Archives

2018

Vol 3, No 2 (2018): A Survey on Smart Agriculture with Cloud Computing Storage Using Internet of Things

Authors:-Ajith Jerom B, Rajamohana Sp

Abstract:-Agriculture plays vital role in the development of agricultural country and agriculture is the back bone of India. In India about 70% of population depends upon framing and one third of the nation’s capital comes from framing. Issues about the agriculture have been always hindering the development of the country. The perception of smart agriculture is flattering a truth as it involves different models for the development of crop at different stages. In traditional agriculture, cultivation of plants, vegetables, fruits will be used to sustain and enhance human life. In our nation cultivation is much reduced due to lack of interest, scarcity of agriculture land water and some framers with their own interest still cultivating the land at present. But that was also yields to very less production due to lack of awareness about the dry lands, no usage of pesticide timely and suitable crops for the land. Hence now days the smart agriculture has come into the depiction globally that helps in increasing and the productivity and solving issues caused due to the critical environment factors. This paper surveys about the using of IoT sensors with the cloud environment for testing and monitoring the soil. Testing the soil type and quality consists of many tests, such as bulk density test, respiration test, moisture test and also it is important to check the water quality. In viewing of the results obtained by the above tests the device suggests the crop for the framer and it also helps him for the maintenance of the crop.

Vol 3, No 2 (2018): Survey Paper on Intelligent Motorized shopping cart with evolved Billing scheme

Authors:-Bhagyashree, Ranjita Naik, Sahana Hegde, Sindhu Hegde, Anal B

Abstract:-Shopping mall is a place where people buy their products for the daily purpose. There has been an emerging demand for quick and easy payment of bills in shopping malls. Quite often, when shopping in a supermarket shoppers are frustrated at locating the items on the shopping list and no assistance is available. To overcome these problems we have designed a smart trolley with a mobile application. This provides an app which helps the customers in finding the location of the product. It also provides a centralized and automated billing system using RFID. Each product of shopping mall, super markets will be provided with a RFID tag, to identify its type. Each shopping cart is implemented with a Product Identification Device (PID) that contains microcontroller, LCD, an RFID reader. Purchasing product information will be read through a RFID reader on shopping cart and it is displayed in LCD which is interfaced to the controller. At the billing counter, the total bill will be transferred to PC by Bluetooth module.

Vol 3, No 1 (2018): Prediction Model for Identifying Crime Trends in Cities

Authors: Pooja Gull, Sparsha B M, Nithya A, Panimozhi K

Abstract: Enhancing security around our general public is one of the major challenging issues. This paper is a point by point study about the endeavours that have been made to enhance the forecast of crime intensity utilizing machine learning and big data to help the citizens to remain in a sheltered zone. In this manner, the sort of study discussed here will help reveal the crime rate of an area progressively.

Vol 3, No 1 (2018): A Study on Importance of Mobile Banking and Internet Banking

Author: Kaamini Sharma

Abstract: Ever since the nationalization of banks in India, this sector has been growing without Leaps and bounces and catering to the needs of various segments of the society. In recent times, the Banking Sector has been making rapid straights by using information technology as a platform and endeavoring to scale higher heights. . Technology includes all maters concerned with the furtherance of computer science and technology and with the design, development, installation and implementation of information system and applications. Information technology architecture is an integrated framework for acquiring and evolving IT to achieve strategic goals. Information and communication technology cover 13 facilities but mobile and internet banking covers more area in compare to other facilities. An attempt has been made in this paper to explore importance of Mobile Banking and Internet Banking.

Vol 3, No 1 (2018): Survey on Needle Tip Estimation Methods

Authors: Jeena Johnson, Liya Thomas

Abstract: A method for estimating the needle tip has previously been developed combining a modified Hough transform, image filters, and machine learning. This paper improves that method by introducing a dynamic selection of the region of interest in the US images and filtering the tracking results using either a Kalman filter or a particle filter. Automating the insertion of a needle by using a robot could increase the accuracy and decrease the execution time of the procedure.


