated with Bluetooth technology. The robot is controlled by buttons on the application or by spoken commands of the user. The mo...

STRESS DETECTION USING GALVANIC SKIN RESPONSE: AN ANDROID APPLICATION

 Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...

SENTIMENTAL ANALYSIS USING A CODE-MIX DATASET OF TAMIL-ENGLISH

 This paper describes the development of a multilingual, manually annotated dataset for three under-resourced Dravidian languages generated from social media comments. The dataset was annotated for sentiment analysis and offensive language identification for a total of more than 60,000 YouTube comments. The dataset consists of around 44,000 comments...

SECURED DATA PROTECTION USING SIGNATURE PROTOCOL AND BLOCK CHAIN

 During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...

SECURE WIRELESS CONTROLLER FOR HAND HELD REMOTE OPERATION OF TRAFFIC SIGNAL IN PEAK HOURS

 This paper covers the design and implementation of an intelligent traffic management system for an isolated intersection. The vehicular traffic management system employs Field Programmable Gate Array (FPGA) as the central decision-making unit and combines its speed and high number of I/O with other system components such as the ESP8266 Wi-Fi module...

PCOS DETECTION AND PREDICTION USING CNN MACHINE LEARNING ALGORITHMS

 Polycystic Ovary Syndrome (PCOS) is a medical condition which causes hormonal disorder in women in their childbearing years. The hormonal imbalance leads to a delayed or even absent menstrual cycle. Women with PCOS majorly suffer from excessive weight gain, facial hair growth, acne, hair loss, skin darkening and irregular periods leading to inferti...

ONLINE PLANT SALES RECOMMENDER SYSTEM USING MACHINE LEARNING

 In today's technical era, every startup or a company attempt to establish a better sort of communication between their Plants and the users, and for that purpose, they require a type of mechanism which can promote their plant effectively, and here the recommender system serves this motive. It is basically a filtering system that tries to predict an...

MACHINE LEARNING-BASED AUTOMATIC CLASSIFICATION OF KNEE OSTEOARTHRITIS SEVERITY USING GAIT DATA AND RADIOGRAPHIC IMAGES

 Knee osteoarthritis (KOA) is a leading cause of disability among elderly adults, and it causes pain and discomfort and limits the functional independence of such adults. The aim of this study was the development of an automated classification model for KOA, based on the Kellgren–Lawrence (KL) grading system, using radiographic imaging and gait anal...

IoT-based Smart Heart Attack Detection and Heart Rate Monitor

 This paper is intended to monitor Heart beat with android application which is used to measure the heart beat of different persons. It is built using Android Studio. It may also include the different modules based on the software specification, system requirement, hardware requirement and disk space....

IOT BASED COVID 19 PATIENT MONITORING SYSTEM FROM HOME

 Medical Surveillance Solutions are the most important in the brief developing country populace enhances demands for caretaking. Covid-19 is as a substitute contagious it is very important to quarantine covid-19 humans but at the equal time medical examiners need to check fitness of covid-19 sufferers moreover. With the boosting kind of instances it...

IDENTIFY-BASED DYNAMIC DATA AUDITING FOR BIG DATA STORAGE

 Identity-based remote data auditing schemes can verify data integrity and provide a simple identity authentication and management for multiple users. However, prior works on identity-based remote data auditing lack the support of dynamic operations. In these schemes, tag generation is linked to the index of data block, which is related to update op...

Fabric defects detection using convolution neural network and multispectral imaging

 Manual inspection of textiles is a long, tedious, and costly method. Technology has solved this problem by developing automatic systems for textile inspection. However, Jacquard fabrics present a challenge because patterns can be complex and seemingly random to systems. Only a few in-depth studies have been conducted on jacquard fabrics despite the...

EAD-NET A NOVEL LESION SEGMENTATION METHOD IN DIABETIC RETINOPATHY USING NEURAL NETWORKS

 Diabetic retinopathy (DR) is a common chronic fundus disease, which has four different kinds of microvessel structure and microvascular lesions: microaneurysms (MAs), hemorrhages (HEs), hard exudates, and soft exudates. Accurate detection and counting of them are a basic but important work. The manual annotation of these lesions is a labor-intensiv...

DATA ANALYSIS OF CONSUMER COMPLAINTS IN BANKING INDUSTRY USING K-MEANS CLUSTERING AND SENTIMENTAL ANALYSIS

 This paper specialise in exploring and analyzing Consumer Finance Complaints data, to seek out what percentage similar complaints are there in reference to an equivalent bank or service or product. These datasets fall into the complaints of Credit reporting, Mortgage, Debt Collection, personal loan and Banking Accounting. By using data processing t...

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security

 Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continui...

BIKE RIDE SAFETY MANAGEMENT SYSTEM

 Motorcycle accidents have been rapidly growing through the years in many countries. In India more than 37 million people use two wheelers. Therefore, it is necessary to develop a system for automatic detection of helmet and triples wearing for road safety. Therefore, a custom object detection model is created using a Machine learning based algorith...

Automated Hazardous Gas Detecting Robot using WSN with GSM-SMS Alert and Fire Control System for Households

  Over the past decades, fire cannot be prevented in our homes and society. Hence, the author came up with an idea to create a robot that will serve as first responder to fire and hazardous chemicals. Problems were identified and objectives were formulated as guides in the establishment “Automated Hazardous Gas Detecting Robot using Wireless Sens...

