Role of Human-Computer Interaction |
Author : Mr. Aditya S Patel |
Abstract | Full Text |
Abstract :Human-Computer Interaction is the way in which humans interact with technologies, business, managerial, organizations. This article describes the existence and importance of human computer interaction and future research. It is believed that Human Computer Interaction is the subject of a strong research stream in Management Information System, and will continue to be strong in the future. The topics will include the psychology of human-computer interaction, psychologically-based design methods and tools, user interface media and tools, and introduction to user interface architecture. |
|
Design and Implementing of Roof Ventilator in Small Scale Industry for Future Prospective |
Author : Ms. Ashwini Pawar, Ms. Amruta Dhuri, Ms. Riya Patil, Prof. Bhushan Save |
Abstract | Full Text |
Abstract :This paper gives an idea about a futuristic method for producing electricity with the help of Renewable energy driven by wind. The Rooftop Ventilator works on the simple principle of wind-assisted rotation and stack effect. Several electrically active material is assigned on the turbine ventilator under the wind speed in the surrounding are ultimately assesses the efficiency of wind harvest. This concept resembles with DC generator. This paper prominence on the materials and the construction methodology for developing the Rooftop power generating system. Thus, a roof ventilator reduces air- conditioning energy use and increases the occupant comfort level. It can become a grand success for any industry/factory for using an electricity saver item. |
|
Brainwave Controlled Wheelchair (BCW) |
Author : Rubini Pulliadi, Suchan Khade, Jiteshkumar Yadav, Nutan Malekar |
Abstract | Full Text |
Abstract :The locomotive disabled people and elderly people cannot control the wheelchair manually. The key objective of this paper is to help the locomotive disabled and old people to easily manoeuvre without any social aid through a brainwave-controlled wheelchair. There are various types of wheelchair available in the market such as Voice controlled wheelchair, Joystick control wheelchair, Smart phone controlled wheelchair, Eye controlled wheelchair, Mechanical wheelchair. These wheelchairs hold certain limitations for e.g. if the user is dumb; user cannot access voice controlled wheelchair, etc. Brain-computer interface (BCI) is a new method used to interface between the human mind and a digital signal processor. An Electroencephalogram (EEG) based BCI is connected with an artificial reality system to control the movement and direction of a wheelchair. This paperproposes brainwave controlled wheelchair, which uses the captured EEG signals from the brain. This EEG signals are then passed to Arduino. It converts into control signals which will in turn help to move the wheelchair in different direction. |
|
GIS aided Urban Planning for preparation of Micro-Level Plan of Channenahalli Village, Bengaluru |
Author : Gireeja M. Sarangdhar, Shishir Dadhich |
Abstract | Full Text |
Abstract :We all know the fact that the surface of earth is spherical and not a plane, and thus in the field of Town Planning we observe errors in an actual plan or map of a region when it comes to its implementation. For smaller areas such as a plot or a small township where the land can be considered to be flat the level of errors observed is less or the accuracy rate is high compared with the larger areas such as a development plan or structural plan or regional plan or even Town Planning Schemes. Remote Sensing & GIS were initially recognized as supporting tools for planning, monitoring, and managing the appropriate utilization of the earth resources. However, due to their multidisciplinary applications and integration with numerous other scientific and technological fields, in the recent years they have become a distinct field of study.
