Diabetic retinopathy (DR) produces bleeding, exudation, and new blood vessel formation conditions. DR can damage the retinal blood vessels and cause vision loss or even blindness.
If DR is detected early, ophthalmologists can use lasers to create tiny burns around the retinal tears to inhibit bleeding and prevent the formation of new blood vess...
|
Background: In today's competitive job market, graduates are encountering enormous challenges while their transition from education to employment. Most of the existing platforms do not provide access to a wide array of job opportunities comprehensively.
This limitation spans both the private and government sectors, as well as international employ...
|
Background: This problem requires an innovative approach to enhance the efficiency and transparency of faculty self-appraisal in the university settings. Through a robust web-based platform, the system should address the complexities associated with traditional evaluation processes. It should capture and manages intricate details of faculty activit...
|
Background: A lack of adequate career counselling and guidance in schools contributes to poor career choices among students, leading to mismatched skills, job dissatisfaction, and unemployment. In India, many students and their families are unaware of the diverse career opportunities available, often leading to choices based on limited information ...
|
Background: Children with Specific Learning Disability (SLD)who faces challenge of writing during their academic life especially during examinations where they need the provisions of a scribe. The purpose of rehabilitating people with disabilities is to reduce the dependence on other people.
In order to achieve this fundamental right to be indepe...
|
Learn while you play is considered the most effecting way of teaching. Internet/mobile based games could be one of the best ways to lure school kids, youth and water enthusiasts to learn the nuances of ground water management.
With this backdrop it is proposed to develop an internet/mobile based game that teaches good practices in groundwater con...
|
Background: Education and awareness are critical components of the National Anti-Doping Agency’s mission to promote clean sport. Despite ongoing efforts, the reach and impact of current educational initiatives remain limited, particularly in remote and rural areas. The rapid advancement of technology presents an opportunity to bridge these gaps and...
|
Background: Student dropout rates in India are influenced by socio-economic and educational factors, affecting marginalized communities the most. Addressing dropout rates is essential for equitable education and socio-economic development. The National Education Policy (NEP) 2020 emphasizes the importance of reducing dropout rates and ensuring qual...
|
Background: Alumni associations play a pivotal role in fostering lifelong connections between graduates and their alma mater, facilitating networking, mentorship, and philanthropic support. However, many alumni associations face challenges in maintaining engagement, facilitating donations, and providing valuable services such as job networking and ...
|
Background: India has a tremendous opportunity to harness the potential of its youth by addressing the skills gap between education and industry requirements. While vocational education programs exist, they are often undervalued compared to traditional academic paths and need enhancement to provide students with the skills demanded by today’s job m...
|
Background: “Inclusivity” is the motto of Education department, Government of Gujarat. Opportunity for all is the new slogan and The Indian Government has come up with Indian Sign Language. There has been lot of work in done in American sign language and focusing on interpretation in English.
Majority schools in India adopt local language. In Guj...
|
Background: For a much simplified and initial solution, input (publication record) can also be provided in a consolidated single .bibtex file. However, it is desirable to provide input as an excel sheet, as mentioned earlier.
Description: The proposed solution should be able. Instructor shall have educational resources files in different formats ...
|
Background: For a much simplified and initial solution, input (publication record) can also be provided in a consolidated single .bibtex file. However, it is desirable to provide input as an excel sheet, as mentioned earlier.
Description: The proposed solution should be able. Instructor shall have educational resources files in different formats ...
|
Problem Overview Innovation is a key driver of growth and success in educational institutions. Tracking and measuring innovation excellence is essential for fostering a culture of continuous improvement, recognizing achievements, and guiding strategic decisions. However, identifying, quantifying, and presenting innovation indicators can be challeng...
|
Description: 1. Background: For a much simplified and initial solution, input (publication record) can also be provided in a consolidated single bibtex file. However, it is desirable to provide input as an excel sheet, as mentioned earlier.
2. Description: The proposed solution should be able to crawl different popular academic databases, like Go...
|
Project Concept: Comprehensive Employment Platform/Portal The current employment portal lacks a personalized and adaptive approach to job matching and skill development. There is a need for an intelligent system that not only matches job seekers with potential employers but also identifies and suggests training courses to bridge skill gaps.
We wi...
|
Background: There are numerous engineering and polytechnic institutes in Rajasthan running under the Department of Technical Education, Government of Rajasthan. Notably, during the admission process, there is a significant increase in enquiries from various groups, including students, their parents, and other stakeholders.
