The document summarizes a literature review on existing digital lost and found systems. It identifies several common gaps across different papers, including issues related to location tracking, security, user incentives, and limited functionality. Specifically, papers often lack a holistic approach considering the full user experience and adaptability to different contexts. To address these gaps, future projects should aim for comprehensive solutions that enhance security, user engagement, inclusivity, and explore locating missing individuals and advanced search techniques. This could result in more effective, secure and user-friendly lost and found systems with broader applicability.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Student Attendance Management System by Using Fingerprint ReaderIRJET Journal
The document presents a student attendance management system that uses fingerprint recognition to address issues with traditional manual attendance tracking methods. The system aims to streamline the attendance process, minimize errors, and enhance security by leveraging biometric technology. It employs fingerprint scans to uniquely identify each student and record attendance accurately while eliminating proxy attendance. The proposed methodology outlines developing the system by defining requirements, designing the architecture and interface, collecting and recognizing fingerprints, integrating hardware and software, testing functionality and security, and backing up data for recovery.
Fingerprint Based Attendance System by IOTIRJET Journal
This document summarizes a research paper that proposes a fingerprint-based attendance system using Internet of Things (IoT) technology. The system uses a NodeMCU microcontroller, fingerprint sensor module, and Google Sheets to record student attendance via fingerprint scans. Fingerprint data is uploaded securely to the cloud server in Google Sheets. This automated system aims to reduce the inefficiencies of manual attendance recording systems by eliminating fake attendances, saving time, and securely storing attendance data in the cloud. The system implementation involves a fingerprint scanner connected to a microcontroller and WiFi module to upload fingerprint IDs to Google Sheets in real-time.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
This document describes the development of an Android-based campus information system application. The application allows students and staff at an engineering college to access information like attendance, marks, notifications, and search campus buildings and locations. It uses the Firebase database to securely store and manage user and college data. The application aims to simplify accessing campus information and make it easier to navigate the campus. It replaces the need for paper records and provides a centralized information system for the college. Key features of the application include attendance tracking, result viewing, notifications, and an on-campus search and navigation system. The application is meant to benefit the college community by streamlining access to important information through a mobile app.
Controlling Anti Ragging System using AndroidIRJET Journal
This document describes a proposed Android app called the "Controlling Anti Ragging System" to address the issue of ragging (harassment/bullying of younger students by older ones) in Indian educational institutions. The key features of the app include:
1) An automatic alert system that sends a message to administrators if a user shakes their phone to report an incident of ragging.
2) Emergency contact details for administrators like the principal and dean to file complaints directly.
3) An option for users to post details of their complaint and view the status of previously posted complaints.
4) The proposed system is designed to make it easy for users to report ragging incidents immediately so timely action can
A Survey: Data Leakage Detection Techniques IJECEIAES
Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey. This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Student Attendance Management System by Using Fingerprint ReaderIRJET Journal
The document presents a student attendance management system that uses fingerprint recognition to address issues with traditional manual attendance tracking methods. The system aims to streamline the attendance process, minimize errors, and enhance security by leveraging biometric technology. It employs fingerprint scans to uniquely identify each student and record attendance accurately while eliminating proxy attendance. The proposed methodology outlines developing the system by defining requirements, designing the architecture and interface, collecting and recognizing fingerprints, integrating hardware and software, testing functionality and security, and backing up data for recovery.
Fingerprint Based Attendance System by IOTIRJET Journal
This document summarizes a research paper that proposes a fingerprint-based attendance system using Internet of Things (IoT) technology. The system uses a NodeMCU microcontroller, fingerprint sensor module, and Google Sheets to record student attendance via fingerprint scans. Fingerprint data is uploaded securely to the cloud server in Google Sheets. This automated system aims to reduce the inefficiencies of manual attendance recording systems by eliminating fake attendances, saving time, and securely storing attendance data in the cloud. The system implementation involves a fingerprint scanner connected to a microcontroller and WiFi module to upload fingerprint IDs to Google Sheets in real-time.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
This document describes the development of an Android-based campus information system application. The application allows students and staff at an engineering college to access information like attendance, marks, notifications, and search campus buildings and locations. It uses the Firebase database to securely store and manage user and college data. The application aims to simplify accessing campus information and make it easier to navigate the campus. It replaces the need for paper records and provides a centralized information system for the college. Key features of the application include attendance tracking, result viewing, notifications, and an on-campus search and navigation system. The application is meant to benefit the college community by streamlining access to important information through a mobile app.
