This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
IRJET- Automatic Irrigation System using Arduino UNOIRJET Journal
This document describes an automatic irrigation system that uses sensors and an Arduino Uno microcontroller to control water flow based on soil moisture levels. Soil moisture and temperature sensors send readings to the Arduino, which uses the data to activate a relay and water pump when the soil needs watering. The system aims to optimize water usage for agriculture by only irrigating according to environmental conditions and crop requirements, reducing waste from over- or under-watering with traditional techniques.
This paper helps us to identify the precision of the
forgery article using Machine Learning Algorithm. Here the
documentation is separated into trail data file and instruct
data file and the trail data file is separated into groups of
similar details. Trail data file islater paired with these groups
and precision is found using machine learning algorithm. It
helps in knowing whether a given article is forgery or real.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
This document proposes a contactless biometric security system using finger knuckle patterns for authentication. Finger knuckle patterns provide accurate identification similar to fingerprints but can be captured contactless. The proposed system uses a convolutional neural network and Speedup Robust Feature algorithm for fast and accurate matching of knuckle patterns from images. This combination allows recognition within the shortest time for a live security system. An illumination controller is also used to standardize lighting and improve image quality. The system aims to securely authenticate users by matching their knuckle patterns against a stored database.
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
The document describes a method for fish recognition and detection using deep learning and the R-CNN algorithm. A raspberry pi camera is used to capture underwater images of fish as input datasets. These images are preprocessed using techniques like resizing and background removal. The preprocessed datasets are then trained using the R-CNN deep learning model. This trained model can detect and recognize fish in the images with 85% accuracy. The detected results are stored in an IoT cloud for further use. The proposed method provides high accuracy for fish detection with minimal human intervention.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...IJCSEA Journal
Fingerprints are considered to be the best and fastest method for checking attendance. They are secured to use, unique to every person, and do not change in one’s lifetime barring accident. The objective of this paper was to improve on the fingerprint identification system for implementation on a large database. The main objective of this paper was to design and construct an attendance system using a fingerprint module. In this system, Arduino Wemos D1 R2 ESP8266 (microcontroller) and Adafruit fingerprint reader are the main components used to insert records into a database
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
IRJET- Automatic Irrigation System using Arduino UNOIRJET Journal
This document describes an automatic irrigation system that uses sensors and an Arduino Uno microcontroller to control water flow based on soil moisture levels. Soil moisture and temperature sensors send readings to the Arduino, which uses the data to activate a relay and water pump when the soil needs watering. The system aims to optimize water usage for agriculture by only irrigating according to environmental conditions and crop requirements, reducing waste from over- or under-watering with traditional techniques.
This paper helps us to identify the precision of the
forgery article using Machine Learning Algorithm. Here the
documentation is separated into trail data file and instruct
data file and the trail data file is separated into groups of
similar details. Trail data file islater paired with these groups
and precision is found using machine learning algorithm. It
helps in knowing whether a given article is forgery or real.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
This document proposes a contactless biometric security system using finger knuckle patterns for authentication. Finger knuckle patterns provide accurate identification similar to fingerprints but can be captured contactless. The proposed system uses a convolutional neural network and Speedup Robust Feature algorithm for fast and accurate matching of knuckle patterns from images. This combination allows recognition within the shortest time for a live security system. An illumination controller is also used to standardize lighting and improve image quality. The system aims to securely authenticate users by matching their knuckle patterns against a stored database.