In this paper we are going to learn about how GIS and remote sensing helps in the preparation of a map with respect to actual ground co- ordinates and various uses of the same in the field of Urban Planning with an actual work done on field under the guidance of experts in Directorate of Urban Land Transport, Urban Development Department, Government of Karnataka. |
|
Detecting Alive Human Using Robot for Rescue Operation |
Author : Deepakkumar Gupta, Prakash Gupta, Rakesh Yadav, Prof. Umesh Mohite |
Abstract | Full Text |
Abstract :In the current technological world, the technologies are evolving day by day. These developments make human life easier and more enthusiastic. The new high-speed technologies & growing computer capacity provides advancement in the field of control theory. In the modern world, there are continuous development of the skyscraper buildings & dwellings which increases the risk of losing life by natural calamities and manmade disasters. During earthquakes, landslides, and building collapse, a lot of times, humans are trapped under debris and it becomes impossible to detect their presence by the rescue team. Sometimes, it is impossible to reach certain locations in calamity affected zone. Many models have been proposed for detection of human’s presence under the debris in affected zone. This paper analyses various models developed to find the alive human being during natural calamities. |
|
Study of MPS Under Stressed Conditions |
Author : Ms. Shwetali Kiran Churi |
Abstract | Full Text |
Abstract :This study is done to access the chemical stability of the candidate compound in the pharmaceuticals. Usually, it is performed at the preliminary stage in the process of drug development. Forced degradation/ stress testing is performed under accelerated environment. The experimental conditions cause the candidate compound to degrade under extreme conditions like acid and base hydrolysis, peroxide oxidation, photo-oxidation and thermal stability to identify the resultant degradation products. This helps to establish degradation pathways and thus intrinsic stability of a drug substance. The stability of product describes shelf life and storage conditions and helps in the selection of appropriate formulations and their suitable packaging. This is compulsory for regulatory documentation. The commonly used analytical approach for FDS is HPLC with UV and/ or MS but these techniques consume a lot of time and not provide high resolution to confirm the precise detection of degradation products. Use of UPLC with photodiode array and MS analysis supports the identification of degradation products and also reduces the time needed to evolve stability indicating methods. |
|
http://www.viva-technology.org/New/IJRI/2020/5.html |
Author : Aakash Jamsutkar, Shubham Jangle, Hardik Karpe, Chetan Kate |
Abstract | Full Text |
Abstract :In recent conditions, the system used for washing cars is based on high speed water jet. The cleaning consists of removing dust, mud and dirt particles. This system uses a huge amount of water during cleaning. Prewashing is done using foam which makes the water not reusable. Hence a drainage system is required for removing this wastewater. Hence to overcome this problem car washing using steam is preferred. The Car Washing system using steam uses the force of steam that can clean things up. It has been discovered that steam washing is very convenient and no soapy forms are required that can make the washing much clumsy. The reason behind the use of steam for washing is the reduced waste of water. The development of the steam cleaning system can revolutionize the washing process. Steam does what the commercial washing system cannot do. Steam can easily clean dust and dirt, while for normal cleaning require expensive detergents. So, our main goal is to use steam and do cleaning without affecting or damaging car paint. |
|
System for Fingerprint Image Analysis |
Author : Rahul R Kale, Mayur M Pawar, Pradnya J Jadhav, Prof. Umesh Mohite |
Abstract | Full Text |
Abstract :As we know the fingerprint is unique of every living objects. It is quite difficult to find out the prints. Usually the Forensics use Fine powder and duct tapes to identify the prints of living object. As powder is exceptionally muddled, so such molecule can cause loss of information after that examination the information is coordinated with the system. The proposed system consists of an embedded device in which it consists of ultra light to glow the fingerprints details. After that we can detect the fingerprint, analysis and it will checks on the database, and it will return the output after matching. For matching and analysis of the Fingerprint, we will be using the Algorithm for matching. |
|
Feature Extraction and Feature Selection using Textual Analysis |
Author : Hemlata Badwal, Prof. Chandani Patel |
Abstract | Full Text |
Abstract :After pre-processing the images in character recognition systems, the images are segmented based on certain characteristics known as “features”. The feature space identified for character recognition is however ranging across a huge dimensionality. To solve this problem of dimensionality, the feature selection and feature extraction methods are used. Hereby in this paper, we are going to discuss, the different techniques for feature extraction and feature selection and how these techniques are used to reduce the dimensionality of feature space to improve the performance of text categorization. |
|
Portable Solar Desalination Plant |