Controlling Anti Ragging System using AndroidIRJET Journal
This document describes a proposed Android app called the "Controlling Anti Ragging System" to address the issue of ragging (harassment/bullying of younger students by older ones) in Indian educational institutions. The key features of the app include:
1) An automatic alert system that sends a message to administrators if a user shakes their phone to report an incident of ragging.
2) Emergency contact details for administrators like the principal and dean to file complaints directly.
3) An option for users to post details of their complaint and view the status of previously posted complaints.
4) The proposed system is designed to make it easy for users to report ragging incidents immediately so timely action can
A Survey: Data Leakage Detection Techniques IJECEIAES
Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey. This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
Automated Invigilation System for Detection of Suspicious Activities During E...IRJET Journal
This document discusses an automated invigilation system to detect suspicious activities during examinations. It begins with an abstract that outlines how such systems use technologies like facial recognition, eye tracking and screen recording to monitor exams and identify cheating. While these systems could improve exam security and reduce cheating, they also raise privacy and ethical concerns that require careful consideration. The document then reviews related work on automated invigilation systems and their ability to accurately detect various cheating behaviors through computer vision and machine learning algorithms. It also discusses the need to balance technology-based approaches with other integrity strategies like improving instruction. Overall, the document evaluates automated invigilation as a potential method for enhancing academic integrity, but notes its effectiveness depends on addressing constraints and ethical issues.
This document describes a fingerprint-based folder locking system that aims to improve upon traditional password-based authentication. It discusses the drawbacks of password systems, such as the need to remember passwords and the risk of passwords being cracked. The proposed system uses fingerprint authentication to unlock private files. It involves capturing a user's fingerprint using a scanner, generating a unique ID, and allowing the user to lock and unlock files associated with their fingerprint ID. The system chunks large files for more efficient processing and uses multiple fingerprint matches for verification. This multimodal biometric approach provides another layer of security compared to passwords alone. The system aims to make file access more secure and convenient by replacing the risks of password authentication with fingerprint identification.
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
This document presents a proposed mobile application-based attendance system for educational institutes using speech recognition. The current paper-based manual attendance marking system is prone to errors. The proposed system allows teachers to take attendance using a mobile app that converts student speech responses to text using Android speech libraries. Attendance records can then be uploaded to a server for monitoring. The system provides privileges for students, faculty, heads of departments and administrators. It aims to provide an accurate, automated alternative to traditional attendance systems and remove issues like impersonation.
Semantic Web concepts used in Web 3.0 applicationsIRJET Journal
This document discusses how semantic web concepts can be used in applications for Web 3.0. It provides examples of how semantic web could be applied in areas like medical sciences, search engines, and e-learning. Specifically, it describes how semantic web could help integrate medical data from different sources, enable more accurate medical diagnosis and treatment recommendations based on patient history. It also discusses how a semantic search engine like Swoogle works by tagging web pages with metadata to better understand context and return more relevant search results. Finally, it touches on how a semantic web architecture could enable more sophisticated e-learning systems by linking educational resources.