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
The document describes a method for fish recognition and detection using deep learning and the R-CNN algorithm. A raspberry pi camera is used to capture underwater images of fish as input datasets. These images are preprocessed using techniques like resizing and background removal. The preprocessed datasets are then trained using the R-CNN deep learning model. This trained model can detect and recognize fish in the images with 85% accuracy. The detected results are stored in an IoT cloud for further use. The proposed method provides high accuracy for fish detection with minimal human intervention.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...IJCSEA Journal
Fingerprints are considered to be the best and fastest method for checking attendance. They are secured to use, unique to every person, and do not change in one’s lifetime barring accident. The objective of this paper was to improve on the fingerprint identification system for implementation on a large database. The main objective of this paper was to design and construct an attendance system using a fingerprint module. In this system, Arduino Wemos D1 R2 ESP8266 (microcontroller) and Adafruit fingerprint reader are the main components used to insert records into a database
Keyloggers are a invasive software often used to harvest secret information. One of the main reasons for
this fast growth is the possibility for unprivileged programs running in the user space to secretly steal and record all the
keystrokes typed by the users on a system. The ability to run in unprivileged mode makes possible their implementation
and distribution. but, at the same time, allows one to understand and imitate their behavior in detail.
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
This document describes a proposed system to avoid exam forgery using image processing and IoT. The system uses a camera to capture candidate images, a fingerprint sensor to verify identity, and a Raspberry Pi for processing. Candidate images and fingerprints are matched against a stored dataset. If verified, a door will open to allow exam access. Otherwise, an alert is sent to management. The system aims to reduce exam forgery by reliably verifying candidate identity in real-time.
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET Journal
This document summarizes a research paper that proposes a user authorization system for wearable biomedical monitoring devices and cloud computing. Key points:
1. The system aims to securely store medical data collected from wearable sensors in the cloud, while allowing authorized access.
2. It uses mutual authentication between the user, wearable sensors, and cloud to establish secure communication and session keys.
3. Security models and tools like Real-Or-Random and AVISPA are used to analyze the security of medical data and prevent attacks.
IRJET - Image Watermarking using QR CodeIRJET Journal
This document presents a technique for digital image watermarking using QR codes. It aims to provide copyright protection and authentication of digital images. The technique works by encrypting an image using AES encryption and embedding the encrypted data in a QR code. The QR code is then hidden behind a cover image using steganography. This makes it difficult for unauthorized users to detect the hidden watermark or tamper with the encrypted image data. The document discusses related work on image watermarking and steganography techniques. It also provides details of the proposed system architecture, classification of digital watermarking techniques, the AES encryption algorithm used, and potential applications of the presented image watermarking approach.
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Face Recognition Door Lock using IoTIRJET Journal
This document presents a face recognition door lock system using IoT. The system uses a Raspberry Pi connected to a camera to capture images of people at the door. When the doorbell is rung, the camera takes a picture and the image is checked against images stored in a database. If the image matches someone in the database, the door will open. If no match is found, the image is sent to an IoT website where the owner can log in from anywhere and decide whether to lock or unlock the door by looking at the image of the person. The system aims to provide security and convenience while minimizing human intervention. It discusses related work on face recognition algorithms, presents the system design using blocks diagrams and flowcharts,
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
IRJET - IoT based Portable Attendance SystemIRJET Journal
This document describes the design and implementation of a portable IoT-based fingerprint attendance system. The system uses a fingerprint sensor module connected to a NodeMCU ESP8266 microcontroller to scan and identify fingerprints. Registered user fingerprints and attendance data are stored in a Firebase database in the cloud. When a fingerprint is scanned, it is matched to the database to mark the user as present. An OLED display shows the user name. This system provides a wireless, portable alternative to traditional paper-based attendance methods that saves time and prevents fake attendance issues. It accurately tracks attendance using biometric fingerprint identification and IoT connectivity.
This document describes a proposed smart locker system for home keys using Internet of Things technologies. The system uses a GSM module, LCD display, proximity sensor, relay, and Arduino microcontroller. The GSM module allows two family members to control opening and closing of the locker via SMS. When keys are placed in or removed from the locker, an SMS notification is sent. If someone tries to break into the system, an alert SMS is sent to family members and security. The system aims to provide safety for keys without needing to carry them, and allows access even when owners are not home by verifying users through SMS. The components work together to securely operate the locker through remote control and notifications.
