Background 1. The hon’ble prime minister launched the svamitva scheme on the national panchayati raj day, 24th april 2020 with a resolve to enable the economic progress of rural india by providing “record of rights” to every rural household owner. The scheme aims to demarcate inhabited (abadi) land in rural areas through the latest surveying dron...
 Background: The increasing adoption of renewable energy sources like solar and wind presents significant challenges due to their intermittent nature. This variability can strain the power grid, leading to inefficiencies and reliability issues. Traditional grid infrastructure is not designed to handle these fluctuations effectively, resulting in e...
 Description: Building Integrated Photovoltaic (BIPV) systems are the solar power generating products or systems that are seamlessly integrated into the building envelop. The satellite data from Indian Satellites such as Cartosat-2/3 and Cartosat-1 are capable of generating 3D city models up to LoD-1. These LoD1 models, which are derived by extrudin...
 Background: India faces a complex challenge in balancing its reliance on coal for energy with its climate change commitments. Coal mining is a major source of carbon emissions, a greenhouse gas contributing to global warming. To achieve carbon neutrality, the Indian coal sector needs to offset its emissions. This can be done through a combination...
 Cyberbullying is when someone is bullied using technology as an intermediary. Despite the fact that it has been a problem for many years, the impact on young people has just recently become more widely recognized. Bullies thrive on social media platforms, and teens and children who use them are vulnerable to attacks. A copious amount of usergener...
 Background: The rehabilitation institutes involved in this activity face high therapy cases load and more number of student therapists with less number of therapy supervisors. Following this system in manual mode impedes providing prompt services. Description: Clinical services with respect to speech language therapy begins with patient allocatio...
 With the aim to provide "Right Quantity of "Right Product" on "Right Place" on "Right Time" in "Right Condition" at "Right Cost" for "Right People" and also to streamline the distribution of drugs to institutions and ensure availability of drugs at all times, a new, innovative system named Drug Inventory and supply chain Tracking system is required...
 Background: Glaucoma is a leading cause of blindness worldwide, and managing intraocular pressure (IOP) is crucial for preventing disease progression. Description: Traditional methods of measuring IOP, such as Goldmann applanation tonometry, require direct contact with the eye, topical anaesthesia, and skilled personnel, making them less accessible...
 Background: With the loss of an upper limb, activities of daily living (ADL) become more challenging for the affected person. Functional body powered upper limb prosthesis can replace the functions of upper limb for ADL activities up to some extent. But in higher level of upper limb amputation, it becomes difficult for the patient to manage ADL a...
 Background: Angiography is a common medical imaging technique used to visualize the inside of blood vessels and detect blockages. Description: However, typically medical tests like radionuclide angiography involve the use of radioactive contrast agents, which can pose risks to patients, including radiation exposure and allergic reactions. There i...
 Background: The AYUSH sector relies heavily on medicinal plants and herbs, which form the backbone of traditional healing practices. However, physical gardens that are not accessible to everyone. A Virtual Herbal Garden will bridge this gap by offering a digital platform where users can explore, learn, and understand the significance of various m...
 Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes. An efficient registration portal is crucial for fostering growth, facilitatin...
 Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes. An efficient registration portal is crucial for fostering growth, facilitatin...
 In this paper, we demonstrate a practical system for automat ic weather-oriented clothing suggestion, given the weather information, the system can automatically recommend the most suitable clothing from the user s personal clothing album,or intelligently suggest the most pairing one with the user specified reference clothing. This is an extrem...
 Background: Water scarcity is a major challenge in agriculture, leading to inefficient water use and reduced crop yields. Traditional irrigation methods often result in overuse or underuse of water. Description: Develop a smart irrigation system that utilizes sensors and IoT technology to monitor soil moisture levels and weather conditions. This ...
 Background: Water scarcity is a major challenge in agriculture, leading to inefficient water use and reduced crop yields. Traditional irrigation methods often result in overuse or underuse of water. Description: Develop a smart irrigation system that utilizes sensors and IoT technology to monitor soil moisture levels and weather conditions. This ...
 Background: Farmers often face challenges in accessing markets, leading to lower income due to middlemen. This gap restricts their ability to sell produce at fair prices. Description: Create a mobile application that connects farmers directly with consumers and retailers. The app should include features for listing produce, negotiating prices, an...
 Background- Agricultural productivity and food security are heavily dependent on the health of crops and livestock. Farmers, especially in remote or resource-limited areas, often face challenges in diagnosing and reporting diseases that affect their livestock and crops. Early diagnosis and timely reporting are crucial for effective disease manage...
 Background: lndia has emerged as leading milk producer country in the world, however productivity of dairy animals is very low. To improve the productivity of animals a major focus area is to breed these animals using semen from high genetic merit bulls through Artificial lnsemination (Al). Al enables farmers to access the best bull (male) geneti...
 since 2000, various authorities like parliaments and government offices have introduced electronic petitions systems (e-petitions). Compared to most other means of petitions made available by public institutions, e-petitions have moved past the test organization and are portrayed by a significant level of institutionalization and procedural devel...
 Nowadays, home loan is a frequently accessed component of people’s financing activities. Homeowners wants to increase the probability of loan acceptance, however banks seek to borrow money to low risk customers. This paper compared and examined the machine learning models to select when loan applicants evaluating their probability of success. Thi...
 Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
 Background: Dual use precursor chemicals are substances that have legitimate industrial and commercial applications but can also be used in the illicit manufacture of drugs. For e.g. Opium is converted to Heroin using Acetic Anhydride and manufacturing of Methamphetamine is done using Ephedrine or Pseudoephedrine. Precursor chemicals are essentia...
 Background: Use of encrypted messaging/social media apps like Telegram, WhatsApp and Instagram for drug trafficking are on the rise. Channels operating on Telegram and WhatsApp and Instagram handles are blatantly being misused by drug traffickers for offering various narcotic drugs and Psychotropic substances for sale. Description: WhatsApp and Tel...
 Background : Digital evidence has become increasingly crucial in forensic investigations. The recovery of deleted data from storage devices is essential for reconstructing timelines, identifying suspects, and uncovering critical information. Traditional file systems like FAT and NTFS have been extensively studied, and tools for recovering deleted d...
 Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure. Description: The a...
 Background: Dark web is being used for illegal purposes and number of market places are being operated by the underground operators which facilitate illegal buying/selling of drugs/weapons/data leaks/counterfeit moneys/documents etc. Platforms, being anonymise to the LEA, make it difficult to identify the market place running on dark web mainly TOR...
 To design and develop an innovative digital forensics and incident response tool with an intuitive and accessible interface for investigators, that streamlines the process of importing evidence, conducting automated analysis, and generating detailed reports. The tool should feature an interface with clear navigation & real-time data visualization a...
 Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase “Positive”, “Negative” or “Neutral”. It analyzes the data and labels the ‘better’ and ‘worse’ sentiment as...
 Location based services provide many value added features to their mobile clients for information retrieval about their current location which can be processed to get the related information about their locality. In the Emergency cases the doctors nearby (from the app) will fill the gap by providing the information of all the doctors present near...
 Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions. Modernization will have both beneficial and negative effects. ...
 Computerized lecture reminder is a tool that permites academic students and lectures to know like due dates and locations. Lecture reminder has turned to be a very important tool in the time management and it is a common saying in the time management that it is better to keep track of things using a system rather than your memory. A computerized...
 this project is to design a Web-based distance learning system, where instructors and students can participate fully in distance learning activities while geographically separated from each other. This project is aimed to design and implement a distance learning system and use internet as the delivery mode.  This report discusses in detail backgr...
 The Online Task Management System is designed from day to day working of department of a college. The project provides online platform to accomplish day to day department level task and provide information of the task to specified user. Admin can assign task, give notification and adds different users in this project. Important benefit of this pr...
 The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification. For student identification, a fingerprint recog...
 Online auction is a business model where the items are sold through price bidding. Bidding have the start price and ending time. Potential buyers in the auction and the winner is the one who bids the item for highest price within the stipulated time. For buying product online user must provide his personal details like email address, contact numb...
 Real estate investments have become more popular last few decades. People who are investing in a new house are more conservative with their budget and market strategies. The existing system involves calculation of house prices without the necessary prediction about future market trends and price increase. The proposed system has two modes of oper...
 Day by day the cases of heart diseases are increasing at a rapid rate and it’s very Important and concerning to predict any such diseases beforehand. This diagnosis is a difficult task i.e. it should be performed precisely and efficiently. The research paper mainly focuses on which patient is more likely to have a heart disease based on various m...
 Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions. Modernization will have both beneficial and negative effects. ...
 Now a day’s a mobile phone has become a necessary part of one’s life. There is a continuous rise in the number of mobile computing applications, centeredaroundpeoples daily life. In such applications, location dependent systems have been identified as an important application. Such application which presents the architecture and implementation of...
 Aim of this project was to develop a real estate web application using Microsoft ASP .NET and SQL 2008. The real estate system Give the functionality for buyers, allowing them to search for houses by features or address. It provides functionality for the seller, authorize them to log into the system and add new advertisements or delete existing o...
 Before computerized Hospital Management System came into practice, it was difficult to keep proper records of the daily activities of hospitals, patient information, maintenance schedule of equipments in the hospital, and how funds are being allocated and used. This resulted in waste of money, time and manpower. Hospital Management System is an...
 The target of this project "HOSPITAL MANAGEMENT SYSTEM" is to digitise the hospital's front office management and produce software that is user-friendly, fast, and cost-effective. It is related with the gathering of patient information, patient tests, and so on. Before, it was done by hand. The system's principal job is to register and maintain...
 Accurately classifying brain tumor types is critical for timely diagnosis and potentially saving lives. Magnetic Resonance Imaging (MRI) is a widely used non-invasive method for obtaining high-contrast grayscale brain images, primarily for tumor diagnosis. The application of Convolutional Neural Networks (CNNs) in deep learning has revolutioniz...
 The purpose of this project is to detect the fraudulent transactions made by credit cards by the use of machine learning techniques, to stop fraudsters from the unauthorized usage of customers’ accounts. The increase of credit card fraud is growing rapidly worldwide, which is the reason actions should be taken to stop fraudsters. Putting a ...
 Online transactions have become a significant and crucial aspect of our lives in recent years. It's critical for credit card firms to be able to spot fraudulent credit card transactions so that customers aren't charged for things they didn't buy. The number of fraudulent transactions is rapidly increasing as the frequency of transactions increa...