These enquiries cover a...
|
Description: The world today has bought on a need to pay increased attention to safety and security issues, for example, search and rescue operations, surveillance, and protection of critical infrastructure. These tasks are often labour intensive and potentially dangerous. This provides an incentive to create systems that aid operators to gain situ...
|
Breast cancer is one of the leading causes of death in women. Early detection through breast ultrasound images is important and can be improved using machine learning models, which are more accurate and faster than manual methods.
Previous research has shown that the use of the logistic regression, svm and random forest algorithms in breast can...
|
Background: The use of Earth Observation Satellite (EOS) technology for estimation of seasonal Actual Evapotranspiration (AET) of crops at various growth stages is well establishd. Due to low levels of water metering in irrigation, it is challenging to control theft from canals and unauthorized ground water extractions.
Therefore, ET based techno...
|
Cyberbullying is when someone is bullied using technology as an intermediary. Despite the fact that it has been a problem for many years, the impact on young people has just recently become more widely recognized.
Bullies thrive on social media platforms, and teens and children who use them are vulnerable to attacks. A copious amount of usergener...
|
To help consumers enjoy healthy food, technology investigation for food freshness sensing is conducted. In this study meat is selected as the detection target based on a consumer survey CO2, TVOC, and MQ135 are investigated.
The results showed that CO2 and TVOC could be a used for food freshness sensing in a closed space such as box. In today's w...
|
Background: Disaster response agencies often stuggle to gather timely and specific information about emergencies from various sources. Social media platforms serve as a valuable repository of such data, but manually monitoring and sorting through the vast amount of information is inefficient and resource-intensive.
Description: There is a pressin...
|
Background: Milk is perishable product, it requires immediate processing after few hours (2-4Hrs) of production, otherwise, bacterial load increases and milk gets deteriorate. At present Methytene Blue Dye Reduction Test, commonly known as MBRT test is used as a quick method to assess the microbiological quality of raw and pasteurized milk.
This ...
|
Background: During CSSR (Collapsed Structure Search and Rescue) operations, NDRF teams encounter challenges in identifying buried deceased bodies amidst rubble and debris. Traditional search methods are often time-consuming and labor-intensive, hampering the timely recovery of victims and increasing the risk of further casualties. Description: THe ...
|
Background: Glacial Lake Outburst Floods (GLOFs) occur when the dam containing a glacial lake fails, releasing large volumes of water suddenly and causing catastrophic downstream flooding. Climate change is increasing the number and size of glacial lakes, heightening the risk of GLOFs. Curent monitoring and prediction methods can be improved with a...
|
Background: Angiography is a common medical imaging technique used to visualize the inside of blood vessels and detect blockages. Description: However, typically medical tests like radionuclide angiography involve the use of radioactive contrast agents, which can pose risks to patients, including radiation exposure and allergic reactions.
There i...
|
Background: Yoga has gained global recognition for its numerous health benefits, including physical fitness, mental well-being, and stress reduction. As part of India's ancient heritage, yoga is a key component of the AYUSH (Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy) systems of medicine, promoting holistic health practices.
In ...
|
In this paper, we demonstrate a practical system for automat ic weather-oriented clothing suggestion, given the weather information, the system can automatically recommend the most suitable clothing from the user s personal clothing album,or intelligently suggest the most pairing one with the user specified reference clothing.
This is an extrem...
|
Background: Himachal Pradesh, a northern state in India, is renowned for its apple production, contributing significantly to the local economy and livelihoods. With an annual apple production of approximately 600,000 metric tons, the region's apple orchards face challenges related to tree health monitoring, nutrient management, pest and disease con...
|
The Department of Consumer Affairs monitors the daily prices of 22 essential food commodities through 550 price reporting centres across the country. The Department also maintains buffer stock of pulses, viz., gram, tur, urad, moon and masur, and onion for strategic market interventions to stabilize the volatility in prices.
Decisions for market ...
|
Background: Crop diseases can devastate yields, leading to significant financial losses for farmers. Early detection and timely intervention are crucial for effective management. Description: Develop an AI-driven system that analyzes crop images and environmental data to predict potential disease outbreaks.
This system will provide farmers with a...
|
Nowadays, home loan is a frequently accessed component of people’s financing activities. Homeowners wants to increase the probability of loan acceptance, however banks seek to borrow money to low risk customers.
This paper compared and examined the machine learning models to select when loan applicants evaluating their probability of success. Thi...
|
Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time.
There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
|
Background: Use of encrypted messaging/social media apps like Telegram, WhatsApp and Instagram for drug trafficking are on the rise. Channels operating on Telegram and WhatsApp and Instagram handles are blatantly being misused by drug traffickers for offering various narcotic drugs and Psychotropic substances for sale. Description: WhatsApp and Tel...
|
Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure.