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
This document describes the development of an attendance tracking system using fingerprint recognition and an Android application. Key points:
- The system uses a fingerprint scanner to enroll students' fingerprints and store them in a database along with their IDs. When students place their finger on the scanner, it marks them as present by updating the database.
- An Android app was created to allow students and administrators to check attendance records in real-time by accessing the centralized database.
- The system aims to provide a cheaper and more reliable alternative to traditional paper-based attendance tracking while allowing remote attendance monitoring via the app.
- The system was tested on 5 students and 1 teacher, with fingerprint matching being about 100% accurate though some
This document describes a study that aims to identify user activities from accelerometer data collected on Android smartphones without user consent. The researchers were able to classify activities like walking, running, jumping with up to 93% accuracy using signal processing techniques on the accelerometer data like preprocessing, noise reduction, linearization and smoothing. Feature extraction was then performed on windows of data before classification using algorithms like k-Nearest Neighbor and Naive Bayes. Additional activities like climbing/descending stairs were also detected with reasonable success allowing for customized gesture detection. The study shows sensitive user information can be obtained from smartphone sensors without permission.
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
This document proposes a new technique for securing medical IoT devices that collects sensitive patient data. It involves using a Kerberos-like authentication server as a central hub that IoT devices connect to over an intranet, rather than connecting directly to an online database. The IoT devices will encrypt sensor data using Elliptic Curve Digital Signature Algorithm (ECDSA) before sending it to the authentication server. The server will decrypt and validate the digital signature before uploading valid data to the online database. This helps prevent man-in-the-middle and replay attacks while only allowing authorized users access to the medical data and devices based on access privileges.
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
This document presents a proposed two-factor authentication system for banking using QR codes and mobile phones. The system aims to improve security over traditional username and password authentication. It would generate a unique QR code for each login attempt, encoding a random string along with user details like their IMEI number. Users would scan the QR code with their registered mobile phone, with the phone number and IMEI number validating their identity. If the network is available, the encoded string would automatically login the user. Otherwise, a one-time password would be displayed to manually enter. The system seeks to establish a secure authentication method using mobile phones as trusted devices to both display login QR codes and verify user identities.
IRJET - Face Detection and Recognition SystemIRJET Journal
The document describes a face detection and recognition system that uses machine learning algorithms. It analyzes facial structures in images and compares them to a dataset of facial models to identify matches. The system performs background subtraction, face detection, face recognition, and tracking. It was created to provide quick, accurate and contactless biometric security but could also be used for applications like attendance tracking. The system architecture includes modules for motion detection, face detection, face recognition and tracking a detected face. It was designed to be easily adaptable and allow additional functionality to be added.
Visualisation application based on Wonderware InTouch is presented in this article. This software is an engineering tool created for visualisation and control of industrial processes, meeting all guidelines of SCADA systems (Supervisory Control and Data Acquisition) and HMI (Human Machine Interface). It is also a part of Wonderware System Platform. This platform is a set of services and applications using ArchestrA technology. The authors showed the options of technical solutions in creating visualisation applications and supervision and control of large and complex control objects.
PROPOSED SYSTEM FOR MID-AIR HOLOGRAPHY PROJECTION USING CONVERSION OF 2D TO 3...IAEME Publication
Holographic Projections is one of the world’s top trending technologies. As the technology has graphical interaction, it is quite intriguing. Due to the multifaceted nature, multinational corporations are using this technology to a wide extent for their various purposes. The primary advantage of the technology is that the computer vision is constantly evolving and it has made possible to view content in 3D. The technology has lot of scope to evolve such that it can be made feasible to the common people. The sole purpose of interaction with 3D holographic projection is to bring life to a virtual image in 3D world.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
1. The document discusses using gait analysis and deep learning for biometric identification. Gait analysis examines a person's walking pattern or "gait cycle" as a biometric for identification.
2. The proposed system would use deep learning models trained on video frames of a person's gait cycle to generate identification vectors, which would then be used to authenticate individuals based on a match to their gait pattern.