 Health is very important for human life. In particular, the health of the brain, which is the executive of the vital resource, is very important. Diagnosis for human health is provided by magnetic resonance imaging (MRI) devices, which help health decision makers in critical organs such as brain health. Images from these devices are a source of...
 Weather forecasting has been an important application for predicting the weather changes and accordingly organizing human activities to prevent any loss. The Weathercast application notifies the user about the weather conditions like min-max temperature, humidity, windspeed, AQI (Air Quality Index), UVI (Ultraviolet Index) of any particular locatio...
 OCR is used to identify the character from human written text. To recognize the text segmentation of character is important stage. So here, we addressed different techniques to recognize the character. This document also presents comparison of different languages for character and numeral recognition with its accuracy achieved by different writer...
 Over the past few years, mobile news applications have become an extremely hyped thing for mobile users from all over the world. And, it is no wonder to learn that with the passage of time, their popularity and demand continue to enhance. The project , the “News Feed Application for Android” is a cutting edge and versatile mobile news application...
 Mobile wallets have emerged as the most significant contributor in pushing cashless and electronic payments. The surge of smartphones and internet connectivity of 4G and 5G is reflected in the robust growth of Mobile-wallets in India. Numerous digital wallet providers have risen. Technological advancement has made everything possible under one to...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
 Face recognition based smart attendance system using IoT is a tool for recognizing the students face while taking attendance by using face biometrics based on monitor camera image capturing. In our face recognition based smart attendance project, a raspberry pi system will be able to find and recognize human faces fast and precisely in images. ...
 Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases. We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication. The primary step o...
 The hospital's management system includes improved profitability, improved administration, and better patient care. The goal of this study is to create a digital management system that will boost the hospital's effectiveness and systems integration standards. It was able to produce a module that would provide some facilities, like booking doctors...
 As we are approaching modernity, the trend of paying online is increasing tremendously. It is very beneficial for the buyer to pay online as it saves time, and solves the problem of free money. Also, we do not need to carry cash with us. But we all know that Good thing are accompanied by bad things.  The online payment method leads to frau...
 Brain tumor detection is a critical application in the field of medical imaging, aimed at aiding healthcare professionals in the early and accurate diagnosis of brain tumors. This project leverages machine learning and deep learning techniques in Python to developa robust and reliable brain tumor detection system. The system undergoes sensitivi...
 In recent years, due to the booming development of online social networks, fake news for various commercial and political purposes has been appearing in large numbers and widespread in the online world. With deceptive words, online social network users can get infected by these online fake news easily, which has brought about tremendous effects...
 predicting stock market is one of the challenging tasks in the field of computation. Physical vs. physiological elements, rational vs. illogical conduct, investor emotions, market rumors, and other factors all play a role in the prediction. All of these factors combine to make stock values very fluctuating and difficult to forecast accurately. ...
 Cerebrovascular diseases such as stroke are among the most common causes of death and disability worldwide and are preventable and treatable. Early detection of strokes and their rapid intervention play an important role in reducing the burden of disease and improving clinical outcomes. In recent years, machine learning methods have attracte...
 This System is an innovative Application Allowing the System and the user to take the usage From Build-in classes and put a list in front of the User for him the full detailed review. The List also Consists of the applications using the battery usage And also determines, analyze the battery level. If the Battery level is low or gets drop down or ...
 Social networks have become a powerful information spreading platform. How to limit rumor spread on social networks is a challenging problem. In this article, we combine information spreading mechanisms to simulate real-world social network user behavior. Based on this, we estimate the risk degree of each node during the hazard period and analy...
 The present study aims to elucidate the main variables that increase the level of depression at the beginning of military conscription service using an artificial neural network (ANN)-based prediction model. Random sample data were obtained from one battalion of the Lithuanian Armed Forces, and a survey was conducted to generate data for the tr...
 Hazards from landslides are everywhere. Landslides are more likely to occur on steeply sloped hillsides. For several case studies throughout the globe, researchers have performed landslide prediction, detection, and monitoring. The major goal of researching landslide detection is to stop natural disasters by seeing their early movement. This wi...
 Nowadays, digital images are a main source of shared information in social media. Meanwhile, malicious software can forge such images for fake information. So, it’s crucial to identify these forgeries. This problem was tackled in the literature by various digital image forgery detection techniques. But most of these techniques are tied to detec...
  Rust is a severe disease affecting many productive coffee regions. It is caused by pathogenic fungi that attack the underside of coffee leaves and it is characterized by the presence of yellow-orange and powdery points. If not treated, rust can cause a drop in coffee production of up to 45%. In this sense, this paper presents a contribution to th...
 The collapse of Dam I, owned by Vale S.A, in Brumadinho-MG (Brazil), among other serious socioenvironmental consequences, contaminated the waters of the Paraopeba River in a stretch of hundreds of kilometers. Considering the relevance of monitoring water quality, and knowing that field evaluation is a time-consuming and costly procedure, the use of...
 The collapse of Dam I, owned by Vale S.A, in Brumadinho-MG (Brazil), among other serious socioenvironmental consequences, contaminated the waters of the Paraopeba River in a stretch of hundreds of kilometers. Considering the relevance of monitoring water quality, and knowing that field evaluation is a time-consuming and costly procedure, the use of...
 The major obstacle for learning-based RF sensing is to obtain a high-quality large-scale annotated dataset. However, unlike visual datasets that can be easily annotated by human workers, RF signal is non-intuitive and non-interpretable, which causes the annotation of RF signals time-consuming and laborious. To resolve the rapacious appetite of anno...
 Most State-Of-The-Art (SOTA) Neural Machine Translation (NMT) systems today achieve outstanding results based only on large parallel corpora. The large-scale parallel corpora for high-resource languages is easily obtainable. However, the translation quality of NMT for morphologically rich languages is still unsatisfactory, mainly because of the dat...
 Acute myelogenous leukemia (AML) is a subtype of acute leukemia, which is prevalent among adults.The average age of a person with AML is 65 years. The need for automation of leukemia detection arises since current methods involve manual examination of the blood smear as the first step toward diagnosis. This is time-consuming, and its accuracy depen...
 Automated Credit Scoring (ACS) is the process of predicting user credit based on historical data. It involves analyzing and predicting the association between the data and particular credit values based on similar data. Recently, ACS has been handled as a machine learning problem, and numerous models were developed to address it. In this paper, we ...
 Feature selection is the task of choosing a small subset of features that is sufficient to predict the target labels well. Here, instead of trying to directly determine which features are better, we attempt to learn the properties of good features. For this purpose we assume that each feature is represented by a set of properties, referred to as me...
 Meta-learning has been proposed as a framework to address the challenging few-shot learning setting. The key idea is to leverage a large number of similar few-shot tasks in order to learn how to adapt a base-learner to a new task for which only a few labeled samples are available. As deep neural networks (DNNs) tend to overfit using a few samples o...
 Knee osteoarthritis (KOA) as a disabling joint disease has doubled in prevalence since the mid-20th century. Early diagnosis for the longitudinal KOA grades has been increasingly important for effective monitoring and intervention. Although recent studies have achieved promising performance for baseline KOA grading, longitudinal KOA grading has bee...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
 Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor of histidine kinase, through the response regulator, to the DNA alongside transcription features and initiates the transcription of correct response genes. Thus, the prediction of phosphoaspa...
 In mental health assessment, it is validated that nonverbal cues like facial expressions can be indicative of depressive disorders. Recently, the multimodal fusion of facial appearance and dynamics based on convolutional neural networks has demonstrated encouraging performance in depression analysis. However, correlation and complementarity between...
 Deep learning is recognized to be capable of discovering deep features for representation learning and pattern recognition without requiring elegant feature engineering techniques by taking advantage of human ingenuity and prior knowledge. Thus it has triggered enormous research activities in machine learning and pattern recognition. One of the mos...
 The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learningbased key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medi...
 Bitcoin and its decentralized computing paradigm for digital currency trading are one of the most disruptive technology in the 21st century. This paper presents a novel approach to developing a Bitcoin transaction forecast model, DLForecast, by leveraging deep neural networks for learning Bitcoin transaction network representations. DLForecast make...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
 Automatic Leukemia or blood cancer detection is a challenging job and is very much required in healthcare centers. It has a significant role in early diagnosis and treatment planning. Leukemia is a hematological disorder that starts from the bone marrow and affects white blood cells (WBCs). Microscopic analysis of WBCs is a preferred approach for a...
 Automatic Leukemia or blood cancer detection is a challenging job and is very much required in healthcare centers. It has a significant role in early diagnosis and treatment planning. Leukemia is a hematological disorder that starts from the bone marrow and affects white blood cells (WBCs). Microscopic analysis of WBCs is a preferred approach for a...
 The ability to predict, anticipate and reason about future outcomes is a key component of intelligent decision-making systems. In light of the success of deep learning in computer vision, deep-learning-based video prediction emerged as a promising research direction. Defined as a self-supervised learning task, video prediction represents a suitable...
 In mental health assessment, it is validated that nonverbal cues like facial expressions can be indicative of depressive disorders. Recently, the multimodal fusion of facial appearance and dynamics based on convolutional neural networks has demonstrated encouraging performance in depression analysis. However, correlation and complementarity between...
 Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor of histidine kinase, through the response regulator, to the DNA alongside transcription features and initiates the transcription of correct response genes. Thus, the prediction of phosphoaspa...
 The ability to predict, anticipate and reason about future outcomes is a key component of intelligent decision-making systems. In light of the success of deep learning in computer vision, deep-learning-based video prediction emerged as a promising research direction. Defined as a self-supervised learning task, video prediction represents a suitable...
 In today’s scenario, there are risks at every moment of our life. People rambling around are found insecure, especially at remote outdoor locations where there are no rescue services provided. One of these scenarios is an aquatic environment such as waterfalls, lakes, trekking, remote locations, water parks, swimming pools, beaches, etc. Many lives...
 Deep neural Network (DNN) is becoming a focal point in Machine Learning research. Its application is penetrating into different fields and solving intricate and complex problems. DNN is now been applied in health image processing to detect various ailment such as cancer and diabetes. Another disease that is causing threat to our health is the kidne...
