This document summarizes an article from the International Journal of Computer Engineering and Technology. The article presents a mobile-based solution to tackle the problem of fairly and transparently distributing subsidized food in Egypt. The proposed solution provides visibility and control over the distribution process using mobile technologies. It introduces a better mechanism to reduce leakage in the current subsidy system. The solution architecture is discussed, including logical and layered views. Key requirements like usability and minimizing corruption are also summarized.
This demand-side diagnostic study aims to gauge the end-user experience in adopting cashless modes (including cheques) along with the barriers (behavioral and functional) they faced in uptake and usage of cashless solutions.
MicroSave was asked to present evidence to the Reserve Bank of India’s Committee on Comprehensive Financial Services for Small Businesses and Low Income Households. The Committee wanted to know about our extensive experience of agent networks in India. This powerpoint presentation highlights the following:
1. Status of agent networks in India;
2. Design features of a successful agent network and
3. Recommendations to the Committee, as well as
4. Examples of successful agent networks
MSC presents a report on the findings from an assessment of unconditional cash transfers in food subsidies in three union territories in India. It also offers suggestions for the food subsidy program in India.
The Insurance Reporting Challenge: Building an Integrated FrameworkAccenture Insurance
The reporting component of Solvency II has become a major concern for insurance companies operating in Europe. Solvency II Pillar III increases reporting requirements in terms of volume, frequency, timeliness and complexity. These, in turn, have a direct bearing on insurers’ data, processes, methodologies and organization. The pressure put on insurers to enhance their reporting calls for a revamped closing and reporting framework where integration is part of the approach. Beyond the new Solvency II requirements, reporting, in our view, remains a pressing issue at the global level.
The Democratic Republic of the Congo offers huge market potential for technology start-ups. The political environment supports entrepreneurship and digital services. The aim of the National Digital Plan is to drive market and improve infrastructure to surge opportunities for financial inclusion.
Easy Mobile Cable Management System Using Android ApplicationIJMTST Journal
The cable industry is evolving from analogue to digital. The current system that Cable Operators follow doesn't help in implementing the TRAI(Telecom Regulatory Authority of India) regulations to implement subscriber management. There is Smartphone movement in India where the availability of Smartphone's & mobile internet is more and cost effective. By considering the fact, the solution for the said problem will be implemented as android mobile application. The required business logic will be implemented through Web Services and designed android application will use those Web Services hosted on to the cloud. This ensures to provide cost effective solution to the Cable Operator. Cable Operators can manage their subscribers, billing & collection from anywhere & anytime through the android application.
- An e-government strategy aims to apply information technology to improve government efficiency, transparency, and service delivery. It should include components like conceptual framework, business case, implementation process, and measurement of results.
- The strategy guides technology investments and ensures they achieve economic development goals. It also establishes policies, infrastructure, and institutional frameworks.
- India's National e-Governance Plan aims to provide improved government services through online delivery at local service centers over 8 years at a cost of $4 billion. It involves central and state governments delivering integrated services to citizens and businesses.
This demand-side diagnostic study aims to gauge the end-user experience in adopting cashless modes (including cheques) along with the barriers (behavioral and functional) they faced in uptake and usage of cashless solutions.
MicroSave was asked to present evidence to the Reserve Bank of India’s Committee on Comprehensive Financial Services for Small Businesses and Low Income Households. The Committee wanted to know about our extensive experience of agent networks in India. This powerpoint presentation highlights the following:
1. Status of agent networks in India;
2. Design features of a successful agent network and
3. Recommendations to the Committee, as well as
4. Examples of successful agent networks
MSC presents a report on the findings from an assessment of unconditional cash transfers in food subsidies in three union territories in India. It also offers suggestions for the food subsidy program in India.
The Insurance Reporting Challenge: Building an Integrated FrameworkAccenture Insurance
The reporting component of Solvency II has become a major concern for insurance companies operating in Europe. Solvency II Pillar III increases reporting requirements in terms of volume, frequency, timeliness and complexity. These, in turn, have a direct bearing on insurers’ data, processes, methodologies and organization. The pressure put on insurers to enhance their reporting calls for a revamped closing and reporting framework where integration is part of the approach. Beyond the new Solvency II requirements, reporting, in our view, remains a pressing issue at the global level.
The Democratic Republic of the Congo offers huge market potential for technology start-ups. The political environment supports entrepreneurship and digital services. The aim of the National Digital Plan is to drive market and improve infrastructure to surge opportunities for financial inclusion.
Easy Mobile Cable Management System Using Android ApplicationIJMTST Journal
The cable industry is evolving from analogue to digital. The current system that Cable Operators follow doesn't help in implementing the TRAI(Telecom Regulatory Authority of India) regulations to implement subscriber management. There is Smartphone movement in India where the availability of Smartphone's & mobile internet is more and cost effective. By considering the fact, the solution for the said problem will be implemented as android mobile application. The required business logic will be implemented through Web Services and designed android application will use those Web Services hosted on to the cloud. This ensures to provide cost effective solution to the Cable Operator. Cable Operators can manage their subscribers, billing & collection from anywhere & anytime through the android application.