3. If a sample video's gait cycle matches the trained identification vectors, the person would be authenticated. This could eliminate manual entry and allow automatic identification via security cameras based on a person's walking pattern.
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
This document proposes an advanced security system for bank lockers using biometric authentication and GSM technology. The system aims to provide more secure access to bank lockers than traditional key-based systems. It works by enrolling users through fingerprint scanning and storing their fingerprint data and mobile number in a database. When a user wants to open their locker, the system verifies their identity by matching their fingerprint and sends a one-time password via SMS to their registered mobile number. The user then enters this password to unlock the locker, providing two-factor authentication through biometrics and mobile verification. The system is designed to address security issues with lost or duplicated keys and keep pace with digital authentication methods.
IRJET- Smart Home Automation using IoT and Deep LearningIRJET Journal
This document summarizes a research paper that proposes a smart home system using IoT and deep learning to recognize human activities through smartphone sensor data and then automate tasks based on the recognized activity. The system uses an LSTM neural network trained on accelerometer data to classify human activities like walking, running, and jogging. When an activity is recognized, the system triggers predetermined tasks through a Raspberry Pi in the smart home for automation. The paper reviews other research on activity recognition using deep learning and discusses challenges in developing accurate smart home systems to help older adults live independently through automated task assistance based on recognized daily living activities.
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
This document describes a proposed cloud-based health monitoring system using IoT technology. The system uses various sensors to collect patient health data and transmit it securely to the cloud for storage and remote access by doctors. The key components of the system include sensors, a microcontroller, customized software, and cloud server infrastructure. The document discusses the system architecture, data authentication and security mechanisms like encryption that are used to securely transmit sensitive patient health data via the cloud. It proposes using a Real-Or-Random model and Elliptic Curve Cryptography algorithm to authenticate users and encrypt the data transmission between sensors and the cloud server.
Keyloggers are a invasive software often used to harvest secret information. One of the main reasons for
this fast growth is the possibility for unprivileged programs running in the user space to secretly steal and record all the
keystrokes typed by the users on a system. The ability to run in unprivileged mode makes possible their implementation
and distribution. but, at the same time, allows one to understand and imitate their behavior in detail.
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
This document describes a proposed system to avoid exam forgery using image processing and IoT. The system uses a camera to capture candidate images, a fingerprint sensor to verify identity, and a Raspberry Pi for processing. Candidate images and fingerprints are matched against a stored dataset. If verified, a door will open to allow exam access. Otherwise, an alert is sent to management. The system aims to reduce exam forgery by reliably verifying candidate identity in real-time.
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET Journal
This document summarizes a research paper that proposes a user authorization system for wearable biomedical monitoring devices and cloud computing. Key points:
1. The system aims to securely store medical data collected from wearable sensors in the cloud, while allowing authorized access.
2. It uses mutual authentication between the user, wearable sensors, and cloud to establish secure communication and session keys.
3. Security models and tools like Real-Or-Random and AVISPA are used to analyze the security of medical data and prevent attacks.
IRJET - Image Watermarking using QR CodeIRJET Journal
This document presents a technique for digital image watermarking using QR codes. It aims to provide copyright protection and authentication of digital images. The technique works by encrypting an image using AES encryption and embedding the encrypted data in a QR code. The QR code is then hidden behind a cover image using steganography. This makes it difficult for unauthorized users to detect the hidden watermark or tamper with the encrypted image data. The document discusses related work on image watermarking and steganography techniques. It also provides details of the proposed system architecture, classification of digital watermarking techniques, the AES encryption algorithm used, and potential applications of the presented image watermarking approach.
