Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time. There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
 Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
 Background: Dual use precursor chemicals are substances that have legitimate industrial and commercial applications but can also be used in the illicit manufacture of drugs. For e.g. Opium is converted to Heroin using Acetic Anhydride and manufacturing of Methamphetamine is done using Ephedrine or Pseudoephedrine. Precursor chemicals are essentia...
 Background : Digital evidence has become increasingly crucial in forensic investigations. The recovery of deleted data from storage devices is essential for reconstructing timelines, identifying suspects, and uncovering critical information. Traditional file systems like FAT and NTFS have been extensively studied, and tools for recovering deleted d...
 Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure. Description: The a...
 Background: NCIIPC shares detail of cyber incidents to corresponding stakeholders in order to inform them about cyber activities related to their IT/OT infrastructure. This empowers them to take necessary actions to mitigate further risk. Description: In order to achieve objective of protecting Critical Information Infrastructure (CIIs) of the Na...
 Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase “Positive”, “Negative” or “Neutral”. It analyzes the data and labels the ‘better’ and ‘worse’ sentiment as...
 The purpose of Online Food Ordering System is to automate the existing manual system by the help of computerized equipment’s and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same. The required software and hardwa...
 The covid-19 pandemic intensified the deployment of technology in Nigeria, particularly in the realm of public service delivery in Nigeria. While this has brought series of benefits, there are equally some factors undermining the utilisation of the full potential of new technologies. This study focused on the effects of the deployment of technolo...
 The recent technological advancement in digital computers has provided a more robust computer based operations in modern industrial society, including manufacturing, transport and distribution, government, the military, health services, education and research. This impact of modern digital computers as an irreplaceable tool for technological grow...
 Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions. Modernization will have both beneficial and negative effects. ...
 The PDF to Audio Converter project provides an alternative was to access the PDF books for blind, lazy, readers and others. Using this PDF to Audio Converter the user will be able to listen to his\her favorite PDF and can do their daily routine. The application can be used to read any PDF which has page numbers. The following application can be...
 Computerized lecture reminder is a tool that permites academic students and lectures to know like due dates and locations. Lecture reminder has turned to be a very important tool in the time management and it is a common saying in the time management that it is better to keep track of things using a system rather than your memory. A computerized...
 this project is to design a Web-based distance learning system, where instructors and students can participate fully in distance learning activities while geographically separated from each other. This project is aimed to design and implement a distance learning system and use internet as the delivery mode.  This report discusses in detail backgr...
 ABSTRACT This paper deals a detailed study, control and energy management of a solar vehicle Multisource Power Supply. A PVG is used as the principal energy source and the batteries are used as secondary/storage source. The use of this last source can reduce strongly the power stress imposed on the primary source. The power sources (PVG- battery) ...
 The air quality in cities is degrading as a result of a complex interaction between natural and artificial environmental conditions. With the increase in urbanization and industrialization and lack of control on emissions and use of catalytic converters, a great amount of particulate and toxic gases are produced. The objective of this project i...
 Smart Hybrid Electric Vehicles (S-HEV) provide large potential to save fuel consumption and reduce pollutant emission. An S-HEV is a vehicle driven by more than one power source, and usually refers to a combination of internal combustion engine (ICE) and electric motor (EM). ...
 The Online Task Management System is designed from day to day working of department of a college. The project provides online platform to accomplish day to day department level task and provide information of the task to specified user. Admin can assign task, give notification and adds different users in this project. Important benefit of this pr...
 The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification. For student identification, a fingerprint recog...
 Online auction is a business model where the items are sold through price bidding. Bidding have the start price and ending time. Potential buyers in the auction and the winner is the one who bids the item for highest price within the stipulated time. For buying product online user must provide his personal details like email address, contact numb...
  As artificial intelligence (AI) develops quickly, Python has become the de facto fully object-oriented programming language. Python'ssimplicity, language variety, and vast library ecosystem make it a valuable tool for image processing . This research study examines Python's role in image processing in detail, outlining its benefits, drawbacks, a...
 Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions. Modernization will have both beneficial and negative effects. ...
 Cloud computing technology will bring to banks such advantages as cost savings, enhanced data processing capacity and improved quality of financial services. To further promote the application of cloud computing in the banking industry, the first and foremost task is to solve the security problem. Judging from the commercial banks, cloud computin...
 Aim of this project was to develop a real estate web application using Microsoft ASP .NET and SQL 2008. The real estate system Give the functionality for buyers, allowing them to search for houses by features or address. It provides functionality for the seller, authorize them to log into the system and add new advertisements or delete existing o...
 This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed ...
 The target of this project "HOSPITAL MANAGEMENT SYSTEM" is to digitise the hospital's front office management and produce software that is user-friendly, fast, and cost-effective. It is related with the gathering of patient information, patient tests, and so on. Before, it was done by hand. The system's principal job is to register and maintain...
 Accurately classifying brain tumor types is critical for timely diagnosis and potentially saving lives. Magnetic Resonance Imaging (MRI) is a widely used non-invasive method for obtaining high-contrast grayscale brain images, primarily for tumor diagnosis. The application of Convolutional Neural Networks (CNNs) in deep learning has revolutioniz...
 Online transactions have become a significant and crucial aspect of our lives in recent years. It's critical for credit card firms to be able to spot fraudulent credit card transactions so that customers aren't charged for things they didn't buy. The number of fraudulent transactions is rapidly increasing as the frequency of transactions increa...
 OCR is used to identify the character from human written text. To recognize the text segmentation of character is important stage. So here, we addressed different techniques to recognize the character. This document also presents comparison of different languages for character and numeral recognition with its accuracy achieved by different writer...
 Over the past few years, mobile news applications have become an extremely hyped thing for mobile users from all over the world. And, it is no wonder to learn that with the passage of time, their popularity and demand continue to enhance. The project , the “News Feed Application for Android” is a cutting edge and versatile mobile news application...
 Mobile wallets have emerged as the most significant contributor in pushing cashless and electronic payments. The surge of smartphones and internet connectivity of 4G and 5G is reflected in the robust growth of Mobile-wallets in India. Numerous digital wallet providers have risen. Technological advancement has made everything possible under one to...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
 As we are approaching modernity, the trend of paying online is increasing tremendously. It is very beneficial for the buyer to pay online as it saves time, and solves the problem of free money. Also, we do not need to carry cash with us. But we all know that Good thing are accompanied by bad things.  The online payment method leads to frau...
 Brain tumor detection is a critical application in the field of medical imaging, aimed at aiding healthcare professionals in the early and accurate diagnosis of brain tumors. This project leverages machine learning and deep learning techniques in Python to developa robust and reliable brain tumor detection system. The system undergoes sensitivi...
 Building a quantum analog of classical deep neural networks represents a fundamental challenge in quantum computing. A key issue is how to address the inherent non-linearity of classical deep learning, a problem in the quantum domain due to the fact that the composition of an arbitrary number of quantum gates, consisting of a series of sequenti...
 Fake news, deceptive information, and conspiracy theories are part of our everyday life. It is really hard to distinguish between false and valid information. As contemporary people receive the majority of information from electronic publications, in many cases fake information can seriously harm people’s health or economic status. This article...
 This is a panel paper which discusses the use of Artificial Intelligence (AI) techniques to address production level problems in semiconductor manufacturing. We have gathered a group of expert semiconductor researchers and practitioners from around the world who have applied AI techniques to semiconductor problems and the paper provides their a...
 Cerebrovascular diseases such as stroke are among the most common causes of death and disability worldwide and are preventable and treatable. Early detection of strokes and their rapid intervention play an important role in reducing the burden of disease and improving clinical outcomes. In recent years, machine learning methods have attracte...
 In India, there are continuously more criminal cases filed, which results in an increase in the number of cases still outstanding. These ongoing increases in criminal cases make them challenging to categorise and resolve. Therefore, it's crucial to identify a location's patterns of criminal activity in order to stop it from happening in order to ...
 In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients’ data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data. In this article, we explore the possibili...
 In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients’ data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data. In this article, we explore the possibili...
 The Railway Reservation System (RRS) is a comprehensive software solution designed to facilitate the booking of train tickets for passengers. With the ever-growing demand for rail travel, an efficient and user-friendly reservation system becomes indispensable for both passengers and railway authorities. The RRS aims to streamline the ticket boo...
 In the ever-changing landscape of digital services and government initiatives, our project embarks on a mission to empower citizens with a revolutionary chatbot known as SchemeSetu. This intelligent chatbot serves as a central information hub, consolidating crucial details on governmentsponsored loans and insurance schemes from various sources....
 The Flight Reservation System (FRS) is a comprehensive software solution designed to facilitate the booking of Flight tickets for passengers. With the ever-growing demand for Flight travel, an efficient and user-friendly reservation system becomes indispensable for both passengers and Flight authorities. The FRS aims to streamline the tic...
 In the ever-changing landscape of digital services and government initiatives, our project embarks on a mission to empower citizens with a revolutionary chatbot known as SchemeSetu. This intelligent chatbot serves as a central information hub, consolidating crucial details on governmentsponsored loans and insurance schemes from various sources....
 Nowadays, digital images are a main source of shared information in social media. Meanwhile, malicious software can forge such images for fake information. So, it’s crucial to identify these forgeries. This problem was tackled in the literature by various digital image forgery detection techniques. But most of these techniques are tied to detec...
 Bus Pass Management System it is the web application that will manage all the records of pass which is issue by bus administrative. Bus Pass Management System which is a automatic system which delivering data processing in a very high speed in the systematic manner. This system helps bus administrative to keep records of bus passes. Before this...
 Aim of this project is to develop a mechanical system for cleaning domestic cylindrical water tank. The mechanical system includes simple mechanism with centrifugal force.The principal involved in this mechanism is left hand fleming rule, were a simple electric energy is converted into rotational energy. The motor shaft is connected to a long v...
 The aim of this project is to remind individuals who forget to take their medicines on time. Elderly people because of their age typically forget about to take their drugs. This project will support to remind the patient to take his/her medicinal drug at prescribed time. The proposed system is best suited for elderly persons and those w...
 Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an a...
  As an emerging form of enabling technology, Web-based e-Health portals provide patients easier accesses to their healthcare information and services. We design and implement such an e-Health portal which can integrate many backend medical services effectively. A major challenge in designing such a system is to meet critical security requirement...
 The need for efficient fire detection systems is highlighted by the substantial threats that forest fires pose to both human lives and the ecosystem. Limited coverage, high false alarm rates, and delays in signal transmission are just a few of the problems traditional methods for detecting forest fires sometimes encounter. This research stu...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
 The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
 The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 The increasing numbers of the private car cause the road traffic congestion. That is becoming important problems in the big cities. Another solution to reduce the traffic jam is developing intelligent transportation system such as intelligent traffic light system. However, the solution of such problems is one of the mandatory concern. In recent yea...
 In India, Liquified Petroleum Gas Cylinder is used as the primary source for cooking. The level of Liquified Petroleum Gas (LPG) Cylinder decreases gradually on daily usage. Upon complete utilization of the LPG Cylinder, a new cylinder can be availed by booking with LPG vendors which may take up to two to three days. Users have no provision to view...
 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...
 Offloading computation-intensive tasks (e.g., blockchain consensus processes and data processing tasks) to the edge/cloud is a promising solution for blockchain-empowered mobile edge computing. However, the traditional offloading approaches (e.g., auction-based and game-theory approaches) fail to adjust the policy according to the changing environ...
 In this modern world, computer becomes more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our daily life. Computerized systems can be used for scheduling the jobs, update the stock details, for complex calculations, and also used for preparing bills to customers. Here we devel...
 Iris tumors, so called intraocular tumors are kind of tumors that start in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris tumor detection system since the available techniques used currently are still not efficient. The combination of the image processing different techniques ...
  One of the alarming threats to mankind and other living organisms is environmental pollution. Worldwide, textile industry is one of the main air and water pollutants. Its environmental effect is critical because it consumes considerable water for processing and discharges major polluted water. If the quality of those discharged water exceeds th...