- An e-government strategy aims to apply information technology to improve government efficiency, transparency, and service delivery. It should include components like conceptual framework, business case, implementation process, and measurement of results.
- The strategy guides technology investments and ensures they achieve economic development goals. It also establishes policies, infrastructure, and institutional frameworks.
- India's National e-Governance Plan aims to provide improved government services through online delivery at local service centers over 8 years at a cost of $4 billion. It involves central and state governments delivering integrated services to citizens and businesses.
Assessment of cmm and its impact on software qualityiaemedu
The document discusses the Capability Maturity Model (CMM) and its impact on software quality. It describes the five levels of the CMM and the key process areas within each level. The CMM is designed to help software organizations improve their processes by advancing through the maturity levels. Advancing to higher levels involves institutionalizing effective software engineering practices. The document also presents a problem statement about software projects facing cost overruns and quality issues. It reviews literature on the CMM and outlines a project conversion process framework to assess CMM implementation.
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
This document discusses a finite element model for predicting temperature distribution during surface grinding. It begins by reviewing how various grinding parameters affect temperature and approaches to modeling the grinding zone as a heat source. It then presents the proposed finite element model, which considers the grinding wheel a moving heat source along the workpiece surface. The model calculates the heat flux entering the workpiece based on grinding parameters like wheel speed and cutting depth. Results show maximum temperature occurs at the trailing edge but drops off after due to cooling. The model can provide insight into temperature fields in the workpiece and effects of process parameters on thermal loading and residual stresses.
Design and development of an automotive vertical doors opening system avdosiaemedu
The document describes the design and development of an automotive vertical doors opening system (AVDOS). The proposed system aims to overcome some drawbacks of existing vertical door designs by allowing easier access without requiring side movement. The system uses two hinges, gears, and a gas spring. The hinges are designed to open the door by swinging away from the vehicle. A small vertical push activates the gas spring, which moves the hinge and causes the gears to provide a slight outward movement to clear the door frame. Testing in CAD software validated that the system provides access without hard pushing or slamming doors. The system offers a safer, easier to use, and lower cost alternative to existing vertical door designs.
Investigation of post processing techniques to reduce the surfaceiaemedu
This document summarizes an investigation into post-processing techniques to reduce the surface roughness of parts created through fused deposition modeling (FDM). Specifically, it examines using chemical treatment methods with different chemicals, concentrations, temperatures, exposure times, and initial part roughnesses. A statistical design of experiments approach is used to identify significant factors affecting surface finish and optimize the chemical treatment process. Results from applying this method to ABS plastics show that simple, inexpensive chemical treatments can satisfactorily improve the surface finish of FDM parts.
Throughput improvement of ieee 802.15.4 based medicaliaemedu
This document discusses improving the throughput of IEEE 802.15.4 based medical ad-hoc sensor networks that are used for home healthcare monitoring. These networks experience degraded throughput due to interference from co-existing Wi-Fi networks operating in the same 2.4GHz spectrum. The paper studies the impact of Wi-Fi interference on throughput and uses Clear Channel Assessment (CCA) to improve throughput. Experiments were conducted using Texas Instruments sensor motes and showed that CCA improved throughput by 63% by avoiding transmissions when interference was detected.
Octave wave sound signal measurements in ducted axial fan under stall region ...iaemedu
This document discusses measurements of octave wave sound signals in a ducted axial fan under stall conditions at different rotor speeds. It describes the experimental setup, which includes a ducted axial fan rig with variable speed control and a throttle controller. Sound from the fan is measured using a microphone connected to a data acquisition system and sound spectrum analyzer software. The document provides background on sound measurement techniques, defining concepts like frequency, wavelength, velocity and how the spectrum analyzer system works. Graphs of sound level in decibels are presented for different frequencies at the stall region and throttle position of 4 cm from the casing.
Examining the sustainability of ethics in business an academic perspectiveiaemedu
This document discusses the sustainability of ethics in business from an academic perspective. It examines the role of academics in teaching business ethics and the challenges of ensuring ethics are practiced beyond the classroom. While business ethics courses are now common, the core business curriculum remains focused on functional studies rather than values. Research shows ethics education can influence students' ethical attitudes but other factors like sociocultural norms may have a greater impact. For ethics to be sustained in business, academics must model ethical behavior and develop students' moral character through frameworks beyond case studies alone. Organizational culture also significantly shapes what conduct is deemed ethical.
IRJET- Customized CRM Mobile Application for Retail IndustryIRJET Journal
This document describes a customized CRM mobile application for the retail industry. It discusses developing an Android application to allow users to post complaints about consumer products and services. The application would allow users to register, login, and post complaints with images, videos or documents as proof. The complaints would be sent to the consumer department to update the status. The application includes features like chatbots, document sharing, status checking, SMS sending and call recording. It discusses the architecture and modules of the application, including user and admin modules. The goal is to provide a more sophisticated platform for complaints than existing web-based systems and reduce communication costs.
An Integrated Management Platform for Subscription of MagazinesIRJET Journal
This document presents a mobile application that was developed to help manage magazine and newspaper subscriptions more efficiently.