Description: The a...
|
Background: NCIIPC shares detail of cyber incidents to corresponding stakeholders in order to inform them about cyber activities related to their IT/OT infrastructure.
This empowers them to take necessary actions to mitigate further risk. Description: In order to achieve objective of protecting Critical Information Infrastructure (CIIs) of the Na...
|
Background: Many organization are using Cloud for hosting their web applications. The attackers can try to attack these webservers for achieving Denial of Service attack. Specifically, Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by ...
|
Background: In today’s digital age, a wide variety of services and processes take place online. Users of these digital facilities are required to upload government-issued containing documents or provide data for successfully availing the services. However, the uploaded documents or data which are required to facilitate these digital services and pr...
|
Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase “Positive”, “Negative” or “Neutral”.
It analyzes the data and labels the ‘better’ and ‘worse’ sentiment as...
|
The recent technological advancement in digital computers has provided a more robust computer based operations in modern industrial society, including manufacturing, transport and distribution, government, the military, health services, education and research.
This impact of modern digital computers as an irreplaceable tool for technological grow...
|
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Credit card fraud detection is a relevant problem that draws attention of machine learning. In the fraud detection task, there are some peculiarities present, such as the unavoidable condition of a strong class imbalance, the existence of unlabelled transaction, and the large number of records that must be processed.
The present paper aims to pro...
|
Stock marketplace is a complicated and demanding system in which people make more money or lose their entire savings. The stock market prediction having high accuracy yields more profit for stock investors.
Stock market data is generated in a very large amount and it varies quickly every second. The decision making in stock marketplace is a very ...
|
The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification.
For student identification, a fingerprint recog...
|
As artificial intelligence (AI) develops quickly, Python has become the de facto fully object-oriented programming language. Python'ssimplicity, language variety, and vast library ecosystem make it a valuable tool for image processing .
This research study examines Python's role in image processing in detail, outlining its benefits, drawbacks, a...
|
Day by day the cases of heart diseases are increasing at a rapid rate and it’s very Important and concerning to predict any such diseases beforehand. This diagnosis is a difficult task i.e. it should be performed precisely and efficiently.
The research paper mainly focuses on which patient is more likely to have a heart disease based on various m...
|
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Accurately classifying brain tumor types is critical for timely diagnosis and potentially saving lives. Magnetic Resonance Imaging (MRI) is a widely used non-invasive method for obtaining high-contrast grayscale brain images, primarily for tumor diagnosis.
The application of Convolutional Neural Networks (CNNs) in deep learning has revolutioniz...
|
The purpose of this project is to detect the fraudulent transactions made by credit cards by the use of machine learning techniques, to stop fraudsters from the unauthorized usage of customers’ accounts.
The increase of credit card fraud is growing rapidly worldwide, which is the reason actions should be taken to stop fraudsters.
Putting a ...
|
Online transactions have become a significant and crucial aspect of our lives in recent years. It's critical for credit card firms to be able to spot fraudulent credit card transactions so that customers aren't charged for things they didn't buy.
The number of fraudulent transactions is rapidly increasing as the frequency of transactions increa...
|
: In this paper, we are implementing a credit card fraud detection system, by using big data technologies. Credit card is one of the most divisive products among all the financial tools available.
The usage of credit cards has become common in today’s world and huge volume of transaction happens online. The increase in these transactions has al...
|
Frauds in credit card transactions are common today as most of us are using the credit card payment methods more frequently. This is due to the advancement of Technology and increase in online transaction resulting in frauds causing huge financial loss.
Therefore, there is need for effective methods to reduce the loss. In addition, fraudsters f...
|
Health is very important for human life. In particular, the health of the brain, which is the executive of the vital resource, is very important. Diagnosis for human health is provided by magnetic resonance imaging (MRI) devices, which help health decision makers in critical organs such as brain health.
Images from these devices are a source of...
|
Most of the smart phone users prefer to read the news via social media over internet. The news websites are publishing the news and provide the source of authentication.
The question is how to authenticate the news and articles which are circulated among social media like WhatsApp groups, Facebook Pages, Twitter and other micro blogs & social n...
|
OCR is used to identify the character from human written text. To recognize the text segmentation of character is important stage. So here, we addressed different techniques to recognize the character.
This document also presents comparison of different languages for character and numeral recognition with its accuracy achieved by different writer...
|
The main purpose of this project is to build a face recognition-based attendance monitoring system for educational institution to enhance and upgrade the current attendance system into more efficient and effective as compared to before.
The current old system has a lot of ambiguity that caused inaccurate and inefficient of attendance taking. Ma...
|
Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases.
We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication.