IRJET- Review Paper of Design and Implementation of an Intelligent Biomet...IRJET Journal
This document summarizes previous research on designing an intelligent biometric attendance system using IoT. It discusses how previous systems used RFID or fingerprint biometrics to automate attendance tracking but had issues like students using other students' cards or slow fingerprint matching. The document then proposes a new hybrid system that uses both fingerprint biometrics and IoT to address these issues. It suggests capturing fingerprints using a sensor and securely storing data in the cloud for real-time attendance tracking from anywhere. This would allow automated attendance without risks of fraud or manual errors while providing flexibility and remote access to attendance records.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
IRJET - Labtrust-Android Application for Pathology LaboratoryIRJET Journal
This document describes the development of an Android application called LabTrust to digitize pathology laboratory services. The application aims to address issues with the existing manual system such as wasted time and effort managing paper records, potential for errors, and inconvenience for patients. The proposed system would allow patients and laboratories to communicate electronically and share digital test reports. It would save patient time and resources by allowing them to easily access and share reports with doctors. The application would be developed in modules including a user interface, links between pages and the database, and backend database. Technologies used include Android Studio, .NET, Java, and Firebase. The system is intended to streamline the patient process and make work easier for both patients and doctors.
This document describes an in-house file tracking system designed for large organizations. The system digitalizes the traditional paper-based method of tracking files as they are transferred between departments. It uses barcodes to uniquely identify files and track their status and location. The system is built using web technologies like Python for the backend and has a multi-layer architecture. It includes interfaces for logging in, viewing files, creating new files, and dispatching files between departments. The system aims to automate file tracking to reduce delays and improve workflow across an organization.
The document describes a proposed online platform called the "Student University Network" that aims to streamline interactions between students and educational institutions. The platform would allow teachers to post announcements and course materials, and enable activities like managing timetables and recording attendance automatically. It would consist of an Android app for students and teachers and a web app for administrative functions. The platform aims to integrate academic activities and automate tasks to reduce workload for both students and institutions. It was developed to address current problems with the disorganization of communicating over multiple platforms like WhatsApp and managing schedules and attendance manually.
Employment Performance Management Using Machine LearningIRJET Journal
This document discusses using machine learning techniques to analyze employee performance. Specifically, it proposes using a support vector machine (SVM) algorithm to identify employee performance based on factors like quality, timeliness, and cost. The document reviews related literature on using both traditional and data-driven approaches to performance assessment. It then outlines the proposed system for building a software tool to manage employee performance data using SVM. Key steps in the SVM algorithm are described. The document concludes that improving individual performance can boost business results and SVM is effective for differentiating between two groups of data.
IRJET - Visual E-Commerce Application using Deep LearningIRJET Journal
This document discusses developing a visual e-commerce application using deep learning for object recognition. It proposes a system with three phases: 1) scanning real-time objects using an Android app and YOLO algorithm for object detection, 2) detecting the objects, and 3) recommending similar products to the user. The goal is to make e-commerce searching more user-friendly by allowing image-based searches rather than relying solely on text. This could help illiterate users and improve the shopping experience overall. The document reviews related work on object recognition techniques and visual search engines to provide context.
IRJET- Intelligent Laboratory Management System based on Internet of Thin...IRJET Journal
This document describes a proposed intelligent laboratory management system based on Internet of Things (IoT) and machine learning. The system uses an STM32 microcontroller, RFID reader, and Raspberry Pi to automate student attendance tracking and course information display. It also analyzes student performance data using machine learning algorithms like XGBoost to predict academic performance and help educators evaluate student progress and identify areas for improvement. The system aims to standardize and optimize laboratory management with an intelligent, automated approach.
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETIRJET Journal
This paper presents an approach for analyzing stock market news articles using web scraping, natural language processing, machine learning, and data visualization techniques. Key aspects of the approach include:
1) Web scraping is used to collect stock market news articles from various online sources.
2) Data preprocessing with Pandas cleans and structures the data. Sentiment analysis then categorizes the sentiment of each article as positive, negative, or neutral.
3) Matplotlib and other tools are used to visualize sentiment trends in an easily interpretable way to help identify patterns and aid decision making.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
This document discusses securing data in distributed systems using blockchain and artificial intelligence. It first provides background on increasing data storage needs and security issues as data is shared over networks. It then reviews past research on using blockchain and AI to provide data security. Several studies introduced blockchain-based approaches to improve security in areas like IoT data, public key infrastructure, video surveillance, and decentralized storage. However, most lacked extensive testing or formal verification. The document concludes that combining blockchain for its tamper-proof properties with access control mechanisms could effectively secure sensitive health record data by restricting unauthorized leakage.