The application allows vendors to digitally add new subscribers, view and edit subscriber details, calculate monthly fees, and view newspaper and magazine listings. Subscribers can use the app to add new subscriptions, update their contact or address details, and make payments.
Previously, vendors managed subscriptions manually using registers, which was time-consuming. The new application aims to provide a centralized database to store subscriber data and automate processes like fee calculation. It is intended to help vendors more easily manage the large volumes of subscription information and save time on common tasks.
micE Model for Defining Enterprise Mobile Strategyidescitation
Enterprises develop mobile solutions based on competitor offerings and
immediate business needs, without a clear enterprise wide mobile strategy. Thin, thick and
hybrid mobile apps, enterprise mobile platforms, mobile cloud services are all available
across a range of budgets and timing needs, and can be leveraged based on requirement.
Enterprise mobile strategy is typically viewed from the lenses of the IT stakeholders, who
often times have very focused and narrow agendas. The outcome of proceeding with point
solutions to address immediate needs, is unused licenses, replication of effort, rework due to
lack of proper guidelines and other issues that all lead to increased capital and operational
expenditure. This paper defines a user centric, holistic micE model for defining enterprise
mobile strategy and a staged process in leveraging the model in enterprise context.
This document presents an overview of an online digital advertising system for public displays. It discusses the client-server architecture of the system, where administrators act as the central server and both users and public displays act as clients. The system allows users to request advertisements through a web portal, which are then displayed on public screens. It aims to overcome the drawbacks of traditional advertising systems like wasted resources. The document describes the requirements, implementation including the user interfaces, and workflow for both the client and server components. It also discusses existing online advertising systems and sees opportunities for future enhancement.
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...IRJET Journal
This document describes a digital advertising system that uses artificial intelligence and data analytics. The system collects user browsing data through a supply-side platform and deep packet inspection. It analyzes the data to understand user interests and behaviors. A web crawler collects product information from other websites. The system then recommends advertisements for relevant products to users on other websites based on their browsing history. This provides a more personalized advertising experience that is more effective for marketing. The implemented system aims to automate targeted advertising delivery using machine learning models to analyze user data in real-time and improve over existing systems.
DIGITAL COMMUNITY CURRENCY USABILITY FROM THE USER’S EYES: CASES OF SARAFU AN...ijseajournal
Day by day, users demand systems that fulfill their expectations. Often, users of a system are dissatisfied
because systems do not meet their expectations. Indeed, user expectations vary, including
unrealistic expectations –those that are without regard for constraints such as budget, time, manpower and
so on. Even so, place of users’ involvement in system development and implementation need to be
recognized.
Usability is an important aspect in system development and implementation. It is necessary to have an
elaborate understanding of usability from the ‘eyes’ of a user. This study adopted the qualitative research
design that employed triangulation. Two contemporary DCC cases of interest in this research study are:
MTCr. in Kisumu; and the Sarafu in Nairobi. This paper espouses usability definitions and associated
attributes. Specifically, this study established the meaning of digital community currency from the lens of
the users.
This document discusses using data mining techniques to generate optimal telecom plans. It begins with an abstract describing using decision support systems and data mining to improve telecom plan pricing and modification based on user usage. It then provides background on decision support systems and their use in telecom for price setting and expenditure calculation. The goal is to develop an intelligent system to provide insights into trends to judge profit/loss and identify plans needing modification based on customer preference.
The document describes a proposed system for authenticating and summarizing news articles. The system prioritizes authenticating the news over summarization. If the news is determined to be at least 55% authentic based on analysis of keywords and content from authorized news sites, then it will generate a summary by breaking the news down into shorter, meaningful snippets. The system uses machine learning and artificial intelligence algorithms like Syntaxnet to extract phrases and analyze the news. It is implemented as a user-friendly web application using technologies like Python, Django, HTML, CSS and Bootstrap.
This document proposes a blockchain-based charity system called Trust-Aid to increase transparency in the charitable sector. It discusses issues with the current charity system like lack of transparency and accountability. The proposed system uses blockchain and smart contracts to create a decentralized platform for donors and beneficiaries. Donors can view charity campaigns, donate funds which get stored on the blockchain. Beneficiaries can create withdrawal requests which require approval from a minimum of 50% donors before funds are released. The system aims to improve trust in charities by making all transactions and funds flow transparent, immutable and verifiable on the blockchain. It provides an efficient and fraud-proof solution to address the problems with the existing charity system.
This document describes a project to detect fake news and messages using machine learning techniques. The goal is to classify news stories and messages as real or fake, and check the validity of websites publishing the news. The project will use concepts from artificial intelligence, natural language processing, and machine learning, including logistic regression, decision trees, gradient boosting, and random forests. The system is intended as a web application that provides guidance to users on identifying fake news and messages spread on social media platforms. It will analyze data from online sources to identify main keywords and topics associated with fake content. Tips will also be provided on how to prevent the spread of misinformation.
