Volume 7 Issue 10
Author's Name: Sagar Kaur, sanjeev gandi
Abstract— Free/Open Source Software (F/OSS) is an incredible and innovative opportunity of software development in the area of software engineering. An F/OSS project evolves by receiving submissions from various sources to address different aspects of the project like bug identification, feature request, support request, translation request, source code, documentation etc. The present paper delves into a multi-case study of F/OSS projects to evaluate volunteer participation in defect management quantitatively as well as qualitatively. The relevant defect data has been retrieved from a research collaboratory. It is found that generally a small core team is surrounded by a large community of volunteers participating in defects. It is observed that defect reporting is a widely dispersed activity mostly contributed by volunteers external to core team making occasional contribution while defect resolution is concentrated among a few individuals mainly from core team making regular contribution.
Author's Name: Manish Saxena, Malik Pratap
Abstract— The current practices of software industry demands development of a software within time and budget which is highly productive. The traditional approach of developing a software from scratch requires considerable amount of effort. To overcome the drawback a reuse drive software development approach is adopted. However there is a dire need for realizing effective software reuse. This paper presents several measures of reusability and presents a methodology of reconfiguring the victim components. The CBO measure helps in identifying the component to be reconfigured. The proposed strategy is simulated using HR portal domain specific component system.
Author's Name:Durai Sundar, Kalai ramasamy
Abstract— This paper presents the Now a days the drowsiness of driver is leading cause for major accidents. The regular monitoring of drivers drowsiness is one among the simplest solution to scale back the accidents caused by drowsiness. It is vital to style a road accidents prevention system by detecting driver’s drowsiness, determining the extent of driver inattentiveness and provides a warning when an impending danger exists. This paper explains a driver drowsy detection system using video processing, analysing duration and head posture estimation to verify the driving force vigilance state. We capture colour, infrared, depth and 3D body pose information from six views and densely label the videos with a hierarchical annotation scheme, leading to 83 categories.
Author's Name: Rakshitha Asther, ParamJyothi Srikanth, Mageswara Reddy
Abstract— The people who are having complete blindness or low vision face many types of hurdles in performing every day routine works. Blindness can occur due to many reasons including disease, injury or other conditions that limit vision. Our aim is to develop a navigation aid for the blind and the visually impaired people. We design and implement a smart cap which helps the blind and the visually impaired people to navigate freely by experiencing their surroundings. The scene around the person will be captured by using a NoIR camera and the objects in the scene will be detected. The headset will give a voice output describing the detected objects. The architecture of the system consists of Raspberry Pi 3 processor, NoIR camera, headset and a power source. The processor collects the frames of the surroundings and convert it to voice output. The device uses TensorFlow API, opensource machine learning library developed by the Google Brain Team for the object detection and classification. TensorFlow helps in creating machine learning models capable of identifying and classifying multiple objects in a single image. Thus, details corresponding to various objects present within a single frame are obtained using TensorFlow API. A Text to Speech Synthesiser (TTS) software called eSpeak is used for converting the details of the detected object (in text format) to speech output. So the video captured by using the NoIR camera is finally converted to speech signals and thus narration of the scene describing various objects is done. Objects which come under different classes like mobiles, vase, person, vehicles, couch etc are detected.
Author's Name: Manish kumar, Malik Pratap
Abstract— The current practices of software industry demands development of a software within time and budget which is highly productive. The traditional approach of developing a software from scratch requires considerable amount of effort. To overcome the drawback a reuse drive software development approach is adopted. However there is a dire need for realizing effective software reuse. This paper presents several measures of reusability and presents a methodology of reconfiguring the victim components. The CBO measure helps in identifying the component to be reconfigured. The proposed strategy is simulated using HR portal domain specific component system.
Author's Name: Kathar Basha, Chandra Sekar, Bakham Jah
Abstract— This paper presents the comparison of proposed double tail comparator with conventional double tail and existing double tail comparator. The low power and high-speed analog to digital converters used are of dynamic regenerative comparators to maximize speed. Presenting different architectures for calculating delay and power consumption in dynamic double tail comparator. The power gating technique is used to design the proposed comparator. By using this technique, delay and power consumption is reduced compared to the conventional double tail comparator and the existing double tail comparator. The important parameters are speed and power consumption. Cadence design tools used to simulate the comparator in the 90nm technology with the supply voltage of 0.6v.