This document describes the development of a digital wallet app to allow users to securely store important documents such as ID cards, certificates, and notes. The app uses two-factor authentication for login involving biometric authentication and one-time passwords. Documents are stored in encrypted SQL databases. The app provides features for uploading documents, accessing and searching stored documents, and sharing documents with others through secure links. The goal is to provide a convenient way for users to digitally store and access important documents while maintaining high security and privacy standards.
NOVEL APPROACH TO MANAGE EVENTS IN THE ORGANIZATIONSIRJET Journal
This document presents a novel approach for managing events in organizations. It proposes a web-based tool with modules for registration, login, event creation, event registration, reporting, and feedback. The tool allows users and administrators to interact to perform daily event management activities. It was designed for educational institutions but can also be used by other organizations. The tool addresses limitations of previous manual systems by automating event data collection and report generation. It provides a centralized system to efficiently organize, conduct, and document events.
IRJET- Shopping Mall Experience using Beacon TechnologyIRJET Journal
The document proposes a system that uses beacon technology to track customers in retail shops and provide personalized discounts based on their shopping patterns. Beacons set up in shops would detect customers' locations via Bluetooth signals from their smartphones. This information would be sent to a server to analyze customers' purchase histories and send personalized offers. The system aims to improve customers' shopping experiences and increase retailers' sales by offering targeted discounts to customers based on their identified preferences and shopping behaviors.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
Automated Invigilation System for Detection of Suspicious Activities During E...IRJET Journal
This document discusses an automated invigilation system to detect suspicious activities during examinations. It begins with an abstract that outlines how such systems use technologies like facial recognition, eye tracking and screen recording to monitor exams and identify cheating. While these systems could improve exam security and reduce cheating, they also raise privacy and ethical concerns that require careful consideration. The document then reviews related work on automated invigilation systems and their ability to accurately detect various cheating behaviors through computer vision and machine learning algorithms. It also discusses the need to balance technology-based approaches with other integrity strategies like improving instruction. Overall, the document evaluates automated invigilation as a potential method for enhancing academic integrity, but notes its effectiveness depends on addressing constraints and ethical issues.
This document describes a fingerprint-based folder locking system that aims to improve upon traditional password-based authentication. It discusses the drawbacks of password systems, such as the need to remember passwords and the risk of passwords being cracked. The proposed system uses fingerprint authentication to unlock private files. It involves capturing a user's fingerprint using a scanner, generating a unique ID, and allowing the user to lock and unlock files associated with their fingerprint ID. The system chunks large files for more efficient processing and uses multiple fingerprint matches for verification. This multimodal biometric approach provides another layer of security compared to passwords alone. The system aims to make file access more secure and convenient by replacing the risks of password authentication with fingerprint identification.
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
This document presents a proposed mobile application-based attendance system for educational institutes using speech recognition. The current paper-based manual attendance marking system is prone to errors. The proposed system allows teachers to take attendance using a mobile app that converts student speech responses to text using Android speech libraries. Attendance records can then be uploaded to a server for monitoring. The system provides privileges for students, faculty, heads of departments and administrators. It aims to provide an accurate, automated alternative to traditional attendance systems and remove issues like impersonation.
Semantic Web concepts used in Web 3.0 applicationsIRJET Journal
This document discusses how semantic web concepts can be used in applications for Web 3.0. It provides examples of how semantic web could be applied in areas like medical sciences, search engines, and e-learning. Specifically, it describes how semantic web could help integrate medical data from different sources, enable more accurate medical diagnosis and treatment recommendations based on patient history. It also discusses how a semantic search engine like Swoogle works by tagging web pages with metadata to better understand context and return more relevant search results. Finally, it touches on how a semantic web architecture could enable more sophisticated e-learning systems by linking educational resources.