Heuristic Algorithm using Internet of Things and Mobility for solving demogra...Eswar Publications
All over the world, the population in rural and semi-urban areas is a major concern for policy makers as they require technology enablement most to get elevated from their living conditions. Financial Inclusion projects are meant to work in this area as well. However the reach of financial institutions in those areas is much lesser than in urban areas in general. New policies and strategies are being made towards making banking services more accessible to the people in rural and semi-urban area. Technology, in particular Internet of Things (IoT) and Mobilitycan play a major role in this context as an enablerand multiplier. This paper discusses about anIoT and
Mobility driven approach, which the Financial Institutions may consider while trying to work on financial inclusion projects.
This presentation was presented at ICCIT2007.It was intended to give a plausible solution to implement e-governance upon agriculture sector of Bangladesh.
The document discusses opportunities in the trillion dollar global insurance market as new digital users and technologies emerge. It introduces Coverplus, an end-to-end solution that enables insurance providers to develop and distribute embedded insurance products digitally to meet rising customer expectations. The goal of Coverplus is to close the large insurance protection gap in Southeast Asia by promoting innovative embedded insurance solutions that make coverage more accessible and relevant.
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
Abstract Long term evolution direct, plus its features of device-to-device networking and proximate discovery, are new and emerging
technologies able to come out of the shadow to render a whole new perspective at mobile payments. In this work, we propose a
new mobile payment system using long term evolution direct and its features. A sensitive mobile payment system would require
high security requirements in order to be trusted by the users and the businesses. These requirements are taken into account in
our proposed system design and solutions to security considerations are provided. The system’s security and usability features are
designed for implementation from physical to application layer to address the identified issues. Within the scope of this work, we
provided the conceptual design solutions to allow the system to be as solid and secure as possible while they are convenient
enough not to degrade user’s experience when using the system.
Keywords: LTE Direct, Mobile Payment, Internet of Things, Device-To-Device Networking
Assessment of cmm and its impact on software qualityiaemedu
The document discusses the Capability Maturity Model (CMM) and its impact on software quality. It describes the five levels of the CMM and the key process areas within each level. The CMM is designed to help software organizations improve their processes by advancing through the maturity levels. Advancing to higher levels involves institutionalizing effective software engineering practices. The document also presents a problem statement about software projects facing cost overruns and quality issues. It reviews literature on the CMM and outlines a project conversion process framework to assess CMM implementation.
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
This document discusses a finite element model for predicting temperature distribution during surface grinding. It begins by reviewing how various grinding parameters affect temperature and approaches to modeling the grinding zone as a heat source. It then presents the proposed finite element model, which considers the grinding wheel a moving heat source along the workpiece surface. The model calculates the heat flux entering the workpiece based on grinding parameters like wheel speed and cutting depth. Results show maximum temperature occurs at the trailing edge but drops off after due to cooling. The model can provide insight into temperature fields in the workpiece and effects of process parameters on thermal loading and residual stresses.
Design and development of an automotive vertical doors opening system avdosiaemedu
The document describes the design and development of an automotive vertical doors opening system (AVDOS). The proposed system aims to overcome some drawbacks of existing vertical door designs by allowing easier access without requiring side movement. The system uses two hinges, gears, and a gas spring. The hinges are designed to open the door by swinging away from the vehicle. A small vertical push activates the gas spring, which moves the hinge and causes the gears to provide a slight outward movement to clear the door frame. Testing in CAD software validated that the system provides access without hard pushing or slamming doors. The system offers a safer, easier to use, and lower cost alternative to existing vertical door designs.
Investigation of post processing techniques to reduce the surfaceiaemedu
This document summarizes an investigation into post-processing techniques to reduce the surface roughness of parts created through fused deposition modeling (FDM). Specifically, it examines using chemical treatment methods with different chemicals, concentrations, temperatures, exposure times, and initial part roughnesses. A statistical design of experiments approach is used to identify significant factors affecting surface finish and optimize the chemical treatment process. Results from applying this method to ABS plastics show that simple, inexpensive chemical treatments can satisfactorily improve the surface finish of FDM parts.
Throughput improvement of ieee 802.15.4 based medicaliaemedu
This document discusses improving the throughput of IEEE 802.15.4 based medical ad-hoc sensor networks that are used for home healthcare monitoring. These networks experience degraded throughput due to interference from co-existing Wi-Fi networks operating in the same 2.4GHz spectrum. The paper studies the impact of Wi-Fi interference on throughput and uses Clear Channel Assessment (CCA) to improve throughput. Experiments were conducted using Texas Instruments sensor motes and showed that CCA improved throughput by 63% by avoiding transmissions when interference was detected.
Octave wave sound signal measurements in ducted axial fan under stall region ...iaemedu
This document discusses measurements of octave wave sound signals in a ducted axial fan under stall conditions at different rotor speeds. It describes the experimental setup, which includes a ducted axial fan rig with variable speed control and a throttle controller. Sound from the fan is measured using a microphone connected to a data acquisition system and sound spectrum analyzer software. The document provides background on sound measurement techniques, defining concepts like frequency, wavelength, velocity and how the spectrum analyzer system works. Graphs of sound level in decibels are presented for different frequencies at the stall region and throttle position of 4 cm from the casing.
