SlideShare a Scribd company logo
1 of 2
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1746
Review on the Simple Text Messages classification
Payal Kurhade1, Sharvari Medhane2, Shivanjali Kankate3, Vinita Rokade4, Mr. D.S. Thosar5
1,2,3,4Last Year Computer Engineering Student S.V.I.T. Chincholi, Nashik
5Assistant Professor, Department of Computer Engineering S.V.I.T. Chincholi, Nashik
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Short Message Service (SMS) is an integral
service of the mobile phone for users to communicate with
people which is faster and convenient way to communicate.
However, it has some limitations like incapability ofsearching
and categorization of SMS, scheduling, markingSMSandthere
is scope to improve it. To overcome various limitations, we
have proposed a mobile application with title MojoText - Text
Messenger which solves real time problem of text messaging.
Our system provide core functionalities of text messaging and
beside to that various facilities likecategorizationofmessages
based on personal, social, transactional and user defined
categories with color codes, searching with customized date,
scheduled text delivery, hiding of messages inside the app,
reminders for due dates of billers, validity of texts, starred
messages, pinned chats, signature, backup and recycle bin.
Key Words: Android, Text-to-Speech module, Natural
Language Processing (NLP), Text pattern matching.
1. INTRODUCTION
Now a Day’s mobile users are increased day by day. There
are number of messaging apps with the multiple
functionalities and features are available in android mobile
phones but for the simple text messages there is nothing
some extra added features[1]. In this system we are going to
add some extra feature to the simple text messages. Now a
days we linked our mobile number to our bank accounts,
register shop or in any mall for getting the details of the
shopping or any offers in the mall, for getting some
important OTP’s, educational purpose, etc.
The use of SMS becomes widespread and it is preferred for
personal messaging and authentication method[2,3].These
all messages are stored in our text box combine to avoid this
situation or getting easy access of the important messages
we are going to develop the system. Short Message Service
(SMS) of the mobile phone for users to communicate with
people which is convenient and easy way for the
communication[2]. However, it has some limitations like
incapability of searching, categorization and easy access of
SMS, scheduling, marking, storing SMS and there is scope to
improve it.
To overcome these various limitations, wehavetointroduce
the proposed system a mobile application text Messenger
which solves real time problem of text messaging[4].
Our system provide more functionalities and feature of text
messaging and beside to that various facilities like
categorization or classification of messages based on
personal, social, transactional and user defined categories
with the some different color codes to the each category of
the SMS, searching with customized date, scheduled text
delivery, hiding of personal messages inside the app,
reminders for due dates like phone bills, etc. reminders for
some occasions, validity of texts, starred(favorite)
messages[6].
1.1 PURPOSE
For different personal use or social use,SMSnowadayseven
being extinct, today the SMS is treated as the best way of
authorization and authenticationoftheuser'scredential and
contact information by using an OTP or any other activation
methods. After the implementation of the android
application, it will reduce the efforts of categorizingtheSMS.
The application will definitely be helpful in storing the
messages and even in recovering if deleted by mistakenly.
One of the major benefit the user will get in optimizing the
memory i.e. after the validity of some SMS is expired it gets
automatically deleted so space and efforts are saved.
2. PROBLEM STATEMENT
Android Base Application to speech out the message and to
provide the security to the confidential messages like Bank
account number. In this system the classification of the
messages can be done like gmail acccout in categories of
personal, transactional, company.
3. RELATED WORK
This contains the existing and established theory and
research in this report range. This will give a context for
work which is to be done. This will explain the depth of the
system. Review of literature gives a clearness and better
understanding of the exploration/venture. A literature
survey represents a study of previously existing material on
the topic of the system. This literature survey will logically
explain this system.
The paper named as a text classification on the down
streaming potential of bio medicinepublicationinIndonesia.
Author Name is Silalahi m. Nadhiroh I.M.
The paper is Published year 2017. The Limitation of this
paper that it does not provide Recycle Bin and starred
message.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1747
The starred messages may help to find or to choose the
favorite messages. These are the drawbacks of the paper we
can overcome that is the system.
The second was also published on the SMS classification
Paper Name was Short text classificationbasedonwikipedia
and word2vec. The paper Published year is 2016.
The Limitation of the paper Based on classification solution
is to provide spam SMS. Words in the message are
transformed into vectors and the distances between them
are calculated and an analogy is established between the
words by using Word2Vec.TheWord2Vcc technologyisvery
difficult to understand we cannot learn it easily and this
system is only useful for the spam SMS.
4. SYSTEM ARCHITECTURE
Fig -1: System Architecture
The system is based on the three most essential partsfirst on
is the input of the system second one is the main process of
the system and last one is designed output of the system so
the system architecture is given as above diagram the
process of the system is begins from here and to avoid
trouble from the searching the text messages we are
developing the system.
The system gets input through the incoming message send
by the sender these messages in initial stage storedlikea are
simple text messages and then the android application
works on the text messages by using the algorithms. The
next process is shown in the architecture. In the process is
the having different categories of the message like
transactional, personal andcompanysoonthesecanbedone
by using the different algorithms. This is the process of the
system.
This process can be done by using the algorithms the
algorithms are:
1. Stopword removal
2. Pattern matching (Regular expression, Token
matching)
3. Decision tree (Date, category classification).
Using this algorithms we can done the further process.
Then we get the expected output of the system by
performing the operations on it. Then theoutput will display
the categorized messages, starred messages and deleted
messages in the recycle bin.
3. CONCLUSIONS
This paper will design an android application of a content
based categorization or classificationofSMS(textMessages)
To provide convenience to use text messages in a daily life
the system proposed to prevent classification SMS which is
an important problem now a days. The system can help
peoples to use mobile text messaging instead of using
another applications.
REFERENCES
1) Castiglione, A., De Prisco, R., De Santis, A.: ‘Do
YouTrust Your Phone?’, E-Commerce and Web
Technologies, Linz, Austria, September2009pp.
50-61.
2) Ho, T., Kang, H., Kim, S.: ‘Graph-based KNN
algorithmfor spam SMS detection’, Journal of
Universal ComputerScience, 2013, 19, (16), pp.
2404-2419.
3) Church, K., & Oliveira, R.D. (2013). What's up with
whatsapp?: comparing mobile instant messaging
behaviors with traditional SMS. Mobile HCI.
4) Silalahi M., Hardiyati R., Nadhiroh I. M., Handayani
T., et al.: ‘A text classification on the downstreaming
potential of biomedicine publications in Indonesia’,
International Conference on Information and
Communications.
5) ‘NLP with gensim (word2vec)’
http://www.samyzaf.com/ML/nlp/nlp.html
accessed: January 2018.
6) Wensen L., Zewen C., Jun W., et al.: ‘Short text
classification based on Wikipedia and Word2vec’
2nd IEEE International Conference on Computer
and Communications (ICCC), Chengdu, China,
October 2016, pp. 1195-1200 .