Author : Vinayak Rai, Manish Tambat, Musavvir Shaikh, Shalin Shah, Prof. Suneet Mehta |
Abstract | Full Text |
Abstract :Desalination is a process of converting sea water into fresh water which can be used by people for their daily uses. Man has always looked for oceans to enjoy the benefit of water. Some of the early discoveries of it is by Aristotle and others. The people of that time came up with distillation and filtration using soil deposits to obtain drinking water from the sea. After that many methods came of desalination like reverse osmosis, etc. and were used and thermal energy method was found cheapest and hence we came to know that we can use this processing a portable desalination plant. The potential of thermal energy is huge all around the world and it has been used in various processes all around. It is used for desalination process which will cure the problem of scarcity of water in the world and mostly in the water drought regions in India. This project is focused on making fresh water from sea water in the cheapest price available and in very small setup. |
|
DESIGN AND FABRICATION OF FLOATING SOLAR POWER PLANT |
Author : Saurav Gawali |
Abstract | Full Text |
Abstract :The constant depletion of the fossil fuels and high energy demand focuses us to renewable energy sources which are not only the future unlimited sources of energy it is also eco-friendly and sustainable for the environment. even though solar power generation , the major problem is the requirement of land which is scarcely available in the world and its cost . A new era in solar power I.e. ,floating solar power plant will solved this issue. This floating solar plant can be installed in any water bodies which will not only decrease the cost of the land but also will raise the amount of generation with the cooling of water. The hight energy demand and the constant consumption of the fossil fuels lead us to shift our focus to renewable energy sources which are not only the future unlimited source of energy, it is also eco-friendly and viable for the environment . hydro and wind though are renewable sources but area specific. solar energy on the other hand can be installed in any place. The major issue with the solar energy is the requirement of land which is scarcely available in the world and even costly to get .but floating solar plant can be installed in any water bodies which will not only reduce the cost of the land but will increase the amount of generation with the cooling effect of water. |
|
Waste management of hospital waste in COVID-19 |
Author : Hemant Yadav |
Abstract | Full Text |
Abstract :under the topic ‘Waste Management in COVID-19’ we have studied the problems occurring during waste management & their disposal specially biomedical wastes during critical situations and tried to find out some better solutions for them than available ones . For project we have used the resources like internet, topic related articles , research papers etc. We have also visited an hospital for data collection regarding hospital’s daily waste management and processes like collection of waste , separation , treatment etc. to make the project very precise, practical & effective also. So using resources and by analysing the data we have found some solutions for safe treatment of biomedical waste which was our main focus |
|
A Review on Data Mining from Past to the Future |
Author : Rohit.U.Desai |
Abstract | Full Text |
Abstract :Data Mining is that the data discovery method by analyzing the massive volumes of {information} from numerous views and summarizing it into helpful information. Advancements in Statistics, Machine Learning, AI, Pattern Recognition and Computation capabilities have evolved this day’s data processing applications and these applications have enriched the varied fields of human life together with business, education, medical, scientific etc. therefore this paper discusses the varied enhancements within the field of knowledge mining from past to this and explores the longer term trends. |
|
Cloud Computing -AWS |
Author : Manish Pandey |
Abstract | Full Text |
Abstract :Amazon Web Services offers an overall set of global cloud-based products including compute, storage, databases, analytics, networking, mobile, developer tools, management tools, IoT, security, and business applications : on-demand, open in seconds, with pay-as-you-go pricing. From data warehousing to deployment implements, guides to scope delivery, over 200 AWS services are open.[8] New assistance can be provisioned fast, without the upfront fixed cost. This allows businesses, start-ups, small and medium-sized businesses, and customers in the public sector to access the formation blocks they need to respond quickly to changing business needs[7] |
|
BitStream-The Rescue Messenger |
Author : Aditi Verma |
Abstract | Full Text |
Abstract :In the last decade, there is an increase in natural disasters observed. In such situations, social media become an important resource to warn and get informed about disaster situations. Communication breakdown between emergency responders & trapped people causes difficulties in the evacuation process. So, Communication is important to find help in disasters. Apart from other solutions to the problem present in the market none of them is as energy-efficient this paper proposes a solution that uses a LoRa. It will be user-friendly and does not require any license to access it. With BitStream, users can send a customized message with GPS location over the LoRA network. Also, it is integrated into mobile devices to improve functionality. |
|