 Building Energy Management System (BEMS) has been a substantial topic nowadays due to its importance in reducing energy wastage. However, the performance of one of BEMS applications which is energy consumption prediction has been stagnant due to problems such as low prediction accuracy. Thus, this research aims to address the problems by developing...
 Deep learning (DL) has proved successful in medical imaging and, in the wake of the recent COVID-19 pandemic, some works have started to investigate DL-based solutions for the assisted diagnosis of lung diseases. While existing works focus on CT scans, this paper studies the application of DL techniques for the analysis of lung ultra sonography (LU...
 Offloading computation-intensive tasks (e.g., block chain agreement cycles and information handling undertakings) to the edge/cloud is a promising answer for block chain-enabled versatile edge figuring. Nonetheless, the conventional offloading approaches (e.g., sell off based and game-hypothesis draws near) neglect to change the strategy as per the...
 Existing liquefied petroleum gas (LPG) detection systems are ad hoc and designed as stand-alone nodes. This article, however, presents an integrated end-to-end wireless sensor network (WSN) system that integrates hardware and software for early warning gas leakage detection and monitoring applications, fully utilizing the Internet of Things (IoT) f...
 Since stroke disease often causes death or serious disability, active primary prevention and early detection of prognostic symptoms are very important. Stroke diseases can be divided into ischemic stroke and hemorrhagic stroke, and they should be minimized by emergency treatment such as thrombolytic or coagulant administration by type. First, it is...
 Ports form a vital link in the global maritime supply chain, and adherence to the UN sustainable goals in each port development and operation is all-important. Improving the sustainability performance of port infrastructure requires identifying all relevant aspects of sustainability, defining suitable performance measures, applying tools for quanti...
 This study reviews the scientific literature for business models contributing to sustainable plastic management and suggests avenues for future research. We define sustainable plastic management (SPM) as any technique along the waste hierarchy seeking to minimize the environmental damage of plastic material. Limited cases were found during the lite...
 Finance for micro, small, and medium-sized enterprises (MSMEs) has been a concern for all stakeholders including entrepreneurs, financial institutions, and government organizations. The key objective of the study was to identify various challenges faced by MSMEs in sourcing of finance during different stages of their life cycle. This study is a fir...
 Food wastage and its accumulation are becoming a critical problem around the globe due to continuous increase of the world population. The exponential growth in food waste is imposing serious threats to our society like environmental pollution, health risk, and scarcity of dumping land. There is an urgent need to take appropriate measures to reduce...
 Eventually a day's a consequence of a general temperature alteration and atmosphere changes there are attempting conditions in field of coal mine. To decrease the cost and improve the productivity close by thing quality the atomization in the field of coal mine is irrefutably essential, which will in addition reduce the mine laborers endeavors. Thi...
 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...
 The Rural Banking introduced in villages to give good and better services to the people for the development of their agriculture sector or to help for their small-scale business. The banking sector in India has witnessed a complete transformation both in its functioning and delivery of services to their customers.The banking services in rural areas...
 Road lane detection systems play a crucial role in the context of Advanced Driver Assistance Systems (ADASs) and autonomous driving. Such systems can lessen road accidents and increase driving safety by alerting the driver in risky traffic situations. Additionally, the detection of ego lanes with their left and right boundaries along with the recog...
 Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
 This paper covers the design and implementation of an intelligent traffic management system for an isolated intersection. The vehicular traffic management system employs Field Programmable Gate Array (FPGA) as the central decision-making unit and combines its speed and high number of I/O with other system components such as the ESP8266 Wi-Fi module...
 Diabetic retinopathy (DR) is a common chronic fundus disease, which has four different kinds of microvessel structure and microvascular lesions: microaneurysms (MAs), hemorrhages (HEs), hard exudates, and soft exudates. Accurate detection and counting of them are a basic but important work. The manual annotation of these lesions is a labor-intensiv...
 Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continui...
  Over the past decades, fire cannot be prevented in our homes and society. Hence, the author came up with an idea to create a robot that will serve as first responder to fire and hazardous chemicals. Problems were identified and objectives were formulated as guides in the establishment “Automated Hazardous Gas Detecting Robot using Wireless Sens...
 Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing a...
 Hotspot mapping is a popular analytical technique that is used to help identify where to target police and crime reduction resources. In essence, hotspot mapping is used as a basic form of crime prediction, relying on retrospective data to identify the areas of high concentrations of crime and where policing and other crime reduction resources shou...
 Although information systems and technology (IS/IT) investments have always caused varying degrees of business change, the main purpose of many of today's IS/IT implementations is to change the business and/or organization in some significant way. However, most organizations' approaches to managing IS/IT developments have changed little in the last...
 In this paper, we describe a surveillance program which is to be designed that can automatically detect the gestures or signs of aggression and brutality on real time. A single CCTV human operator can handle very limited set of operations, so as the number of CCTV camera increases the need of the human intervention also increases which can also cau...
 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...
 Due to Increase in the amount of data in the field of genomics, meteorology, biology, environmental research and many others, it has become difficult to find, analyse patterns, associations within such large data. Interesting association is to be found in the large data sets to draw the pattern and for knowledge purpose. The benefit of analysing th...
 Bus provides eco-friendly, cheap, convenient, time-effective means of transportation. Bus lack regularization and management, due to which they increased the burden on public transportation system. Unusual and unexpected conditions on the roads affect the smooth operation of the bus system and the movement of vehicles. Problems faced by passengers ...
 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...
 The agriculture sector faces many challenges such as crop diseases, pest infestation, water shortage, weeds and many more. These problems lead to substantial crop loss, economic loss and also causes severe environmental hazards due to the current agriculture practices. The AI and Robotics technologies have the potential to solve these problems effi...
 This study has been undertaken to develop Sustainable Waste Water treatment. Most of the river basins in India and elsewhere are closing or closed and experiencing moderate to severe water shortages, brought on by the simultaneous effects of agricultural growth, industrialization and urbanization. Current and future fresh water demand could be met ...
 India is the world’s largest producer and consumer of milk and has the world’s largest dairy herd, comprised of water buffalo and indigenous and crossbred cattle. Annual growth in milk production and consumption has been a robust 4.2 percent since 2000, and India has also emerged as a small net exporter of dairy products. Water buffalo and crossbre...
 In this paper we are proposing an adaptive and real-time approach to resolve real-time fnancial data integration latency problems and semantic heterogeneity. Due to constraints that we have faced in some projects that requires real-time massive fnancial data integration and analysis, we decided to follow a new approach by combining a hybrid fnancia...
 Attendance management is the act of managing attendance or presence in a work setting, which maximizes and motivates employee attendance thereby minimizing loss. Not only does it affect productivity, it can cost the company profits or even additional contracts. For the industrial sector attendance management system can develop alacrity among the wo...
 A wide range of relatively short-term disruptive events such as partial flooding, visibility reductions, traction hazards due to weather, and pavement deterioration occur on transportation networks on a daily basis. Despite being relatively minor when compared to catastrophes, these events still have profound impacts on traffic flow. To date there ...
 The price volatility and scarcity have been became a great problem in the distribution system of seasonal staple food produced by agro industry. It has salient supply disparity during the harvest and planting season. This condition could cause disadvantages to the stakeholders such as producer, wholesaler, consumer, and government. This paper propo...
 There is a need for automatic systems that can reliably detect, track and classify fish and other marine species in underwater videos without human intervention. Conventional computer vision techniques do not perform well in underwater conditions where the background is complex and the shape and textural features of fish are subtle. Data-driven cla...
 Image sensors are increasingly being used in biodiversity monitoring, with each study generating many thousands or millions of pictures. Efficiently identifying the species captured by each image is a critical challenge for the advancement of this field. Here, we present an automated species identification method for wildlife pictures captured by r...
 This paper presents the design and implementation of Modular Multilevel Inverter (MMI) to control the Induction Motor (IM) drive using intelligent techniques towards marine water pumping applications. The proposed inverter is of eleven levels and has the ability to control the speed of an IM drive which is fed from solar photovoltaics. It is estima...
 This paper presents the development and implementation of " bank locker security system basedon RFID and GSM technology" which can be organized in bank, secured offices and homes.In this system only authenticperson can be recovered money from bank locker. We have im plemented a bank locker security system based on RFID and GSM technology containing...
 This paper proposes an improved three-stages cascading passivity-based control (PBC) for a grid -connected LCL converter in unbalanced weak grid condition. In general, the traditional double-loop control based on positive and negative sequence transformations is used in grid-connected converter control in unbalanced weak grid condition. However, it...
 This work addresses the problem of instability occurring in the voltage control mode of a non-minimum phase Quasi Resonant High Gain, High-Efficiency Single Ended Primary Inductor Converter -based DC-DC converter with continuous input current. To solve this instability issue in the presence of uncertainties and the external disturbances, quantitati...
 Due to the channel achieving property, the polar code has become one of the most favorable error-correcting codes. As the polar code achieves the property asymptotically, however, it should be long enough to have a good error-correcting performance. Although the previous fully parallel encoder is intuitive and easy to implement, it is not suitable ...
 Protection and authentication of digital multimedia content during transmission has become very important with the ongoing development in communication and networking field. Aiming at this popular research topic of recent time, this paper presents a comparative analysis of different watermarking techniques performed in MATLAB. It also presents a ro...
 As the circuit complexity increases, the number of internal nodes increases proportionally, and individual internal nodes are less accessible due to the limited number of available I/O pins. To address the problem, we proposed power line communications (PLCs) at the IC level, specifically the dual use of power pins and power distribution networks f...
 In this paper, we describe a new approach to reduce dynamic power, leakage, and area of application-specified integrated circuits, without sacrificing performance. The approach is based on a design of threshold logic gates (TLGs) and their seamless integration with conventional standard-cell design flow. We first describe a new robust, standard-cel...
 Field-programmable gate arrays (FPGAs) are increasingly used as the computing platform for fast and energyefficient execution of recognition, mining, and search applications. Approximate computing is one promising method for achieving energy efficiency. Compared with most prior works on approximate computing, which target approximate processors and...
 Single error correction (SEC) codes are widely used to protect data stored in memories and registers. In some applications, such as networking, a few control bits are added to the data to facilitate their processing. For example, flags to mark the start or the end of a packet are widely used. Therefore, it is important to have SEC codes that protec...
 This paper presents the design of a fully integrated electrocardiogram (ECG) signal processor (ESP) for the prediction of ventricular arrhythmia using a unique set of ECG features and a naive Bayes classifier. Real-time and adaptive techniques for the detection and the delineation of the P-QRS-T waves were investigated to extract the fiducial point...
 This paper presents a fixed-point reconfigurable parallel VLSI hardware architecture for real-time Electrical Capacitance Tomography (ECT). It is modular and consists of a front-end module which performs precise capacitance measurements in a time multiplexed manner using Capacitance to Digital Converter (CDC) technique. Another FPGA module performs...
 Content-addressable memory (CAM) is the hardware for parallel lookup/search. The parallel search scheme promises a high-speed search operation but at the cost of high power consumption. Parallel NOR- and NAND-type matchline (ML) CAMs are suitable for high-search-speed and low-power-consumption applications, respectively. The NOR-type ML CAM require...
 Continuous transistor scaling, coupled with the growing demand for low-voltage, low-power applications, increases the susceptibility of VLSI circuits to soft-errors, especially when exposed to extreme environmental conditions, such as those encountered by space applications. The most vulnerable of these circuits are memory arrays that cover large a...
 Ultralow-power subthreshold logic circuits are becoming prominent in embedded applications with limited energy budgets. Minimum energy consumption of digital logic circuits can be obtained by operating in the subthreshold regime. However, in this regime process variations can result in up to an order of magnitude variations in ION/IOFF ratios leadi...