Examining the sustainability of ethics in business an academic perspectiveiaemedu
This document discusses the sustainability of ethics in business from an academic perspective. It examines the role of academics in teaching business ethics and the challenges of ensuring ethics are practiced beyond the classroom. While business ethics courses are now common, the core business curriculum remains focused on functional studies rather than values. Research shows ethics education can influence students' ethical attitudes but other factors like sociocultural norms may have a greater impact. For ethics to be sustained in business, academics must model ethical behavior and develop students' moral character through frameworks beyond case studies alone. Organizational culture also significantly shapes what conduct is deemed ethical.
IRJET- Customized CRM Mobile Application for Retail IndustryIRJET Journal
This document describes a customized CRM mobile application for the retail industry. It discusses developing an Android application to allow users to post complaints about consumer products and services. The application would allow users to register, login, and post complaints with images, videos or documents as proof. The complaints would be sent to the consumer department to update the status. The application includes features like chatbots, document sharing, status checking, SMS sending and call recording. It discusses the architecture and modules of the application, including user and admin modules. The goal is to provide a more sophisticated platform for complaints than existing web-based systems and reduce communication costs.
An Integrated Management Platform for Subscription of MagazinesIRJET Journal
This document presents a mobile application that was developed to help manage magazine and newspaper subscriptions more efficiently.
The application allows vendors to digitally add new subscribers, view and edit subscriber details, calculate monthly fees, and view newspaper and magazine listings. Subscribers can use the app to add new subscriptions, update their contact or address details, and make payments.
Previously, vendors managed subscriptions manually using registers, which was time-consuming. The new application aims to provide a centralized database to store subscriber data and automate processes like fee calculation. It is intended to help vendors more easily manage the large volumes of subscription information and save time on common tasks.
micE Model for Defining Enterprise Mobile Strategyidescitation
Enterprises develop mobile solutions based on competitor offerings and
immediate business needs, without a clear enterprise wide mobile strategy. Thin, thick and
hybrid mobile apps, enterprise mobile platforms, mobile cloud services are all available
across a range of budgets and timing needs, and can be leveraged based on requirement.
Enterprise mobile strategy is typically viewed from the lenses of the IT stakeholders, who
often times have very focused and narrow agendas. The outcome of proceeding with point
solutions to address immediate needs, is unused licenses, replication of effort, rework due to
lack of proper guidelines and other issues that all lead to increased capital and operational
expenditure. This paper defines a user centric, holistic micE model for defining enterprise
mobile strategy and a staged process in leveraging the model in enterprise context.
This document presents an overview of an online digital advertising system for public displays. It discusses the client-server architecture of the system, where administrators act as the central server and both users and public displays act as clients. The system allows users to request advertisements through a web portal, which are then displayed on public screens. It aims to overcome the drawbacks of traditional advertising systems like wasted resources. The document describes the requirements, implementation including the user interfaces, and workflow for both the client and server components. It also discusses existing online advertising systems and sees opportunities for future enhancement.
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...IRJET Journal
This document describes a digital advertising system that uses artificial intelligence and data analytics. The system collects user browsing data through a supply-side platform and deep packet inspection. It analyzes the data to understand user interests and behaviors. A web crawler collects product information from other websites. The system then recommends advertisements for relevant products to users on other websites based on their browsing history. This provides a more personalized advertising experience that is more effective for marketing. The implemented system aims to automate targeted advertising delivery using machine learning models to analyze user data in real-time and improve over existing systems.
DIGITAL COMMUNITY CURRENCY USABILITY FROM THE USER’S EYES: CASES OF SARAFU AN...ijseajournal
Day by day, users demand systems that fulfill their expectations. Often, users of a system are dissatisfied
because systems do not meet their expectations. Indeed, user expectations vary, including
unrealistic expectations –those that are without regard for constraints such as budget, time, manpower and
so on. Even so, place of users’ involvement in system development and implementation need to be
recognized.
Usability is an important aspect in system development and implementation. It is necessary to have an
elaborate understanding of usability from the ‘eyes’ of a user. This study adopted the qualitative research
design that employed triangulation. Two contemporary DCC cases of interest in this research study are:
MTCr. in Kisumu; and the Sarafu in Nairobi. This paper espouses usability definitions and associated
attributes. Specifically, this study established the meaning of digital community currency from the lens of
the users.
This document discusses using data mining techniques to generate optimal telecom plans. It begins with an abstract describing using decision support systems and data mining to improve telecom plan pricing and modification based on user usage. It then provides background on decision support systems and their use in telecom for price setting and expenditure calculation. The goal is to develop an intelligent system to provide insights into trends to judge profit/loss and identify plans needing modification based on customer preference.
The document describes a proposed system for authenticating and summarizing news articles. The system prioritizes authenticating the news over summarization. If the news is determined to be at least 55% authentic based on analysis of keywords and content from authorized news sites, then it will generate a summary by breaking the news down into shorter, meaningful snippets. The system uses machine learning and artificial intelligence algorithms like Syntaxnet to extract phrases and analyze the news. It is implemented as a user-friendly web application using technologies like Python, Django, HTML, CSS and Bootstrap.