ARTIFICIAL INTELLIGENCE IN INFORMATION SYSTEMS |
Author : Unnati Jain |
Abstract | Full Text |
Abstract :AI provides opportunities to reinvent business models , change the future of work, performance improvements , and even enhance human capabilities. There is, however, a growing concern that research on AI could experience a lack of cumulative building of knowledge. This study addresses this concern, by conducting a systematic literature review of AI research in IS between 2005 and 2021. In doing so, this study makes important contributions, namely (i) an identification of the reported business value and contributions of AI, (ii) research on the use of AI in IS and(iii) opportunities for future AI research in information systems |
|
Smart Glasses |
Author : Farhana Abdullah |
Abstract | Full Text |
Abstract :Smart glasses are portable and portable devices that display information simultaneously directly in front of the customer point of view using Augmented Reality (AR) Techniques. Generally, they can also perform complex tasks, run other applications, and support internet connections. This research paper provides a framework for alternative approaches to facilitating interaction-based interactions with intelligent glasses, as well as specific design considerations. In addition, it discusses the social consequences that could lead to a wide range of smart glasses and possible security concerns. Head-worn displays (HWD) have recently received significant attention, mainly due to the release of the temporary version of Google Glass. Additionally, we look forward to the launch of the Google Glass-one commercial in the coming months with the latest news from Facebook, Inc. Oculus Rift-2 amplifies the popularity of such devices even further. The volatility of mobile device purchases is growing significant and some business analysts predict more than 20 million Google Glass annual sales in 2018. In addition, researchers have been studying and testing HWD for several years |
|
Web technology for web development |
Author : Akanksha Vidyadhar Tamore |
Abstract | Full Text |
Abstract :The general idea of the new version of Hyper Text Markup Language (HTML) and other tools presented in this paper is the establishment of uniform solutions for technologies and functions which have already been in use by various plugins proposed by developers. Many of these functions are now implemented in browsers. Latest version of HTML also introduces semantic markup, which can be used for marking the document structure as well as its elements and data. The new version of HTML enforce separation of the content of the page from it is style. The latest version of CSS has a modular structure, in which different modules define different styling features. The development cycles of the individual modules are independent , their support and implementation in various browsers. |
|
Bioinformatics and Data Sciences |
Author : Shelo Chakkalakkal |
Abstract | Full Text |
Abstract :Bioinformatics is an interdisciplinary science of analysing and interpreting biological data by application of statistics, computational methodologies, and information technology. Due to the large amount of genome, proteomics, and other data generated, the analysis and interpretation of such biological datasets requires the use of data science and data mining tools.. Hence, researchers are required to rely on data-science tools to store and analyse the data. Data science is an interdisciplinary science that uses algorithms and scientific methods to derive information and insights from big data. The strategies promote investigation and advancement of innovative methods to improve the incorporation of big data and data science into biological research. Advances in data science and computers provide viable analytical techniques for processing huge biological data. |
|
A study on Interplanetary File System based on Blockchain |
Author : Aditi Dilip Kudu |
Abstract | Full Text |
Abstract :The Interplanetary File System (IPFS) is a distributed file system that seeks to decentralize the web and to make it faster and more efficient. It incorporates well- known technologies, including BitTorrent and Git, to create a swarm of computing systems that share information. Since its introduction in 2016, IPFS has seen great improvements and adoption from both individuals and enterprise organizations. Its distributed network allows users to share files and information across the globe. IPFS works well with large files that may consume or require large bandwidth to upload and/or download over the Internet. The rapid adoption of this distributed file system is in part because IPFS is designed to operate on top of different protocols, such as FTP and HTTP. However, there are underpinning concerns relating to security and access control, for example lack of traceability on how the files are accessed. The aim of this paper is to complement IPFS with blockchain technology, by proposing a new approach (BlockIPFS) to create a clear audit trail. BlockIPFS allows us to achieve improved trustworthiness of the data and authorship protection, and provide a clear route to trace back all activities associated with a given file using blockchain as a service. |
|
Role of IoT Technology in Agriculture |
Author : Mr. Ashish.A.Tiwari |
Abstract | Full Text |