 This paper presents a robust energy/area-efficient receiver fabricated in a 28-nm CMOS process. The receiver consists of eight data lanes plus one forwarded-clock lane supporting the hypertransport standard for high-density chip-to-chip links. The proposed all-digital clock and data recovery (ADCDR) circuit, which is well suited for today’s CMOS pr...
 In this brief, based on upset physical mechanism together with reasonable transistor size, a robust 10T memory cell is first proposed to enhance the reliability level in aerospace radiation environment, while keeping the main advantages of small area, low power, and high stability. Using Taiwan Semiconductor Manufacturing Company 65-nm CMOS commerc...
 Large integer multiplication has been widely used in fully homomorphic encryption (FHE). Implementing feasible large integer multiplication hardware is thus critical for accelerating the FHE evaluation process. In this paper, a novel and efficient operand reduction scheme is proposed to reduce the area requirement of radix-r butterfly units. We als...
 In this paper, a novel radiation-hardened 14-transistor SRAM bitcell with speed and power optimized [radiation-hardened with speed and power optimized (RSP)-14T] for space application is proposed. By circuit- and layout-level optimization design in a 65-nm CMOS technology, the 3-D TCAD mixed-mode simulation results show that the novel structure is ...
 As the device dimension is shrinking day by day the conventional transistor based CMOS technology encounters serious hindrances due to the physical barriers of the technology such as ultra-thin gate oxides, short channel effects, leakage currents & excessive power dissipation at nano scale regimes. Quantum Dot Cellular Automata is an alternate chal...
 A low-complexity analog technique to suppress the local oscillator (LO) harmonics in software-defined radios is presented. Accurate mathematical analyses show that an effective attenuation of the LO harmonics is achieved by modulating the transconductance of the low-noise transconductance amplifier (LNTA) with a raised-cosine signal. This modulatio...
  This paper aims to develop a tool for predicting accurate and timely traffic flow Information. Traffic Environment involves everything that can affect the traffic flowing on the road, whether it’s traffic signals, accidents, rallies, even repairing of roads that can cause a jam. If we have prior information which is very near approximate about a...
 Modern cars are incorporating an increasing number of driver assist features, among which automatic lane keeping. The latter allows the car to properly position itself within the road lanes, which is also crucial for any subsequent lane departure or trajectory planning decision in fully autonomous cars. Traditional lane detection methods rely on a ...
  In recent times, with the increase of Artificial Neural Network (ANN), deep learning has brought a dramatic twist in the field of machine learning by making it more artificially intelligent. Deep learning is remarkably used in vast ranges of fields because of its diverse range of applications such as surveillance, health, medicine, sports, robo...
 Subsequent to the introduction of Bit coin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these crypto currencies. With a perceived real world value these wallets are a target for attackers. Unlike mainstream financial services applications, cryptocurrency wallet...
 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...
  The elementary concept of a multilevel converter is to achieve high power by using a series of a power semiconductor switches with lower voltage D.C source. The output voltage waveform of a multi-level inverter is composed of the number of levels of voltages, typically obtained from capacitor voltage sources. In this paper, single phase diode cl...
 Network embedding assigns nodes in a network to low dimensional representations and effectively preserves the network structure. Recently, a significant amount of progresses have been made toward this emerging network analysis paradigm. In this survey, we focus on categorizing and then reviewing the current development on network embedding methods,...
 A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
  In this paper, we design a home outlet and a LED array lamp controlled by hand gesture recognition with a smart phone that has a system composed of two parts: a smart phone's application and a wireless remote control unit (WRCU). The application can read the accelerometer and gyroscope in a smart phone by means of hand gesture recognition and s...
 This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is p...
 Active safety is an important feature of a modern vehicle to provide precaution warning or compensatory control before the pre-crash stage of vehicle safety. All vehicle signals and information are acquired by several in-vehicle sensors on ECUs or surrounding vehicles, and integrated in vehicle gateway throu...
 This paper gives the design and implementation of embedded voice controlled system using ARM cortex A7 for visually impaired and physically challenged people. ARM cortex A7 has features such as low power consuming than its predecessor and based on ARM v7 architecture, also it is a quad core processor. The system uses Google’s speech ...
 In the present day scenario all the members of family are busy with their work and are not getting proper time to clean the house. The cleaning robot helps to clean and mop the floor. This is done by simply pressing a switch and the robot does the work. This also cuts down the labor used in factories for cleaning floor. Above being the case, motiva...
 One of the alarming threats to mankind and other living organisms is environmental pollution. Worldwide, textile industry is one of the main air and water pollutants. Its environmental effect is critical because it consumes considerable water for processing and discharges major polluted water. If the quality of those discharged water exceeds the pr...
 Microgrids are emerging as an important constituent of large-scale smart grids. They are equipped with the controls necessary for managing the operation in islanded or grid connected mode and serve the loads with clean, reliable, and uninterruptible power. Microgrid must be equipped with a robust grid synchronization (GS) algorithm so as to allow a...
 Gathering information from distribution transformers is very important in order to monitor and control the entire electric distribution grid efficiently and reliably. It acts as a decision support system to assist the grid operation engineers with information helps to estimate the load, fix problems and identify the week points in the grid. The obj...
 Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. As security is becoming the primary concern of society and hence having a security system is becoming a big requirement. Video surveillance plays a vital role in securi...
 This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedure commences with initiating a call from the cell phone which is auto received by GSM module stacked in the vehicle. In the course of a call, if any of the k...
 In recent times, role of women in all industries have increased. Simultaneously, crime against women is also increasing day by day and this is the high time to provide safety for all working women. This paper focuses on women tracking system for all working women. There is no powerful existing system to prevent the crime rates against women. This s...
 Imbalance in the nervous system causes Epilepsy disease which may lead to death. The most common symptoms of epilepsy disease are sudden fluctuations in heart beat rate and involuntary muscular movements (seizures).The wireless electronic diagnosing system used here is meant for epilepsy patients only. Occurrence of seizures predicated by this syst...
 The concept of a Smart City highlights the need to enhance quality, interconnection and performance of various urban services with the use of information and communication technologies (ICT). Smart City technologies promote cloud-based and Internet of Things (IoT) based services in which real-world user interfaces use smart phones, sensors and RFID...
 Robust and reliable detection of falls is crucial especially for elderly activity monitoring systems. In this letter, we present a fall detection system using wearable devices, e.g., smartphones, and tablets, equipped with cameras and accelerometers. Since the portable device is worn by the subject, monitoring is not limited to confined areas, and ...
 Recently, the frequent coal mine safety accidents have caused serious casualties and huge economic losses. It is urgent for the global mining industry to increase operational efficiency and improve overall mining safety. This paper proposes a lightweight mashup middleware to achieve remote monitoring and control automation of underground physical s...
 In this paper, the design of a new upper limb rehabilitation system is presented. The developed system is an exoskeleton with two degrees of freedom that can be used for diagnosis, physical therapy, and outcome evaluation. The system is dedicated to the patients with paraplegia of their upper extremities due to stroke or any disorders of the centra...
 Many devices and solutions for remote ECG monitoring have been proposed in the literature. These solutions typically have a large marginal cost per added sensor and are not seamlessly integrated with other smart home solutions. Here we propose an ECG remote monitoring system that is dedicated to non-technical users in need of long-term health monit...
 Time is of the essence when ambulances are utilized to save people’s lives, but when an ambulance needs to pass through a junction, its speed often must be reduced due to traffic. This complicates situations when the patient in the ambulance needs urgent treatment that can be administered only at a hospital. Due to the una...
 This study focuses on investigation of learning style preferences of business students who enrolled in two different set of course modules; descriptive and mathematical. This study is crosssectional research depends on primary data gathered from a business student who studies in a state university in Saudi Arabia. The purposive sampling methods use...
 Information Communication Technology (ICI) has played a major role in the day to day running of companies, organizations and institutions and general life. Through the use of information technology these companies are able to perform daily activities efficiently and accurately. The bakery sector too has benefited from this advancement in informatio...
 This paper deals with the design of Internet billing system, in which it is possible pay invoices electronically. This approach is implemented via virtual banks, in which the process of money transfer can be implemented. In other hand many applications can be realize such as; deposit e-money, withdrawal e-money and determine account balance. A Gate...
 These methods of paying fees have not been efficient enough especially during periods of tests and examinations when most of the students are paying fees to meet the requirements for entering examination rooms. The process of paying fees is characterized by long queues, too much waiting by students and congestion at banks where payments are made. T...
 Modern tax administrations seek to optimize tax collections while minimizing administration costs and taxpayer compliance costs. Experience shows that voluntary compliance is best achieved through a system of self-assessment. Many tax administrations have introduced self-assessment principles in the income tax law but the legal authority is not bei...
 In modern days, people are getting too busy in their works but still they need to spend time in shopping malls. In Shopping malls, customers face a difficulty to follow a queue for the process of billing, which takes a long time under huge crowd. Customer thought that, to avoid the standing time in the billing section at shopping malls. To overcome...
 Smart card data is increasingly used to investigate passenger behavior and the demand characteristics of public transport. The destination estimation of public transport is one of the major concerns for the implementation of smart card data. In recent years, numerous studies concerning destination estimation have been carried out—most automatic far...
 Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the da...
 This paper proposes a model Online Cashless Payment System which is based on Finger print in Aadhaar Card. Unique mark installment framework is utilized for different sorts of instalment framework as opposed to conveying cards and to remember the each card passwords and pin numbers. Todays current big issue in e-payment system is providing security...
 In this paper, we propose a real-time bus alert system which provides information about the bus arrived at the bus station travels to the desired destination of the blind or not. A blind unit is given to the blind person, in which keys are used for giving input for a destination. A bus unit is attached to the bus in which a unique RF-Id is encoded ...
 In recent years, the prospect of the Vehicle market is worrisome. The development of automotive aftermarket business has become the core of 4s stores. And the spare parts in stock are the key part of the aftermarket. Therefore, it is very important for the development of the aftermarket to make a good classification of spare parts. Aiming at the pr...
 Vehicle tracking system is a well-established technology in this era which is used by fleet system and owner of vehicle all over the world. It is a very safe and reliable technology. In our thesis we are going to design a system which is used for tracking and positioning of any vehicle by using Global Positioning System [GPS] and Global System for ...
 In many application areas mobile robots need the ability to interact with people. In order to be able to communicate with even untrained users, the interaction should be as natural as possible. One of the preconditions of a natural interaction is that the robot focuses the person it is interacting with. In this paper we present a technique that com...
 With the advancement of information and communication technology, life is getting simpler in all aspects. The rapid increase in the number of users on the internet over the past decade has made the internet as a part of human life. Home Automation using the Internet of Things (IoT) is a system that uses a smartphone device or pc to control basic ho...
 This paper presents an e-Tendering model developed for the public construction contract in Saudi Arabia to improve its efficiency. The research addresses the dilemma of traditional tendering and recommends the use of practical tools in order to improve the efficiency of the process. The demand from governments and the construction industry for pape...
 The information and intelligent requirement of modern residence is improving with the development of computer and property management. It is becoming the key problem for property companies how to implement the intelligent property information management. In this paper, we present a framework of property management information system based-on E-busi...
 With the growth of virtual organisations and multinational companies, virtual collaboration tasks are becoming more important for employees because the cost of business travels remains high. In this paper, a proposal is presented to create a virtual meeting system that can use artificial intelligent components to support participants and help to pr...
 The project deals with the I-Factor followed for an IT firm and also with the profit and process management followed for a firm. The Software companies will be in need of the hardware resources from the different client and the problem faced by the company is they will be unable to get the complete requirements of the hardware as due to finance to ...
  The paper deals with the newest ìkiller applicationî ñ professional service automation (PSA). The solution concept is explained, and the existing and potential users are identified as well as the benefits realized by users. Next the situation on the market is analyzed, main existing solutions are categorized and strength and weaknesses of the m...
 Invoicing and billing application for different business purposes helps mainly the service providers and freelancers to manage, send professional invoices online, and track its status. Generally, all the small companies in Saudi Arabia facing a various issues for managing and tracking the invoice status of customers, which mostly back to the lacks ...