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Face Recognition Door Lock using IoTIRJET Journal
This document presents a face recognition door lock system using IoT. The system uses a Raspberry Pi connected to a camera to capture images of people at the door. When the doorbell is rung, the camera takes a picture and the image is checked against images stored in a database. If the image matches someone in the database, the door will open. If no match is found, the image is sent to an IoT website where the owner can log in from anywhere and decide whether to lock or unlock the door by looking at the image of the person. The system aims to provide security and convenience while minimizing human intervention. It discusses related work on face recognition algorithms, presents the system design using blocks diagrams and flowcharts,
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
IRJET - IoT based Portable Attendance SystemIRJET Journal
This document describes the design and implementation of a portable IoT-based fingerprint attendance system. The system uses a fingerprint sensor module connected to a NodeMCU ESP8266 microcontroller to scan and identify fingerprints. Registered user fingerprints and attendance data are stored in a Firebase database in the cloud. When a fingerprint is scanned, it is matched to the database to mark the user as present. An OLED display shows the user name. This system provides a wireless, portable alternative to traditional paper-based attendance methods that saves time and prevents fake attendance issues. It accurately tracks attendance using biometric fingerprint identification and IoT connectivity.
This document describes a proposed smart locker system for home keys using Internet of Things technologies. The system uses a GSM module, LCD display, proximity sensor, relay, and Arduino microcontroller. The GSM module allows two family members to control opening and closing of the locker via SMS. When keys are placed in or removed from the locker, an SMS notification is sent. If someone tries to break into the system, an alert SMS is sent to family members and security. The system aims to provide safety for keys without needing to carry them, and allows access even when owners are not home by verifying users through SMS. The components work together to securely operate the locker through remote control and notifications.
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
This document describes the development of an attendance tracking system using fingerprint recognition and an Android application. Key points:
- The system uses a fingerprint scanner to enroll students' fingerprints and store them in a database along with their IDs. When students place their finger on the scanner, it marks them as present by updating the database.
- An Android app was created to allow students and administrators to check attendance records in real-time by accessing the centralized database.
- The system aims to provide a cheaper and more reliable alternative to traditional paper-based attendance tracking while allowing remote attendance monitoring via the app.
- The system was tested on 5 students and 1 teacher, with fingerprint matching being about 100% accurate though some
This document describes a study that aims to identify user activities from accelerometer data collected on Android smartphones without user consent. The researchers were able to classify activities like walking, running, jumping with up to 93% accuracy using signal processing techniques on the accelerometer data like preprocessing, noise reduction, linearization and smoothing. Feature extraction was then performed on windows of data before classification using algorithms like k-Nearest Neighbor and Naive Bayes. Additional activities like climbing/descending stairs were also detected with reasonable success allowing for customized gesture detection. The study shows sensitive user information can be obtained from smartphone sensors without permission.
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
This document proposes a new technique for securing medical IoT devices that collects sensitive patient data. It involves using a Kerberos-like authentication server as a central hub that IoT devices connect to over an intranet, rather than connecting directly to an online database. The IoT devices will encrypt sensor data using Elliptic Curve Digital Signature Algorithm (ECDSA) before sending it to the authentication server. The server will decrypt and validate the digital signature before uploading valid data to the online database. This helps prevent man-in-the-middle and replay attacks while only allowing authorized users access to the medical data and devices based on access privileges.
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
This document presents a proposed two-factor authentication system for banking using QR codes and mobile phones. The system aims to improve security over traditional username and password authentication. It would generate a unique QR code for each login attempt, encoding a random string along with user details like their IMEI number. Users would scan the QR code with their registered mobile phone, with the phone number and IMEI number validating their identity. If the network is available, the encoded string would automatically login the user. Otherwise, a one-time password would be displayed to manually enter. The system seeks to establish a secure authentication method using mobile phones as trusted devices to both display login QR codes and verify user identities.
IRJET - Face Detection and Recognition SystemIRJET Journal
The document describes a face detection and recognition system that uses machine learning algorithms. It analyzes facial structures in images and compares them to a dataset of facial models to identify matches. The system performs background subtraction, face detection, face recognition, and tracking. It was created to provide quick, accurate and contactless biometric security but could also be used for applications like attendance tracking. The system architecture includes modules for motion detection, face detection, face recognition and tracking a detected face. It was designed to be easily adaptable and allow additional functionality to be added.