Author's Name: Archana Meena, Umar Qamar Niwaas, R.K Singh
Abstract— This paper presents the comparison of proposed double tail comparator with conventional double tail and existing double tail comparator. The low power and high-speed analog to digital converters used are of dynamic regenerative comparators to maximize speed. Presenting different architectures for calculating delay and power consumption in dynamic double tail comparator. The power gating technique is used to design the proposed comparator. By using this technique, delay and power consumption is reduced compared to the conventional double tail comparator and the existing double tail comparator.
Author's Name: Harima Singh, Sunil Kumar
Abstract— To build large scale software systems, Component Based Software Engineering (CBSE) has played a vital role. The current practices of software industry demands more development of a software within time and budget which is highly productive to them. It became so necessary to achieve how effectively the software component is reusable. In order to meet this, the component level reuse, in terms of both class and method level can be possibly done. The traditional approaches are presented in the literature upto the level of extent of achievement of reuse. Any how still effective reuse is a challenging issue as a part. In this paper, a methodology has proposed for the identification of reuse level which has been considered by the using reuse metrics such as the Class Template Factor(CTF) and Method Template Factor(MTF). By considering these measures makes easy to identify the level of reuse so that helps in the growth the productivity in the organization.
Author's Name: Vijay Jaiswal, Vipul Meena, Neela Devi
Abstract— The advancement of the Internet of Things technology is playing a key role in developing the health sector by making it much more accessible and affordable through easy to use applications for virtual and distant interactions with patients. Taking the capability of IoT technology into account, it is possible to overcome the difficulties faced by physically unstable patients in consulting a doctor physically on a regular basis. This work has led to a prototype of IoT Based Remote Health Monitoring System for Patients. This prototype consists of three health sensors: heart pulse sensor, body temperature sensor and galvanic skin response sensor.
Author's Name: Venkateswara Reddy, Govardhan rao
Abstract— Smart home systems achieved great popularity in the last decades as they increase the comfort and quality of life. Most smart home systems are controlled by smartphones and microcontrollers. A smartphone application is used to control and monitor home functions using wireless communication techniques. We explore the concept of smart home with the integration of IoT services and cloud computing to it, by embedding intelligence into sensors and actuators, networking of smart things using the corresponding technology, facilitating interactions with smart things using cloud computing for easy access in different locations, increasing computation power, storage space and improving data exchange efficiency. The development proposed in thesis incorporates smart sensors, communication channel and protocols for data exchange, peripherals such as atmega328, MQTT Tx. Rx. Kit, (for data interchange) Data Receptor and Decoder Shield, addressing & de-addressing data module, comm. IOT, in other words, integrates the ubiquitous communication, pervasive computing, and ambient intelligence. IoT helps to link the base station (equipped with the atmega328 Interface) which interacts with the entire module located at home. IoT here also helps to mitigate the installation and running cost and covering it all within acceptable boundaries and scope of the economy
Author's Name: V. Sriram., R. Subash, D. Sundar Rajan, K. Vimal Raj, R. Nivethitha
Abstract— The rampant spread of misinformation on platform like Facebook poses a critical challenge to public discourse. This proposed system focuses on detecting fake news and fake images using machine learning algorithms. To develop a robust machine learning- based system for detecting fake news specifically on Facebook. By leveraging techniques like Logistic Regression and image analysis models, the project aims to identify patterns that distinguish between real and deceptive content. The system processes textual and visual data to flag misinformation, enhancing the reliability of online information. The system utilizes a combination of text-based and image-based machine learning techniques to achieve this goal. For fake news detection, a Logistic Regression algorithm is employedto classify news articles as either real or fake. The model is trained on a label dataset containing various features extracted from the news articles, such as word frequency, sentiment analysis, and metadata. By learning from these features, the model can effectively identify patterns that are common in deceptive or misleading news content. On the image analysis front, the proposed system incorporates advanced image recognition and manipulation detection algorithms. Techniques like Convolutional Neural Networks (CNNs) are used to detect anomalies in images that may indicate forgery or tampering.
Author's Name: M. Kavitha , P. Dinesh
Abstract— Artificial Intelligence is the study of how to make computers do things which at the moment people do better. The primary goal of artificial intelligence is to improve computer behaviour so that it can be called intelligent. The origins of Artificial Intelligence usually incorporate the theories and thoughts proclaimed by several ancient Greek philosophers and scientists.