 RFID is a radio frequency based technology which is used to transmit data wirelessly. The combination of RFID and IP provides accuracy to the system. Our proposed system manages all the student activities like attendance and library management system. Although there are many other biometric techniques but modality of face is the unique characterist...
 Online Bus pass generation is useful for students who are facing problems with the current manual work of bus pass registration and renewal. The students need to register by submitting their details through online. After registration an OTP code will be send to student’s mail. The administrator will verify the student details and if they are satisf...
 Customer relationship management (CRM) has the potential for achieving success and growth for organizations in the nowadays environment of extensive competition and rapid technological development. CRM enables organizations to know their customers better and to build sustainable relationships with them. However, CRM is considered as buzzword and it...
 Many retail stores, as well as other organizations that employ a multitude of part-time employees, rely on developing schedules frequently, since the availabilities of the employees as well as the needs of the business change often. This process is often performed on a weekly basis, and is complex and time-consuming. The schedule must typically sat...
 Today, the number of technological devices such as computers, cell phones, tablets etc. has increased and their usage has become widespread. As a result of frequent use of these technologies depending on situation, these devices have developed even further and became a part of our lives. Development of Internet infrastructure and increase of its us...
 Digital advertising, on internet and mobile gadgets, has outpaced the traditional media advertising and for the first time in 2013 generated more advertising spending than television advertising. Digital advertising is believed to be an effective way to better target potential customers in the global market. Evidence shows that businesses have incr...
 A model of vehicle maintenance system, realized trough simulation modeling is presented in this article. The model covers all routine activities related to movement, maintenance and regulations. Activities are done by a certain number of specialists. The result of the model is obtaining information about the workload of the specialists, queuing tim...
 As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the component...
 With the rapid development of Internet, e-commerce had been widely using by more and more people, so had shopping online . The J2EE architecture was adopted in this paper. An florist’s shop online system was designed and implemented based on the analysis of the actual needs of users. Through running test for a period of time, the system could be op...
 Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient. The process of hiding the information in other information without altering is known as Steganography. It is the art of hiding message inside a multimedia block. Attacks, misuse or ...
 Effectiveness of electronic inventory system is very vital on customer service delivery. Without effectiveness, the customers will judge businesses harshly. The study evaluated the extent to which electronic inventory systems are used by supermarkets in Kenya. It also sought to determine the level to which lead-time variability resulting from the u...
 As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the component...
 Igniting a passion for reading and research is core business for school libraries, inevitably placing the library at the centre of the twenty-first century reading and learning experience. Teacher librarians, librarians and library teams in Australian and New Zealand schools are responding to the learning needs within the school community with a fo...
 The manual system of preparing time table in colleges is very time consuming and tedious task which usually ends up with various classes clashing either at identical room or with same teachers having more than one class at a time. Due to manual approach, proper use of resources is neither effective nor efficient. To overcome all these problems we p...
 This project develops a Departmental Store Management System (DSMS) is commonly found today at most retail store registers. Store merchandise, identified by a price code is checked out by a cashier who then accepts payment for the item(s). A DSMS is either read by a bar code scanner or manually entered by the cashier. At the completion of a sale, a...
 To succeed in today’s fast and competitive markets, organizations must find new and effective ways to open revenue streams, improve enterprise efficiency and foster profitable long-term growth. Many of the world’s leading business organizations are achieving those core objectives by focusing intently on the quality and lifetime value of their custo...
 The Main Objective of this System is to plan a framework to keep up impressive data of the workers, offices, Customer points of interest for any BPO association. Call Center Executer is an undeniably vital ability as the utilization of call focuses turns into a well-known technique for concentrating data administrations, streamlining request taking...
 Employee Retention is the biggest challenge that Human Resource Management is facing today'. The uncertainty ofa changing economy, increasing competition and diversity in the workplace have compelled the organisations to hold on to their top performers at whatever cost they have to pay. It is a very difficult taskfor the recruiters to hire professi...
 The project is mainly aimed at providing a secured and user friendly Online Voting System. The problem of voting is still critical in terms of safety and security. This system deals with the design and development of a webbased voting system using fingerprint and aadhaar card in order to provide a high performance with high security to the voting s...
 Most monetary transactions on the world have a tendency to be electronic, in light of the fact that it gives effectiveness, security, precision and unwavering quality.in Sudan staffs at the ticket counter are using the manual system to sell tickets and manage the bus seat booking. Travelling companies spends a substantial cost to manage the reserva...
 Automation plays an important role in 21st century. The principal point of this project is to structure a framework which is prepared to do consequently deducting the measure of the petrol dispensed from user card dependent on RFID innovation and send the data of transaction of petrol and the sum to the proprietor through the Internet of Things (Io...
 With many potential practical applications, content-based image retrieval (CBIR) has attracted substantial attention during the past few years. Hence the authors implemented an advanced image pattern searching algorithm. In the proposed system, the images are searched based on the image patterns such as pixels, resolution, height and width of the i...
 The paper makes an attempt to analyse women’s participation in entrepreneurial activities so as to highlight the contribution of women entrepreneurs towards economic development. In the process it further attempts to examine the facilitating factors as well as impediments that this class face in running their units. Policies and programmes of the g...
 The source of major and trace elements has been studied in the Arno river catchments, with repeated sampling of stream sediments in 73 stations within the basin. The study was performed for the inventory, survey, assessment and monitoring of metal pollution, and for geochemical mapping of the most representative elements. Chemical data displayed a ...
 Using a qualitative research method we studied the case of Linnaeus University. The purpose of this research was to study how Linnaeus University is using their corporate identity in their communication against students and employers. After analyzing the results of our empirical study and reflecting on the theoretical framework we concluded that Li...
 The purpose of this review is to review what came in some studies and articles that talk about the topic of employment and selection during the time period between 2010 and 2020 in order to study the modalities that are carried out in these two tasks in various organizations. The review provided an explanation of both tasks, taking into account wha...
 Using a novel approach with video-recordings of sales interactions, this study focuses on a dynamic analysis of salesperson effectiveness in handling customer queries. We conceptualize salesperson behaviors, namely, resolving, relating, and emoting, as separate elements of customer query handling and empirically identify the distinct verbal and non...
 The task includes Android Application Development of a GPS based understudy Location Tracker in which with the assistance of any cell phone; some other GPS empowered handset could be found. In spite of the fact that target client might be found anyplace in inside the school foundation, he should have arranged availability and be GPS empowered. In p...
 The web application “Expense Tracker” is developed to manage the daily expenses in a more efficient and manageable way. By using this application we can reduce the manual calculations of the daily expenses and keep track of the expenditure. In this application, user can provide his income to calculate his total expenses per day and these results wi...
 Multilevel Marketing is a very popular business model in the Western countries. It is a kind of hybrid of the method of distribution of goods and the method of building a sales network. It is one of the safest (Carries a very low risk) ways of conducting a business activity. The knowledge about functioning of this Business model, both among theoret...
 In today’s age, education is the most important way of achieving success. When we discuss education, it is imperative to mention tests and examination. Examinations prepare students in their quest for knowledge. So, having a proper examination paper and format is quite necessary. Now the traditional method of generating question paper has been manu...
 Project failure is largely due to poor planning and monitoring. Many people consider event management to be a wedding planner or concert, but the field of event management involves more than that. Event management is the process of using business management and organizational skills to imagine, plan, and carry out social and business events. Many c...
 A billing system can be very useful within a business environment. Instead of making bills manually or to sum up the total manually, it is very much time consuming and also may have some human errors like adding up the wrong total or adding wrong items into the bill. When making a hand written bill the owner and customer both have to repeatedly che...
 Electronic Shop Management software helps Electronic showrooms owners and management staff by producing different kind of financial and stock tracking reports, etc. This software is able to manage all electronic stocks. In this software shop owner can manage the data of customer and buyers. Also tax information and other government charges includin...
 Sales enterprise in management appears fragmented and incoherent customer information make enterprise management or relevant personnel cannot view all of the data and related information, customer information that results could not keep consistent and complete, use the computer to car sales information management, has the crafts incomparable advant...
 Inventory constitutes a major component of working capital. To a large extent, the success and failure of a business depends upon its inventory management performance. The basic objective of inventory management is to optimize the size of inventory in a firm so that smooth performance of production and sales function may be possible at minimum cost...
 In the last few years, we have experienced a global economic crisis, but also a crisis in the social world and in the sports world. During the past decade, sports management directed an institution focused on competitive sports, and characterized by ignorance of the educational level of the staff, limited training and lack of continuing education f...
 This report in the title "Optical Shop Manager" which is a shop management system to manage optical shop business and it is implemented with inventory management. There are modules in this system, which are login, master inventory management, transaction management, staff management, and financial management. The problem statement of this thesis ar...
 Nowadays people don’t have much time to spend in canteen by just there and waiting for the waiter to take their order. Many customer visits the canteen in their lunch break and recess so they have limited time to eat and return to their respective office and colleges. So this software helps them to save time and order food whenever they want withou...
 In this modern world everyting depends on technology. Without technology we can not do anything. Student Information is one of the important things of our School, Collage, & University life. Everybody purchases some thing. But our life is very busy. So we do not have enough time to total Information of a Student. So the Student Information system w...
 Speedy and efficient information processing is crucial to our socially and highly developed technology. Computer can help the intolerable burden of handling the ever increasing amount or information with government department, public services and business concerns expected to contain because of their ability to analyze information as well as to r...
 The online tourism industry is growing at a fast pace in India. The traditional forms of tourism are being replaced by new form e-tourism. The internet has offered with easy and costeffective solution to people who go for online travel bookings. E-service tourism companies need to understand the customer requirement and meet their expectations by e...
 As an emerging product-service system (PSS) and part of a growing sharing economy, rental services of casual clothing for women are becoming increasingly common in many countries around the world. Rental services of casual and formal wear have the potential to reduce the life cycle environmental impact compared to the conventional ownership model o...
 Accurate measurement of household food purchase behavior (HFPB) is important for understanding its association with household characteristics, individual dietary intake and neighborhood food retail outlets. However, little research has been done to develop measures of HFPB. The main objective of this paper is to describe the development of a measur...
  To investigate call centre management from the perspective of the managers, particularly what the key management responsibilities are in managing call centres and the key performance indicators (KPIs) used in managing call centres. A survey of call centre managers, followed by in-depth interviews. There is confusion over the strategic intent of ...
 With the tremendous growth of the Internet and the expansion of the World Wide Web, more and more information is being put on the Internet. The Internet creates a global marketplace that breaks the barrier of time, place and distance, within which conducts Electronic Commerce. E-Comrnerce is a system that includes not only those transactions that c...
 This paper introduces a video copy detection system which efficiently matches individual frames and then verifies their spatio-temporal consistency. The approach for matching frames relies on a recent local feature indexing method, which is at the same time robust to significant video transformations and efficient in terms of memory usage and compu...
 Supermarkets, specialized wholesalers, processors, and agro-exporters are transforming the marketing channels into which smallholder farmers sell produce in low-income economies. We develop a conceptual framework with which to study contracting between smallholders and a commodity-processing firm. We then synthesize results from empirical studies o...
 This system is a combination of web as well as android application where the driver will be using the android application whereas admin and parent will be using web application. This application is meant for drivers who is driving the school bus. System allows admin to add a new driver where driver id and password is generated and stored into the s...
 E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all organizations as a communication tool between managers, employees, customers, and partners for better in...
 This paper presents a proper solution for a medium enterprise or public institution that enables easier management of the digital documents library and eases the common document workflows. The main problem addressed by the proposed project is the complexity of document workflows in public administration. Documents that need to be filled out and sig...
 Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, web based project management systems enter a critical role in a multitude of companies. Thus, a proper project management system plays a distinctive part in ensuring reliable, robus...
  The elementary concept of a multilevel converter is to achieve high power by using a series of a power semiconductor switches with lower voltage D.C source. The output voltage waveform of a multi-level inverter is composed of the number of levels of voltages, typically obtained from capacitor voltage sources. In this paper, single phase diode cl...