Abstract :Internet of Things (IoT) the agricultural sector in India is declining day by day which affects the productive the capacity of the ecosystem. Agriculture is the most important aspect of man. To make good decisions, farmers need knowledge throughout the farming cycle. An information data flow model is developed that connects the various scattered sources and plant structures. IoT is important for the development of the agricultural sector. This paper aims to enable the agricultural sector to use automation, agriculture and IoT Technologies. |
|
Android Mobile Operating System and Architecture |
Author : Dinesh Dipak Devkar |
Abstract | Full Text |
Abstract :Android mobile operating system is a mobile phone operating body built through Google mainly for touchscreen tools, smartphones, & tablet computers. It will undoubtedly begin with Android Architecture, which is consists of five degrees: first Linux piece, second Libraries, third Application structure, fourth Android runtime, & fifth System apps. Android operating system is multi-user Linux device in which each application is a different customer. Mobile applications have change the interaction from conventional antiqued methods & fast-forwarded. The Mobile applications softwares have provided more significant than social networking sites functionalities. The Ordering food products, inspecting profile harmony, & creating a grocery store checklist are achievable utilizing mobile phone requests & many more. Apple & Google mobile operating systems have carried out significant improvements in the industry of mobile phones market. Mobile uses made our lifestyles less complicated & easy, yet it has also unfavorably affected our lifestyles too. Current researches state that making use of a mobile phone on continue basis for long time may lead to anxiety. Our research paper describes the information about the android operating system & its components & how they interconnected with each other, & in today’s era,it can change the way of communication. |
|
Need For Cyber Security And Cyber Law Awareness |
Author : Ms. Sminal Patil |
Abstract | Full Text |
Abstract :Cyber Security is the method of protection of computer systems and networks from information disclosure, robbery or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide and Cyber law is the part of the overall legal system that deals with the Internet, Cyberspace, and their respective legal issues. The field is becoming rapidly significant due to the continuously growing reliance on computer systems, the Internet and wireless networks like Bluetooth and Wi-Fi, and also due to the growth of all smart devices, including smartphones, TVs, and the various devices that constitute IoT. Digital technologies and networking provide number of benefits to us in different fields like e-commerce, banking, communication but because of cybercrime, a new criminal methodology also arises. To stop this cybercrimes, proper knowledge and awareness of cyber laws is important among people. The main objective of our research paper is to aware every individual with Cyber Security, Cybercrimes, Cyber Laws in India and the Precautions which we secure our self from these cybercrimes. |
|
Augmented and Virtual reality technologies with Adaptive Learning Systems |
Author : Ms. Juhi Chaudhari |
Abstract | Full Text |
Abstract :Augmented Reality (AR) is a technology that switch the location and timing of learning and training. It also provides admirable possibilities within education and much more excitingly reconceptualise eLearning. It also has an ingenious learning area through blending digital learning products into the structure of media with materials that are primary parts of the real area therefore as a result developing situated education. This paper shows the significance and need of Augmented Reality in education and higher education and in Reality-Virtuality Process in virtual learning abode. The current state and bearing of the use of augmented reality (AR) and virtual reality (VR) technologies as pertinent means of improving the educational process are considered. In particular, recognition is given to the potential of the combined capabilities of AR and VR technologies with adaptive learning systems. |
|
Cloud Computing |
Author : Rahul Mestry |
Abstract | Full Text |
Abstract :Cloud computing has grown significantly as Amazon launched its first type of service in 2006. Hong Kong is highly suited to Hong Kong due to its unimaginable amount of data used on a daily basis in several fields, and there are signs that you have subscribed to pall service area. real companies will soon be at the photography course, despite the slow launch in the early stages. As a test team, pall computing now surpasses any schedule of motifs in computer intelligence due to its far-reaching proposition in many computer fields, especially big data that outside of pall computing is a big evidence. The current construction of a major R&D canter in Hong Kong by Lenovo (January 2015) confirms this fact. Cloud computing, a computer-life dream as a mile, has the potential to transform a large portion of IT assiduity, making the software more attractive as a service and shaping the way IT is designed and purchased. Developers with new ideas for developing new online services do not have to face the huge costs required to do their job or the ongoing costs to operate. |
|
5G Technology in India |
Author : Namrata Sambhaji Redekar |
Abstract | Full Text |