 One of the main important resources for higher education is a Learning Management System (LMS), which has shown an enhancement of students’ progress with high quality learning outcomes worldwide. Many e-learning tools exist, each one has its own weaknesses and strongest points to the online learning process. This number increases continuously, and ...
 Iris tumors, so called intraocular tumors are kind of tumors that start in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris tumor detection system since the available techniques used currently are still not efficient. The combination of the image processing different techniques ...
 The present study aims to elucidate the main variables that increase the level of stress at the beginning of military conscription service using an artificial neural network (ANN)-based prediction model. Random sample data were obtained from one battalion of the Lithuanian Armed Forces, and a survey was conducted to generate data for the training a...
 This paper focuses on changing the system of having ‘text’ as password as people tend to often forget their passwords and have to recover it. Proposing the system of having picture as a password which is kept encrypted in a database and decrypted and matched to check for authorization of user. It has been scientifically proven that it’s easier for ...
 This study aims at establishing an attendance system which can facilitate the administration data collection related to employee attendance effectively and efficiently. The method used descriptive scheme, interview and document analysis related to employee attendance to create an effective and efficient attendance system. The results obtained from ...
 Drowsiness of drivers is one of the significant cause of road accidents. Every year, there is an increase in the amount of deaths and fatal injuries globally. By detecting the driver’s drowsiness, road accidents can be reduced. This paper describes a machine learning approach for drowsiness detection. Face detection is employed to locate the region...
 Twitter is among the most used microblogging and online social networking services. In Twitter, a name, phrase, or topic that is mentioned at a greater rate than others is called a "trending topic" or simply “trend”. Twitter trends has shown their powerful ability in many public events, elections and market changes. Nevertheless, there has been ver...
 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...
 Image processing has been a crucial tool for refining the image or to boost the image. With the improvement of machine learning tools, the image processing task has been simplified to great range. Generating a semantic and photographic face image, from a sketch image or text description has always been an extremely important issue. Sketch images ba...
 Existing liquefied petroleum gas (LPG) detection systems are ad hoc and designed as stand-alone nodes. This article, however, presents an integrated end-to-end wireless sensor network (WSN) system that integrates hardware and software for early warning gas leakage detection and monitoring applications, fully utilizing the Internet of Things (IoT) f...
 Since stroke disease often causes death or serious disability, active primary prevention and early detection of prognostic symptoms are very important. Stroke diseases can be divided into ischemic stroke and hemorrhagic stroke, and they should be minimized by emergency treatment such as thrombolytic or coagulant administration by type. First, it is...
 This Waste management is one of the serious challenges of the cities, the system now used in cities, we continue to use an old and outmoded paradigm that no longer serves the entail of municipalities, Still find over spilled waste containers giving off irritating smells causing serious health issues and atmosphere impairment. The Smart Waste Manage...
 This study reviews the scientific literature for business models contributing to sustainable plastic management and suggests avenues for future research. We define sustainable plastic management (SPM) as any technique along the waste hierarchy seeking to minimize the environmental damage of plastic material. Limited cases were found during the lite...
 Monitoring various parameters of the patient using internet of things. In the patient monitoring system based on Internet of things project, the real-time parameters of patient’s health are sent to cloud using Internet connectivity. These parameters are sent to a remote Internet location so that user can view these details from anywhere in the worl...
 This project was developed in a way that the robot is controlled by voice commands. An android application with a microcontroller is used for required tasks. The connection between the android app and the vehicle is facilitated with Bluetooth technology. The robot is controlled by buttons on the application or by spoken commands of the user. The mo...
 Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
 Polycystic Ovary Syndrome (PCOS) is a medical condition which causes hormonal disorder in women in their childbearing years. The hormonal imbalance leads to a delayed or even absent menstrual cycle. Women with PCOS majorly suffer from excessive weight gain, facial hair growth, acne, hair loss, skin darkening and irregular periods leading to inferti...
 Knee osteoarthritis (KOA) is a leading cause of disability among elderly adults, and it causes pain and discomfort and limits the functional independence of such adults. The aim of this study was the development of an automated classification model for KOA, based on the Kellgren–Lawrence (KL) grading system, using radiographic imaging and gait anal...
 Motorcycle accidents have been rapidly growing through the years in many countries. In India more than 37 million people use two wheelers. Therefore, it is necessary to develop a system for automatic detection of helmet and triples wearing for road safety. Therefore, a custom object detection model is created using a Machine learning based algorith...
  Over the past decades, fire cannot be prevented in our homes and society. Hence, the author came up with an idea to create a robot that will serve as first responder to fire and hazardous chemicals. Problems were identified and objectives were formulated as guides in the establishment “Automated Hazardous Gas Detecting Robot using Wireless Sens...
 This paper investigates the applicability of machine-driven Speech Emotion Recognition (SER) towards the augmentation of theatrical performances and interactions (e.g. controlling stage color /light, stimulating active audience engagement, actors’ interactive training, etc.). For the needs of the classification experiments, the Acted Emotional Spee...
 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...
 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...
 Bus provides eco-friendly, cheap, convenient, time-effective means of transportation. Bus lack regularization and management, due to which they increased the burden on public transportation system. Unusual and unexpected conditions on the roads affect the smooth operation of the bus system and the movement of vehicles. Problems faced by passengers ...
 Distance Learning has been steadily gaining popularity. More and more universities and colleges are offering online course to increase enrollments. However, one question remains for those who teach online courses: who is doing the real course work? In this paper we will survey the commonly used methods to prevent e-Cheating, look at a few e-Proctor...
 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...
 The primary driver for innovations in the formal sector is credited to the institution of patenting. Intellectual property rights (IPRs) as the extrinsic motivational factor have supported innovations by firms and industries which have a large market and resources to commercialise their products. Grassroots innovations, on the other hand, represent...
 The technology based modern agriculture industries are today’s requirement in every part of agriculture in Bangladesh. In this technology, the disease of plants is precisely controlled. Due to the variable atmospheric circumstances these conditions sometimes the farmer doesn’t know what type of disease on the plant and which type of medicine provid...
 Integrating advanced simulation techniques and data analysis tools in a freeware Geographic Information System (GIS) provides a valuable contribution to the management of conjunctive use of groundwater (the world's largest freshwater resource) and surface-water. To this aim, we describe here the FREEWAT (FREE and open source software tools for WATe...
 The purpose of the study is to determine the specifics of housing construction at various stages of its evolutionary development in the context of the needs of the population in socially acceptable housing conditions. The methodological basis of the study is systematic, abstract-logical approaches and economic-statistical analysis. The main results...
 The development of linear infrastructure such as pipelines can have a dramatic impact on forest connectivity through canopy fragmentation. Because many forest animals are arboreal and spend their lives in the forest canopy, fragmentation caused by linear infrastructure may isolate animals on either side. Here we present our findings on linear infra...
 There is a need for automatic systems that can reliably detect, track and classify fish and other marine species in underwater videos without human intervention. Conventional computer vision techniques do not perform well in underwater conditions where the background is complex and the shape and textural features of fish are subtle. Data-driven cla...
 Image sensors are increasingly being used in biodiversity monitoring, with each study generating many thousands or millions of pictures. Efficiently identifying the species captured by each image is a critical challenge for the advancement of this field. Here, we present an automated species identification method for wildlife pictures captured by r...
 Epilepsy is a type of neurological disorder that causes abnormal brain activities and creates epileptic seizures.Traditionally epileptic seizure prediction is realized with a visual examination of Electroencephalogram (EEG) signals. But this technique needs a long time EEG monitoring. So, the automatic epileptic seizures prediction schemes become a...
 As a personal assistant, this project is built with AI technologies, Artificial intelligence technologies are beginning to be actively used in human life, this is facilitated by the appearance and wide dissemination of the Internet of Things (IOT). Autonomous devices are becoming smarter in their way to interact with both a human and themselves. Th...
 About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously moves with ...
 This work addresses the problem of instability occurring in the voltage control mode of a non-minimum phase Quasi Resonant High Gain, High-Efficiency Single Ended Primary Inductor Converter -based DC-DC converter with continuous input current. To solve this instability issue in the presence of uncertainties and the external disturbances, quantitati...
 This paper presents a novel low-complexity cross parity code, with a wide range of multiple bit error correction capability at a lower overhead, for improving the reliability in circuits over GF(2m). For an m input circuit, the proposed scheme can correct m = Dw = 3m/2 -1 multiple error combinations out of all the possible 2m - 1 errors, which is s...
 Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this ...
 Behavior of adiabatic logic circuits in weak inversion or subthreshold regime is analyzed in depth for the first time in the literature to make great improvement in ultralowpower circuit design. This novel approach is efficacious in low-speed operations where power consumption and longevity are the pivotal concerns instead of performance. The schem...
 Iterative methods are basic building blocks of communication systems and often represent a dominating part of the system, and therefore, they necessitate careful design and implementation for optimal performance. In this brief, we propose a novel field programmable gate arrays design of matrix–vector multiplier that can be used to efficiently imple...
 Iterative methods are basic building blocks of communication systems and often represent a dominating part of the system, and therefore, they necessitate careful design and implementation for optimal performance. In this brief, we propose a novel field programmable gate arrays design of matrix–vector multiplier that can be used to efficiently imple...
 The Hilbert Huang Transform (HHT) has been used extensively in the time-frequency analysis of electroencephalography (EEG) signals and Brain-Computer Interfaces. Most studies utilizing the HHT for extracting features in seizure prediction have used intracranial EEG recordings. Invasive implants in the cortex have unknown long term consequences and ...
 This paper presents the design of a fully integrated electrocardiogram (ECG) signal processor (ESP) for the prediction of ventricular arrhythmia using a unique set of ECG features and a naive Bayes classifier. Real-time and adaptive techniques for the detection and the delineation of the P-QRS-T waves were investigated to extract the fiducial point...
 Hardware acceleration has been proved an extremely promising implementation strategy for the digital signal processing (DSP) domain. Rather than adopting a monolithic application-specific integrated circuit design approach, in this brief, we present a novel accelerator architecture comprising flexible computational units that support the execution ...
 Ternary content-addressable memory (TCAM)-based search engines generally need a priority encoder (PE) to select the highest priority match entry for resolving the multiple match problem due to the don’t care (X) features of TCAM. In contemporary network security, TCAM-based search engines are widely used in regular expression matching across multip...