IRJET- Review Paper of Design and Implementation of an Intelligent Biomet...IRJET Journal
This document summarizes previous research on designing an intelligent biometric attendance system using IoT. It discusses how previous systems used RFID or fingerprint biometrics to automate attendance tracking but had issues like students using other students' cards or slow fingerprint matching. The document then proposes a new hybrid system that uses both fingerprint biometrics and IoT to address these issues. It suggests capturing fingerprints using a sensor and securely storing data in the cloud for real-time attendance tracking from anywhere. This would allow automated attendance without risks of fraud or manual errors while providing flexibility and remote access to attendance records.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
IRJET - Labtrust-Android Application for Pathology LaboratoryIRJET Journal
This document describes the development of an Android application called LabTrust to digitize pathology laboratory services. The application aims to address issues with the existing manual system such as wasted time and effort managing paper records, potential for errors, and inconvenience for patients. The proposed system would allow patients and laboratories to communicate electronically and share digital test reports. It would save patient time and resources by allowing them to easily access and share reports with doctors. The application would be developed in modules including a user interface, links between pages and the database, and backend database. Technologies used include Android Studio, .NET, Java, and Firebase. The system is intended to streamline the patient process and make work easier for both patients and doctors.
This document describes an in-house file tracking system designed for large organizations. The system digitalizes the traditional paper-based method of tracking files as they are transferred between departments. It uses barcodes to uniquely identify files and track their status and location. The system is built using web technologies like Python for the backend and has a multi-layer architecture. It includes interfaces for logging in, viewing files, creating new files, and dispatching files between departments. The system aims to automate file tracking to reduce delays and improve workflow across an organization.
The document describes a proposed online platform called the "Student University Network" that aims to streamline interactions between students and educational institutions. The platform would allow teachers to post announcements and course materials, and enable activities like managing timetables and recording attendance automatically. It would consist of an Android app for students and teachers and a web app for administrative functions. The platform aims to integrate academic activities and automate tasks to reduce workload for both students and institutions. It was developed to address current problems with the disorganization of communicating over multiple platforms like WhatsApp and managing schedules and attendance manually.
Employment Performance Management Using Machine LearningIRJET Journal
This document discusses using machine learning techniques to analyze employee performance. Specifically, it proposes using a support vector machine (SVM) algorithm to identify employee performance based on factors like quality, timeliness, and cost. The document reviews related literature on using both traditional and data-driven approaches to performance assessment. It then outlines the proposed system for building a software tool to manage employee performance data using SVM. Key steps in the SVM algorithm are described. The document concludes that improving individual performance can boost business results and SVM is effective for differentiating between two groups of data.
IRJET - Visual E-Commerce Application using Deep LearningIRJET Journal
This document discusses developing a visual e-commerce application using deep learning for object recognition. It proposes a system with three phases: 1) scanning real-time objects using an Android app and YOLO algorithm for object detection, 2) detecting the objects, and 3) recommending similar products to the user. The goal is to make e-commerce searching more user-friendly by allowing image-based searches rather than relying solely on text. This could help illiterate users and improve the shopping experience overall. The document reviews related work on object recognition techniques and visual search engines to provide context.
IRJET- Intelligent Laboratory Management System based on Internet of Thin...IRJET Journal
This document describes a proposed intelligent laboratory management system based on Internet of Things (IoT) and machine learning. The system uses an STM32 microcontroller, RFID reader, and Raspberry Pi to automate student attendance tracking and course information display. It also analyzes student performance data using machine learning algorithms like XGBoost to predict academic performance and help educators evaluate student progress and identify areas for improvement. The system aims to standardize and optimize laboratory management with an intelligent, automated approach.
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETIRJET Journal
This paper presents an approach for analyzing stock market news articles using web scraping, natural language processing, machine learning, and data visualization techniques. Key aspects of the approach include:
1) Web scraping is used to collect stock market news articles from various online sources.
2) Data preprocessing with Pandas cleans and structures the data. Sentiment analysis then categorizes the sentiment of each article as positive, negative, or neutral.