This document proposes a blockchain-based charity system called Trust-Aid to increase transparency in the charitable sector. It discusses issues with the current charity system like lack of transparency and accountability. The proposed system uses blockchain and smart contracts to create a decentralized platform for donors and beneficiaries. Donors can view charity campaigns, donate funds which get stored on the blockchain. Beneficiaries can create withdrawal requests which require approval from a minimum of 50% donors before funds are released. The system aims to improve trust in charities by making all transactions and funds flow transparent, immutable and verifiable on the blockchain. It provides an efficient and fraud-proof solution to address the problems with the existing charity system.
This document describes a project to detect fake news and messages using machine learning techniques. The goal is to classify news stories and messages as real or fake, and check the validity of websites publishing the news. The project will use concepts from artificial intelligence, natural language processing, and machine learning, including logistic regression, decision trees, gradient boosting, and random forests. The system is intended as a web application that provides guidance to users on identifying fake news and messages spread on social media platforms. It will analyze data from online sources to identify main keywords and topics associated with fake content. Tips will also be provided on how to prevent the spread of misinformation.
Heuristic Algorithm using Internet of Things and Mobility for solving demogra...Eswar Publications
All over the world, the population in rural and semi-urban areas is a major concern for policy makers as they require technology enablement most to get elevated from their living conditions. Financial Inclusion projects are meant to work in this area as well. However the reach of financial institutions in those areas is much lesser than in urban areas in general. New policies and strategies are being made towards making banking services more accessible to the people in rural and semi-urban area. Technology, in particular Internet of Things (IoT) and Mobilitycan play a major role in this context as an enablerand multiplier. This paper discusses about anIoT and
Mobility driven approach, which the Financial Institutions may consider while trying to work on financial inclusion projects.
This presentation was presented at ICCIT2007.It was intended to give a plausible solution to implement e-governance upon agriculture sector of Bangladesh.
The document discusses opportunities in the trillion dollar global insurance market as new digital users and technologies emerge. It introduces Coverplus, an end-to-end solution that enables insurance providers to develop and distribute embedded insurance products digitally to meet rising customer expectations. The goal of Coverplus is to close the large insurance protection gap in Southeast Asia by promoting innovative embedded insurance solutions that make coverage more accessible and relevant.
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
Abstract Long term evolution direct, plus its features of device-to-device networking and proximate discovery, are new and emerging
technologies able to come out of the shadow to render a whole new perspective at mobile payments. In this work, we propose a
new mobile payment system using long term evolution direct and its features. A sensitive mobile payment system would require
high security requirements in order to be trusted by the users and the businesses. These requirements are taken into account in
our proposed system design and solutions to security considerations are provided. The system’s security and usability features are
designed for implementation from physical to application layer to address the identified issues. Within the scope of this work, we
provided the conceptual design solutions to allow the system to be as solid and secure as possible while they are convenient
enough not to degrade user’s experience when using the system.
Keywords: LTE Direct, Mobile Payment, Internet of Things, Device-To-Device Networking
Ticketing system is an IT service management platform. The ticketing tool provides solutions to all clients who are connected with one or more organizations remotely within the infrastructure. The Ticketing System is also used as a help desk software that can help customer to get their service as efficiently as possible while maintaining their service requests. The platform of ticketing system is deployed in virtual machine which thus can be accessed by anyone within the organization. Florika Gohil | Mr. Vikash Kumar ""Ticketing System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23603.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23603/ticketing-system/florika-gohil
Customer relationship management (CRM) is an important element in all forms of industry. This process involves ensuring that the customers of a business are satisfied with the product or services that they are paying for. Since most businesses collect and store large volumes of data about their customers; it is easy for the data analysts to use that data and perform predictive analysis. One aspect of this includes customer retention and customer churn. Customer churn is defined as the concept of understanding whether or not a customer of the company will stop using the product or service in future. In this paper a supervised machine learning algorithm has been implemented using Python to perform customer churn analysis on a given data-set of Telco, a mobile telecommunication company. This is achieved by building a decision tree model based on historical data provided by the company on the platform of Kaggle. This report also investigates the utility of extreme gradient boosting (XGBoost) library in the gradient boosting framework (XGB) of Python for its portable and flexible functionality which can be used to solve many data science related problems highly efficiently. The implementation result shows the accuracy is comparatively improved in XGBoost than other learning models.
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCEIJCSEA Journal
The document summarizes a research project that developed a cross-platform mobile payments application programming interface (API) for e-commerce in Kenya. The API allows merchants to integrate mobile payment options into their online stores, facilitating secure and seamless payments via mobile phones. The objectives were to create a RESTful API that is easy for developers to integrate and supports payments across different platforms. The API connects e-commerce applications to existing mobile payment systems in Kenya like M-Pesa. Testing challenges included limited resources to simulate a production environment. Further testing is needed but the API achieves its goals of enabling mobile payments for e-commerce.
IRJET- Decentralized Freelancing System - Trust and TransparencyIRJET Journal
1) The document proposes a blockchain-based decentralized freelancing system to provide trust and transparency between employers and freelancers.