 A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
 Student Information Management System can be used by education institutes to maintain the records of students easily. Achieving this objective is difficult using a manual system as the information is scattered, can be redundant and collecting relevant information may be very time consuming. All these problems are solved using this project....
 Pharmacy management system is one of the most essential tools that are mostly used in medical store in Tanzania; it is mostly used to manage pharmacy related activities such as medical inventory, record keeping, sales management as well as managing the drug stock and information of the expired medicines. Many pharmacies in Tanzania are still operat...
 Jewellery shops sells various types of Jewellery items and it is very difficult to categorize these items on the basis of their manufacturing dates, type of gold used to manufacture it such as either using 24K or 22K. Which items comes under the category of ISI Gold Mark and which items are of local brand. It is also very difficult to analyze the o...
 To obtain information and knowledge of SNF (Solid not fat), feeding and milking management. System also included the management practices among the dairy farms at various state levels from District to Taluka level for maintaining daily records as well as effective payment system through digital transactions. This system recurring to information of ...
 There have been many applications oriented around controlling and tracing the lifecycle of project, tasks, and requirements. In the beginning of this work, the author provides an introduction into the problematic of the above-mentioned tracing, mentioning also software development methods and how they relate to this theme. In the second part of the...
 As an emerging form of enabling technology, Web-based e-Health portals provide patients easier accesses to their healthcare information and services. We design and implement such an e-Health portal which can integrate many backend medical services effectively. A major challenge in designing such a system is to meet critical security requirements, s...
 Sales management is a key function which helps small and medium size enterprises (SMEs) in monitoring and tracking stock and co-ordinating transaction processing. The efficiency of sales management dependends on effective tools and facilities, especially mordern information and communication technologies. Despite this, majority of businesses in dev...
  The Java Application World application world soft- ware is totally user oriented and only users access the software programs. The user can use multiple applications that re made with the help of java. In the J Appsor the Java application world, the user can use calculator, word count tool, ip finder etc java run software. Any particular IDE can...
 This paper deals with development of inventory management system for a manufacturing Industry. The developed software System is easy to use, less time consuming & all detail about the inventory items & transaction status. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The repor...
 This research reports the experiences of both adopters and non-adopters of transportation management system (TMS) technology. TMS adopters represent a diverse array of companies, with a surprisingly high percentage of adopters using outsourced services for decision support activities. Motives for adoption tend to align with the firm’s strategic nee...
 This paper describes the importance of ERP in manufacturing industries and examines the various articles published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The report is about windows based application. The main idea of this pap...
 Wireless Networks are susceptible for a variety of malicious attacks because they use shared transmission medium. The transmission of information may be jammed by an attacker by introducing malicious packets into the network. These jammers create a lot of noise in the total network and create problems at both the ends of transmission and affect the...
 Network intruders may spoof IP packets by modifying headers of the IP packets to fool people believe that the transmissions are originating from the trusted source. Consequently, various defence mechanisms have been developed to identify and prevent IP spoofing attack. However, the existing prevention mechanisms are implemented on either destinatio...
 The purpose of this paper is to analyze and implement incremental updates of data lineage storage in the software tool Manta Flow. The basis of this work is the study of current data lineage storage in Manta Flow, research of existing solutions of incremental updates in version control systems, research of incremental backups in databases, analysis...
 That organizes and manages the drug use process in pharmacies by storing data and enabling functionality. The Pharmacy System Project no only helps organizes the Medicines Management, It also secures and does the fundamental processes in any pharmacy. To understand more of its proposal and modules, you can have its fundamental diagrams and PDF docu...
 The purpose of this project is to develop an on-line banking system that provides customers with the facility to check their accounts and do transactions on-line. The system will provide all the banks facilities to its customers when their authentications [user id and password] match, including viewing account information, performing transfers, giv...
 The integration of multi-access edge computing (MEC) and RAFT consensus makes it feasible to deploy blockchain on trustful base stations and gateways to provide efficient and tamper-proof edge data services for Internet of Things (IoT) applications. However, reducing the latency of storing data on blockchain remains a challenge, especially when an ...
 This work conceives the robust linear transceivers for the estimation of an unknown vector parameter in a coherent multiple access channel (MAC)-based multiple-input multiple-output (MIMO) multi-sensor network under imperfect channel state information (CSI) at the fusion center (FC). Both the popular stochastic (S-) and norm ball CSI uncertainty (N...
 A novel carrier sense multiple access strategy with collision avoidance (CSMA/CA) balancing contention probability and channel access time is proposed. The approach can be applied to any context where the computational simplicity of the MAC must be preferred to the complexity of the channel access strategy. Our MAC, called Delay-Collision CSMA (DC-...
 In this paper, a multiple cluster-based transmission diversity scheme is proposed for asynchronous joint transmissions (JT) in private networks. The use of multiple clusters or small cells is adopted to reduce the transmission distance to users thereby increasing data-rates and reducing latency. To further increase the spectral efficiency and achie...
 This article presented a single-phase shaded-pole induction motor (SPIM) system, which aims to work in an isolated environment. Compared with the previous wireless SPIM, this system employs less controlled switches and can work at full-resonant condition, while retaining the merit of secondary controllerless. The key is to employ a half-bridge inve...
 An optimal precoder design is conceived for the decentralized estimation of an unknown spatially as well as temporally correlated parameter vector in a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) based wireless sensor network (WSN). Furthermore, exploiting the temporal correlation present in the parameter...
 Telecommunication service providers have to guarantee acceptable speech quality during a phone call to avoid a negative impact on the users' quality of experience. Currently, there are different speech quality assessment methods. ITU-T Recommendation G.107 describes the E-model algorithm, which is a computational model developed for network plannin...
 Energy supplies, spectrum resources, and transmission overheads of wireless nodes are the bottlenecks in decentralized networks (e.g., device-to-device communication networks). In this paper, we study the total power minimization problem of secondary users (SUs) for a multiuser simultaneous wireless information and power transfer-based cognitive ad...
 In this paper, we propose a covert wireless uplink transmission strategy in space-air-ground integrated vehicular networks, where the source vehicle transmits its own message over the channel that being used by the host communication system, to avoid being detected by the warden. It is obvious that the data transmission efficiency of the covert com...
 The real power required for machine equipment depends on the resistance to the movement of it. Even now, in our country 98% of the contemporary machines use the power by burning of fossil fuels to run IC engines or external combustion engines. This evident has led to widespread air, water and noise pollution and most importantly has led to a realis...
 The project work titled “Electro Hydraulic Jack” has been conceived having studied the difficulty in lifting any type of vehicles. Our survey regarding several automobile garages, revealed the facts that mostly some difficult methods were adopted in lifting the vehicles for reconditioning. The project has mainly concentrated on this difficulty. In ...
 The eddy-current is created by the relative motion between a magnet and a metal (or alloy) conductor. The current induces the reverse magnetic field and results in the deceleration of motion. The proposed mechanism implements this phenomenon in developing a braking system. The potential applications of the braking system can be a decelerating syste...
 This paper investigates the performance of a wireless network that consists of two pairs of transmitter-receiver sharing the same channel, modeled using two coupled queues. In this analysis, we use the power metric P , defined as the ratio of throughput and mean delay, to understand the compromise between these two metrics. We show that, when the u...
 This article proposes and evaluates a technique to predict the level of interference in wireless networks. We design a recursive predictor that estimates future interference values by filtering measured interference at a given location. The predictor’s parameterization is done offline by translating the autocorrelation of interference into an autor...
 This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...
 Many Internet of Things smart-* applications are being powered solely through ambient energy-harvested energy. These applications require periodic data collection with low latency and high reliability. Since the energy is harvested in small amounts from ambient sources and is stochastic in nature, it is extremely challenging to achieve low latency ...
 This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distri...
 This paper describes systems, devices, and methods to implement a bi-directional integrated inter-tower wireless communications network (IITWCN). The described technology can be implemented in combination with the Broadcast Core Network (BCN) in next generation broadcast eco-system and, therefore, support new business cases for broadcast operators ...
 The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...
 5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...
 Urban crowd flow prediction is very challenging for public management and planning in smart city applications. Existing work mostly focuses on spatial and temporal dependence based flow prediction that are not well suited for predictions of instantaneous flow change usually due to social emergency incidents and accidents. In this paper, we propose ...
 Passive Gen2 radio frequency identification (RFID) tags work thanks to the utilization of line codes that balance their operation between two opposite states: absorbing RF (for energy harvesting) and reflecting RF (for backscattering/communications). Given the current RF harvesting technology, batteryless tags need to be located very close to an ac...
 Due to resource constraints and working surroundings, many IIoT nodes are easily hacked and turn into zombies from which to launch attacks. It is challenging to detect such networked zombies. We combine federated learning (FL) and fog/edge computing to combat malicious codes. Our protocol trains a global optimized model based on distributed dataset...
 The dual mode technology has been adopted to support smart devices to connect to both the NB-IoT and the LTE simultaneously. How to reduce the power consumption of a smart device with limited battery capacity has been treated as an important issue. In this paper, we propose the Module Switching Mechanism (MSM) that consists of the PS scheme and the...
 Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...
 This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit IoT devices in demand. During the hovering periods, the UAV works on full-duplex mode to simultaneously collect data from the target device and charge other devices within its...
 The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
 Blockchain technology has recently witnessed a rapid proliferation across multiple industries and has the potential to evolve as a popular energy transaction platform for grid operators and general users. The current proof-of-work consensus algorithm used by many blockchain protocols suffer from vulnerabilities such as the majority attacks problem ...
 Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
 For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT program senses some information and sends them via a channel, usually a wireless channel with an RF circuit. These IoT nodes often require a system with networking capabilities and a low-power ha...
 The Industry 4.0 (I4.0) is a paradigm settled down by the introduction of the Internet of things (IoT) into the production and manufacturing environment. I4.0 promotes the connection of physical items such as sensors, devices, and enterprise assets, to each other and to the Internet. The information that flows through these items is vital because i...
 In Industrial Internet of Things (IIoT), a number of mutually untrusted devices with diverse computing resources and application requirements often need to work together to serve industrial production. When applying permissionless blockchain to process transactions among these devices, we are concerned with two types of fairness: mining fairness (i...
 Blockchain is a safe technology for transaction as it keeps the information safe that it is impossible to change, hack or cheat. blockchain is a digital mode of transaction that is spread across the entire network of computer systems in blockchain. IoT devices allows to send information or useful data in the blockchain to the persons that are inter...
 We develop a novel framework for efficiently and effectively discovering crowdsourced services that move in close proximity to a user over a period of time. We introduce a moving crowdsourced service model which is modelled as a moving region. We propose a deep reinforcement learning-based composition approach to select and compose moving IoT servi...
 Attribute-based authentication is considered a cornerstone component to achieve scalable fine-grained access control in the fast growing market of cloud-based services. Unfortunately, it also poses a privacy concern. Users attributes should not be linked to the users identity and spread across different organizations. To tackle this issue, several ...
 Fog computing extends cloud computing capabilities to the edge of the network and reduces high latency and network congestion. This paradigm enables portions of a transaction to be executed at a fog server and other portions at the cloud. Fog servers are generally not as robust as cloud servers; at peak loads, the data that cannot be processed by f...
 In a public blockchain system applying Proof of Work (PoW), the participants need to compete with their computing resources for reward, which is challenging for resource-limited devices. Mobile blockchain is proposed to facilitate the application of blockchain for mobile service, in which the lightweight devices can participate mining by renting re...
 In recent years, with the rapid development of cloud computing industry, big data processing technology is also constantly mature. At the same time, the scale of domestic mobile Internet market continues to expand, with more than 500 million users, bringing huge mobile Internet business data. In this context, the method of large-scale network data ...