2017

Vol 2, No 3 (2017): Self Protecting Smart House Using Pervasive Computing

Authors: Korade Ganesh, Gaikwad Rucha, Sabale Minal

Abstract: Emerging pervasive computing solutions provide anytime, anywhere computing by decoupling users from devices and viewing applications as entities that perform tasks on user behalf. A context-aware application uses an entity context to modify its behavior to best meet the user needs in that context. Such applications can be used in various application domains, such as smart homes. A self protecting smart home uses networked sensors, devices, and appliances to build an intelligent environment in which many features outside the home are automated and where devices and services seamlessly cooperate to support user. Infrastructure and commercial products exists for home automation. The popularity of home automation has increased but ubiquitous living has not been adopted in everyday life yet even though the visions for it has been around for several years. In this paper we looks into self protecting smart homes and evaluates existing and planned ubiquitous interfaces intended for the home use. In this paper, we propose a context-aware infrastructure for building applications in a self protecting smart home environment.

Vol 2, No 3 (2017): n Efficient Video Processing Technique to Detect Movie Piracy Using Map Reduce

Authors: P Srinivasa Rao, N.Susma Rani, T. Chaitanya Kumar, S. Vidyasagar Appaji

Abstract: Now days movies are streaming on internet as soon as they are going to release in the market. In this digital era movies are pirated during transmission from one location to another. Once the copy is pirated that affects the revenue of the movie industry there are many approaches implemented to detect the movie piracy. The paper proposes a visible watermarking technique on video to detect whether the movie is pirated or not. While implementing the watermark technique the data become massive to handle these massive data the traditional tools are not suitable for processing. The process for video watermarking is very time consuming. Hardtop map reduce environment is considered for rapid implementation of video watermarking technique. The experimental results show that the developed framework out performs well in video processing when compared to existing tools.

Vol 2, No 2 (2017): Agile Condor: Pod Based Computing

Authors: Shrutika Narhari, Sudam Pawar

Abstract: The Agile condor is a scalable and high performance embedded computing system increases computational capability within the restrictive size, weight and power constraints of aircraft system external pod payload. The inside pod is a lightweight thermally efficient industry standard 3U conduction cooled chassis. It's support requirement board and interface hardware. Agile condor brings high performance computing closer to neuromorphic computing and autonomous system operation.It's objective is enable scalable real-time processing for intelligence surveillance and reconnaissance (ISR) missions, Weigh less than 60 pounds, Consume less than 500 Watts of power. It Deliver over 15 GFLOPS/Watt (enabled by GPUs).Develop a rugged pod-based external payload. Design to support Group 3-5 DoD unmanned aerial systems (UAS).Agile Condor will support a rapid response to unexpected challenges. Agile condor software is designed in real time processing and support post processing in air, ground and sea. It uses neuromorphic techniques. It capabilities will be demonstrated using processing algorithm with SAR(Synthetic Aperture Radar) algorithm. In agile condors components are uses processing and computing different that is a scalable computing, autonomous operation, information processing, massive analytics, SAR,MTI etc.

Vol 2, No 2 (2017): Mind Reading using Eye Tracking

Authors: Nirupa Susan Philipose, Nishana Moyan, Nivea Peter, Surekha Mariam Varghese, Linda Sara Mathew

Abstract: Judging a person’s character using physical tests is not always accurate as they may voluntarily change their answers. Hence a new way of understanding ones personality is introduced by calculating their interest level on the basis of various factors like the first picture the person looks at, the amount of time he/she stares at an image etc. Here using a webcam we track the gaze movement of a person’s eye and determine the required values. The gaze capturing is done by displaying images in an interface and then the gaze feature is extracted from the captured image which depends on number of times the user’s gaze lies at a particular image. The displayed images are in such a way that each image corresponds to different characters portrayed by humans. A combination of images is selected based on the persons interest level and using an algorithm we determine the most likely character description for that person. Thus the proposed work constitutes a less complex method for gaze tracking using a webcam.