The primary step o...
|
As we are approaching modernity, the trend of paying online is increasing tremendously. It is very beneficial for the buyer to pay online as it saves time, and solves the problem of free money.
Also, we do not need to carry cash with us. But we all know that Good thing are accompanied by bad things.
The online payment method leads to frau...
|
Brain tumor detection is a critical application in the field of medical imaging, aimed at aiding healthcare professionals in the early and accurate diagnosis of brain tumors. This project leverages machine learning and deep learning techniques in Python to developa robust and reliable brain tumor detection system.
The system undergoes sensitivi...
|
In recent years, due to the booming development of online social networks, fake news for various commercial and political purposes has been appearing in large numbers and widespread in the online world.
With deceptive words, online social network users can get infected by these online fake news easily, which has brought about tremendous effects...
|
Building a quantum analog of classical deep neural networks represents a fundamental challenge in quantum computing.
A key issue is how to address the inherent non-linearity of classical deep learning, a problem in the quantum domain due to the fact that the composition of an arbitrary number of quantum gates, consisting of a series of sequenti...
|
The deployment of automated deep-learning classifiers in clinical practice has the potential to streamline the diagnosis process and improve the diagnosis accuracy, but the acceptance of those classifiers relies on both their accuracy and interpretability.
In general, accurate deep-learning classifiers provide little model interpretability, whi...
|
predicting stock market is one of the challenging tasks in the field of computation. Physical vs. physiological elements, rational vs. illogical conduct, investor emotions, market rumors, and other factors all play a role in the prediction.
All of these factors combine to make stock values very fluctuating and difficult to forecast accurately. ...
|
Decades of research have shown machine learning superiority in discovering highly nonlinear patterns embedded in electroencephalography (EEG) records compared with conventional statistical techniques.
However, even the most advanced machine learning techniques require relatively large, labeled EEG repositories.
EEG data collection and lab...
|
This is a panel paper which discusses the use of Artificial Intelligence (AI) techniques to address production level problems in semiconductor manufacturing.
We have gathered a group of expert semiconductor researchers and practitioners from around the world who have applied AI techniques to semiconductor problems and the paper provides their a...
|
Cerebrovascular diseases such as stroke are among the most common causes of death and disability worldwide and are preventable and treatable.
Early detection of strokes and their rapid intervention play an important role in reducing the burden of disease and improving clinical outcomes.
In recent years, machine learning methods have attracte...
|
To meet the requirements of high accuracy and low cost of target classification in modern warfare, and lay the foundation for target threat assessment, the article proposes a human-machine agent for target classification based on active reinforcement learning (TCARL_H-M), inferring when to introduce human experience guidance for model and how to au...
|
In India, there are continuously more criminal cases filed, which results in an increase in the number of cases still outstanding. These ongoing increases in criminal cases make them challenging to categorise and resolve.
Therefore, it's crucial to identify a location's patterns of criminal activity in order to stop it from happening in order to ...
|
In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients’ data at any point of time.
Secure cloud storage protocols enable a client to check integrity of outsourced data. In this article, we explore the possibili...
|
Machine learning (ML) can make use of agricultural data related to crop yield under varying Crop based nutrient levels, and climatic fluctuations to suggest appropriate crops or supplementary nutrients to achieve the highest possible production.
The aim of this study was to evaluate the efficacy of five distinct ML models for a dataset sourced ...
|
In our day to day life we consume food and our survival is based on mainly food. A considerable amount of our food is coming from farms and other means too. These farmers do their hard work for growing and serving many lives across the country, which pays for their source of income. But due to intermediates in the selling of their final product...
|
Social networks have become a powerful information spreading platform. How to limit rumor spread on social networks is a challenging problem.
In this article, we combine information spreading mechanisms to simulate real-world social network user behavior. Based on this, we estimate the risk degree of each node during the hazard period and analy...
|
The present study aims to elucidate the main variables that increase the level of depression at the beginning of military conscription service using an artificial neural network (ANN)-based prediction model.
Random sample data were obtained from one battalion of the Lithuanian Armed Forces, and a survey was conducted to generate data for the tr...
|
Hazards from landslides are everywhere. Landslides are more likely to occur on steeply sloped hillsides. For several case studies throughout the globe, researchers have performed landslide prediction, detection, and monitoring.
The major goal of researching landslide detection is to stop natural disasters by seeing their early movement. This wi...
|
Fingerprint authentication is one of the most popular and accurate technology. Our project is a fingerprint attendance system that records the attendance of students based on their fingerprint matches them against the database to mark their attendance.
Fingerprint-based attendance system used for ensures that there is a minimal fault in gatheri...
|
|