Visualisation application based on Wonderware InTouch is presented in this article. This software is an engineering tool created for visualisation and control of industrial processes, meeting all guidelines of SCADA systems (Supervisory Control and Data Acquisition) and HMI (Human Machine Interface). It is also a part of Wonderware System Platform. This platform is a set of services and applications using ArchestrA technology. The authors showed the options of technical solutions in creating visualisation applications and supervision and control of large and complex control objects.
PROPOSED SYSTEM FOR MID-AIR HOLOGRAPHY PROJECTION USING CONVERSION OF 2D TO 3...IAEME Publication
Holographic Projections is one of the world’s top trending technologies. As the technology has graphical interaction, it is quite intriguing. Due to the multifaceted nature, multinational corporations are using this technology to a wide extent for their various purposes. The primary advantage of the technology is that the computer vision is constantly evolving and it has made possible to view content in 3D. The technology has lot of scope to evolve such that it can be made feasible to the common people. The sole purpose of interaction with 3D holographic projection is to bring life to a virtual image in 3D world.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
1. The document discusses using gait analysis and deep learning for biometric identification. Gait analysis examines a person's walking pattern or "gait cycle" as a biometric for identification.
2. The proposed system would use deep learning models trained on video frames of a person's gait cycle to generate identification vectors, which would then be used to authenticate individuals based on a match to their gait pattern.
3. If a sample video's gait cycle matches the trained identification vectors, the person would be authenticated. This could eliminate manual entry and allow automatic identification via security cameras based on a person's walking pattern.
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
This document proposes an advanced security system for bank lockers using biometric authentication and GSM technology. The system aims to provide more secure access to bank lockers than traditional key-based systems. It works by enrolling users through fingerprint scanning and storing their fingerprint data and mobile number in a database. When a user wants to open their locker, the system verifies their identity by matching their fingerprint and sends a one-time password via SMS to their registered mobile number. The user then enters this password to unlock the locker, providing two-factor authentication through biometrics and mobile verification. The system is designed to address security issues with lost or duplicated keys and keep pace with digital authentication methods.
IRJET- Smart Home Automation using IoT and Deep LearningIRJET Journal
This document summarizes a research paper that proposes a smart home system using IoT and deep learning to recognize human activities through smartphone sensor data and then automate tasks based on the recognized activity. The system uses an LSTM neural network trained on accelerometer data to classify human activities like walking, running, and jogging. When an activity is recognized, the system triggers predetermined tasks through a Raspberry Pi in the smart home for automation. The paper reviews other research on activity recognition using deep learning and discusses challenges in developing accurate smart home systems to help older adults live independently through automated task assistance based on recognized daily living activities.
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
This document describes a proposed cloud-based health monitoring system using IoT technology. The system uses various sensors to collect patient health data and transmit it securely to the cloud for storage and remote access by doctors. The key components of the system include sensors, a microcontroller, customized software, and cloud server infrastructure. The document discusses the system architecture, data authentication and security mechanisms like encryption that are used to securely transmit sensitive patient health data via the cloud. It proposes using a Real-Or-Random model and Elliptic Curve Cryptography algorithm to authenticate users and encrypt the data transmission between sensors and the cloud server.
Fingerprint Based Attendance System by IOTIRJET Journal
This document summarizes a research paper that proposes a fingerprint-based attendance system using Internet of Things (IoT) technology. The system uses a NodeMCU microcontroller, fingerprint sensor module, and Google Sheets to record student attendance via fingerprint scans. Fingerprint data is uploaded securely to the cloud server in Google Sheets. This automated system aims to reduce the inefficiencies of manual attendance recording systems by eliminating fake attendances, saving time, and securely storing attendance data in the cloud. The system implementation involves a fingerprint scanner connected to a microcontroller and WiFi module to upload fingerprint IDs to Google Sheets in real-time.