 Tubulin is a promising target for designing anti-cancer drugs. Identification of hotspots in multifunctional Tubulin protein provides insights for new drug discovery. Although machine learning techniques have shown significant results in prediction, they fail to identify the hotspots corresponding to a particular biological function. This paper pre...
 Increasingly, the task of detecting and recognizing the actions of a human has been delegated to some form of neural network processing camera or wearable sensor data. Due to the degree to which the camera can be affected by lighting and wearable sensors scantiness, neither one modality can capture the required data to perform the task confidently....
 Feature selection (FS) is an important step in machine learning since it has been shown to improve prediction accuracy while suppressing the curse of dimensionality of high-dimensional data. Neural networks have experienced tremendous success in solving many nonlinear learning problems. Here, we propose a new neural-network-based FS approach that i...
 This article proposes a novel modeling method for the stochastic nonlinear degradation process by using the relevance vector machine (RVM), which can describe the nonlinearity of degradation process more flexibly and accurately. Compared with the existing methods, where degradation processes are modeled as the Wiener process with a nonlinear drift ...
 Multiview fuzzy systems aim to deal with fuzzy modeling in multiview scenarios effectively and to obtain the interpretable model through multiview learning. However, current studies of multiview fuzzy systems still face several challenges, one of which is how to achieve efficient collaboration between multiple views when there are few labeled data....
 With the dramatic increase of dimensions in the data representation, extracting latent low-dimensional features becomes of the utmost importance for efficient classification. Aiming at the problems of weakly discriminating marginal representation and difficulty in revealing the data manifold structure in most of the existing linear discriminant met...
 Detecting small low-contrast targets in the airspace is an essential and challenging task. This article proposes a simple and effective data-driven support vector machine (SVM)-based spatiotemporal feature fusion detection method for small low-contrast targets. We design a novel pixel-level feature, called a spatiotemporal profile, to depict the di...
 In recent years, the appearance of the broad learning system (BLS) is poised to revolutionize conventional artificial intelligence methods. It represents a step toward building more efficient and effective machine-learning methods that can be extended to a broader range of necessary research fields. In this survey, we provide a comprehensive overvi...
 The broad learning system (BLS) has been identified as an important research topic in machine learning. However, the typical BLS suffers from poor robustness for uncertainties because of its characteristic of the deterministic representation. To overcome this problem, a type-2 fuzzy BLS (FBLS) is designed and analyzed in this article. First, a grou...
 Graph-based clustering aims to partition the data according to a similarity graph, which has shown impressive performance on various kinds of tasks. The quality of similarity graph largely determines the clustering results, but it is difficult to produce a high-quality one, especially when data contain noises and outliers. To solve this problem, we...
 By training different models and averaging their predictions, the performance of the machine-learning algorithm can be improved. The performance optimization of multiple models is supposed to generalize further data well. This requires the knowledge transfer of generalization information between models. In this article, a multiple kernel mutual lea...
 This article explores the problem of semisupervised affinity matrix learning, that is, learning an affinity matrix of data samples under the supervision of a small number of pairwise constraints (PCs). By observing that both the matrix encoding PCs, called pairwise constraint matrix (PCM) and the empirically constructed affinity matrix (EAM), expre...
 Predictive analytics has a significant potential to support different decision processes. We aimed to compare various machine learning algorithms for the selected task, which predicts credit card clients' default based on the free available data. We chose Random Forest, AdaBoost, XGBoost, and Gradient Boosting algorithm and applied them to a prepar...
  The popularity of mobile devices has led to an explosive growth in the number of mobile apps in which Android mobile apps are the mainstream. Android mobile apps usually undergo frequent update due to new requirements proposed by users. Just-In-Time (JIT) defect prediction is appropriate for this scenario for quality assurance because it can pr...
 Andriod malware poses a serious threat to users privacy, money, equipment and file integrity. A series of data-driven malware detection methods were proposed. However, there exist two key challenges for these methods: (1) how to learn effective feature representation from raw data; (2) how to reduce the dependence on the prior knowledge or human la...
 Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...
  It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...
 A sharded blockchain with the Proof-of-Stake (PoS) consensus protocol has advantages in increasing throughput and reducing energy consumption, enabling the resource-limited participants to manage transactions and in a decentralized way and obtain rewards at a lower cost, e.g., Internet-of-Things (IoT) users. However, the latest PoS (e.g., Casper) r...
 This work enables mobile user authentication via finger inputs on ubiquitous surfaces leveraging low-cost physical vibration. The system we proposed extends finger-input authentication beyond touch screens to any solid surface for IoT devices (e.g., smart access systems and IoT appliances). Unlike passcode or biometrics-based solutions, it integrat...
 Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load alterin...
 Sensor systems have the potential to make abstract science phenomena concrete for K–12 students. Internet of Things (IoT) sensor systems provide a variety of benefits for modern classrooms, creating the opportunity for global data production, orienting learners to the opportunities and drawbacks of distributed sensor and control systems, and reduci...
 Internet-of-Things (IoT) innovations produce interesting opportunities, impact ethical and social aspects toward human society, and influence operational and technical solutions toward the structural systems. This article discusses the impact of some relevant characteristics of the IoT innovations. Significant debated aspects are the product discon...
 Fog/edge computing has been recently regarded as a promising approach for supporting emerging mission-critical Internet of Things (IoT) applications on capacity and battery constrained devices. By harvesting and collaborating a massive crowd of devices in close proximity for computation, communication and caching resource sharing (i.e., 3C resource...
 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
 The prosperity of Internet of Things (IoT) brings forth the deployment of large-scale sensing systems such as smart cities. The distributed devices upload their local sensing data to the cloud and collaborate to fulfill the large-area tasks such as pollutant diffusion analysis and target tracking. To accomplish the collaboration, time synchronizati...
 Nowadays, adopting blockchain technology to Internet of Things has become a trend and it is important to minimize energy consumption while providing a high quality of service (QoS) in Blockchain-based IoT networks. Pre-caching popular and fresh IoT content avoids activating sensors frequently, thus effectively reducing network energy consumption. H...
 Current Internet of Things (IoT) infrastructures rely on cloud storage however, relying on a single cloud provider puts limitations on the IoT applications and Service Level Agreement (SLA) requirements. Recently, multiple decentralized storage solutions (e.g., based on blockchains) have entered the market with distinct architecture, Quality of Ser...
 In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...
 Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. ...
 This paper presents a distributed and decentralized architecture for the implementation of Distributed Artificial Intelligence (DAI) using hardware platforms provided by the Internet of Things (IoT). A trained DAI system has been implemented over the IoT, where each IoT device acts as one or more of the neurons within the DAI layers. This is accomp...
 With the booming of smart grid, The ubiquitously deployed smart meters constitutes an energy internet of things. This paper develops a novel blockchain-based transactive energy management system for IoT-aided smart homes. We consider a holistic set of options for smart homes to participate in transactive energy. Smart homes can interact with the gr...
 In current Data Science applications, the course of action has derived to adapt the system behavior for the human cognition, resulting in the emerging area of explainable artificial intelligence. Among different classification paradigms, those based on fuzzy rules are suitable solutions to stress the interpretability of the global systems. However,...
 Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to ext...
 Most ground-based remote sensing cloud classification methods focus on learning representation features for cloud images while ignoring the correlations among cloud images. Recently, graph convolutional network (GCN) is applied to provide the correlations for ground-based remote sensing cloud classification, in which the graph convolutional layer a...
 This paper proposes a new 3D multi-object tracker to more robustly track objects that are temporarily missed by detectors. Our tracker can better leverage object features for 3D Multi-Object Tracking (MOT) in point clouds. The proposed tracker is based on a novel data association scheme guided by prediction confidence, and it consists of two key pa...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 This work takes as a starting point a collection of patterns for engineering software for the cloud and tries to find how they are regarded and adopted by professionals. Existing literature assessed the adoption of cloud computing with a focus on business and technological aspects and fall short in grasping a holistic view of the underlying approac...
 This paper proposes a backup resource allocation model that provides a probabilistic protection for primary physical machines in a cloud provider to minimize the required total capacity. When any random failure occurs, workloads are transferred to preplanned and dedicated backup physical machines for prompt recovery. In the proposed model, a probab...
 In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 With increasing of data size and development of multi-core computers, asynchronous parallel stochastic optimization algorithms such as KroMagnon have gained significant attention. In this paper, we propose a new Sparse approximation and asynchronous parallel Stochastic Variance Reduced Gradient (SSVRG) method for sparse and high-dimensional machine...
 Motivation: Identifying differentially expressed genes (DEGs) in transcriptome data is a very important task. However, performances of existing DEG methods vary significantly for data sets measured in different conditions and no single statistical or machine learning model for DEG detection perform consistently well for data sets of different trait...
 Deep learning (DL) based diagnosis models have to be trained by large quantities of monitoring data of machines. However, in real-case scenarios, machines operate under the normal condition in most of their life time while faults seldom happen. Therefore, though massive data are accessible, most are data of the normal condition while fault data are...
 Nowadays transceiver-free (also referred to as device-free) localization using Received Signal Strength (RSS) is a hot topic for researchers due to its widespread applicability. However, RSS is easily affected by the indoor environment, resulting in a dense deployment of reference nodes. Some hybrid systems have already been proposed to help RSS lo...
 In the coming 6G communications, network densification, high throughput, positioning accuracy, energy efficiency, and many other key performance indicator requirements are becoming increasingly strict. In the future, how to improve work efficiency while saving costs is one of the foremost research directions in wireless communications. Being able t...
 The excessive use of nodes and communication links in a wireless control system (WCS) causes unnecessary utilization of resources. In this article, a strategic topological formation is studied for a WCS, where a previously proposed topology consisting of a plant system, a controller system, and an intermediate network system is further developed. M...
 Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...
 Wireless virtualization has emerged as one of the efficient ways to overcome numerous wireless networking challenges such as RF resource sharing. RF spectrum sharing in wireless networks focuses on increasing the usage efficiency of radio frequency (RF) spectrum with its increasing demand. To reduce uncertainties that accompany the spectrum sharing...
 Wireless sensor network (WSN) is composed of many micro sensor nodes, and the localization technology is one of the most important applications of WSN technology. At present, many positioning algorithms have high position-ing accuracy in line-of-sight (LOS) environment, but poor positioning accuracy in non-line-of-sight (NLOS) environ-ment. In this...
 This article presents a new approach to designing the Frobenius norm-based weighted unbiased finite impulse response (FIR) fusion filter for wireless sensor networks. The weighted Frobenius norm is employed as a cost function to design a local unbiased FIR filter. The design problem is converted into a constrained optimization problem subject to an...
 Anomaly detection relies on individuals’ behavior profiling and works by detecting any deviation from the norm. When used for online banking fraud detection, however, it mainly suffers from three disadvantages. First, for an individual, the historical behavior data are often too limited to profile his/her behavior pattern. Second, due to the hetero...
 With the increasing demand of users for personalized social services, social recommendation (SR) has been an important concern in academia. However, current research on SR universally faces two main challenges. On the one hand, SR lacks the considerable ability of robust online data management. On the other hand, SR fails to take the ambiguity of p...
 Rotor position is essential in control of permanent magnet synchronous motors (PMSMs). In terms of resolution, structural complexity, occupied volume, anti- interference ability, environmental adaptability and cost, embedded magnetic encoder based on linear Halls owns strong competitiveness. When linear Hall sensors are selectively installed at sta...
 In this paper, a half-bridge class-D audio amplifier (HB-CDAA) system with embedded bidirectional buck-boost converter is proposed. The proposed HB-CDAA system consists of a front-end symmetric bipolar output converter, a bidirectional buck-boost converter and a HB-CDAA. With the help of the embedded bidirectional buck-boost converter, bus voltage ...
  Feature selection is of great importance to make prediction for process variables in industrial production. An embedded feature selection method, based on relevance vector machines with an approximated marginal likelihood function, is proposed in this study. By setting hierarchical prior distributions over the model weights and the parameters o...