Abstract :The entire world is moving with mobility at an ultra-fast speed in the utmost minimum time but in India the situation is different, With the creating passion of high data speed in India and addition in the amount of customers from the latest period the present development of 3G and 4G wont have the choice to satisfy the requiring services of the customers ? In this manner the evolution of the best framework called as 5G Technology is significant. As the expectation of the public increases with the advancement of technology comes into picture, the services that can be obtained using the telecom networks have extended. In This paper we will summarize the main initiatives toward 5G technology in India. This paper briefly discusses how this technology will provide changes or a huge impact on India, apart from this we discuss the architecture and working of 5G, its features, Benefits and we have also outlined the broader usage of 5G and its future impacts on our lives. We discuss the Reality of 5G in India and what are the main challenges India is facing in launching 5g. How to tackle them. Furthermore, at the end of each subtopic the necessary recommendations are given. |
|
Text Summarization |
Author : Vaibhav Apraj |
Abstract | Full Text |
Abstract :As we enter the 21st century, with the advent of mobile phones and access to information stores, we seem to be surrounded by more information, less time, or the ability to process it. The creation of automated summaries was a clever human solution to this complex problem. However, the application of this solution was very complicated. In fact, there are a number of problems that need to be addressed before the promises of an automated text can be fully realized. Basically, it is necessary to understand how people summarize the text and build a system based on that. However, people are different in their thinking and interpretation that it is difficult to make a "gold standard" summary in which product summaries will be tested. In this paper, we will discuss the basic concepts of this article by providing the most appropriate definitions, characterization, types and two different methods of automatic text abstraction: extraction and extraction. Special attention is given to the method of extraction. It consists of selecting sentences and paragraphs that are important in the original text and combining them into a short form. It is mentally simple and easy to use. |
|
Models in Cloud Computing |
Author : Akshay Patil |
Abstract | Full Text |
Abstract :This Research paper deals with various service models and deployment models provided by cloud. Cloud computing is the delivering of compute services such as databases, storage facilities, virtual machines, servers etc. Thus, cloud reduces the cost for infrastructure and maintenance, which in turn will allow the enterprises to focus on core business processes. Cloud-based computing also allows the users to pool the resources to its users effectively and efficiently. According to NIST, there are three recognized service models and three recognized deployment models. Service models include Infrastructure as a Service, Software as a Service and Platform as a Service. Deployment models include A) Public cloud, B) Private cloud, C) Community cloud, D) Health cloud E) Hybrid cloud. This study paper discusses these models, along with the other models which are provided by the cloud and service providers who provide these kinds of services. |
|
Text Summarization |
Author : Vaibhav Apraj |
Abstract | Full Text |
Abstract :As we enter the 21st century, with the advent of mobile phones and access to information stores, we seem to be surrounded by more information, less time, or the ability to process it. The creation of automated summaries was a clever human solution to this complex problem. However, the application of this solution was very complicated. In fact, there are a number of problems that need to be addressed before the promises of an automated text can be fully realized. Basically, it is necessary to understand how people summarize the text and build a system based on that. However, people are different in their thinking and interpretation that it is difficult to make a "gold standard" summary in which product summaries will be tested. In this paper, we will discuss the basic concepts of this article by providing the most appropriate definitions, characterization, types and two different methods of automatic text abstraction: extraction and extraction. Special attention is given to the method of extraction. It consists of selecting sentences and paragraphs that are important in the original text and combining them into a short form. It is mentally simple and easy to use. |
|
Face Recognition Technology |
Author : Nagendra.P.Mahato |
Abstract | Full Text |
Abstract :Face recognition technology is a advance biometric technology, which is based on the identification and
verification of facial features of a person and any other devices. People are collecting the face images, and the recognition
equipment automatically processes the images. This paper introduces the related researches of face recognition from
different perspectives. This paper describes the development stages and the related technologies of face recognition
technology. We introduce the research of face recognition technology for real conditions, and we are introducing the
general evaluation standards and the general databases of face recognition technology. We give a forward and high
looking viewof face recognition technology. Face recognition technology has become the future development direction,
scope and has many high potential application prospects. |
|
Credit Card Fraud Detection |
Author : Jay Anil Chamare |
Abstract | Full Text |
Abstract :The use of credit cards for online and regular purchases is growing exponentially with related fraud.