ATTRACT RANK: DISTRICT ATTRACTION RANKING ANALYSIS BASED ON TAXI BIG DATA

 The city’s district attraction ranking plays an essential role in the city’s government because it can be used to reveal the city’s district attraction and thus help government make decisions for urban planning in terms of the smart city. The traditional methods for urban planning mainly rely on the district’s GDP, employment rate, population densi...

AN ACTIVE-ROUTING AUTHENTICATION SCHEME IN MANET

 Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing a...

ABANDONED OBJECT DETECTION VIA TEMPORAL CONSISTENCY MODELING AND BACK TRACING VERIFICATION FOR VISUAL SURVEILLANCE THROUGH IOT

 This paper presents an effective approach for detecting abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classified as a 2-bit code. Subsequently, we introduce a framework to identify static foreground regions based on the temporal transi...

Require Crime Predictive model/tool for hotspot mapping

 Hotspot mapping is a popular analytical technique that is used to help identify where to target police and crime reduction resources. In essence, hotspot mapping is used as a basic form of crime prediction, relying on retrospective data to identify the areas of high concentrations of crime and where policing and other crime reduction resources shou...

Develop an System to identity transgression though sensors & electronics devices, Camera etc

 Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...

Develop an IT enabled framework mechanism through which a person can give tip-off about any suspicious activity crime to the authorities

 Although information systems and technology (IS/IT) investments have always caused varying degrees of business change, the main purpose of many of today's IS/IT implementations is to change the business and/or organization in some significant way. However, most organizations' approaches to managing IS/IT developments have changed little in the last...

Creating Application for Mobile Phones

 Currently, the development of mobile applications heavily relies on using conventional computers as development platform. MobiDev enables people in emerging countries without access to a computer but to a cell phone to develop their own locally relevant applications. The goal of the MobiDev project is to simplify development and deployment of appli...

Transfer of Multimedia data through Police Radio Sets

 This article deals with multimedia data, which combines basic functions with high quality graphics, sound, video and animation and definitions of multimedia. Also deals with multimedia characteristics, network technology – Ethernet, Provisioning and ATM, bandwidth needs and multimedia networking along with data transfers protocols. Right issues for...

System would Identification of System Generated, Spoof Calls landing at Dial 100 Control Room

 Caller ID (caller identification) is a service provided by telephone carriers to transmit the phone number and/or the name of a caller to a callee. Today, most people trust the caller ID information, and it is increasingly used to authenticate customers (e.g., by banks or credit card companies). However, with the proliferation of smartphones and Vo...

Speech to text conversion for local ethnic languages of MP like Malavi, Bagheli etc

 In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an in...

Speech Emotion Recognition (SER) on live calls while creating events

 This paper investigates the applicability of machine-driven Speech Emotion Recognition (SER) towards the augmentation of theatrical performances and interactions (e.g. controlling stage color /light, stimulating active audience engagement, actors’ interactive training, etc.). For the needs of the classification experiments, the Acted Emotional Spee...

Detection of Criminal Activities/Criminal through CCTV by analysing live footage for melee, mob formation, body language of suspect etc

 In this paper, we describe a surveillance program which is to be designed that can automatically detect the gestures or signs of aggression and brutality on real time. A single CCTV human operator can handle very limited set of operations, so as the number of CCTV camera increases the need of the human intervention also increases which can also cau...

Predictive analytic solutions using AI

 This conceptual paper exclusively focused on how artificial intelligence (AI) serves as a means to identify a target audience. Focusing on the marketing context, a structured discussion of how AI can identify the target customers precisely despite their different behaviors was presented in this paper. The applications of AI in customer targeting an...

Creation of G.I.S. Layers through GPS Data of Dial 100 Vehicles

 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...

Vehicle number recognition by using existing general surveillance cameras

 Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from th...

Tracing IP Address behind VPN/Proxy Servers

 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...

Drone Neutralisation Technique in city crowded areas to neutralise drones without hampering other radio signals or other equipment in a certain range

 Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...

Develop a Smart Attendance Capturing Mobile App

 Student’s attendance tracking is a vital issue in order to monitor students’ performance in the classroom as well as in their studies. It becomes a key concern because the university authority maintains a rule that one student can only attend in the exam if his/her attendance is higher or equal to several percentages (60%,70% or 80% etc.) otherwise...

Big Data Searching

 Due to Increase in the amount of data in the field of genomics, meteorology, biology, environmental research and many others, it has become difficult to find, analyse patterns, associations within such large data. Interesting association is to be found in the large data sets to draw the pattern and for knowledge purpose. The benefit of analysing th...

COLLEGE BUS MANAGEMENT SYSTEM

 Bus provides eco-friendly, cheap, convenient, time-effective means of transportation. Bus lack regularization and management, due to which they increased the burden on public transportation system. Unusual and unexpected conditions on the roads affect the smooth operation of the bus system and the movement of vehicles. Problems faced by passengers ...

Tracing IP address and details of unidentified participants while academic sessions

 Distance Learning has been steadily gaining popularity. More and more universities and colleges are offering online course to increase enrollments. However, one question remains for those who teach online courses: who is doing the real course work? In this paper we will survey the commonly used methods to prevent e-Cheating, look at a few e-Proctor...

Software toolset for storage browsing and permission based access to geospatial data using blockchain

 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...

Network Traffic Analyzer

 Networking, which is one of the most significant aspects of information technology revolution, is developing increasingly day after day. This is because it offers a huge amount of knowledge, resources and human experiences. On the one hand, it contains a considerable amount of harmful content, because of misusing. On the other hand, sitting for a l...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com