2) Current centralized freelancing systems involve intermediaries, resulting in higher transaction fees, lack of transparency, and possibility of fraud.
3) The proposed system uses blockchain and smart contracts to directly connect employers and freelancers, removing intermediaries and providing a trusted, transparent system with lower fees.
The concern of many organisations is to minimize the total time consumption taken for purchasing and billing. Through the analysis of customer behaviour, accurate profiles are being generated by specifying needs and interest and allowing organisation to give customers what they want it, when they want, leading to a better customer satisfaction thereby keeping them to come back for more. To improve the business performance of an organisation we need to automate the right offers to the right person at the right time. Our project provides the unique id for each registered customer. Based on registration the individual can start their shopping. After purchasing the product, they can scan the products using mobile application and the concerned bill for the particular customer will be intimated to the retailer, the number of products purchased will be checked and cash is paid. It reviews the status of products availability and it notifies to the retailer if it reaches concerned limit. This project provides the brief view of business liabilities to the retailers using apriori algorithm. This project will help the customer to purchase the products through online. Online shopping will also be useful for analysing the customer’s previous shopping history.
Similar to Towards better control over the distribution of subsidized commodities (20)
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
Tech transfer is a common methodology for transferring new products or an existing
commercial product to R&D or to another manufacturing site. Transferring product knowledge to the
manufacturing floor is crucial and it is an ongoing approach in the pharmaceutical and biotech
industry. Without adopting this process, no company can manufacture its niche products, let alone
market them. Technology transfer is a complicated, process because it is highly cross functional. Due
to its cross functional dependence, these projects face numerous risks and failure. If anidea cannot be
successfully brought out in the form of a product, there is no customer benefit, or satisfaction.
Moreover, high emphasis is in sustaining manufacturing with highest quality each and every time. It
is vital that tech transfer projects need to be executed flawlessly. To accomplish this goal, risk
management is crucial and project team needs to use the risk management approach seamlessly.
Integration of feature sets with machine learning techniquesiaemedu
This document summarizes a research paper that proposes a novel approach for spam filtering using selective feature sets combined with machine learning techniques. The paper presents an algorithm and system architecture that extracts feature sets from emails and uses machine learning to classify emails and generate rules to identify spam. Several metrics are identified to evaluate the efficiency of the feature sets, including false positive rate. An experiment is described that uses keyword lists as feature sets to train filters and compares the proposed approach to other spam filtering methods.
Effective broadcasting in mobile ad hoc networks using gridiaemedu
This document summarizes a research paper that proposes a new grid-based broadcasting mechanism for mobile ad hoc networks. The paper argues that flooding approaches to broadcasting are inefficient and cause network congestion. The proposed approach divides the network into a hierarchical grid structure. When a node needs to broadcast a message, it sends the message to the first node in the appropriate grid, which is then responsible for updating and forwarding the message within that grid. Simulation results showed the grid-based approach outperformed other broadcasting protocols and was more reliable, efficient and scalable.
Effect of scenario environment on the performance of mane ts routingiaemedu
The document analyzes the effect of scenario environment on the performance of the AODV routing protocol in mobile ad hoc networks (MANETs). It studies AODV performance under different scenarios varying network size, maximum node speed, and pause time. The performance is evaluated based on packet delivery ratio, throughput, and end-to-end delay. The results show that AODV performs best in some scenarios and worse in others, indicating that scenario parameters significantly impact routing protocol performance in MANETs.
Adaptive job scheduling with load balancing for workflow applicationiaemedu
This document discusses adaptive job scheduling with load balancing for workflow applications in a grid platform. It begins with an abstract that describes grid computing and how scheduling plays a key role in performance for grid workflow applications. Both static and dynamic scheduling strategies are discussed, but they require high scheduling costs and may not produce good schedules. The paper then proposes a novel semi-dynamic algorithm that allows the schedule to adapt to changes in the dynamic grid environment through both static and dynamic scheduling. Load balancing is incorporated to handle situations where jobs are delayed due to resource fluctuations or overloading of processors. The rest of the paper outlines the related works, proposed scheduling algorithm, system model, and evaluation of the approach.
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
The document discusses semantic web services and their challenges. It provides an overview of semantic web technologies like WSDL, SOAP, UDDI, and OIL which are used to build semantic web services. The semantic web architecture adds semantics to web services through ontologies written in OWL and DAML+OIL. Key approaches to semantic web services include annotation, composition, and addressing privacy and security. However, semantic web services still face challenges in achieving their full potential due to issues in representation, reasoning, and a lack of real-world applications and data.
Website based patent information searching mechanismiaemedu
This document summarizes a research paper on developing a website-based patent information searching mechanism. It discusses how patent information can be used for technology development, rights acquisition and utilization, and management information. It describes different types of patent searches including novelty, validity, infringement, and state-of-the-art searches. It also evaluates and compares two major patent websites, Delphion and USPTO, in terms of their search capabilities and features.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
1) The document discusses the Cyclic Model Analysis (CMA) technique for sequential pattern mining which aims to predict customer purchasing behavior.