 A novel 8-transistor (8T) static random access memory cell with improved data stability in subthreshold operation is designed. The proposed single-ended with dynamic feedback control 8T static RAM (SRAM) cell enhances the static noise margin (SNM) for ultralow power supply. It achieves write SNM of 1.4× and 1.28× as that of isoarea 6T and read-deco...
 Portable automatic seizure detection system is very convenient for epilepsy patients to carry. In order to make the system on-chip trainable with high efficiency and attain high detection accuracy, this paper presents a very large scale integration (VLSI) design based on the nonlinear support vector machine (SVM). The proposed design mainly consist...
 Reversible logic is a computing paradigm that has attracted significant attention in recent years due to its properties that lead to ultra-low power and reliable circuits. Reversible circuits are fundamental, for example, for quantum computing. Since addition is a fundamental operation, designing efficient adders is a cornerstone in the research of...
 Approximate circuits provide high performance and require low power. Sum-of-products (SOP) units are key elements in many digital signal processing applications. In this brief, three approximate SOP (ASOP) models which are based on the distributed arithmetic are proposed. They are designed for different levels of accuracy. First model of ASOP achie...
 In this paper, a novel radiation-hardened 14-transistor SRAM bitcell with speed and power optimized [radiation-hardened with speed and power optimized (RSP)-14T] for space application is proposed. By circuit- and layout-level optimization design in a 65-nm CMOS technology, the 3-D TCAD mixed-mode simulation results show that the novel structure is ...
 A CMOS fully integrated all-pass filter with an extremely low pole frequency of 2 Hz is introduced in this paper. It has 0.08-dB passband ripple and 0.029-mm2Si area. It has 0.38-mW power consumption in strong inversion with ±0.6-V power supplies. In subthreshold, it has 0.64-µW quiescent power and operates with ±200-mV dc supplies. Miller multipli...
 India is the cultivating country and our country is the biggest maker in agricultural products. So, we have to classify and exchange our agricultural products. Manual arranging is tedious and it requires works. The automatic grading system requires less time for grading of the agricultural products. Image processing technique is helpful in examinat...
  India is the cultivating country and our country is the biggest maker in agricultural products. So, we have to classify and exchange our agricultural products. Manual arranging is tedious and it requires works. The automatic grading system requires less time for grading of the agricultural products. Image processing technique is helpful in exam...
 Modern cars are incorporating an increasing number of driver assist features, among which automatic lane keeping. The latter allows the car to properly position itself within the road lanes, which is also crucial for any subsequent lane departure or trajectory planning decision in fully autonomous cars. Traditional lane detection methods rely on a ...
 Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks or ...
 Subsequent to the introduction of Bit coin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these crypto currencies. With a perceived real world value these wallets are a target for attackers. Unlike mainstream financial services applications, cryptocurrency wallet...
 Hemoglobin can be measured normally after the analysis of the blood sample taken from the body and this measurement is named as invasive. Hemoglobin must continuously be measured to control the disease and its progression in people who go through hemodialysis and have diseases such as oligocythemia and anemia. This gives a perpetual feeling of pain...
 One common interest in radiography is producing radiographs with as low as possible radiation exposures to patients. In clinical practices, radiation exposure factors are preset for optimal image qualities to avoid underexposures which will lead to repeating examinations hence increasing radiation exposures to patients. Underexposed radiographs mai...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...
 Epilepsy is a type of neurological disorder that causes abnormal brain activities and creates epileptic seizures. Traditionally epileptic seizure prediction is realized with a visual examination of Electroencephalogram (EEG) signals. But this technique needs a long time EEG monitoring. So, the automatic epileptic seizures prediction schemes become ...
  With the increasing popularity of blockchain technology, it has also become a hotbed of various cybercrimes. As a traditional way of scam, the phishing scam has new means of scam in the blockchain scenario and swindles a lot of money from users. In order to create a safe environment for investors, an ecient method for phishing detection is urge...
 This paper addresses a single synchronous controller (SSC) for interfaced converters with high penetration of renewable energy resources (RERs) into a low inertia power grid. The SSC is modelled based on a comprehensive dependence between each operative feature of a synchronous generator (SG) and a power electronics converter. This can properly imp...
 With population growth, the demand for vehicles has increased tremendously, which has created an alarming situation in terms of traffic hazards and road accidents. The road accidents percentage is growing exponentially and so are the fatalities caused due to accidents. However, the primary cause of the increased rate of fatalities is due to the del...
 With the rapid development of wireless communication technology, people's life has undergone great changes. In recent years, the comfort and safety of the building environment have become a universal concern. However, building fire is the greatest threat to building safety. In consideration of the current issues on building security, the design app...
 This paper gives the design and implementation of embedded voice controlled system using ARM cortex A7 for visually impaired and physically challenged people. ARM cortex A7 has features such as low power consuming than its predecessor and based on ARM v7 architecture, also it is a quad core processor. The system uses Google’s speech ...
 In 1930's, Mr. Luther G. Simijian initiated building first of kind and not so successful version of Tellering machine. He did register related patents. He initially came up with an idea of machine fixed in a wall called as "Hole in the wall machine." It would allow customer to make financial transaction without entering the bank. John S. Barron had...
 Due to advancement in technology, elevators are used in order to reduce human efforts for climbing steps of large buildings. The elevator being electrical equipment has a possibility to stop working during its operation resulting in entrapment of passenger. To rescue the entrapper an escalation has to be done to concern department or person or an i...
 This paper presents the extensions added to the measurement and monitoring tool TestelDroid, to support remote control and instrumentation of Android devices. The extensions include support for Standard Commands for Programmable Instruments (SCPI), cOntrol and Management Framework (OMF) and OMF Measurement Library (OML). SCPI is the most widespread...
 The ability to remotely control a robotic arm through a human one is essential where human involvement is needed but physical presence is not possible. Control provided through vision-based approaches comes with advantage over non-vision schemes, as vision-based approaches are less intrusive. On the other hand, the problem of estimating the hand po...
 The increasing importance in ubiquitous computing and context-dependent information has led in the last years to a growing interest in location-based applications and services. A considerable market demand concentrates on indoor localization tasks. In this setting, WiFi fingerprinting is currently one of the most popular and widespread techniques a...
 This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app. The proposed system does not require a dedicated server PCwith respect to similar systems and offer...
 This project gives the idea about Detection of various disease on grape field. Also provide the information about how to control this disease. India exported so many tons of grape every year. So, Grape played vital role in economic condition of country. But, because of disease the Grape quality is decrease so that we cannot exported this grape in f...
 In today’s world Automatic system is ubiquitous communication over manual system. The IoT can assist in integration of communications, control, and information processing across various systems. The Internet of Things allows objects to be sensed and controlled remotely. Wireless Home Automation system(WHAS) using I...
 This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedure commences with initiating a call from the cell phone which is auto received by GSM module stacked in the vehicle. In the course of a call, if any of the k...
 Biosensors integrated into the vehicle controller area network are used for detecting symptoms such as anxiety, pain, and fatigue that may affect driving safety. The proposed system provides a flexible option for implementation in a diverse range of mass-produced automotive accessories without affecting the driver’s movement. ...
 Robust and reliable detection of falls is crucial especially for elderly activity monitoring systems. In this letter, we present a fall detection system using wearable devices, e.g., smartphones, and tablets, equipped with cameras and accelerometers. Since the portable device is worn by the subject, monitoring is not limited to confined areas, and ...
 The integration of decentralized generation units and the application of demand response programs brings changes to the power systems. Microgrids are emerging with relevant advantages for the power system operation. For this reason, several research projects are currently studding and finding methods to improve microgrids management. The developmen...
 A home automation system for smart grid is designed and implemented. The system monitors temperature and humidity and controls air conditioning, lights and appliances. The Message Queuing Telemetry Transport protocol and Djanjo web framework are used. A graphical user interface is developed to enable the user to control the devices remotely via a w...
 An interference-mitigated ZigBee based Advanced Metering Infrastructure solution, namely IMM2ZM, has been developed for high traffics smart metering. The IMM2ZM incorporates multi-radios multi-channels network architecture and features an interference mitigation design by using multi-objective optimization. To evaluate the performance of the networ...
 Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
 Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
 In this paper, the integration of face feature detection and extraction, and facial expression recognition are discussed. In this paper, we propose an algorithm that utilizes multi-stage integral projection to extract facial features. Furthermore, in this project, we propose a statistical approach to process the optical flow data to obtain the over...
 This paper deals with the design of Internet billing system, in which it is possible pay invoices electronically. This approach is implemented via virtual banks, in which the process of money transfer can be implemented. In other hand many applications can be realize such as; deposit e-money, withdrawal e-money and determine account balance. A Gate...
 With the increased popularity of online social networks, spammers find these platforms easily accessible to trap users in malicious activities by posting spam messages. In this work, we have taken Twitter platform and performed spam tweets detection. To stop spammers, Google SafeBrowsing and Twitter’s BotMaker tools detect and block spam tweets. Th...
 Vehicle tracking system is a well-established technology in this era which is used by fleet system and owner of vehicle all over the world. It is a very safe and reliable technology. In our thesis we are going to design a system which is used for tracking and positioning of any vehicle by using Global Positioning System [GPS] and Global System for ...
 In many application areas mobile robots need the ability to interact with people. In order to be able to communicate with even untrained users, the interaction should be as natural as possible. One of the preconditions of a natural interaction is that the robot focuses the person it is interacting with. In this paper we present a technique that com...
 Data mining is an important technique used in many fields with the purpose of acquiring valuable information from big data. This study aims to reveal the relations between the attributes of independent criminal records. The NIBRS database, which includes criminal records in USA that are recorded in 2013, is used in this study. The association rules...
 The positive or negative outcome that a firm experiences, depends mostly on the ability of making appropriate decision. The particular area of this research interest is, however, relies on the application of linear programming techniques for textile dyed fabrics to create efficient resource utilization mechanism for textile sector to improve their ...
 With the advancement of information and communication technology, life is getting simpler in all aspects. The rapid increase in the number of users on the internet over the past decade has made the internet as a part of human life. Home Automation using the Internet of Things (IoT) is a system that uses a smartphone device or pc to control basic ho...
 With the growth of virtual organisations and multinational companies, virtual collaboration tasks are becoming more important for employees because the cost of business travels remains high. In this paper, a proposal is presented to create a virtual meeting system that can use artificial intelligent components to support participants and help to pr...