Sensor Fault Detection in IoT System Using Machine LearningIRJET Journal
This document summarizes research on using machine learning techniques for sensor fault detection in IoT systems. The researchers collected temperature and humidity data from a DHT22 sensor and injected drift faults using an Arduino microcontroller. They extracted time-domain features from the normal and faulty signals and used them to train classifiers like artificial neural networks, support vector machines, naive Bayes, k-nearest neighbors, and decision trees. The trained models detected drift faults in the sensor output in real-time on an ESP8266 device. Support vector machines and artificial neural networks achieved the best performance based on accuracy, recall, F1-score metrics. The lightweight system demonstrates potential for low-cost, real-time sensor fault detection using machine learning.
An effecient spam detection technique for io t devices using machine learningVenkat Projects
This document proposes a machine learning framework to detect spam on IoT devices. It evaluates five machine learning models on a dataset of IoT device inputs and features to compute a "spamicity score" for each device. This score indicates how trustworthy a device is based on various parameters. Feature engineering techniques like principal component analysis and an entropy-based filter are used to select important features and reduce data dimensionality for the models. The results show this proposed technique can effectively detect spam compared to other existing approaches.
IRJET- Implementation of Smart Surveillance System Based on Bio-MetricsIRJET Journal
This document presents a smart surveillance system based on biometrics that is implemented using Internet of Things (IoT) technologies. The system uses a fingerprint sensor to authenticate users and automatically open the door when a validated fingerprint is detected. When an unauthenticated fingerprint is detected, a notification message is sent to the owner. The system also uses motion sensors and cameras to detect intrusions and theft, capturing images which are sent to the owner. A Raspberry Pi is used as the central controller to manage the various sensors and devices. The goal is to develop an affordable and reliable home security system using technologies like fingerprint authentication, motion detection, and remote access via devices like Raspberry Pi to control home appliances and receive alerts.
IRJET- Biometric based Bank Locker SystemIRJET Journal
1. The document describes a biometric bank locker system that uses fingerprint recognition and an Aadhaar card database to authenticate users and securely access personal belongings.
2. The system uses an Arduino microcontroller connected to a fingerprint sensor and servo motor to unlock a locker when a registered fingerprint is detected. It also scans Aadhaar cards to maintain a database of user information and access logs.
3. An Android mobile app and webpage allow users and bank personnel to interface with the system, enroll and delete fingerprints, view access logs, and understand how the biometric locker works for enhanced security compared to traditional lockers.
Smart Surveillance System through Computer VisionIRJET Journal
1. The document describes a smart surveillance system that uses computer vision techniques like object detection, face recognition, and object tracking for security purposes in homes and offices.
2. The system is able to detect objects, track their movement, recognize faces and compare them to a database, and send alerts via SMS if an unknown person is detected.
3. The system was developed using Python with libraries like OpenCV, NumPy, and Twilio for features like real-time object detection using YOLO, face recognition, object tracking, and alert notifications.
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
This document describes the implementation of an intruder detection system using a Raspberry Pi, motion detection, facial recognition, and a buzzer system. The system collects face data from homeowners to train a model using CNN techniques. When motion is detected, a picture is taken and facial recognition is run on the Raspberry Pi. If an intruder is identified, the homeowner receives a notification and can choose to sound the buzzer. The system was tested on homeowners and non-homeowners with an average detection time of 5.90 seconds and accuracy of 96.8%. Future work includes integrating an alert box for the homeowner to control the buzzer directly.
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
This document discusses a survey on using a Raspberry Pi 3B and Google Assistance to create a smart system that can control non-smart devices. The system allows users to control devices like lights and fans using voice commands. It describes how the Raspberry Pi acts as a smart hub that connects to devices and is controlled by Google Assistance. The system aims to make traditional devices "smart" by enabling voice control of them through the Raspberry Pi and Google Assistance.