Vol 2, No 1 (2017): Embedded Monitoring and Control

Authors: Pooja Sutar , S. G. Pawar

Abstract: Modern web applications make frequent use of third-party scripts, often in ways that allow scripts loaded from external servers to make unrestricted changes to the embedding page and access critical resources including private user information. This paper introduces tools to assist site administrators in understanding, monitoring, and restricting the behavior of thirdparty scripts embedded in their site. We developed Script Inspector, a modified browser that can intercept, record, and check third-party script accesses to critical resources against security policies, along with a Visualize tool that allows users to conveniently view recorded script behaviors and candidate policies and a Policy Generator tool that aids script providers and site administrators in writing policies. Site administrators can manually refine these policies with minimal effort to produce policies that effectively and robustly limit the behavior of embedded scripts.

Vol 2, No 1 (2017): Automated Essay Scoring using Neural Network

Authors: Steve Thomas, Steephen Joseph, Basil Sunny, Surekha Mariam Varghese, Aby Abahai T

Abstract: Traditional automated essay scoring systems rely on carefully designed features to evaluate and score essays. The performance of such systems is tightly bound to the quality of the underlying features. However, it is difficult to manually design the most informative features for such a system. In this paper, we develop an approach based on recurrent neural networks to learn the relation between an essay and its assigned score, without any feature engineering. We use Long Short-Term Memory neural network model for the task of automated essay scoring and perform some analysis to get some insights of the model. The results show that our system, which is based on long short-term memory networks, outperforms a strong baseline by 5.6% in terms of quadratic weighted Kappa, without requiring any feature engineering.

Vol 2, No 1 (2017): Mood Aware Music Player Using Neural Networks

Authors: Rafid O, Vishnu S, Mohammed Ameen Z, Linda Sara Mathew

Abstract: Music has long been a way for people to express their emotions. And because we all have a wide variety of emotions, music comes in all types of styles. Mood is an effective state that plays a significant role in our lives, influencing our behavior, driving social communication, and shifting our consumer preferences. Music can be used to elevate the mood of a person. The tempo, rhythm and pitch of music are managed in areas of the brain that deal with emotions and mood. Even though we are living in an age of digital devices which have many sensors to understand the physical world around them, they are unable to develop insight about the object that matters the most, the user. In our project, this ability of music can be used to develop a mood aware music player which automatically senses the mood of user and uses this prediction to recommend songs in his/her library according to current mood. Our application classifies the user's mood into one of the following: happy, sad, angry, fear and disgust. We use the rhythmic features of the songs to classify them into following moods: happy, feel good and sad. The mood sensor that we implement is a system that recognizes user’s mood from their smartphone usage patterns. Personalized training can be used to learn the user’s mood along with smart phone usage patterns for a specified time period. After the system is trained for this duration, it can then predict the mood of the user and suggest songs to match his/her mood or to elevate the mood of user if he/she is feeling upset or stressed.


2016

Vol 1, No 1 (2016): Bank Notes Authentication System based on Wavelet Features and Artificial Neural Network

Authors: Ch. Ratna Jyothi, Dr. Y.K. SundaraKrishna, Dr.V.SrinivasaRao

Abstract: 

Monetary transactions are an integral part of our day to day activities, so currency authentication has become one of the active research areas of late, and it shows a vast potential for different applications. In this paper, we introduce a system to verify the authentication of banknotes’ bench mark dataset using computer vision.We considered 1372 samples of various bank notes in our work. The technology of currency authentication aims to search and extract potential features of paper currency for efficient classification. Features were extracted from images that were taken from genuine and forged banknote-like specimens. They are classified using Artificial Neural network. The variance of Wavelet Transformed image (continuous), skewness of Wavelet Transformed image (continuous), curtosis of Wavelet Transformed image (continuous), entropy of image (continuous) features are extracted from images for accurate classification. Our proposed system authenticates bank notes with zero percent misclassification.


1 - 13 of 13 Items