A large number of fraudulent activities are performed on a daily basis. Various modern techniques such as Data
Mining, Genetic Programming, etc. used in obtaining fraudulent sales. This paper uses a genetic algorithm that
combines strategies to find the right solution to a problem and to produce a transparent result of counterfeiting.
The main purpose is to detect fraudulent activity and to improve the production of test data. This algorithm is a
heuristic method used to solve complex computer problems. It is a method of optimization and evolutionary search
based on genetic and environmental selection. Implementing a fraud detection system is important for all credit
card issuers and their customers to minimize their losses. |
|
Augmented Reality in the Field of Travel & Tourism during Covid-19 Pandemic |
Author : POOJA GUPTA |
Abstract | Full Text |
Abstract :The pandemic outbreak of COVID-19 in 2020 has affected the tourism industry, with international
travel bans affecting the world populations. It is impact spread across all spheres of life, be it health or society
or economy. With self-centered expanded reality (AR) use expanding lately, the usage of this innovation has a
potential intending to wellbeing correspondence and conduct intercessions challenges. One innovation
empowering self-centered AR is video channels, which superimpose PC created content onto a client utilizing
their web or cell phone camera (eg, Snap chat Lenses and AR impacts on Instagram). For instance, Snapchats
Time Machine AR focal point transforms a clients appearance to show what the client may resemble at various
ages. |
|
Strategies and techniques of Banking security and ATMs |
Author : Shivam Chaurasiya |
Abstract | Full Text |
Abstract :Security may be a major issue in cash dispenser Machine (ATM).with the wide unfold utilization of electronic transactions its necessary to extend customers recognition accuracy. Biometric systems can give a convenient and secure mode of authentication to the shoppers.Nowadays the banking sector is one among the foremost vital elements of an individuals day to day life. Banking facilities are unit wide used by folks for his or her economies activities.cash dispenser Machine (ATM) is an electronic machine that is employed for accessing a checking account from anyplace while not requiring the assistance of bank workers. The user will perform many banking activities like money withdrawal, cash transfer with the assistance of an ATM. its discovered that the numbers of crime associated with ATM magnification thus have to be compelled to offer higher security to ATM machines. |
|
A review on use of btrfs file system in Linux operating systems |
Author : Rohit Jha |
Abstract | Full Text |
Abstract :BTRFS (B-tree Filesystem) is a modern file system developed for Linux Operating System. It has
been adopted as the default file system in many distributions like SUSE and OpenSUSE, and almost all major
distributions ship it as an optional file system. It is based on copy-on-write which allows snapshots and clones.