More Related Content

What's hot

Modeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware SystemsModeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware Systemsijasuc
 
Ensuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEnsuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
 
An Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolAn Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolIJERA Editor
 
Private Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM TrainingPrivate Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM Trainingpaperpublications3
 
Technology Choices for Enterprise Integration
Technology Choices for Enterprise IntegrationTechnology Choices for Enterprise Integration
Technology Choices for Enterprise IntegrationSandeep Purao
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Journals
 
A Novel Web-based Approach for Balancing Usability and Security Requirements ...
A Novel Web-based Approach for Balancing Usability and Security Requirements ...A Novel Web-based Approach for Balancing Usability and Security Requirements ...
A Novel Web-based Approach for Balancing Usability and Security Requirements ...IJNSA Journal
 
Instant message
Instant  messageInstant  message
Instant messagekplshrm222
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
 
IRJET- Survey on Credit Card Security System for Bank Transaction using N...
IRJET-  	  Survey on Credit Card Security System for Bank Transaction using N...IRJET-  	  Survey on Credit Card Security System for Bank Transaction using N...
IRJET- Survey on Credit Card Security System for Bank Transaction using N...IRJET Journal
 
IRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET Journal
 
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET Journal
 
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...IJNSA Journal
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Shailesh kumar
 
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using SnatchbotIRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using SnatchbotIRJET Journal
 

What's hot (18)

Modeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware SystemsModeling the Adaption Rule in Contextaware Systems
Modeling the Adaption Rule in Contextaware Systems
 
Ensuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEnsuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert System
 
An Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolAn Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on Protocol
 
Private Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM TrainingPrivate Mobile Search Engine Using RSVM Training
Private Mobile Search Engine Using RSVM Training
 
H364752
H364752H364752
H364752
 
Technology Choices for Enterprise Integration
Technology Choices for Enterprise IntegrationTechnology Choices for Enterprise Integration
Technology Choices for Enterprise Integration
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
A Novel Web-based Approach for Balancing Usability and Security Requirements ...
A Novel Web-based Approach for Balancing Usability and Security Requirements ...A Novel Web-based Approach for Balancing Usability and Security Requirements ...
A Novel Web-based Approach for Balancing Usability and Security Requirements ...
 