3) Matplotlib and other tools are used to visualize sentiment trends in an easily interpretable way to help identify patterns and aid decision making.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET Journal
This document discusses securing data in distributed systems using blockchain and artificial intelligence. It first provides background on increasing data storage needs and security issues as data is shared over networks. It then reviews past research on using blockchain and AI to provide data security. Several studies introduced blockchain-based approaches to improve security in areas like IoT data, public key infrastructure, video surveillance, and decentralized storage. However, most lacked extensive testing or formal verification. The document concludes that combining blockchain for its tamper-proof properties with access control mechanisms could effectively secure sensitive health record data by restricting unauthorized leakage.
This document describes the development of a digital wallet app to allow users to securely store important documents such as ID cards, certificates, and notes. The app uses two-factor authentication for login involving biometric authentication and one-time passwords. Documents are stored in encrypted SQL databases. The app provides features for uploading documents, accessing and searching stored documents, and sharing documents with others through secure links. The goal is to provide a convenient way for users to digitally store and access important documents while maintaining high security and privacy standards.
NOVEL APPROACH TO MANAGE EVENTS IN THE ORGANIZATIONSIRJET Journal
This document presents a novel approach for managing events in organizations. It proposes a web-based tool with modules for registration, login, event creation, event registration, reporting, and feedback. The tool allows users and administrators to interact to perform daily event management activities. It was designed for educational institutions but can also be used by other organizations. The tool addresses limitations of previous manual systems by automating event data collection and report generation. It provides a centralized system to efficiently organize, conduct, and document events.
IRJET- Shopping Mall Experience using Beacon TechnologyIRJET Journal
The document proposes a system that uses beacon technology to track customers in retail shops and provide personalized discounts based on their shopping patterns. Beacons set up in shops would detect customers' locations via Bluetooth signals from their smartphones. This information would be sent to a server to analyze customers' purchase histories and send personalized offers. The system aims to improve customers' shopping experiences and increase retailers' sales by offering targeted discounts to customers based on their identified preferences and shopping behaviors.
Similar to Digital Lost and Found Item Portal (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Solving Linear Differential Equations with Constant CoefficientsIRJET Journal
1) The document discusses methods for finding the solutions to linear differential equations with constant coefficients. It defines such an equation and explains that the complete solution is the combination of the complementary function (C.F.) and particular integral (P.I.).
2) Various methods are presented for determining the C.F. depending on whether the roots of the auxiliary equation are real, imaginary, repeated, etc.
3) Rules are provided for obtaining the P.I. based on the type of function involved (exponential, trigonometric, power, etc.). Examples are worked through to demonstrate the full solution process.
Better Builder Magazine brings together premium product manufactures and leading builders to create better differentiated homes and buildings that use less energy, save water and reduce our impact on the environment. The magazine is published four times a year.
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...DharmaBanothu
Natural language processing (NLP) has
recently garnered significant interest for the
computational representation and analysis of human
language. Its applications span multiple domains such
as machine translation, email spam detection,
information extraction, summarization, healthcare,
and question answering. This paper first delineates
four phases by examining various levels of NLP and
components of Natural Language Generation,
followed by a review of the history and progression of
NLP. Subsequently, we delve into the current state of
the art by presenting diverse NLP applications,
contemporary trends, and challenges. Finally, we
discuss some available datasets, models, and
evaluation metrics in NLP.
This is an overview of my current metallic design and engineering knowledge base built up over my professional career and two MSc degrees : - MSc in Advanced Manufacturing Technology University of Portsmouth graduated 1st May 1998, and MSc in Aircraft Engineering Cranfield University graduated 8th June 2007.
Covid Management System Project Report.pdfKamal Acharya
CoVID-19 sprang up in Wuhan China in November 2019 and was declared a pandemic by the in January 2020 World Health Organization (WHO). Like the Spanish flu of 1918 that claimed millions of lives, the COVID-19 has caused the demise of thousands with China, Italy, Spain, USA and India having the highest statistics on infection and mortality rates. Regardless of existing sophisticated technologies and medical science, the spread has continued to surge high. With this COVID-19 Management System, organizations can respond virtually to the COVID-19 pandemic and protect, educate and care for citizens in the community in a quick and effective manner. This comprehensive solution not only helps in containing the virus but also proactively empowers both citizens and care providers to minimize the spread of the virus through targeted strategies and education.