2) CMA calculates the Trend Distribution Function from sequential patterns to model purchasing trends over time. It then uses Generalized Periodicity Detection and Trend Modeling to identify periodic patterns and construct an approximating model.
3) The Cyclic Model Analysis algorithm is applied to further analyze the patterns, dividing the domain into segments where the distribution function is increasing or decreasing and applying the other techniques recursively to fully model the cyclic behavior.
Performance analysis of manet routing protocol in presenceiaemedu
This document analyzes the performance of different routing protocols in a mobile ad hoc network (MANET) under hybrid traffic conditions. It simulates a MANET with 50 nodes moving at speeds up to 20 m/s using the AODV, DSDV, and DSR routing protocols. Traffic included both constant bit rate and variable bit rate sources. Results found that AODV had lower average end-to-end delay and higher packet delivery ratios than DSDV and DSR as the percentage of variable bit rate traffic increased. AODV also performed comparably under both low and high node mobility scenarios with hybrid traffic.
Performance measurement of different requirements engineeringiaemedu
This document summarizes a research paper that compares the performance of different requirements engineering (RE) process models. It describes three RE process models - two existing linear models and the authors' iterative model. It also reviews literature on common RE activities and issues with descriptive models not reflecting real-world practices. The authors conducted interviews at two Indian companies to model their RE processes and compare them to the three models. They found the existing linear models did not fully capture the iterative nature of observed RE processes.
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
Efficient text compression using special character replacementiaemedu
The document describes a proposed algorithm for efficient text compression using special character replacement and space removal. The algorithm replaces words with non-printable ASCII characters or combinations of characters to compress text files. It uses a dynamic dictionary to map words to their symbols. Spaces are removed from the compressed file in some cases to further reduce file size. Experimental results show the algorithm achieves better compression ratios than LZW, WinZip 10.0 and WinRAR 3.93 for various text file types while allowing lossless decompression.
The document discusses agile programming and proposes a new methodology. It provides an overview of existing agile methodologies like Scrum and Extreme Programming. Scrum uses short sprints to define tasks and deadlines. Extreme Programming focuses on practices like test-first development, pair programming, and continuous integration. The document notes drawbacks like an inability to support large or multi-site projects. It proposes designing a new methodology that combines the advantages of existing methods while overcoming their deficiencies.
Adaptive load balancing techniques in global scale grid environmentiaemedu
The document discusses various adaptive load balancing techniques for distributed applications in grid environments. It first describes adaptive mesh refinement algorithms that partition computational domains using space-filling curves or by distributing grids independently or at different levels. It also discusses dynamic load balancing using tiling and multi-criteria geometric partitioning. The document then covers repartitioning algorithms based on multilevel diffusion and the adaptive characteristics of structured adaptive mesh refinement applications. Finally, it discusses adaptive workload balancing on heterogeneous resources by benchmarking resource characteristics and estimating application parameters to find optimal load distribution.
A survey on the performance of job scheduling in workflow applicationiaemedu
This document summarizes a survey on job scheduling performance in workflow applications on grid platforms. It discusses an adaptive dual objective scheduling (ADOS) algorithm that takes both completion time and resource usage into account for measuring schedule performance. The study shows ADOS delivers good performance in completion time, resource usage, and robustness to changes in resource performance. It also describes the system architecture used, which includes a planner and executor component. The planner focuses on scheduling to minimize completion time while considering resource usage, and can reschedule if needed. The executor enacts the schedule on the grid resources.
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
This document summarizes existing methods to detect misbehavior in mobile ad hoc networks (MANETs). It discusses how routing protocols assume nodes will cooperate fully, but misbehavior like packet dropping can occur. It describes several techniques to detect misbehavior, including watchdog, ACK/SACK, TWOACK, S-TWOACK, and credit-based/reputation-based schemes. Credit-based schemes use virtual currencies to provide incentives for nodes to forward packets, while reputation-based schemes track nodes' past behaviors. The document aims to survey approaches for mitigating the impact of misbehaving nodes in MANET routing.
A novel approach for satellite imagery storage by classifyiaemedu
This document presents a novel approach for classifying and storing satellite imagery by detecting and storing only non-duplicate regions. It uses kernel principal component analysis to reduce the dimensionality and extract features of satellite images. Fuzzy N-means clustering is then used to segment the images into blocks. A duplication detection algorithm compares blocks to identify duplicate and non-duplicate regions. Only the non-duplicate regions are stored in the database, improving storage efficiency and updating speed compared to completely replacing existing images. Support vector machines are used to categorize the non-duplicate blocks into the appropriate classes in the existing images.
A self recovery approach using halftone images for medical imageryiaemedu
This document summarizes a proposed approach for securely transferring medical images over the internet using visual cryptography and halftone images. The approach uses error diffusion techniques to generate a halftone host image from the grayscale medical image. Shadow images are then created from the halftone host image using visual cryptography algorithms. When stacked together, the shadow images reveal the secret medical image. The halftone host image also contains an embedded logo that can be extracted to verify the integrity of the reconstructed image without a trusted third party.