It uses a B-tree structure as its main data structure. Its main features and benefits include Snapshots, RAID
support, Self-healing capabilities, among others. A linux filesystem could be put in on an smartphone as well as
on the enterprise servers. This demands the resolution of many challenges like Scalability, Data integrity and
Disk diversity to make any file system usable on a particular system. This paper describes the basic idea,
algorithms, data structures, current development, and changes used in this file system. It also discuss the
challenges posed by disk defragmentation in the presence of snapshots. |
|
AI BASED TRASH CLEANING ROBOT |
Author : Mrs. Meena Perla, Abhishek Khandekar, Vishvesh Khanvilkar, Aman Kutrekar |
Abstract | Full Text |
Abstract :The objective of the project is to design an automatic AI robot which can segregate the waste with the help of object detection .It includes different partitions of water using camera with a robotic arm for picking and placing of waste . The system will be useful in making waste management in smart cities automation, people are busy in their professional life and they forget to pay attention to their surroundings problem which can led to may hazardous disease. The project is aimed to minimize the human efforts to clean the waste and to make Blue planet Blue again. From the interest and need of cleaning contaminations in the house hold, this project idea has been created to suit the prerequisite of working in house, giving more decisions for the utilization of cleaning garbage and waste from the floor. |
|
Software Development Using Python Language For Designing Of Servomotor |
Author : Prerana Ramteke, Rinkal Patil, Mahesh Gujare, Chitralekha Vangala |
Abstract | Full Text |
Abstract :A servomotor (or servo motor) is a rotary or direct knob that allows precise control of angular or direct position, rapidness, and acceleration. It consists of a suitable motor coupled to a position feedback detector. Servomotors have high strand capabilities. Servomotors are also known as control motors. The main aim of this design is to experimentally demonstrate the modelling and designing of servo motor using a python rested graphical user interface. This system focuses on the parameter setting, analog and digital accession, programming and HMI( Human Machine Interface) with GUI( Graphical User Interface) setting of servo motor designing. Servo Motors have high strand capabilities. Servomotors are also known as control
motors. Unlike large mechanical motors, they are not used for running energy conversion but only for precise speed and precise position control at high strands. The main aim of this design is to experimentally demonstrate the modelling and designing of servo motor using a python rested graphical user interface. It also aims at combining a servo motor with. In order to meet the demands of high accuracy, liableness and real- time control of servo motors we have proposed this design. This design focuses on the parameter setting, analog and digital accession, programming and HMI( Human Machine Interface) with GUI( Graphical User Interface) setting of servo motor designing and control system |
|
Accelerate Quantum Computing with AWS Braket |
Author : Prof.Pradnya Mhatre,Priyanka Rajendraprasad Goud,Shivani Jalindar Kakade |
Abstract | Full Text |
Abstract :Amazon braket is a completely controlled AWS service that facilitates researchers, scientists, and developers get started out with quantum computing. Quantum computing cansolve computational troubles past the reach of classical computers as it harnesses the legal guidelines of quantum mechanics to system statistics in new approches. Amazon braket is designed to offer quantum computer customers with remote get right of entry to a single development environment. The service was announced in December 2019 and is presently to be had in preview mode. Its costly and inconvenient to gain access to quantum computing hardware. restrained get entry to makes it tough to run algorithms, optimize designs, compare the contemporary kingdom of the era, and plan for when to make investments your sources for maximum advantage. Braket enables you over come those challenges. |
|
Security Issues in Cloud Computing |
Author : Prof. Krutika Vartak, Rupendra Kumar Jangid |
Abstract | Full Text |
Abstract :Abstract : Cloud computing has come a vital tool for businesses and individualities to store and access data and operations. Still, with the adding reliance on Cloud services comes an increased threat of security breaches and data loss. The security concerns in cloud computing, such as data breaches, unauthorized access, and lack of transparency, are explored in this paper. also, the paper explores implicit results to these issues, similar as enforcing strong authentication protocols, encryption, and regular security checkups. Its important for associations to be apprehensive of these security pitfalls and take applicable measures to cover their data and systems in the Cloud. |
|
Decentralization and web3 technologies |
Author : KRUTIKA VARTAK, VISHAL YADAV, RUSHABH PRAKASH PAWAR |
Abstract | Full Text |
Abstract :These days, most of the people of the net’s content material cloth and user statistics are managed with the aid of some huge tech groups. There can be a developing movement to devolve this control lightly across the whole net, representing the transition to Web3. For this motion to be successful, era and protocols ought to be superior to allow internet customers to use the net securely without trusting every other consumer. These days, the internet depends simply so customers must accept as true one corporation, so accepting as true with fewer options hasnt already been superior. Considerably, this movement emphasizes growing peer-to-peer networks, blockchains, and distributed garage structures. Those structures appoint cryptographic primitives to assure security. |
|