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
This document summarizes a research paper on developing an alert system to create safe areas using blockchain technology. The system aims to provide security for both crime data and humans by encrypting crime reports on the blockchain to prevent hackers from accessing or modifying the data. It involves building a registration and login system for both new users and the crime branch. The crime branch would upload area-wise crime reports that are securely stored on the blockchain network. New users could then access reports for a given area to stay informed on local crime. The system aims to securely store data, reduce paperwork, allow data access from anywhere, lower administrative burdens, and help prevent cybercrime through blockchain data encryption and security.
This document describes a system for detecting occupancy dynamics in homes using Bluetooth sensor nodes and machine learning. Simple sensors like PIR motion sensors and capacitive bed sensors were placed throughout an apartment to detect occupancy. The sensor data was sent to a Raspberry Pi via Bluetooth and analyzed using machine learning algorithms to predict room-level occupancy in real-time. Neural networks were trained on labeled sensor data to classify which rooms were occupied. The system aims to enable more efficient home automation by providing information on the number and location of occupants.
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET Journal
This document proposes a deep neural network-based system for iris recognition and authentication on mobile devices. The system uses feature fusion with multiple feature extraction algorithms to recognize iris patterns. It then uses a backpropagation neural network for classification and authentication. The proposed system aims to more accurately recognize iris patterns, reduce processing time, and provide appropriate authentication outputs compared to existing CNN-based systems. It segments the iris from input images, extracts features using algorithms like FAST, SURF, and Harris, and feeds these into a neural network for classification and authentication. Performance charts are generated to evaluate the system. The proposed system seeks to securely authenticate users for mobile applications and transactions.
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET Journal
This document summarizes research on using user behavior analytics (UBA) for two-factor authentication. UBA uses machine learning algorithms to analyze user activity patterns and flag anomalies that could indicate compromised accounts. The researchers propose a framework to authenticate users based on features of their typing behavior analyzed using machine learning. Traditional security event monitoring (SIEM) takes a rules-based approach, while UBA is not rule-based and can detect anomalies over time using risk scoring. Comparing different machine learning algorithms can help determine the best for predicting authentication based on behavioral patterns.
Signature Verification System using CNN & SNNIRJET Journal
This document describes a signature verification system that uses convolutional neural networks (CNNs) and siamese neural networks (SNNs). The system takes in signature images, preprocesses them by resizing and normalizing, then uses a CNN to extract features. A SNN compares features of two signatures to determine if they match. The architecture includes convolutional and pooling layers to learn features, then fully connected layers. A contrastive loss function is used to minimize distance between matching signatures and maximize distance between non-matches. The system achieves 86% accuracy on a dataset with a 3% tolerance for errors. It includes both a guest verification page and profile system for permanent signature storage.
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
The document proposes an enhanced privacy-preserving communication protocol for smart home systems. It discusses challenges with privacy and security in smart home IoT systems. The proposed protocol uses symmetric encryption with keys generated by chaotic systems for data transmission security. It also incorporates message authentication codes to ensure data integrity and authenticity. The protocol aims to improve energy efficiency and security while preserving user privacy in smart home systems.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET Journal
This document proposes a body sensor network system using a Raspberry Pi 3 that can monitor health parameters like temperature, heart rate, and detect emergencies by sending alerts to doctors and caregivers. The system uses various sensors connected to a Raspberry Pi 3 to measure vital signs, and if any parameters exceed thresholds, it sends notifications through WiFi to a server and alerts caregivers through SMS. The proposed system aims to remotely monitor patients in real-time using IoT technologies like sensors and cloud computing for improved healthcare.
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
This document describes a face recognition system using a Raspberry Pi to control a door lock. The system takes photos of guests at the door with a Pi camera and uses OpenCV for face detection and recognition. If an authorized face is recognized, the door unlock is triggered and an email is sent to the owner. If an unknown face is detected, an email alert is sent without unlocking the door. The system provides security, convenience and remote monitoring capabilities for home owners.
Similar to IRJET - Door Lock Control using Wireless Biometric (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.