Instant message
Instant  messageInstant  message
Instant message
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
IRJET- Survey on Credit Card Security System for Bank Transaction using N...
IRJET-  	  Survey on Credit Card Security System for Bank Transaction using N...IRJET-  	  Survey on Credit Card Security System for Bank Transaction using N...
IRJET- Survey on Credit Card Security System for Bank Transaction using N...
 
IRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AI
 
IRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine LearningIRJET- Question-Answer Text Mining using Machine Learning
IRJET- Question-Answer Text Mining using Machine Learning
 
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...
 
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using SnatchbotIRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using Snatchbot
 

Similar to SMS Text Message Classification App

Intelligent Spam Mail Detection System
Intelligent Spam Mail Detection SystemIntelligent Spam Mail Detection System
Intelligent Spam Mail Detection SystemIRJET Journal
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
 
IRJET - Chatbot for HR Department using AIML and LSA
IRJET - Chatbot for HR Department using AIML and LSAIRJET - Chatbot for HR Department using AIML and LSA
IRJET - Chatbot for HR Department using AIML and LSAIRJET Journal
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineIRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningIRJET Journal
 
Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle AttacksIRJET Journal
 
Filter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnFilter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnIAEME Publication
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
IRJET- Recruitment Chatbot
IRJET- Recruitment ChatbotIRJET- Recruitment Chatbot
IRJET- Recruitment ChatbotIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET - Automated System for Frequently Occurred Exam Questions
IRJET - Automated System for Frequently Occurred Exam QuestionsIRJET - Automated System for Frequently Occurred Exam Questions
IRJET - Automated System for Frequently Occurred Exam QuestionsIRJET Journal
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 

Similar to SMS Text Message Classification App (20)

Intelligent Spam Mail Detection System
Intelligent Spam Mail Detection SystemIntelligent Spam Mail Detection System
Intelligent Spam Mail Detection System
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
IRJET - Chatbot for HR Department using AIML and LSA
IRJET - Chatbot for HR Department using AIML and LSAIRJET - Chatbot for HR Department using AIML and LSA
IRJET - Chatbot for HR Department using AIML and LSA
 
Mobile based social encyclopedia
Mobile based social encyclopediaMobile based social encyclopedia
Mobile based social encyclopedia
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
 
Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle Attacks
 
Filter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnFilter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osn
 
Java project titles
Java project titlesJava project titles
Java project titles
 
IRJET- Recruitment Chatbot
IRJET- Recruitment ChatbotIRJET- Recruitment Chatbot
IRJET- Recruitment Chatbot
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET - Automated System for Frequently Occurred Exam Questions
IRJET - Automated System for Frequently Occurred Exam QuestionsIRJET - Automated System for Frequently Occurred Exam Questions
IRJET - Automated System for Frequently Occurred Exam Questions
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