 E-Mail basically allows the sender to be aware of where, when and how his mail reaches the client and what the receiver does with the mail. Many existing mail clients provide very fundamental features such as Reading, Forwarding, Moving, Deleting, etc. But most of them do not provide a proof for having read the mail. The Tracking and Notification f...
 A model of vehicle maintenance system, realized trough simulation modeling is presented in this article. The model covers all routine activities related to movement, maintenance and regulations. Activities are done by a certain number of specialists. The result of the model is obtaining information about the workload of the specialists, queuing tim...
 This project is aimed at developing an online leave management system that is of importance to either an organization. The Leave Management System (LMS) is an Intranet based application that can be accessed throughout the organization or a specified group/Dept. This system can be used to automate the workflow of leave applications and their approva...
 Optical Character Recognition (OCR) has been a topic of interest for many years. It is defined as the process of digitizing a document image into its constituent characters. Despite decades of intense research, developing OCR with capabilities comparable to that of human still remains an open challenge. Due to this challenging nature, researchers f...
 This history column article provides a tour of the main software development life cycle (SDLC) models. (A lifecycle covers all the stages of software from its inception with requirements definition through to fielding and maintenance.) System development lifecycle models have drawn heavily on software and so the two terms can be used interchangeabl...
 Igniting a passion for reading and research is core business for school libraries, inevitably placing the library at the centre of the twenty-first century reading and learning experience. Teacher librarians, librarians and library teams in Australian and New Zealand schools are responding to the learning needs within the school community with a fo...
 This system is an auditorium management software projects. It includes all the features and functions needed to efficiently manage an auditorium. It includes an administrator account which is used to handle/control all the system functionality. The system keeps track of auditorium status and advance bookings. The system keeps records of auditorium ...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
 Aspect-Oriented Programming (AOP) methodology has been investigated in the design and implementation of a representative Event Management System Software. Eclipse-AJDT environment has been used as open source enhanced IDE support for programming in AOP language – AspectJ. Twelve crosscutting concerns have been identified and modularized into highly...
 This study explored the need for monitoring and evaluation system in an environment of a university in a third world country. Two methods were employed for data collection, which are qualitative and quantitative methodology combined with participatory action research methodology. Also prototype approach was used as method for system development. Gr...
 In today’s world, most of the people utilize Online Social Networks (OSN) to mingle with people of their interest. Various new and innovative photo sharing features attract many users and kindle them to post several photos. The user has the privilege of posting any photo on his/her profile and share it with a range of people. Unfortunately, it may ...
 One of the essential services on the internet is the Email Service. The Email server can be vulnerable to several types of cyber-attacks. This research aims to analyze and improve the Email service. This mail is the process of following the path and function performed by the receiver on the received mail. The development of this system serves as a ...
 This paper discusses about the project implementation of social networking site for teaching and learning purposes. The type of social space available to users can provide a more personalized and interactive experience for educative purpose. The growing demand of engineers in the industry makes it very important for the students to know about the p...
 This article discusses various features in the design and implementation of online course materials. The author provides a critical review of some instructional design patterns and expands on the alignment among instruction, motivation and learners’ performances as part of a curriculum design process. In this context, the author emphasizes the valu...
 With many potential practical applications, content-based image retrieval (CBIR) has attracted substantial attention during the past few years. Hence the authors implemented an advanced image pattern searching algorithm. In the proposed system, the images are searched based on the image patterns such as pixels, resolution, height and width of the i...
 Herbal database management is one of the emerging trends nowadays. There are many agencies working on herbal database management. This system helps to overcome many adverse reactions of drugs and their interactions. The safety profile of an herbal is maintained in this database which is very useful for appropriate use of herbal medicine. Here, an a...
 Online examination system is a web-based examination system where examinations are given online. either through the internet or intranet using computer system. The main goal of this online examination system is to effectively evaluate the student thoroughly through a totally automated system that not only reduce the required time but also obtain fa...
 The proposed Cricket Club Management System is completely automated. The proposed system allows the user to book ground for various days, request for club membership and register for the various training batches. Less effort is required for maintaining the database of club using this software. Margin of error will be reduced and reg...
 Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. Fingerprint Based ATM is a desktop application where fingerprint of the user is used as an authentication. The finger print minutiae ...
 In today’s age, education is the most important way of achieving success. When we discuss education, it is imperative to mention tests and examination. Examinations prepare students in their quest for knowledge. So, having a proper examination paper and format is quite necessary. Now the traditional method of generating question paper has been manu...
  Furniture is the soul of a house; it gives a sense of fulfilling needs. Types of furniture are of many designs and categories. It can be as small as a mouse to as gigantic as an elephant.The proper fitting at the right place is also a matter of concern while choosing the furniture. It should be taken care that the size of the room and the size ...
 Due to their tight schedule nobody is going to the polls these days. There are numerous causes, some need to go to the polls, many of us may have to wait for long periods because of their strict schedules. So we created a voting system on the Internet. But there are some disadvantages to this system. Attackers legally receive customer passwords and...
 This report in the title "Optical Shop Manager" which is a shop management system to manage optical shop business and it is implemented with inventory management. There are modules in this system, which are login, master inventory management, transaction management, staff management, and financial management. The problem statement of this thesis ar...
 Speedy and efficient information processing is crucial to our socially and highly developed technology. Computer can help the intolerable burden of handling the ever increasing amount or information with government department, public services and business concerns expected to contain because of their ability to analyze information as well as to r...
 Large amount of Twitter accounts are suspended. Over five year period, about 14% accounts are terminated for reasons not specified explicitly by the service provider. We collected about 120,000 suspended users, along with their tweets and social relations. This thesis studies these suspended users, and compares them with normal users in terms of th...
 This paper presents a proper solution for a medium enterprise or public institution that enables easier management of the digital documents library and eases the common document workflows. The main problem addressed by the proposed project is the complexity of document workflows in public administration. Documents that need to be filled out and sig...
 Security threats against computer systems are a big problem today which also includes PHP made applications. The report is focused on protection with the help of code and not how you protect a web server. Its purpose is not to educate the readers of the thesis how to make a PHP application, the purpose is how to program a safer PHP application. The...
 An organized and systematic office solution is essential for all universities and organizations. There are many departments of administration for the maintenance of college information and student databases in any institution. All these departments provide various records regarding students. Most of these track records need to maintain information ...
 The purpose of developing this software project is to fully automate salary system for an organization sweden sports academy. This software is capable of calculating monthly salaries, tax and social security of employees of that organization. On the basis of certain formulas it will generate files as an output such as bank files and salary slips et...
 Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, web based project management systems enter a critical role in a multitude of companies. Thus, a proper project management system plays a distinctive part in ensuring reliable, robus...
  Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks...
 A college management registration system empowers colleges and educators to manage regular tasks such as campaigns, student enrolment, admissions, course registration, etc. Registering for courses while taking admission to a college is the most crucial step as it lays the foundation for an entire semester. Providing this information to thousands of...
 To obtain information and knowledge of SNF (Solid not fat), feeding and milking management. System also included the management practices among the dairy farms at various state levels from District to Taluka level for maintaining daily records as well as effective payment system through digital transactions. This system recurring to information of ...
 The following report will outline the development of an automated Ticket Reservation System for the Millennium Forum which will incorporate features in order to aid the process for visually impaired users. This application has been designed for customers to reserve theatre tickets for various shows....
 This paper deals with development of inventory management system for a manufacturing Industry. The developed software System is easy to use, less time consuming & all detail about the inventory items & transaction status. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The repor...
 Online Examination is an essential ingredient in electronic and interactive learning, however, in educational environment most of examinations are done in the classical paper-based way due to the lack of resumption capability when power/network/physical computer’s component failures. For this reason, adopting and developing an online examination sy...
 In any developing country democracy plays an important role where a leader for a country is elected by the citizen. One of the main issues in the conventional voting system is that it consumes lots of man-power as well as resources and the preparation have been started many days before the commencement of the election. During this preparation some ...
 This paper describes the importance of ERP in manufacturing industries and examines the various articles published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The report is about windows based application. The main idea of this pap...
 In today’sera a new generation of technology is transforming the world of computing. Advances in internet based data storage, processing and services collectively known as cloud computing have emerged to complement the traditional model of running software and storing data on personal devices or on premise networks. Today cloud computing provide hi...
 Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based bio...
 We tried to develop a real time face detection and recognition system which uses an “appearance-based” approach. For detection purpose we used Viola Jones algorithm. To recognize face we worked with Eigen Faces which is a PCA based algorithm. In a real time to recognize a face we need a data training set. For data training set we took five images o...
 The main of this system is to develop fee management system by using c language. This system mainly reduces the work task and it is easy to maintain the records for a long time than normal hand written records. The user can check his record details by just entering his name no need to search all the record. With the help of this system fee calculat...
 The purpose of this project is to develop an on-line banking system that provides customers with the facility to check their accounts and do transactions on-line. The system will provide all the banks facilities to its customers when their authentications [user id and password] match, including viewing account information, performing transfers, giv...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
 This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
 In application scenarios such as Internet of Things, a large number of energy receivers (ERs) exist and line-of-sight (LOS) propagation could be common. Considering this, we investigate wireless energy transfer (WET) in extra-large massive MIMO Rician channels. We derive analytical expressions of the received net energy for different schemes, inclu...
 In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
 Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...
 This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
 With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and in...
 The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...
 Urban crowd flow prediction is very challenging for public management and planning in smart city applications. Existing work mostly focuses on spatial and temporal dependence based flow prediction that are not well suited for predictions of instantaneous flow change usually due to social emergency incidents and accidents. In this paper, we propose ...
 The global healthcare industry and artificial intelligence has promoted the development of the diversified intelligent healthcare applications. IoT will play an important role in meeting the high throughput requirements of diversified intelligent healthcare applications. However, the healthcare big data transmission is vulnerable to a potential att...
 This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit IoT devices in demand. During the hovering periods, the UAV works on full-duplex mode to simultaneously collect data from the target device and charge other devices within its...
 The Internet of Things (IoT) is playing an increasingly vital role in multiple industries and our everyday life. A pressing practical problem of IoT devices (IoT-Ds) is their explosive growth of connectivity which leads to large energy consumption. One of the most promising solutions to achieve a sustainable green IoT network is unmanned aerial veh...
 Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., s...
 For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT program senses some information and sends them via a channel, usually a wireless channel with an RF circuit. These IoT nodes often require a system with networking capabilities and a low-power ha...
 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
 The Industry 4.0 (I4.0) is a paradigm settled down by the introduction of the Internet of things (IoT) into the production and manufacturing environment. I4.0 promotes the connection of physical items such as sensors, devices, and enterprise assets, to each other and to the Internet. The information that flows through these items is vital because i...
 Blockchain is a safe technology for transaction as it keeps the information safe that it is impossible to change, hack or cheat. blockchain is a digital mode of transaction that is spread across the entire network of computer systems in blockchain. IoT devices allows to send information or useful data in the blockchain to the persons that are inter...
 The ATM Fraudulence occurring in the society has become very common nowadays. Even though technology has boomed in various aspects it is being misused in different ways for stealing money through ATM’S. Skimming and Trapping of the ATM devices have been designed by many Burglars. Recognition based Verification system as been implemented for many AT...
 This paper presents V-Sight, a network monitoring framework for programmable virtual networks in clouds. Network virtualization based on software-defined networking (SDN-NV) in clouds makes it possible to realize programmable virtual networks; consequently, this technology offers many benefits to cloud services for tenants. However, to the best of ...
 In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 Fog computing is an emerging computing paradigm that uses processing and storage capabilities located at the edge, in the cloud, and possibly in between. Testing and benchmarking fog applications, however, is hard since runtime infrastructure will typically be in use or may not exist, yet. While approaches for the emulation of infrastructure testbe...
 These days, clustering is one of the most classical themes to analyze data structures in machine learning and pattern recognition. Recently, the anchor-based graph has been widely adopted to promote the clustering accuracy of plentiful graph-based clustering techniques. In order to achieve more satisfying clustering performance, we propose a novel ...
 Feature selection (FS) is an important step in machine learning since it has been shown to improve prediction accuracy while suppressing the curse of dimensionality of high-dimensional data. Neural networks have experienced tremendous success in solving many nonlinear learning problems. Here, we propose a new neural-network-based FS approach that i...
 This article proposes a novel modeling method for the stochastic nonlinear degradation process by using the relevance vector machine (RVM), which can describe the nonlinearity of degradation process more flexibly and accurately. Compared with the existing methods, where degradation processes are modeled as the Wiener process with a nonlinear drift ...
 Attention-based deep multiple-instance learning (MIL) has been applied to many machine-learning tasks with imprecise training labels. It is also appealing in hyperspectral target detection, which only requires the label of an area containing some targets, relaxing the effort of labeling the individual pixel in the scene. This article proposes an L1...
 With the dramatic increase of dimensions in the data representation, extracting latent low-dimensional features becomes of the utmost importance for efficient classification. Aiming at the problems of weakly discriminating marginal representation and difficulty in revealing the data manifold structure in most of the existing linear discriminant met...
 Many deep-learning methods have been developed for fault diagnosis. However, due to the difficulty of collecting and labeling machine fault data, the datasets in some practical applications are relatively much smaller than the other big data benchmarks. In addition, the fault data come from different machines. Therefore, on some occasions, fault di...
 For a broad range of applications, hyperspectral image (HSI) classification is a hot topic in remote sensing, and convolutional neural network (CNN)-based methods are drawing increasing attention. However, to train millions of parameters in CNN requires a large number of labeled training samples, which are difficult to collect. A conventional Gabor...
 Unsupervised domain adaptation (UDA) aims at learning a classifier for an unlabeled target domain by transferring knowledge from a labeled source domain with a related but different distribution. Most existing approaches learn domain-invariant features by adapting the entire information of the images. However, forcing adaptation of domain-specific ...
 Lithology identification plays an essential role in formation characterization and reservoir exploration. As an emerging technology, intelligent logging lithology identification has received great attention recently, which aims to infer the lithology type through the well-logging curves using machine-learning methods. However, the model trained on ...
 Stochastic point location deals with the problem of finding a target point on a real line through a learning mechanism (LM) with the stochastic environment (SE) offering directional information. The SE can be further categorized into an informative or deceptive one, according to whether p is above 0.5 or not, where p is the probability of providing...
 Recently, the restricted Boltzmann machine (RBM) has aroused considerable interest in the multiview learning field. Although effectiveness is observed, like many existing multiview learning models, multiview RBM ignores the local manifold structure of multiview data. In this article, we first propose a novel graph RBM model, which preserves the dat...
 The cross-lingual sentiment analysis (CLSA) aims to leverage label-rich resources in the source language to improve the models of a resource-scarce domain in the target language, where monolingual approaches based on machine learning usually suffer from the unavailability of sentiment knowledge. Recently, the transfer learning paradigm that can tra...
 By training different models and averaging their predictions, the performance of the machine-learning algorithm can be improved. The performance optimization of multiple models is supposed to generalize further data well. This requires the knowledge transfer of generalization information between models. In this article, a multiple kernel mutual lea...
 Predicting attention-modulated brain responses is a major area of investigation in brain-computer interface (BCI) research that aims to translate neural activities into useful control and communication commands. Such studies involve collecting electroencephalographic (EEG) data from subjects to train classifiers for decoding users' mental states. H...
 Image annotation aims to jointly predict multiple tags for an image. Although significant progress has been achieved, existing approaches usually overlook aligning specific labels and their corresponding regions due to the weak supervised information (i.e., ``bag of labels'' for regions), thus failing to explicitly exploit the discrimination from d...
 Due to the development of convenient brain-machine interfaces (BMIs), the automatic selection of a minimum channel (electrode) set has attracted increasing interest because the decrease in the number of channels increases the efficiency of BMIs. This study proposes a deep-learning-based technique to automatically search for the minimum number of ch...
  The popularity of mobile devices has led to an explosive growth in the number of mobile apps in which Android mobile apps are the mainstream. Android mobile apps usually undergo frequent update due to new requirements proposed by users. Just-In-Time (JIT) defect prediction is appropriate for this scenario for quality assurance because it can pr...
 Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/T...
 Andriod malware poses a serious threat to users privacy, money, equipment and file integrity. A series of data-driven malware detection methods were proposed. However, there exist two key challenges for these methods: (1) how to learn effective feature representation from raw data; (2) how to reduce the dependence on the prior knowledge or human la...
 In narrowband Internet of Things (NB-IoT), a link adaptation technique can be performed, considering multiple resource unit types, repetition numbers, and modulation-coding schemes, to enhance transmission reliability. Then, a base station should allocate downlink and uplink resources for each device using the link adaptation decision to transmit d...
 Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...
 In Green Internet of Things, energy consumption research is a hot topic. Our research focuses on Supervisory Control And Data Acquisition (SCADA) system, and it is a system consisting of a plurality of self-organized sensing networks. Live data gathering from numerous Sub-connected SCADA (S-SCADA) networks to make unified decisions based on collect...
 This work enables mobile user authentication via finger inputs on ubiquitous surfaces leveraging low-cost physical vibration. The system we proposed extends finger-input authentication beyond touch screens to any solid surface for IoT devices (e.g., smart access systems and IoT appliances). Unlike passcode or biometrics-based solutions, it integrat...
 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
 The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our daily life. Due to the seamless connections of the IoT devices with the physical world through the Internet, the IoT applications use the cloud to store and provide ubiquitous access to collected data. Sharing of data with third party services and other users in...
 Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks ...
 The integration of drones, IoT, and AI domains can produce exceptional solutions to today's complex problems in smart cities. A drone, which essentially is a data-gathering robot, can access geographical areas that are difficult, unsafe, or even impossible for humans to reach. In this paper, an intelligent technique is proposed to predict the signa...
 In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...
 The social Internet of Things (IoT) (SIoT) helps to enable an autonomous interaction between the two architectures that have already been established: social networks and the IoT. SIoT also integrates the concepts of social networking and IoT into collaborative edge computing (CEC), the so-called CEC-based SIoT architecture. In closer proximity, Io...
 Virtual synchronous generator (VSG) is a promising solution for inertia support of the future electricity grid to deal with the frequency stability issues caused by the high penetration of renewable generations. However, the power variation in power electronic interface converters caused by VSG emulation increases the stress on power semiconductor ...
 Most convolutional neural network (CNN)-based cloud detection methods are built upon the supervised learning framework that requires a large number of pixel-level labels. However, it is expensive and time-consuming to manually annotate pixelwise labels for massive remote sensing images. To reduce the labeling cost, we propose an unsupervised domain...
 Point clouds are the most general data representations of real and abstract objects, and have a wide variety of applications in many science and engineering fields. Point clouds also provide the most scalable multi-resolution composition for geometric structures. Although point cloud learning has shown remarkable results in shape estimation and sem...
 Most ground-based remote sensing cloud classification methods focus on learning representation features for cloud images while ignoring the correlations among cloud images. Recently, graph convolutional network (GCN) is applied to provide the correlations for ground-based remote sensing cloud classification, in which the graph convolutional layer a...
 Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing infrastructure. At the first sight, by merely storing the shared data as plaintext in the cloud storage and protect them using an appropriate access ...
 This paper proposes a new 3D multi-object tracker to more robustly track objects that are temporarily missed by detectors. Our tracker can better leverage object features for 3D Multi-Object Tracking (MOT) in point clouds. The proposed tracker is based on a novel data association scheme guided by prediction confidence, and it consists of two key pa...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 With the rapid development of bioinformatics and the availability of genetic sequencing technologies, genomic data has been used to facilitate personalized medicine. Cloud computing, features as low cost, rich storage and rapid processing can precisely respond to the challenges brought by the emergence of massive genomic data. Considering the secur...
 The long-term data record (LTDR) has the goal of developing a quality and consistent Advanced Very High Resolution Radiometer (AVHRR) surface reflectance and albedo products dating back to 1982 at 0.05° spatial resolution. Distinguishing between cloud and snow is of critical importance when analyzing global albedo trends, for they influence the Ear...
 As a promising technology in the development of human healthcare services, the wireless body area networks (WBANs) technology has attracted widespread attention in recent years from both industry and academia. However, due to the sensitiveness of the medical system and the capability limitation of the wearable devices, security, privacy, and effici...
 Fine-grained access control schemes are commonly used in cloud computing. In this type of schemes, each data item is given its own access control policy. The entity that wants to access the data item needs to provide its credentials to a policy enforcer. In a cloud environment, normally, the policy enforcer is not the owner of the data. The access ...