Author's Name: Kushal anushya , Anurag Sharma
Abstract— This paper In online shopping, the product sellers often take reviews from the customer for the product. As e-commerce is growing rapidly the number of reviews from the customer is also increasing day by day. Some spammers attempt to write fake(spam) reviews to affect customer opinions and increase their sales rating. It is a tediuos work for the customers to identify the fake(spam) reviews. We propose spam detection using Bi-gram algorithm and IP Address to filter the genuine reviews from the fake (spam) reviews.
Author's Name: Nahumi Marunah, Nashima Begam
Abstract— The value chain model, as originally demonstrated by Porter (1985), identifies nine strategically relevant activities that create value and reduce cost in a specific business. These nine value-creating activities consist of five primary activities and four support activities. Successful implementation of e-commerce in an organization should be based on a thorough understanding of the areas in the value chain where e-commerce can add value most. More importantly, to succeed in gaining competitive advantage, ecommerce is to be based on the overall corporate strategy
Author's Name: S. Sanliyu, Munidu
Abstract— Cut throat competition and highly stressed profits have introduced the new marketing practices in the Indian Banking Sector and has also brought the customer satisfaction to the center of the focus. It has become very important for the banks to retain their existing customer base as well as to enlarge the same. As the number of banks is increasing, customer expectation of service quality is growing. Product differentiation is impossible in a competitive environment like the banking industry. Banks are delivering the same products. Thus, bank management tends to differentiate their firm from competitors through service quality only. Service quality is an imperative element impacting customers’ satisfaction level in the banking industry. The banks need to ensure that their Mobile and Internet Banking systems are well secured, reliable and user-friendly, and need to promote and familiarize their customers about the Mobile Banking and Internet Banking
Author's Name: S.Yoheswari, J.Siva Prakash Pandi, B.K.Vignesh Babu, K.L.Vishnu Vardhan
Abstract— This system would look into making interaction with the system smoother and more user-friendly by integrating gestural control, based on hand movements, in addition to traditional tools such as keyboards and mice. Using computer vision and learning techniques, this project would assist users to control media players through real-time hand gestures and add richness to the user experience. The system is able to identify hand gestures for different media-play functions such as play, pause, or changing volumes. Besides, the application ensures that only selected users are allowed to gain control over the media player since it includes facial detection and recognition to avert privacy invasion and potential misuse. The gesture control is activated only if there is a known face recognized with the help of the camera. In all other cases, such a state provides users with the possibility to operate the media player in a simplified way that is still convenient. Recognition combined with real-time face authentication will allow this approach to add a secure user experience to currently rising demand for more natural and safe user interfaces
Author's Name:D. Dhanjaya Raju, Subba Reddy
Abstract— 5G stands for fifth generation wireless technology. It is the latest iteration of cellular technology that has three main features: greater speed, lower latency, and the ability to connect a lot more devices simultaneously. A commercial 5G wireless network is expected to be deployed by 2020. This paper provides a brief introduction to 5G wireless technology.
Author's Name: Shanmugam, Rose Marget
Abstract— During the past few Decades, many software reliability growth models have been suggested for estimating reliability of software as software reliability growth models. The Functions suggested were non-linear in nature, so it was difficult to estimate the proper parameters. An Estimation method based on Ant Colony Algorithm in which parameters are estimated is discussed in this paper.In this paper, Numerical examples which have been based on five sets of real failure data have been discussed Using existing methods viable solutions for some of the models and data sets cannot be obtained, where as in the proposed method, at least one solution can be obtained. The accuracy of the results using proposed method when compared with PSO algorithm has higher accuracy for at least 10 times for majority of the models
Author's Name: Yoheswari.S,Kaviya Vanaraj,Gowri Sakthi.G,Kavya T.K
Abstract— Med-chatbot focuses on developing a symptom-based disease prediction chat-bot using Natural Language Processing (NLP) and incorporating multilingual support. The chat-bot is designed to interact with users, understand their symptoms, and predict potential diseases based on the input. By leveraging machine learning models, the system analyzes the user's description of symptoms and provides a probable diagnosis. The chat-bot’s purpose is to enhance accessibility to healthcare information and assist users in identifying potential health issues early on. The chat-bot uses NLP techniques to understand and process human language, making the interaction more natural. The system's effectiveness is further enhanced by its machine learning backend, which continuously improves as it processes more data. This can be useful in both personal healthcare management and as a preliminary diagnostic tool in telemedicine platforms
Author's Name: D.Pravin Kumar,K.M.Saran,K.R.Surya, V.Uthamaseelan, S.Vishwa Karthik
Abstract— This Smart Helmet System leverages IoT to enhance rider safety through accident prevention and detection. It features a Voice-Controlled Helmet Visor that responds to commands like "UP" and "DOWN," allowing hands-free visor adjustment, so riders can focus on the road. The system uses a voice recognition module to adjust the visor based on rider input. Additionally, IoT sensors monitor weather conditions, automatically adjusting the visor or issuing warnings in adverse situations. This technology-driven helmet offers improved convenience and reduces accident risks, ensuring a safer riding experience for two-wheeler users.