SMS Text Message Classification App

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1746 Review on the Simple Text Messages classification Payal Kurhade1, Sharvari Medhane2, Shivanjali Kankate3, Vinita Rokade4, Mr. D.S. Thosar5 1,2,3,4Last Year Computer Engineering Student S.V.I.T. Chincholi, Nashik 5Assistant Professor, Department of Computer Engineering S.V.I.T. Chincholi, Nashik ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Short Message Service (SMS) is an integral service of the mobile phone for users to communicate with people which is faster and convenient way to communicate. However, it has some limitations like incapability ofsearching and categorization of SMS, scheduling, markingSMSandthere is scope to improve it. To overcome various limitations, we have proposed a mobile application with title MojoText - Text Messenger which solves real time problem of text messaging. Our system provide core functionalities of text messaging and beside to that various facilities likecategorizationofmessages based on personal, social, transactional and user defined categories with color codes, searching with customized date, scheduled text delivery, hiding of messages inside the app, reminders for due dates of billers, validity of texts, starred messages, pinned chats, signature, backup and recycle bin. Key Words: Android, Text-to-Speech module, Natural Language Processing (NLP), Text pattern matching. 1. INTRODUCTION Now a Day’s mobile users are increased day by day. There are number of messaging apps with the multiple functionalities and features are available in android mobile phones but for the simple text messages there is nothing some extra added features[1]. In this system we are going to add some extra feature to the simple text messages. Now a days we linked our mobile number to our bank accounts, register shop or in any mall for getting the details of the shopping or any offers in the mall, for getting some important OTP’s, educational purpose, etc. The use of SMS becomes widespread and it is preferred for personal messaging and authentication method[2,3].These all messages are stored in our text box combine to avoid this situation or getting easy access of the important messages we are going to develop the system. Short Message Service (SMS) of the mobile phone for users to communicate with people which is convenient and easy way for the communication[2]. However, it has some limitations like incapability of searching, categorization and easy access of SMS, scheduling, marking, storing SMS and there is scope to improve it. To overcome these various limitations, wehavetointroduce the proposed system a mobile application text Messenger which solves real time problem of text messaging[4]. Our system provide more functionalities and feature of text messaging and beside to that various facilities like categorization or classification of messages based on personal, social, transactional and user defined categories with the some different color codes to the each category of the SMS, searching with customized date, scheduled text delivery, hiding of personal messages inside the app, reminders for due dates like phone bills, etc. reminders for some occasions, validity of texts, starred(favorite) messages[6]. 1.1 PURPOSE For different personal use or social use,SMSnowadayseven being extinct, today the SMS is treated as the best way of authorization and authenticationoftheuser'scredential and contact information by using an OTP or any other activation methods. After the implementation of the android application, it will reduce the efforts of categorizingtheSMS. The application will definitely be helpful in storing the messages and even in recovering if deleted by mistakenly. One of the major benefit the user will get in optimizing the memory i.e. after the validity of some SMS is expired it gets automatically deleted so space and efforts are saved. 2. PROBLEM STATEMENT Android Base Application to speech out the message and to provide the security to the confidential messages like Bank account number. In this system the classification of the messages can be done like gmail acccout in categories of personal, transactional, company. 3. RELATED WORK This contains the existing and established theory and research in this report range. This will give a context for work which is to be done. This will explain the depth of the system. Review of literature gives a clearness and better understanding of the exploration/venture. A literature survey represents a study of previously existing material on the topic of the system. This literature survey will logically explain this system. The paper named as a text classification on the down streaming potential of bio medicinepublicationinIndonesia. Author Name is Silalahi m. Nadhiroh I.M. The paper is Published year 2017. The Limitation of this paper that it does not provide Recycle Bin and starred message.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1747 The starred messages may help to find or to choose the favorite messages. These are the drawbacks of the paper we can overcome that is the system. The second was also published on the SMS classification Paper Name was Short text classificationbasedonwikipedia and word2vec. The paper Published year is 2016. The Limitation of the paper Based on classification solution is to provide spam SMS. Words in the message are transformed into vectors and the distances between them are calculated and an analogy is established between the words by using Word2Vec.TheWord2Vcc technologyisvery difficult to understand we cannot learn it easily and this system is only useful for the spam SMS. 4. SYSTEM ARCHITECTURE Fig -1: System Architecture The system is based on the three most essential partsfirst on is the input of the system second one is the main process of the system and last one is designed output of the system so the system architecture is given as above diagram the process of the system is begins from here and to avoid trouble from the searching the text messages we are developing the system. The system gets input through the incoming message send by the sender these messages in initial stage storedlikea are simple text messages and then the android application works on the text messages by using the algorithms. The next process is shown in the architecture. In the process is the having different categories of the message like transactional, personal andcompanysoonthesecanbedone by using the different algorithms. This is the process of the system. This process can be done by using the algorithms the algorithms are: 1. Stopword removal 2. Pattern matching (Regular expression, Token matching) 3. Decision tree (Date, category classification). Using this algorithms we can done the further process. Then we get the expected output of the system by performing the operations on it. Then theoutput will display the categorized messages, starred messages and deleted messages in the recycle bin. 3. CONCLUSIONS This paper will design an android application of a content based categorization or classificationofSMS(textMessages) To provide convenience to use text messages in a daily life the system proposed to prevent classification SMS which is an important problem now a days. The system can help peoples to use mobile text messaging instead of using another applications. REFERENCES 1) Castiglione, A., De Prisco, R., De Santis, A.: ‘Do YouTrust Your Phone?’, E-Commerce and Web Technologies, Linz, Austria, September2009pp. 50-61. 2) Ho, T., Kang, H., Kim, S.: ‘Graph-based KNN algorithmfor spam SMS detection’, Journal of Universal ComputerScience, 2013, 19, (16), pp. 2404-2419. 3) Church, K., & Oliveira, R.D. (2013). What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS. Mobile HCI. 4) Silalahi M., Hardiyati R., Nadhiroh I. M., Handayani T., et al.: ‘A text classification on the downstreaming potential of biomedicine publications in Indonesia’, International Conference on Information and Communications. 5) ‘NLP with gensim (word2vec)’ http://www.samyzaf.com/ML/nlp/nlp.html accessed: January 2018. 6) Wensen L., Zewen C., Jun W., et al.: ‘Short text classification based on Wikipedia and Word2vec’ 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, October 2016, pp. 1195-1200 .