 Recent years have witnessed the unprecedented growth of online social media, resulting in short texts being the prevalent format of information on the Internet. Given the sparsity of data, however, short-text topic modeling remains a critical yet much-watched challenge in both academia and industry. Research has been devoted to building different t...
 Modern mobile OSes support to display Web pages in the native apps, which we call embedded Web pages. In this paper, we conduct, to the best of our knowledge, the first measurement study on browsing embedded Web pages on Android. Our study on 22,521 popular Android apps shows that 57.9% and 73.8% of apps embed Web pages on two popular app markets: ...
 High-speed ADC front-ends in wireline receivers allow for implementing flexible, complex, and robust equalization in the digital domain, as well as easily supporting bandwidth-efficient modulation schemes, such as PAM4 and duobinary. However, the power consumption of these ADC front-ends and subsequent digital signal processing is a major issue. Th...
  As a complex nonlinear system, the power system in operation may experience chaotic oscillation which can threaten the stability of the system for unexpected events and uncertain factors. Initially, through considering factors such as the generators, the power system node voltage amplitude and phase angle, this article establishes a fourth-orde...
 Providing sufficient damping over the full frequency range of low-frequency oscillation (LFO) is a challenge in modern power systems. The flexible excitation system with two damping channels, controlled by the power system stabilizer (PSS) and the reactive power damping controller (RPDC), respectively, provides a new way to solve this problem. The ...
 With continuing advances in high-performance parallel computing platforms, parallel algorithms have become powerful tools for development of faster than real-time power system dynamic simulations. In particular, it has been demonstrated in recent years that parallel-in-time (Parareal) algorithms have the potential to achieve such an ambitious goal....
 Measurement error is a crucial factor that determines the accuracy of state estimation (SE). Conventional estimators have fixed models, and can yield optimal performance only when the measurement error statistics exactly meet the assumptions. In reality, however, the error distribution is usually unknown and time-varying, resulting in suboptimal st...
 This letter studies the impact of auto-correlation of stochastic processes on the dynamic response of power systems. The frequency spectrum of the trajectories of the state variables of the system is utilized as a metric to evaluate this impact. The case study considers the well- known two-area system as well as with a 1479-bus dynamic model of the...
 Due to the energy linkage between electricity and gas networks, assessing the voltage security of the electricity system without considering the practical constraints of both systems, may lead to unrealistic values of loading margins (LM). This work proposes a model for investigating the impact of gas networks on the voltage security of electric tr...
 Maintaining constant power transfer while keeping near-unity transfer efficiency at varying transfer distances is a major challenge for existing wireless power transfer (WPT) system with multiple repeaters. In order to overcome the problem, this article proposes a novel WPT mechanism with multiple repeaters based on the concept of parity-time symme...
 This paper proposes a new decentralized data-driven load res-toration (DDLR) scheme for transmission and distribution (TD) systems with high penetration of wind power. Robust DDLR models are constructed in order to handle uncertainties and ensure the feasibility of decentralized schemes. The Wasserstein metric is used to describe the ambiguity sets...
 Parasitic inductance reduction is increasingly vital for the SiC power module in high-frequency and high-capacity applications. To address the parasitic issue, the automatic layout design offers the potential to pursue the optimal configuration of the power packaging. However, the efficient and accurate parasitic extraction of the packaging is the ...
 Load frequency control (LFC) of modern power systems tends to employ open communication networks to transmit measurement/control signals. Under a limited network bandwidth, the continuous and high-sampling-rate signal transmission will be prone to degradation of the LFC performance through network congestion. This brief proposes a decentralized con...
  The problem of effective use of Phasor Measurement Units (PMUs) to enhance power systems awareness and security is a topic of key interest. The central question to solve is how to use this new measurements to reconstruct the state of the system. In this paper we provide the first solution to the problem of (globally convergent) state estimation...
 Distributed Series Reactances are devices that dynamically increase the impedance of a line to reduce the power ow it carries. This work explores whether widely deploying these devices enhances a power system's robustness against line overload cascading failures. The presence of Distributed Series Reactances may make it less likely that equipped li...
 Phase sequence exchange (PSE) is a recently developed emergency control technology. PSE uses power electronic devices to switch the three-phase sequence, which reduces the power angle of the generator by 120 and prevents the system from losing stability. In this work, the structure of the PSE device is improved. Based on the original nine solid-sta...
 Novel cable traction power supply system (NCTPSS) is a kind of long distance co-phase traction power supply system (TPSS), it can effectively solve problems caused by train's passing through electrical phase separation and improve utilization rate of regenerative energy in system, which is an ideal traction power supply mode. However, its structure...
 In this brief, we develop a novel model to study the cascading failure in cyber-physical power systems. We use a discrete packet traffic model that follows a specific routing strategy to describe the dynamic data transmission in the information network. Moreover, the dynamic load flow model that takes into account the power-frequency characteristic...
 With the increasing integration of renewable energy sources (RESs) and the implementation of dynamic line rating (DLR), the accompanying uncertainties in power systems require intensive management to ensure reliable and secure operational planning. However, while numerous approaches and methods in the literature deal with uncertainties, they have n...
 Resilient distributed coordination control is studied on multiarea power systems with low inertia under hybrid attacks, including denial-of-service (DoS) attack and deception attack. The communication among various areas under the DoS attack is deteriorated to switching residual topologies whose time characteristic is modeled by model-dependent ave...
 Power utility allocates defense resources to prevent unscheduled load shedding due to transmission line failure caused by the malicious physical attacks. Game theory explains the interaction between the defender and the attacker, overcoming the shortage of unilateral vulnerability analysis. Different from previous researches typically assuming the ...
  Fifth harmonic voltages and currents have been measured in some extra high voltage (EHV) power transmission systems. This paper contains a discussion and explanation of this phenomenon. The emphasis is on the impact of overexcitation of power transformers in EHV systems. Examples of measurements taken in 500 kV substations are illustrated and r...
  Linearization of power flow is an important topic in power system analysis. The computational burden can be greatly reduced under the linear power flow (LPF) model while the model error is the main concern. Therefore, various linear power flow models have been proposed in literature and dedicated to seek better linear models. Many linear power ...
 With the wide application of distributed energy technology in active distribution networks (ADNs), virtual power plants (VPPs) are introduced as a promising integration and management technology. To coordinate their operation schedule and ensure confidentiality, we establish a coordinated optimal power flow (OPF) model and propose an efficient dece...
 The wireless power transfer (WPT) system based on parity-time (PT) symmetry has been proved to be a promising WPT system due to its characteristics of constant efficiency and output power. However, the PT-symmetric range is limited, and it is necessary to widen the PT-symmetric region to extend the distance of constant and efficient transmission. T...
 This brief investigates the problems of stability and stabilization of the fractional-order power system with time delay. The models of the fractional-order nonlinear and linearized delayed power system are established, respectively. Based on the theory of the fractional calculus and the Lyapunov functional technique, the relevant stability criteri...
 Grid integration of solar photovoltaic (PV) systems has been escalating in recent years, with two main motivations: reducing greenhouse gas emission and minimizing energy cost. However, the intermittent nature of solar PV generated power can significantly affect the grid voltage stability. Therefore, intermittent solar PV power generation and uncer...
 With the increasing integration of PV generation in AC microgrids, it is challenging to keep the stability of system frequency due to the intermittent and stochastic nature of PVs. Thus, in order to reduce the investment and maintenance costs of storage systems, the electric utility has shown increasing interest in calling on PVs to provide frequen...
  Power quality is an important concern for practical microgrid (MG) applications due to the widespread use of non-linear loads, and it is characterised by the implicit trade-off between voltage quality in the MG nodes and harmonic current sharing between distributed generators (DGs). Active and passive filters can be used to address this problem...
 This paper presents improved indices to evaluate the contribution of reactive power compensators at HVdc converter terminals. The presence of such compensators impacts converter performance, such as the maximum available power (MAP) limit, susceptance to commutation failure, fault recovery time and temporary over voltage. Traditionally, the Effecti...
 This letter investigates parallelism approaches for equation and Jacobian evaluations in power flow calculation. Two levels of parallelism are proposed and analyzed: inter-model parallelism, which evaluates models in parallel, and intra-model parallelism, which evaluates calculations within each model in parallel. Parallelism techniques such as mul...
  Inverter Based Generators (IBGs) have been increasing significantly in power systems. Due to the demanding thermal rating of Power Electronics (PE), their contribution to the system Short Circuit Current (SCC) is much less than that from the conventional Synchronous Generators (SGs) thus reducing the system strength and posing challenges to sys...
  The state estimation algorithm estimates the values of the state variables based on the measurement model described as the system of equations. Prior to applying the state estimation algorithm, the existence and uniqueness of the solution of the underlying system of equations is determined through the observability analysis. If a unique solutio...
  With the introduction of massive renewable energy sources and storage devices, the traditional process of grid operation must be improved in order to be safe, reliable, fast responsive and cost efficient, and in this regard power flow solvers are indispensable. In this paper, we introduce an Interior Point-based (IP) Multi-Period AC Optimal Pow...
 The conservation voltage reduction (CVR) and load modelling have acquired a renewed interest in reassessing the CVR capabilities and load model parameters for renewablerich distribution networks. The underlying theoretical views behind the changes in load model parameters and subsequent CVR capabilities in the distribution networks caused by the hi...
 The diode bridge rectifier fed asymmetric halfbridge converter (AHBC) is conventionally employed to drive switched reluctance motors (SRMs), which leads to poor grid-side power quality. In the proposed system, a topology made up of a voltage-sourced converter (VSC) and an AHBC is employed to drive the high-speed SRM. Stable SRM operation can be obt...
  Voltage and current waveforms contain the most authentic and granular information on the behaviors of power systems. In recent years, it has become possible to synchronize waveform data measured from different locations. Thus largescale coordinated analyses of multiple waveforms over a wide area are within our reach. This development could unle...
  Large blackouts in power grids are often the consequence of uncontrolled failure cascades. The ability to predict the failure cascade process in an efficient and accurate manner is important for power system contingency analysis. In this paper, we propose to apply the influence model for the prediction and screening of failure cascades in large...
  Large blackouts in power grids are often the consequence of uncontrolled failure cascades. The ability to predict the failure cascade process in an efficient and accurate manner is important for power system contingency analysis. In this paper, we propose to apply the influence model for the prediction and screening of failure cascades in large...
 Recently, several convex relaxations have been successfully applied to solve the AC optimal power flow (OPF) problem, which has caught the attention of the research community. Among these relaxations, a relaxation based on semidefinite programming (SDP) stands out. Accordingly, in this work a methodology to solve the optimal reactive power dispatch...
 This paper proposes a data-driven chanceconstrained optimal gas-power flow (OGPF) calculation method without any prior assumption on the distribution of uncertainties of wind power generation. The Gaussian mixture model is employed to fit the uncertainty distribution, where the Bayesian nonparametric Dirichlet process is adopted to tune the compone...
  This paper presents an optimal transient-stability control strategy that modulates the real power injected and absorbed by distributed energy-storage devices. These devices are located at the high-voltage bus of several generators in a synchronous power system. The system is broken into areas based upon groupings of generators. The control stra...
 This paper presents and in-depth analysis of AllElectric-Aircraft (AEA) architectures. The aim of this work is to provide a global vision of the current AEA state of art, to estimate main technological gaps and drivers and to identify the most promising architecture configuration for future electrical aircraft in the context of a twin propeller 20 ...
  Accurate and fast event identification in power systems is critical for taking timely controls to avoid instability. In this paper, a synchrophasor measurementbased fast and robust event identification method is proposed considering different penetration levels of renewable energy. A difference Teager-Kaiser energy operator (dTKEO)-based algori...
  Time delays are inevitable in the power systems with wide-area control signals, which may compromise the control performance and thus jeopardize the stability of the power systems. To analyze the impacts of system parameters on critical oscillation modes of a time-delayed power system (TDPS), a new method for eigenvalue trajectory tracking of TD...