Author's Name: Kirubahari R, Sivaprakash S, Sasikumar P
Abstract— In modern educational institutions, the ability to swift and efficiently manage staff availability is essential for maintaining seamless operations. This model presents a Staff presence monitoring System designed to automate and streamline the process of finding and assigning substitute staff members when regular staff are unavailable. By utilizing advanced communication technologies, the proposed system enables staff to quickly report their unavailability and facilitates the immediate search for qualified replacements. When a staff member enters the classroom on time, they use a barcode scanner attached to their ID card to register their presence. If delayed by more than 3 minutes, the Arduino Uno-controlled system promptly signals their absence in the staffroom via a speaker, ensuring quick awareness. Additionally, the system automatically identifies and assigns a replacement staff member based on real-time availability, minimizing classroom disruption. The staff presence monitoring system also offers features that provide insights into staff availability patterns, enabling institutions to make informed decisions about staffing and scheduling. By improving communication, reducing response times, and enhancing overall staff management, the system contributes to a more organized and efficient educational environment. Overall, the proposed staff presence monitoring system represents a significant improvement in human resource management within educational settings, facilitating smoother operations and minimizing disruptions to educational activities
Author's Name: Rajeswari G, Santhosh S.A, Yuvan Sankar S.K.G, Ramana C, Sharukeshavalingam A
Abstract— Accurately predicting the field workplace overall performance of films is a important venture within the leisure industry because it drives selections concerning production, marketing, and distribution. This paper proposes the usage of Ridge and Lasso regression techniques to are expecting container workplace sales primarily based on diverse capabilities along with production budget, genre, forged, recognition, director history, launch date, and greater. Ridge and Lasso are regularized regression techniques that cope with problems which include overfitting and multicollinearity with the aid of penalizing large coefficient values. This paper compares the overall performance of those fashions, offering insights into how they handle excessive-dimensional records and enhance prediction accuracy.
Author's Name: Abhinay Rathore ,Shubham Saini, Shivam Dhiraj, Sagar Murbarkar
Abstract— The performances about the RP’s are greatly influenced by how fast the protocol adapts to the dynamically changing network topology. The dynamic behavior depends on the traveling sample about the movable nodes. The performance about the RP,s should be analyzed under the mobility patterns which mirror the realistic movements about the mobile nodes. To oversee function appropriately in MANET is required dynamic routing convention so that decrease a routing testing issue and the convention ought to rapidly adapt to the changing condition about the network. In this paper, we focused on the concept about fundamental strategy of AODV, DSDV, and, DSR routing protocol (RP), and problems with routing in MANET, as well as the literature review based on the QoS analysis. The survey included a comprehensive review about relevant work in the field about RP in MANET and the desirable property. The fundamental objective about this paper is to study and analyze the working about various RPs which are AODV, DSDV, and DSR. With the assistance about these protocols, we complete a relative examination to comprehend the nature about correspondence between the various nodes discussing regarding Packet delivery ratio, throughput residual energy, and different components.
Author's Name: Abhinay Rathore ,Shubham Saini, Shivam Dhiraj, Sagar Murbarkar
Abstract— A roundabout intersection is a specialized form at grade intersection laid out for movement in one direction around a central island. Since most of the roundabouts are situated in urban CBD areas, the intersection region could not be expanded to deal with increasing traffic. The objective of the study was to estimate the capacity of roundabout and compare it with present traffic. The video data was collected for 5 hours to observe the traffic behavior of vehicles at selected roundabout. The volume count was performed by observing four different class of vehicles namely Cars (small as well as large), motorized 2-wheelers and 3- wheelers as well as Heavy vehicles (buses and trucks). The capacity was estimated using Wardrop’s formula by calculating weaving traffic proportion (p) for each weaving section. Hence, converting the roundabout into signalized roundabout intersection is proposed which requires proper designing of traffic signals. At final stage, the designed signals would be implemented to avoid roundabout interlocking in future.