 In this letter, we discuss the security weakness of Wang et al.'s attribute-based data sharing scheme, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2016.2549004). Through designing two concrete attacks, we identify two serious security flaws in their scheme. 1) First, we show that their scheme is insecure bec...
 IaaS from the public cloud is becoming a new option for organizations in need of HPC capabilities. IaaS offers greater flexibility in hardware choices and operational costs. Furthermore, IaaS enables small organizations to access resources previously reserved for organizations with larger capitals. This study uses the HPCG benchmark to assess the p...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
 Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensors networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broad...
 This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
 With the development of sensor-clouds, the traditional WSN is expanded and the computing capacity is greatly improved. However, there are still challenges to be solved in sensor-clouds, such as how to disseminate codes to all nodes in a fast and energy-saving way. In this paper, an early wake-up ahead (EWA) code dissemination scheme is proposed to ...
 With the increasing demand of users for personalized social services, social recommendation (SR) has been an important concern in academia. However, current research on SR universally faces two main challenges. On the one hand, SR lacks the considerable ability of robust online data management. On the other hand, SR fails to take the ambiguity of p...
 Ridge regression is frequently utilized by both supervised learning and semisupervised learning. However, the results cannot obtain the closed-form solution and perform manifold structure when ridge regression is directly applied to semisupervised learning. To address this issue, we propose a novel semisupervised feature selection method under gene...
 Chinese word embedding models capture Chinese semantics based on the character feature of Chinese words and the internal features of Chinese characters such as radical, component, stroke, structure and pinyin. However, some features are overlapping and most methods do not consider their relevance. Meanwhile, they express words as point vectors that...
 Recently, supervised cross-modal hashing has attracted much attention and achieved promising performance. To learn hash functions and binary codes, most methods globally exploit the supervised information, for example, preserving an at-least-one pairwise similarity into hash codes or reconstructing the label matrix with binary codes. However, due t...
 Parkinson's disease (PD) is known as an irreversible neurodegenerative disease that mainly affects the patient's motor system. Early classification and regression of PD are essential to slow down this degenerative process from its onset. In this article, a novel adaptive unsupervised feature selection approach is proposed by exploiting manifold lea...
  Feature selection is of great importance to make prediction for process variables in industrial production. An embedded feature selection method, based on relevance vector machines with an approximated marginal likelihood function, is proposed in this study. By setting hierarchical prior distributions over the model weights and the parameters o...
 Node embedding aims to encode network nodes as a set of low-dimensional vectors while preserving certain structural properties of the network. In recent years, extensive studies have been conducted to preserve network communities, i.e., structural proximity of network nodes. However, few of them have focused on preserving the structural equivalence...
 Modern enterprises attach much attention to the selection of commercial locations. With the rapid development of urban data and machine learning, we can discover the patterns of human mobility with these data and technology to guide commercial district discovery. In this paper, we propose an unsupervised commercial district discovery framework via ...
 Knowledge graph (KG) embedding aims to study the embedding representation to retain the inherent structure of KGs. Graph neural networks (GNNs), as an effective graph representation technique, have shown impressive performance in learning graph embedding. However, KGs have an intrinsic property of heterogeneity, which contains various types of enti...
 This work proposes a novel frequency regulation paradigm for multi-area interconnected power systems. The developed approach capitalizes on phasor measurement units (PMUs) advanced monitoring to overcome design limitations imposed by legacy supervisory control and data acquisition (SCADA) systems. For this, a novel measurement-based controller inte...
 The ability of HTS cable networks to provide a solution for the high power density requirements of electric transportation applications was explored. The high current density and the temperature-dependent critical current features of HTS cables were shown to allow resilient designs for power distribution in electric transportation applications. Hea...
 With the increasing integration of PV generation in AC microgrids, it is challenging to keep the stability of system frequency due to the intermittent and stochastic nature of PVs. Thus, in order to reduce the investment and maintenance costs of storage systems, the electric utility has shown increasing interest in calling on PVs to provide frequen...
  The state estimation algorithm estimates the values of the state variables based on the measurement model described as the system of equations. Prior to applying the state estimation algorithm, the existence and uniqueness of the solution of the underlying system of equations is determined through the observability analysis. If a unique solutio...
  With the introduction of massive renewable energy sources and storage devices, the traditional process of grid operation must be improved in order to be safe, reliable, fast responsive and cost efficient, and in this regard power flow solvers are indispensable. In this paper, we introduce an Interior Point-based (IP) Multi-Period AC Optimal Pow...
  Large blackouts in power grids are often the consequence of uncontrolled failure cascades. The ability to predict the failure cascade process in an efficient and accurate manner is important for power system contingency analysis. In this paper, we propose to apply the influence model for the prediction and screening of failure cascades in large...
  Large blackouts in power grids are often the consequence of uncontrolled failure cascades. The ability to predict the failure cascade process in an efficient and accurate manner is important for power system contingency analysis. In this paper, we propose to apply the influence model for the prediction and screening of failure cascades in large...
  Accurate and fast event identification in power systems is critical for taking timely controls to avoid instability. In this paper, a synchrophasor measurementbased fast and robust event identification method is proposed considering different penetration levels of renewable energy. A difference Teager-Kaiser energy operator (dTKEO)-based algori...
  This paper proposes to utilize intentional time delays as part of controllers to improve the damping of electromechanical oscillations of power systems. Through stability theory, the control parameter settings for which these delays in Power System Stabilizers (PSSs) improve the small signal stability of a power system are systematically identi...
 The heterogeneity of today’s Web sources requires information retrieval (IR) systems to handle multi-modal queries. Such queries define a user’s information needs by different data modalities, such as keywords, hashtags, user profiles, and other media. Recent IR systems answer such a multi-modal query by considering it as a set of separate uni-moda...
 Deep learning methods have played a more and more important role in hyperspectral image classification. However, general deep learning methods mainly take advantage of the sample-wise information to formulate the training loss while ignoring the intrinsic data structure of each class. Due to the high spectral dimension and great redundancy between ...
 Traditional clustering algorithms are widely used for building bag-of-words (BOW) models to aggregate spatiotemporal feature points extracted from a video for human activity recognition problems. Their performances are restricted by the computational complexity which limits the number of feature points being used. In contrast, deep clustering yield...
 Social media is a popular medium for the dissemination of real-time news all over the world. Easy and quick information proliferation is one of the reasons for its popularity. An extensive number of users with different age groups, gender, and societal beliefs are engaged in social media websites. Despite these favorable aspects, a significant disa...
  In this paper, we report our discovery on named entity distribution in a general word embedding space, which helps an open definition on multilingual named entity definition rather than previous closed and constraint definition on named entities through a named entity dictionary, which is usually derived from human labor and replies on schedule...
 Most recent semi-supervised video object segmentation (VOS) methods rely on fine-tuning deep convolutional neural networks online using the given mask of the first frame or predicted masks of subsequent frames. However, the online fine-tuning process is usually time-consuming, limiting the practical use of such methods. We propose a directional dee...
  In this paper, a video service enhancement strategy is investigated under an edge-cloud collaboration framework, where video caching and delivery decisions are made in the cloud and edge respectively. We aim to guarantee the user fairness in terms of video coding rate under statistical delay constraint and edge caching capacity constraint. A hy...
  Given a target binary function, the binary code search retrieves top-K similar functions in the repository, and similar functions represent that they are compiled from the same source codes. Searching binary code is particularly challenging due to large variations of compiler tool-chains and options and CPU architectures, as well as thousands o...
 The development of vehicular Internet of Things (IoT) applications, such as E-Transport, Augmented Reality, and Virtual Reality are growing progressively. The mobility aware services and network-based security are fundamental requirements of these applications. However, multiside offloading enabling blockchain and cost-efficient scheduling in heter...
 We develop WiDE, a WiFi-distance estimation based group profiling system using LightGBM. Given the uploaded WiFi information by users, WiDE can automatically learn powerful hidden features from the proposed features for between-person distance estimation, and infer group membership with the estimated distance. For each group, WiDE classifies the mo...
 This paper presents an asset health index (HI) prediction methodology for high voltage transmission overhead lines (OHLs) using supervised machine learning and structured, unambiguous visual inspections. We propose a framework for asset HI predictions to determine the technical condition of individual OHL towers to improve grid reliability in a cos...
 A methodology for automating the identification of single-event transients (SETs) through Ionizing Radiation Effects Spectroscopy (IRES) and machine learning (ML) is provided. IRES enhances the identification of SETs through statistical analysis of waveform behavior, allowing for the capture of subtle circuit dynamics changes.Automated identificati...
 IP Networks serve a variety of connected network entities (NEs) such as personal computers, servers, mobile devices, virtual machines, hosted containers, etc. The growth in the number of NEs and technical considerations has led to a reality where a single IP address is used by multiple NEs. A typical example is a home router using Network Address T...
 Machine learning is widely used in developing computer-aided diagnosis (CAD) schemes of medical images. However, CAD usually computes large number of image features from the targeted regions, which creates a challenge of how to identify a small and optimal feature vector to build robust machine learning models. In this study, we investigate feasibi...
 This paper presents a recursive feature elimination (RFE) mechanism to select the most informative genes with a least square kernel extreme learning machine (LSKELM) classifier.Describing the generalization ability of LSKELM in a way that is related to small norm of weights, we proposed a ranking criterion to evaluate the importance of genes by the...
  Continuous monitoring of anaesthetics infusion is demanded by anaesthesiologists to help in defining personalized dose, hence reducing risks and side effects. We propose the first piece of technology tailored explicitly to close the loop between anaesthesiologist and patient with continuous drug monitoring. Direct detection of drugs is achieved...
 Objectives: Big data analytics can potentially benefit the assessment and management of complex neurological conditions by extracting information that is difficult to identify manually. In this study, we evaluated the performance of commonly used supervised machine learning algorithms in the classification of patients with traumatic brain injury (T...
 In exercise gaming (exergaming), reward systems are typically based on rules/templates from joint movement patterns. These rules or templates need broad ranges in definitions of correct movement patterns to accommodate varying body shapes and sizes.This can lead to inaccurate rewards and, thus, inefficient exercise, which can be detrimental to prog...