 The paper presents accurate and simple dynamic model of a supercapacitor bank system for power system dynamics studies. The proposed model is derived from a detailed RC circuit representation. Furthermore, a complete control system of the supercapacitor bank is also presented. The proposed model is easy to integrate in any power system simulation s...
  This paper proposes to utilize intentional time delays as part of controllers to improve the damping of electromechanical oscillations of power systems. Through stability theory, the control parameter settings for which these delays in Power System Stabilizers (PSSs) improve the small signal stability of a power system are systematically identi...
  Band selection is an effective means to alleviate the curse of dimensionality in hyperspectral data. Many methods select a compact and low redundant band subset, which is inadequate as it may degrade the classification performance. Instead, more emphasis shall be put on selecting representative bands. In this paper, we propose a robust unsuperv...
 The AI chips increasingly focus on implementing neural computing at low power and cost. The intelligent sensing, automation, and edge computing applications have been the market drivers for AI chips. Increasingly, the generalisation, performance, robustness, and scalability of the AI chip solutions are compared with human-like intelligence abilitie...
  The human brain is the gold standard of adaptive learning. It not only can learn and benefit from experience, but also can adapt to new situations. In contrast, deep neural networks only learn one sophisticated but fixed mapping from inputs to outputs. This limits their applicability to more dynamic situations, where the input to output mapping...
  Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to...
 Extreme learning machine (ELM) is suitable for nonlinear soft sensor development. Yet it faces an over-fitting problem. To overcome it, this work integrates bound optimization theory with Variational Bayesian (VB) inference to derive novel L1 norm-based ELMs. An L1 term is attached to the squared sum cost of prediction errors to formulate an object...
 We investigate the performance of multi-user multiple-antenna downlink systems in which a base station (BS) serves multiple users via a shared wireless medium. In order to fully exploit the spatial diversity while minimizing the passive energy consumed by radio frequency (RF) components, the BS is equipped with M RF chains and N antennas, where M <...
 Wide-area protection scheme (WAPS) provides system-wide protection by detecting and mitigating small and large-scale disturbances that are difficult to resolve using local protection schemes. As this protection scheme is evolving from a substation-based distributed remedial action scheme (DRAS) to the control center-based centralized RAS (CRAS), it...
 Machine learning is widely used in developing computer-aided diagnosis (CAD) schemes of medical images. However, CAD usually computes large number of image features from the targeted regions, which creates a challenge of how to identify a small and optimal feature vector to build robust machine learning models. In this study, we investigate feasibi...
  Continuous monitoring of anaesthetics infusion is demanded by anaesthesiologists to help in defining personalized dose, hence reducing risks and side effects. We propose the first piece of technology tailored explicitly to close the loop between anaesthesiologist and patient with continuous drug monitoring. Direct detection of drugs is achieved...
 An efficient multilayer machine learning-assisted optimization (ML-MLAO)-based robust design method is proposed for antenna and array applications. Machine learning methods are introduced into multiple layers of the robust design process, including worst-case analysis (WCA), maximum input tolerance hypervolume (MITH) searching, and robust optimizat...
 The communication-based train control (CBTC) system is a typical cyber physical system in urban rail transit.The train-ground communication system is a very important subsystem of the CBTC system and uses the wireless communication protocols to transmit control commands.However, it faces some potential information security risks.To ensure informati...
  Automated Machine Learning (AutoML) systems have been shown to efficiently build good models for new datasets. However, it is often not clear how well they can adapt when the data evolves over time. The main goal of this study is to understand the effect of concept drift on the performance of AutoML methods, and which adaptation strategies can ...
 Stochastic unit commitment is an efficient method for grid operation in the presence of significant uncertainties.An example is an operation during a predicted hurricane with uncertain line out-ages.However, the solution quality comes at the cost of substantial computational burden, which makes its adoption challenging.This paper evaluates some pos...
 In this paper, we show the remarkable timing error (TE) and residual chromatic dispersion (CD) tolerance improvements of the filter bank multicarrier (FBMC) over orthogonal frequency division multiplexing (OFDM) for high-baudrate spectral slicing transmitter and single coherent receiver transmissions. For a 512 Gb/s 16 quadrature amplitude modulate...
 Social Media has quickly gained prominence as it provides people with the opportunity to communicate and share posts and topics. Tremendous value lies in automated analysing and reasoning about such data in order to derive meaningful insights, which carries potential opportunities for businesses, users, and consumers. Many events in the world are a...
 Safety plays a major role in today’s world and it is necessary that good safety systems are to be implemented in places of education and work. This work modifies the existing safety model installed in industries and this system also be used in homes and offices. The main objective of the work is designing microcontroller based toxic gas detecting a...
 Using various sensors like the accelerometer, GPS module, 3 Axis gyroscope, compass and an ultrasonic range finder, the primary guidance and navigation functions of the UAV can be automated. Additional stabilization controls should be programmed into the Raspberry Pi which is serving as the heart of the System which will provide additional security...
 Vehicle anti-theft monitoring and controlling system especially useful for mining appliances inreal-time has been reported in this paper. The system principally monitors vehicle moving and tracking appliances such as position, and speed and subsequent detection. The novelty of this system is the implementation of vehicles internal and external par...
 In this busy world, everyone using different kind of vehicle in day to day life, but they are forgetting to service their vehicle at certain time. So the lifetime of the vehicle gets reduced and lots of fire accidents are occurred each and every day. This project concept is mainly focused on preventing fire during accident in vehicle and reminding ...
 Grass cutter machines have become very popular today. Most of the times grass cutter machines are used for soft grass furnishing. In a time where technology is merging with environmental awareness, consumers are looking for ways to contribute to the relief of their own carbon footprints. Pollution is man-made and can be seen in our own daily lives,...
 The disasters in underground coal mine are very serious issues to day. So the safe production of coal in the mine is an important factor to be considered. To improve the safety system in the mines, a reliable communication system must be there, between the workers of the mine, and the control base station. Wired communication system was used inside...
 Skin lesion is defined as a superficial growth or patch of the skin that is visually different than its surrounding area. Skin lesions appear for many reasons such as the symptoms indicative of diseases, birthmarks, allergic reactions, and so on. Skin lesions can be generally group into two categories namely primary and secondary skin lesions. Prim...
 Present industry is increasingly shifting towards automation. Two principle components of today’s industrial automations are programmable controllers and robots. In this frame work, it is required to optimize the boiler efficiency which in turn helps to generate maximum amount of power in an optimized environment This project work proposes a proto...
 This project proposes a supervisory system based on WIFI technology, to improve the operation efficiency of bus monitoring system and realize intelligent transportation system. Using IR sensors to know the available seats in the bus. RF TRANSCEIVER is used to track the object(ie.bus) in certain regions. RF is used to convey the informations wh...
 Price comparison sites and comparison –shopping engines gives ecommerce traders a good opportunity to boost their sales, attract new customers and go ahead against their competitors. Even Shoppers often look for best deals and offers for a particular product which they are looking for. It is difficult to visit each and every website for comparing t...
 Recommender system algorithms are widely used in e-commerce to provide personalized and more accurate recommendations to online users and enhance the sales and user stickiness of e-commerce. This paper discusses several recommendation algorithms and the challenge of tradition recommender system in big data situation, and then proposes a framework o...
 Engineering changes (ECs) are new product devel-opment activities addressing external or internal challenges, suchas market demand, governmental regulations, and competitivereasons. The corresponding EC processes, although perceived asstandard, can be very complex and inefficient. There seem to besignificant differences between what is the “officia...
 ALTEC defined and developed a framework with the main aim to process a big amount of data allowing a seamless connection between the collected information and the analyses performed by end users.This is the ASDP environment, that allows to organize data in the most adapt domain data store in order to have data ready for complex analyses. In particu...
 Online process mining refers to a class of techniques for analyzing in real-time event streams generated by the execution of business processes. These techniques are crucial in the reactive monitoring of business processes, timely resource allocation and detection/prevention of dysfunctional behavior. This paper fills the gap by identifying a set o...
 The Vehicle-to-Grid (V2G) network is, where the battery-powered vehicles provide energy to the power grid, is highly emerging. A robust, scalable, and cost-optimal mechanism that can support the increasing number of transactions in a V2Gnetwork is required. Existing studies use traditional block chain as to achieve this requirement. Block chain-en...
 In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increas...
 As global energy demand is constantly on the rise; power management has been becoming a major issue in the past decades or so due to less energy reserves. Power shutdown is a key crisis at the present time whereas disruption of power can cause a huge production loss for industries which calls for proper power management and monitoring in a systemat...
 The main goal of this project is to implement an auto-intensity control of the LED based street light system that uses solar energy to conserve the electrical power on the streetlight busing Raspberry Pi board. As the traffic decreases slowly in late night hours, the intensity is reduced progressively till morning to save energy, and thus, the stre...
 Inventory measured in terms of money, constitutes an important element in the working capital of most business firms except financial ones. Their size and rate of turnover, therefore, influences greatly the size and rate of turnover of working capital and through them, the income and profit of a business. Thus, inventory management is having consid...
 A device, usually motor-driven, fitted with an end cutting tool that is rotated with sufficient power either to create a hole or to enlarge an existing hole in a solid material and also known as driller. Tapping is the process of making thread inside the drilled hole. This operation requires less force to operate. In this project the drilling mach...
 For the emerging mobility-on-demand services, it is of great significance for predicting passenger demands based on historical mobility trips to achieve better vehicle distribution. Prior works have focused on predicting next-step passenger demands at selected locations or hotspots. However, we argue that multi-step citywide passenger demands encap...
 This paper discusses the adoption of chatbots and virtual Assistants by different category of banks (private sector banks and public sector banks) in India. The research paper presents a brief introduction of banking industry in India, history, characteristics, and architecture of chatbots and virtual assistants. The research paper also included ba...
 The problem about checking attendant is the main problem of teacher in nowadays. In order to solve this problem, Many systems have been completely changed due to this evolve to achieve more accurate results. However, in my study, these study still lack of the efficiency about correct the face and students cannot verify or pose to edit the data when...
 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
 Machine learning (ML) methods has recently contributed very well in the advancement of the prediction models used for energy consumption. Such models highly improve the accuracy, robustness, and precision and the generalization ability of the conventional time series forecasting tools. This article reviews the state of the art of machine learning ...
 Passenger traffic fore casting and decision-making of investment and construction of the tourism highway under the background of artificial intelligence is studied in this paper. As an important information asset, big data is expected to provide people with comprehensive, accurate, and real-time business insights a...
 Tumour is the undesired mass in the body. Brain tumour is the significant growth of brain cells. Manual method of classifying is time consuming and can be done at selective diagnostic centers only. Brain tumour classification is crucial task to do since treatment is based on different location and size of it. Magnetic Resonance Imaging (MRI) is mos...
 With the advancementofweb technology and its growth, there is huge volume of data present in the web for internet users and a lot of data is generated too. Internet has become a platform for online learning, exchanging ideasandsharing opinions. Social networkingsiteslike Twitter, Face book, Google are rapidly gaining popularity as they allow people...
 In this digital world, transferring sensitive data electronically has become inevitable. The objective of this work is to hide and retrieve confidential information in image mosaics. The photo mosaic approach has been used for the creation of the mosaic and the least significant bit (LSB) technique has been adopted for the embedding of the hidden i...
 In this project, an online auction system is presented. It has a very large potential market of sellers and buyers. An On Line Transaction Processing (OLTP) database model structure is, therefore, desirable. The project involves the design and implementation of an online auction system. The analysis stage is performed first for the case study. Proj...
 With the rapid development of communication technology in recent years, Wireless Sensor Network (WSN) has become a promising research project. WSN is widely applied in a number of fields such as military, environmental monitoring, space exploration and so on. The non-line-of-sight (NLOS) localization is one of the most essential techniques for WSN....
 Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing. Intrusion detection is one of the technologies for protecting the cloud computing environment from malicious attacks. However, network traffic in the cloud computing environment is charac...
 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...
 Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an a...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com