 Automated Machine Learning (AutoML) has achieved remarkable progress on various tasks, which is attributed to its minimal involvement of manual feature and model designs. However, existing AutoML pipelines only touch parts of the full machine learning pipeline, e.g., Neural Architecture Search or optimizer selection.This leaves potentially importan...
  ? Proper training is essential to achieve reliable pattern recognition (PR) based myoelectric control. ? The amount of training is commonly determined by experience. ? The purpose of this study is to provide an offline validation method that makes the offline performance transferable to online control and find the proper amount of training tha...
 ? Automated Machine Learning (AutoML) seeks to automatically find so-called machine learning pipelines that maximize the prediction performance when being used to train a model on a given dataset. One of the main and yet open challenges in AutoML is an effective use of computational resources: An AutoML process involves the evaluation of many candi...
 ? Wafer test is carried out after integrated circuits (IC) fabrication to screen out bad dies. ? In addition, the results can be used to identify problems in the fabrication process and improve manufacturing yield. ? However, the wafer test itself may induce defects to otherwise good dies. ? Test-induced defects not only hurt overall manufact...
 Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provides...
  Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provide...
 The Product “Automatic switch for water pump” is designed to control the switching of water pump and to reduce the amount of wastages of water as well as electricity. The mechanism of our product is to take two different input data from water and to process them from JK flip-flop then passed through the Relay to control the switching action in prop...
 Digital image processing deals with the manipulation of digital images through a digital computer. It is a subfield of signal and systems but focus particularly on images. DIP focuses on developing a computer system that is able to perform processing on an image. The input of that system is a digital image and the system process that image using ef...
 Digital media archives are increasing to colossal proportions in the world today, which includes audio, video and images An Image refers as a picture produced on an electronic display .A digital image is a numeric representation of a two-dimensional image. Digital image processing refers to processing of digital images by using digital computers. N...
 Quality of the speech is one of the important concerns in communications via mobiles phones. In order to achieve uninterrupted communication, the quality of the speech signal should be clear, so that person in other side can hear properly and reply, this should happen on both side. Real time noise cancellation mechanism can be provided as important...
 Skin lesion is defined as a superficial growth or patch of the skin that is visually different than its surrounding area. Skin lesions appear for many reasons such as the symptoms indicative of diseases, birthmarks, allergic reactions, and so on. Skin lesions can be generally group into two categories namely primary and secondary skin lesions. Prim...
 The Blind person navigation system can be used in house, hospitals where the blind people are living. The system consists of indoor transmitter section and blind person receiver section. The transmitter section is kept in the indoor and receiver section given to blind person. Whenever the Li-Fi receiver receives the data from transmitter section, i...
 HFSS provides automatic, accurate, and efficient solutions to overcome these challenges, making it the ultimate tool of choice for antenna simulation. Basic performance characterization such as return loss, input impedance, gain, directivity and a variety of polarization characteristics can be analyzed in HFSS. Key post-processing features such as ...
 Internet is a worldwide publicly accessible system of interconnected computer networks. Currently, two versions of the Internet Protocol (IP) are in use on the Internet namely IPv4 and IPv6. In some sense, there is a competition going on between these protocols, as they are not directly compatible, the aim of this project is to show the compatibili...
 Churn prediction is an important topic in the freeonline game industry. Reducing the churn rate of a game signifi-cantly helps with the success of the game. Churn prediction helpsa game operator identify possible churning players and keep them engaged in the game via appropriate operational strategies, marketing strategies, and/or incentives. Play...
 Learning with streaming data has received extensiveattention during the past few years. Existing approaches assumethat the feature space is fixed or changes by following explicitregularities, limiting their applicability in real-time applications.For example, in a smart healthcare platform, the feature space ofthe patient data varies when different...
 Gene expression programming (GEP) is a data driven evolutionary technique that well suits for correlation mining. Parallel GEPs are proposed to speed up the evolution process using a cluster of computers or a computer with multiple CPU cores. However, the generation structure of chromosomes and the size of input data are two issues that tend to be ...
 The traditional single minimum support data mining algorithm has some problems, such as too much space occupied by data, resulting in insufficient accuracy of the algorithm, which is difficult to meet the needs of the development of the times. Therefore, an intrusion data mining algorithm based on multiple minimum support is proposed. First, the fe...
 The goal of our work is to discover dominant objects in a very general setting where only a single un labeled image is given. This is far more challenge than typical co-localization or weakly-supervised localization tasks. To tackle this problem, we propose a simple but effective pattern mining-based method, called Object Location Mining (OLM), whi...
 Understanding complex biological phenomena involves answering complex biomedical questions on multiple biomolecular information simultaneously, which are expressed through multiple genomic and proteomic semantic annotations scattered in many distributed and heterogeneous data sources; such heterogeneity and dispersion hamper the biologists’ ability...
 Matrix factorization (MF), a popular unsupervised learning technique for data representation, has been widely applied in data mining and machine learning. According to different application scenarios, one can impose different constraintson the factorization to find the desired basis, which captures high-level semantics for the given data, and lea...
 Bitcoin and its decentralized computing paradigm for digital currency trading are one of the most disruptive technology in the 21st century. This paper presents a novel approach to developing a Bitcoin transaction forecast model, DL Forecast, by leveraging deep neural networks for learning Bitcoin transaction network representations. DL Forecast ...
 User identification across multiple datasets has a wide range of applications and there has been an increasing set of research works on this topic during recent years.However, most of existing works focus on user identification with a single input data type, e.g., (I) identifying a user across multiple social networks with online data and (II) dete...
 In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increas...
 Malaria is one of the deadliest diseases ever exists in this planet. Automated evaluation process can notably decrease the time needed for diagnosis of the disease. This will result in early onset of treatment saving many lives. As it poses a serious global health problem, we approached to develop a model to detect malaria parasite accurately from ...
 About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously moves with ...
 To keep pace with the developments in medical informatics, health medical data is being collected continually. But, owing to the diversity of its categories and sources, medical data has become so complicated in many hospitals needs a clinical decision support (CDS) system for its management. To effectively utilize the accumulating health data, we ...
 The rapid development of e-learning and the use of LMS (moodle) have triggered some universities and schools in Indonesia to develop e-learning. However, most of their e-learning materials or contents still underuse the powerful features available in the LMS. The powerful features of the LMS are described and discussed along with their educational ...
 In WSN network there is Cyber Attack occurs are one of the most common and most dangerous attacks among cybercrimes. The aim of these attacks is to steal the information used by individuals and organizations to conduct transactions. Phishing websites contain various hints among their contents and web browser-based information. The purpose of this s...
 Ultrasound (US) imaging is used to provide the structural abnormalities like stones, infections and cysts for kidney diagnosis and also produces information about kidney functions. The goal of this work is to classify the kidney images using US according to relevant features selection. In this work, images of a kidney are classified as abnormal i...
 Ridesharing is a mobility concept in which a trip is shared by a vehicle’s driver and one or more passengers called riders. Ridesharing is considered as a more environmentally friendly alternative to single driver commutes in pollution-creating vehicles on overcrowded streets. In this paper, we present the core of a new strategy of the ridesharing ...
 For the emerging mobility-on-demand services, it is of great significance for predicting passenger demands based on historical mobility trips to achieve better vehicle distribution. Prior works have focused on predicting next-step passenger demands at selected locations or hotspots. However, we argue that multi-step citywide passenger demands encap...
 This paper discusses the adoption of chatbots and virtual Assistants by different category of banks (private sector banks and public sector banks) in India. The research paper presents a brief introduction of banking industry in India, history, characteristics, and architecture of chatbots and virtual assistants. The research paper also included ba...
 Orphanage is the name to describe a residential place dedicated for orphans whose parents are dead. Parent and grandparent are legally responsible for taking up the responsibility of taking care of their grandchildren, but in case both parents and grandparents, or other relations willing to take up the responsibility of the children, they lose all ...
 Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service user p...
 ? Fake currency is the money produced without the approval of the government, it is considered as a great offence. Most of them are doing it as a profession. Fake currency causes major issues in our economic growth and also it will decrease the value of original money. There are various methods available to fiused to detect these fake notes. We are...
 India is the cultivating country and our country is the biggest maker in agricultural products. So, we have to classify and exchange our agricultural products. Manual arranging is tedious and it requires works. The automatic grading system requires less time for grading of the agricultural products. Image processing technique is helpful in examinat...
 Recently, fake news is shared via social networks and makes wrong rumors more diffusible. This problem is serious because the wrong rumor sometimes makes social damage by deceived people. Fact-checking is a solution to measure the credibility of news articles. However the process usually takes a long time and it is hard to make it before their diff...
 Recently, fake news is shared via social networks and makes wrong rumors more diffusible. This problem is serious because the wrong rumor sometimes makes social damage by deceived people. Fact-checking is a solution to measure the credibility of news articles. However the process usually takes a long time and it is hard to make it before their diff...
 Rust is a severe disease affecting many productive coffee regions. It is caused by pathogenic fungi that attack the underside of coffee leaves and it is characterized by the presence of yellow-orange and powdery points. If not treated, rust can cause a drop in coffee production of up to 45%. In this sense, this paper presents a contribution to the ...
 Injuries due to road accidents are one of the most prevalent causes of death apart from health related issues. The World Health Organization states that road traffic injuries caused an estimated 1.35 million deaths worldwide in the year 2016. That is, a person is killed every 25 seconds. This calls for the need to analyse road accidents and the fac...
 Tumour is the undesired mass in the body. Brain tumour is the significant growth of brain cells. Manual method of classifying is time consuming and can be done at selective diagnostic centers only. Brain tumour classification is crucial task to do since treatment is based on different location and size of it. Magnetic Resonance Imaging (MRI) is mos...
 At the moment, identification of blood disorders is through visual inspection of microscopic images of blood cells. From the identification of blood disorders, it can lead to classification of certain diseases related to blood. This paper describes a preliminary study of developing a detection of leukemia types using microscopic blood sample images...
 Machine learning techniques have been widely used for abnormality detection in medical images. Chest X-ray images (CXR) are among the non-invasive diagnostic tools used to detect various disease pathologies. The ambiguous anatomical structure of soft tissues is one of the major challenges for segregating normal and abnormal images. The main objecti...
 Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing. Intrusion detection is one of the technologies for protecting the cloud computing environment from malicious attacks. However, network traffic in the cloud computing environment is charac...
 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...
 Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot sa...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com